Grayscale Image Encryption using Cellular Automata

نویسندگان

چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Grayscale Image Encryption using Cellular Automata

1. Seredynski M, Bouvary P.Block cipher based on reversible cellular automata. New Gener Comput 2005 ; 23: 245–58 (Ohmsha Ltd and Springer) 2. Faraoun Kamel,” Fast encryption of RGB color digital images using a tweakable cellular automaton based schema Optics & Laser Technology 64 (2014) 145–155 3. Toffoli TT ,Margolus N.Invertible cellular automata : a review . Physica D 2001;45:229–53. 4. Sza...

متن کامل

Color Image Encryption by Cellular Automata

This paper presents a proposed cryptosystem to encrypt color images using cellular automata. A reversible cellular automaton has the characteristic of being able to return in the evolution of the automata, and is therefore, that in this paper are used to generate a symmetric key used to encrypt images.

متن کامل

Block Encryption Using Reversible Cellular Automata

Cellular automata (CA) are highly parallel and discrete dynamical systems, whose behavior is completely specified in terms of a local relation. They were successfully applied for simulation of biological systems and physical phenomena and recently to design parallel and distributed algorithms for solving task density and synchronization problems. In this paper CA are applied to construct crypto...

متن کامل

Encryption using cellular automata chain-rules

Chain rules are maximally chaotic CA rules that can be constructed at random to provide a huge number of encryption keys — where the the CA is run backwards to encrypt, forwards to decrypt. The methods are based on the reverse algorithm and the Z-parameter [5]. 1 The CA reverse algorithm and basins of attraction In the simplest cellular automata [4], each cell in a ring of cells updates its val...

متن کامل

Efficient Grayscale Image Encryption Then Compression System

In secret communication, images are widely used and the major issues are how to protect the image and also reduce size of the image in order to maximize the network utilization. Various techniques are there in order to secure the image and to reduce the size of the image. In many practical scenarios, encryption of an image has to be conducted before the image compression. In proposed scheme, bo...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: International Journal of Computer Applications

سال: 2016

ISSN: 0975-8887

DOI: 10.5120/ijca2016909655