Skip to main content
Log in

Chaos triggered image encryption - a reconfigurable security solution

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

Recently, diverse types of chaotic image encryption algorithms have been explored to meet the high demands in realizing secured real time image sharing applications. In this context, to achieve high sensitivity and superior key space, a multiple chaotic map based image encryption algorithm has been proposed. The proposed algorithm employs three-stage permutation and diffusion to withstand several attacks and the same is modelled in reconfigurable platform namely Field Programmable Gate Array (FPGA). The comprehensive analysis is done with various parameters to exhibit the robustness of the proposed algorithm and its ability to withstand brute-force, differential and statistical attacks. The synthesized result demonstrates that the reconfigurable hardware architecture takes approximately 0.098 ms for encrypting an image of size 256 × 256. Further the resource utilization and timing analyzer results are reported.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14
Fig. 15

Similar content being viewed by others

References

  1. Aneesh R, Jiju K (2012) Design of FPGA based 8-bit RISC controller IP core using VHDL. In: India Conf (INDICON), 2012 Annu IEEE, pp 427–32

  2. Azzaz MS, Tanougast C, Sadoudi S, Dandache A (2013) Robust chaotic key stream generator for real-time images encryption. J Real-Time Image Process 8:297–306

    Article  MATH  Google Scholar 

  3. Barakat ML, Mansingka AS, Radwan AG, Salama KN (2014) Hardware stream cipher with controllable chaos generator for colour image encryption. Image Process IET 8:33–43

    Article  Google Scholar 

  4. Dong C (2014) Signal Processing : image communication color image encryption using one-time keys and coupled chaotic systems. Signal Process Image Commun 29:628–640

    Article  Google Scholar 

  5. El-Samie FEA, Ahmed HEH, Elashry IF, Shahieen MH, Faragallah OS, El-Rabaie ESM, et al (2013) Image encryption: a communication perspective. CRC press, Taylor & Francis, pp 3–19

  6. Ferguson N, Schneier B (2003) Practical cryptography, 1st edn. Wiley Publishing, Indiana

    MATH  Google Scholar 

  7. Kadir A, Hamdulla A, Guo WQ (2014) Color image encryption using skew tent map and hyper chaotic system of 6th-order CNN. Optik 125:1671–1675

    Article  Google Scholar 

  8. Kocarev L (2001) Chaos-based cryptography: a brief overview. Circuits Syst Mag IEEE 1:6–21

    Article  Google Scholar 

  9. Li C, Li S, Lo K-T (2011) Breaking a modified substitution–diffusion image cipher based on chaotic standard and logistic maps. Commun Nonlinear Sci Numer Simul 16:837–843

    Article  MathSciNet  MATH  Google Scholar 

  10. Liu H, Wang X (2010) Color image encryption based on one-time keys and robust chaotic maps. Comput Math with Appl 59:3320–3327

    Article  MathSciNet  MATH  Google Scholar 

  11. Liu L, Zhang Q, Wei X (2012) A RGB image encryption algorithm based on DNA encoding and chaos map. Comput Electr Eng 38:1240–1248

    Article  Google Scholar 

  12. Mohammad Seyedzadeh S, Mirzakuchaki S (2012) A fast color image encryption algorithm based on coupled two-dimensional piecewise chaotic map. Signal Process 92:1202–1215

    Article  Google Scholar 

  13. Nemade VS (2012) Review of different image encryption techniques. World J 2:95–98

    Google Scholar 

  14. Abolfazl Yaghouti N, Mohammad Hossein M, Masood Niazi T (2017) Color image encryption based on hybrid hyper-chaotic system and cellular automata. Opt Lasers Eng 90:225–237

    Article  Google Scholar 

  15. Ou SC, Chung HY, Sung WT (2006) Improving the compression and encryption of images using FPGA-based cryptosystems. Multimed Tools Appl 28:5–22

    Article  Google Scholar 

  16. Pande A, Zambreno J (2013) A chaotic encryption scheme for real-time embedded systems : design and implementation. Telecommun Syst 52:551–561

