sridevi arumugham - Academia.edu (original) (raw)

Papers by sridevi arumugham

Research paper thumbnail of Chaos in Series to Avoid Serial Attacks on Image: A Secure Image Communication Perspective

Due to the rapid growth in communication, the transmittal of multimedia contents over the open un... more Due to the rapid growth in communication, the transmittal of multimedia contents over the open unsecured channel became vital. Hence the mechanism which provides confidentiality of these contents is needed and that can be achieved with the help of Image Encryption. In this paper, the secured grayscale image encryption was performed using combined chaotic maps namely Logistic Sine–Sine (LS-S) and Logistic Logistic-Sine (LL-S) in transform domain Integer Wavelet Transform (IWT)approach. To validate the proposed algorithm, certain analyses such as Statistical (Correlation, Entropy, Histogram), Error metric (MSE, PSNR), Chosen plain text and cropping were executed. Additionally, the strength of the key was evaluated using key sensitivity and keyspace analyses. The proposed algorithm provides the better near zero correlation and average entropy of 7.9916. The average PSNR of 11.4 dB has been achieved and the keyspace is 1068 so as immune to the brute force attack.

Research paper thumbnail of Jitters through dual clocks: An effective Entropy Source for True Random Number Generation

True random number generators (TRNG) have an appreciable demand in key generation of crypto proce... more True random number generators (TRNG) have an appreciable demand in key generation of crypto processors. FPGA based TRNGs offer various advantages for generation, packing and storage. Metastability, jitter, race around and memory collision are some of the entropy sources for extraction of true randomness. In this work, jitter extraction is the prime focus for randomness harvesting. Two different frequencies have been generated by Onchip PLL of FPGA which were used in an asynchronous manner for random bit generation. Two Flip-flops have been used in this design after which post processing unit enhances the randomness. Both Von - Neumann Corrector as well as 1D logistic map have been experimented as post processing functions. Randomness of the numbers was tested and ensured by performing entropy analysis as well as NIST tests. This proposed TRNG has been designed using VHDL and implemented on Altera Cyclone II EP2C35F672C6N FPGA consuming 1298 logic elements with a throughput of 26.84 Mbps.

Research paper thumbnail of Networked hardware assisted key image and chaotic attractors for secure RGB image communication

Multimedia Tools and Applications, Jan 30, 2018

Research paper thumbnail of Tamper-Resistant Secure Medical Image Carrier: An IWT–SVD–Chaos–FPGA Combination

Arabian journal for science and engineering, May 8, 2019

Research paper thumbnail of YRBS coding with logistic map – a novel Sanskrit aphorism and chaos for image encryption

Multimedia Tools and Applications, Sep 7, 2018

Research paper thumbnail of Networked medical data sharing on secure medium – A web publishing mode for DICOM viewer with three layer authentication

Journal of Biomedical Informatics, Oct 1, 2018

Research paper thumbnail of Performance Evaluation of Chaotic Maps & Attractors in Image Encryption

With the rapid development in the field of communication, the confidential transfer of informatio... more With the rapid development in the field of communication, the confidential transfer of information become vital as they are passing through an unsecure public channel. The contidentiality can be greatly achieved by means of encryption. As images are the most important multimedia content need to be transmitted, the concept of image encryption emerged and raise as a hot topic in the research area as well as for real time applications. In this proposed work, the performance analysis of various chaotic maps such as Logistic, Sinus, Circle and Chebyshev and attractors namely Lorenz and Lu are carried out and the results evaluated the strength of each map and attractors for image encryption. From the results, it is evidenced that the chaotic map such as chebyshev and circle map outperforms the logistic and sinus map in terms of correlation, entropy and keyspace wherein the Lorenz attractor outperforms the Lu attractor. Near zero correlation and the entropy close to 8 are the important parameters for good image encryption.

