KES 2003: Knowledge-Based Intelligent Information and Engineering Systems pp 1207-1214 | Cite as
Graphic Cryptography with Pseudorandom Bit Generators and Cellular Automata
Abstract
In this paper we propose a new graphic symmetrical cryptosystem in order to encrypt a colored image defined by pixels and by any number of colors. This cryptosystem is based on a reversible bidimensional cellular automaton and uses a pseudorandom bit generator. As the key of the cryptosystem is the seed of the pseudorandom bit generator, the latter has to be cryptographically secure. Moreover, the recovered image from the ciphered image has not loss of resolution and the ratio between the ciphered image and the original one, i.e., the factor expansion of the cryptosystem, is 1.
Keywords
Colored Image Cellular Automaton Image Encryption Secret Share Scheme Cipher ImagePreview
Unable to display preview. Download preview PDF.
References
- 1.Bellamy, B., Mason, J.S., Ellis, M.: Photograph signatures for the protection of identification documents. In: Walker, M. (ed.) Cryptography and Coding 1999. LNCS, vol. 1746, pp. 119–128. Springer, Heidelberg (1999)CrossRefGoogle Scholar
- 2.Blum, L., Blum, M., Shub, M.: A simple unpredictable pseudo-random number generator. SIAM J. Comput. 15, 364–383 (1986)MathSciNetCrossRefMATHGoogle Scholar
- 3.Chang, C.C., Chuang, J.C.: An image intellectual property protection scheme for gray-level images using visual secret sharing strategy. Pattern Recogn. Lett. 23, 931–941 (2002)MathSciNetCrossRefMATHGoogle Scholar
- 4.Chang, C., Hwang, M., Chen, T.: A new encryption algorithm for images cryptosystems. J. Syst. Software 58, 83–91 (2001)CrossRefGoogle Scholar
- 5.Chang, C., Liu, J.L.: A linear quadtree compression scheme for image encryption. Signal Process. Image 10, 279–290 (1997)CrossRefGoogle Scholar
- 6.Fridrich, J.: Image encryption based on chaotic maps. In: Proc. IEEE Int. Conf. Systems, Man Cybern. Comput. Cybern. Simul., pp. 1105–1110 (1997)Google Scholar
- 7.Fridrich, J.: Symmetric ciphers based on two-dimensional chaotic maps. Internat. J. Bifur. Chaos 8(6), 1259–1284 (1998)MathSciNetCrossRefMATHGoogle Scholar
- 8.Munoz Masqué, J., Peinado Domínguez, A., Hernández Encinas, L., Montoya Vitini, F.: Maximal periods of orbits of the BBS generator. In: Proc. 1998 Int. Conf. on Inform. Secur. & Cryptol., pp. 71–80 (1998)Google Scholar
- 9.Menezes, A., van Oorschot, P., Vanstone, S.: Handbook of applied cryptography. CRC Press, Boca Raton (1997)MATHGoogle Scholar
- 10.Mollin, R.A.: An introduction to cryptography. Chapman & Hall/CRC (2001)Google Scholar
- 11.Naor, M., Pinkas, B.: Visual authentication and identification. In: Kaliski Jr., B.S. (ed.) CRYPTO 1997. LNCS, vol. 1294, pp. 322–336. Springer, Heidelberg (1997)CrossRefGoogle Scholar
- 12.Naor, M., Shamir, A.: Visual cryptography. In: De Santis, A. (ed.) EUROCRYPT 1994. LNCS, vol. 950, pp. 1–12. Springer, Heidelberg (1995)CrossRefGoogle Scholar
- 13.O’Gorman, L., Rabinovich, I.: Secure identification documents via pattern recognition and public-key cryptography. IEEE Trans. Pattern Anal. Mach. Intell. 20(10), 1097–1102 (1998)CrossRefGoogle Scholar
- 14.Packard, N.H., Wolfram, S.: Two-dimensional cellular automata. J. Statist. Phys. 38, 901–946 (1985)MathSciNetCrossRefMATHGoogle Scholar
- 15.Stinson, D.: Cryptography. In: Theory and Practice, 2nd edn. CRC Press, Boca Raton (2001)Google Scholar