    Google Scholar 

  17. Pareek NK, Patidar V, Sud KK (2010) Image encryption using chaotic logistic map. Image Vis Comput 24:926–934

    Article  Google Scholar 

  18. Pareek NK, Patidar V, Sud KK. A random bit generator using chaotic maps. 10:32–8

  19. Pareek NK, Patidar V, Sud KK (2011) Colour image encryption scheme based on permutation and substitution techniques. Adv Comput Sci Inf Technol Pt I 131:413–427

    Article  Google Scholar 

  20. Patidar V, Pareek NK, Sud KK (2009) A new substitution–diffusion based image cipher using chaotic standard and logistic maps. Commun Nonlinear Sci Numer Simul 14:3056–3075

    Article  Google Scholar 

  21. Ponomarenko VI, Prokhorov MD (2002) Extracting information masked by the chaotic signal of a time-delay system. Phys Rev E 66:262–215

    Article  Google Scholar 

  22. Sadoudi S, Tanougast C, Azzaz M, Dandache A (2013) Design and FPGA implementation of a wireless hyperchaotic communication system for secure real-time image transmission. EURASIP J Image Video Process 2013:43

    Article  MATH  Google Scholar 

  23. Schneier B (1996) Applied cryptography: protocols, algorithms, and source code in C. John Wiley & Sons, Inc., New York, pp 13-15

  24. Wang Y, Wong K-W, Liao X, Xiang T, Chen G (2009) A chaos-based image encryption algorithm with variable control parameters. Chaos, Solitons Fractals 41:1773–1783

    Article  MATH  Google Scholar 

  25. Wang Y, Lei P, Yang H, Cao H (2015) Security analysis on a color image encryption based on DNA encoding and chaos map. Comput Electr Eng 46:433–446

    Article  Google Scholar 

  26. Wang X, Zhao Y, Zhang H, Guo K (2016) A novel color image encryption scheme using alternate chaotic mapping structure. Opt Lasers Eng 82:79–86

    Article  Google Scholar 

  27. Wu Y, Zhou Y, Saveriades G, Agaian S, Noonan JP, Natarajan P (2013) Local Shannon entropy measure with statistical tests for image randomness. Inf Sci 222(10):323–342

    Article  MathSciNet  MATH  Google Scholar 

  28. Wu X, Kan H, Kurths J (2015) A new color image encryption scheme based on DNA sequences and multiple improved 1D chaotic maps. Appl Soft Comput J 37:24–39

    Article  Google Scholar 

  29. Wu X, Kan H, Kurths J (2015) A new color image encryption scheme based on DNA sequences and multiple improved 1D chaotic maps. Appl Soft Comput 37:24–39

    Article  Google Scholar 

  30. Yavuz E, Yazıcı R, Kasapbaşı MC, Yamaç E (2015) A chaos-based image encryption algorithm with simple logical functions. Comput Electr Eng 54:471–483

  31. Zhang X, Shao L, Zhao Z, Liang Z (2014) An image encryption scheme based on constructing large permutation with chaotic sequence. Comput Electr Eng 40:931–941

    Article  Google Scholar 

  32. Zhang X, Zhao Z, Wang J (2014) Chaotic image encryption based on circular substitution box and key stream buffer. Signal Process Image Commun 29:902–913

    Article  Google Scholar 

  33. Zhou Y, Bao L, Chen CLP (2014) A new 1D chaotic system for image encryption. Signal Process 97:172–182

    Article  Google Scholar 

Download references

Acknowledgements

The authors wish to express their sincere thanks to SASTRA University, Thanjavur for their financial support and extending infrastructural facilities to carry out this work.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to John Bosco Balaguru Rayappan.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Ramalingam, B., Ravichandran, D., Annadurai, A.A. et al. Chaos triggered image encryption - a reconfigurable security solution. Multimed Tools Appl 77, 11669–11692 (2018). https://doi.org/10.1007/s11042-017-4811-x

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-017-4811-x

Keywords

Navigation