<?xml version="1.0" encoding="ISO-8859-1"?><article xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance">
<front>
<journal-meta>
<journal-id>1405-5546</journal-id>
<journal-title><![CDATA[Computación y Sistemas]]></journal-title>
<abbrev-journal-title><![CDATA[Comp. y Sist.]]></abbrev-journal-title>
<issn>1405-5546</issn>
<publisher>
<publisher-name><![CDATA[Instituto Politécnico Nacional, Centro de Investigación en Computación]]></publisher-name>
</publisher>
</journal-meta>
<article-meta>
<article-id>S1405-55462019000401575</article-id>
<article-id pub-id-type="doi">10.13053/cys-23-4-2929</article-id>
<title-group>
<article-title xml:lang="en"><![CDATA[Partial Image Encryption Using Cellular Automata]]></article-title>
</title-group>
<contrib-group>
<contrib contrib-type="author">
<name>
<surname><![CDATA[Ramírez Torres]]></surname>
<given-names><![CDATA[Marco Tulio]]></given-names>
</name>
<xref ref-type="aff" rid="Aff"/>
</contrib>
<contrib contrib-type="author">
<name>
<surname><![CDATA[Mejía Carlos]]></surname>
<given-names><![CDATA[Marcela]]></given-names>
</name>
<xref ref-type="aff" rid="Aff"/>
</contrib>
<contrib contrib-type="author">
<name>
<surname><![CDATA[Murguía Ibarra]]></surname>
<given-names><![CDATA[José S.]]></given-names>
</name>
<xref ref-type="aff" rid="Aff"/>
</contrib>
<contrib contrib-type="author">
<name>
<surname><![CDATA[Ontañon García]]></surname>
<given-names><![CDATA[Luis Javier]]></given-names>
</name>
<xref ref-type="aff" rid="Aff"/>
</contrib>
</contrib-group>
<aff id="Af1">
<institution><![CDATA[,Universidad Autónoma de San Luis Potosí CARAO ]]></institution>
<addr-line><![CDATA[ ]]></addr-line>
<country>Mexico</country>
</aff>
<aff id="Af2">
<institution><![CDATA[,Universidad Autónoma de San Luis Potosí IICO ]]></institution>
<addr-line><![CDATA[ ]]></addr-line>
<country>Mexico</country>
</aff>
<aff id="Af3">
<institution><![CDATA[,Universidad Autónoma de San Luis Potosí Facultad de Ciencias ]]></institution>
<addr-line><![CDATA[ ]]></addr-line>
<country>Mexico</country>
</aff>
<pub-date pub-type="pub">
<day>00</day>
<month>12</month>
<year>2019</year>
</pub-date>
<pub-date pub-type="epub">
<day>00</day>
<month>12</month>
<year>2019</year>
</pub-date>
<volume>23</volume>
<numero>4</numero>
<fpage>1575</fpage>
<lpage>1582</lpage>
<copyright-statement/>
<copyright-year/>
<self-uri xlink:href="http://www.scielo.org.mx/scielo.php?script=sci_arttext&amp;pid=S1405-55462019000401575&amp;lng=en&amp;nrm=iso"></self-uri><self-uri xlink:href="http://www.scielo.org.mx/scielo.php?script=sci_abstract&amp;pid=S1405-55462019000401575&amp;lng=en&amp;nrm=iso"></self-uri><self-uri xlink:href="http://www.scielo.org.mx/scielo.php?script=sci_pdf&amp;pid=S1405-55462019000401575&amp;lng=en&amp;nrm=iso"></self-uri><abstract abstract-type="short" xml:lang="en"><p><![CDATA[Abstract In this work is proposed a partial image encryption method based on the synchronization of the cellular automaton rule 90. The security analysis proves that this cryptosystem is resistant to different tests and attacks such as the Chosen/Knownplain image attack and bit-replacement. This algorithm is a variant from another encryption algorithm named ESCA, in this case we modified the ESCA system to a partial encryption version reducing the latency time up to a 50%. This version has two changes a)it only encrypts the three most significant bits, and b) the bits of the secret key are rotated instead of calculating a key for each block of plaintext. These changes allow to reduce the latency time and according to the tests do not compromise the security. This proposal could be a feasible and secure option for real-time applications.]]></p></abstract>
<kwd-group>
<kwd lng="en"><![CDATA[Partial encryption]]></kwd>
<kwd lng="en"><![CDATA[digital images]]></kwd>
<kwd lng="en"><![CDATA[cellular automata]]></kwd>
</kwd-group>
</article-meta>
</front><back>
<ref-list>
<ref id="B1">
<label>1</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Belazi]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[El-Latif]]></surname>
<given-names><![CDATA[A. A. A.]]></given-names>
</name>
<name>
<surname><![CDATA[Diaconu]]></surname>
<given-names><![CDATA[A.-V.]]></given-names>
</name>
<name>
<surname><![CDATA[Rhouma]]></surname>
<given-names><![CDATA[R.]]></given-names>
</name>
<name>
<surname><![CDATA[Belghith]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Chaos-based partial image encryption scheme based on linear fractional and lifting wavelet transforms]]></article-title>
<source><![CDATA[Optics and Lasers in Engineering]]></source>
<year>2017</year>
<volume>88</volume>
<page-range>37-50</page-range></nlm-citation>
</ref>
<ref id="B2">
<label>2</label><nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[del Rey]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Sánchez]]></surname>
<given-names><![CDATA[G.]]></given-names>
</name>
<name>
<surname><![CDATA[De La Villa Cuenca]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Encrypting digital images using cellular automata]]></article-title>
<source><![CDATA[Hybrid Artificial Intelligent Systems]]></source>
