吉林大学学报(工学版) ›› 2017, Vol. 47 ›› Issue (5): 1653-1660.doi: 10.13229/j.cnki.jdxbgxb201705043

Previous Articles     Next Articles

Image encryption method based on partial X type cellular automaton

LIANG Shi-li1, CHAI Zong-qian1, ZHANG Ling2, WU Yan-sheng1, CAO Chun-lei1   

  1. 1.College of Physics,Northeast Normal University,Changchun 130024,China;
    2.College of Science, Changchun University of Science and Technology,Changchun 130022,China
  • Received:2016-10-22 Online:2017-09-20 Published:2017-09-20

Abstract: In this paper, an image encryption algorithm based on two-dimensional, two state and five neighbor reversible Cellular Automaton (CA) is proposed. First, this method is applied to analyze several X type neighbor structures of CA, and a partial X type structure of CA is put forwarded, which has obvious key confounding effect. Second, in each CA encryption iteration, the results are processed with matrix transpose operation; then the key image with one-dimensional four neighbor CA is generated, which has chaotic behavior at the rules of 9d62 (hex). Finally, the key information is put into the CA boundary conditions, so that the key is involved in each cellular automaton iteration. Experimental results show that using partial X2 type CA structure and new model of key design can improve the sensitivity of the key in the encryption system. Compared with traditional single XOR operation, the new method can also reduce the number of CA iterations, thus, possessing advantages in plaintext diffusion rate and obfuscation key, the diffusion rate is increased by 36.14%.

Key words: image processing technology, X2 structure CA, image encryption, diffusion rate

CLC Number: 

  • TP399
[1] Zhang Xing, Zhang Hong, Xu Chun-gen. Reverse iterative image encryption scheme using 8-layer cellular automata[J]. KSII Transactions on Internet & Information Systems,2016,10(7):
[2] Souyah A, Faraoun K M. Fast and efficient randomized encryption scheme for digital images based on Quadtree decomposition and reversible memory cellular automata[J]. Nonlinear Dynamics, 2015, 84(2):715-732.
[3] 袁野, 陈炬桦. 一种基于二维变邻居混合可逆细胞自动机的加密算法[J]. 小型微型计算机系统, 2015, 36(11):2594-2598.
Yuan Ye, Chen Ju-ye. An encryption algorithm based on two dimensional voriable neighborhood reversible celluor automata[J].Small Microcompater System,2015,36(11):2594-2598.
[4] Tralic D, Grgic S. Robust image encryption based on balanced cellular automaton and pixel separation[J]. Radio engineering, 2016, 25(3):548-555.
[5] 宫姗. 一种基于混合细胞自动机的加密算法研究[D]. 长春:东北师范大学物理学院, 2016.
Gong Shan. Study of an encryption algorithm based on hybrid cellular automata[D]. Changchun: College of Physics,Norteest Normal University,2016.
[6] 吴颖芝, 郝立波, 陈炬桦. T型邻居细胞自动机的分组加密方法[J]. 通信学报, 2009, 30(f增刊2):52-60.
Wu Ying-zhi, Hao Li-bo, Chen Ju-ye. Block encryption method for T-type neighbor cellulav automata[J]. Journal of Communications,2009,30(Sup.2):52-60.
[7] Chen T, Zhang M, Wu J, et al. Image encryption and compression based on kronecker compressed sensing and elementary cellular automata scrambling[J]. Optics & Laser Technology, 2016, 84:118-133.
[8] Souyah A, Faraoun K M. An image encryption scheme combining chaos-memory cellular automata and weighted histogram[J]. Nonlinear Dynamics, 2016, 86(1):1-15.
[9] Chai X, Gan Z, Chen Y, et al. A visually secure image encryption scheme based on compressive sensing[J]. Signal Processing, 2017, 134:35-51.
[10] Macêdo H B, Oliveira G M B, Ribeiro C H C. A comparative study between the dynamic behaviours of standard cellular automata and network cellular automata applied to cryptography[J]. International Journal of Intelligent Systems, 2016, 31(2):189-207.
[1] CHEN Yong-heng,WEI Ming-li,QU Zhao-wei,ZHANG Hu,CAO Ning-bo. Pedestrian crossing characteristics under influence of left-turn vehicle [J]. 吉林大学学报(工学版), 2015, 45(1): 62-67.
[2] ZHANG Jin-guo,GUO Hai-tao,WU Jun-peng,LI Yi-tong. Improved minimum symmetric Tsallis cross entropy for segmentation of a sonar image from a small underwater target [J]. 吉林大学学报(工学版), 2014, 44(3): 834-839.
[3] TIAN Hai-jiang, LEI Peng,WANG Yong. Image encryption algorithm based on chaos and dynamic DNA coding [J]. 吉林大学学报(工学版), 2014, 44(3): 801-806.
[4] LIU Peng, TIAN Xiao-jian, CAO Jun-sheng, YANG Yue. Image encryption algorithm based on hyper-chaos of Er-doped fiber laser [J]. 吉林大学学报(工学版), 2012, 42(增刊1): 405-409.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
[1] ZANG Peng-fei, WANG Zhe, SUN Chen-le, LIN Lian-lian. Scavenging process for stable operation of linear range-extende[J]. Journal of Jilin University(Engineering and Technology Edition), 2018, 48(5): 1455 -1465 .
[2] LIU Zhong-min,WANG Yang,LI Zhan-ming,HU Wen-jin. Image segmentation algorithm based on SLIC and fast nearest neighbor region merging[J]. Journal of Jilin University(Engineering and Technology Edition), 2018, 48(6): 1931 -1937 .