Research paper thumbnail of Image Encryption: A Random Selection Approach

Digital data is a fundamental source of multimedia platform where image communication is a substa... more Digital data is a fundamental source of multimedia platform where image communication is a substantial part of it. Through image communication, information is transmitted and received on network in various fields like armed forces, military, healthcare, entertainment, and many more. To protect information, security architectures are necessary. This work proposes an enhanced method of gray scale image encryption where chaotic selection of encryption algorithm takes the priority. Confusion and diffusion is performed with four pseudo random sequence generators namely Chaotic logistic map, chaotic tent map, Linear Feedback Shift Register (LFSR) and combined chaotic map. Confusion phase is a constant operation in which logistic map generated random sequences are used to scramble the image. In diffusion phase, chaotic selection of random sequence generator is accomplished by a sum of four digits random number generated using logistic map. Then diffusion is performed by XORing the scrambled image with generated random sequences produced from respective generator. This image encryption scheme is designed using python 2.7 and validated by performing entropy, correlation, histogram, differential, encryption quality and NIST test analyses.

Research paper thumbnail of Design of tri-layer image encryption scheme using Calendar Month Vowel Count (CMVC) approach

Multimedia Tools and Applications, 2022

Along with the growth of the internet, multimedia communication has also increased rapidly over t... more Along with the growth of the internet, multimedia communication has also increased rapidly over the years. The digital image is an essential part of multimedia technology; thus, secure image transmission is essential to maintain privacy. To achieve privacy, several image encryption schemes have been developed. Inspired by those techniques, a new tri-layer image encryption algorithm based on CMVC (Calendar Month Vowel Count) coding logic has been proposed. The key used in this algorithm is generated based on the number of vowels in each month of the year. Using this concept, the scheme has ended up with a 24-bit key. This key has been used to encrypt the image using three-level substitution, scrambling, and cyclic shift. Further, the Chen attractor has been utilized to induce more randomness in the pixel values. The encryption technique proposed is much more robust, which resist unauthorized users from decrypting the image. This encryption technique offers good resistance to ciphertext attacks, which was a significant disadvantage in DNA coding. Also, this proposed scheme yields an average entropy of 7.99 and a near-zero correlation. It has a maximum keyspace of 3(33.24915 × 10 168 ) to resist the brute force attack.

Research paper thumbnail of Grey-Level Text Encryption Using Chaotic Maps and Arnold Transform

Advances in Intelligent Systems and Computing, 2020

Data in today’s world is ubiquitous and often regarded more valuable than the paper currency itse... more Data in today’s world is ubiquitous and often regarded more valuable than the paper currency itself. More often than not, sensitive data needs to be transmitted from a sender to a receiver in an encrypted format. This paper proposes a novel secret message transmission method through image encryption. The proposed system highlights four techniques; Bit Plane Splicing (BPS), Arnold Transform, a combination of logistic and tent maps. The original text is obtained after decryption, reinforcing its efficiency, security and reliability of this scheme. The security of this scheme has been rigorously analysed through image metrics like Correlation, Entropy, NPCR and UACI, histogram deviation and are tabulated for reference. The results show good security performance against threats. Chosen plaintext attack has been carried out, on two sets of different plain texts, and the results obtained have been favourable.

Research paper thumbnail of Pyramid Entropy Source for True Random Number Generator on FPGA

Advances in Intelligent Systems and Computing, 2020

Research paper thumbnail of Jitters through dual clocks: An effective Entropy Source for True Random Number Generation

2018 International Conference on Computer Communication and Informatics (ICCCI), 2018

True random number generators (TRNG) have an appreciable demand in key generation of crypto proce... more True random number generators (TRNG) have an appreciable demand in key generation of crypto processors. FPGA based TRNGs offer various advantages for generation, packing and storage. Metastability, jitter, race around and memory collision are some of the entropy sources for extraction of true randomness. In this work, jitter extraction is the prime focus for randomness harvesting. Two different frequencies have been generated by Onchip PLL of FPGA which were used in an asynchronous manner for random bit generation. Two Flip-flops have been used in this design after which post processing unit enhances the randomness. Both Von - Neumann Corrector as well as 1D logistic map have been experimented as post processing functions. Randomness of the numbers was tested and ensured by performing entropy analysis as well as NIST tests. This proposed TRNG has been designed using VHDL and implemented on Altera Cyclone II EP2C35F672C6N FPGA consuming 1298 logic elements with a throughput of 26.84 Mbps.

