Skip to main content
Log in

Chaos in fractals on FPGA – privacy preservation for a secure IoT node

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

The advent of high-speed networks and the Internet of Things (IoT) has significantly enhanced image communication. In hospital environments, edge devices have been seamlessly integrated with medical scanning equipment to capture and transfer human body images for e-diagnosis, thereby revolutionizing telemedicine and facilitating swift medical services. However, the imperative to safeguard these medical images from potential adversaries and intruders is crucial. This research introduces an innovative image encryption scheme leveraging the physical structure of square tree fractals implemented on the Intel Cyclone IV E Field Programmable Gate Array (FPGA). The design incorporates four layers of operations, with two dedicated to confusion and the remaining two to diffusion, ensuring robust encryption. Circular left/right shifts and Linear Feedback Shift Register (LFSR)-generated pseudo-random sequences govern Confusion I and II, while Diffusion I and II are supported by the logistic map. The physical fractal structure, combined with the logistic map and LFSR, constitutes the key, resulting in an exceptionally high keyspace compared to prior works. The proposed scheme achieves a noteworthy entropy of 7.9968 and 7.9969 for Digital Imaging in Communications and Medicine (DICOM) and grayscale images, respectively. Additionally, it exhibits a near-zero correlation. Importantly, the design utilizes only 1% of Cyclone IV E FPGA's logic elements. The throughput of the encryption and decryption processes is measured at 1 Mbps, operating at a frequency of 50 MHz. This comprehensive approach not only ensures heightened security for medical images but also optimizes the utilization of FPGA resources.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14
Fig. 15
Fig. 16

Similar content being viewed by others

Data availability

The datasets generated during and/or analysed during the current study are available from the corresponding author on reasonable request.

References

  1. Rivera J, Van der Muelen R. Gartner Says the Internet of Things Installed Base Will Grow to 26 Billion Units By 2020. https://www.finyear.com/Gartner-Says-the-Internet-of-Things-Installed-Base-Will-Grow-to-26-Billion-Units-By-2020_a27901.html. Accessed on 2019

  2. Tan Y, Zhang X, Sharif K, Liang C, Zhang Q, Li Y (2018) Covert timing channels for IoT over mobile networks. IEEE Wireless Commun 25(5):28

    Google Scholar 

  3. Guan Z, Li J, Wu L, Zhang Y, Wu J, Du X (2017) Achieving efficient and secure data acquisition for cloud-supported Internet of Things in smart grid’’. IEEE Internet Things J 4(6):1934–1944

    Article  Google Scholar 

  4. Da Xu L, He W, Li S (2014) Internet of things in industries: A survey. IEEE Trans Ind Informat 10(4):2233–2243

    Article  Google Scholar 

  5. Zhang Y, Huang H, Xiang Y et al (2017) Harnessing the Hybrid Cloud for Secure Big Image Data Service. IEEE Internet Things J 4:1380–1388

    Article  Google Scholar 

  6. Sajjad M, Mehmood I, Baik SW (2014) Sparse representations-based super-resolution of key-frames extracted from frames-sequences generated by a visual sensor network. Sensors 14:3652–3674

    Article  Google Scholar 

  7. Lloret J, Bosch I, Sendra S, Serrano A (2011) A wireless sensornetwork for vineyard monitoring that uses image processing. Sensors 11:6165–6196

    Article  Google Scholar 

  8. Coventry L, Branley D (2018) Cybersecurity in healthcare : a narrative review of trends, threats and ways forward. Maturitas 113(March):48–52

    Article  Google Scholar 

  9. Rajagopalan S et al (2020) Chua’s diode and strange attractor: a three-layer hardware-software co-design for medical image confidentiality. IET Image Process 14(7):1354–1365

    Article  Google Scholar 

  10. Chandrasekaran J, Thiruvengadam SJ (2017) A hybrid chaotic and number theoretic approach for securing DICOM images. Secur Commun Networks 2017:12

    Google Scholar 

  11. Chen JX, Zhu ZL, Fu C, Zhang LB, Zhang Y (2015) An image encryption scheme using nonlinear inter-pixel computing and swapping based permutation approach. Commun Nonlinear Sci Numer Simul 23(1–3):294–310

    Article  MathSciNet  Google Scholar 

  12. Banday SA, Mir AH, Malik S (2020) Chapter 12. Multilevel medical image encryption for secure communication. INC, 233–252. https://doi.org/10.1016/B978-0-12-820024-7.00012-8

  13. Çavuşoğlu Ü, Pehlivan I, Kaçar S (2017) Secure image encryption algorithm design using a novel chaos based S- box. Chaos Solitons Fractals 95:92–101

    Article  Google Scholar 

  14. Liu J, Ma Y, Li S et al (2018) A new simple chaotic system and its application in medical image encryption. Multimed Tools Appl 77:22787–22808. https://doi.org/10.1007/s11042-017-5534-8

