Design and Enhancing Security Performance of Image Cryptography System Based on Fixed Point Chaotic Maps Stream Ciphers in FPGA

Main Article Content

Ahmed Amir Salih
https://orcid.org/0009-0005-4928-4635
Zaid Abdulsattar Abdulrazaq
https://orcid.org/0000-0002-9301-1862
Harith Ghanim Ayoub
https://orcid.org/0000-0002-5107-9869

Abstract

Within this document, a novel system for image cryptography design utilizing fixed-point stream cipher chaotic maps is proposed. The system consists of fixed chaotic maps combined with generated 32-bit Pseudo Number (PN) all implemented using Field Programmable Gate Arrays (FPGA) through the Xilinx System Generator (XSG) environment. The most common chaotic maps-based cryptography involved in this work are Logistic, Lozi and Tent. The parameters of each type determine the key space required for decrypt the original pixel of plain image, Logistic map has one parameter r, Lozi has two parameters α and β, Tent has one parameter µ. The main idea was to combine another parameter pseudo number (PN) to increase key space, which is the main measure of security performance against brute force attack.  An innovative pseudorandom bit generator (PRBG) referred to as XORing these chaotic maps were called the fixed-point cascade chaotic maps-PRBG (FPCCM-PRBG), with an eight least significant bits of 32-bit pseudo number generator (PN) this method is known as fixed point cascade chaotic maps-PNBG (FPCCM-PRNBG). The randomness of the generated keys was evaluated using the National Institute of Standards and Technology (NIST) tests, including frequency, Frequency (Mono bit) and runs test. The security performance assessed through histogram analysis, correlation coefficient analysis, information entropy, pixel changing rate, and structural similarity. Xilinx system generator is an effective tool embedded in MATLAB/SIMULINK environment utilized for the work implementation. The system implemented using co-simulation method on the ZYNQ 7000 SoC ZC702 Evaluation Kit, with a key space of 2288 and a throughput of 269. 32 MB/sec.

Article Details

How to Cite
1.
Design and Enhancing Security Performance of Image Cryptography System Based on Fixed Point Chaotic Maps Stream Ciphers in FPGA. Baghdad Sci.J [Internet]. 2024 May 25 [cited 2024 Dec. 27];21(5(SI):1754. Available from: https://bsj.uobaghdad.edu.iq/index.php/BSJ/article/view/10521
Section
Special Issue - (ICCDA) International Conference on Computing and Data Analytics

How to Cite

1.
Design and Enhancing Security Performance of Image Cryptography System Based on Fixed Point Chaotic Maps Stream Ciphers in FPGA. Baghdad Sci.J [Internet]. 2024 May 25 [cited 2024 Dec. 27];21(5(SI):1754. Available from: https://bsj.uobaghdad.edu.iq/index.php/BSJ/article/view/10521
Crossref
1
Scopus
2
Crossref Logo
Leonardo Palacios-Luengas, Reyna Carolina Medina-Ramírez, Ricardo Marcelín-Jiménez, Enrique Rodriguez-Colina, Francisco R. Castillo-Soria, Rubén Vázquez-Medina (2024)
Enhanced Chaotic Pseudorandom Number Generation Using Multiple Bernoulli Maps with Field Programmable Gate Array Optimizations. Information, 15(11), 667.
Scopus Logo
G.Ayoub H. (2024-11-01)
Unveiling robust security: Chaotic maps for frequency hopping implementation in FPGA. Ain Shams Engineering Journal, 15(11).

References

Malik MGA, Bashir Z, Iqbal N, Imtiaz MdA. Color Image Encryption Algorithm Based on Hyper-Chaos and DNA Computing. IEEE Access. 2020; 8: 88093–107. https://doi.org/ 10.1109/ACCESS.2020.2990170.

Shengtao G, Tao W, Shida W, Xuncai Z, Ying N. A Novel Image Encryption Algorithm Based on Chaotic Sequences and Cross-Diffusion of Bits. IEEE Photonics J. 2021 Feb; 13(1): 1–15. https://doi.org/10.1109/JPHOT.2020.3044222.

Tanveer M, Shah T, Rehman A, Ali A, Siddiqui GF, Saba T, et al. Multi-Images Encryption Scheme Based on 3D Chaotic Map and Substitution Box. IEEE Access. 2021; 9: 73924–37. https://doi.org/10.1109/ACCESS.2021.3081362.

Anwar S, Meghana S. A pixel permutation based image encryption technique using chaotic map. Multimed. Tools Appl. 2019 Jun 24; 78(19): 27569–90. https://doi.org/10.1007/s11042-019-07852-2.‏

Rehman MU, Shafique A, Khalid S, Hussain I. Dynamic Substitution and Confusion-Diffusion-Based Noise-Resistive Image Encryption Using Multiple Chaotic Maps. IEEE Access. 2021; 9: 52277–91. https://doi.org/10.1109/ACCESS.2021.3069591.‏

Al-Hassani MD. A Novel Technique for Secure Data Cryptosystem Based on Chaotic Key Image Generation. Baghdad Sci J. 2022 Jan 20; 19(4): 0905-. https://doi.org/10.21123/bsj.2022.19.4.0905

Al-Bahrani EA, Kadhum RN. A New Cipher Based on Feistel Structure and Chaotic Maps. Baghdad Sci J. 2019 Mar 17; 16(1(Suppl.)): 270–80. https://doi.org/10.21123/bsj.2019.16.1(Suppl.).0270.

