DOI QR코드

DOI QR Code

Hardware Software Co-Simulation of the Multiple Image Encryption Technique Using the Xilinx System Generator

  • Panduranga, H.T. (Dept. of Studies in Electronics, University of Mysore, Hemagangothri PG Center-Hassan) ;
  • Naveen, Kumar S.K. (Dept. of Studies in Electronics, University of Mysore, Hemagangothri PG Center-Hassan) ;
  • Sharath, Kumar H.S. (Dept. of Studies in Electronics, University of Mysore, Hemagangothri PG Center-Hassan)
  • Received : 2013.01.21
  • Accepted : 2013.06.20
  • Published : 2013.09.30

Abstract

Hardware-Software co-simulation of a multiple image encryption technique shall be described in this paper. Our proposed multiple image encryption technique is based on the Latin Square Image Cipher (LSIC). First, a carrier image that is based on the Latin Square is generated by using 256-bits of length key. The XOR operation is applied between an input image and the Latin Square Image to generate an encrypted image. Then, the XOR operation is applied between the encrypted image and the second input image to encrypt the second image. This process is continues until the nth input image is encrypted. We achieved hardware co-simulation of the proposed multiple image encryption technique by using the Xilinx System Generator (XSG). This encryption technique is modeled using Simulink and XSG Block set and synthesized onto Virtex 2 pro FPGA device. We validated our proposed technique by using the hardware software co-simulation method.

Keywords

References

  1. Zhengjun Liu, She Li, Wei Liu, Yanhua Wang, Shutian Liu, "Image encryption algorithm by using fractional Fourier transform and pixel scrambling operation based on double random phase encoding", Optics and Lasers in Engineering 51 (2013) 8-14. https://doi.org/10.1016/j.optlaseng.2012.08.004
  2. Nanrun Zhou, XingbinLiu, YeZhang, YixianYang, "Image encryption scheme based on fractional Mellin transform and phase retrieval technique in fractional Fourier domain", Optics & Laser Technology 47 (2013) 341-346. https://doi.org/10.1016/j.optlastec.2012.08.033
  3. Guodong Ye, Kwok-WoWong, "An image encryption scheme based on time-delay and hyperchaotic system", Nonlinear Dyn (2013) 259-267.
  4. The Duc Kieu, Zhi-Hui Wang, Chin-Chen Chang, and Ming-Chu Li, "A Sudoku Based Wet Paper Hiding Scheme", International Journal of Smart Home, 2009, 1-12.
  5. Chin-Chen Chang, Pei-Yu Lin, Zhi Hui Wang and Ming Chu Li, "A Sudoku-based Secret Image Sharing Scheme with Reversibility", Journal Of Communications, Vol. 5, No. 1, January 2010, 5-12.
  6. Roshan Shetty B R, Rohith J, Mukund V, Rohan Honwade, Shanta Rangaswamy, "International Conference on Advances in Recent Technologies in Communication and Computing", 2009.
  7. Yue Wu, Yicong Zhou, Joseph P. Noonan, Sos Agaian, C. L. Philip Chen, "A Novel Latin Square Image Cipher", IEEE transactions on information forensics and security, 2012.
  8. Narendra Singh, Aloka Sinha, "Chaos based multiple image encryption using multiple canonical transforms", Optics & Laser Technology 42 (2010) 724-731. https://doi.org/10.1016/j.optlastec.2009.11.016
  9. Xiaogang Wang, Daomu Zhao, "Multiple-image encryption based on nonlinear amplitude-truncation and phase-truncation in Fourier domain", Optics Communications 284 (2011) 148-152. https://doi.org/10.1016/j.optcom.2010.09.034
  10. Xiaopeng Deng, Daomu Zhao, "Multiple-image encryption using phase retrieve algorithm and intermodulation in Fourier domain", Optics & Laser Technology 44 (2012) 374-377. https://doi.org/10.1016/j.optlastec.2011.07.019
  11. M.Z. He, L.Z. Cai, Q. Liu, X.C. Wang, X.F. Meng, "Multiple image encryption and watermarking by random phase matching", Optics Communications 247 (2005) 29-37. https://doi.org/10.1016/j.optcom.2004.11.034
  12. Xiaogang Wang, Daomu Zhao, "Fully phase multiple-image encryption based on superposition principle and the digital holographic technique", Optics Communications 285 (2012) 4280-4284. https://doi.org/10.1016/j.optcom.2012.06.061
  13. Haozhi Zhao, JuanLiu, JiaJia, NanZhu, JinghuiXie, YongtianWang, "Multiple-image encryption based on position multiplexing of Fresnel phase", Optics Communications 286 (2013) 85-90. https://doi.org/10.1016/j.optcom.2012.08.056
  14. Qu Wang, Qing Guo, Jinyun Zhou, "Double image encryption based on linear blend operation and random phase encoding in fractional Fourier domain", Optics Communications 285 (2012) 4317-4323. https://doi.org/10.1016/j.optcom.2012.07.033
  15. Zhi Zhong, Jie Chang, Mingguang Shan, Bengong Hao, "Double image encryption using double pixel scrambling and random phase encoding", Optics Communications 285 (2012) 584-588. https://doi.org/10.1016/j.optcom.2011.11.025
  16. Alba M. Sanchez G., Ricardo Alvarez G., Sully Sanchez G, "Architecture for filtering images using Xilinx System Generator", International journal of mathematics and computers in simulation, Issue 2, Volume 1, 2007, 101-107.
  17. Ana Toledo Moreo, Pedro Navarro Lorente, F. Soto Valles, Juan Suardiaz Muro, Carlos Fernandez Andres, "Experiences on developing computer vision hardware algorithms using Xilinx system generator", Microprocessors and Microsystems 29 (2005) 411-419. https://doi.org/10.1016/j.micpro.2004.11.002
  18. S. Allin Christe, Mr.M.Vignesh, A.Kandaswamy, "An efficient fpga implementation of MRI Image filtering and tumor Characterization using Xilinx System Generator", International Journal of VLSI design & Communication Systems (VLSICS) Vol.2, No.4, December 2011, 95-109. https://doi.org/10.5121/vlsic.2011.2409
  19. V.Elamaran, Angam Praveen, Medapati Srinivasa Reddy, Lanka Venkata Aditya, Kunta Suman, "FPGA implementation of Spatial Image Filters using Xilinx System Generator", Procedia Engineering 38 (2012) 2244-2249. https://doi.org/10.1016/j.proeng.2012.06.270

Cited by

  1. A high quality compiler tool for application-specific instruction-set processors with library and parallel supports vol.76, pp.4, 2017, https://doi.org/10.1007/s11042-015-2653-y
  2. Ubi-RKE: A Rhythm Key Based Encryption Scheme for Ubiquitous Devices vol.2014, 2014, https://doi.org/10.1155/2014/683982
  3. Data hiding based on overlapped pixels using hamming code vol.75, pp.23, 2016, https://doi.org/10.1007/s11042-014-2355-x
  4. DRM cloud framework to support heterogeneous digital rights management systems vol.75, pp.22, 2016, https://doi.org/10.1007/s11042-015-2662-x
  5. Human-Robot Interaction Learning Using Demonstration-Based Learning and Q-Learning in a Pervasive Sensing Environment vol.9, pp.11, 2013, https://doi.org/10.1155/2013/782043
  6. Design of IP Camera Access Control Protocol by Utilizing Hierarchical Group Key vol.7, pp.3, 2015, https://doi.org/10.3390/sym7031567