This article presents a simple and efficient masking technique based on Chua chaotic system synchronization. It includes feeding the masked signal back to the master system and using it to drive the slave system for synchronization purposes. The proposed system is implemented in a field programmable gate array (FPGA) device using the Xilinx system generator tool. To achieve synchronization, the Pecora-Carroll identical cascading synchronization approach was used. The transmitted signal should be mixed or masked with a chaotic carrier and can be processed by the receiver without any distortion or loss. For different images, the security analysis is performed using the histogram, correlation coefficient, and entropy. In addition, FPGA hardware co-simulation based Xilinx Artix7 xc7a100t1csg324 was used to check the reality of the encryption and decryption of the images.
A new four-dimensional hyper-chaotic system for image encryption IJECEIAES
Currently, images are very important with the rapid growth of communication networks. Therefore, image encryption is a process to provide security for private information and prevent unwanted access to sensitive data by unauthorized individuals. Chaos systems provide an important role for key generation, with high randomization properties and accurate performance. In this study, a new four-dimensional hyper-chaotic system has been suggested that is used in the keys generation, which are utilized in the image encryption process to achieve permutation and substitution operations. Firstly, color bands are permuted using the index of the chaotic sequences to remove the high correlation among neighboring pixels. Secondly, dynamic S-boxes achieve the principle of substitution, which are utilized to diffuse the pixel values of the color image. The efficiency of the proposed method is tested by the key space, histogram, and so on. Security analysis shows that the proposed method for encrypting images is secure and resistant to different attacks. It contains a big key space of (2627) and a high sensitivity to a slight change in the secret key, a fairly uniform histogram, and entropy values nearby to the best value of 8. Moreover, it consumes a very short time for encryption and decryption.
New artificial neural network design for Chua chaotic system prediction usin...IJECEIAES
This study aims to design a new architecture of the artificial neural networks (ANNs) using the Xilinx system generator (XSG) and its hardware co-simulation equivalent model using field programmable gate array (FPGA) to predict the behavior of Chua’s chaotic system and use it in hiding information. The work proposed consists of two main sections. In the first section, MATLAB R2016a was used to build a 3×4×3 feed forward neural network (FFNN). The training results demonstrate that FFNN training in the Bayesian regulation algorithm is sufficiently accurate to directly implement. The second section demonstrates the hardware implementation of the network with the XSG on the Xilinx artix7 xc7a100t-1csg324 chip. Finally, the message was first encrypted using a dynamic Chua system and then decrypted using ANN’s chaotic dynamics. ANN models were developed to implement hardware in the FPGA system using the IEEE 754 Single precision floating-point format. The ANN design method illustrated can be extended to other chaotic systems in general.
This document proposes a medical image encryption technique that uses multiple chaotic maps. It utilizes the logistic map, Arnold cat map, and Baker's map within a triple data encryption standard (3DES) scheme. The technique encrypts and decrypts medical images efficiently and securely, making it suitable for transmission over insecure networks. It was tested using the transmission control protocol (TCP)/internet protocol (IP) to transfer encrypted images between a server and client. Experimental results found the method resistant to attacks while maintaining encryption performance.
The secure communication through synchronization between two identic chaotic systems have
recently gained a lot of interest. To implement a robust secure system based on synchronization, there is
always a need to generate new discrete dynamical systems and investigate their performances in terms of
amount of randomness they have and the ability to achieve synchronization smoothly. In this work, a new
chaotic system, named Nahrain, is proposed and tested for the possible use in secure transmission via
chaos synchronization as well as in cryptography applications. The performance of the proposed chaotic
system is tested using 0-1 test, while NIST suite tests are used to check the randomness statistical
properties. The nonlinear control laws are used to verify the synchronization of master-slave parts of the
proposed system. The simulation results show that Nahrain system has chaotic behavior and
synchronizable, while the equivalent binary sequence of the system has excellent randomness statistical
properties. The numerical results obtained using MATLAB for 0-1 test was 0.9864, and for frequency test
was 0.4202, while for frequency test within a block was 0.4311. As a result, the new proposed system can
be used to develop efficient encryption and synchronization algorithms for multimedia secure transmission
applications.
IRJET - Wavelet based Image Fusion using FPGA for Biomedical ApplicationIRJET Journal
This document describes a wavelet-based image fusion system implemented on an FPGA for biomedical applications. The system takes two input images, applies discrete wavelet transforms to both, then fuses the wavelet coefficients to create a single output image. It uses MATLAB and Xilinx System Generator to simulate the design in Simulink and implement it on a Virtex6 FPGA. The results show that wavelet-based fusion can combine the spatial and spectral information from multiple input images into a higher quality fused output image suitable for medical applications like fusing MRI and CT scans.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
A ROBUST CHAOTIC AND FAST WALSH TRANSFORM ENCRYPTION FOR GRAY SCALE BIOMEDICA...sipij
In this work, a new scheme of image encryption based on chaos and Fast Walsh Transform (FWT) has been proposed.
We used two chaotic logistic maps and combined chaotic encryption methods to the two-dimensional FWT of images.
The encryption process involves two steps: firstly, chaotic sequences generated by the chaotic logistic maps are used to
permute and mask the intermediate results or array of FWT, the next step consist in changing the chaotic sequences or
the initial conditions of chaotic logistic maps among two intermediate results of the same row or column. Changing the
encryption key several times on the same row or column makes the cipher more robust against any attack. We tested
our algorithms on many biomedical images. We also used images from data bases to compare our algorithm to those
in literature. It comes out from statistical analysis and key sensitivity tests that our proposed image encryption schemeprovides an efficient and secure way for real-time encryption and transmission biomedical images.
Pseudo-Random Bit Generator Using Chaotic Seed for Cryptographic Algorithm in...IJECEIAES
Cryptographic algorithms have played an important role in information security for protecting privacy. The literature provides evidence that many types of chaotic cryptosystems have been proposed. These chaotic systems encode information to obviate its orbital instability and ergodicity. In this work, a pseudo-random cryptographic generator algorithm with a symmetric key, based on chaotic functions, is proposed. Moreover, the algorithm exploits dynamic simplicity and synchronization to generate encryption sub-keys using unpredictable seeds, extracted from a chaotic zone, in order to increase their level of randomness. Also, it is applied to a simulated electrical energy consumption signal and implemented on a prototype, using low hardware resources, to measure physical variables; hence, the unpredictability degree was statistically analyzed using the resulting cryptogram. It is shown that the pseudo-random sequences produced by the cryptographic key generator have acceptable properties with respect to randomness, which are validated in this paper using National Institute of Standards and Technology (NIST) statistical tests. To complement the evaluation of the encrypted data, the Lena image is coded and its metrics are compared with those reported in the literature, yielding some useful results.
