(a) Original
Image
(b) De-
crypted
Image with
Incorrect
Key
(c) De-
crypted
Image with
Correct Key
(d) Bird Im-
age
(e) Plain Im-
age
(f) En-
crypted Bird
Image
(g) En-
crypted Plain
Image
(h) His-
togram of
Bird Image
(i) His-
togram of
Plain Image
(j) His-
togram of
Encrypted
Bird Image
(k) His-
togram of
Encrypted
Plain Image
Figure 4: Different Images and their Histograms showing
the Confusion Property.
REFERENCES
Alexopoulos, C., Bourbakis, N., and Ioannou, N. (1995).
Image encryption method using a class of fractals.
Electronic Imaging, (4):251–259.
Bao, F. (2004). Cryptanalysis of a partially known cellular
automata cryptosystem. IEEE TRANSACTIONS ON
COMPUTERS, 53(11):1493–1497.
Bourbakis, N. and Alexopoulos, C. (1992). Picture data
encryption using scan patterns. Pattern Recognition,
25(6):567–581.
Chaudhuri, P. P., RoyChowdhury, D., Nandi, S., and Chat-
topadhayay, S. (1997). Additive Cellular Automata -
Theory and Its Application, volume 1, chapter 4. IEEE
Computer Society Press.
Chen, R.-J., Chen, Y.-H., Chen, C.-S., and Lai, J.-L. (2006).
Image encryption/decryption system using 2-d cellu-
lar automata. IEEE Tenth International Symposium on
Consumer Electronics (ISCE).
Chen, R.-J., Lu, W.-K., and Lai, J.-L. (2005). Image encryp-
tion using progressive cellular automata substitution
and scan. IEEE International Symposium on Circuits
and Systems, 2:1690–1693.
Dang, P. P. and Chau, P. M. (2000). Image encryption for
secure internet multimedia applications. IEEE Trans.
Consumer Electronics, 46:395–403.
Hortensius, P. D., Card, H. C., and McLeod, R. D. (1989).
Parallel random number generation for vlsi using cel-
lular automata. IEEE Trans. Comput., 38:1466–1473.
Maleki, F., Mohades, A., Hashemi, S. M., and Shiri, M. E.
(2008). An image encryption system by cellular au-
tomata with memory. Third International Conference
on Availability, Reliablitiy and Security, pages 1266–
1271.
Maniccam, S. S. and Bourbakis, N. G. (2004). Image and
video encryption using scan patterns. Pattern Recog-
nition 37, pages 725–737.
Mitra, A., Rao, Y. V. S., and Prasanna, S. R. M. (2006).
A new image encryption approach using combina-
tional permutation techniques. International Journal
of Computer Science, 1(2).
NIST. Random number generation. website.
http://csrc.nist.gov/groups/ST/toolkit/rng/index.html.
NIST (2001). A statistical test suit for ran-
dom and pseudorandom number genera-
tors for cryptographic applications. website.
http://csrc.nist.gov/groups/ST/toolkit/rng/documents/
SP800-22b.pdf.
Scharinger, J. (1998). Fast encryption of image data us-
ing chaotic kolmogorov flows. Electronic Imaging,
17(2):318–325.
Serra, M., Slater, T., Muzio, J. C., and Miller, D. M. (1990).
The analysis of one-dimensional linear cellular au-
tomata and their aliasing properties. IEEE Transac-
tions on Computer-aided Design, 9(7).
Wallace, G. K. (1999). The jpeg still picture compression
standard. IEEE Transactions on Consumer Electron-
ics.
SECRYPT 2009 - International Conference on Security and Cryptography
292