Skip to main content

Embedded Hardware Implementation for Image Security Using Chaotic Maps

  • Chapter
  • First Online:
Multimedia Security Using Chaotic Maps: Principles and Methodologies

Part of the book series: Studies in Computational Intelligence ((SCI,volume 884 ))

  • 382 Accesses

Abstract

In this chapter, an embedded hardware implementation of efficient image security using a chaotic map has been proposed. The proposed system consists three security levels for image transmission based on chaotic system (Nahrain hyperchaotic system (NHS)). In the first security level, NHS is used as an encryption key for color image encryption system. The proposed color image encryption system contains two stage. The first stage is scrambling pixel position and the second stage is diffusing bit value. A color image encryption is simulated in software via Matlab, and implemented via Cyclone V GX Starter Kit FPGA platform. The security analysis and simulation/hardware results have shown that, the color image encryption system that presented is resilient and robust. As example, entropy measurement of the suggested encryption system is 7.9964, that is highly approximately to its typical value (8), and the Number of Pixel change Rate (NPCR) is 99.76%, that is the exceptional value to obtain. At the second security level, the carrier signal based on NHS is used to modulate binary cipher data. Two type of chaotic modulation techniques are proposed. The technique number one contain seven forms which is based on one bit modulation. The technique number two contain three forms which is based on two bit modulation. The simulation results show that, NHS gained Bit Error Rate (BER) of 7.42 × 10−6 at Signal to Noise Ratio (SNR) of 21 dB, whilst the Logistic and Henon realized 0.0316, and 0.0136 correspondingly. Finally, the third security level is the synchronization controller. The synchronization test of the proposed system showed that the perfect synchronization occurs in 0.136 m s, which is very short time. The good randomness properties and fast synchronization capability offered by NHS qualify NHS for the use in designing robust encryption algorithms and real time secure transmission systems based on chaos synchronization. Therefore, NHS offers the possibility of realizing multi-level security system efficiently. The implementation of NHS and chaotic modulation is prepared using FPAA board.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 109.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Haroun M (2015) Secure communications based on chaotic systems, Ph.D. in The Department of Electrical and Computer Engineering, University of Victoria

    Google Scholar 

  2. Kaddoum G (2016) Wireless chaos-based communication systems: a comprehensive survey. IEEE Access 4:2621–2648

    Article  Google Scholar 

  3. Huang L, Shi D, Gao J (2016) The design and its application in secure communication and image encryption of a New Lorenz-like system with varying parameter. Math Prob Eng 2016:1–11

    MathSciNet  MATH  Google Scholar 

  4. Kamil IA, Fakolujo OA (2011) Lorenz-Based chaotic secure communication schemes. Ubiquit Comput Commun J 7(2):1248–1254

    Google Scholar 

  5. Jovic B (2011) Chaotic signals and their use in secure communication. In: Synchronization techniques for chaotic communication systems. Springer, New Zealand, pp 31–47

    Chapter  Google Scholar 

  6. Chandrika BK, Tangade SS (2015) Chaotic modulation and demodulation techniques: a survey. Int J Technol Res Eng 2(7):1384–1389

    Google Scholar 

  7. Mwkki MHaTAN (2018) Chaotic cryptosystems for multimedia transmission opportunities, challenge and limitations. In: 15th international multi-conference on systems, signals and devices (SSD), IEEE, Tunisia

    Google Scholar 

  8. Sharif A, Mollaeefar M, Habibi M, Nazari M (2016) A novel method for image encryption using chaotic maps. In: 3rd international conference on applied research in computer and information technology

    Google Scholar 

  9. Liu H, Jin C (2017) A color image encryption scheme based on Arnold Scrambling and quantum chaotic. Int J Netw Secur 19(3):347–357

    Google Scholar 

  10. Hu W, Wang L, Kaddoum G (2017) Design and performance analysis of differentially spatial modulated chaos shift keying modulation system. IEEE Trans Circuits Syst II Exp Briefs 64(11):1302–1306

    Article  Google Scholar 

  11. Ramalingam B, Ravichandran D, Annadurai A, Rengarajan A, Rayappan J (2017) Chaos triggered image encryption—a reconfigurable security solution. Multimedia Tools Appl 17(10):11669–11692

    Article  Google Scholar 

  12. Bakiri M (2018) Hardware implementation of pseudo random number generator based on chaotic iterations. Ph.D. thesis in cryptography and Security. Université Bourgogne Franch-Comté

    Google Scholar 

  13. Abdullah HA, Abdullah HN (2019) FPGA implementation of color image encryption using a new chaotic map. Indonesian J Electr Eng Comput Sci 13(1):129–137

    Article  Google Scholar 

  14. Bashir Z, Rashid T, Zafar S (2016) Hyperchaotic dynamical system based image encryption scheme with time-varying delays. Pac Sci Rev A: Nat Sci Eng 18(3):254–260

    Google Scholar 

  15. Cattani M, Caldas IL, de Souza SL, Iarosz KC (2017) Deterministic chaos theory: basic concepts. Revista Brasileira de Ensino de Fısica 39(1):13

    Google Scholar 

  16. Wu X, Li Y, Kurths J (2015) A new color image encryption scheme using CML and a fractional-order chaotic system. PLoS ONE 10(3):28

    Google Scholar 

  17. Kadir A, Hamdullaa A, Guo W (2015) Color image encryption using skew tent map and hyper chaotic system of 6th-order CNN. Optik—Int J Light Electron Opt 125(5):1671–1675

    Article  Google Scholar 

  18. Stoyanov B, Kordov K (2015) Image encryption using Chebyshev map and rotation equation. Entropy 17:2117–2139

    Article  MathSciNet  Google Scholar 

  19. An American National Standard (1985) 754-1985—IEEE standard for binary floating-point arithmetic. Standards Committee of the IEEE Computer Society

    Google Scholar 

  20. Ye R (2011) An image encryption scheme with efficient permutation and diffusion processes. In Zhou M, Tan H (eds) Advances in computer science and education applications, communications in computer and information science. Springer, Berlin, Heidelberg, pp 32–39

    Google Scholar 

  21. Anagidm (2014) AN231E04 Datasheet—dynamically reconfigurable dpASP,” Anadigm®, Inc. 2007

    Google Scholar 

  22. Abdullah HA, Abdullah HN (2018) FPAA implementation of chaotic modulation based. Iraqi J Inf Commun Technol (IJICT) 1(3):17–30

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Hamsa A. Abdullah .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Switzerland AG

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Abdullah, H.A., Abdullah, H.N. (2020). Embedded Hardware Implementation for Image Security Using Chaotic Maps. In: Hosny, K. (eds) Multimedia Security Using Chaotic Maps: Principles and Methodologies. Studies in Computational Intelligence, vol 884 . Springer, Cham. https://doi.org/10.1007/978-3-030-38700-6_10

Download citation

Publish with us

Policies and ethics