A new four-dimensional hyper-chaotic system for image encryption IJECEIAES
Currently, images are very important with the rapid growth of communication networks. Therefore, image encryption is a process to provide security for private information and prevent unwanted access to sensitive data by unauthorized individuals. Chaos systems provide an important role for key generation, with high randomization properties and accurate performance. In this study, a new four-dimensional hyper-chaotic system has been suggested that is used in the keys generation, which are utilized in the image encryption process to achieve permutation and substitution operations. Firstly, color bands are permuted using the index of the chaotic sequences to remove the high correlation among neighboring pixels. Secondly, dynamic S-boxes achieve the principle of substitution, which are utilized to diffuse the pixel values of the color image. The efficiency of the proposed method is tested by the key space, histogram, and so on. Security analysis shows that the proposed method for encrypting images is secure and resistant to different attacks. It contains a big key space of (2627) and a high sensitivity to a slight change in the secret key, a fairly uniform histogram, and entropy values nearby to the best value of 8. Moreover, it consumes a very short time for encryption and decryption.
New artificial neural network design for Chua chaotic system prediction usin...IJECEIAES
This study aims to design a new architecture of the artificial neural networks (ANNs) using the Xilinx system generator (XSG) and its hardware co-simulation equivalent model using field programmable gate array (FPGA) to predict the behavior of Chua’s chaotic system and use it in hiding information. The work proposed consists of two main sections. In the first section, MATLAB R2016a was used to build a 3×4×3 feed forward neural network (FFNN). The training results demonstrate that FFNN training in the Bayesian regulation algorithm is sufficiently accurate to directly implement. The second section demonstrates the hardware implementation of the network with the XSG on the Xilinx artix7 xc7a100t-1csg324 chip. Finally, the message was first encrypted using a dynamic Chua system and then decrypted using ANN’s chaotic dynamics. ANN models were developed to implement hardware in the FPGA system using the IEEE 754 Single precision floating-point format. The ANN design method illustrated can be extended to other chaotic systems in general.
This document proposes a medical image encryption technique that uses multiple chaotic maps. It utilizes the logistic map, Arnold cat map, and Baker's map within a triple data encryption standard (3DES) scheme. The technique encrypts and decrypts medical images efficiently and securely, making it suitable for transmission over insecure networks. It was tested using the transmission control protocol (TCP)/internet protocol (IP) to transfer encrypted images between a server and client. Experimental results found the method resistant to attacks while maintaining encryption performance.
The secure communication through synchronization between two identic chaotic systems have
recently gained a lot of interest. To implement a robust secure system based on synchronization, there is
always a need to generate new discrete dynamical systems and investigate their performances in terms of
amount of randomness they have and the ability to achieve synchronization smoothly. In this work, a new
chaotic system, named Nahrain, is proposed and tested for the possible use in secure transmission via
chaos synchronization as well as in cryptography applications. The performance of the proposed chaotic
system is tested using 0-1 test, while NIST suite tests are used to check the randomness statistical
properties. The nonlinear control laws are used to verify the synchronization of master-slave parts of the
proposed system. The simulation results show that Nahrain system has chaotic behavior and
synchronizable, while the equivalent binary sequence of the system has excellent randomness statistical
properties. The numerical results obtained using MATLAB for 0-1 test was 0.9864, and for frequency test
was 0.4202, while for frequency test within a block was 0.4311. As a result, the new proposed system can
be used to develop efficient encryption and synchronization algorithms for multimedia secure transmission
applications.
IRJET - Wavelet based Image Fusion using FPGA for Biomedical ApplicationIRJET Journal
This document describes a wavelet-based image fusion system implemented on an FPGA for biomedical applications. The system takes two input images, applies discrete wavelet transforms to both, then fuses the wavelet coefficients to create a single output image. It uses MATLAB and Xilinx System Generator to simulate the design in Simulink and implement it on a Virtex6 FPGA. The results show that wavelet-based fusion can combine the spatial and spectral information from multiple input images into a higher quality fused output image suitable for medical applications like fusing MRI and CT scans.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
A ROBUST CHAOTIC AND FAST WALSH TRANSFORM ENCRYPTION FOR GRAY SCALE BIOMEDICA...sipij
In this work, a new scheme of image encryption based on chaos and Fast Walsh Transform (FWT) has been proposed.
We used two chaotic logistic maps and combined chaotic encryption methods to the two-dimensional FWT of images.
The encryption process involves two steps: firstly, chaotic sequences generated by the chaotic logistic maps are used to
permute and mask the intermediate results or array of FWT, the next step consist in changing the chaotic sequences or
the initial conditions of chaotic logistic maps among two intermediate results of the same row or column. Changing the
encryption key several times on the same row or column makes the cipher more robust against any attack. We tested
our algorithms on many biomedical images. We also used images from data bases to compare our algorithm to those
in literature. It comes out from statistical analysis and key sensitivity tests that our proposed image encryption schemeprovides an efficient and secure way for real-time encryption and transmission biomedical images.
Pseudo-Random Bit Generator Using Chaotic Seed for Cryptographic Algorithm in...IJECEIAES
Cryptographic algorithms have played an important role in information security for protecting privacy. The literature provides evidence that many types of chaotic cryptosystems have been proposed. These chaotic systems encode information to obviate its orbital instability and ergodicity. In this work, a pseudo-random cryptographic generator algorithm with a symmetric key, based on chaotic functions, is proposed. Moreover, the algorithm exploits dynamic simplicity and synchronization to generate encryption sub-keys using unpredictable seeds, extracted from a chaotic zone, in order to increase their level of randomness. Also, it is applied to a simulated electrical energy consumption signal and implemented on a prototype, using low hardware resources, to measure physical variables; hence, the unpredictability degree was statistically analyzed using the resulting cryptogram. It is shown that the pseudo-random sequences produced by the cryptographic key generator have acceptable properties with respect to randomness, which are validated in this paper using National Institute of Standards and Technology (NIST) statistical tests. To complement the evaluation of the encrypted data, the Lena image is coded and its metrics are compared with those reported in the literature, yielding some useful results.
