Skip to main content
Log in

Smart camera with image encryption: a secure solution for real-time monitoring in Industry 4.0

  • Research
  • Published:
Journal of Real-Time Image Processing Aims and scope Submit manuscript

Abstract

Industry 4.0 standards have been widely adopted by most industries, encompassing remote monitoring for workplace safety, logistics, asset monitoring, quality management, and product monitoring. Real-time data, including images, must be transmitted for effective remote monitoring. However, due to cybersecurity concerns, the data must be encrypted before being sent over the internet. To address this, a real-time smart camera-based encryption method using chaos is proposed in this work. The encryption logic is created using LabVIEW and integrated into the smart camera. The four-step encryption process includes pixel shuffling, confusion, Improved logistic mapping, and diffusion. Encryption keys are generated using the user’s passcode to set the initial parameters of the logistic mapping for generating key sequences. The resulting encrypted frames are diffused with index key streams to further enhance security. The proposed method has undergone security and performance analyses, demonstrating robustness against various vulnerabilities and minimal computational time. This makes it suitable for real-time encryption scenarios in Industry 4.0.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14
Fig. 15
Fig. 16
Fig. 17
Fig. 18
Fig. 19
Fig. 20
Fig. 21
Fig. 22
Fig. 23
Fig. 24
Fig. 25

Similar content being viewed by others

Data availability

The reference plain images were downloaded from the following source: https://sipi.usc.edu/database/misc.zip. Additionally, the real-time images generated and analyzed in the current study are available from the corresponding author on reasonable request.

References

  1. Karakaya, B., Gülten, A., Frasca, M.: A true random bit generator based on a memristive chaotic circuit: Analysis, design and fpga implementation. Chaos Solit. Fract. 119, 143–149 (2019)

    Article  MATH  Google Scholar 

  2. Guillén-Fernández, O., Meléndez-Cano, A., Tlelo-Cuautle, E., Núñez-Pérez, J.C., Rangel-Magdaleno, J.D.J.: On the synchronization techniques of chaotic oscillators and their fpga-based implementation for secure image transmission. PloS One 14(2), e0209618 (2019)

    Article  Google Scholar 

  3. Wei, D., Jiang, M., Deng, Y.: A secure image encryption algorithm based on hyper-chaotic and bit-level permutation. Expert Syst. Appl. 213, 119074 (2023). https://doi.org/10.1016/j.eswa.2022.119074

    Article  Google Scholar 

  4. Falmari, V.R., Brindha, M.: Privacy preserving cloud based secure digital locker using paillier based difference function and chaos based cryptosystem. J. Inf. Secur. Appl. 53, 102513 (2020)

    Google Scholar 

  5. El-Maksoud, A.J.A., El-Kader, A.A.A., Hassan, B.G., Rihan, N.G., Tolba, M.F., Said, L.A., Radwan, A.G., Abu-Elyazeed, M.F.: Fpga implementation of sound encryption system based on fractional-order chaotic systems. Microelectron. J. 90, 323–335 (2019)

    Article  Google Scholar 

  6. Sikka, P., Asati, A.R., Shekhar, C.: Speed optimal fpga implementation of the encryption algorithms for telecom applications. Microprocess. Microsyst. 79, 103324 (2020)

    Article  Google Scholar 

  7. Xian, Y., Wang, X.: Fractal sorting matrix and its application on chaotic image encryption. Inf. Sci. 547, 1154–1169 (2021)

    Article  MathSciNet  MATH  Google Scholar 

  8. Teng, W.X., Yang, L.: Color image encryption based on cross 2d hyperchaotic map using combined cycle shift scrambling and selecting diffusion. Nonlinear Dyn. 1(105), 1859–1876 (2021)

    Article  Google Scholar 

  9. Wang, X., Zhao, H.: Fast image encryption algorithm based on parallel permutation-and-diffusion strategy. Multimed Tools Appl 1(79), 19005–19024 (2020)

    Article  Google Scholar 

  10. Li, Y., Wang, C., Chen, H.: A hyper-chaos-based image encryption algorithm using pixel-level permutation and bit-level permutation. Opt. Lasers Eng. 90, 238–246 (2017)

    Article  Google Scholar 

  11. Pareek, N., Patidar, V., Sud, K.: Cryptography using multiple one-dimensional chaotic maps. Commun. Nonlinear Sci. Numer. Simul. 10(7), 715–723 (2005)