Research paper thumbnail of Chaos in Series to Avoid Serial Attacks on Image: A Secure Image Communication Perspective

2019 International Conference on Computer Communication and Informatics (ICCCI), 2019

Due to the rapid growth in communication, the transmittal of multimedia contents over the open un... more Due to the rapid growth in communication, the transmittal of multimedia contents over the open unsecured channel became vital. Hence the mechanism which provides confidentiality of these contents is needed and that can be achieved with the help of Image Encryption. In this paper, the secured grayscale image encryption was performed using combined chaotic maps namely Logistic Sine–Sine (LS-S) and Logistic Logistic-Sine (LL-S) in transform domain Integer Wavelet Transform (IWT)approach. To validate the proposed algorithm, certain analyses such as Statistical (Correlation, Entropy, Histogram), Error metric (MSE, PSNR), Chosen plain text and cropping were executed. Additionally, the strength of the key was evaluated using key sensitivity and keyspace analyses. The proposed algorithm provides the better near zero correlation and average entropy of 7.9916. The average PSNR of 11.4 dB has been achieved and the keyspace is 1068 so as immune to the brute force attack.

Research paper thumbnail of Image Encryption: A Random Selection Approach

2018 International Conference on Computer Communication and Informatics (ICCCI), 2018

Digital data is a fundamental source of multimedia platform where image communication is a substa... more Digital data is a fundamental source of multimedia platform where image communication is a substantial part of it. Through image communication, information is transmitted and received on network in various fields like armed forces, military, healthcare, entertainment, and many more. To protect information, security architectures are necessary. This work proposes an enhanced method of gray scale image encryption where chaotic selection of encryption algorithm takes the priority. Confusion and diffusion is performed with four pseudo random sequence generators namely Chaotic logistic map, chaotic tent map, Linear Feedback Shift Register (LFSR) and combined chaotic map. Confusion phase is a constant operation in which logistic map generated random sequences are used to scramble the image. In diffusion phase, chaotic selection of random sequence generator is accomplished by a sum of four digits random number generated using logistic map. Then diffusion is performed by XORing the scrambled image with generated random sequences produced from respective generator. This image encryption scheme is designed using python 2.7 and validated by performing entropy, correlation, histogram, differential, encryption quality and NIST test analyses.

Research paper thumbnail of IoT Framework for Secure Medical Image Transmission

2018 International Conference on Computer Communication and Informatics (ICCCI), 2018

Medical image encryption plays a pivotal role in telemedicine and healthcare applications. Authen... more Medical image encryption plays a pivotal role in telemedicine and healthcare applications. Authentication of medical images require a must attention owing to the amount of medical data being communicated and number of digital records being created and maintained. In this work, a server - client model of authenticated medical image communication is proposed. Initially, the AES encrypted medical image is further secured by embedding a One Time Password (OTP) generated through Tent map. This OTP embedded image is shared to the intended user via intranet. Upon receiving the OTP through GSM, the authorized user verifies the similarity of received OTP in mobile and extracted one from the encrypted medical image. After integrity checking, the decryption is performed to retrieve the original medical record. The proposed work of medical image encryption has been developed using python 2.7 and validated by performing entropy, correlation, differential, error metric and NIST test analyses.

Research paper thumbnail of A Trio Approach Satisfying CIA Triad for Medical Image Security

Proceedings of the International Conference on ISMAC in Computational Vision and Bio-Engineering 2018 (ISMAC-CVB), 2019

Medical image security attains a great appeal due to the challenges in transmitting them through ... more Medical image security attains a great appeal due to the challenges in transmitting them through an open network channel. Even a small change in medical information leads to a wrong diagnosis. Hence, methods to prevent the attacks and tampering on the medical images in the open channel have a great demand. This work proposes such an attractor-assisted medical image watermarking and double chaotic encryption which preserves the confidentiality, integrity and authenticity of the medical image. Patient diagnosis details are compressed using lossless compression approach and embedded in the pixels of patient’s DICOM image. Attractor-based selective watermarking is implemented using integer wavelet transform. Encryption will be carried out by employing chaotic maps using confusion and diffusion operations. The effectiveness of the work will be evaluated using standard analyses namely MSE, PSNR, SSIM, entropy, correlation, histogram and key space.