Wen H, Zhang C, Chen P, Chen R, Xu J, Liao Y, et al. A Quantum Chaotic Image Cryptosystem and Its Application in IoT Secure Communication. IEEE Access. 2021 ; 9: 20481–92. https://doi.org/ 10.1109/ACCESS.2021.3054952

Ayubi P, Setayeshi S, Rahmani AM. Deterministic chaos game: A new fractal based pseudo-random number generator and its cryptographic application. . J Inf Secur Appl. 2020 Jun; 52: 102472. https://doi.org/10.1016/j.jisa.2020.102472.

Ma Y, Li C, Ou B. Cryptanalysis of an image block encryption algorithm based on chaotic maps. J Inf Secur Appl. 2020 Oct;54:102566. https://doi.org/10.1016/j.jisa.2020.102566.

Zhou M, Wang C. A novel image encryption scheme based on conservative hyperchaotic system and closed-loop diffusion between blocks. Signal Process. 2020 Jun; 171: 107484. https://doi.org/10.1016/j.sigpro.2020.107484.

Fan S, Li K, Zhang Y, Tan H, Fang Q, Han K, et al. A Hybrid Chaotic Encryption Scheme for Wireless Body Area Networks. IEEE Access. 2020 Jan 1; 8: 183411–29. https://doi.org/ 10.1109/ACCESS.2020.3029263.

Li M, Xu M, Luo J, Fan H. Cryptanalysis of an Image Encryption Using 2D Henon-Sine Map and DNA Approach. IEEE Access. 2019 Jan 1; 7: 63336–45. https://doi.org/ 10.1109/ACCESS.2019.2916402.

Rahimov H, Babaei M, Farhadi M. Cryptographic PRNG Based on Combination of LFSR and Chaotic Logistic Map. Appl Math. 2011; 02(12): 1531–4. https://doi.org/ 10.4236/am.2011.212217.

Abd El-Maksoud AJ, Abd El-Kader AA, Hassan BG, Rihan NG, Tolba MF, Said LA, et al. FPGA implementation of sound encryption system based on fractional-order chaotic systems. Microelectron. J. 2019 Aug; 90: 323–35. https://doi.org/10.1016/j.mejo.2019.05.005.

Hasan FS, Saffo MA. FPGA Hardware Co-Simulation of Image Encryption Using Stream Cipher Based on Chaotic Maps. Sens Imaging. 2020 Jul 9; 21(1). https://doi.org/10.1007/s11220-020-00301-7.

Bonny T, Al Debsi R, Majzoub S, Elwakil AS. Hardware Optimized FPGA Implementations of High-Speed True Random Bit Generators Based on Switching-Type Chaotic Oscillators. Circuits Syst Signal Process. 2018 Jul 27; 38(3): 1342–59. https://doi.org/10.1007/s00034-018-0905-6.

Merah L, Ali-Pacha A, Hadj-Said N, Mecheri B, Dellassi M. FPGA Hardware Co-simulation of New Chaos-Based Stream Cipher Based on Lozi Map. IJET. 2018 Oct; 9(5): 420–5. https://doi.org/10.7763/IJET.2017.V9.1010.

Ahmad M, Doja MN, Beg MMS. Security analysis and enhancements of an image cryptosystem based on hyperchaotic system. J. King Saud Univ Comput. Inf Sci. 2021 Jan 1 [cited 2022 Nov 21]; 33(1): 77–85. https://doi.org/10.1016/j.jksuci.2018.02.002.

Rodríguez-Orozco E, García-Guerrero EE, Everardo Inzunza-González, Oscar Roberto López-Bonilla, Flores-Vergara A, José Ricardo Cárdenas-Valdez, et al. FPGA-based Chaotic Cryptosystem by Using Voice Recognition as Access Key. Electronics. 2018 Dec 9; 7(12): 414–4. https://doi.org/10.3390/electronics7120414.

Zhu S, Zhu C, Wang W. A New Image Encryption Algorithm Based on Chaos and Secure Hash SHA-256. Entropy. 2018 Sep 19; 20(9): 716. https://doi.org/10.3390/e20090716.

Pourjabbar Kari A, Habibizad Navin A, Bidgoli AM, Mirnia M. A new image encryption scheme based on hybrid chaotic maps. Multimed. Tools Appl. 2020 Sep 16; 80(2): 2753–72. https://doi.org/10.1007/s11042-020-09648-1.

Xiling, ZC702 Evaluation Board for the Zynq-7000 XC7Z020 All Programmable SoC, UG850 (v1.5), Xiling, Inc., 2015.

Similar Articles

You may also start an advanced similarity search for this article.