Table 1.
Overview of cellular automata.
Table 2.
Comparison of Wireworld CA and Arnold’s Cat Map in terms of entropy and correlation coefficients.
Fig 1.
(a) Four states of Wireworld; (b) Evolution of four states.
Fig 2.
Bifurcation diagram of logistic map.
Fig 3.
Lyapunov exponent of logistic map.
Fig 4.
Attractor and bifurcation diagram of the piecewise linear chaotic map.
(a) Attractor of piecewise linear chaotic map for r = 1.5; (b) Bifurcation diagram of piecewise linear chaotic map.
Fig 5.
Lyapunov exponent of PWLCM.
Fig 6.
Proposed methodology.
Fig 7.
Original test images: (a) Hailstones image; (b) Flowers image; (c) Chair image; (d) Bride image.
Fig 8.
Images after encryption: (a) Hailstones image; (b) Flowers image; (c) Chair image; (d) Bride image.
Fig 9.
Images after decryption: (a) Hailstones image; (b) Flowers image; (c) Chair image; (d) Bride image.
Fig 10.
Encryption and decryption of images: (a) Hailstones plain image; (b) Hailstones cipher image; (c) Chair plain image; (d) Chair cipher image.
Fig 11.
Original test images: (a) Sugar jar image; (b) Cushion image; (c) Cup image; (d) Decoration piece image (e) Leaves image; (f) Flowers image; (g) Tissue roll image; (h) Hair catch image.
Fig 12.
Encrypted images: (a) Sugar jar image; (b) Cushion image; (c) Cup image; (d) Decoration piece image (e) Leaves image; (f) Flowers image; (g) Tissue roll image; (h) Hair catch image.
Fig 13.
Decrypted images: (a) Sugar jar image; (b) Cushion image; (c) Cup image; (d) Decoration piece image (e) Leaves image; (f) Flowers image; (g) Tissue roll image; (h) Hair catch image.
Table 3.
A key space comparison with other schemes.
Fig 14.
Cartesian histogram of Hailstones image: (a) Plaintext image; (b) Cipher image.
Table 4.
Histogram variance results of cipher images.
Fig 15.
Polar histogram analysis of Hailstones image: (a) Plain image; (b) Cipher image.
Fig 16.
Correlation distribution of neighboring pixels in the specified direction for the Hailstones image: (a) Horizontal direction, plaintext image (left), cipher image (right); (b) Vertical direction, plaintext image (left), cipher image (right); (c) Diagonal direction, plaintext image (left), cipher image (right).
Table 5.
Correlation coefficient validation metric results.
Table 6.
Comparative analysis of correlation coefficients across different encryption schemes.
Fig 17.
Chosen plaintext attack analysis through special images like Black and White: (a) Black plaintext image; (b) Black ciphertext image; (c) Ciphertext Hailstones image; (d) Retrieved Hailstones image with secret key from the Black image; (e) White plaintext image; (f) White ciphertext image; (g) Ciphertext Hailstones image; (h) Retrieved Hailstones image with secret key from White image.
Fig 18.
JPEG compression attack on cipher images: (a) Cipher image of Chair; (b) Decrypted image from (a); (c) Cipher image of Bride; (d) Decrypted image from (c).
Table 7.
JPEG attacks analyses.
Table 8.
Information entropy results.
Table 9.
Average NPCR and UACI values for different images.
Table 10.
Comparison of NPCR and UACI metrics across different encryption schemes.
Table 11.
Peak signal to noise ratio results and comparison.
Table 12.
Mean absolute error findings.
Fig 19.
Noise and data crop attacks analysis: (a) Cipher Hailstones image (Noise density 0.1 added); (b) Decrypted image from (a); (c) Cipher Flowers image with data loss by ; (d) Decrypted image from (c).
Table 13.
Encryption speed of the proposed technique and its comparative analysis with existing methods.