<year>2012</year>
<page-range>78-88</page-range></nlm-citation>
</ref>
<ref id="B3">
<label>3</label><nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Lian]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
</person-group>
<source><![CDATA[Multimedia content encryption: techniques and applications]]></source>
<year>2008</year>
<publisher-name><![CDATA[CRC press]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B4">
<label>4</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Mejia]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Urias]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[An asymptotically perfect pseudorandom generator]]></article-title>
<source><![CDATA[Discrete and Continuous Dynamical Sys]]></source>
<year>2001</year>
<volume>7</volume>
<page-range>115-26</page-range></nlm-citation>
</ref>
<ref id="B5">
<label>5</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Murguía]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
<name>
<surname><![CDATA[Flores-Erana]]></surname>
<given-names><![CDATA[G.]]></given-names>
</name>
<name>
<surname><![CDATA[Carlos]]></surname>
<given-names><![CDATA[M. M.]]></given-names>
</name>
<name>
<surname><![CDATA[Rosu]]></surname>
<given-names><![CDATA[H.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Matrix approach of an encryption system based on cellular automata and its numerical implementation]]></article-title>
<source><![CDATA[International Journal of Modern Physics C]]></source>
<year>2012</year>
<volume>23</volume>
<numero>11</numero>
<issue>11</issue>
<page-range>1250078</page-range></nlm-citation>
</ref>
<ref id="B6">
<label>6</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Olguin Carbajal]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Herrera-Lozada]]></surname>
<given-names><![CDATA[J. C.]]></given-names>
</name>
<name>
<surname><![CDATA[Rivera-Zárate]]></surname>
<given-names><![CDATA[I.]]></given-names>
</name>
<name>
<surname><![CDATA[Serrano-Talamantes]]></surname>
<given-names><![CDATA[J. F.]]></given-names>
</name>
<name>
<surname><![CDATA[Cadena-Martínez]]></surname>
<given-names><![CDATA[R.]]></given-names>
</name>
<name>
<surname><![CDATA[Vásquez-Gómez]]></surname>
<given-names><![CDATA[J. I.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Minimum addition chains generation using evolutionary strategies]]></article-title>
<source><![CDATA[Computación y Sistemas]]></source>
<year>2018</year>
<volume>22</volume>
<numero>4</numero>
<issue>4</issue>
</nlm-citation>
</ref>
<ref id="B7">
<label>7</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Ramírez-Torres]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Murguía]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
<name>
<surname><![CDATA[Carlos]]></surname>
<given-names><![CDATA[M. M.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Image encryption with an improved cryptosystem based on a matrix approach]]></article-title>
<source><![CDATA[International Journal of Modern Physics C]]></source>
<year>2014</year>
<volume>25</volume>
<numero>10</numero>
<issue>10</issue>
<page-range>1450054</page-range></nlm-citation>
</ref>
<ref id="B8">
<label>8</label><nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Ramírez-Torres]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Murguía]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
<name>
<surname><![CDATA[Mejia-Carlos]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Fpga implementation of a reconfigurable image encryption system]]></article-title>
<source><![CDATA[ReConFigurable Computing and FPGAs (ReConFig), 2014 International Conference on]]></source>
<year>2014</year>
<page-range>1-4</page-range><publisher-name><![CDATA[IEEE]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B9">
<label>9</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Ramírez-Torres]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Murguía]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
<name>
<surname><![CDATA[Mejía-Carlos]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Aboytes-González]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[A secure compression scheme for real-time applications using 2d-wt and cellular automata]]></article-title>
<source><![CDATA[Research in Computing Science]]></source>
<year>2015</year>
<volume>104</volume>
<page-range>103-14</page-range></nlm-citation>
</ref>
<ref id="B10">
<label>10</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Rhouma]]></surname>
<given-names><![CDATA[R.]]></given-names>
</name>
<name>
<surname><![CDATA[Belghith]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Cryptanalysis of a spatiotemporal chaotic image/video cryptosystem]]></article-title>
<source><![CDATA[Physics Letters A]]></source>
<year>2008</year>
<volume>372</volume>
<numero>36</numero>
<issue>36</issue>
<page-range>5790-4</page-range></nlm-citation>
</ref>
<ref id="B11">
<label>11</label><nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Schiff]]></surname>
<given-names><![CDATA[J. L.]]></given-names>
</name>
</person-group>
<source><![CDATA[Cellular automata: a discrete view of the world]]></source>