IRJET- A Novel Hybrid Security System for OFDM-PON using Highly Improved RC6 ...IRJET Journal
This document proposes a novel hybrid security system for OFDM-PON using a highly improved RC6 algorithm and scrambling technique. The data is first scrambled using Morlet wavelet transform for spatial domain scrambling without data loss. It is then encrypted using a highly improved RC6 algorithm for enhanced security. By combining scrambling and encryption, a two-tier security approach is implemented with low complexity. Simulation results show low bit and symbol error rates, demonstrating improved system performance. The proposed scheme provides enhanced security for OFDM-PON networks with potential applications in secure optical communications.
IRJET- An Overview of Hiding Information in H.264/Avc Compressed VideoIRJET Journal
This document provides an overview of hiding information in H.264/AVC compressed video. It discusses different information hiding techniques such as bit plane replacement, spread spectrum, histogram manipulation and matrix encryption. It identifies locations within the H.264 video compression process where information can be hidden, such as during prediction, transformation, quantization and entropy coding. It reviews related information hiding strategies for each location and compares strategies based on payload, overhead, video quality and complexity. The document aims to provide a better understanding of information hiding in compressed video and identify new opportunities.
The Quality of the New Generator Sequence Improvent to Spread the Color Syste...TELKOMNIKA JOURNAL
This paper shows a new technic applicable for the digital devices that are the result of the finite’s
effect precision in the chaotic dynamics used in the coupled technic and the chaotic map’s perturbation
technics used for the generation of a Pseudo-Random Number Generator (PRNGs).The use of the
pseudo- chaotic sequences coupled to the orbit perturbation method in the chaotic logistic map and the
NewPiece-Wise Linear Chaotic Map (NPWLCM). The pseudo random number generator’s originality
proposed from the perturbation of the chaotic recurrence. Furthermore the outputs of the binary sequences
with NPWLCM are reconstructed conventionally with the Bernoulli’s sequences shifts map to change the
shapes with the bitwise permetation then the results in simulation are shown in progress.After being
perturbed, the chaotic system can generate the chaotic binary sequences in uniform distribution and the
statistical properties invulnerable analysis. This generator also has many advantages in the possible useful
applications of spread spectrum digitalimages, such as sensitive secret keys, random uniform distribution
of pixels in Crypto system in secure and synchronize communication.
This document provides an overview of a project that implemented image filtering using VHDL on an FPGA board. It discusses designing filters like average, Sobel, Gaussian, and Laplacian filters. Cache memory and a processing unit were developed to hold pixel values and apply filter kernels. Different methods for multiplication in the convolution process were evaluated. Results showed the output images after applying each filter both in software and on the FPGA board. In conclusion, FPGAs provide reconfigurable, accelerated processing for image applications like filtering compared to general purpose computers.
COLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMSIJNSA Journal
This paper proposed a novel color image encryption scheme based on multiple chaotic systems. The ergodicity property of chaotic system is utilized to perform the permutation process; a substitution operation is applied to achieve the diffusion effect. In permutation stage, the 3D color plain-image matrix is converted to a 2D image matrix, then two generalized Arnold maps are employed to generate hybrid chaotic sequences which are dependent on the plain-image’s content. The generated chaotic sequences are then applied to perform the permutation process. The encryption’s key streams not only depend on the cipher keys but also depend on plain-image and therefore can resist chosen-plaintext attack as well as
known-plaintext attack. In the diffusion stage, four pseudo-random gray value sequences are generated by
another generalized Arnold map. The gray value sequences are applied to perform the diffusion process by bitxoring operation with the permuted image row-by-row or column-by-column to improve the encryption rate. The security and performance analysis have been performed, including key space analysis, histogram analysis, correlation analysis, information entropy analysis, key sensitivity analysis, differential analysis
etc. The experimental results show that the proposed image encryption scheme is highly secure thanks to its
large key space and efficient permutation-substitution operation, and therefore it is suitable for practical image and video encryption.
COLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMSIJNSA Journal
This document proposes a novel color image encryption scheme based on multiple chaotic systems. The scheme utilizes the ergodic properties of chaotic systems to perform pixel permutation and applies a substitution operation to achieve diffusion. In the permutation stage, two generalized Arnold maps are used to generate hybrid chaotic sequences to permute pixel positions. In the diffusion stage, four pseudo-random gray value sequences generated by another generalized Arnold map are used to diffuse the permuted image via bitwise XOR operations. Security analysis shows the scheme has a large key space and is highly secure against statistical attacks, differential attacks, and chosen/known plaintext attacks.
COLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMSIJNSA Journal
This paper proposed a novel color image encryption scheme based on multiple chaotic systems. The ergodicity property of chaotic system is utilized to perform the permutation process; a substitution
operation is applied to achieve the diffusion effect. In permutation stage, the 3D color plain-image matrix
is converted to a 2D image matrix, then two generalized Arnold maps are employed to generate hybrid chaotic sequences which are dependent on the plain-image’s content. The generated chaotic sequences are then applied to perform the permutation process. The encryption’s key streams not only depend on the
cipher keys but also depend on plain-image and therefore can resist chosen-plaintext attack as well as
known-plaintext attack. In the diffusion stage, four pseudo-random gray value sequences are generated by another generalized Arnold map. The gray value sequences are applied to perform the diffusion process by bitxoring operation with the permuted image row-by-row or column-by-column to improve the encryption rate. The security and performance analysis have been performed, including key space analysis, histogram analysis, correlation analysis, information entropy analysis, key sensitivity analysis, differential analysis etc. The experimental results show that the proposed image encryption scheme is highly secure thanks to its large key space and efficient permutation-substitution operation, and therefore it is suitable for practical image and video encryption.
Image encryption algorithm based on the density and 6D logistic map IJECEIAES
One of the most difficult issues in the history of communication technology is the transmission of secure images. On the internet, photos are used and shared by millions of individuals for both private and business reasons. Utilizing encryption methods to change the original image into an unintelligible or scrambled version is one way to achieve safe image transfer over the network. Cryptographic approaches based on chaotic logistic theory provide several new and promising options for developing secure Image encryption methods. The main aim of this paper is to build a secure system for encrypting gray and color images. The proposed system consists of two stages, the first stage is the encryption process, in which the keys are generated depending on the chaotic logistic with the image density to encrypt the gray and color images, and the second stage is the decryption, which is the opposite of the encryption process to obtain the original image. The proposed method has been tested on two standard gray and color images publicly available. The test results indicate to the highest value of peak signal-to-noise ratio (PSNR), unified average changing intensity (UACI), number of pixel change rate (NPCR) are 7.7268, 50.2011 and 100, respectively. While the encryption and decryption speed up to 0.6319 and 0.5305 second respectively.
