Abstract
The advent of high-speed networks and the Internet of Things (IoT) has significantly enhanced image communication. In hospital environments, edge devices have been seamlessly integrated with medical scanning equipment to capture and transfer human body images for e-diagnosis, thereby revolutionizing telemedicine and facilitating swift medical services. However, the imperative to safeguard these medical images from potential adversaries and intruders is crucial. This research introduces an innovative image encryption scheme leveraging the physical structure of square tree fractals implemented on the Intel Cyclone IV E Field Programmable Gate Array (FPGA). The design incorporates four layers of operations, with two dedicated to confusion and the remaining two to diffusion, ensuring robust encryption. Circular left/right shifts and Linear Feedback Shift Register (LFSR)-generated pseudo-random sequences govern Confusion I and II, while Diffusion I and II are supported by the logistic map. The physical fractal structure, combined with the logistic map and LFSR, constitutes the key, resulting in an exceptionally high keyspace compared to prior works. The proposed scheme achieves a noteworthy entropy of 7.9968 and 7.9969 for Digital Imaging in Communications and Medicine (DICOM) and grayscale images, respectively. Additionally, it exhibits a near-zero correlation. Importantly, the design utilizes only 1% of Cyclone IV E FPGA's logic elements. The throughput of the encryption and decryption processes is measured at 1 Mbps, operating at a frequency of 50 MHz. This comprehensive approach not only ensures heightened security for medical images but also optimizes the utilization of FPGA resources.
Similar content being viewed by others
Data availability
The datasets generated during and/or analysed during the current study are available from the corresponding author on reasonable request.
References
Rivera J, Van der Muelen R. Gartner Says the Internet of Things Installed Base Will Grow to 26 Billion Units By 2020. https://www.finyear.com/Gartner-Says-the-Internet-of-Things-Installed-Base-Will-Grow-to-26-Billion-Units-By-2020_a27901.html. Accessed on 2019
Tan Y, Zhang X, Sharif K, Liang C, Zhang Q, Li Y (2018) Covert timing channels for IoT over mobile networks. IEEE Wireless Commun 25(5):28
Guan Z, Li J, Wu L, Zhang Y, Wu J, Du X (2017) Achieving efficient and secure data acquisition for cloud-supported Internet of Things in smart grid’’. IEEE Internet Things J 4(6):1934–1944
Da Xu L, He W, Li S (2014) Internet of things in industries: A survey. IEEE Trans Ind Informat 10(4):2233–2243
Zhang Y, Huang H, Xiang Y et al (2017) Harnessing the Hybrid Cloud for Secure Big Image Data Service. IEEE Internet Things J 4:1380–1388
Sajjad M, Mehmood I, Baik SW (2014) Sparse representations-based super-resolution of key-frames extracted from frames-sequences generated by a visual sensor network. Sensors 14:3652–3674
Lloret J, Bosch I, Sendra S, Serrano A (2011) A wireless sensornetwork for vineyard monitoring that uses image processing. Sensors 11:6165–6196
Coventry L, Branley D (2018) Cybersecurity in healthcare : a narrative review of trends, threats and ways forward. Maturitas 113(March):48–52
Rajagopalan S et al (2020) Chua’s diode and strange attractor: a three-layer hardware-software co-design for medical image confidentiality. IET Image Process 14(7):1354–1365
Chandrasekaran J, Thiruvengadam SJ (2017) A hybrid chaotic and number theoretic approach for securing DICOM images. Secur Commun Networks 2017:12
Chen JX, Zhu ZL, Fu C, Zhang LB, Zhang Y (2015) An image encryption scheme using nonlinear inter-pixel computing and swapping based permutation approach. Commun Nonlinear Sci Numer Simul 23(1–3):294–310
Banday SA, Mir AH, Malik S (2020) Chapter 12. Multilevel medical image encryption for secure communication. INC, 233–252. https://doi.org/10.1016/B978-0-12-820024-7.00012-8
Çavuşoğlu Ü, Pehlivan I, Kaçar S (2017) Secure image encryption algorithm design using a novel chaos based S- box. Chaos Solitons Fractals 95:92–101
