Abstract
Cellular Automata (CAs) have been applied successfully to several physical systems, processes and scientific problems that involve local interactions, such as image processing, data encryption and byte error correcting codes. In this paper, we analyze the cellular automata, and we propose a reconfigurable cryptosystem based on 2-D Von Neumann cellular automata as an image protection technique. In our scheme we used 2-D cellular automata to generate a high quality of random number as key stream. The security analysis of our proposed cryptosystem by statistical approach shows the high quality of the encrypted image. A comparative result shows that the performances of our proposed system are superior in encryption time to those of MIE, the VC, and the N/KC. In order to have a fair and detailed evolution, we implemented an AES (Advanced Encryption Standard) processor. The proposed CA reconfigurable processor is compared to the AES. Performance metrics such as the throughput (Mbps), the area (slices), the power consumption, and the correlation results from these implementations (CA and AES processor) are computed and analyzed.
| Original language | English |
|---|---|
| Pages (from-to) | 43-62 |
| Number of pages | 20 |
| Journal | International Journal of Computer Science and Applications |
| Volume | 6 |
| Issue number | 4 |
| State | Published - Sep 2009 |
| Externally published | Yes |
Keywords
- AES
- Cellular automata
- Encryption image
- Random number generator
- Reconfigurable architecture
- Security analysis
Fingerprint
Dive into the research topics of 'Design of reconfigurable image encryption processor using 2-D cellular automata generator'. Together they form a unique fingerprint.Cite this
- APA
- Author
- BIBTEX
- Harvard
- Standard
- RIS
- Vancouver