CFP last date
20 May 2024
Call for Paper
June Edition
IJCA solicits high quality original research papers for the upcoming June edition of the journal. The last date of research paper submission is 20 May 2024

Submit your paper
Know more
Reseach Article

New CA based Key Generation for a Robust RGB Color Image Encryption Scheme

by Bala Suyambu Jeyaram, Rama Raghavan, Krishna Shankara Narayanan
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 80 - Number 7
Year of Publication: 2013
Authors: Bala Suyambu Jeyaram, Rama Raghavan, Krishna Shankara Narayanan
10.5120/13877-1760

Bala Suyambu Jeyaram, Rama Raghavan, Krishna Shankara Narayanan . New CA based Key Generation for a Robust RGB Color Image Encryption Scheme. International Journal of Computer Applications. 80, 7 ( October 2013), 45-50. DOI=10.5120/13877-1760

@article{ 10.5120/13877-1760,
author = { Bala Suyambu Jeyaram, Rama Raghavan, Krishna Shankara Narayanan },
title = { New CA based Key Generation for a Robust RGB Color Image Encryption Scheme },
journal = { International Journal of Computer Applications },
issue_date = { October 2013 },
volume = { 80 },
number = { 7 },
month = { October },
year = { 2013 },
issn = { 0975-8887 },
pages = { 45-50 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume80/number7/13877-1760/ },
doi = { 10.5120/13877-1760 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T21:53:58.271158+05:30
%A Bala Suyambu Jeyaram
%A Rama Raghavan
%A Krishna Shankara Narayanan
%T New CA based Key Generation for a Robust RGB Color Image Encryption Scheme
%J International Journal of Computer Applications
%@ 0975-8887
%V 80
%N 7
%P 45-50
%D 2013
%I Foundation of Computer Science (FCS), NY, USA
Abstract

In the past few years, study of securing the digital images has increased tremendously and several encryption algorithms based on Cellular Automata have been proposed to protect the digital images against different cryptographic attacks. This paper proposes a novel pixel based encryption scheme based on Cellular Automata and Galois Field. Here the random key image has been generated using 1D Cellular Automata and for the encryption purpose GF (28) is used. The encryption is done on pixel values of the RGB components separately. Since this cryptosystem uses only logic operations for both key generation and GF (28) operations, it requires minimized computational resources and the execution speed is also high. Experimental results exhibit the confusion and diffusion properties of the proposed system. The correlation analysis shows that the proposed scheme has zero correlation amongst adjacent pixels (horizontal, vertical, diagonal).

References
  1. S. Wolfram, Cryptography with Cellular Automata, in advances in cryptology: Crypto '85 proceedings, Lecture notes in Computer Science, vol. 218. Springer; 1986 p. 429-32.
  2. S. Wolfram, Theory and Applications of Cellular Automata, Advanced series on complex systems-Volume 1.
  3. Chen RJ, Lai JL, Image security system using recursive cellular automata substitution, Pattern Recognition 2007; 40(5): 1621-31.
  4. Jun Jin, An image encryption based on elementary cellular automata, Optics and Lasers in Engineering 50 (2012) 1836-1843.
  5. S. Nandi, B. K. Kar, P. P. Chaudhuri, Theory and applications of cellular automata in cryptography, IEEE Transactions on computers 43(1994) 1346-1357.
  6. J. Kari, Cryptosystems based on reversible cellular automata, Personal communication,1992.
  7. P. Guan, Cellular automata public key cryptosystem, Complex system. 1(1987) 51-56.
  8. F. Maleki, A. Mohades, S. Mehdi Hashemi, M. E. Shiri, An Image Encryption System by Cellular Automata with Memory, The Third International Conference on Availability, Reliability and Security, IEEE Computer Society, 2008.
  9. Chen Rong-Jian, Horng Shi-Jinn. Novel SCAN and 2-D Von Neumann cellular automata. Signal Process: Image Commun, 2010;25(6): 413-26.
  10. F. Seredynski, P. Bouvry, A. Y. Zomaya, Cellular automata computations and secret key cryptography, Parallel Computing 30 (2004) 753-766.
  11. Jin Jun, Wu Zhi-Hong, A secret image sharing based on neighborhood configurations of 2D-Cellular automata, Optics and Lasers in Technology. 2012; 44(3): 538-48.
  12. Eslami Z, Razzaghi SH, Ahmadabadi J, Secret image sharing based on cellular automata and stegnography, Pattern Recognition 2010; 43(1): 397-404.
  13. Rosin Paul L, Image Processing using 3-state cellular automata, Comput. Vis. Image Understand. 2010; 114(7): 790-802.
  14. Cappellari L, Milani S, Cruz-Reyes C, Calvagno G. Resolution scalable image coding with reversible cellular automata. IEEE Trans Image Process 2011; 20(5): 1461-8.
  15. Chen. G,Mao Y,Chui CK, Asymmetric image encryption scheme based on 3D chaotic cat maps. Chaos, Solitons and Fractals 2004; 21: 749-61
  16. K. Loukhaoukha, J. Y. Chouinard, A. Berdai, A secure Image Encryption Algorithm Based on Rubik's Cube Principle, Hundawi Publishing Corporation, Journal of Electrical and Computer Engineering, Volume 2012, Article ID 173931, 13 pages.
  17. N. A. Al-Romema, A. S. Mashat, I. AlBidewi, New Chaos-Based Image Encryption Scheme for RGB Components of Color Image. ,Computer Science and Engineering 2012, 2(5): 77-85.
Index Terms

Computer Science
Information Sciences

Keywords

Elementary Cellular Automata(ECA) Galois Field RGB color image random key image encryption and decryption.