Graphic Cryptography with Pseudorandom Bit Generators and Cellular Automata

  • GonzaloÁlvarez Marañón
  • Luis Hernández Encinas
  • Ascensión Hernández Encinas
  • Ángel Martín del Rey
  • Gerardo Rodríguez Sánchez
Part of the Lecture Notes in Computer Science book series (LNCS, volume 2773)

Abstract

In this paper we propose a new graphic symmetrical cryptosystem in order to encrypt a colored image defined by pixels and by any number of colors. This cryptosystem is based on a reversible bidimensional cellular automaton and uses a pseudorandom bit generator. As the key of the cryptosystem is the seed of the pseudorandom bit generator, the latter has to be cryptographically secure. Moreover, the recovered image from the ciphered image has not loss of resolution and the ratio between the ciphered image and the original one, i.e., the factor expansion of the cryptosystem, is 1.

Keywords

Colored Image Cellular Automaton Image Encryption Secret Share Scheme Cipher Image 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Bellamy, B., Mason, J.S., Ellis, M.: Photograph signatures for the protection of identification documents. In: Walker, M. (ed.) Cryptography and Coding 1999. LNCS, vol. 1746, pp. 119–128. Springer, Heidelberg (1999)CrossRefGoogle Scholar
  2. 2.
    Blum, L., Blum, M., Shub, M.: A simple unpredictable pseudo-random number generator. SIAM J. Comput. 15, 364–383 (1986)MathSciNetCrossRefMATHGoogle Scholar
  3. 3.
    Chang, C.C., Chuang, J.C.: An image intellectual property protection scheme for gray-level images using visual secret sharing strategy. Pattern Recogn. Lett. 23, 931–941 (2002)MathSciNetCrossRefMATHGoogle Scholar
  4. 4.
    Chang, C., Hwang, M., Chen, T.: A new encryption algorithm for images cryptosystems. J. Syst. Software 58, 83–91 (2001)CrossRefGoogle Scholar
  5. 5.
    Chang, C., Liu, J.L.: A linear quadtree compression scheme for image encryption. Signal Process. Image 10, 279–290 (1997)CrossRefGoogle Scholar
  6. 6.
    Fridrich, J.: Image encryption based on chaotic maps. In: Proc. IEEE Int. Conf. Systems, Man Cybern. Comput. Cybern. Simul., pp. 1105–1110 (1997)Google Scholar
  7. 7.
    Fridrich, J.: Symmetric ciphers based on two-dimensional chaotic maps. Internat. J. Bifur. Chaos 8(6), 1259–1284 (1998)MathSciNetCrossRefMATHGoogle Scholar
  8. 8.
    Munoz Masqué, J., Peinado Domínguez, A., Hernández Encinas, L., Montoya Vitini, F.: Maximal periods of orbits of the BBS generator. In: Proc. 1998 Int. Conf. on Inform. Secur. & Cryptol., pp. 71–80 (1998)Google Scholar
  9. 9.
    Menezes, A., van Oorschot, P., Vanstone, S.: Handbook of applied cryptography. CRC Press, Boca Raton (1997)MATHGoogle Scholar
  10. 10.
    Mollin, R.A.: An introduction to cryptography. Chapman & Hall/CRC (2001)Google Scholar
  11. 11.
    Naor, M., Pinkas, B.: Visual authentication and identification. In: Kaliski Jr., B.S. (ed.) CRYPTO 1997. LNCS, vol. 1294, pp. 322–336. Springer, Heidelberg (1997)CrossRefGoogle Scholar
  12. 12.
    Naor, M., Shamir, A.: Visual cryptography. In: De Santis, A. (ed.) EUROCRYPT 1994. LNCS, vol. 950, pp. 1–12. Springer, Heidelberg (1995)CrossRefGoogle Scholar
  13. 13.
    O’Gorman, L., Rabinovich, I.: Secure identification documents via pattern recognition and public-key cryptography. IEEE Trans. Pattern Anal. Mach. Intell. 20(10), 1097–1102 (1998)CrossRefGoogle Scholar
  14. 14.
    Packard, N.H., Wolfram, S.: Two-dimensional cellular automata. J. Statist. Phys. 38, 901–946 (1985)MathSciNetCrossRefMATHGoogle Scholar
  15. 15.
    Stinson, D.: Cryptography. In: Theory and Practice, 2nd edn. CRC Press, Boca Raton (2001)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2003

Authors and Affiliations

  • GonzaloÁlvarez Marañón
    • 1
  • Luis Hernández Encinas
    • 1
  • Ascensión Hernández Encinas
    • 2
  • Ángel Martín del Rey
    • 3
  • Gerardo Rodríguez Sánchez
    • 2
  1. 1.Instituto de Física AplicadaCSICMadridSpain
  2. 2.ETSIIUniversidad de SalamancaBéjar, SalamancaSpain
  3. 3.EPSUniversidad de SalamancaÁvilaSpain

Personalised recommendations