Skip to main content

A Protocol to Cipher Digital Images Based on Cat Maps and Cellular Automata

  • Conference paper
Pattern Recognition and Image Analysis (IbPRIA 2007)

Part of the book series: Lecture Notes in Computer Science ((LNIP,volume 4477))

Included in the following conference series:

Abstract

In this paper a novel symmetric protocol to cipher digital images is introduced. The protocol proposed in this work is based on the paradigm stated by J. Fridrich at 1998. Consequently, there are two iterative stages in the algorithm: The confusion stage permutes the pixels in the image using the Cat map, whereas in the diffusion stage, the pixel values (the color of each pixel) are modified sequentially such that a small change in the color of only one pixel is spread out to many pixels. This second phase is carryied out by means of a reversible cellular automaton. The proposed protocol is shown to be secure against the more important cryptanalytic attacks.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Álvarez Marañón, G., Hernández Encinas, L., Martín del Rey, Á.: A New Secret Sharing Scheme for Images Based on Additive 2-Dimensional Cellular Automata. In: Marques, J.S., Pérez de la Blanca, N., Pina, P. (eds.) IbPRIA 2005. LNCS, vol. 3522, pp. 411–418. Springer, Heidelberg (2005)

    Google Scholar 

  2. Chang, C.-C., Hwang, M.-S., Chen, T.-S.: A new encryption algorithm for image cryptosystems. J. Sist. Software 58, 83–91 (2001)

    Article  Google Scholar 

  3. Chen, G., Dong, X.: From chaos to order: methodologies, perspectives and applications. World Scientific, Singapore (1998)

    MATH  Google Scholar 

  4. Fridrich, J.: Symmetric ciphers based on two-dimensional chaotic maps. Int. J. Bifucar. Chaos 8, 1259–1284 (1998)

    Article  MATH  MathSciNet  Google Scholar 

  5. Gao, H., Zhang, Y., Liang, S., Li, D.: A new chaotic algorithm for image encryption. Chaos Soliton Frac. 29, 393–399 (2006)

    Article  MATH  Google Scholar 

  6. Guan, Z.H., Huang, F.J., Guan, W.J.: Chaos-based image encryption algorithm. Phys. Lett. A 346, 153–157 (2005)

    Article  Google Scholar 

  7. Lian, S.G., Sun, J., Wang, Z.: A block cipher based on a suitable use of chaotic standard map. Chaos Soliton Frac. 26, 117–129 (2005)

    Article  MATH  Google Scholar 

  8. Toffoli, T., Margolus, N.: Invertible cellular automata: A review. Physica D 45, 229–253 (1990)

    Article  MATH  MathSciNet  Google Scholar 

  9. Wolfram, S.: A New Kind of Science. Wolfram Media, Champaign (2002)

    MATH  Google Scholar 

  10. Zhang, L.H., Liao, X.F., Wang, X.B.: An image encryption approach based on chaotic maps. Chaos Soliton Frac. 24, 759–765 (2005)

    Article  MATH  MathSciNet  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Joan Martí José Miguel Benedí Ana Maria Mendonça Joan Serrat

Rights and permissions

Reprints and permissions

Copyright information

© 2007 Springer Berlin Heidelberg

About this paper

Cite this paper

Martín del Rey, A., Rodríguez Sánchez, G., de la Villa Cuenca, A. (2007). A Protocol to Cipher Digital Images Based on Cat Maps and Cellular Automata. In: Martí, J., Benedí, J.M., Mendonça, A.M., Serrat, J. (eds) Pattern Recognition and Image Analysis. IbPRIA 2007. Lecture Notes in Computer Science, vol 4477. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-72847-4_73

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-72847-4_73

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-72846-7

  • Online ISBN: 978-3-540-72847-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics