VLSI Implementation of Optimized 2D SIMM Chaotic Map for Image Encryption

被引:4
作者
Balaji, M. Sundar Prakash [1 ]
Vijaykumar, V. R. [2 ]
Subramaniam, Kamalraj [3 ]
Kannan, M. [4 ]
Pillai, V. Ayyem [5 ]
机构
[1] RVS Coll Engn & Technol, Dept Elect & Commun Engn, Coimbatore 641402, India
[2] Anna Univ Reg Campus, Dept Elect & Commun Engn, Coimbatore 641046, India
[3] Karpagam Acad Higher Educ, Dept Biomed Engn, Coimbatore 641021, India
[4] MIT Campus, Dept Elect, Chennai 600044, India
[5] Gokaraju Rangaraju Inst Engn & Technol, Dept Elect & Commun Engn, Hyderabad 500090, India
关键词
Chaotic mapping; 2D-SIMM; encryption; decryption; jaya optimization;
D O I
10.32604/iasc.2023.028969
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The current research work proposed a novel optimization-based 2D-SIMM (Two-Dimensional Sine Iterative chaotic map with infinite collapse Modulation Map) model for image encryption. The proposed 2D-SIMM model is derived out of sine map and Iterative Chaotic Map with Infinite Collapse (ICMIC). In this technique, scrambling effect is achieved with the help of Chaotic Shift Transform (CST). Chaotic Shift Transform is used to change the value of pixels in the input image while the substituted value is cyclically shifted according to the chaotic sequence generated by 2D-SIMM model. These chaotic sequences, generated using 2D-SIMM model, are sensitive to initial conditions. In the proposed algorithm, these initial conditions are optimized using JAYA optimization algorithm. Correlation coefficient and entropy are considered as fitness functions in this study to evaluate the best solution for initial conditions. The simulation results clearly shows that the proposed algorithm achieved a better performance over existing algorithms. In addition, the VLSI implementation of the proposed algorithm was also carried out using Xilinx system generator. With optimization, the correlation coefficient was -0.014096 and without optimization, it was 0.002585.
引用
收藏
页码:3155 / 3168
页数:14
相关论文
共 14 条
  • [1] Some basic cryptographic requirements for chaos-based cryptosystems
    Alvarez, Gonzalo
    Li, Shujun
    [J]. INTERNATIONAL JOURNAL OF BIFURCATION AND CHAOS, 2006, 16 (08): : 2129 - 2151
  • [2] Chen D, 2011, ADV INFORM SCI SERVI, V03, P364
  • [3] An efficient image encryption scheme using gray code based permutation approach
    Chen, Jun-xin
    Zhu, Zhi-liang
    Fu, Chong
    Yu, Hai
    Zhang, Li-bo
    [J]. OPTICS AND LASERS IN ENGINEERING, 2015, 67 : 191 - 204
  • [4] He D, 2000, TENCON IEEE REGION, pB95
  • [5] 2D Sine Logistic modulation map for image encryption
    Hua, Zhongyun
    Zhou, Yicong
    Pun, Chi-Man
    Chen, C. L. Philip
    [J]. INFORMATION SCIENCES, 2015, 297 : 80 - 94
  • [6] DNA and Plaintext Dependent Chaotic Visual Selective Image Encryption
    Khan, Jan Sher
    Boulila, Wadii
    Ahmad, Jawad
    Rubaiee, Saeed
    Rehman, Atique Ur
    Alroobaea, Roobaea
    Buchanan, William J.
    [J]. IEEE ACCESS, 2020, 8 : 159732 - 159744
  • [7] A fast image encryption algorithm based on chaotic map
    Liu, Wenhao
    Sun, Kehui
    Zhu, Congxu
    [J]. OPTICS AND LASERS IN ENGINEERING, 2016, 84 : 26 - 36
  • [8] A new color image encryption technique using DNA computing and Chaos-based substitution box
    Masood, Fawad
    Masood, Junaid
    Zhang, Lejun
    Jamal, Sajjad Shaukat
    Boulila, Wadii
    Rehman, Sadaqat Ur
    Khan, Fadia Ali
    Ahmad, Jawad
    [J]. SOFT COMPUTING, 2022, 26 (16) : 7461 - 7477
  • [9] Chaos-Based Confusion and Diffusion of Image Pixels Using Dynamic Substitution
    Qayyum, Abdullah
    Ahmad, Jawad
    Boulila, Wadii
    Rubaiee, Saeed
    Arshad
    Masood, Fawad
    Khan, Fawad
    Buchanan, William J.
    [J]. IEEE ACCESS, 2020, 8 : 140876 - 140895
  • [10] Performance comparison of recent optimization algorithm Jaya with particle swarm optimization for digital image watermarking in complex wavelet domain
    Thakkar, Falgun N.
    Srivastava, Vinay Kumar
    [J]. MULTIDIMENSIONAL SYSTEMS AND SIGNAL PROCESSING, 2019, 30 (04) : 1769 - 1791