Open Access Open Access  Restricted Access Subscription Access
Open Access Open Access Open Access  Restricted Access Restricted Access Subscription Access

Image Encryption and Decryption Using Cellular Automata


Affiliations
1 B.I.T, Mesra, Algeria
2 Department of Computer Science in B.I.T, Mesra, Algeria
     

   Subscribe/Renew Journal


This paper presents new image encryption and decryption method using cellular automata. This method is based on the replacement of the pixel values. Such replacement is made using recursive data reformation and recursive cellular automata (CA)substitution .Data are reformed using data reformation key, while CA substitution is performed using CA key and cellular programming.Cellular programming dynamically chose best rules (which produce better random number sequence).CA key decide initial configuration and boundary condition of 2D Von Neumann cellular automata.CA key also help to chose a particular key stream sequence(i.e a sequence of CA data)from total produced key space(i.e total CA data sequence). The salient features of the proposed method are its losslessness, symmetric private key encryption, very large number of secret keys, and key-dependent pixel value replacement.


Keywords

Image Processing, Cellular Automata, Cellular Programming, Image Security, Encryption, Decryption.
User
Subscription Login to verify subscription
Notifications
Font Size

Abstract Views: 164

PDF Views: 3




  • Image Encryption and Decryption Using Cellular Automata

Abstract Views: 164  |  PDF Views: 3

Authors

Sanchari Sen
B.I.T, Mesra, Algeria
Satish Chandra Panigrahi
Department of Computer Science in B.I.T, Mesra, Algeria

Abstract


This paper presents new image encryption and decryption method using cellular automata. This method is based on the replacement of the pixel values. Such replacement is made using recursive data reformation and recursive cellular automata (CA)substitution .Data are reformed using data reformation key, while CA substitution is performed using CA key and cellular programming.Cellular programming dynamically chose best rules (which produce better random number sequence).CA key decide initial configuration and boundary condition of 2D Von Neumann cellular automata.CA key also help to chose a particular key stream sequence(i.e a sequence of CA data)from total produced key space(i.e total CA data sequence). The salient features of the proposed method are its losslessness, symmetric private key encryption, very large number of secret keys, and key-dependent pixel value replacement.


Keywords


Image Processing, Cellular Automata, Cellular Programming, Image Security, Encryption, Decryption.