Skip to main content

Advertisement

Log in

Robust hardware implementation of a block-cipher scheme based on chaos and biological algebraic operations

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

Currently, chaos-based cryptosystems are widely used for the reason of protecting sensitive data. Various different chaos-based cryptography systems with software implementation have been studied and documented in the literature. Nevertheless, with the fast growth of the internet and connected objects, the development of hardware secure and low-resource cryptographic systems is required. This article presents an FPGA implementation of a block-cipher image encryption scheme based on different three-dimensional chaotic systems and genetic operations. Our approach is to define a novel approach to block-cipher hardware systems while basing it on the biological characteristics of DNA and chaos. Firstly, a robust chaos-based PRNG based on four 3D chaotic maps is proposed to create high-quality keys. The generated key sequences validate with no fail the NIST SP 800–22 test suite. Furthermore, some biological operations are added in the encryption process such as DNA biological algebraic operations to strengthen the confusion process and improve the complexity of the generated keys. Verily, a very secure block-cipher method is created to perform encryption and decryption of different images. The cryptosystem is implemented and evaluated on a Xilinx ZedBoard Zynq Evaluation and Development Kit platform. The proposed hardware architecture is capable of securing different sizes of gray-scale, medical and RGB color images. As a result, a new hardware architecture is implemented that accomplishes numerical image confusion and diffusion with a good frequency of 194.906 MHz and high throughput of 49,895,936 Mbps. Furthermore, the simulation results show that the encryption system is capable of higher security against cryptographic attacks. The entropy has reached a new high of 7.9998. A comparative study of the suggested algorithm with various new encryption methods shows that our system produces good results and provides better solutions than the state-of-the-art designs.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14
Fig. 15
Fig. 16
Fig. 17

Similar content being viewed by others

Data availability

Data are not shared.

References

  1. Ajili S et al (2014) Joint Watermarking\Encryption image for safe transmission: Application on medical imaging, Global summit on Computer & Information Technology (GSCIT). IEEE 2014. https://doi.org/10.1109/GSCIT.2014.6970110

  2. Ajili S, Hajjaji MA, Mtibaa A (2016) Combining watermarking and encryption algorithm for medical image safe transfer: method based on DCT. International Journal of Signal and Imaging Systems Engineering 9.4–5. https://doi.org/10.1504/IJSISE.2016.078269

  3. Al-Maadeed TA et al (2021) A image encryption algorithm based on chaotic Lorenz system and novel primitive polynomial S-boxes. Multimedia Tools and Applications 80.16. https://doi.org/10.1007/s11042-021-10695-5

  4. Al-Musawi WA, Wali WA, Al-Ibadi MAA (2022) Field-programmable gate array design of image encryption and decryption using Chua’s chaotic masking. International Journal of Electrical and Computer Engineering 12.3. https://doi.org/10.11591/ijece.v12i3.pp2414-2424

  5. Bansal, Monika, et al (2021) Transfer learning for image classification using VGG19: Caltech-101 image data set. Journal of Ambient Intelligence and Humanized Computing. https://doi.org/10.1007/s12652-021-03488-z

  6. Bansal M, Kumar M, Kumar M (2021) 2D object recognition: a comparative analysis of SIFT, SURF and ORB feature descriptors. Multimedia Tools and Applications 80.12. https://doi.org/10.1007/s11042-021-10646-0

  7. Belazi A et al (2019) Novel medical image encryption scheme based on chaos and DNA encoding. IEEE access 7. https://doi.org/10.1109/ACCESS.2019.2906292

  8. Dagadu JC, J-P Li, Aboagye EO (2019) Medical image encryption based on hybrid chaotic DNA diffusion. Wireless Personal Communications 108.1. https://doi.org/10.1007/s11277-019-06420-z

  9. Dridi M, Hajjaji MA, Mtibaa A (2016) Hardware implementation of encryption image using xilinx system generator. 2016 17th international conference on sciences and techniques of automatic control and computer engineering (STA). IEEE. https://doi.org/10.1109/STA.2016.7952064

  10. ElBeltagy M et al (2022) Image Encryption Through Rössler System, PRNG S-Box and Recamán's Sequence. 2022 IEEE 12th annual computing and communication workshop and conference (CCWC). IEEE. https://doi.org/10.1109/CCWC54503.2022.9720905

  11. Gafsi M et al (2018) High securing cryptography system for digital image transmission. International conference on the Sciences of Electronics, Technologies of Information and Telecommunications. Springer, Cham. https://doi.org/10.1007/978-3-030-21005-2_30

  12. Gafsi M et al (2021) FPGA hardware acceleration of an improved chaos-based cryptosystem for real-time image encryption and decryption. Journal of Ambient Intelligence and Humanized Computing. https://doi.org/10.1007/s12652-021-03555-5

  13. Gafsi M et al (2021) FPGA hardware acceleration of an improved chaos-based cryptosystem for real-time image encryption and decryption. Journal of Ambient Intelligence and Humanized Computing. https://doi.org/10.1007/s12652-021-03555-5

  14. Gafsi M et al (2022) Hardware implementation of the Haar 2D discrete wavelet transform with an application to image watermarking. 2022 5th International Conference on Advanced Systems and Emergent Technologies (IC_ASET). IEEE. https://doi.org/10.1109/IC_ASET53395.2022.9765864

  15. Gupta BB et al (2021) Blockchain-assisted secure fine-grained searchable encryption for a cloud-based healthcare cyber-physical system. IEEE/CAA J Automatica Sinica 8(12):10.1109/JAS.2021.1004003

    Google Scholar 

  16. Hao J et al (2021) A New Fractional Chaotic System and its application in image encryption with DNA mutation. IEEE Access 9. https://doi.org/10.1109/ACCESS.2021.3069977

