Today, hardware chip design with FPGA
implementation for designing secure crypto processor is a
growing topic due to rapidly increasing attack on digital
images over internet network. In this paper, an FPGA
implementation of Chaotic Map based two phase image
encryption technique is proposed. First phase consists of
pixel position permutation and second phase consists of bit
value position permutation among different bit planes. In
the first phase, original pixel values remain unchanged and
in second phase, though pixel values are not directly
changed, but finally due to position permutation over bitplanes,
values are also modified. These permutations in first
and second phase are done by using chaotic behaviour of
Arnold Cat Map and Logistic Map respectively. A complete
analysis on robustness of the method is shown. Correlation,
Encryption time, Decryption time and key sensitivity show
that the proposed crypto processor offers high security and
reliable encryption speed for real-time image encryption and
transmission.
Published In:IJCSN Journal Volume 5, Issue 5
Date of Publication : October 2016
Pages : 712-720
Figures :13
Tables : 07
Bikash Baruah : Research Scholar in the Department of Computer
Science and Engineering, North Eastern Regional Institute of
Science and Technology. His area of research VLSI design,
cryptography, image processing etc.
Monjul Saikia : Assistant Professor in the Department of
Computer Science and Engineering, North Eastern Regional
Institute of Science and Technology. His major research interests
include Information Security, Cryptography, Image and Video
Processing, VLSI etc. He is a member of professional societies
like IEEE, CSI (India), IEI (India) and ISTE (India).
We propose a new chaotic map based two phase image
encryption/decryption scheme in hardware implementation
using Verilog code with an external secret key of 48-bit.
Here, two different chaotic maps, namely Arnold Cat Map
and 3D Logistic Map are used in confusion phase and
diffusion phase respectively. In the proposed encryption
method pixels are shuffled in confusion phase using
Arnold Cat Map and in diffusion phase pixel value
manipulations are done through bit-plane shuffling using
3D Logistic Map. Figure 14 shows the original image,
encrypted image, decrypted image and its respected
histograms. To check the robustness of the ciphered image
we have tried to decipher the encrypted image by changing
a single bit of the original secret key, but the original
image is not retrieved and the correlation between original
image and wrongly decrypted image is also quite lower.
Finally, we can conclude that the proposed method can be
implanted for real-time encryption for confidential gray
scale image files.
[1] Leong, M.P.; Naziri, S.Z.M.; Perng, S.Y., "Image
encryption design using FPGA," in Electrical,
Electronics and System Engineering (ICEESE), 2013
International Conference on , vol., no., pp.27-32
[2] Pawan N. Khade, Prof. Manish Narnaware, “3D
Chaotic Functions for Image Encryption”, IJCSI
International Journal of Computer Science Issues, Vol.
9, Issue 3, No 1, May 2012 ISSN (Online): 1694-0814
[3] Guanrong Chen, Yaobin Mao, Charles K. Chui, “A
symmetric image encryption scheme based on 3D
chaotic cat maps,” Chaos, Solutions and Fractals, vol.
21, no. 3, pp. 749–761, 2004.
[4] Mao, Y.,& Chen, G. 2005, “Chaos-based image
encryption.”, Handbook of Geometric Computing, 231-
265
[5] Xin Ma, Chong Fu, Wei-min Lei, Shuo Li, “A Novel
Chaos-based Image Encryption Scheme with an
Improved Permutation Process”, International Journal
of Advancements in Computing Technology Volume 3,
Number 5, June 2011
[6] Nitumoni Ha zarika , Monjul Saikia , “A Novel Partial
Image Encryption Using Chaotic Logistic Map”,2014
International Conference on Signal Processing &
Integrated Networks(SPIN),IEEE,2014
[7] Shiguo Lian “Multimedia Content Encryption:
Techniques and Application”, CRC Press, ISBN 987-1-
4200-6527-5, Pg 43-85.
[8] M. Saikia, S.J. Bora and Md. A. Hussain “A Review on
Applications of Multimedia Encryption” in ISBN: 987-
81-8487-088-6 in national conference on Network
Security- issues, challenges and Techniques, at Tezpur
University
[9] Monjul Saikia , Nitumoni Hazarika , Margaret
Kathing "Partial Image Encryption using Peter De
Jong Chaotic Map based Bit-Plane Permutation and it’s
Performance Analysis" published in ACEEE ITC 2014
on Mar 21st at Chandigarh, India ISBN: 978-94-
91587-21-3 Page(s): 1 – 10
[10] Mayank Mishra, Prashant Singh, Chinmay Garg, “A
New Algorithm of Encryption and Decryption of
Images Using Chaotic Mapping”, International Journal
of Information & Computation Technology. ISSN
0974-2239 Volume 4, Number 7 (2014), pp. 741-746
[11] Pawan N. Khade, Prof. Manish Narnaware, “3D
Chaotic Functions for Image Encryption”, IJCSI
International Journal of Computer Science Issues, Vol.
9, Issue 3, No 1, May 2012 ISSN (Online): 1694-0814
[12] K S Tamilkodi, (Mrs) N Rama, “A comprehensive
survey on performance analysis of chaotic colour
image encryption algorithms based on its cryptographic
requirements”, (IJITCA) Vol.5, No.1/2, April 2015
[13] N.K. Pareeka, Vinod Patidar, K.K. Sud, “Image
encryption using chaotic logistic map”, Image and
Vision Computing 24 (2006) 926–934
[14] Reaz, M.B.I.; Mohd-Yasin, F.; Tan, S.L.; Tan, H.Y.;
Ibrahimy, M.I., "Partial encryption of compressed
images employing FPGA," in Circuits and Systems,
2005. ISCAS 2005. IEEE International Symposium on
, vol., no., pp.2385-2388 Vol. 3, 23-26 May 2005
[15] Ta Thi Kim Hue; Chu Van Lam; ThangManh Hoang;
Al Assad, S., "Implementation of secure SPN chaosbased
cryptosystem on FPGA," in Signal Processing
and Information Technology (ISSPIT), 2012 pp. 129-
134, 12-15 Dec. 2012