Research Article
Image encryption algorithm using chaotic maps and cellular automata
@ARTICLE{10.4108/eai.21-6-2021.170238, author={Lanhang Li and Yuling Luo and Shubin Tang and Lvchen Cao and Xue Ouyang}, title={Image encryption algorithm using chaotic maps and cellular automata}, journal={EAI Endorsed Transactions on Security and Safety}, volume={7}, number={26}, publisher={EAI}, journal_a={SESA}, year={2020}, month={10}, keywords={Image encryption, Cellular automata, SHA-256, 2D-LSCM chaotic map, LSC chaotic map}, doi={10.4108/eai.21-6-2021.170238} }
- Lanhang Li
Yuling Luo
Shubin Tang
Lvchen Cao
Xue Ouyang
Year: 2020
Image encryption algorithm using chaotic maps and cellular automata
SESA
EAI
DOI: 10.4108/eai.21-6-2021.170238
Abstract
Nowadays, some encryption schemes are not sensitive enough to plain-image, which leads to poor robustness and the scheme is vulnerability to attacks. By employing chaotic maps and cellular automata (CA), a novel image encryption algorithm is presented in this work to increase the sensitivity to plain-image and improve the security. Firstly, initial values of the two-dimensional Logistic-Sine-coupling map (2D-LSCM) and the Logistic-Sine-Cosine map (LSC) are calculated by the SHA-256 hash value of original image, and the process of diffusion is conducted next. Secondly, the key matrices are produced by iterating chaotic map in the process of permutation. The diffused image is scrambled by the index matrices, which are produced by sorting every row or column of the key matrices. Finally, the previous scrambled image is transformed into cipher-image by using CA. The experimental results and theoretical analysis prove that the proposed scheme owns good security as it can effectively resist a variety of attacks.
Copyright © 2020 Lanhang Li et al., licensed to EAI. This is an open access article distributed under the terms of the Creative Commons Attribution license, which permits unlimited use, distribution and reproduction in any medium so long as the original work is properly cited.