Liu J, Ma Y, Li S et al (2018) A new simple chaotic system and its application in medical image encryption. Multimed Tools Appl 77:22787–22808. https://doi.org/10.1007/s11042-017-5534-8
Desiato D, Tortora G (2018) A methodology for GDPR compliant data processing. CEUR Workshop Proc 2161(1):1–4
Ravichandran D, Praveenkumar P, Rayappan JBB, Amirtharajan R (2017) DNA Chaos Blend to Secure Medical Privacy. IEEE Trans Nanobiosci 16(8):850–858
Zhang S, Gao T, Gao L (2014) A novel encryption frame for medical image with watermark based on hyperchaotic system. Math Probl Eng 2014:11
Sangavi V, Thangavel P (2020) An exotic multi-dimensional conceptualisation for medical image encryption exerting Rossler system and Sine map. J Inf Secur Appl 55(October):102626
Peng X, Zeng Y (2020) “Image encryption application in a system for compounding self-excited and hidden attractors. Chaos, Solitons Fractals Interdiscip J Nonlinear Sci Nonequilibrium Complex Phenom 139:110044
Kasapbaşi MCEM (2019) A new chaotic image steganography technique based on Huffman compression of Turkish texts and fractal encryption with post-quantum security. IEEE Access 7:148495–148510
S. Kamal, A. G. Radwan, S. H. A. Haleem, and M. L. Barakat, “A fractal-based image encryption system,” IET Image Process., vol. 8, no. December 2013, pp. 742–752, 2014. https://rightstartmath.com/level-g-lesson-110/. Accessed 1st Sept 2020
Wang Z, Fang H, Chakrabarty K, Bienek M (2009) Deviation-based LFSR reseeding for test-data compression. IEEE Trans Comput Des Integr Circuits Syst 28(2):259–271
Bassham LE, Rukhin AL, Soto J, Nechvatal JR, Smid ME, Leigh SD, Levenson M, Vangel M, Heckert NA, Banks DL (2010) A statistical test suite for random and pseudorandom number generators for cryptographic applications. https://doi.org/10.1017/S000156600001014X
Hanley N, ONeill M (2012) “Hardware comparison of the ISO/IEC 29192–2 Block Ciphers. In: 2012 IEEE computer society annual symposium on VLSI, pp 57–62
Imran M, Rashid M, Shafi I (2018) “Lopez Dahab based elliptic crypto processor (ECP) over GF(2163) for low-area applications on FPGA”, in. Int Conf Eng Emerg Technol (ICEET) 2018:1–6
Imran M, Shafi I, Jafri AR, Rashid M (2017) Hardware design and implementation of ECC based crypto processor for low-area-applications on FPGA. In: 2017 International conference on open source systems technologies (ICOSST), pp 54–59
Rashid M, Imran M, Jafri AR, Mehmood Z (2020) A 4-Stage Pipelined Architecture for Point Multiplication of Binary Huff Curves. J Circuits Syst Comput 29(11):2050179. https://doi.org/10.1142/S0218126620501790
Hiware RK, Padole DV (2018) Efficient Implementation of selective image encryption technique on multi-core reconfigurable system. Int J Appl Eng Res 13(8):5715–5721
Hikal NA, Eid MM (2020) A new approach for palmprint image encryption based on hybrid chaotic maps. J King Saud Univ - Comput Inf Sci 32(7):870–882
Ravichandran D, Rajagopalan S, Upadhyay HN, Rayappan JBB, Amirtharajan R (2019) Encrypted Biography of Biomedical Image - a Pentalayer Cryptosystem on FPGA. J Signal Process Syst 91(5):475–501
Funding
This work did not receive any grant from funding agencies in the public, commercial, or not-for-profit sectors.
Author information
Authors and Affiliations
Contributions
All authors attest that they meet the current International Committee of Medical Journal Editors (ICMJE) criteria for Authorship.
Corresponding author
Ethics declarations
Competing interest
The authors declare that there is no conflict of interests regarding the publication of this paper.
Disclosure of interest
The authors declare that they have no known competing financial or personal relationships that could be viewed as influencing the work reported in this paper.
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.
About this article
Cite this article
Thalaimalaichamy, M., Radhakrishnan, S., Baskaran, S. et al. Chaos in fractals on FPGA – privacy preservation for a secure IoT node. Multimed Tools Appl (2024). https://doi.org/10.1007/s11042-024-19217-5
Received:
Revised:
Accepted:
Published:
DOI: https://doi.org/10.1007/s11042-024-19217-5