Hybrid chaos-based image encryption algorithm using Chebyshev chaotic map wit...IJECEIAES
The media content shared on the internet has increased tremendously nowadays. The streaming service has major role in contributing to internet traffic all over the world. As the major content shared are in the form of images and rapid increase in computing power a better and complex encryption standard is needed to protect this data from being leaked to unauthorized person. Our proposed system makes use of chaotic maps, deoxyribonucleic acid (DNA) coding and ribonucleic acid (RNA) coding technique to encrypt the image. As videos are nothing but collection of images played at the rate of minimum 30 frames/images per second, this methodology can also be used to encrypt videos. The complexity and dynamic nature of chaotic systems makes decryption of content by unauthorized personal difficult. The hybrid usage of chaotic systems along with DNA and RNA sequencing improves the encryption efficiency of the algorithm and also makes it possible to decrypt the images at the same time without consuming too much of computation power.
Lightweight digital imaging and communications in medicine image encryption f...TELKOMNIKA JOURNAL
Diagnosis in healthcare systems relies heavily on the use of medical images. Images such as X-rays, ultrasounds, computed tomography (CT) scans, magnetic resonance imaging (MRIs), and other scans of the brain and other internal organs of patients include private and personal information. However, these images are vulnerable to unauthorized users who unlawfully use them for non-diagnostic reasons due to the lack of security in communication routes and the gaps in the storage systems of hospitals or medical centers. Image encryption is a prominent technique used to protect medical images from unauthorized access in addition to enhancing the security of communication networks. In this paper, researchers offer a lightweight cryptosystem for the secure encryption of medical images that makes use of the present block cipher and a five-dimensional chaotic map. More than 25 images from the open science framework (OSF) public database of patients with coronavirus disease 2019 (COVID-19) were used to evaluate the proposed system. DICOM stands for “digital imaging and communications in medicine”. The efficiency of the proposed system is proved in terms of adjacent pixels’ correlation analysis, National Institute of Standards and Technology (NIST) analysis, mean square error, information entropy, unified average changing intensity, peak-to-signal noise ratio, entropy, and structure similarity index image.
Secure Image Transmission for Cloud Storage System Using Hybrid SchemeIJERD Editor
- Data over the cloud is transferred or transmitted between servers and users. Privacy of that
data is very important as it belongs to personal information. If data get hacked by the hacker, can be
used to defame a person’s social data. Sometimes delay are held during data transmission. i.e. Mobile
communication, bandwidth is low. Hence compression algorithms are proposed for fast and efficient
transmission, encryption is used for security purposes and blurring is used by providing additional
layers of security. These algorithms are hybridized for having a robust and efficient security and
transmission over cloud storage system.
Color image encryption based on chaotic shit keying with lossless compression IJECEIAES
In order to protect valuable data from undesirable readers or against illegal reproduction and modifications, there have been various data encryption techniques. Many methods are developed to perform image encryption. The use of chaotic map for image encryption is very effective, since it increases the security, due to its random behavior. The most attractive feature of deterministic chaotic systems is the extremely unexpected and random-look nature of chaotic signals that may lead to novel applications. A novel algorithm for image encryption based on compression and hyper chaotic map techniques is suggested. First, the RGB image is broken down into R, G and B subbands after that each band is compressed using lossless technique. The generated chaotic sequences from the 3D chaotic system are employed to code the compressed results by employing the idea of chaotic shift encoding (CSK) modulation to encode the three bands to generate the encrypted image. The experiments show that the proposed method give good results in term of security, feasibility, and robustness.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Combined Chebyshev and logistic maps to generate pseudorandom number generat...IJECEIAES
Sensitive data exchanging among things over the internet must be protected by a powerful cryptographic system. Conventional cryptographic such as advanced encryption standard (AES), and respiratory sinus arrhythmia (RSA) are not effective enough to protect internet of things (IoT) because of certain inveterate IoT properties like limited memory, computation, and bandwidth. Nowadays, chaotic maps with high sensitivity to initial conditions, strong ergodicity, and non-periodicity have been widely used in IoT security applications. So, it is suitable for IoT. Also, in a stream cipher method, the user needs to deliver the keystream to all clients in advance. Consequently, this paper proposed a method to solve the keys distribution problem based on combine both Chebyshev and logistic maps techniques as well as a master key to generate a random key. The suggested method was compared with the other stream cipher algorithms (Chacha20, RC4, Salsa20) by utilizing the same plaintext and master key as input parameters and the results were successful in the statistical national institute of standards and technology (NIST) test. Simultaneously, the suggestion was evaluated through different evaluation methods like statistical NIST test, histogram, Shannon entropy, correlation coefficient analysis, keyspace and key sensitivity, and others. All mentioned tests are passed successfully. Therefore, the suggested approach was proved it is effective in security issues.
This paper presents an FPGA-based algorithm for moving object detection from video for traffic surveillance. The algorithm uses background subtraction, edge detection and shadow detection techniques. Background subtraction involves selective and non-selective updating to improve sensitivity. Edge detection helps find object boundaries while shadow detection removes falsely detected pixels from shadows. The algorithm is implemented using VHDL on a Spartan-6 FPGA board. Experimental results show the algorithm can accurately detect moving vehicles in different lighting conditions with low power consumption, making it suitable for traffic monitoring applications.
Color Image Encryption and Decryption Using Multiple Chaotic MapsIJTET Journal
Owing to advances in communication technology, a bulk of visual digital data is being stored and transmitted over the internet now-a-days. Particularly millions and millions of images transfer through the network per day as per the statistics and a result, the security of image data is an important requirement. Image encryption algorithm is used to provide this security. In this paper, an image encryption algorithm based on confusion diffusion architecture that uses dynamic key space is proposed. An internal key generator is used to generate the initial seeds for the overall encryption scheme is proposed. With these initial seeds logistic map generates pseudo random numbers then these numbers are converted into permutation order for permutation. The diffusion bits are generated in parallel using the logistic map and manipulated with pixels confused. The image pixels are iteratively confused and diffused using permutation order and diffusion bits respectively to produce cipher image in minimum number of rounds. This paper proposes a new kind of initial seed generation that utilizes the combo of logistic and tent maps. Even all external seeds are same. The internal seeds will be totally different. This ensures the key sensitivity. The simulation results and analysis confirm that the satisfactory level of security is achieved in three rounds and overall encryption time is saved.