Research paper thumbnail of Cellular Automata Based Key Stream Generator - A Reconfigurable Hardware Approach

Rapid developments in network-based application demand a special attention to protect the confide... more Rapid developments in network-based application demand a special attention to protect the confidentiality of data. Cryptographic algorithms play a lead role in ensuring confidentiality assisted by key generation architecture. Keys have a fair role in modern cryptography, which can be generated through random number generators. To meet the real-time requirements, cryptographic primitives can be developed on reconfigurable hardware such as Field Programmable Gate Arrays (FPGAs). This work focuses on the development of Pseudo Random Number Generation (PRNG) architecture using Cellular Automata (CA) on Altera Cyclone II EP2C20F484C7 FPGA at an operating frequency of 50 MHz. Significantly, CA based random sequences were generated based on five rules namely R30, R90, R105, R150 and R165. The randomness of the proposed Pseudo Random Number Generator (PRNG) has been confirmed using entropy and NIST 800 – 22 tests. The proposed design has consumed only 461 logic elements which are 3% of tota...

Research paper thumbnail of Chaos Blend DNA Coding for Image Encryption on FPGA

2018 International Conference on Computer Communication and Informatics (ICCCI), 2018

Looking at the demands of secure communication schemes, new platforms for information security ha... more Looking at the demands of secure communication schemes, new platforms for information security have a significant role in the data protection. In this paper, image encryption on reconfigurable hardware FPGA has been proposed with the confluence of the chaotic map and DNA schemes. Confusion and diffusion were performed with both Chaotic and DNA approaches. The image encryption architecture with 128 × 128 grayscale image which was implemented on Cyclone II FPGA EP2C35F672C6 consumed 23,877 (72%) logic elements, 131,072 (27%) internal M4KRAM memory units with a total thermal power dissipation of 273.55 mW for a test image. NPCR, UACI, Correlation, Uniform distribution and entropy analyses revealed the strength of the proposed scheme which requires a specific bitstream and hardware to retrieve and decrypt the hidden secret image on FPGA.

Research paper thumbnail of Performance Evaluation of Chaotic Maps & Attractors in Image Encryption

2019 International Conference on Computer Communication and Informatics (ICCCI), 2019

With the rapid development in the field of communication, the confidential transfer of informatio... more With the rapid development in the field of communication, the confidential transfer of information become vital as they are passing through an unsecure public channel. The contidentiality can be greatly achieved by means of encryption. As images are the most important multimedia content need to be transmitted, the concept of image encryption emerged and raise as a hot topic in the research area as well as for real time applications. In this proposed work, the performance analysis of various chaotic maps such as Logistic, Sinus, Circle and Chebyshev and attractors namely Lorenz and Lu are carried out and the results evaluated the strength of each map and attractors for image encryption. From the results, it is evidenced that the chaotic map such as chebyshev and circle map outperforms the logistic and sinus map in terms of correlation, entropy and keyspace wherein the Lorenz attractor outperforms the Lu attractor. Near zero correlation and the entropy close to 8 are the important parameters for good image encryption.

Research paper thumbnail of Synthetic Image and Strange Attractor: Two Folded Encryption Approach for Secure Image Communication

Advances in Intelligent Systems and Computing, 2020

Chaotic attractors are used in variety of applications especially in image encryption due to thei... more Chaotic attractors are used in variety of applications especially in image encryption due to their sensitivity, confusion and diffusion properties. Such attractors are continuous form of chaos which can be described using differential equations. In this work, an image encryption technique employing Chen attractor and FPGA generated synthetic image has been discussed. Altera Cyclone II FPGA was used to generate synthetic image that consumed 438 logic elements and 34.03 mW of power consumption. The simulation was carried out on LabVIEW platform. The performance of the algorithm was evaluated through statistical (Entropy, Histogram, Correlation) and differential analyses (NPCR and UACI) for grayscale images of various sizes 128 × 128, 256 × 256 and 512 × 512 which yielded good figures.

