Abstract
Industry 4.0 standards have been widely adopted by most industries, encompassing remote monitoring for workplace safety, logistics, asset monitoring, quality management, and product monitoring. Real-time data, including images, must be transmitted for effective remote monitoring. However, due to cybersecurity concerns, the data must be encrypted before being sent over the internet. To address this, a real-time smart camera-based encryption method using chaos is proposed in this work. The encryption logic is created using LabVIEW and integrated into the smart camera. The four-step encryption process includes pixel shuffling, confusion, Improved logistic mapping, and diffusion. Encryption keys are generated using the user’s passcode to set the initial parameters of the logistic mapping for generating key sequences. The resulting encrypted frames are diffused with index key streams to further enhance security. The proposed method has undergone security and performance analyses, demonstrating robustness against various vulnerabilities and minimal computational time. This makes it suitable for real-time encryption scenarios in Industry 4.0.
Similar content being viewed by others
Data availability
The reference plain images were downloaded from the following source: https://sipi.usc.edu/database/misc.zip. Additionally, the real-time images generated and analyzed in the current study are available from the corresponding author on reasonable request.
References
Karakaya, B., Gülten, A., Frasca, M.: A true random bit generator based on a memristive chaotic circuit: Analysis, design and fpga implementation. Chaos Solit. Fract. 119, 143–149 (2019)
Guillén-Fernández, O., Meléndez-Cano, A., Tlelo-Cuautle, E., Núñez-Pérez, J.C., Rangel-Magdaleno, J.D.J.: On the synchronization techniques of chaotic oscillators and their fpga-based implementation for secure image transmission. PloS One 14(2), e0209618 (2019)
Wei, D., Jiang, M., Deng, Y.: A secure image encryption algorithm based on hyper-chaotic and bit-level permutation. Expert Syst. Appl. 213, 119074 (2023). https://doi.org/10.1016/j.eswa.2022.119074
Falmari, V.R., Brindha, M.: Privacy preserving cloud based secure digital locker using paillier based difference function and chaos based cryptosystem. J. Inf. Secur. Appl. 53, 102513 (2020)
El-Maksoud, A.J.A., El-Kader, A.A.A., Hassan, B.G., Rihan, N.G., Tolba, M.F., Said, L.A., Radwan, A.G., Abu-Elyazeed, M.F.: Fpga implementation of sound encryption system based on fractional-order chaotic systems. Microelectron. J. 90, 323–335 (2019)
Sikka, P., Asati, A.R., Shekhar, C.: Speed optimal fpga implementation of the encryption algorithms for telecom applications. Microprocess. Microsyst. 79, 103324 (2020)
Xian, Y., Wang, X.: Fractal sorting matrix and its application on chaotic image encryption. Inf. Sci. 547, 1154–1169 (2021)
Teng, W.X., Yang, L.: Color image encryption based on cross 2d hyperchaotic map using combined cycle shift scrambling and selecting diffusion. Nonlinear Dyn. 1(105), 1859–1876 (2021)
Wang, X., Zhao, H.: Fast image encryption algorithm based on parallel permutation-and-diffusion strategy. Multimed Tools Appl 1(79), 19005–19024 (2020)
Li, Y., Wang, C., Chen, H.: A hyper-chaos-based image encryption algorithm using pixel-level permutation and bit-level permutation. Opt. Lasers Eng. 90, 238–246 (2017)
Pareek, N., Patidar, V., Sud, K.: Cryptography using multiple one-dimensional chaotic maps. Commun. Nonlinear Sci. Numer. Simul. 10(7), 715–723 (2005)
Teng, L., Wang, X.: A bit-level image encryption algorithm based on spatiotemporal chaotic system and self-adaptive. Opt. Commun. 285(20), 4048–4054 (2012)
Xu, L., Li, Z., Li, J., Hua, W.: A novel bit-level image encryption algorithm based on chaotic maps. Opt. Lasers Eng. 78, 17–25 (2016)
Yang, T., Yang, L.-B., Yang, C.-M.: Cryptanalyzing chaotic secure communications using return maps. Phys. Lett. A 245(6), 495–510 (1998). https://doi.org/10.1016/s0375-9601(98)00425-3
Li, C., Zhang, L.Y., Ou, R., Wong, K.-W., Shu, S.: Breaking a novel colour image encryption algorithm based on chaos. Nonlinear Dyn. 70(4), 2383–2388 (2012). https://doi.org/10.1007/s11071-012-0626-5
Ding, L., Ding, Q.: A novel image encryption scheme based on 2d fractional chaotic map, DWT and 4d hyper-chaos. Electronics 9(8), 1280 (2020). https://doi.org/10.3390/electronics9081280
Wu, Y., Noonan, J. P., Agaian, S.S.: Npcr and uaci randomness tests for image encryption (2011)
Liu, L., Miao, S.: A new simple one-dimensional chaotic map and its application for image encryption. Multimedia Tools Appl. 77(16), 21445–21462 (2018). https://doi.org/10.1007/s11042-017-5594-9
Askar, S.S., Karawia, A.A., Alammar, F.S.: Cryptographic algorithm based on pixel shuffling and dynamical chaotic economic map. IET Image Process. 12(1), 158–167 (2018). https://doi.org/10.1049/iet-ipr.2016.0906
Tong, X.-J., Zhang, M., Wang, Z., Liu, Y., Ma, J.: An image encryption scheme based on a new hyperchaotic finance system. Optik 126(20), 2445–2452 (2015). https://doi.org/10.1016/j.ijleo.2015.06.018
