scholarly journals FPGA-based Chaotic Cryptosystem by Using Voice Recognition as Access Key

Electronics ◽  
2018 ◽  
Vol 7 (12) ◽  
pp. 414 ◽  
Author(s):  
Eduardo Rodríguez-Orozco ◽  
Enrique García-Guerrero ◽  
Everardo Inzunza-Gonzalez ◽  
Oscar López-Bonilla ◽  
Abraham Flores-Vergara ◽  
...  

A new embedded chaotic cryptosystem is introduced herein with the aim to encrypt digital images and performing speech recognition as an external access key. The proposed cryptosystem consists of three technologies: (i) a Spartan 3E-1600 FPGA from Xilinx; (ii) a 64-bit Raspberry Pi 3 single board computer; and (iii) a voice recognition chip manufactured by Sunplus. The cryptosystem operates with four embedded algorithms: (1) a graphical user interface developed in Python language for the Raspberry Pi platform, which allows friendly management of the system; (2) an internal control entity that entails the start-up of the embedded system based on the identification of the key access, the pixels-entry of the image to the FPGA to be encrypted or unraveled from the Raspberry Pi, and the self-execution of the encryption/decryption of the information; (3) a chaotic pseudo-random binary generator whose decimal numerical values are converted to an 8-bit binary scale under the VHDL description of m o d ( 255 ) ; and (4) two UART communication algorithms by using the RS-232 protocol, all of them described in VHDL for the FPGA implementation. We provide a security analysis to demonstrate that the proposed cryptosystem is highly secure and robust against known attacks.

2021 ◽  
Vol 1 ◽  
pp. 24-31
Author(s):  
S.I. Alpert ◽  
◽  
M.I. Alpert ◽  
P.Yu. Katin ◽  
N.O. Litvinova ◽  
...  

Due to modern microcomputers and platforms based on microprocessors such as, for example, Raspberry Pi, Orange Pi, Nano Pi, Rock Pi, Banana Pi, Asus Tinker Board – the development of prototypes of em-bedded systems is possible in a «design» mode. The software part is implemented on the basis of operat-ing systems and standard technologies based on well-known programming languages such as C / C++, Python, C#, Java, etc. In such case the control channel for the embedded system can be either imple-mented via a web service separated by a communication channel or controlled independently. It is im-portant to understand that creating an embedded system on a standard platform is much more expensive than buying a ready-made mass-produced device with the same functionality. Therefore, it makes sense to use platforms like the Raspberry Pi mainly for individual artificial devices. If it is necessary to build a project of embedded systems and there is a problem with choosing a hardware platform for the client side, then currently there is a wide range of boards and solutions for building an efficient and inexpen-sive system using ready-made modules. The number of expansion cards and various sensors, video cam-eras, internet connection via Ethernet, Wi-Fi and Bluetooth provides a wide range of opportunities for building almost any solution based on this component base. The foundation can be made within a small budget, with minimal time spent, using large blocks and ready-made libraries for programming embed-ded systems. This article presents the results of research and development work on the creation of a software and hardware infrastructure of a terrestrial platform with the elements of artificial intelligence. Based on the actual results of the research, a deployment diagram and a component diagram of such an infrastructure have been constructed.


Human footprint is considered has the latest traits that could be used to detect an individual’s identity computes parameters. The main objective is to establish the ability of image processing algorithms on a small computing platform. We designed the embedded system which reads and recognizes a person their identity. The major aim of the paper briefs the characteristics of Patient’s data, requirements and Report behind implementing a real-time base system. The person’s foot image is segmented and its key points are located. The foot is aligned and edited, cropped as per the key points and is developed and resized. These methods are used for recognizing and subdividing. Color place a major role in multiple application for footprint detection. This project is focused on lightweight technique were mainly used due to the drawback of real time based applications and Raspberry Pi capabilities


