International Journal of Electrical, Electronics and Data Communication (IJEEDC)
eISSN:2320-2084 , pISSN:2321-2950
.
Follow Us On :
current issue
Volume-12,Issue-1  ( Jan, 2024 )
ARCHIVES
  1. Volume-11,Issue-12  ( Dec, 2023 )
  2. Volume-11,Issue-11  ( Nov, 2023 )
  3. Volume-11,Issue-10  ( Oct, 2023 )

Statistics report
Apr. 2024
Submitted Papers : 80
Accepted Papers : 10
Rejected Papers : 70
Acc. Perc : 12%
Issue Published : 133
Paper Published : 1712
No. of Authors : 4737
  Journal Paper


Paper Title :
A Novel Image Encryption Scheme Using Chaotic Logistic Mapping& Hybrid Cellular Automata

Author :Yogeshwaran S, Vignesvar K S, Prabhu Soundharian E M, Ms Hanis S

Article Citation :Yogeshwaran S ,Vignesvar K S ,Prabhu Soundharian E M ,Ms Hanis S , (2015 ) " A Novel Image Encryption Scheme Using Chaotic Logistic Mapping& Hybrid Cellular Automata " , International Journal of Electrical, Electronics and Data Communication (IJEEDC) , pp. 81-86, Volume-3, Issue-6

Abstract : With the advent of internet and mass media in recent years, online storage of multimedia data in the form of images and videos has become essential. Thus the security of such data also plays a vital role. In this paper, a novel image encryption scheme based on cellular automata (CA) and chaotic logistic mapping has been presented. The logistic chaotic mapping is used for shuffling the pixels which results in permutation. This permuted image is converted into a binary stream image where each rows of the image are converted into binary streams. Then a hybrid cellular automata (HCA) is used to provide diffusion by local interaction of the adjacent bits by applying various CA rules in the permuted image and confusion is brought by the cellular automata rules and keys from pseudo random number generator. In this scheme both reversible and irreversible cellular automata are used where irreversible cellular automata is used as a Pseudo Random Number Generator (PRNG) and reversible CA is used for diffusion. The properties of the encrypted image such as entropy, correlation coefficients, histogram, key space and key sensitivity prove that the encryption scheme is highly robust against attacks and also reliable in transmission loss scenarios. Keywords—cellular automata, chaotic logistic mapping, diffusion, encryption.

Type : Research paper

Published : Volume-3, Issue-6


DOIONLINE NO - IJEEDC-IRAJ-DOIONLINE-2271   View Here

Copyright: © Institute of Research and Journals

| PDF |
Viewed - 91
| Published on 2015-06-16
   
   
IRAJ Other Journals
IJEEDC updates
Volume-12,Issue-1(Jan ,2024) Want to join us ? CLick here http://ijeedc.iraj.in/join_editorial_board.php
The Conference World

JOURNAL SUPPORTED BY

ADDRESS

Technical Editor, IJEEDC
Department of Journal and Publication
Plot no. 30, Dharma Vihar,
Khandagiri, Bhubaneswar, Odisha, India, 751030
Mob/Whatsapp: +91-9040435740