The purpose of image encryption is to protect content from unauthorized access. Image encryption is usually done by pixel scrambling and confusion, so process is possible to reverse only by knowing secret information. In this paper we introduce a new method for digital image encryption, based on a 2D cellular automaton and pixel separation. Novelty in the proposed method lies in the application of the balanced 2D cellular automata with extended Moore neighborhood separately on each level of pseudorandom key-image. This process extends key space several times when compared to the previous methods. Furthermore, pixel separation is introduced to define operation for each pixel of the source image. Thanks to pixel separation, decryption process...
International audienceThis paper proposed a new algorithm for digital image encryption. The proposed...
© 2023, IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for ...
Currently, there are many studies have conducted on developing security of the digital image in orde...
The purpose of image encryption is to protect content from unauthorized access. Image encryption is ...
Cellular automata (CA) are simple models of computation which exhibit fascinatingly complex behavior...
Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses...
AbstractWe propose a novel images encryption schema based on reversible one-dimensional cellular aut...
Abstract--Cellular Automaton is an idealized parallel processing machine which is an array (1-D, 2-D...
In this paper we present a new encryption and decryption algorithm for block cipher based on the lin...
In secure communication, image encryption schemes transform clear images into unintelligible others....
Due to limited processing capabilities and other constraints of most wireless networks, many existin...
This paper deals with the secure transformation of text. Encryption is the most common method of hid...
The wide use of digital images leads to the necessity of securing them when they enter into an insec...
In this paper, a novel image encryption scheme based on two rounds of substitution–diffusion is prop...
This paper titled “A New Algorithm for Image Encryption Based on Slicing, Displacement Followed by S...
International audienceThis paper proposed a new algorithm for digital image encryption. The proposed...
© 2023, IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for ...
Currently, there are many studies have conducted on developing security of the digital image in orde...
The purpose of image encryption is to protect content from unauthorized access. Image encryption is ...
Cellular automata (CA) are simple models of computation which exhibit fascinatingly complex behavior...
Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses...
AbstractWe propose a novel images encryption schema based on reversible one-dimensional cellular aut...
Abstract--Cellular Automaton is an idealized parallel processing machine which is an array (1-D, 2-D...
In this paper we present a new encryption and decryption algorithm for block cipher based on the lin...
In secure communication, image encryption schemes transform clear images into unintelligible others....
Due to limited processing capabilities and other constraints of most wireless networks, many existin...
This paper deals with the secure transformation of text. Encryption is the most common method of hid...
The wide use of digital images leads to the necessity of securing them when they enter into an insec...
In this paper, a novel image encryption scheme based on two rounds of substitution–diffusion is prop...
This paper titled “A New Algorithm for Image Encryption Based on Slicing, Displacement Followed by S...
International audienceThis paper proposed a new algorithm for digital image encryption. The proposed...
© 2023, IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for ...
Currently, there are many studies have conducted on developing security of the digital image in orde...