Cryptography Techniques for Image Security and Authentication using Cellular Automata Algorithms
نویسندگان
چکیده
This Security and authentication are the two important criteria for any industrial product controlled through electronics. Microcontrollers interfacing along with electronic circuits, Controls various aspects of industry equipment. One among them is the communication and transfer of data between the equipment. In certain situations a need arises to secure the data and a proper authentication is required. From a small encoding and decoding methods to a high level Encryption and decryption algorithms are in use to secure data. Presently many smart devices are available in the areas of Communications, image processing, Mechatronics etc. One of the security authentication methods used for smart devices is I-Button technology. Many authentication techniques are used to secure data. Visual cryptography is one method which creates signatures by applying nonlinearity into the data. The signatures consist of cipher and the key. At the receiving end if the key and the cipher match then the authentication is done. Through this visual cryptography technique the users hide information securely based on key authentication. This paper presents a novel approach in visual cryptography using pextral coding algorithm in the framework of cellular automata. In this method a 3 x 3 matrix pextral icon is considered. A two dimensional pextral icon is a convex polygon formed of pixels in a nine neighborhood enclosing the central pixel. This central pixel is similar to a pixel considered for an image in visual cryptography where each pixel is expanded nonlinearly into four sub pixels. Now in cellular automaton dropping one, two or three pixels in the given matrix forms 16 convex polygons. Out of these 16 polygons, few will have mirror symmetry. Two such mirror symmetry polygons were considered and the central pixel of these polygons will form the image pixel. An algorithm is developed to generate two signatures on an image/jpeg image. Combining the two signatures will reconstruct the original image. Results show that no loss of information and improved security.
منابع مشابه
Security measures for Smart Devices through Cryptography Using Cellular Automaton
Present Embedded industry is emphasising more on Smart devices and they have gained much importance in daily life. The devices includes communication, Bio-Medical, image processing, Power, etc. While using smart devices (iButton Technology) data acquisition and user authentication has to be done.Various security concepts are developed to suite these requirement. One such security measure is usi...
متن کاملIntelligent scalable image watermarking robust against progressive DWT-based compression using genetic algorithms
Image watermarking refers to the process of embedding an authentication message, called watermark, into the host image to uniquely identify the ownership. In this paper a novel, intelligent, scalable, robust wavelet-based watermarking approach is proposed. The proposed approach employs a genetic algorithm to find nearly optimal positions to insert watermark. The embedding positions coded as chr...
متن کاملDesign of low power random number generators for quantum-dot cellular automata
Quantum-dot cellular automata (QCA) are a promising nanotechnology to implement digital circuits at the nanoscale. Devices based on QCA have the advantages of faster speed, lower power consumption, and greatly reduced sizes. In this paper, we are presented the circuits, which generate random numbers in QCA. Random numbers have many uses in science, art, statistics, cryptography, gaming, gambli...
متن کاملA Novel Approach for Cheating Prevention through Visual Cryptographic Analysis
Confidentiality is probably the most common aspect of information security and we need to protect our valuable information and it has become an inseparable issue as information technology is ruling the world now. Cryptography is the study of integer mathematical techniques related aspects of Information Security such as confidentiality, data security, entity authentication and data origin authe...
متن کاملA TESLA-based mutual authentication protocol for GSM networks
The widespread use of wireless cellular networks has made security an ever increasing concern. GSM is the most popular wireless cellular standard, but security is an issue. The most critical weakness in the GSM protocol is the use of one-way entity authentication, i.e., only the mobile station is authenticated by the network. This creates many security problems including vulnerability against m...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2013