Home
Call For Papers
Submission
Author
Registration
Publications
About
Contact Us

  An FPGA Implementation of Chaos based Image Encryption and its Performance Analysis  
  Authors : Bikash Baruah; Monjul Saikia
  Cite as:

 

Today, hardware chip design with FPGA implementation for designing secure crypto processor is a growing topic due to rapidly increasing attack on digital images over internet network. In this paper, an FPGA implementation of Chaotic Map based two phase image encryption technique is proposed. First phase consists of pixel position permutation and second phase consists of bit value position permutation among different bit planes. In the first phase, original pixel values remain unchanged and in second phase, though pixel values are not directly changed, but finally due to position permutation over bitplanes, values are also modified. These permutations in first and second phase are done by using chaotic behaviour of Arnold Cat Map and Logistic Map respectively. A complete analysis on robustness of the method is shown. Correlation, Encryption time, Decryption time and key sensitivity show that the proposed crypto processor offers high security and reliable encryption speed for real-time image encryption and transmission.

 

Published In : IJCSN Journal Volume 5, Issue 5

Date of Publication : October 2016

Pages : 712-720

Figures :13

Tables : 07

 

Bikash Baruah : Research Scholar in the Department of Computer Science and Engineering, North Eastern Regional Institute of Science and Technology. His area of research VLSI design, cryptography, image processing etc.

Monjul Saikia : Assistant Professor in the Department of Computer Science and Engineering, North Eastern Regional Institute of Science and Technology. His major research interests include Information Security, Cryptography, Image and Video Processing, VLSI etc. He is a member of professional societies like IEEE, CSI (India), IEI (India) and ISTE (India).

 

 

 

 

 

 

 

Chaos, Image Encryption, Crypto-processor, FPGA, Logistic Map, Cat Map

We propose a new chaotic map based two phase image encryption/decryption scheme in hardware implementation using Verilog code with an external secret key of 48-bit. Here, two different chaotic maps, namely Arnold Cat Map and 3D Logistic Map are used in confusion phase and diffusion phase respectively. In the proposed encryption method pixels are shuffled in confusion phase using Arnold Cat Map and in diffusion phase pixel value manipulations are done through bit-plane shuffling using 3D Logistic Map. Figure 14 shows the original image, encrypted image, decrypted image and its respected histograms. To check the robustness of the ciphered image we have tried to decipher the encrypted image by changing a single bit of the original secret key, but the original image is not retrieved and the correlation between original image and wrongly decrypted image is also quite lower. Finally, we can conclude that the proposed method can be implanted for real-time encryption for confidential gray scale image files.

 

[1] Leong, M.P.; Naziri, S.Z.M.; Perng, S.Y., "Image encryption design using FPGA," in Electrical, Electronics and System Engineering (ICEESE), 2013 International Conference on , vol., no., pp.27-32 [2] Pawan N. Khade, Prof. Manish Narnaware, “3D Chaotic Functions for Image Encryption”, IJCSI International Journal of Computer Science Issues, Vol. 9, Issue 3, No 1, May 2012 ISSN (Online): 1694-0814 [3] Guanrong Chen, Yaobin Mao, Charles K. Chui, “A symmetric image encryption scheme based on 3D chaotic cat maps,” Chaos, Solutions and Fractals, vol. 21, no. 3, pp. 749–761, 2004. [4] Mao, Y.,& Chen, G. 2005, “Chaos-based image encryption.”, Handbook of Geometric Computing, 231- 265 [5] Xin Ma, Chong Fu, Wei-min Lei, Shuo Li, “A Novel Chaos-based Image Encryption Scheme with an Improved Permutation Process”, International Journal of Advancements in Computing Technology Volume 3, Number 5, June 2011 [6] Nitumoni Ha zarika , Monjul Saikia , “A Novel Partial Image Encryption Using Chaotic Logistic Map”,2014 International Conference on Signal Processing & Integrated Networks(SPIN),IEEE,2014 [7] Shiguo Lian “Multimedia Content Encryption: Techniques and Application”, CRC Press, ISBN 987-1- 4200-6527-5, Pg 43-85. [8] M. Saikia, S.J. Bora and Md. A. Hussain “A Review on Applications of Multimedia Encryption” in ISBN: 987- 81-8487-088-6 in national conference on Network Security- issues, challenges and Techniques, at Tezpur University [9] Monjul Saikia , Nitumoni Hazarika , Margaret Kathing "Partial Image Encryption using Peter De Jong Chaotic Map based Bit-Plane Permutation and it’s Performance Analysis" published in ACEEE ITC 2014 on Mar 21st at Chandigarh, India ISBN: 978-94- 91587-21-3 Page(s): 1 – 10 [10] Mayank Mishra, Prashant Singh, Chinmay Garg, “A New Algorithm of Encryption and Decryption of Images Using Chaotic Mapping”, International Journal of Information & Computation Technology. ISSN 0974-2239 Volume 4, Number 7 (2014), pp. 741-746 [11] Pawan N. Khade, Prof. Manish Narnaware, “3D Chaotic Functions for Image Encryption”, IJCSI International Journal of Computer Science Issues, Vol. 9, Issue 3, No 1, May 2012 ISSN (Online): 1694-0814 [12] K S Tamilkodi, (Mrs) N Rama, “A comprehensive survey on performance analysis of chaotic colour image encryption algorithms based on its cryptographic requirements”, (IJITCA) Vol.5, No.1/2, April 2015 [13] N.K. Pareeka, Vinod Patidar, K.K. Sud, “Image encryption using chaotic logistic map”, Image and Vision Computing 24 (2006) 926–934 [14] Reaz, M.B.I.; Mohd-Yasin, F.; Tan, S.L.; Tan, H.Y.; Ibrahimy, M.I., "Partial encryption of compressed images employing FPGA," in Circuits and Systems, 2005. ISCAS 2005. IEEE International Symposium on , vol., no., pp.2385-2388 Vol. 3, 23-26 May 2005 [15] Ta Thi Kim Hue; Chu Van Lam; ThangManh Hoang; Al Assad, S., "Implementation of secure SPN chaosbased cryptosystem on FPGA," in Signal Processing and Information Technology (ISSPIT), 2012 pp. 129- 134, 12-15 Dec. 2012