Data Compression and Encryption Using Cellular Automata Transforms

نویسنده

  • Olu Lafe
چکیده

1 Original paper appeared in Engng. Applic. Artif. Intell., Vol. 10, No. 6, pp. 581-591, 1997. Abstract A family of basis functions, generated from the evolving states of Cellular Automata (CA), is used to compress and encrypt data. The operations required in encoding and decoding the data are described under the umbrella Cellular Automata Transforms (CAT). There is a huge number of these transform bases. CAT can be used in the way other mathematical transforms (e.g., Fourier, Discrete Cosine, Laplace, Wavelet, etc.) are utilized. In data compression applications, the rules and pertinent keys used to generate the CA are selected in favor of those which yield basis functions with the best information packing characteristics. On the other hand, for encryption the selection is biased towards those with the tendency to yield an avalanche effect. In the latter case the transform process must be error free.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

رمزنگاری تصاویر با استفاده از اتوماتای سلولی برگشت پذیر

In this paper, a new structure for image encryption using recursive cellular automatais presented. The image encryption contains three recursive cellular automata in three steps, individually. At the first step, the image is blocked and the pixels are substituted. In the next step, pixels are scrambledby the second cellular automata and at the last step, the blocks are attachedtogether and the ...

متن کامل

ارائه روشی برای رمزنگاری تصاویر با استفاده از اتوماتای سلولی ترکیبی

In this paper, a new structure for image encryption using hybrid cellular automata is presented. The image encryption is done in two steps. At the first step, each pixel is encrypted by rules of hybrid cellular automata. In the next step, each pixel converted to a binary number and each bit is encrypted by rules of cellular automata. The rules are made by a function. Due to reversibility of cel...

متن کامل

Mixing Compression and CA Encryption

We consider the enciphering of a data stream while it is being compressed by a dictionary algorithm. This scheme has to be compared to the classical encryption after compression methods used in classical security protocols. Actually, most cryptanalysis techniques exploit patterns found in the plaintext to crack the cipher and compression techniques reduce these attacks. Our scheme is based on a...

متن کامل

Simultaneous Color Image Compression and Encryption using Number Theory

The dependence on computing machines and utility of information has been growing tremendously in the last few decades. As a result, evolving effective techniques for storing and transmitting the ever increasing volumes of data has become a high priority issue. Image compression addresses the problem by reducing the amount of data required to represent a digital image. The underlying basis of th...

متن کامل

Highly Secured Lossless Image Cryptography Algorithm Based on Haar Wavelet Transform

Along with the rapid increasing growth of computer and network technologies, images are being transmitted more and more frequently. Security of image is a big issue. Image information is lively and visual, and has been an important means of expressing information of person. There are many encryption algorithm had been available each one having some strength and weakness. Image cryptography can ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2000