High-performance AES-128 algorithm implementation by FPGA-based SoC for 5G co...IJECEIAES
In this research work, a fast and lightweight AES-128 cypher based on the Xilinx ZCU102 FPGA board is presented, suitable for 5G communications. In particular, both encryption and decryption algorithms have been developed using a pipelined approach, so enabling the simultaneous processing of the rounds on multiple data packets at each clock cycle. Both the encryption and decryption systems support an operative frequency up to 220 MHz, reaching 28.16 Gbit/s maximum data throughput; besides, the encryption and decryption phases last both only ten clock periods. To guarantee the interoperability of the developed encryption/decryption system with the other sections of the 5G communication apparatus, synchronization and control signals have been integrated. The encryption system uses only 1631 CLBs, whereas the decryption one only 3464 CLBs, ascribable, mainly, to the Inverse Mix Columns step. The developed cypher shows higher efficiency (8.63 Mbps/slice) than similar solutions present in literature.
Extended of TEA: A 256 bits block cipher algorithm for image encryption IJECEIAES
This paper introduces an effective image encryption approach that merges a chaotic map and polynomial with a block cipher. According to this scheme, there are three levels of encryption. In the first level, pixel positions of the image are scuffled into blocks randomly based on a chaotic map. In the second level, the polynomials are constructed by taking N unused pixels from the permuted blocks as polynomial coefficients. Finally, the third level a proposed secret-key block cipher called extended of tiny encryption algorithm (ETEA) is used. The proposed ETEA algorithm increased the block size from 64-bit to 256-bit by using F-function in type three Feistel network design. The key schedule generation is very straightforward through admixture the entire major subjects in the identical manner for every round. The proposed ETEA algorithm is word-oriented, where wholly internal operations are executed on words of 32 bits. So, it is possible to efficiently implement the proposed algorithm on smart cards. The results of the experimental demonstration that the proposed encryption algorithm for all methods are efficient and have high security features through statistical analysis using histograms, correlation, entropy, randomness tests, and the avalanche effect.
With the development of information security, the traditional image encryption methods have become
outdated. Because of amply using images in the transmission process, it is important to protect the confidential image
data from unauthorized access. This paper presents a new chaos based image encryption algorithm, which can improve
the security during transmission more effectively utilizes the chaotic systems properties, such as pseudo-random
appearance and sensitivity to initial conditions. Based on chaotic theory and decomposition and recombination of pixel
values, this new image scrambling algorithm is able to change the position of pixel, simultaneously scrambling both
position and pixel values. Experimental results show that the new algorithm improves the image security effectively to
avoid unscramble, and it also can restore the image as same as the original one, which reaches to the purposes of image
safe and reliable transmission.
Biomedical image transmission based on Modified feistal algorithmijcsit
This document presents a high-performance hardware implementation of a biomedical image encryption system using a modified Feistal algorithm. The encryption algorithm is based on DES with a novel key scheduling technique. The encrypted images are unintelligible but have high clarity when decrypted. The system is implemented on an FPGA and achieves an encryption rate of 35.5 Gbit/s. It uses different keys each clock cycle, making the encrypted images very difficult to break.
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...IJECEIAES
Medical image analysis has witnessed significant advancements with deep learning techniques. In the domain of brain tumor segmentation, the ability to
precisely delineate tumor boundaries from magnetic resonance imaging (MRI)
scans holds profound implications for diagnosis. This study presents an ensemble convolutional neural network (CNN) with transfer learning, integrating
the state-of-the-art Deeplabv3+ architecture with the ResNet18 backbone. The
model is rigorously trained and evaluated, exhibiting remarkable performance
metrics, including an impressive global accuracy of 99.286%, a high-class accuracy of 82.191%, a mean intersection over union (IoU) of 79.900%, a weighted
IoU of 98.620%, and a Boundary F1 (BF) score of 83.303%. Notably, a detailed comparative analysis with existing methods showcases the superiority of
our proposed model. These findings underscore the model’s competence in precise brain tumor localization, underscoring its potential to revolutionize medical
image analysis and enhance healthcare outcomes. This research paves the way
for future exploration and optimization of advanced CNN models in medical
imaging, emphasizing addressing false positives and resource efficiency.
Embedded machine learning-based road conditions and driving behavior monitoringIJECEIAES
Car accident rates have increased in recent years, resulting in losses in human lives, properties, and other financial costs. An embedded machine learning-based system is developed to address this critical issue. The system can monitor road conditions, detect driving patterns, and identify aggressive driving behaviors. The system is based on neural networks trained on a comprehensive dataset of driving events, driving styles, and road conditions. The system effectively detects potential risks and helps mitigate the frequency and impact of accidents. The primary goal is to ensure the safety of drivers and vehicles. Collecting data involved gathering information on three key road events: normal street and normal drive, speed bumps, circular yellow speed bumps, and three aggressive driving actions: sudden start, sudden stop, and sudden entry. The gathered data is processed and analyzed using a machine learning system designed for limited power and memory devices. The developed system resulted in 91.9% accuracy, 93.6% precision, and 92% recall. The achieved inference time on an Arduino Nano 33 BLE Sense with a 32-bit CPU running at 64 MHz is 34 ms and requires 2.6 kB peak RAM and 139.9 kB program flash memory, making it suitable for resource-constrained embedded systems.
More Related Content
Similar to Field-programmable gate array design of image encryption and decryption using Chua’s chaotic masking
IRJET- A Novel Hybrid Security System for OFDM-PON using Highly Improved RC6 ...IRJET Journal
This document proposes a novel hybrid security system for OFDM-PON using a highly improved RC6 algorithm and scrambling technique. The data is first scrambled using Morlet wavelet transform for spatial domain scrambling without data loss. It is then encrypted using a highly improved RC6 algorithm for enhanced security. By combining scrambling and encryption, a two-tier security approach is implemented with low complexity. Simulation results show low bit and symbol error rates, demonstrating improved system performance. The proposed scheme provides enhanced security for OFDM-PON networks with potential applications in secure optical communications.
IRJET- An Overview of Hiding Information in H.264/Avc Compressed VideoIRJET Journal
This document provides an overview of hiding information in H.264/AVC compressed video. It discusses different information hiding techniques such as bit plane replacement, spread spectrum, histogram manipulation and matrix encryption. It identifies locations within the H.264 video compression process where information can be hidden, such as during prediction, transformation, quantization and entropy coding. It reviews related information hiding strategies for each location and compares strategies based on payload, overhead, video quality and complexity. The document aims to provide a better understanding of information hiding in compressed video and identify new opportunities.
The Quality of the New Generator Sequence Improvent to Spread the Color Syste...TELKOMNIKA JOURNAL
This paper shows a new technic applicable for the digital devices that are the result of the finite’s
effect precision in the chaotic dynamics used in the coupled technic and the chaotic map’s perturbation
technics used for the generation of a Pseudo-Random Number Generator (PRNGs).The use of the
pseudo- chaotic sequences coupled to the orbit perturbation method in the chaotic logistic map and the
NewPiece-Wise Linear Chaotic Map (NPWLCM). The pseudo random number generator’s originality
proposed from the perturbation of the chaotic recurrence. Furthermore the outputs of the binary sequences
with NPWLCM are reconstructed conventionally with the Bernoulli’s sequences shifts map to change the
shapes with the bitwise permetation then the results in simulation are shown in progress.After being
perturbed, the chaotic system can generate the chaotic binary sequences in uniform distribution and the
statistical properties invulnerable analysis. This generator also has many advantages in the possible useful
applications of spread spectrum digitalimages, such as sensitive secret keys, random uniform distribution
of pixels in Crypto system in secure and synchronize communication.
This document provides an overview of a project that implemented image filtering using VHDL on an FPGA board. It discusses designing filters like average, Sobel, Gaussian, and Laplacian filters. Cache memory and a processing unit were developed to hold pixel values and apply filter kernels. Different methods for multiplication in the convolution process were evaluated. Results showed the output images after applying each filter both in software and on the FPGA board. In conclusion, FPGAs provide reconfigurable, accelerated processing for image applications like filtering compared to general purpose computers.
COLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMSIJNSA Journal
This paper proposed a novel color image encryption scheme based on multiple chaotic systems. The ergodicity property of chaotic system is utilized to perform the permutation process; a substitution operation is applied to achieve the diffusion effect. In permutation stage, the 3D color plain-image matrix is converted to a 2D image matrix, then two generalized Arnold maps are employed to generate hybrid chaotic sequences which are dependent on the plain-image’s content. The generated chaotic sequences are then applied to perform the permutation process. The encryption’s key streams not only depend on the cipher keys but also depend on plain-image and therefore can resist chosen-plaintext attack as well as
known-plaintext attack. In the diffusion stage, four pseudo-random gray value sequences are generated by
another generalized Arnold map. The gray value sequences are applied to perform the diffusion process by bitxoring operation with the permuted image row-by-row or column-by-column to improve the encryption rate. The security and performance analysis have been performed, including key space analysis, histogram analysis, correlation analysis, information entropy analysis, key sensitivity analysis, differential analysis
etc. The experimental results show that the proposed image encryption scheme is highly secure thanks to its
large key space and efficient permutation-substitution operation, and therefore it is suitable for practical image and video encryption.
COLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMSIJNSA Journal
This document proposes a novel color image encryption scheme based on multiple chaotic systems. The scheme utilizes the ergodic properties of chaotic systems to perform pixel permutation and applies a substitution operation to achieve diffusion. In the permutation stage, two generalized Arnold maps are used to generate hybrid chaotic sequences to permute pixel positions. In the diffusion stage, four pseudo-random gray value sequences generated by another generalized Arnold map are used to diffuse the permuted image via bitwise XOR operations. Security analysis shows the scheme has a large key space and is highly secure against statistical attacks, differential attacks, and chosen/known plaintext attacks.
COLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMSIJNSA Journal
This paper proposed a novel color image encryption scheme based on multiple chaotic systems. The ergodicity property of chaotic system is utilized to perform the permutation process; a substitution
operation is applied to achieve the diffusion effect. In permutation stage, the 3D color plain-image matrix
is converted to a 2D image matrix, then two generalized Arnold maps are employed to generate hybrid chaotic sequences which are dependent on the plain-image’s content. The generated chaotic sequences are then applied to perform the permutation process. The encryption’s key streams not only depend on the
cipher keys but also depend on plain-image and therefore can resist chosen-plaintext attack as well as
known-plaintext attack. In the diffusion stage, four pseudo-random gray value sequences are generated by another generalized Arnold map. The gray value sequences are applied to perform the diffusion process by bitxoring operation with the permuted image row-by-row or column-by-column to improve the encryption rate. The security and performance analysis have been performed, including key space analysis, histogram analysis, correlation analysis, information entropy analysis, key sensitivity analysis, differential analysis etc. The experimental results show that the proposed image encryption scheme is highly secure thanks to its large key space and efficient permutation-substitution operation, and therefore it is suitable for practical image and video encryption.
Image encryption algorithm based on the density and 6D logistic map IJECEIAES
One of the most difficult issues in the history of communication technology is the transmission of secure images. On the internet, photos are used and shared by millions of individuals for both private and business reasons. Utilizing encryption methods to change the original image into an unintelligible or scrambled version is one way to achieve safe image transfer over the network. Cryptographic approaches based on chaotic logistic theory provide several new and promising options for developing secure Image encryption methods. The main aim of this paper is to build a secure system for encrypting gray and color images. The proposed system consists of two stages, the first stage is the encryption process, in which the keys are generated depending on the chaotic logistic with the image density to encrypt the gray and color images, and the second stage is the decryption, which is the opposite of the encryption process to obtain the original image. The proposed method has been tested on two standard gray and color images publicly available. The test results indicate to the highest value of peak signal-to-noise ratio (PSNR), unified average changing intensity (UACI), number of pixel change rate (NPCR) are 7.7268, 50.2011 and 100, respectively. While the encryption and decryption speed up to 0.6319 and 0.5305 second respectively.
Hybrid chaos-based image encryption algorithm using Chebyshev chaotic map wit...IJECEIAES
The media content shared on the internet has increased tremendously nowadays. The streaming service has major role in contributing to internet traffic all over the world. As the major content shared are in the form of images and rapid increase in computing power a better and complex encryption standard is needed to protect this data from being leaked to unauthorized person. Our proposed system makes use of chaotic maps, deoxyribonucleic acid (DNA) coding and ribonucleic acid (RNA) coding technique to encrypt the image. As videos are nothing but collection of images played at the rate of minimum 30 frames/images per second, this methodology can also be used to encrypt videos. The complexity and dynamic nature of chaotic systems makes decryption of content by unauthorized personal difficult. The hybrid usage of chaotic systems along with DNA and RNA sequencing improves the encryption efficiency of the algorithm and also makes it possible to decrypt the images at the same time without consuming too much of computation power.
