Skip to main content
Log in

Robust chaotic key stream generator for real-time images encryption

  • Special Issue
  • Published:
Journal of Real-Time Image Processing Aims and scope Submit manuscript

Abstract

In this paper, we propose a robust and compact design architecture of hardware chaotic key generator for real-time images encryption. The new proposed approach combines the perturbation technique with a non-linear switching between multiple three-dimensional continuous chaotic systems. The originality of this new scheme is that it allows a low-cost image encryption for embedded systems while still providing a good trade-off between performance and hardware resources. This pipelined architecture is particularly attractive since it provides a high security. Numerical simulations and real-time experimental results using Xilinx FPGA Virtex technology have demonstrated the feasibility and the efficiency of our secure solution and can be applied to many secure real-time embedded applications in System on Chip (SoC). Thorough experimental tests are carried out with detailed analysis, demonstrating the high security and fast encryption speed of the new scheme while still able to resist statistical and key analysis attacks.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13

Similar content being viewed by others

References

  1. Alvarez, G., Li, S.: Some basic cryptographic requirements for chaos based cryptosystems. Int. J. Bifurc. Chaos 16, 2129–2151(2006)

    Article  MathSciNet  MATH  Google Scholar 

  2. Chen, J.Y., Wong, K.W., Cheng, L.M., Shuai, J.W.: A secure communication scheme based on the phase synchronization of chaotic systems. Chaos 13, 508–514 (2003)

    Article  Google Scholar 

  3. Wong, K.W., Man, K.P., Li, S., Liao, X.: A more secure chaotic cryptographic scheme based on dynamic look-up table. Circuits Syst. Signal Process. 24, 571–584 (2005)

    Article  MathSciNet  MATH  Google Scholar 

  4. Li, S., Alvarez, G., Chen, G.: Breaking a chaos based secure communication scheme designed by an improved modulation method. Chaos Solitons Fractals 25, 109–120 (2005)

    Article  MATH  Google Scholar 

  5. Yang, T., Yang, L.B., Yang, C.M.: Breaking chaotic switching using generalized synchronization: examples. IEEE Trans. Circuits Syst. I 45, 1062–1067 (1998)

    Article  Google Scholar 

  6. Li, S., Mou, X., Cai, Y.: Improving security of a chaotic encryption approach. Phys. Lett. A 290, 127–133 (2001)

    Article  MathSciNet  Google Scholar 

  7. Solak, E.: Cryptanalysis of image encryption with compound chaotic sequence. In: International Multi-Conference on Systems, Signals and Devices, pp. 1–5 (2009)

  8. Azzaz, M.S., Tanougast, C., Sadoudi, S., Dandache, A., Monteiro, F.: Real-time image encryption based chaotic synchronized embedded cryptosystems. In: 8th IEEE, International NEWCAS Conference, pp. 61–64 (2010)

  9. Gǒtz, M., Kelber, K., Schwarz, W.: Discrete-time chaotic encryption system–Part I: statistical design approach. IEEE Trans. Circuits Syst. I 44, 963–970 (1997)

    Article  Google Scholar 

  10. Dachselt, F., Schwarz, W.: Chaos and cryptography. IEEE Trans. Circuits Syst. I 48, 1498–1509 (2001)

    Article  MathSciNet  MATH  Google Scholar 

  11. Kocarev, L., Jakimoski, G.: Pseudorandom bits generated by chaotic maps. IEEE Trans. Circuits Syst. I: Fundam. Theory Appl. 50, 123–126 (2003)

    Article  MathSciNet  Google Scholar 

  12. Azzaz, M.S., Tanougast, C., Sadoudi, S., Dandache, A.: Real-time FPGA implementation of Lorenz’s chaotic generator for ciphering telecommunications. In: Proceedings of IEEE International Circuits and Systems and TAISA Conference, pp. 1–4 (2009)

  13. Li, S., Mou, X., Cai, Y., Ji, Z., Zhang, J.: On the security of a chaotic encryption scheme: problems with computerized chaos in finite computing precision. Comput. Phys. Commun. 153, 52–58 (2003)

    Article  MathSciNet  MATH  Google Scholar 

  14. Wheeler, D.D., Matthews, R.A.J.: Supercomputer investigations of a chaotic encryption algorithm. Cryptologia 15, 140–152 (1991)

