Skip to main content
Top

2017 | OriginalPaper | Chapter

Parallelization of Image Encryption Algorithm Based on Game of Life and Chaotic System

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

In this paper, the results of parallelizing an image encryption algorithm based on Game of Life and chaotic system are presented. The data dependence analysis of loops is applied in order to parallelize the algorithm. The parallelism of the algorithm is demonstrated in accordance with the OpenMP standard. As a result of this study, it is stated that the most time-consuming loops of the algorithm are suitable for parallelization. The efficiency measurements of the parallel algorithm working in standard modes of operation are shown.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
2.
3.
go back to reference Habutsu, T., Nishio, Y., Sasase, I., Mori, S.: A secret key cryptosystem by iterating a chaotic map. In: Davies, D.W. (ed.) EUROCRYPT 1991. LNCS, vol. 547, pp. 127–140. Springer, Heidelberg (1991). doi:10.1007/3-540-46416-6_11 Habutsu, T., Nishio, Y., Sasase, I., Mori, S.: A secret key cryptosystem by iterating a chaotic map. In: Davies, D.W. (ed.) EUROCRYPT 1991. LNCS, vol. 547, pp. 127–140. Springer, Heidelberg (1991). doi:10.​1007/​3-540-46416-6_​11
4.
go back to reference Machicao, J., Marco, A., Bruno, O.: Chaotic encryption method based on life-like cellular automata. Expert Syst. Appl. 39(16), 12626–12635 (2012)CrossRef Machicao, J., Marco, A., Bruno, O.: Chaotic encryption method based on life-like cellular automata. Expert Syst. Appl. 39(16), 12626–12635 (2012)CrossRef
5.
go back to reference Rey, A.M., Sánchez, G.R., Villa Cuenca, A.: Encrypting digital images using cellular automata. In: Corchado, E., Snášel, V., Abraham, A., Woźniak, M., Graña, M., Cho, S.-B. (eds.) HAIS 2012. LNCS, vol. 7209, pp. 78–88. Springer, Heidelberg (2012). doi:10.1007/978-3-642-28931-6_8 CrossRef Rey, A.M., Sánchez, G.R., Villa Cuenca, A.: Encrypting digital images using cellular automata. In: Corchado, E., Snášel, V., Abraham, A., Woźniak, M., Graña, M., Cho, S.-B. (eds.) HAIS 2012. LNCS, vol. 7209, pp. 78–88. Springer, Heidelberg (2012). doi:10.​1007/​978-3-642-28931-6_​8 CrossRef
6.
go back to reference Zhang, S., Luo, H.: The research of image encryption algorithm based on chaos cellular automata. J. Multimedia 7(1), 66–73 (2012) Zhang, S., Luo, H.: The research of image encryption algorithm based on chaos cellular automata. J. Multimedia 7(1), 66–73 (2012)
7.
go back to reference Wang, X., Luan, D.: A novel image encryption algorithm using chaos and reversible cellular automata. Commun. Nonlinear Sci. Numer. Simul. 18(11), 3075–3085 (2013)MathSciNetCrossRefMATH Wang, X., Luan, D.: A novel image encryption algorithm using chaos and reversible cellular automata. Commun. Nonlinear Sci. Numer. Simul. 18(11), 3075–3085 (2013)MathSciNetCrossRefMATH
8.
go back to reference Bakhshandeh, A., Eslami, Z.: An authenticated image encryption scheme based on chaotic maps and memory cellular automata. Opt. Lasers Eng. 51(6), 665–673 (2013)CrossRef Bakhshandeh, A., Eslami, Z.: An authenticated image encryption scheme based on chaotic maps and memory cellular automata. Opt. Lasers Eng. 51(6), 665–673 (2013)CrossRef
9.
go back to reference Rimsa, S., Meskauskkas, T.: Data encryption algorithm based on cellular automaton and chaotic logistic equation. Informacines technologijos, 84–88 (2014) Rimsa, S., Meskauskkas, T.: Data encryption algorithm based on cellular automaton and chaotic logistic equation. Informacines technologijos, 84–88 (2014)
10.
go back to reference Souyah, A., Faraoun, K.: An image encryption scheme combining chaos-memory cellular automata and weighted histogram. Nonlinear Dyn. 86(1), 639–653 (2016)MathSciNetCrossRef Souyah, A., Faraoun, K.: An image encryption scheme combining chaos-memory cellular automata and weighted histogram. Nonlinear Dyn. 86(1), 639–653 (2016)MathSciNetCrossRef
11.
go back to reference Zhang, X., Zhang, H., Xu, C.: Reverse iterative image encryption scheme using 8-layer cellular automata. KSII Trans. Internet Inf. Syst. 10(7), 3397–3413 (2016) Zhang, X., Zhang, H., Xu, C.: Reverse iterative image encryption scheme using 8-layer cellular automata. KSII Trans. Internet Inf. Syst. 10(7), 3397–3413 (2016)
