AliMohammad Latif

Work place: Computer Engineering Department, Yazd, Iran

E-mail: alatif@yazd.ac.ir

Website:

Research Interests: Computer systems and computational processes, Computer Architecture and Organization, Image Compression, Image Manipulation, Data Structures and Algorithms

Biography

Alimohammad Latif obtained his first degree in electronic engineering from Isfahan University of Technology in 1993 and his M. Sc. in electronic engineering from Amirkabir University of Technology in 1996. In 2001, he joined the academic staff at electrical engineering department of Yazd University. He worked as a Ph. D. candidate at university of Isfahan where he obtained his Ph. D. in 2011, he joined the academic staff at computer department of Yazd University. His research interests are digital Image Processing, watermarking and cryptography.

Author Articles
A Novel Image Encryption Scheme Based on Reversible Cellular Automata and Chaos

By Zeinab Mehrnahad AliMohammad Latif

DOI: https://doi.org/10.5815/ijitcs.2019.11.02, Pub. Date: 8 Nov. 2019

In this paper, a new scheme for image encryption is presented. The scheme is based on a chaotic map and cellular automata (CA). CA is a collection of cells arranged in a grid, such that each cell changes state as a function of time according to a defined set of rules that includes the states of neighboring cells. The major disadvantages of cellular automata in cryptography include limited number of reversal rules and inability to produce long sequences of states by these rules. In this paper, reversible cellular automaton is presented and used to solve this problem. The presented scheme is applied in three individual steps. Firstly, the image is blocked and the pixels are substituted by a reversible cellular automaton. Then, image pixels are scrambled by a chaos map that is produced by an elementary cellular automata and finally the blocks are attached and pixels are substituted by an individual reversible cellular automaton. Due to reversibility of used cellular automata, decryption scheme can reversely be applied. The experimental results show that encrypted image is suitable visually and this scheme has satisfied quantitative performance. 

[...] Read more.
Other Articles