Author(s):  
Noor A. Hussein ◽  
Mohamed Ibrahim. Shujaa

The congestion of road traffic is one of the most problems facing the ambulance transportation to provide fast healthcare service for patient. In this work, ambulance tracking with messages transfer system has been designed and implemented such that a central monitoring and tracking unit can observe ambulance using MQTT IoT protocol. Where each vehicle is occupied with an intelligent embedded system (Raspberry Pi) unit. When an ambulance is being in the road, it will communicate with other vehicle or road traffic by means of CoAP IoT protocol as a direct device to device communication. The proposed system has been designed such that driver use voice chat and the system are completely hand free. The voice message is being transfer into text by using speech recognition based Google API library, and then the received text message is converted again to speech by using text to speech algorithm. An encryption–decryption process-based stream cipher has been used. The message between IoT nodes has been encrypted using One Time Pad (OTP) and DNA computing. Furthermore, the required key sequence was generated using a linear feedback shift register (LFSR) as a pseudo number key generator. This key sequence was combined to generate a unique key for each message.


2021 ◽  
Vol 11 (3) ◽  
pp. 1331
Author(s):  
Mohammad Hossein Same ◽  
Gabriel Gleeton ◽  
Gabriel Gandubert ◽  
Preslav Ivanov ◽  
Rene Jr Landry

By increasing the demand for radio frequency (RF) and access of hackers and spoofers to low price hardware and software defined radios (SDR), radio frequency interference (RFI) became a more frequent and serious problem. In order to increase the security of satellite communication (Satcom) and guarantee the quality of service (QoS) of end users, it is crucial to detect the RFI in the desired bandwidth and protect the receiver with a proper mitigation mechanism. Digital narrowband signals are so sensitive into the interference and because of their special power spectrum shape, it is hard to detect and eliminate the RFI from their bandwidth. Thus, a proper detector requires a high precision and smooth estimation of input signal power spectral density (PSD). By utilizing the presented power spectrum by the simplified Welch method, this article proposes a solid and effective algorithm that can find all necessary interference parameters in the frequency domain while targeting practical implantation for the embedded system with minimum complexity. The proposed detector can detect several multi narrowband interferences and estimate their center frequency, bandwidth, power, start, and end of each interference individually. To remove multiple interferences, a chain of several infinite impulse response (IIR) notch filters with multiplexers is proposed. To minimize damage to the original signal, the bandwidth of each notch is adjusted in a way that maximizes the received signal to noise ratio (SNR) by the receiver. Multiple carrier wave interferences (MCWI) is utilized as a jamming attack to the Digital Video Broadcasting-Satellite-Second Generation (DVB-S2) receiver and performance of a new detector and mitigation system is investigated and validated in both simulation and practical tests. Based on the obtained results, the proposed detector can detect a weak power interference down to −25 dB and track a hopping frequency interference with center frequency variation speed up to 3 kHz. Bit error ratio (BER) performance shows 3 dB improvement by utilizing new adaptive mitigation scenario compared to non-adaptive one. Finally, the protected DVB-S2 can receive the data with SNR close to the normal situation while it is under the attack of the MCWI jammer.


2021 ◽  
Author(s):  
Srivatsan Krishnan ◽  
Behzad Boroujerdian ◽  
William Fu ◽  
Aleksandra Faust ◽  
Vijay Janapa Reddi

AbstractWe introduce Air Learning, an open-source simulator, and a gym environment for deep reinforcement learning research on resource-constrained aerial robots. Equipped with domain randomization, Air Learning exposes a UAV agent to a diverse set of challenging scenarios. We seed the toolset with point-to-point obstacle avoidance tasks in three different environments and Deep Q Networks (DQN) and Proximal Policy Optimization (PPO) trainers. Air Learning assesses the policies’ performance under various quality-of-flight (QoF) metrics, such as the energy consumed, endurance, and the average trajectory length, on resource-constrained embedded platforms like a Raspberry Pi. We find that the trajectories on an embedded Ras-Pi are vastly different from those predicted on a high-end desktop system, resulting in up to $$40\%$$ 40 % longer trajectories in one of the environments. To understand the source of such discrepancies, we use Air Learning to artificially degrade high-end desktop performance to mimic what happens on a low-end embedded system. We then propose a mitigation technique that uses the hardware-in-the-loop to determine the latency distribution of running the policy on the target platform (onboard compute on aerial robot). A randomly sampled latency from the latency distribution is then added as an artificial delay within the training loop. Training the policy with artificial delays allows us to minimize the hardware gap (discrepancy in the flight time metric reduced from 37.73% to 0.5%). Thus, Air Learning with hardware-in-the-loop characterizes those differences and exposes how the onboard compute’s choice affects the aerial robot’s performance. We also conduct reliability studies to assess the effect of sensor failures on the learned policies. All put together, Air Learning enables a broad class of deep RL research on UAVs. The source code is available at: https://github.com/harvard-edge/AirLearning.