Lightweight digital imaging and communications in medicine image encryption f...TELKOMNIKA JOURNAL
Diagnosis in healthcare systems relies heavily on the use of medical images. Images such as X-rays, ultrasounds, computed tomography (CT) scans, magnetic resonance imaging (MRIs), and other scans of the brain and other internal organs of patients include private and personal information. However, these images are vulnerable to unauthorized users who unlawfully use them for non-diagnostic reasons due to the lack of security in communication routes and the gaps in the storage systems of hospitals or medical centers. Image encryption is a prominent technique used to protect medical images from unauthorized access in addition to enhancing the security of communication networks. In this paper, researchers offer a lightweight cryptosystem for the secure encryption of medical images that makes use of the present block cipher and a five-dimensional chaotic map. More than 25 images from the open science framework (OSF) public database of patients with coronavirus disease 2019 (COVID-19) were used to evaluate the proposed system. DICOM stands for “digital imaging and communications in medicine”. The efficiency of the proposed system is proved in terms of adjacent pixels’ correlation analysis, National Institute of Standards and Technology (NIST) analysis, mean square error, information entropy, unified average changing intensity, peak-to-signal noise ratio, entropy, and structure similarity index image.
Secure Image Transmission for Cloud Storage System Using Hybrid SchemeIJERD Editor
- Data over the cloud is transferred or transmitted between servers and users. Privacy of that
data is very important as it belongs to personal information. If data get hacked by the hacker, can be
used to defame a person’s social data. Sometimes delay are held during data transmission. i.e. Mobile
communication, bandwidth is low. Hence compression algorithms are proposed for fast and efficient
transmission, encryption is used for security purposes and blurring is used by providing additional
layers of security. These algorithms are hybridized for having a robust and efficient security and
transmission over cloud storage system.
Color image encryption based on chaotic shit keying with lossless compression IJECEIAES
In order to protect valuable data from undesirable readers or against illegal reproduction and modifications, there have been various data encryption techniques. Many methods are developed to perform image encryption. The use of chaotic map for image encryption is very effective, since it increases the security, due to its random behavior. The most attractive feature of deterministic chaotic systems is the extremely unexpected and random-look nature of chaotic signals that may lead to novel applications. A novel algorithm for image encryption based on compression and hyper chaotic map techniques is suggested. First, the RGB image is broken down into R, G and B subbands after that each band is compressed using lossless technique. The generated chaotic sequences from the 3D chaotic system are employed to code the compressed results by employing the idea of chaotic shift encoding (CSK) modulation to encode the three bands to generate the encrypted image. The experiments show that the proposed method give good results in term of security, feasibility, and robustness.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Combined Chebyshev and logistic maps to generate pseudorandom number generat...IJECEIAES
Sensitive data exchanging among things over the internet must be protected by a powerful cryptographic system. Conventional cryptographic such as advanced encryption standard (AES), and respiratory sinus arrhythmia (RSA) are not effective enough to protect internet of things (IoT) because of certain inveterate IoT properties like limited memory, computation, and bandwidth. Nowadays, chaotic maps with high sensitivity to initial conditions, strong ergodicity, and non-periodicity have been widely used in IoT security applications. So, it is suitable for IoT. Also, in a stream cipher method, the user needs to deliver the keystream to all clients in advance. Consequently, this paper proposed a method to solve the keys distribution problem based on combine both Chebyshev and logistic maps techniques as well as a master key to generate a random key. The suggested method was compared with the other stream cipher algorithms (Chacha20, RC4, Salsa20) by utilizing the same plaintext and master key as input parameters and the results were successful in the statistical national institute of standards and technology (NIST) test. Simultaneously, the suggestion was evaluated through different evaluation methods like statistical NIST test, histogram, Shannon entropy, correlation coefficient analysis, keyspace and key sensitivity, and others. All mentioned tests are passed successfully. Therefore, the suggested approach was proved it is effective in security issues.
This paper presents an FPGA-based algorithm for moving object detection from video for traffic surveillance. The algorithm uses background subtraction, edge detection and shadow detection techniques. Background subtraction involves selective and non-selective updating to improve sensitivity. Edge detection helps find object boundaries while shadow detection removes falsely detected pixels from shadows. The algorithm is implemented using VHDL on a Spartan-6 FPGA board. Experimental results show the algorithm can accurately detect moving vehicles in different lighting conditions with low power consumption, making it suitable for traffic monitoring applications.
Color Image Encryption and Decryption Using Multiple Chaotic MapsIJTET Journal
Owing to advances in communication technology, a bulk of visual digital data is being stored and transmitted over the internet now-a-days. Particularly millions and millions of images transfer through the network per day as per the statistics and a result, the security of image data is an important requirement. Image encryption algorithm is used to provide this security. In this paper, an image encryption algorithm based on confusion diffusion architecture that uses dynamic key space is proposed. An internal key generator is used to generate the initial seeds for the overall encryption scheme is proposed. With these initial seeds logistic map generates pseudo random numbers then these numbers are converted into permutation order for permutation. The diffusion bits are generated in parallel using the logistic map and manipulated with pixels confused. The image pixels are iteratively confused and diffused using permutation order and diffusion bits respectively to produce cipher image in minimum number of rounds. This paper proposes a new kind of initial seed generation that utilizes the combo of logistic and tent maps. Even all external seeds are same. The internal seeds will be totally different. This ensures the key sensitivity. The simulation results and analysis confirm that the satisfactory level of security is achieved in three rounds and overall encryption time is saved.
High-performance AES-128 algorithm implementation by FPGA-based SoC for 5G co...IJECEIAES
In this research work, a fast and lightweight AES-128 cypher based on the Xilinx ZCU102 FPGA board is presented, suitable for 5G communications. In particular, both encryption and decryption algorithms have been developed using a pipelined approach, so enabling the simultaneous processing of the rounds on multiple data packets at each clock cycle. Both the encryption and decryption systems support an operative frequency up to 220 MHz, reaching 28.16 Gbit/s maximum data throughput; besides, the encryption and decryption phases last both only ten clock periods. To guarantee the interoperability of the developed encryption/decryption system with the other sections of the 5G communication apparatus, synchronization and control signals have been integrated. The encryption system uses only 1631 CLBs, whereas the decryption one only 3464 CLBs, ascribable, mainly, to the Inverse Mix Columns step. The developed cypher shows higher efficiency (8.63 Mbps/slice) than similar solutions present in literature.