<year>2011</year>
<publisher-name><![CDATA[John Wiley &amp; Sons]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B12">
<label>12</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Suresh]]></surname>
<given-names><![CDATA[V.]]></given-names>
</name>
<name>
<surname><![CDATA[Madhavan]]></surname>
<given-names><![CDATA[C. V.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Image encryption with space-filling curves]]></article-title>
<source><![CDATA[Defence Science Journal]]></source>
<year>2012</year>
<volume>62</volume>
<numero>1</numero>
<issue>1</issue>
<page-range>46-50</page-range></nlm-citation>
</ref>
<ref id="B13">
<label>13</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Urías]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
<name>
<surname><![CDATA[Salazar]]></surname>
<given-names><![CDATA[G.]]></given-names>
</name>
<name>
<surname><![CDATA[Ugalde]]></surname>
<given-names><![CDATA[E.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Synchronization of cellular automaton pairs]]></article-title>
<source><![CDATA[Chaos: An Interdisciplinary Journal of Nonlinear Science]]></source>
<year>1998</year>
<volume>8</volume>
<numero>4</numero>
<issue>4</issue>
<page-range>814-8</page-range></nlm-citation>
</ref>
<ref id="B14">
<label>14</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Vallejo]]></surname>
<given-names><![CDATA[M. G.]]></given-names>
</name>
<name>
<surname><![CDATA[Muñoz]]></surname>
<given-names><![CDATA[G. E.]]></given-names>
</name>
<name>
<surname><![CDATA[Hernando Rosales]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Kids and parents privacy exposure in the internet of things: How to protect personal information?]]></article-title>
<source><![CDATA[Computation y Sistemas]]></source>
<year>2018</year>
<volume>22</volume>
<numero>4</numero>
<issue>4</issue>
</nlm-citation>
</ref>
<ref id="B15">
<label>15</label><nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Von Neumann]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
<name>
<surname><![CDATA[Burks]]></surname>
<given-names><![CDATA[A. W.]]></given-names>
</name>
</person-group>
<source><![CDATA[Theory of self-reproducing automata]]></source>
<year>1996</year>
<publisher-name><![CDATA[University of Illinois Press Urbana]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B16">
<label>16</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Wang]]></surname>
<given-names><![CDATA[H.]]></given-names>
</name>
<name>
<surname><![CDATA[Xiao]]></surname>
<given-names><![CDATA[D.]]></given-names>
</name>
<name>
<surname><![CDATA[Chen]]></surname>
<given-names><![CDATA[X.]]></given-names>
</name>
<name>
<surname><![CDATA[Huang]]></surname>
<given-names><![CDATA[H.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Cryptanalysis and enhancements of image encryption using combination of the 1d chaotic map]]></article-title>
<source><![CDATA[Signal Processing]]></source>
<year>2018</year>
<volume>144</volume>
<page-range>444-52</page-range></nlm-citation>
</ref>
<ref id="B17">
<label>17</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Wang]]></surname>
<given-names><![CDATA[X.]]></given-names>
</name>
<name>
<surname><![CDATA[Qin]]></surname>
<given-names><![CDATA[X.]]></given-names>
</name>
<name>
<surname><![CDATA[Liu]]></surname>
<given-names><![CDATA[C.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Color image encryption algorithm based on customized globally coupled map lattices]]></article-title>
<source><![CDATA[Multimedia Tools and Applications]]></source>
<year>2018</year>
<page-range>1-19</page-range></nlm-citation>
</ref>
<ref id="B18">
<label>18</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Wu]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
<name>
<surname><![CDATA[Liao]]></surname>
<given-names><![CDATA[X.]]></given-names>
</name>
<name>
<surname><![CDATA[Yang]]></surname>
<given-names><![CDATA[B.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Cryptanalysis and enhancements of image encryption based on three-dimensional bit matrix permutation]]></article-title>
<source><![CDATA[Signal Processing]]></source>
<year>2018</year>
<volume>142</volume>
<page-range>292-300</page-range></nlm-citation>
</ref>
<ref id="B19">
<label>19</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Yu]]></surname>
<given-names><![CDATA[C.]]></given-names>
</name>
<name>
<surname><![CDATA[Li]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
<name>
<surname><![CDATA[Li]]></surname>
<given-names><![CDATA[X.]]></given-names>
</name>
<name>
<surname><![CDATA[Ren]]></surname>
<given-names><![CDATA[X.]]></given-names>
</name>
<name>
<surname><![CDATA[Gupta]]></surname>
<given-names><![CDATA[B.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Four-image encryption scheme based on quaternion fresnel transform, chaos and computer generated hologram]]></article-title>
<source><![CDATA[Multimedia Tools and Applications]]></source>
<year>2018</year>
<volume>77</volume>
<numero>4</numero>
<issue>4</issue>
<page-range>4585-608</page-range></nlm-citation>
</ref>
</ref-list>
</back>
</article>
