Skip to main content
Advertisement
Browse Subject Areas
?

Click through the PLOS taxonomy to find articles in your field.

For more information about PLOS Subject Areas, click here.

< Back to Article

Table 1.

Overview of cellular automata.

More »

Table 1 Expand

Table 2.

Comparison of Wireworld CA and Arnold’s Cat Map in terms of entropy and correlation coefficients.

More »

Table 2 Expand

Fig 1.

Wireworld and its evolution.

(a) Four states of Wireworld; (b) Evolution of four states.

More »

Fig 1 Expand

Fig 2.

Bifurcation diagram of logistic map.

More »

Fig 2 Expand

Fig 3.

Lyapunov exponent of logistic map.

More »

Fig 3 Expand

Fig 4.

Attractor and bifurcation diagram of the piecewise linear chaotic map.

(a) Attractor of piecewise linear chaotic map for r = 1.5; (b) Bifurcation diagram of piecewise linear chaotic map.

More »

Fig 4 Expand

Fig 5.

Lyapunov exponent of PWLCM.

More »

Fig 5 Expand

Fig 6.

Proposed methodology.

More »

Fig 6 Expand

Fig 7.

Original test images: (a) Hailstones image; (b) Flowers image; (c) Chair image; (d) Bride image.

More »

Fig 7 Expand

Fig 8.

Images after encryption: (a) Hailstones image; (b) Flowers image; (c) Chair image; (d) Bride image.

More »

Fig 8 Expand

Fig 9.

Images after decryption: (a) Hailstones image; (b) Flowers image; (c) Chair image; (d) Bride image.

More »

Fig 9 Expand

Fig 10.

Encryption and decryption of images: (a) Hailstones plain image; (b) Hailstones cipher image; (c) Chair plain image; (d) Chair cipher image.

More »

Fig 10 Expand

Fig 11.

Original test images: (a) Sugar jar image; (b) Cushion image; (c) Cup image; (d) Decoration piece image (e) Leaves image; (f) Flowers image; (g) Tissue roll image; (h) Hair catch image.

More »

Fig 11 Expand

Fig 12.

Encrypted images: (a) Sugar jar image; (b) Cushion image; (c) Cup image; (d) Decoration piece image (e) Leaves image; (f) Flowers image; (g) Tissue roll image; (h) Hair catch image.

More »

Fig 12 Expand

Fig 13.

Decrypted images: (a) Sugar jar image; (b) Cushion image; (c) Cup image; (d) Decoration piece image (e) Leaves image; (f) Flowers image; (g) Tissue roll image; (h) Hair catch image.

More »

Fig 13 Expand

Table 3.

A key space comparison with other schemes.

More »

Table 3 Expand

Fig 14.

Cartesian histogram of Hailstones image: (a) Plaintext image; (b) Cipher image.

More »

Fig 14 Expand

Table 4.

Histogram variance results of cipher images.

More »

Table 4 Expand

Fig 15.

Polar histogram analysis of Hailstones image: (a) Plain image; (b) Cipher image.

More »

Fig 15 Expand

Fig 16.

Correlation distribution of neighboring pixels in the specified direction for the Hailstones image: (a) Horizontal direction, plaintext image (left), cipher image (right); (b) Vertical direction, plaintext image (left), cipher image (right); (c) Diagonal direction, plaintext image (left), cipher image (right).

More »

Fig 16 Expand

Table 5.

Correlation coefficient validation metric results.

More »

Table 5 Expand

Table 6.

Comparative analysis of correlation coefficients across different encryption schemes.

More »

Table 6 Expand

Fig 17.

Chosen plaintext attack analysis through special images like Black and White: (a) Black plaintext image; (b) Black ciphertext image; (c) Ciphertext Hailstones image; (d) Retrieved Hailstones image with secret key from the Black image; (e) White plaintext image; (f) White ciphertext image; (g) Ciphertext Hailstones image; (h) Retrieved Hailstones image with secret key from White image.

More »

Fig 17 Expand

Fig 18.

JPEG compression attack on cipher images: (a) Cipher image of Chair; (b) Decrypted image from (a); (c) Cipher image of Bride; (d) Decrypted image from (c).

More »

Fig 18 Expand

Table 7.

JPEG attacks analyses.

More »

Table 7 Expand

Table 8.

Information entropy results.

More »

Table 8 Expand

Table 9.

Average NPCR and UACI values for different images.

More »

Table 9 Expand

Table 10.

Comparison of NPCR and UACI metrics across different encryption schemes.

More »

Table 10 Expand

Table 11.

Peak signal to noise ratio results and comparison.

More »

Table 11 Expand

Table 12.

Mean absolute error findings.

More »

Table 12 Expand

Fig 19.

Noise and data crop attacks analysis: (a) Cipher Hailstones image (Noise density 0.1 added); (b) Decrypted image from (a); (c) Cipher Flowers image with data loss by ; (d) Decrypted image from (c).

More »

Fig 19 Expand

Table 13.

Encryption speed of the proposed technique and its comparative analysis with existing methods.

More »

Table 13 Expand