Research paper thumbnail of Chaos in Series to Avoid Serial Attacks on Image: A Secure Image Communication Perspective

Due to the rapid growth in communication, the transmittal of multimedia contents over the open un... more Due to the rapid growth in communication, the transmittal of multimedia contents over the open unsecured channel became vital. Hence the mechanism which provides confidentiality of these contents is needed and that can be achieved with the help of Image Encryption. In this paper, the secured grayscale image encryption was performed using combined chaotic maps namely Logistic Sine–Sine (LS-S) and Logistic Logistic-Sine (LL-S) in transform domain Integer Wavelet Transform (IWT)approach. To validate the proposed algorithm, certain analyses such as Statistical (Correlation, Entropy, Histogram), Error metric (MSE, PSNR), Chosen plain text and cropping were executed. Additionally, the strength of the key was evaluated using key sensitivity and keyspace analyses. The proposed algorithm provides the better near zero correlation and average entropy of 7.9916. The average PSNR of 11.4 dB has been achieved and the keyspace is 1068 so as immune to the brute force attack.

Research paper thumbnail of Jitters through dual clocks: An effective Entropy Source for True Random Number Generation

True random number generators (TRNG) have an appreciable demand in key generation of crypto proce... more True random number generators (TRNG) have an appreciable demand in key generation of crypto processors. FPGA based TRNGs offer various advantages for generation, packing and storage. Metastability, jitter, race around and memory collision are some of the entropy sources for extraction of true randomness. In this work, jitter extraction is the prime focus for randomness harvesting. Two different frequencies have been generated by Onchip PLL of FPGA which were used in an asynchronous manner for random bit generation. Two Flip-flops have been used in this design after which post processing unit enhances the randomness. Both Von - Neumann Corrector as well as 1D logistic map have been experimented as post processing functions. Randomness of the numbers was tested and ensured by performing entropy analysis as well as NIST tests. This proposed TRNG has been designed using VHDL and implemented on Altera Cyclone II EP2C35F672C6N FPGA consuming 1298 logic elements with a throughput of 26.84 Mbps.

Research paper thumbnail of Networked hardware assisted key image and chaotic attractors for secure RGB image communication

Multimedia Tools and Applications, Jan 30, 2018

Research paper thumbnail of Tamper-Resistant Secure Medical Image Carrier: An IWT–SVD–Chaos–FPGA Combination

Arabian journal for science and engineering, May 8, 2019

Research paper thumbnail of YRBS coding with logistic map – a novel Sanskrit aphorism and chaos for image encryption

Multimedia Tools and Applications, Sep 7, 2018

Research paper thumbnail of Networked medical data sharing on secure medium – A web publishing mode for DICOM viewer with three layer authentication

Journal of Biomedical Informatics, Oct 1, 2018

Research paper thumbnail of Performance Evaluation of Chaotic Maps & Attractors in Image Encryption

With the rapid development in the field of communication, the confidential transfer of informatio... more With the rapid development in the field of communication, the confidential transfer of information become vital as they are passing through an unsecure public channel. The contidentiality can be greatly achieved by means of encryption. As images are the most important multimedia content need to be transmitted, the concept of image encryption emerged and raise as a hot topic in the research area as well as for real time applications. In this proposed work, the performance analysis of various chaotic maps such as Logistic, Sinus, Circle and Chebyshev and attractors namely Lorenz and Lu are carried out and the results evaluated the strength of each map and attractors for image encryption. From the results, it is evidenced that the chaotic map such as chebyshev and circle map outperforms the logistic and sinus map in terms of correlation, entropy and keyspace wherein the Lorenz attractor outperforms the Lu attractor. Near zero correlation and the entropy close to 8 are the important parameters for good image encryption.

