Proceedings of the First International Conference on Combinatorial and Optimization, ICCAP 2021, December 7-8 2021, Chennai, India

Research Article

An Effective RGB Image Encryption Algorithm Using Chaotic Maps And Memory Cellular Automata

Download251 downloads
  • @INPROCEEDINGS{10.4108/eai.7-12-2021.2314755,
        author={Ramya  C and Rakesh  Balaji and Karthikeyan  S},
        title={An Effective RGB Image Encryption Algorithm Using Chaotic Maps And Memory Cellular Automata},
        proceedings={Proceedings of the First International Conference on Combinatorial and Optimization, ICCAP 2021, December 7-8 2021, Chennai, India},
        publisher={EAI},
        proceedings_a={ICCAP},
        year={2021},
        month={12},
        keywords={image encryption algorithm rgb memory cellular automata},
        doi={10.4108/eai.7-12-2021.2314755}
    }
    
  • Ramya C
    Rakesh Balaji
    Karthikeyan S
    Year: 2021
    An Effective RGB Image Encryption Algorithm Using Chaotic Maps And Memory Cellular Automata
    ICCAP
    EAI
    DOI: 10.4108/eai.7-12-2021.2314755
Ramya C1,*, Rakesh Balaji1, Karthikeyan S1
  • 1: PSG College of Technology
*Contact email: crm.ece@psgtech.ac.in

Abstract

This paper proposes an efficient algorithm for en- ciphering digital RGB images. It makes use of two different dynamical systems. One is chaotic maps and the other is memory cellular automata. The algorithm uses the hash function SHA - 256 on each of the red, green and blue channels of the RGB image for key generation. One notable thing is that the usage of the hash value indicates that the keys generated depend on the plaintext. This key stream created will be used for the generation of the seed values for the chaotic maps we use ie., Logistic-sine and Logistic-tent maps as well as for the generation of the rules for memory cellular automata. The plaintext ie., the input image is first permuted pixel-wise randomly and then undergoes chaotic diffusion. Then the fourth order Memory Cellular Automata (MCA) is applied on it. The algorithm proposed is analyzed with various attacks and their results are discussed..