Skip to main content

2017 | OriginalPaper | Buchkapitel

Parallelization of Image Encryption Algorithm Based on Game of Life and Chaotic System

verfasst von : Dariusz Burak

Erschienen in: Artificial Intelligence and Soft Computing

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

In this paper, the results of parallelizing an image encryption algorithm based on Game of Life and chaotic system are presented. The data dependence analysis of loops is applied in order to parallelize the algorithm. The parallelism of the algorithm is demonstrated in accordance with the OpenMP standard. As a result of this study, it is stated that the most time-consuming loops of the algorithm are suitable for parallelization. The efficiency measurements of the parallel algorithm working in standard modes of operation are shown.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
2.
Zurück zum Zitat Wolfram, S.: Cryptography with cellular automata. In: Williams, H.C. (ed.) CRYPTO 1985. LNCS, vol. 218, pp. 429–432. Springer, Heidelberg (1986). doi:10.1007/3-540-39799-X_32 Wolfram, S.: Cryptography with cellular automata. In: Williams, H.C. (ed.) CRYPTO 1985. LNCS, vol. 218, pp. 429–432. Springer, Heidelberg (1986). doi:10.​1007/​3-540-39799-X_​32
3.
Zurück zum Zitat Habutsu, T., Nishio, Y., Sasase, I., Mori, S.: A secret key cryptosystem by iterating a chaotic map. In: Davies, D.W. (ed.) EUROCRYPT 1991. LNCS, vol. 547, pp. 127–140. Springer, Heidelberg (1991). doi:10.1007/3-540-46416-6_11 Habutsu, T., Nishio, Y., Sasase, I., Mori, S.: A secret key cryptosystem by iterating a chaotic map. In: Davies, D.W. (ed.) EUROCRYPT 1991. LNCS, vol. 547, pp. 127–140. Springer, Heidelberg (1991). doi:10.​1007/​3-540-46416-6_​11
4.
Zurück zum Zitat Machicao, J., Marco, A., Bruno, O.: Chaotic encryption method based on life-like cellular automata. Expert Syst. Appl. 39(16), 12626–12635 (2012)CrossRef Machicao, J., Marco, A., Bruno, O.: Chaotic encryption method based on life-like cellular automata. Expert Syst. Appl. 39(16), 12626–12635 (2012)CrossRef
5.
Zurück zum Zitat Rey, A.M., Sánchez, G.R., Villa Cuenca, A.: Encrypting digital images using cellular automata. In: Corchado, E., Snášel, V., Abraham, A., Woźniak, M., Graña, M., Cho, S.-B. (eds.) HAIS 2012. LNCS, vol. 7209, pp. 78–88. Springer, Heidelberg (2012). doi:10.1007/978-3-642-28931-6_8 CrossRef Rey, A.M., Sánchez, G.R., Villa Cuenca, A.: Encrypting digital images using cellular automata. In: Corchado, E., Snášel, V., Abraham, A., Woźniak, M., Graña, M., Cho, S.-B. (eds.) HAIS 2012. LNCS, vol. 7209, pp. 78–88. Springer, Heidelberg (2012). doi:10.​1007/​978-3-642-28931-6_​8 CrossRef
6.
Zurück zum Zitat Zhang, S., Luo, H.: The research of image encryption algorithm based on chaos cellular automata. J. Multimedia 7(1), 66–73 (2012) Zhang, S., Luo, H.: The research of image encryption algorithm based on chaos cellular automata. J. Multimedia 7(1), 66–73 (2012)
7.
Zurück zum Zitat Wang, X., Luan, D.: A novel image encryption algorithm using chaos and reversible cellular automata. Commun. Nonlinear Sci. Numer. Simul. 18(11), 3075–3085 (2013)MathSciNetCrossRefMATH Wang, X., Luan, D.: A novel image encryption algorithm using chaos and reversible cellular automata. Commun. Nonlinear Sci. Numer. Simul. 18(11), 3075–3085 (2013)MathSciNetCrossRefMATH
8.
Zurück zum Zitat Bakhshandeh, A., Eslami, Z.: An authenticated image encryption scheme based on chaotic maps and memory cellular automata. Opt. Lasers Eng. 51(6), 665–673 (2013)CrossRef Bakhshandeh, A., Eslami, Z.: An authenticated image encryption scheme based on chaotic maps and memory cellular automata. Opt. Lasers Eng. 51(6), 665–673 (2013)CrossRef
9.
Zurück zum Zitat Rimsa, S., Meskauskkas, T.: Data encryption algorithm based on cellular automaton and chaotic logistic equation. Informacines technologijos, 84–88 (2014) Rimsa, S., Meskauskkas, T.: Data encryption algorithm based on cellular automaton and chaotic logistic equation. Informacines technologijos, 84–88 (2014)
10.
Zurück zum Zitat Souyah, A., Faraoun, K.: An image encryption scheme combining chaos-memory cellular automata and weighted histogram. Nonlinear Dyn. 86(1), 639–653 (2016)MathSciNetCrossRef Souyah, A., Faraoun, K.: An image encryption scheme combining chaos-memory cellular automata and weighted histogram. Nonlinear Dyn. 86(1), 639–653 (2016)MathSciNetCrossRef
11.
Zurück zum Zitat Zhang, X., Zhang, H., Xu, C.: Reverse iterative image encryption scheme using 8-layer cellular automata. KSII Trans. Internet Inf. Syst. 10(7), 3397–3413 (2016) Zhang, X., Zhang, H., Xu, C.: Reverse iterative image encryption scheme using 8-layer cellular automata. KSII Trans. Internet Inf. Syst. 10(7), 3397–3413 (2016)
