Table of Contents Author Guidelines Submit a Manuscript
Mathematical Problems in Engineering
Volume 2013, Article ID 562768, 10 pages
http://dx.doi.org/10.1155/2013/562768
Research Article

Image Encryption Scheme Based on Balanced Two-Dimensional Cellular Automata

1School of Mathematical Science and Institute of Mathematics, Nanjing Normal University, Nanjing 210023, China
2Faculty of Electrical Engineering, Mathematics and Computer Science, University of Twente, 7500 AE Enschede, The Netherlands
3College of Software, Nankai University, Tianjin 300071, China
4State Key Laboratory for Novel Software Technology, Nanjing University, Nanjing 210046, China

Received 14 April 2013; Revised 5 September 2013; Accepted 13 September 2013

Academic Editor: Jui-Sheng Lin

Copyright © 2013 Xiaoyan Zhang et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Linked References

  1. S. Wolfram, “Cryptography with cellular automata,” in Advances In Cryptology: Crypto'85 proceedings, vol. 218 of Lecture notes in computer science, pp. 429–432, Springer, New York, NY, USA, 1986. View at Google Scholar
  2. O. Lafe, “Data compression and encryption using Cellular Automata Transforms,” in Proceedings of the 1996 IEEE International Joint Symposia on Intelligence and Systems, pp. 234–241, November 1996. View at Scopus
  3. S. Nandy, B. K. Kar, and P. P. Chaudhuri, “Theory and applications of cellular automata in cryptography,” IEEE Transactions on Computers, vol. 43, no. 12, pp. 1346–1356, 1994. View at Publisher · View at Google Scholar · View at Scopus
  4. B. Srisuchinwong, T. A. York, and P. Tsalides, “Symmetric cipher using autonomous and non-autonomous cellular automata,” in Proceedings of the 1995 IEEE Global Telecommunications Conference. Part 2 (of 3), pp. 1172–1177, November 1995. View at Scopus
  5. C. W. Zhang, Q. C. Peng, and Y. B. Li, “Encryption based on reversible cellular automata,” in Proceedings of the IEEE International Conference on Communications, Circuits and Systems, pp. 1223–1226, 2002.
  6. A. L. A. Dalhoum, B. A. Mahafzah, A. A. Awwad, I. Aldhamari, A. Ortega, and M. Alfonseca, “Digital image scrambling using 2D cellular automata,” IEEE MultiMedia, vol. 19, pp. 28–36, 2012. View at Google Scholar
  7. H. L. Wu, J. L. Zhou, and X. G. Gong, “A novel image watermarking algorithm based on two-dimensional cellular automata transform,” in Proceedings of the 6th IEEE Joint International Information Technology and Artificial Intelligence Conference (ITAIC '11), pp. 206–210, August 2011. View at Publisher · View at Google Scholar · View at Scopus
  8. G. Alvarez, L. Hernández Encinas, and A. Martín del Rey, “A multisecret sharing scheme for color images based on cellular automata,” Information Sciences, vol. 178, no. 22, pp. 4382–4395, 2008. View at Publisher · View at Google Scholar · View at Zentralblatt MATH · View at Scopus
  9. Z. Eslami, S. H. Razzaghi, and J. Z. Ahmadabadi, “Secret image sharing based on cellular automata and steganography,” Pattern Recognition, vol. 43, no. 1, pp. 397–404, 2010. View at Publisher · View at Google Scholar · View at Zentralblatt MATH · View at Scopus
  10. Z. Eslami and J. Zarepour Ahmadabadi, “A verifiable multi-secret sharing scheme based on cellular automata,” Information Sciences, vol. 180, no. 15, pp. 2889–2894, 2010. View at Publisher · View at Google Scholar · View at Zentralblatt MATH · View at Scopus
  11. J. Jin and Z. Wu, “A secret image sharing based on neighborhood configurations of 2-D cellular automata,” Optics and Laser Technology, vol. 44, no. 3, pp. 538–548, 2012. View at Publisher · View at Google Scholar · View at Scopus
  12. R. J. Chen, W. K. Lu, and J. L. Lai, “Image encryption using progressive cellular automata substitution and SCAN,” in Proceedings of the IEEE International Symposium on Circuits and Systems (ISCAS '05), pp. 1690–1693, May 2005. View at Publisher · View at Google Scholar · View at Scopus
