|Table of Contents|

A New Image Encryption Scheme Based on Two-Dimensional CA Joint With CWQ Method(PDF)

《南京师大学报(自然科学版)》[ISSN:1001-4616/CN:32-1239/N]

Issue:
2008年01期
Page:
1-7
Research Field:
数学
Publishing date:

Info

Title:
A New Image Encryption Scheme Based on Two-Dimensional CA Joint With CWQ Method
Author(s):
Zhang Xiaoyan1 Wang Chao2 Sun Zhiren1 Zhang Zanbo34
( 1. S chool ofM ath emat ics and C om pu ter S cience, Inst itu te ofM ath emat ics, Nan j ing Norm alUn iversity, Nan jing 210097, Ch ina)
( 2. Col lege of Softw are, NankaiUn ivers ity, T ian jin 300071, Ch ina)
( 3. Departm en t of Com puter S cien ce, SunY at-sen Un iversity, Guangzhou 510275, Ch ina)
( 4. Dep artm en t of Com puter Eng ineering, Gu angdong Industry Techn icalC ollege, Guangzhou 510300, C h ina)
Keywords:
im age encryption cellu la r autom ata quad- tree structure g raph theory w ave let
PACS:
TP309.7
DOI:
-
Abstract:
CA is the abbrev ia tion o f ce llular autom a tawh ich a re dynam ica l sy stem sw ith discrete space and tim e. Conside rable interest has been shown over the past decade in the use o f cellular au tom ata in cryptography. The a im o f th is paper is to present a new schem e fo r im age encryption, w hich com bines two-d im ensiona l CA approach w e proposed in M oore neighbo rhood on the graph structure of square lattice and CWQ m ethod based on quad- tree structure. First, the two-d im ensiona l CA encryption approach can strengthen the sy stem’ s secur ity mo re greatly than the confusion-on ly CWQ m ethod. Second, CWQ m ethod enhances the con fusion property o f the two-d im ensiona lCA appro ach wh ich satisfies avalanche e ffect and the property of diffusion. M oreov er, an importan t feature of the proposed schem e is tha t it has very larg e number of secur ity keys and simp le operations wh ich are espec ia lly useful for d ig ita l image encryption.

References:

[ 1] Yuan C, Zhu B B, W ang Y, et a .l E fficien t and fu lly scalable encryption forMPEG- 4 FGS[ C] / / Proc IEEE Int Sympos-i um on C ircu its and Systems, 2003( 2): 620-623.
[ 2] W ee S J, Aposto lopoulos J G. Secure scab lab le stream ing enab ling transcod ingw ithout decryp tion[ C] / / Proc IEEE Int Conference on Im age Process ing, 2001( 1): 437-440.
[ 3] Tosun A S, FengW C. L ightw eigh t secur itym echanism s fo rw ire less v ideo transm ission[ C] / / Proc IEEE In t Conference on Info rma tion Techno logy: Coding and Compu ting, 2001: 157-161.
[ 4] W o lfram S. Cryptog raphyw ith cellu lar autom ata[ C] / / Advances in Crypto logy-CRYPTO 85, Lecture Notes in Com pute r Sc-i ence, 1985( 218): 429-432.
[ 5] Nandy S, Kar B K, Chaudhur i P. Theory and app lications of cellu lar autom ata in cryptography[ J]. IEEE Trans Com put, 1994, 43: 1 346-1 357.
[ 6] M iha ljev icM. Security exam ination of certa in ce llu lar autom ata based key stream gene rato r[ C] / / ISITA 96- 1996 IEEE Int Sym p In fo rm Theory and App,l 1996: 246-249.
[ 7] Chen R, LuW, La i J. Im ag e encryption using prog ressive ce llu la r autom ata substitution and SCAN[ C ] / / IEEE ISCAS, 2005( 2): 1 690-1 693.
[ 8] Chaudhuri P P, Chaudhuri D R, N andi S, et a.l Add itive Ce llu la r Autom ata: Theory and Applications[M ]. New York: IEEE Press, 1997.
[ 9] Sutner K. Additive autom a ta on graphs[ J]. Comp lex Systems, 1998, 2( 1) : 1-28.
[ 10] Shap iro JM. Embedded im age coding us ing ze ro trees o fw av elet cod ing [ J]. IEEE Transactions on Signa lProcessing, 1993, 41( 12): 3 445-3 462.
[ 11] Sa id A. A new fast and effic ient im age code based on se t pa rtition ing in h ierarch ica l trees[ J]. IEEE Transactions on C ircuits and System s forV ideo Technology, 1996( 6) : 243-250.
[ 12] L ian S, W ang Z. Com parison o f sev era lw av elet coeffic ients con fusion m ethods app lied in mu ltim ed ia encryption[ C] / / Proc Int Conference on Com puter Netwo rks andM obile Com puting, 2003: 372-376.

Memo

Memo:
-
Last Update: 2013-05-05