12.
go back to reference Del Rey, A., Pastora, J., Sánchez, G.: 3D medical data security protection. Expert Syst. Appl. 54, 379–386 (2016)CrossRef Del Rey, A., Pastora, J., Sánchez, G.: 3D medical data security protection. Expert Syst. Appl. 54, 379–386 (2016)CrossRef
13.
go back to reference Bielecki, W., Burak, D.: Exploiting loop-level parallelism in the AES algorithm. WSEAS Trans. Comput. 1(5), 125–133 (2006) Bielecki, W., Burak, D.: Exploiting loop-level parallelism in the AES algorithm. WSEAS Trans. Comput. 1(5), 125–133 (2006)
14.
15.
go back to reference Burak, D., Chudzik, M.: Parallelization of the discrete chaotic block encryption algorithm. In: Wyrzykowski, R., Dongarra, J., Karczewski, K., Waśniewski, J. (eds.) PPAM 2011. LNCS, vol. 7204, pp. 323–332. Springer, Heidelberg (2012). doi:10.1007/978-3-642-31500-8_33 CrossRef Burak, D., Chudzik, M.: Parallelization of the discrete chaotic block encryption algorithm. In: Wyrzykowski, R., Dongarra, J., Karczewski, K., Waśniewski, J. (eds.) PPAM 2011. LNCS, vol. 7204, pp. 323–332. Springer, Heidelberg (2012). doi:10.​1007/​978-3-642-31500-8_​33 CrossRef
16.
go back to reference Wang, X., Jin, C.: Image encryption using game of life permutation and PWLCM chaotic system. Opt. Commun. 285(4), 412–417 (2012)CrossRef Wang, X., Jin, C.: Image encryption using game of life permutation and PWLCM chaotic system. Opt. Commun. 285(4), 412–417 (2012)CrossRef
17.
go back to reference Maqableh, M.: A novel triangular chaotic map (TCM) with full intensive chaotic population based on logistic map. J. Softw. Eng. Appl. 8, 635–659 (2015)CrossRef Maqableh, M.: A novel triangular chaotic map (TCM) with full intensive chaotic population based on logistic map. J. Softw. Eng. Appl. 8, 635–659 (2015)CrossRef
18.
go back to reference Kelly, W., Maslov, V., Pugh, W., Rosser, E., Shpeisman, T., Wonnacott, D.: New user interface for Petit and other extensions. User Guide (1996) Kelly, W., Maslov, V., Pugh, W., Rosser, E., Shpeisman, T., Wonnacott, D.: New user interface for Petit and other extensions. User Guide (1996)
19.
go back to reference Chapman, B., Jost, G., van der Pas, R.: Using OpenMP - Portable Shared Memory Parallel Programming. The MIT Press, Cambridge (2007) Chapman, B., Jost, G., van der Pas, R.: Using OpenMP - Portable Shared Memory Parallel Programming. The MIT Press, Cambridge (2007)
20.
go back to reference OpenMP application program interface: Version 4.0 (2013) OpenMP application program interface: Version 4.0 (2013)
21.
go back to reference Allen, R., Kennedy, K.: Optimizing Compilers for Modern Architectures: A Dependence based Approach. Morgan Kaufmann Publishers Inc., San Francisco (2001) Allen, R., Kennedy, K.: Optimizing Compilers for Modern Architectures: A Dependence based Approach. Morgan Kaufmann Publishers Inc., San Francisco (2001)
22.
go back to reference Aho, A., Lam, M., Sethi, R., Ullman, J.: Compilers: Principles, Techniques, and Tools, 2nd edn. Prentice Hall, New Jersey (2006)MATH Aho, A., Lam, M., Sethi, R., Ullman, J.: Compilers: Principles, Techniques, and Tools, 2nd edn. Prentice Hall, New Jersey (2006)MATH
23.
go back to reference Schneier, B.: Applied Cryptography: Protocols, Algorithms, and Source Code in C, 2nd edn. Wiley, New York (1995)MATH Schneier, B.: Applied Cryptography: Protocols, Algorithms, and Source Code in C, 2nd edn. Wiley, New York (1995)MATH
24.
go back to reference Amdahl, G.: Validity of the single-processor approach to achieving large scale computing capabilities. In: AFIPS Conference Proceedings, pp. 483–485 (1967) Amdahl, G.: Validity of the single-processor approach to achieving large scale computing capabilities. In: AFIPS Conference Proceedings, pp. 483–485 (1967)
25.
go back to reference Dworkin, M.: Recommendation for block cipher modes of operation: methods and techniques. NIST Special Publication 800–38A (2001) Dworkin, M.: Recommendation for block cipher modes of operation: methods and techniques. NIST Special Publication 800–38A (2001)
Metadata
Title
Parallelization of Image Encryption Algorithm Based on Game of Life and Chaotic System
Author
Dariusz Burak
Copyright Year
2017
DOI
https://doi.org/10.1007/978-3-319-59060-8_38

Premium Partner