12.
Zurück zum Zitat Del Rey, A., Pastora, J., Sánchez, G.: 3D medical data security protection. Expert Syst. Appl. 54, 379–386 (2016)CrossRef Del Rey, A., Pastora, J., Sánchez, G.: 3D medical data security protection. Expert Syst. Appl. 54, 379–386 (2016)CrossRef
13.
Zurück zum Zitat Bielecki, W., Burak, D.: Exploiting loop-level parallelism in the AES algorithm. WSEAS Trans. Comput. 1(5), 125–133 (2006) Bielecki, W., Burak, D.: Exploiting loop-level parallelism in the AES algorithm. WSEAS Trans. Comput. 1(5), 125–133 (2006)
14.
Zurück zum Zitat Beletskyy, V., Burak, D.: Parallelization of the IDEA algorithm. In: Bubak, M., Albada, G.D., Sloot, P.M.A., Dongarra, J. (eds.) ICCS 2004. LNCS, vol. 3036, pp. 635–638. Springer, Heidelberg (2004). doi:10.1007/978-3-540-24685-5_108 CrossRef Beletskyy, V., Burak, D.: Parallelization of the IDEA algorithm. In: Bubak, M., Albada, G.D., Sloot, P.M.A., Dongarra, J. (eds.) ICCS 2004. LNCS, vol. 3036, pp. 635–638. Springer, Heidelberg (2004). doi:10.​1007/​978-3-540-24685-5_​108 CrossRef
15.
Zurück zum Zitat Burak, D., Chudzik, M.: Parallelization of the discrete chaotic block encryption algorithm. In: Wyrzykowski, R., Dongarra, J., Karczewski, K., Waśniewski, J. (eds.) PPAM 2011. LNCS, vol. 7204, pp. 323–332. Springer, Heidelberg (2012). doi:10.1007/978-3-642-31500-8_33 CrossRef Burak, D., Chudzik, M.: Parallelization of the discrete chaotic block encryption algorithm. In: Wyrzykowski, R., Dongarra, J., Karczewski, K., Waśniewski, J. (eds.) PPAM 2011. LNCS, vol. 7204, pp. 323–332. Springer, Heidelberg (2012). doi:10.​1007/​978-3-642-31500-8_​33 CrossRef
16.
Zurück zum Zitat Wang, X., Jin, C.: Image encryption using game of life permutation and PWLCM chaotic system. Opt. Commun. 285(4), 412–417 (2012)CrossRef Wang, X., Jin, C.: Image encryption using game of life permutation and PWLCM chaotic system. Opt. Commun. 285(4), 412–417 (2012)CrossRef
17.
Zurück zum Zitat Maqableh, M.: A novel triangular chaotic map (TCM) with full intensive chaotic population based on logistic map. J. Softw. Eng. Appl. 8, 635–659 (2015)CrossRef Maqableh, M.: A novel triangular chaotic map (TCM) with full intensive chaotic population based on logistic map. J. Softw. Eng. Appl. 8, 635–659 (2015)CrossRef
18.
Zurück zum Zitat Kelly, W., Maslov, V., Pugh, W., Rosser, E., Shpeisman, T., Wonnacott, D.: New user interface for Petit and other extensions. User Guide (1996) Kelly, W., Maslov, V., Pugh, W., Rosser, E., Shpeisman, T., Wonnacott, D.: New user interface for Petit and other extensions. User Guide (1996)
19.
Zurück zum Zitat Chapman, B., Jost, G., van der Pas, R.: Using OpenMP - Portable Shared Memory Parallel Programming. The MIT Press, Cambridge (2007) Chapman, B., Jost, G., van der Pas, R.: Using OpenMP - Portable Shared Memory Parallel Programming. The MIT Press, Cambridge (2007)
20.
Zurück zum Zitat OpenMP application program interface: Version 4.0 (2013) OpenMP application program interface: Version 4.0 (2013)
21.
Zurück zum Zitat Allen, R., Kennedy, K.: Optimizing Compilers for Modern Architectures: A Dependence based Approach. Morgan Kaufmann Publishers Inc., San Francisco (2001) Allen, R., Kennedy, K.: Optimizing Compilers for Modern Architectures: A Dependence based Approach. Morgan Kaufmann Publishers Inc., San Francisco (2001)
22.
Zurück zum Zitat Aho, A., Lam, M., Sethi, R., Ullman, J.: Compilers: Principles, Techniques, and Tools, 2nd edn. Prentice Hall, New Jersey (2006)MATH Aho, A., Lam, M., Sethi, R., Ullman, J.: Compilers: Principles, Techniques, and Tools, 2nd edn. Prentice Hall, New Jersey (2006)MATH
23.
Zurück zum Zitat Schneier, B.: Applied Cryptography: Protocols, Algorithms, and Source Code in C, 2nd edn. Wiley, New York (1995)MATH Schneier, B.: Applied Cryptography: Protocols, Algorithms, and Source Code in C, 2nd edn. Wiley, New York (1995)MATH
24.
Zurück zum Zitat Amdahl, G.: Validity of the single-processor approach to achieving large scale computing capabilities. In: AFIPS Conference Proceedings, pp. 483–485 (1967) Amdahl, G.: Validity of the single-processor approach to achieving large scale computing capabilities. In: AFIPS Conference Proceedings, pp. 483–485 (1967)
25.
Zurück zum Zitat Dworkin, M.: Recommendation for block cipher modes of operation: methods and techniques. NIST Special Publication 800–38A (2001) Dworkin, M.: Recommendation for block cipher modes of operation: methods and techniques. NIST Special Publication 800–38A (2001)
Metadaten
Titel
Parallelization of Image Encryption Algorithm Based on Game of Life and Chaotic System
verfasst von
Dariusz Burak
Copyright-Jahr
2017
DOI
https://doi.org/10.1007/978-3-319-59060-8_38

Premium Partner