    Article  MathSciNet  MATH  Google Scholar 

  12. Teng, L., Wang, X.: A bit-level image encryption algorithm based on spatiotemporal chaotic system and self-adaptive. Opt. Commun. 285(20), 4048–4054 (2012)

    Article  Google Scholar 

  13. Xu, L., Li, Z., Li, J., Hua, W.: A novel bit-level image encryption algorithm based on chaotic maps. Opt. Lasers Eng. 78, 17–25 (2016)

    Article  Google Scholar 

  14. Yang, T., Yang, L.-B., Yang, C.-M.: Cryptanalyzing chaotic secure communications using return maps. Phys. Lett. A 245(6), 495–510 (1998). https://doi.org/10.1016/s0375-9601(98)00425-3

    Article  Google Scholar 

  15. Li, C., Zhang, L.Y., Ou, R., Wong, K.-W., Shu, S.: Breaking a novel colour image encryption algorithm based on chaos. Nonlinear Dyn. 70(4), 2383–2388 (2012). https://doi.org/10.1007/s11071-012-0626-5

    Article  MathSciNet  Google Scholar 

  16. Ding, L., Ding, Q.: A novel image encryption scheme based on 2d fractional chaotic map, DWT and 4d hyper-chaos. Electronics 9(8), 1280 (2020). https://doi.org/10.3390/electronics9081280

    Article  Google Scholar 

  17. Wu, Y., Noonan, J. P., Agaian, S.S.: Npcr and uaci randomness tests for image encryption (2011)

  18. Liu, L., Miao, S.: A new simple one-dimensional chaotic map and its application for image encryption. Multimedia Tools Appl. 77(16), 21445–21462 (2018). https://doi.org/10.1007/s11042-017-5594-9

    Article  Google Scholar 

  19. Askar, S.S., Karawia, A.A., Alammar, F.S.: Cryptographic algorithm based on pixel shuffling and dynamical chaotic economic map. IET Image Process. 12(1), 158–167 (2018). https://doi.org/10.1049/iet-ipr.2016.0906

    Article  Google Scholar 

  20. Tong, X.-J., Zhang, M., Wang, Z., Liu, Y., Ma, J.: An image encryption scheme based on a new hyperchaotic finance system. Optik 126(20), 2445–2452 (2015). https://doi.org/10.1016/j.ijleo.2015.06.018

    Article  Google Scholar 

  21. Guo, H., Zhang, X., Zhao, X., Yu, H., Zhang, L.: Quadratic function chaotic system and its application on digital image encryption. IEEE Access 8, 55540–55549 (2020)

    Article  Google Scholar 

  22. Skrobek, A.: Cryptanalysis of chaotic stream cipher. Phys. Lett. A 363(1–2), 84–90 (2007). https://doi.org/10.1016/j.physleta.2006.10.081

    Article  Google Scholar 

  23. Vidhya, R., Brindha, M.: A chaos based image encryption algorithm using rubik’s cube and prime factorization process (cierpf). J. King Saud Univ. Comput. Inf. Sci. 34(5), 2000–16 (2020)

    Google Scholar 

  24. Zhou, M., Wang, C.: A novel image encryption scheme based on conservative hyperchaotic system and closed-loop diffusion between blocks. Signal Process. 171, 107484 (2020)

    Article  Google Scholar 

  25. Song, W., Zheng, Y., Fu, C., Shan, P.: A novel batch image encryption algorithm using parallel computing. Inf. Sci. 518, 211–224 (2020)

    Article  MathSciNet  MATH  Google Scholar 

  26. Wu, Y., Hua, Z., Zhou, Y.: \(n\) -dimensional discrete cat map generation using Laplace expansions. IEEE Trans. Cybernet. 46(11), 2622–2633 (2016)

    Article  Google Scholar 

  27. Lian, S., Sun, J., Wang, Z.: Security analysis of a chaos-based image encryption algorithm. Phys. A Stat. Mech. Appl. 351(2–4), 645–661 (2005). https://doi.org/10.1016/j.physa.2005.01.001

    Article  Google Scholar 

  28. Hua, Z., Zhou, Y.: Image encryption using 2d logistic-adjusted-sine map. Inf. Sci. 339, 237–253 (2016)

    Article  Google Scholar 

  29. Ye, Q., Zhang, Q., Liu, S., Chen, K.: A novel chaotic system based on coupled map lattice and its application in HEVC encryption. Math. Biosci. Eng. 18(6), 9410–9429 (2021). https://doi.org/10.3934/mbe.2021463

