Abstract
In this chapter, an embedded hardware implementation of efficient image security using a chaotic map has been proposed. The proposed system consists three security levels for image transmission based on chaotic system (Nahrain hyperchaotic system (NHS)). In the first security level, NHS is used as an encryption key for color image encryption system. The proposed color image encryption system contains two stage. The first stage is scrambling pixel position and the second stage is diffusing bit value. A color image encryption is simulated in software via Matlab, and implemented via Cyclone V GX Starter Kit FPGA platform. The security analysis and simulation/hardware results have shown that, the color image encryption system that presented is resilient and robust. As example, entropy measurement of the suggested encryption system is 7.9964, that is highly approximately to its typical value (8), and the Number of Pixel change Rate (NPCR) is 99.76%, that is the exceptional value to obtain. At the second security level, the carrier signal based on NHS is used to modulate binary cipher data. Two type of chaotic modulation techniques are proposed. The technique number one contain seven forms which is based on one bit modulation. The technique number two contain three forms which is based on two bit modulation. The simulation results show that, NHS gained Bit Error Rate (BER) of 7.42 × 10−6 at Signal to Noise Ratio (SNR) of 21 dB, whilst the Logistic and Henon realized 0.0316, and 0.0136 correspondingly. Finally, the third security level is the synchronization controller. The synchronization test of the proposed system showed that the perfect synchronization occurs in 0.136 m s, which is very short time. The good randomness properties and fast synchronization capability offered by NHS qualify NHS for the use in designing robust encryption algorithms and real time secure transmission systems based on chaos synchronization. Therefore, NHS offers the possibility of realizing multi-level security system efficiently. The implementation of NHS and chaotic modulation is prepared using FPAA board.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Haroun M (2015) Secure communications based on chaotic systems, Ph.D. in The Department of Electrical and Computer Engineering, University of Victoria
Kaddoum G (2016) Wireless chaos-based communication systems: a comprehensive survey. IEEE Access 4:2621–2648
Huang L, Shi D, Gao J (2016) The design and its application in secure communication and image encryption of a New Lorenz-like system with varying parameter. Math Prob Eng 2016:1–11
Kamil IA, Fakolujo OA (2011) Lorenz-Based chaotic secure communication schemes. Ubiquit Comput Commun J 7(2):1248–1254
Jovic B (2011) Chaotic signals and their use in secure communication. In: Synchronization techniques for chaotic communication systems. Springer, New Zealand, pp 31–47
Chandrika BK, Tangade SS (2015) Chaotic modulation and demodulation techniques: a survey. Int J Technol Res Eng 2(7):1384–1389
Mwkki MHaTAN (2018) Chaotic cryptosystems for multimedia transmission opportunities, challenge and limitations. In: 15th international multi-conference on systems, signals and devices (SSD), IEEE, Tunisia
Sharif A, Mollaeefar M, Habibi M, Nazari M (2016) A novel method for image encryption using chaotic maps. In: 3rd international conference on applied research in computer and information technology
Liu H, Jin C (2017) A color image encryption scheme based on Arnold Scrambling and quantum chaotic. Int J Netw Secur 19(3):347–357
Hu W, Wang L, Kaddoum G (2017) Design and performance analysis of differentially spatial modulated chaos shift keying modulation system. IEEE Trans Circuits Syst II Exp Briefs 64(11):1302–1306
Ramalingam B, Ravichandran D, Annadurai A, Rengarajan A, Rayappan J (2017) Chaos triggered image encryption—a reconfigurable security solution. Multimedia Tools Appl 17(10):11669–11692
Bakiri M (2018) Hardware implementation of pseudo random number generator based on chaotic iterations. Ph.D. thesis in cryptography and Security. Université Bourgogne Franch-Comté
Abdullah HA, Abdullah HN (2019) FPGA implementation of color image encryption using a new chaotic map. Indonesian J Electr Eng Comput Sci 13(1):129–137
Bashir Z, Rashid T, Zafar S (2016) Hyperchaotic dynamical system based image encryption scheme with time-varying delays. Pac Sci Rev A: Nat Sci Eng 18(3):254–260
Cattani M, Caldas IL, de Souza SL, Iarosz KC (2017) Deterministic chaos theory: basic concepts. Revista Brasileira de Ensino de Fısica 39(1):13
Wu X, Li Y, Kurths J (2015) A new color image encryption scheme using CML and a fractional-order chaotic system. PLoS ONE 10(3):28
Kadir A, Hamdullaa A, Guo W (2015) Color image encryption using skew tent map and hyper chaotic system of 6th-order CNN. Optik—Int J Light Electron Opt 125(5):1671–1675
Stoyanov B, Kordov K (2015) Image encryption using Chebyshev map and rotation equation. Entropy 17:2117–2139
An American National Standard (1985) 754-1985—IEEE standard for binary floating-point arithmetic. Standards Committee of the IEEE Computer Society
Ye R (2011) An image encryption scheme with efficient permutation and diffusion processes. In Zhou M, Tan H (eds) Advances in computer science and education applications, communications in computer and information science. Springer, Berlin, Heidelberg, pp 32–39
Anagidm (2014) AN231E04 Datasheet—dynamically reconfigurable dpASP,” Anadigm®, Inc. 2007
Abdullah HA, Abdullah HN (2018) FPAA implementation of chaotic modulation based. Iraqi J Inf Commun Technol (IJICT) 1(3):17–30
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Switzerland AG
About this chapter
Cite this chapter
Abdullah, H.A., Abdullah, H.N. (2020). Embedded Hardware Implementation for Image Security Using Chaotic Maps. In: Hosny, K. (eds) Multimedia Security Using Chaotic Maps: Principles and Methodologies. Studies in Computational Intelligence, vol 884 . Springer, Cham. https://doi.org/10.1007/978-3-030-38700-6_10
Download citation
DOI: https://doi.org/10.1007/978-3-030-38700-6_10
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-38699-3
Online ISBN: 978-3-030-38700-6
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)