{"title":"A block-based image encryption scheme using cellular automata with authentication capability","authors":"Ziba Eslami, Saeideh Kabirirad","doi":"10.1063/1.5136195","DOIUrl":null,"url":null,"abstract":"This paper presents an authenticated image encryption algorithm based on cellular automata. To accelerate the process, we divide the image into blocks and use a permutation algorithm to apply chaos on the blocks and then use cellular automata-based algorithm to change the pixels. The authentication mechanism of our scheme, adjustable to the desired level, can detect slight tampering in the cipher image before full decryption. Existing image encryption schemes usually cannot provide parallel processing capability and high sensitivity to changes simultaneously. This study tries to overcome this drawback as well. We show that our proposal fulfills desired security properties including large key space and robustness against statistical, differential and chosen-plaintext attacks.","PeriodicalId":175596,"journal":{"name":"THIRD INTERNATIONAL CONFERENCE OF MATHEMATICAL SCIENCES (ICMS 2019)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2019-12-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"4","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"THIRD INTERNATIONAL CONFERENCE OF MATHEMATICAL SCIENCES (ICMS 2019)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1063/1.5136195","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 4
Abstract
This paper presents an authenticated image encryption algorithm based on cellular automata. To accelerate the process, we divide the image into blocks and use a permutation algorithm to apply chaos on the blocks and then use cellular automata-based algorithm to change the pixels. The authentication mechanism of our scheme, adjustable to the desired level, can detect slight tampering in the cipher image before full decryption. Existing image encryption schemes usually cannot provide parallel processing capability and high sensitivity to changes simultaneously. This study tries to overcome this drawback as well. We show that our proposal fulfills desired security properties including large key space and robustness against statistical, differential and chosen-plaintext attacks.