    Article  MATH  Google Scholar 

  30. Cao, W., Mao, Y., Zhou, Y.: Designing a 2d infinite collapse map for image encryption. Signal Process. 171, 107457 (2020)

    Article  Google Scholar 

  31. Mansouri, A., Wang, X.: A novel one-dimensional sine powered chaotic map and its application in a new image encryption scheme. Inf. Sci. 520, 46–62 (2020)

    Article  MathSciNet  MATH  Google Scholar 

  32. Huang, R., Han, F., Liao, X., Wang, Z., Dong, A.: A novel intermittent jumping coupled map lattice based on multiple chaotic maps. Appl. Sci. 11(9), 3797 (2021). https://doi.org/10.3390/app11093797

    Article  Google Scholar 

  33. Liu, H., Lingfeng, H., Miao, S.: N-phase logistic chaotic sequence and its application for image encryption. IET Signal Process. 10(9), 1096–1104 (2016). https://doi.org/10.1049/iet-spr.2015.0522

    Article  Google Scholar 

  34. NI product documentation. https://www.ni.com/docs/en-US/bundle/ni-vision-builder-for-automated-inspection-configuration-help/page/vbai_config/smartcamera_acquire.html, [Accessed 04-May-2023]

  35. NI smart camera. https://www.artisantg.com/Test Measurement/88411-1/National-Instruments-NI-1772C-Smart-Camera. Accessed 04 May 2023

  36. Winkler, T., Rinner, B.: Securing embedded smart cameras with trusted computing. EURASIP J. Wirel. Commun. Netw. (2010). https://doi.org/10.1155/2011/530354

    Article  Google Scholar 

  37. Image Download Status-https. https://sipi.usc.edu/database/misc.zip. Accessed 10 Jun 2023

  38. Ahmad, J., Hwang, S.O.: A secure image encryption scheme based on chaotic maps and affine transformation. Multimedia Tools Appl. 75(21), 13951–13976 (2015). https://doi.org/10.1007/s11042-015-2973-y

    Article  Google Scholar 

  39. Norouzi, B., Mirzakuchaki, S., Seyedzadeh, S.M., Mosavi, M.R.: A simple, sensitive and secure image encryption algorithm based on hyper-chaotic system with only one round diffusion process. Multimedia Tools Appl. 71(3), 1469–1497 (2012)

    Article  Google Scholar 

  40. Zhu, S., Zhu, C., Wang, W.: A new image encryption algorithm based on chaos and secure hash sha-256. Entropy (2018). https://www.mdpi.com/1099-4300/20/9/716

  41. Jithin, K., Sankar, S.: Colour image encryption algorithm combining, arnold map, dna sequence operation, and a mandelbrot set. J. Inf. Secur. Appl. 50, 102428 (2020)

    Google Scholar 

  42. Herbadji, D., Belmeguenai, A., Derouiche, N., Liu, H.: Colour image encryption scheme based on enhanced quadratic chaotic map. IET Image Proc. 14(1), 40–52 (2019)

    Article  Google Scholar 

  43. Hua, Z., Jin, F., Xu, B., Huang, H.: 2d logistic-sine-coupling map for image encryption. Signal Process. 149, 148–161 (2018). https://doi.org/10.1016/j.sigpro.2018.03.010

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Contributions

All persons who meet authorship criteria are listed as authors, and all authors certify that they have participated sufficiently in the work to take public responsibility for the content, including participation in the concept, design, analysis, writing, or revision of the manuscript. CS and VRF contribute Conception, methodology, design of the study, software and writing the original draft. Dr. MB contributes Supervision, investigation, and validation.

Corresponding author

Correspondence to M. Brindha.

Ethics declarations

Conflict of interest

The authors declare that they have no conflict of interest to disclose. All the authors have participated in writing this paper and the work is original and is not published elsewhere. This manuscript has not been submitted to, nor is it under review at, another journal or other publishing venue.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Sekar, C., Falmari, V.R. & Brindha, M. Smart camera with image encryption: a secure solution for real-time monitoring in Industry 4.0. J Real-Time Image Proc 20, 83 (2023). https://doi.org/10.1007/s11554-023-01338-z

Download citation

  • Received:

  • Accepted:

  • Published:

  • DOI: https://doi.org/10.1007/s11554-023-01338-z

Keywords

Navigation