scholarly journals Four dimensional hyperchaotic communication system based on dynamic feedback synchronization technique for image encryption systems

Author(s):  
Hayder Mazin Makki Alibraheemi ◽  
Qais Al-Gayem ◽  
Ehab AbdulRazzaq Hussein

<span>This paper presents the design and simulation of a hyperchaotic communication system based on four dimensions (4D) Lorenz generator. The synchronization technique that used between the master/transmitter and the slave/receiver is based on dynamic feedback modulation technique (DFM). The mismatch error between the master dynamics and slave dynamics are calculated continuously to maintain the sync process. The information signal (binary image) is masked (encrypted) by the hyperchaotic sample x of Lorenz generator. The design and simulation of the overall system are carried out using MATLAB Simulink software. The simulation results prove that the system is suitable for securing the plain-data, in particular the image data with a size of 128×128 pixels within 0.1 second required for encryption, and decryption in the presence of the channel noise. The decryption results for gray and colored images show that the system can accurately decipher the ciphered image, but with low level distortion in the image pixels due to the channel noise. These results make the proposed cryptosystem suitable for real time secure communications.</span>

The domain of image signal processing, image compression is the significant technique, which is mainly invented to reduce the redundancy of image data in order to able to transmit the image pixels with high quality resolution. The standard image compression techniques like losseless and lossy compression technique generates high compression ratio image with efficient storage and transmission requirement respectively. There are many image compression technique are available for example JPEG, DWT and DCT based compression algorithms which provides effective results in terms of high compression ratio with clear quality image transformation. But they have more computational complexities in terms of processing, encoding, energy consumption and hardware design. Thus, bringing out these challenges, the proposed paper considers the most prominent research papers and discuses FPGA architecture design and future scope in the state of art of image compression technique. The primary aim to investigate the research challenges toward VLSI designing and image compression. The core section of the proposed study includes three folds viz standard architecture designs, related work and open research challenges in the domain of image compression.


2020 ◽  
Vol 30 (05) ◽  
pp. 2050075
Author(s):  
Baoju Chen ◽  
Simin Yu ◽  
Ping Chen ◽  
Liangshan Xiao ◽  
Jinhu Lü

In this paper, a Virtex-7-based video chaotic secure communication scheme is investigated. First, the network sending and receiving controller Intellectual Property (IP) cores are designed. Next, the chaotic encryption and decryption IP cores are implemented using fixed-point algorithm, pipeline operation, and state machine control. Thus, video capturing, video displaying, network sending, network receiving, chaotic encrypting, and chaotic decrypting can be achieved via IP core integration design. An improved 7D chaotic stream cipher algorithm for resisting divide-and-conquer attack is then designed and realized on a Virtex-7 high-end FPGA platform. Hardware experimental results are also given to verify the feasibility of the scheme.


2004 ◽  
Vol 14 (07) ◽  
pp. 2477-2491 ◽  
Author(s):  
SAMUEL BOWONG ◽  
F. M. MOUKAM KAKMENI ◽  
RODOUMTA KOINA

In this Letter, we propose a new synchronization principle for a class of Lur'e systems. We design, using only a single scalar output, a possible class of observers to detect whether two dynamical systems exhibit identical oscillations. The proposed method is then applied to suggest a means to secure communications. The transmitter contains a chaotic oscillator with an input that is modulated by the information signal. The receiver is a copy of the transmitter driven by a synchronization signal. The advantage of this method over the existing one is that the synchronization time is explicitly computed. An illustrative example of the cubic Chua's circuit is given to show the effectiveness of the proposed approach.


2018 ◽  
Vol 1 (1) ◽  
pp. 6
Author(s):  
Rehan Shams ◽  
Fozia Hanif Khan ◽  
Umair Jillani ◽  
M. Umair

A new structure to develop 64-bit RSA encryption engine on FPGA is being presented in this paper that can be used as a standard device in the secured communication system. The RSA algorithm has three parts i.e. key generation, encryption and decryption. This procedure also requires random generation of prime numbers, therefore, we are proposing an efficient fast Primality testing algorithm to meet the requirement for generating the key in RSA algorithm. We use right-to-left-binary method for the exponent calculation. This reduces the number of cycles enhancing the performance of the system and reducing the area usage of the FPGA. These blocks are coded in Verilog and are synthesized and simulated in Xilinx 13.2 design suit.