  17. Hore A, Ziou D (2010) Image quality metrics: PSNR vs. SSIM. 2010 20th international conference on pattern recognition. IEEE. https://doi.org/10.1109/ICPR.2010.579

  18. Kaur M et al (2021) Secure and energy efficient-based E-health care framework for green internet of things. IEEE Transactions on Green Communications and Networking 5.3. https://doi.org/10.1109/TGCN.2021.3081616

  19. Masood F et al (2020) A novel privacy approach of digital aerial images based on mersenne twister method with DNA genetic encoding and chaos. Remote Sensing 12.11. https://doi.org/10.3390/rs12111893

  20. Mirsadeghi F, Rafsanjani MK, Gupta BB (2021) A trust infrastructure based authentication method for clustered vehicular ad hoc networks. Peer-to-Peer Networking and Applications 14.4. https://doi.org/10.1007/s12083-020-01010-4

  21. Nguyen GN et al (2021) Secure blockchain enabled Cyber–physical systems in healthcare using deep belief network with ResNet model. Journal of parallel and distributed computing 153. https://doi.org/10.1016/j.jpdc.2021.03.011

  22. Niu Y, Zheng Z, Zhang X (2020) An image encryption approach based on chaotic maps and genetic operations." Multimedia Tools and Applications 79.35. https://doi.org/10.1007/s11042-020-09237-2

  23. Pitman EJG (1939) A note on normal correlation. Biometrika 31.1/2. 9–12. http://www.jstor.com/stable/2334971

  24. Rehman AU et al (2019) A selective cross-substitution technique for encrypting color images using chaos, DNA rules and SHA-512. IEEE Access 7. https://doi.org/10.1109/ACCESS.2019.2951749

  25. Rezk AA et al (2019) Reconfigurable chaotic pseudo random number generator based on FPGA. AEU-international Journal of Electronics and Communications 98. https://doi.org/10.1016/j.aeue.2018.10.024

  26. Rukhin A et al (2001) A statistical test suite for random and pseudorandom number generators for cryptographic applications. Booz-allen and hamilton inc mclean va, 2001. https://csrc.nist.gov/publications/detail/sp/800-22/rev-1a/final

  27. Shaheed K et al (2022) DS-CNN: A pre-trained Xception model based on depth-wise separable convolutional neural network for finger vein recognition. Expert Syst Appl 191. https://doi.org/10.1016/j.eswa.2021.116288

  28. Shaheed K et al (2022) Finger-vein presentation attack detection using depthwise separable convolution neural network. Expert Systems with Applications 198. https://doi.org/10.1016/j.eswa.2022.116786

  29. Shaheed K et al (2022) Recent advancements in finger vein recognition technology: methodology, challenges and opportunities. Information Fusion 79. https://doi.org/10.1016/j.inffus.2021.10.004

  30. Stalin S et al (2019) Fast and secure medical image encryption based on non linear 4D logistic map and DNA sequences (NL4DLM_DNA). Journal of medical systems 43.8. https://doi.org/10.1007/s10916-019-1389-z

  31. Syafalni I et al (2022) Efficient Homomorphic Encryption Accelerator With Integrated PRNG Using Low-Cost FPGA. IEEE Access 10. https://doi.org/10.1109/ACCESS.2022.3143804

  32. Telem K, Nicole A, Fotsin HB, Kengne J (2021) Image encryption algorithm based on dynamic DNA coding operations and 3D chaotic systems. Multimedia Tools and Applications 80.12. https://doi.org/10.1007/s11042-021-10549-0

  33. Tewari A, Gupta BB (2017) Cryptanalysis of a novel ultra-lightweight mutual authentication protocol for IoT devices using RFID tags. The Journal of Supercomputing 73.3. https://doi.org/10.1007/s11227-016-1849-x

  34. Walia S et al (2021) Fusion of handcrafted and deep features for forgery detection in digital images. IEEE Access 9. https://doi.org/10.1109/ACCESS.2021.3096240

  35. Wang X-Y et al (2010) A chaotic image encryption algorithm based on perceptron model. Nonlinear Dynamics 62.3. https://doi.org/10.1007/s11071-010-9749-8

  36. Wang X, Xue W, An J (2021) Image encryption algorithm based on LDCML and DNA coding sequence. Multimedia Tools and Applications 80.1. https://doi.org/10.1007/s11042-020-09688-7

  37. Xu J, Zhao B, Zeming W (2022) Research on color image encryption algorithm based on bit-plane and Chen Chaotic System. Entropy 24. 2. https://doi.org/10.3390/e24020186

  38. Yu C et al (2018) Four-image encryption scheme based on quaternion Fresnel transform, chaos and computer generated hologram. Multimedia Tools and Applications 77.4. https://doi.org/10.1007/s11042-017-4637-6

  39. Yu F et al (2021) Design and FPGA implementation of a pseudo-random number generator based on a Hopfield neural network under electromagnetic radiation. Frontiers in Physics. https://doi.org/10.3389/fphy.2021.690651

  40. Zhang Q, Han J (2021) A novel color image encryption algorithm based on image hashing, 6D hyperchaotic and DNA coding. Multimedia Tools and Applications 80.9. https://doi.org/10.1007/s11042-020-10437-z

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Mohamed Gafsi.

Ethics declarations

Conflict of interest

The authors declare no conflict of interest.

Additional information

Publisher’s note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Amdouni, R., Gafsi, M., Abbassi, N. et al. Robust hardware implementation of a block-cipher scheme based on chaos and biological algebraic operations. Multimed Tools Appl 82, 37097–37130 (2023). https://doi.org/10.1007/s11042-023-15027-3

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-023-15027-3

Keywords

Navigation