Research paper thumbnail of Image Encryption: A Random Selection Approach

Digital data is a fundamental source of multimedia platform where image communication is a substa... more Digital data is a fundamental source of multimedia platform where image communication is a substantial part of it. Through image communication, information is transmitted and received on network in various fields like armed forces, military, healthcare, entertainment, and many more. To protect information, security architectures are necessary. This work proposes an enhanced method of gray scale image encryption where chaotic selection of encryption algorithm takes the priority. Confusion and diffusion is performed with four pseudo random sequence generators namely Chaotic logistic map, chaotic tent map, Linear Feedback Shift Register (LFSR) and combined chaotic map. Confusion phase is a constant operation in which logistic map generated random sequences are used to scramble the image. In diffusion phase, chaotic selection of random sequence generator is accomplished by a sum of four digits random number generated using logistic map. Then diffusion is performed by XORing the scrambled image with generated random sequences produced from respective generator. This image encryption scheme is designed using python 2.7 and validated by performing entropy, correlation, histogram, differential, encryption quality and NIST test analyses.

Research paper thumbnail of Design of tri-layer image encryption scheme using Calendar Month Vowel Count (CMVC) approach

Multimedia Tools and Applications, 2022

Along with the growth of the internet, multimedia communication has also increased rapidly over t... more Along with the growth of the internet, multimedia communication has also increased rapidly over the years. The digital image is an essential part of multimedia technology; thus, secure image transmission is essential to maintain privacy. To achieve privacy, several image encryption schemes have been developed. Inspired by those techniques, a new tri-layer image encryption algorithm based on CMVC (Calendar Month Vowel Count) coding logic has been proposed. The key used in this algorithm is generated based on the number of vowels in each month of the year. Using this concept, the scheme has ended up with a 24-bit key. This key has been used to encrypt the image using three-level substitution, scrambling, and cyclic shift. Further, the Chen attractor has been utilized to induce more randomness in the pixel values. The encryption technique proposed is much more robust, which resist unauthorized users from decrypting the image. This encryption technique offers good resistance to ciphertext attacks, which was a significant disadvantage in DNA coding. Also, this proposed scheme yields an average entropy of 7.99 and a near-zero correlation. It has a maximum keyspace of 3(33.24915 × 10 168 ) to resist the brute force attack.

Research paper thumbnail of Grey-Level Text Encryption Using Chaotic Maps and Arnold Transform

Advances in Intelligent Systems and Computing, 2020

Data in today’s world is ubiquitous and often regarded more valuable than the paper currency itse... more Data in today’s world is ubiquitous and often regarded more valuable than the paper currency itself. More often than not, sensitive data needs to be transmitted from a sender to a receiver in an encrypted format. This paper proposes a novel secret message transmission method through image encryption. The proposed system highlights four techniques; Bit Plane Splicing (BPS), Arnold Transform, a combination of logistic and tent maps. The original text is obtained after decryption, reinforcing its efficiency, security and reliability of this scheme. The security of this scheme has been rigorously analysed through image metrics like Correlation, Entropy, NPCR and UACI, histogram deviation and are tabulated for reference. The results show good security performance against threats. Chosen plaintext attack has been carried out, on two sets of different plain texts, and the results obtained have been favourable.

Research paper thumbnail of Pyramid Entropy Source for True Random Number Generator on FPGA

Advances in Intelligent Systems and Computing, 2020

Research paper thumbnail of Jitters through dual clocks: An effective Entropy Source for True Random Number Generation

2018 International Conference on Computer Communication and Informatics (ICCCI), 2018

True random number generators (TRNG) have an appreciable demand in key generation of crypto proce... more True random number generators (TRNG) have an appreciable demand in key generation of crypto processors. FPGA based TRNGs offer various advantages for generation, packing and storage. Metastability, jitter, race around and memory collision are some of the entropy sources for extraction of true randomness. In this work, jitter extraction is the prime focus for randomness harvesting. Two different frequencies have been generated by Onchip PLL of FPGA which were used in an asynchronous manner for random bit generation. Two Flip-flops have been used in this design after which post processing unit enhances the randomness. Both Von - Neumann Corrector as well as 1D logistic map have been experimented as post processing functions. Randomness of the numbers was tested and ensured by performing entropy analysis as well as NIST tests. This proposed TRNG has been designed using VHDL and implemented on Altera Cyclone II EP2C35F672C6N FPGA consuming 1298 logic elements with a throughput of 26.84 Mbps.

