Graphic Cryptography with Pseudorandom Bit Generators and Cellular Automata

In this paper we propose a new graphic symmetrical cryptosystem in order to encrypt a colored image defined by pixels and by any number of colors. This cryptosystem is based on a reversible bidimensional cellular automaton and uses a pseudorandom bit generator. As the key of the cryptosystem is the seed of the pseudorandom bit generator, the latter has to be cryptographically secure. Moreover, the recovered image from the ciphered image has not loss of resolution and the ratio between the ciphered image and the original one, i.e., the factor expansion of the cryptosystem, is 1.

[1]  S. Wolfram,et al.  Two-dimensional cellular automata , 1985 .

[2]  Chin-Chen Chang,et al.  A new encryption algorithm for image cryptosystems , 2001, J. Syst. Softw..

[3]  M.I. Aziz,et al.  Introduction to Cryptography , 2002, 2005 International Conference on Microelectronics.

[4]  Henry Ker-Chang Chang,et al.  A linear quadtree compression scheme for image encryption , 1997, Signal Process. Image Commun..

[5]  John S. D. Mason,et al.  Photograph Signatures for the Protection of Identification Documents , 1999, IMACC.

[6]  Colin Boyd,et al.  Cryptography and Coding , 1995, Lecture Notes in Computer Science.

[7]  Chin-Chen Chang,et al.  An image intellectual property protection scheme for gray-level images using visual secret sharing strategy , 2002, Pattern Recognit. Lett..

[8]  Alfred Menezes,et al.  Handbook of Applied Cryptography , 2018 .

[9]  Burton S. Kaliski Advances in Cryptology - CRYPTO '97 , 1997 .

[10]  Alfredo De Santis,et al.  Advances in Cryptology — EUROCRYPT'94 , 1994, Lecture Notes in Computer Science.

[11]  Lawrence O'Gorman,et al.  Secure Identification Documents Via Pattern Recognition and Public-Key Cryptography , 1998, IEEE Trans. Pattern Anal. Mach. Intell..

[12]  J. Fridrich Symmetric Ciphers Based on Two-Dimensional Chaotic Maps , 1998 .

[13]  J. Fridrich Image encryption based on chaotic maps , 1997, 1997 IEEE International Conference on Systems, Man, and Cybernetics. Computational Cybernetics and Simulation.

[14]  Moni Naor,et al.  Visual Cryptography , 1994, Encyclopedia of Multimedia.

[15]  Edward F. McQuarrie,et al.  Focus Groups: Theory and Practice , 1991 .

[16]  Manuel Blum,et al.  A Simple Unpredictable Pseudo-Random Number Generator , 1986, SIAM J. Comput..

[17]  Douglas R. Stinson,et al.  Cryptography: Theory and Practice , 1995 .

[18]  Moni Naor,et al.  Visual Authentication and Identification , 1997, CRYPTO.