Computer Science ›› 2015, Vol. 42 ›› Issue (7): 182-185.doi: 10.11896/j.issn.1002-137X.2015.07.040

Previous Articles     Next Articles

3D Chaos Map and Cellular Automata Based Image Encryption

LI Jing-yi CHEN Ju-hua   

  • Online:2018-11-14 Published:2018-11-14

Abstract: To design a high efficiency and good performance image encryption system,a novel scheme was proposed based on 3D chaos map and 2D second order cellular automata.In this algorithm,image pixels are permuted using 3D cat chaos map.Then in diffusion stage,each pixel value in bit level is permuted using 2D second order cellular automata.This scheme belongs to the class of symmetric systems,which also has a large key space,and both encryption and decryption are parallel.The results of several experiments on brute force attack,statistical analysis and differential attack show that the scheme can achieve a high security in few iterations and won’t enlarge the cipher image.

Key words: 3D chaos map,2D second order cellular automata,Image encryption

[1] Wang X,Luan D.A novel image encryption algorithm using chaos and reversible cellular automata[J].Communications in Nonlinear Science and Numerical Simulation,2013,18(11):3075-3085
[2] Patidar V,Pareek N K,Sud K K.A new substitution diffusion based image cipher using chaotic standard and logistic maps[J].Commun Nonlinear Sci Numer Simul,2009,14(7):3056-3075
[3] Patidar V,Pareek N K,Purohit G,et al.Modified substitution-diffusion image cipher using chaotic standard and logistic maps[J].Commun Nonlinear Sci Numer Simul,2010,15(10):2755-2765
[4] Kanso A,Ghebleh M.A novel image encryption algorithm based on a 3D chaotic map[J].Commun Nonlinear Sci Numer Simul,2012,17(7):2943-2959
[5] Chen G,Mao Y,Chui C.A symmetric image encryption scheme based on 3D chaotic cat maps[J].Chaos Soliton Fract 2004,21:749-761
[6] Peng Chuan,Li Yuan-xiang.Chaos and cellular automata based image encryption algorithm[J].Computer Engineering and Design,2012,33(7):2526-2529
[7] Von Neumann J,Burks A W.Theory of Self reproducing Automata[M].USA:University of Illinois Press,1966
[8] WolframS.Cryptography with cellular automata[C]∥Crypto.85.1985:429-432(下转第203页)(上接第185页)
[9] Xia Xue-wen,Li Yuan-xiang,Zeng Hui.Data Encryption Algorithm Based on Two Dimension Toggle Cellular Automata[J].Computer Science,2010,37(3):46-48
[10] Abdo A A,Lian S G,Ismail I A,et al.A cryptosystem based on elementary cellular auto-mata[J].Commun Nonlinear Sci Nu-mer Simul,2013,18(1):136-147
[11] Chen R J,Lai J L.Image security system using recursive cellular automata substitution[J].Patter Recognit,2007,40(5):1621-1631
[12] Seredynski M,Pienkosz K,Bouvry P.Reversible cellular auto-mata based encryption[M]∥Network and Parallel Computing.Springer,2004:411-418
[13] Chen G,Dong X.From chaos to order:methodologies,perspectives and applications[M].Singapore:World Scientific,1998
[14] Kari J.Reversibility and surjectivity problems of cellular automata[J].Journal of Computer and System Sciences,1994,48(1):149-182
[15] Toffoli T,Margolus N H.Invertible cellular automata:A review[J].Physica D:Nonlinear Phenomena,1990,45(1):229-253

No related articles found!
Full text



No Suggested Reading articles found!