Abstract
Recently, diverse types of chaotic image encryption algorithms have been explored to meet the high demands in realizing secured real time image sharing applications. In this context, to achieve high sensitivity and superior key space, a multiple chaotic map based image encryption algorithm has been proposed. The proposed algorithm employs three-stage permutation and diffusion to withstand several attacks and the same is modelled in reconfigurable platform namely Field Programmable Gate Array (FPGA). The comprehensive analysis is done with various parameters to exhibit the robustness of the proposed algorithm and its ability to withstand brute-force, differential and statistical attacks. The synthesized result demonstrates that the reconfigurable hardware architecture takes approximately 0.098 ms for encrypting an image of size 256 × 256. Further the resource utilization and timing analyzer results are reported.















Similar content being viewed by others
References
Aneesh R, Jiju K (2012) Design of FPGA based 8-bit RISC controller IP core using VHDL. In: India Conf (INDICON), 2012 Annu IEEE, pp 427–32
Azzaz MS, Tanougast C, Sadoudi S, Dandache A (2013) Robust chaotic key stream generator for real-time images encryption. J Real-Time Image Process 8:297–306
Barakat ML, Mansingka AS, Radwan AG, Salama KN (2014) Hardware stream cipher with controllable chaos generator for colour image encryption. Image Process IET 8:33–43
Dong C (2014) Signal Processing : image communication color image encryption using one-time keys and coupled chaotic systems. Signal Process Image Commun 29:628–640
El-Samie FEA, Ahmed HEH, Elashry IF, Shahieen MH, Faragallah OS, El-Rabaie ESM, et al (2013) Image encryption: a communication perspective. CRC press, Taylor & Francis, pp 3–19
Ferguson N, Schneier B (2003) Practical cryptography, 1st edn. Wiley Publishing, Indiana
Kadir A, Hamdulla A, Guo WQ (2014) Color image encryption using skew tent map and hyper chaotic system of 6th-order CNN. Optik 125:1671–1675
Kocarev L (2001) Chaos-based cryptography: a brief overview. Circuits Syst Mag IEEE 1:6–21
Li C, Li S, Lo K-T (2011) Breaking a modified substitution–diffusion image cipher based on chaotic standard and logistic maps. Commun Nonlinear Sci Numer Simul 16:837–843
Liu H, Wang X (2010) Color image encryption based on one-time keys and robust chaotic maps. Comput Math with Appl 59:3320–3327
Liu L, Zhang Q, Wei X (2012) A RGB image encryption algorithm based on DNA encoding and chaos map. Comput Electr Eng 38:1240–1248
Mohammad Seyedzadeh S, Mirzakuchaki S (2012) A fast color image encryption algorithm based on coupled two-dimensional piecewise chaotic map. Signal Process 92:1202–1215
Nemade VS (2012) Review of different image encryption techniques. World J 2:95–98
Abolfazl Yaghouti N, Mohammad Hossein M, Masood Niazi T (2017) Color image encryption based on hybrid hyper-chaotic system and cellular automata. Opt Lasers Eng 90:225–237
Ou SC, Chung HY, Sung WT (2006) Improving the compression and encryption of images using FPGA-based cryptosystems. Multimed Tools Appl 28:5–22
Pande A, Zambreno J (2013) A chaotic encryption scheme for real-time embedded systems : design and implementation. Telecommun Syst 52:551–561
Pareek NK, Patidar V, Sud KK (2010) Image encryption using chaotic logistic map. Image Vis Comput 24:926–934
Pareek NK, Patidar V, Sud KK. A random bit generator using chaotic maps. 10:32–8
Pareek NK, Patidar V, Sud KK (2011) Colour image encryption scheme based on permutation and substitution techniques. Adv Comput Sci Inf Technol Pt I 131:413–427
Patidar V, Pareek NK, Sud KK (2009) A new substitution–diffusion based image cipher using chaotic standard and logistic maps. Commun Nonlinear Sci Numer Simul 14:3056–3075
Ponomarenko VI, Prokhorov MD (2002) Extracting information masked by the chaotic signal of a time-delay system. Phys Rev E 66:262–215
Sadoudi S, Tanougast C, Azzaz M, Dandache A (2013) Design and FPGA implementation of a wireless hyperchaotic communication system for secure real-time image transmission. EURASIP J Image Video Process 2013:43
Schneier B (1996) Applied cryptography: protocols, algorithms, and source code in C. John Wiley & Sons, Inc., New York, pp 13-15
Wang Y, Wong K-W, Liao X, Xiang T, Chen G (2009) A chaos-based image encryption algorithm with variable control parameters. Chaos, Solitons Fractals 41:1773–1783
Wang Y, Lei P, Yang H, Cao H (2015) Security analysis on a color image encryption based on DNA encoding and chaos map. Comput Electr Eng 46:433–446
Wang X, Zhao Y, Zhang H, Guo K (2016) A novel color image encryption scheme using alternate chaotic mapping structure. Opt Lasers Eng 82:79–86
Wu Y, Zhou Y, Saveriades G, Agaian S, Noonan JP, Natarajan P (2013) Local Shannon entropy measure with statistical tests for image randomness. Inf Sci 222(10):323–342
Wu X, Kan H, Kurths J (2015) A new color image encryption scheme based on DNA sequences and multiple improved 1D chaotic maps. Appl Soft Comput J 37:24–39
Wu X, Kan H, Kurths J (2015) A new color image encryption scheme based on DNA sequences and multiple improved 1D chaotic maps. Appl Soft Comput 37:24–39
Yavuz E, Yazıcı R, Kasapbaşı MC, Yamaç E (2015) A chaos-based image encryption algorithm with simple logical functions. Comput Electr Eng 54:471–483
Zhang X, Shao L, Zhao Z, Liang Z (2014) An image encryption scheme based on constructing large permutation with chaotic sequence. Comput Electr Eng 40:931–941
Zhang X, Zhao Z, Wang J (2014) Chaotic image encryption based on circular substitution box and key stream buffer. Signal Process Image Commun 29:902–913
Zhou Y, Bao L, Chen CLP (2014) A new 1D chaotic system for image encryption. Signal Process 97:172–182
Acknowledgements
The authors wish to express their sincere thanks to SASTRA University, Thanjavur for their financial support and extending infrastructural facilities to carry out this work.
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Ramalingam, B., Ravichandran, D., Annadurai, A.A. et al. Chaos triggered image encryption - a reconfigurable security solution. Multimed Tools Appl 77, 11669–11692 (2018). https://doi.org/10.1007/s11042-017-4811-x
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11042-017-4811-x