Research paper thumbnail of Chaos in Series to Avoid Serial Attacks on Image: A Secure Image Communication Perspective

2019 International Conference on Computer Communication and Informatics (ICCCI), 2019

Due to the rapid growth in communication, the transmittal of multimedia contents over the open un... more Due to the rapid growth in communication, the transmittal of multimedia contents over the open unsecured channel became vital. Hence the mechanism which provides confidentiality of these contents is needed and that can be achieved with the help of Image Encryption. In this paper, the secured grayscale image encryption was performed using combined chaotic maps namely Logistic Sine–Sine (LS-S) and Logistic Logistic-Sine (LL-S) in transform domain Integer Wavelet Transform (IWT)approach. To validate the proposed algorithm, certain analyses such as Statistical (Correlation, Entropy, Histogram), Error metric (MSE, PSNR), Chosen plain text and cropping were executed. Additionally, the strength of the key was evaluated using key sensitivity and keyspace analyses. The proposed algorithm provides the better near zero correlation and average entropy of 7.9916. The average PSNR of 11.4 dB has been achieved and the keyspace is 1068 so as immune to the brute force attack.

Research paper thumbnail of Image Encryption: A Random Selection Approach

2018 International Conference on Computer Communication and Informatics (ICCCI), 2018

Digital data is a fundamental source of multimedia platform where image communication is a substa... more Digital data is a fundamental source of multimedia platform where image communication is a substantial part of it. Through image communication, information is transmitted and received on network in various fields like armed forces, military, healthcare, entertainment, and many more. To protect information, security architectures are necessary. This work proposes an enhanced method of gray scale image encryption where chaotic selection of encryption algorithm takes the priority. Confusion and diffusion is performed with four pseudo random sequence generators namely Chaotic logistic map, chaotic tent map, Linear Feedback Shift Register (LFSR) and combined chaotic map. Confusion phase is a constant operation in which logistic map generated random sequences are used to scramble the image. In diffusion phase, chaotic selection of random sequence generator is accomplished by a sum of four digits random number generated using logistic map. Then diffusion is performed by XORing the scrambled image with generated random sequences produced from respective generator. This image encryption scheme is designed using python 2.7 and validated by performing entropy, correlation, histogram, differential, encryption quality and NIST test analyses.

Research paper thumbnail of IoT Framework for Secure Medical Image Transmission

2018 International Conference on Computer Communication and Informatics (ICCCI), 2018

Medical image encryption plays a pivotal role in telemedicine and healthcare applications. Authen... more Medical image encryption plays a pivotal role in telemedicine and healthcare applications. Authentication of medical images require a must attention owing to the amount of medical data being communicated and number of digital records being created and maintained. In this work, a server - client model of authenticated medical image communication is proposed. Initially, the AES encrypted medical image is further secured by embedding a One Time Password (OTP) generated through Tent map. This OTP embedded image is shared to the intended user via intranet. Upon receiving the OTP through GSM, the authorized user verifies the similarity of received OTP in mobile and extracted one from the encrypted medical image. After integrity checking, the decryption is performed to retrieve the original medical record. The proposed work of medical image encryption has been developed using python 2.7 and validated by performing entropy, correlation, differential, error metric and NIST test analyses.

Research paper thumbnail of A Trio Approach Satisfying CIA Triad for Medical Image Security

Proceedings of the International Conference on ISMAC in Computational Vision and Bio-Engineering 2018 (ISMAC-CVB), 2019

Medical image security attains a great appeal due to the challenges in transmitting them through ... more Medical image security attains a great appeal due to the challenges in transmitting them through an open network channel. Even a small change in medical information leads to a wrong diagnosis. Hence, methods to prevent the attacks and tampering on the medical images in the open channel have a great demand. This work proposes such an attractor-assisted medical image watermarking and double chaotic encryption which preserves the confidentiality, integrity and authenticity of the medical image. Patient diagnosis details are compressed using lossless compression approach and embedded in the pixels of patient’s DICOM image. Attractor-based selective watermarking is implemented using integer wavelet transform. Encryption will be carried out by employing chaotic maps using confusion and diffusion operations. The effectiveness of the work will be evaluated using standard analyses namely MSE, PSNR, SSIM, entropy, correlation, histogram and key space.