    Article  Google Scholar 

  15. Desiato D, Tortora G (2018) A methodology for GDPR compliant data processing. CEUR Workshop Proc 2161(1):1–4

    Google Scholar 

  16. Ravichandran D, Praveenkumar P, Rayappan JBB, Amirtharajan R (2017) DNA Chaos Blend to Secure Medical Privacy. IEEE Trans Nanobiosci 16(8):850–858

    Article  Google Scholar 

  17. Zhang S, Gao T, Gao L (2014) A novel encryption frame for medical image with watermark based on hyperchaotic system. Math Probl Eng 2014:11

    Google Scholar 

  18. Sangavi V, Thangavel P (2020) An exotic multi-dimensional conceptualisation for medical image encryption exerting Rossler system and Sine map. J Inf Secur Appl 55(October):102626

    Google Scholar 

  19. Peng X, Zeng Y (2020) “Image encryption application in a system for compounding self-excited and hidden attractors. Chaos, Solitons Fractals Interdiscip J Nonlinear Sci Nonequilibrium Complex Phenom 139:110044

    MathSciNet  Google Scholar 

  20. Kasapbaşi MCEM (2019) A new chaotic image steganography technique based on Huffman compression of Turkish texts and fractal encryption with post-quantum security. IEEE Access 7:148495–148510

    Article  Google Scholar 

  21. S. Kamal, A. G. Radwan, S. H. A. Haleem, and M. L. Barakat, “A fractal-based image encryption system,” IET Image Process., vol. 8, no. December 2013, pp. 742–752, 2014. https://rightstartmath.com/level-g-lesson-110/. Accessed 1st Sept 2020

  22. Wang Z, Fang H, Chakrabarty K, Bienek M (2009) Deviation-based LFSR reseeding for test-data compression. IEEE Trans Comput Des Integr Circuits Syst 28(2):259–271

    Article  Google Scholar 

  23.  Bassham LE, Rukhin AL,  Soto J, Nechvatal JR, Smid ME, Leigh SD, Levenson M, Vangel M, Heckert NA, Banks DL (2010) A statistical test suite for random and pseudorandom number generators for cryptographic applications. https://doi.org/10.1017/S000156600001014X

  24. Hanley N, ONeill M (2012) “Hardware comparison of the ISO/IEC 29192–2 Block Ciphers. In: 2012 IEEE computer society annual symposium on VLSI, pp 57–62

  25. Imran M, Rashid M, Shafi I (2018) “Lopez Dahab based elliptic crypto processor (ECP) over GF(2163) for low-area applications on FPGA”, in. Int Conf Eng Emerg Technol (ICEET) 2018:1–6

    Google Scholar 

  26. Imran M, Shafi I, Jafri AR, Rashid M (2017) Hardware design and implementation of ECC based crypto processor for low-area-applications on FPGA. In: 2017 International conference on open source systems technologies (ICOSST), pp 54–59

  27. Rashid M, Imran M, Jafri AR, Mehmood Z (2020) A 4-Stage Pipelined Architecture for Point Multiplication of Binary Huff Curves. J Circuits Syst Comput 29(11):2050179. https://doi.org/10.1142/S0218126620501790

    Article  Google Scholar 

  28. Hiware RK, Padole DV (2018) Efficient Implementation of selective image encryption technique on multi-core reconfigurable system. Int J Appl Eng Res 13(8):5715–5721

    Google Scholar 

  29. Hikal NA, Eid MM (2020) A new approach for palmprint image encryption based on hybrid chaotic maps. J King Saud Univ - Comput Inf Sci 32(7):870–882

    Google Scholar 

  30. Ravichandran D, Rajagopalan S, Upadhyay HN, Rayappan JBB, Amirtharajan R (2019) Encrypted Biography of Biomedical Image - a Pentalayer Cryptosystem on FPGA. J Signal Process Syst 91(5):475–501

    Article  Google Scholar 

Download references

Funding

This work did not receive any grant from funding agencies in the public, commercial, or not-for-profit sectors.

Author information

Authors and Affiliations

Authors

Contributions

All authors attest that they meet the current International Committee of Medical Journal Editors (ICMJE) criteria for Authorship.

Corresponding author

Correspondence to V. G. Rajendran.

Ethics declarations

Competing interest

The authors declare that there is no conflict of interests regarding the publication of this paper.

Disclosure of interest

The authors declare that they have no known competing financial or personal relationships that could be viewed as influencing the work reported in this paper.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Thalaimalaichamy, M., Radhakrishnan, S., Baskaran, S. et al. Chaos in fractals on FPGA – privacy preservation for a secure IoT node. Multimed Tools Appl (2024). https://doi.org/10.1007/s11042-024-19217-5

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • DOI: https://doi.org/10.1007/s11042-024-19217-5

Keywords

Navigation