Guo, H., Zhang, X., Zhao, X., Yu, H., Zhang, L.: Quadratic function chaotic system and its application on digital image encryption. IEEE Access 8, 55540–55549 (2020)
Skrobek, A.: Cryptanalysis of chaotic stream cipher. Phys. Lett. A 363(1–2), 84–90 (2007). https://doi.org/10.1016/j.physleta.2006.10.081
Vidhya, R., Brindha, M.: A chaos based image encryption algorithm using rubik’s cube and prime factorization process (cierpf). J. King Saud Univ. Comput. Inf. Sci. 34(5), 2000–16 (2020)
Zhou, M., Wang, C.: A novel image encryption scheme based on conservative hyperchaotic system and closed-loop diffusion between blocks. Signal Process. 171, 107484 (2020)
Song, W., Zheng, Y., Fu, C., Shan, P.: A novel batch image encryption algorithm using parallel computing. Inf. Sci. 518, 211–224 (2020)
Wu, Y., Hua, Z., Zhou, Y.: \(n\) -dimensional discrete cat map generation using Laplace expansions. IEEE Trans. Cybernet. 46(11), 2622–2633 (2016)
Lian, S., Sun, J., Wang, Z.: Security analysis of a chaos-based image encryption algorithm. Phys. A Stat. Mech. Appl. 351(2–4), 645–661 (2005). https://doi.org/10.1016/j.physa.2005.01.001
Hua, Z., Zhou, Y.: Image encryption using 2d logistic-adjusted-sine map. Inf. Sci. 339, 237–253 (2016)
Ye, Q., Zhang, Q., Liu, S., Chen, K.: A novel chaotic system based on coupled map lattice and its application in HEVC encryption. Math. Biosci. Eng. 18(6), 9410–9429 (2021). https://doi.org/10.3934/mbe.2021463
Cao, W., Mao, Y., Zhou, Y.: Designing a 2d infinite collapse map for image encryption. Signal Process. 171, 107457 (2020)
Mansouri, A., Wang, X.: A novel one-dimensional sine powered chaotic map and its application in a new image encryption scheme. Inf. Sci. 520, 46–62 (2020)
Huang, R., Han, F., Liao, X., Wang, Z., Dong, A.: A novel intermittent jumping coupled map lattice based on multiple chaotic maps. Appl. Sci. 11(9), 3797 (2021). https://doi.org/10.3390/app11093797
Liu, H., Lingfeng, H., Miao, S.: N-phase logistic chaotic sequence and its application for image encryption. IET Signal Process. 10(9), 1096–1104 (2016). https://doi.org/10.1049/iet-spr.2015.0522
NI product documentation. https://www.ni.com/docs/en-US/bundle/ni-vision-builder-for-automated-inspection-configuration-help/page/vbai_config/smartcamera_acquire.html, [Accessed 04-May-2023]
NI smart camera. https://www.artisantg.com/Test Measurement/88411-1/National-Instruments-NI-1772C-Smart-Camera. Accessed 04 May 2023
Winkler, T., Rinner, B.: Securing embedded smart cameras with trusted computing. EURASIP J. Wirel. Commun. Netw. (2010). https://doi.org/10.1155/2011/530354
Image Download Status-https. https://sipi.usc.edu/database/misc.zip. Accessed 10 Jun 2023
Ahmad, J., Hwang, S.O.: A secure image encryption scheme based on chaotic maps and affine transformation. Multimedia Tools Appl. 75(21), 13951–13976 (2015). https://doi.org/10.1007/s11042-015-2973-y
Norouzi, B., Mirzakuchaki, S., Seyedzadeh, S.M., Mosavi, M.R.: A simple, sensitive and secure image encryption algorithm based on hyper-chaotic system with only one round diffusion process. Multimedia Tools Appl. 71(3), 1469–1497 (2012)
Zhu, S., Zhu, C., Wang, W.: A new image encryption algorithm based on chaos and secure hash sha-256. Entropy (2018). https://www.mdpi.com/1099-4300/20/9/716
Jithin, K., Sankar, S.: Colour image encryption algorithm combining, arnold map, dna sequence operation, and a mandelbrot set. J. Inf. Secur. Appl. 50, 102428 (2020)
Herbadji, D., Belmeguenai, A., Derouiche, N., Liu, H.: Colour image encryption scheme based on enhanced quadratic chaotic map. IET Image Proc. 14(1), 40–52 (2019)
Hua, Z., Jin, F., Xu, B., Huang, H.: 2d logistic-sine-coupling map for image encryption. Signal Process. 149, 148–161 (2018). https://doi.org/10.1016/j.sigpro.2018.03.010
Author information
Authors and Affiliations
Contributions
All persons who meet authorship criteria are listed as authors, and all authors certify that they have participated sufficiently in the work to take public responsibility for the content, including participation in the concept, design, analysis, writing, or revision of the manuscript. CS and VRF contribute Conception, methodology, design of the study, software and writing the original draft. Dr. MB contributes Supervision, investigation, and validation.
Corresponding author
Ethics declarations
Conflict of interest
The authors declare that they have no conflict of interest to disclose. All the authors have participated in writing this paper and the work is original and is not published elsewhere. This manuscript has not been submitted to, nor is it under review at, another journal or other publishing venue.
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.
About this article
Cite this article
Sekar, C., Falmari, V.R. & Brindha, M. Smart camera with image encryption: a secure solution for real-time monitoring in Industry 4.0. J Real-Time Image Proc 20, 83 (2023). https://doi.org/10.1007/s11554-023-01338-z
Received:
Accepted:
Published:
DOI: https://doi.org/10.1007/s11554-023-01338-z