Research paper thumbnail of Cellular Automata Based Key Stream Generator - A Reconfigurable Hardware Approach

Rapid developments in network-based application demand a special attention to protect the confide... more Rapid developments in network-based application demand a special attention to protect the confidentiality of data. Cryptographic algorithms play a lead role in ensuring confidentiality assisted by key generation architecture. Keys have a fair role in modern cryptography, which can be generated through random number generators. To meet the real-time requirements, cryptographic primitives can be developed on reconfigurable hardware such as Field Programmable Gate Arrays (FPGAs). This work focuses on the development of Pseudo Random Number Generation (PRNG) architecture using Cellular Automata (CA) on Altera Cyclone II EP2C20F484C7 FPGA at an operating frequency of 50 MHz. Significantly, CA based random sequences were generated based on five rules namely R30, R90, R105, R150 and R165. The randomness of the proposed Pseudo Random Number Generator (PRNG) has been confirmed using entropy and NIST 800 – 22 tests. The proposed design has consumed only 461 logic elements which are 3% of tota...

Research paper thumbnail of Chaos Blend DNA Coding for Image Encryption on FPGA

2018 International Conference on Computer Communication and Informatics (ICCCI), 2018

Looking at the demands of secure communication schemes, new platforms for information security ha... more Looking at the demands of secure communication schemes, new platforms for information security have a significant role in the data protection. In this paper, image encryption on reconfigurable hardware FPGA has been proposed with the confluence of the chaotic map and DNA schemes. Confusion and diffusion were performed with both Chaotic and DNA approaches. The image encryption architecture with 128 × 128 grayscale image which was implemented on Cyclone II FPGA EP2C35F672C6 consumed 23,877 (72%) logic elements, 131,072 (27%) internal M4KRAM memory units with a total thermal power dissipation of 273.55 mW for a test image. NPCR, UACI, Correlation, Uniform distribution and entropy analyses revealed the strength of the proposed scheme which requires a specific bitstream and hardware to retrieve and decrypt the hidden secret image on FPGA.

Research paper thumbnail of Performance Evaluation of Chaotic Maps & Attractors in Image Encryption

2019 International Conference on Computer Communication and Informatics (ICCCI), 2019

With the rapid development in the field of communication, the confidential transfer of informatio... more With the rapid development in the field of communication, the confidential transfer of information become vital as they are passing through an unsecure public channel. The contidentiality can be greatly achieved by means of encryption. As images are the most important multimedia content need to be transmitted, the concept of image encryption emerged and raise as a hot topic in the research area as well as for real time applications. In this proposed work, the performance analysis of various chaotic maps such as Logistic, Sinus, Circle and Chebyshev and attractors namely Lorenz and Lu are carried out and the results evaluated the strength of each map and attractors for image encryption. From the results, it is evidenced that the chaotic map such as chebyshev and circle map outperforms the logistic and sinus map in terms of correlation, entropy and keyspace wherein the Lorenz attractor outperforms the Lu attractor. Near zero correlation and the entropy close to 8 are the important parameters for good image encryption.

Research paper thumbnail of Synthetic Image and Strange Attractor: Two Folded Encryption Approach for Secure Image Communication

Advances in Intelligent Systems and Computing, 2020

Chaotic attractors are used in variety of applications especially in image encryption due to thei... more Chaotic attractors are used in variety of applications especially in image encryption due to their sensitivity, confusion and diffusion properties. Such attractors are continuous form of chaos which can be described using differential equations. In this work, an image encryption technique employing Chen attractor and FPGA generated synthetic image has been discussed. Altera Cyclone II FPGA was used to generate synthetic image that consumed 438 logic elements and 34.03 mW of power consumption. The simulation was carried out on LabVIEW platform. The performance of the algorithm was evaluated through statistical (Entropy, Histogram, Correlation) and differential analyses (NPCR and UACI) for grayscale images of various sizes 128 × 128, 256 × 256 and 512 × 512 which yielded good figures.