{"title":"基于细胞自动机、S-Box和DNA编码的SPN图像加密","authors":"Omar Omran, Wassim Alexan","doi":"10.1109/HORA58378.2023.10156745","DOIUrl":null,"url":null,"abstract":"The rapidly increasing transmission of multimedia through the Internet and insecure communication channels is challenging scientists and engineers to develop efficient security measures. An image encryption algorithm is proposed in this paper to help solve such a problem. The proposed algorithm is carried out in 3 stages. The first stage employs Rule 30 cellular automata to generate the first encryption key. The second stage makes use of a tried-and-true S-box. Finally, in the third stage, DNA encoding is used to generate the second encryption key. The overall effect of this 3-stage process ensures that a cryptographic system's Shannon's confusion and diffusion properties are employed, thereby improving the security and robustness of the resulting encrypted images.","PeriodicalId":247679,"journal":{"name":"2023 5th International Congress on Human-Computer Interaction, Optimization and Robotic Applications (HORA)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2023-06-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Cellular Automata, S-Box and DNA Coding Based SPN for Image Encryption\",\"authors\":\"Omar Omran, Wassim Alexan\",\"doi\":\"10.1109/HORA58378.2023.10156745\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The rapidly increasing transmission of multimedia through the Internet and insecure communication channels is challenging scientists and engineers to develop efficient security measures. An image encryption algorithm is proposed in this paper to help solve such a problem. The proposed algorithm is carried out in 3 stages. The first stage employs Rule 30 cellular automata to generate the first encryption key. The second stage makes use of a tried-and-true S-box. Finally, in the third stage, DNA encoding is used to generate the second encryption key. The overall effect of this 3-stage process ensures that a cryptographic system's Shannon's confusion and diffusion properties are employed, thereby improving the security and robustness of the resulting encrypted images.\",\"PeriodicalId\":247679,\"journal\":{\"name\":\"2023 5th International Congress on Human-Computer Interaction, Optimization and Robotic Applications (HORA)\",\"volume\":\"11 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2023-06-08\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2023 5th International Congress on Human-Computer Interaction, Optimization and Robotic Applications (HORA)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/HORA58378.2023.10156745\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2023 5th International Congress on Human-Computer Interaction, Optimization and Robotic Applications (HORA)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/HORA58378.2023.10156745","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Cellular Automata, S-Box and DNA Coding Based SPN for Image Encryption
The rapidly increasing transmission of multimedia through the Internet and insecure communication channels is challenging scientists and engineers to develop efficient security measures. An image encryption algorithm is proposed in this paper to help solve such a problem. The proposed algorithm is carried out in 3 stages. The first stage employs Rule 30 cellular automata to generate the first encryption key. The second stage makes use of a tried-and-true S-box. Finally, in the third stage, DNA encoding is used to generate the second encryption key. The overall effect of this 3-stage process ensures that a cryptographic system's Shannon's confusion and diffusion properties are employed, thereby improving the security and robustness of the resulting encrypted images.