{"title":"一个基于块的图像加密方案,使用具有身份验证能力的元胞自动机","authors":"Ziba Eslami, Saeideh Kabirirad","doi":"10.1063/1.5136195","DOIUrl":null,"url":null,"abstract":"This paper presents an authenticated image encryption algorithm based on cellular automata. To accelerate the process, we divide the image into blocks and use a permutation algorithm to apply chaos on the blocks and then use cellular automata-based algorithm to change the pixels. The authentication mechanism of our scheme, adjustable to the desired level, can detect slight tampering in the cipher image before full decryption. Existing image encryption schemes usually cannot provide parallel processing capability and high sensitivity to changes simultaneously. This study tries to overcome this drawback as well. We show that our proposal fulfills desired security properties including large key space and robustness against statistical, differential and chosen-plaintext attacks.","PeriodicalId":175596,"journal":{"name":"THIRD INTERNATIONAL CONFERENCE OF MATHEMATICAL SCIENCES (ICMS 2019)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2019-12-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"4","resultStr":"{\"title\":\"A block-based image encryption scheme using cellular automata with authentication capability\",\"authors\":\"Ziba Eslami, Saeideh Kabirirad\",\"doi\":\"10.1063/1.5136195\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"This paper presents an authenticated image encryption algorithm based on cellular automata. To accelerate the process, we divide the image into blocks and use a permutation algorithm to apply chaos on the blocks and then use cellular automata-based algorithm to change the pixels. The authentication mechanism of our scheme, adjustable to the desired level, can detect slight tampering in the cipher image before full decryption. Existing image encryption schemes usually cannot provide parallel processing capability and high sensitivity to changes simultaneously. This study tries to overcome this drawback as well. We show that our proposal fulfills desired security properties including large key space and robustness against statistical, differential and chosen-plaintext attacks.\",\"PeriodicalId\":175596,\"journal\":{\"name\":\"THIRD INTERNATIONAL CONFERENCE OF MATHEMATICAL SCIENCES (ICMS 2019)\",\"volume\":\"35 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2019-12-29\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"4\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"THIRD INTERNATIONAL CONFERENCE OF MATHEMATICAL SCIENCES (ICMS 2019)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1063/1.5136195\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"THIRD INTERNATIONAL CONFERENCE OF MATHEMATICAL SCIENCES (ICMS 2019)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1063/1.5136195","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
A block-based image encryption scheme using cellular automata with authentication capability
This paper presents an authenticated image encryption algorithm based on cellular automata. To accelerate the process, we divide the image into blocks and use a permutation algorithm to apply chaos on the blocks and then use cellular automata-based algorithm to change the pixels. The authentication mechanism of our scheme, adjustable to the desired level, can detect slight tampering in the cipher image before full decryption. Existing image encryption schemes usually cannot provide parallel processing capability and high sensitivity to changes simultaneously. This study tries to overcome this drawback as well. We show that our proposal fulfills desired security properties including large key space and robustness against statistical, differential and chosen-plaintext attacks.