  13. R. J. Chen, Y. H. Chen, C. S. Chen, and J. L. Lai, “Image encryption/decryption system using 2-D cellular automata,” in Proceedings of the IEEE 10th International Symposium on Consumer Electronics (ISCE '06), pp. 651–656, July 2006. View at Scopus
  14. L. H. Encinas, A. M. Del Rey, and A. H. Encinas, “Encryption of images with 2-dimensional cellular automata,” in Proceedings of the 8th International Conference on Information Systems Analysis and Synthesis (ISAS '02), pp. 471–476, 2002.
  15. M. Habibipour, R. Maarefdoust, M. Yaghobi, and S. Rahati, “An image encryption system by 2D memorized cellular automata and chaos mapping,” in Proceedings of the 6th International Conference on Digital Content, Multimedia Technology and Its Applications (IDC '10), pp. 331–336, August 2010. View at Scopus
  16. J. Jin, “An image encryption based on elementary cellular automata,” Optics and Lasers in Engineering, vol. 50, no. 12, pp. 1836–1843, 2012. View at Publisher · View at Google Scholar
  17. L. Yu, Y. X. Li, and X. W. Xia, “Image encryption algorithm based on self-adaptive symmetrical-coupled toggle cellular automata,” in Proceedings of the 1st International Congress on Image and Signal Processing (CISP '08), pp. 32–36, May 2008. View at Publisher · View at Google Scholar · View at Scopus
  18. F. Maleki, A. Mohades, S. M. Hashemi, and M. E. Shiri, “An image encryption system by cellular automata with memory,” in Proceedings of the 3rd International Conference on Availability, Security, and Reliability (ARES '08), pp. 1266–1271, March 2008. View at Publisher · View at Google Scholar · View at Scopus
  19. R. J. Chen and J. L. Lai, “Image security system using recursive cellular automata substitution,” Pattern Recognition, vol. 40, no. 5, pp. 1621–1631, 2007. View at Publisher · View at Google Scholar · View at Zentralblatt MATH · View at Scopus
  20. R. J. Chen and S. J. Horng, “Novel SCAN-CA-based image security system using SCAN and 2-D von Neumann cellular automata,” Signal Processing, vol. 25, no. 6, pp. 413–426, 2010. View at Publisher · View at Google Scholar · View at Scopus
  21. E. Z. Zefreh, S. Rajaee, and M. Farivary, “Image security system using recursive Cellular automata substitution and its parallelization,” in Proceedings of the CSI International Symposium on Computer Science and Software Engineering (CSSE '11), pp. 77–86, June 2011. View at Publisher · View at Google Scholar · View at Scopus
  22. P. L. Rosin, “Image processing using 3-state cellular automata,” Computer Vision and Image Understanding, vol. 114, no. 7, pp. 790–802, 2010. View at Publisher · View at Google Scholar
  23. L. Cappellari, S. Milani, C. Cruz-Reyes, and G. Calvagno, “Resolution scalable image coding with reversible cellular automata,” IEEE Transactions on Image Processing, vol. 20, no. 5, pp. 1461–1468, 2011. View at Publisher · View at Google Scholar · View at Scopus
  24. C. Kauffmann and N. Piché, “Seeded ND medical image segmentation by cellular automaton on GPU,” International Journal of Computer Assisted Radiology and Surgery, vol. 5, no. 3, pp. 251–262, 2010. View at Publisher · View at Google Scholar · View at Scopus
  25. T. H. Chen and K. C. Li, “Multi-image encryption by circular random grids,” Information Sciences, vol. 189, pp. 255–265, 2012. View at Publisher · View at Google Scholar · View at Scopus
  26. A. V. Diaconu and K. Loukhaoukha, “An improved secure image encryption algorithm based on Rubiks cube principle and digital chaotic cipher,” Mathematical Problems in Engineering, vol. 2013, Article ID 848392, 10 pages, 2013. View at Publisher · View at Google Scholar
  27. Z. L. Zhu, W. Zhang, K. W. Wong, and H. Yu, “A chaos-based symmetric image encryption scheme using a bit-level permutation,” Information Sciences, vol. 181, no. 6, pp. 1171–1186, 2011. View at Publisher · View at Google Scholar · View at Scopus
  28. “The website of USC-SIPI image database,” http://sipi.usc.edu/database/.