    Article  Google Scholar 

  15. Heidari-Bateni, G., McGillem, C.D.: A chaotic direct-sequence spreadspectrum communication system. IEEE Trans. Commun. 42,1524–1527 (1994)

    Article  Google Scholar 

  16. Sang, T., Wang, R., Yan, X. (1998) Perturbance-based algorithm to expand cycle length of chaotic key stream. Electron. Lett. 34:873–874

    Article  Google Scholar 

  17. Liu, S., Sun, J., Xu, Z., Liu, J.: Digital chaotic sequence generator based on coupled chaotic systems. Chin. Phys. B 18(12), Art ID 5219, (2009)

  18. Sankaran, K.S., Santhosh Krishna, B.V.: A new chaotic algorithm for image encryption and decryption of digital color images. Int. J. Inf. Educ. Technol. 1(2), 137–141 (2011)

    Article  Google Scholar 

  19. Sathyanarayana, S.V., Aswatha Kumar, M., Hari Bhat, K.N.: Symmetric key image encryption scheme with key sequences derived from random sequence of cyclic elliptic curve points. Int. J. Netw. Secur. 12(3):137–150 (2011)

    Google Scholar 

  20. Mao, Y., Chen, G., Lian, S.: A novel fast image encryption scheme based on 3D chaotic Baker maps. Int. J. Bifurc. Chaos 14(10):3613–3624 (2004)

    Article  MathSciNet  MATH  Google Scholar 

  21. Giesl, J., Behal, L., Vlcek, K.: Improving chaos image encryption speed. Int. J. Futur. Gener. Commun. Netw. 2(3), 23–35 (2009)

    Google Scholar 

  22. Ahmed, H.E.H., Kalash, H.M., Farag Allah, O.S.: Encryption efficiency analysis and security evaluation of RC6 block cipher for digital images. Int. J. Comput. Inf. Eng. 1(1), 33–39 (2007)

    Google Scholar 

  23. Ismail, I.A., Amin, M., Diab, H.: A digital image encryption algorithm based A composition of two chaotic logistic maps. Int. J. Netw. Secur. 11(1), 1–10 (2010)

    Google Scholar 

  24. Cuomo, K.M., Oppenheim, A.V., Strogatz, S.H.: Synchronization of Lorenz-based chaotic circuit with applications to communications. IEEE Trans. Circuits Syst. II Analog Digit. Signal Process. 40, 626–633 (1993)

    Google Scholar 

  25. Rössler, O.E.: An equation for continuous chaos. Phys. Lett. 57, 397–398 (1976)

    Article  Google Scholar 

  26. Kennedy, M.P.: Three steps to chaos. II. A Chua’s circuit primer. IEEE Trans. Circuits Syst. Fundam. Theory Appl. 40, 657–674 (1993)

    Article  MATH  Google Scholar 

  27. Jianquan, X., Chunhua, Y., Qing, X., Lijun, T.: An encryption algorithm based on transformed logistic map. In: IEEE Proceedings of International Conference on Networks Security, Wireless Communications and Trusted Computing, vol. 2, pp. 111–114 (2009)

  28. Fengjian, W., Yongping, Z., Tianjie, C.: Research of chaotic block cipher algorithm based on logistic map. In: IEEE Proceedings of Second International Conference on Intelligent Computation Technology and Automation, vol. 1, pp. 678–681 (2009)

  29. Press, W.H., Teukolsky, S.A., Vetterling, W.T., Flannery, B.P.: Numerical recipes in C: the art of scientific computing. Cambridge University, Press Syndicate, Cambridge (1992)

  30. Mentor Graphics: Modelsim SE User’s Manuel, Sofware, Version 6.4. Mentor Graphics (2008)

  31. Azzaz, M.S., Tanougast, C., Sadoudi, S., Bouridane, A., Dandache, A.: An FPGA Implementation of a Feed-Back Chaotic Synchronization for secure communications. In: 7th IEEE, IET International Symposium on Communication Systems, Networks and Digital Signal Processing, pp. 239–243 (2010)

  32. Xilinx: Integrated Software Environment (ISE), Version 10.1. Xilinx (2008)

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to C. Tanougast.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Azzaz, M.S., Tanougast, C., Sadoudi, S. et al. Robust chaotic key stream generator for real-time images encryption. J Real-Time Image Proc 8, 297–306 (2013). https://doi.org/10.1007/s11554-011-0219-4

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11554-011-0219-4

Keywords

Navigation