Ioannis S. Kafetzis, L. Moysis, C. Volos, H. Nistazakis, J. Muñoz-Pacheco, I. Stouboulos
{"title":"Automata-Derived Chaotic Image Encryption Scheme","authors":"Ioannis S. Kafetzis, L. Moysis, C. Volos, H. Nistazakis, J. Muñoz-Pacheco, I. Stouboulos","doi":"10.1109/mocast54814.2022.9837491","DOIUrl":null,"url":null,"abstract":"This work introduces an encryption scheme for gray-scale plain-text images, which is based on a chaotic map. Initially, the proposed chaotic map, which is a modification of the Renyi map, is introduced and is utilized in defining a Pseudo-Random Bit Generator. Subsequently, a finite automaton is introduced. This, in combination with the aforementioned PRBG defines the encryption strategy, that is, the order in which the rows and columns are encrypted. The proposed method is subjected to a number of statistical tests, to prove its resistance against common attacks.","PeriodicalId":122414,"journal":{"name":"2022 11th International Conference on Modern Circuits and Systems Technologies (MOCAST)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-06-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2022 11th International Conference on Modern Circuits and Systems Technologies (MOCAST)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/mocast54814.2022.9837491","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1
Abstract
This work introduces an encryption scheme for gray-scale plain-text images, which is based on a chaotic map. Initially, the proposed chaotic map, which is a modification of the Renyi map, is introduced and is utilized in defining a Pseudo-Random Bit Generator. Subsequently, a finite automaton is introduced. This, in combination with the aforementioned PRBG defines the encryption strategy, that is, the order in which the rows and columns are encrypted. The proposed method is subjected to a number of statistical tests, to prove its resistance against common attacks.