Electronics ◽  
2021 ◽  
Vol 10 (4) ◽  
pp. 469
Author(s):  
Hyun Woo Oh ◽  
Ji Kwang Kim ◽  
Gwan Beom Hwang ◽  
Seung Eun Lee

Recently, advances in technology have enabled embedded systems to be adopted for a variety of applications. Some of these applications require real-time 2D graphics processing running on limited design specifications such as low power consumption and a small area. In order to satisfy such conditions, including a specific 2D graphics accelerator in the embedded system is an effective method. This method reduces the workload of the processor in the embedded system by exploiting the accelerator. The accelerator assists the system to perform 2D graphics processing in real-time. Therefore, a variety of applications that require 2D graphics processing can be implemented with an embedded processor. In this paper, we present a 2D graphics accelerator for tiny embedded systems. The accelerator includes an optimized line-drawing operation based on Bresenham’s algorithm. The optimized operation enables the accelerator to deal with various kinds of 2D graphics processing and to perform the line-drawing instead of the system processor. Moreover, the accelerator also distributes the workload of the processor core by removing the need for the core to access the frame buffer memory. We measure the performance of the accelerator by implementing the processor, including the accelerator, on a field-programmable gate array (FPGA), and ascertaining the possibility of realization by synthesizing using the 180 nm CMOS process.


Author(s):  
Yong Luo ◽  
Shuai-Bing Qin ◽  
Dong-Shu Wang

With the continuous development of engineering education accreditation in China, its concept has had a profound impact on the reform of various majors in higher education. Using the idea of engineering education accreditation, this paper discusses the main problems in the implementation of embedded experimental courses of electronic information majors and proposes related education reform programs. Taking the embedded system experiment course of the automation major and embedded system major of Zhengzhou University as examples, the course has carried out research on the aspects of teaching model, experimental course content, scientific assessment method, etc., and proposed corresponding improvement methods to achieve better effect. The practical operation result has proved that the embedded system experiment course of the automation major and embedded system major improved the students’ ability and met the requirements of professional accreditation.


2012 ◽  
Vol 460 ◽  
pp. 266-270
Author(s):  
Xing Wu Sun ◽  
Yu Chen ◽  
Ai Fei Wang

According to the shortcomings of large volume and high cost about the plate recognition system, an embedded plate recognition system is developed based on the ARM11 processor at lower costs. Taking the embedded Linux system as the software development platform, the system uses graphical user interface to operate and control the machine. Using CMOS camera system as image acquisition device, the system adopts HSV algorithm to realize the image classification on the platform of the embedded plate recognition system. The experimental results show that the embedded system runs stably, can realize the plate classification by color, and has the advantages of small size, low power consumption, convenience for using and so on. The embedded system provides a new thought for plate recognition.


2014 ◽  
Vol 543-547 ◽  
pp. 2209-2212
Author(s):  
Chun Hua Xiong ◽  
You Jie Zhou ◽  
Gao Jun An ◽  
Chang Bo Lu

Based on the existing contour tracing image recognition technology, combining the embedded system technology and the computer storage control technology, the author makes an integrated design, adopts the image processing chip, USB controller, the imaging sensor and other hardware circuits and develops an intelligent image system. The system can make real-time monitoring the size and change of millimeter-sized irregular target objects. Its applicable value in the fields such as intelligent monitoring of oil equipment, medical imaging and criminal investigation is very high.


Sign in / Sign up

Export Citation Format

Share Document