2020 ◽  
Author(s):  
Neelkumar Patel ◽  
Jay Sukhadiya ◽  
Jinan Fiaidhi

<div>Secure communications is when two entities communicate with each other and the communication is completely secured from a third party or the intruder. This type of communication process can be achieved using encryption and decryption mechanism. The implementation of Email encryption is performed with the intension of showing the working of encryption and decryption mechanism. This web application allows user to send an encrypted electronic-mail to any domain and it can be only decrypted using the receiver’s private key. Whereas, messaging android application was developed to replicate existing WhatsApp application to see whether, it performs end-to-end encryption or it’s not what it seems. The application allows users to securely communicate with each other via performing actual end-to-end encryption.</div>


Author(s):  
Vladimir Ponomarenko ◽  
Elena Navrotskaya ◽  
Danil Kul’minskii ◽  
Mikhail Prokhorov

Introduction: Communication systems based on the use of dynamical chaos have a number of positive features. Dynamical chaoshas the properties of random processes, which allows systems based on it to ensure the information transmission confidentiality.However, a quantitative security assessment of such systems is a complicated problem, since the methods for evaluating cryptographicstrength are well developed only for the classical encryption algorithms. Purpose: Development of a method for quantitative estimationof confidentiality of a binary signal hidden transmission in a communication system based on a chaotic time-delay oscillator withswitchable delay time. Results: A method is proposed for estimating the confidentiality of a binary information signal transmissionin a communication system using a chaotic time-delay oscillator with switchable delay time as a transmitter. The method is based onestimating the power of the key space for the chaotic communication system under study. We have considered the cases when sometransmitter parameters are known, and the most general case when all the transmitter parameters are unknown. A communicationsystem based on dynamical chaos may have a much higher confidentiality than the classical cryptographic algorithm using a cipher witha key length of 56 bits, but is significantly inferior in terms of cryptographic strength to a cipher with a key length of 128 bits. Practicalrelevance: The proposed method allows us to obtain a quantitative estimation of confidentiality of communication systems based ondynamical chaos, and compare it with the known strength of classical cryptographic algorithms.


2019 ◽  
Vol 8 (4) ◽  
pp. 10408-10420

Image Steganography isa method of concealment secret information, by embedding it into a video, image. It is one in every of the methods employed to protect secret or sensitive information from malicious attacks. Here we are consider secure image data transmission through secure nano-scale communication circuit, Quantum-dot cellular automata (QCA), could be a new paradigm that replaces CMOS circuits by victimization the charge configuration. QCA is used to design the modern digital circuits at the Nanoscale. Thus, using QCA to implement the proposed design reduces 28.33% of area compared with CMOS implementation. When we consider the features of QCA nanotechnology, it performs well low power dissipation and nano scale size at high frequency is exploring as a emerging technology to replace CMOS based systems. The technology behind the QCA Feynman, Toffoli, and Fredkin universal reversible logic gates circuits in the base are implemented and analyzed. In order to optimize the design QCA technology extend up to 5-input majority gates and use a F-Gate. We are proposed reversible XOR gate like Feynman gate as an Encoder/Decoder circuit. Further consider the benifits of QCA the proposed circuit is encoder circuit is also used for reverse computing to encode the data and to use the LSB technique in the image pixels for secure nano communication circuit. We estimated the area and latency of the QCA circuit


2021 ◽  
Author(s):  
paavni gaur

Abstract An Image Encryption and Decryption Using AES (Advance Encryption Standard) Algorithm is proposed in the project. Due to increasing use of image in various field, it is very important to protect the confidential image data from unauthorized access. The design uses the iterative approach with block size of 128 bit and key size of 128, 192 or 256 bit. The numbers of round for key size of 256 bits is 14, for 128 bits is 10 and for 192 bits is 12. As secret key increases the security as well as complexity of the cryptography algorithms. In this paper , an algorithm in which the image is an input to AES Encryption to get the encrypted image and then input it to AES Decryption to get the original image is proposed and explained which will further be implemented by me.The paper shows the study in which a system could be used for effective image data encryption and key generation in diversified application areas, where sensitive and confidential data needs to be transmitted along with the image.


Telecom ◽  
2020 ◽  
Vol 1 (3) ◽  
pp. 283-296
Author(s):  
Lazaros Moysis ◽  
Christos Volos ◽  
Ioannis Stouboulos ◽  
Sotirios Goudos ◽  
Serdar Çiçek ◽  
...  

In this study, a novel two-parameter, three-dimensional chaotic system is constructed. The system has no linear terms and its equilibrium is a line, so it is a system with hidden attractors. The system is first studied by computation of its bifurcation diagrams and diagram of Lyapunov exponents. Then, the system is applied to two encryption related problems. First, the problem of secure communications is considered, using the symmetric chaos shift keying modulation method. Here, the states of the chaotic system are combined with a binary information signal in order to mask it, safely transmit it through a communication channel, and successfully reconstruct the information at the receiver end. In the second problem, the states of the system are utilized to design a simple rule to generate a bit sequence that possesses random properties, and is thus suitable for encryption related applications. For both applications, simulations are performed through Matlab to verify the soundness of the designs.


Sign in / Sign up

Export Citation Format

Share Document