{"title":"Lightweight Image Encryption: Cellular Automata and the Lorenz System","authors":"Wassim Alexan, Mohamed ElBeltagy, Amr Aboshousha","doi":"10.1109/ICM52667.2021.9664961","DOIUrl":null,"url":null,"abstract":"The ever-increasing transmissions of multimedia over the Internet is requiring more advanced security schemes. This paper proposes a lightweight image encryption scheme that is based on 2 stages. The first stage incorporates the use of Rule 30 cellular automaton, while the second stage incorporates the use of a Lorenz system. Performance of the proposed encryption scheme is evaluated using a number of metrics. The computed values of the metrics indicate a comparable performance to counterpart schemes from the literature, at a very low cost of processing time. Such a trait indicates that the proposed image encryption scheme possesses potential for real-time image security applications.","PeriodicalId":212613,"journal":{"name":"2021 International Conference on Microelectronics (ICM)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2021-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"11","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2021 International Conference on Microelectronics (ICM)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICM52667.2021.9664961","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 11
Abstract
The ever-increasing transmissions of multimedia over the Internet is requiring more advanced security schemes. This paper proposes a lightweight image encryption scheme that is based on 2 stages. The first stage incorporates the use of Rule 30 cellular automaton, while the second stage incorporates the use of a Lorenz system. Performance of the proposed encryption scheme is evaluated using a number of metrics. The computed values of the metrics indicate a comparable performance to counterpart schemes from the literature, at a very low cost of processing time. Such a trait indicates that the proposed image encryption scheme possesses potential for real-time image security applications.