Fourth order MCA and chaos-based image encryption scheme

Aslam, Md Nazish, Belazi, Akram, Kharbech, Sofiane, Talha, Muhammad, and Xiang, Wei (2019) Fourth order MCA and chaos-based image encryption scheme. IEEE Access, 7. pp. 66395-66409.

[img] PDF (Published Version) - Published Version
Restricted to Repository staff only

View at Publisher Website:


This paper presents a fast and efficient cryptosystem for enciphering digital images. It employs two of the most prominent dynamical systems-chaotic maps and cellular automata. The key streams in the proposed encryption scheme are derived from the SHA-256 hash function. Hash functions produce the digest of the input plaintext, known as a hash value, which can be considered as a unique signature of the input. This makes the keys more plaintext dependent, which is a desirable property of a robust cryptosystem. These key streams are used as the secret keys (i.e., initial conditions and control parameters) of an improved one-dimensional (1-D) chaotic map, i.e., the Logistic-Sine map. As far as we know, this paper is a first that combines the well-known diffusion-confusion architecture and the fourth order 1-D memory cellular automata (MCA) for image encryption. First, a pixel-wise XOR operation is applied to the original image, followed by a pixel-wise random permutation. The resulting image is decomposed into four blocks according to the quadtree decomposition strategy. Then, a fourth order reversible MCA is applied, the blocks obtained from the quadtree decomposition are considered as the initial MCA configurations, and the transition rules are determined using the chaotic map. The performance analyses show that the proposed encryption scheme presents a high immunity against all kind of attacks while maintaining a low complexity, which outcome a notably better performance/complexity trade-off compared to some recently proposed image schemes.

Item ID: 62057
Item Type: Article (Research - C1)
ISSN: 2169-3536
Keywords: cellular automata, chaos, hash functions, image encryption, Logistic-Sine map, quadtree decomposition
Copyright Information: © 2019 IEEE. [Open access via IEEE website.] Translations and content mining are permitted for academic research only. Personal use is also permitted, but republication/redistribution requires IEEE permission.
Date Deposited: 08 May 2020 02:44
FoR Codes: 46 INFORMATION AND COMPUTING SCIENCES > 4604 Cybersecurity and privacy > 460401 Cryptography @ 100%
SEO Codes: 97 EXPANDING KNOWLEDGE > 970108 Expanding Knowledge in the Information and Computing Sciences @ 100%
More Statistics

Actions (Repository Staff Only)

Item Control Page Item Control Page