Extended of TEA: A 256 bits block cipher algorithm for image encryption IJECEIAES
This paper introduces an effective image encryption approach that merges a chaotic map and polynomial with a block cipher. According to this scheme, there are three levels of encryption. In the first level, pixel positions of the image are scuffled into blocks randomly based on a chaotic map. In the second level, the polynomials are constructed by taking N unused pixels from the permuted blocks as polynomial coefficients. Finally, the third level a proposed secret-key block cipher called extended of tiny encryption algorithm (ETEA) is used. The proposed ETEA algorithm increased the block size from 64-bit to 256-bit by using F-function in type three Feistel network design. The key schedule generation is very straightforward through admixture the entire major subjects in the identical manner for every round. The proposed ETEA algorithm is word-oriented, where wholly internal operations are executed on words of 32 bits. So, it is possible to efficiently implement the proposed algorithm on smart cards. The results of the experimental demonstration that the proposed encryption algorithm for all methods are efficient and have high security features through statistical analysis using histograms, correlation, entropy, randomness tests, and the avalanche effect.
With the development of information security, the traditional image encryption methods have become
outdated. Because of amply using images in the transmission process, it is important to protect the confidential image
data from unauthorized access. This paper presents a new chaos based image encryption algorithm, which can improve
the security during transmission more effectively utilizes the chaotic systems properties, such as pseudo-random
appearance and sensitivity to initial conditions. Based on chaotic theory and decomposition and recombination of pixel
values, this new image scrambling algorithm is able to change the position of pixel, simultaneously scrambling both
position and pixel values. Experimental results show that the new algorithm improves the image security effectively to
avoid unscramble, and it also can restore the image as same as the original one, which reaches to the purposes of image
safe and reliable transmission.
Biomedical image transmission based on Modified feistal algorithmijcsit
This document presents a high-performance hardware implementation of a biomedical image encryption system using a modified Feistal algorithm. The encryption algorithm is based on DES with a novel key scheduling technique. The encrypted images are unintelligible but have high clarity when decrypted. The system is implemented on an FPGA and achieves an encryption rate of 35.5 Gbit/s. It uses different keys each clock cycle, making the encrypted images very difficult to break.
Similar to Field-programmable gate array design of image encryption and decryption using Chua’s chaotic masking (20)
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...IJECEIAES
Medical image analysis has witnessed significant advancements with deep learning techniques. In the domain of brain tumor segmentation, the ability to
precisely delineate tumor boundaries from magnetic resonance imaging (MRI)
scans holds profound implications for diagnosis. This study presents an ensemble convolutional neural network (CNN) with transfer learning, integrating
the state-of-the-art Deeplabv3+ architecture with the ResNet18 backbone. The
model is rigorously trained and evaluated, exhibiting remarkable performance
metrics, including an impressive global accuracy of 99.286%, a high-class accuracy of 82.191%, a mean intersection over union (IoU) of 79.900%, a weighted
IoU of 98.620%, and a Boundary F1 (BF) score of 83.303%. Notably, a detailed comparative analysis with existing methods showcases the superiority of
our proposed model. These findings underscore the model’s competence in precise brain tumor localization, underscoring its potential to revolutionize medical
image analysis and enhance healthcare outcomes. This research paves the way
for future exploration and optimization of advanced CNN models in medical
imaging, emphasizing addressing false positives and resource efficiency.
Embedded machine learning-based road conditions and driving behavior monitoringIJECEIAES
Car accident rates have increased in recent years, resulting in losses in human lives, properties, and other financial costs. An embedded machine learning-based system is developed to address this critical issue. The system can monitor road conditions, detect driving patterns, and identify aggressive driving behaviors. The system is based on neural networks trained on a comprehensive dataset of driving events, driving styles, and road conditions. The system effectively detects potential risks and helps mitigate the frequency and impact of accidents. The primary goal is to ensure the safety of drivers and vehicles. Collecting data involved gathering information on three key road events: normal street and normal drive, speed bumps, circular yellow speed bumps, and three aggressive driving actions: sudden start, sudden stop, and sudden entry. The gathered data is processed and analyzed using a machine learning system designed for limited power and memory devices. The developed system resulted in 91.9% accuracy, 93.6% precision, and 92% recall. The achieved inference time on an Arduino Nano 33 BLE Sense with a 32-bit CPU running at 64 MHz is 34 ms and requires 2.6 kB peak RAM and 139.9 kB program flash memory, making it suitable for resource-constrained embedded systems.
Advanced control scheme of doubly fed induction generator for wind turbine us...IJECEIAES
This paper describes a speed control device for generating electrical energy on an electricity network based on the doubly fed induction generator (DFIG) used for wind power conversion systems. At first, a double-fed induction generator model was constructed. A control law is formulated to govern the flow of energy between the stator of a DFIG and the energy network using three types of controllers: proportional integral (PI), sliding mode controller (SMC) and second order sliding mode controller (SOSMC). Their different results in terms of power reference tracking, reaction to unexpected speed fluctuations, sensitivity to perturbations, and resilience against machine parameter alterations are compared. MATLAB/Simulink was used to conduct the simulations for the preceding study. Multiple simulations have shown very satisfying results, and the investigations demonstrate the efficacy and power-enhancing capabilities of the suggested control system.
Neural network optimizer of proportional-integral-differential controller par...IJECEIAES
Wide application of proportional-integral-differential (PID)-regulator in industry requires constant improvement of methods of its parameters adjustment. The paper deals with the issues of optimization of PID-regulator parameters with the use of neural network technology methods. A methodology for choosing the architecture (structure) of neural network optimizer is proposed, which consists in determining the number of layers, the number of neurons in each layer, as well as the form and type of activation function. Algorithms of neural network training based on the application of the method of minimizing the mismatch between the regulated value and the target value are developed. The method of back propagation of gradients is proposed to select the optimal training rate of neurons of the neural network. The neural network optimizer, which is a superstructure of the linear PID controller, allows increasing the regulation accuracy from 0.23 to 0.09, thus reducing the power consumption from 65% to 53%. The results of the conducted experiments allow us to conclude that the created neural superstructure may well become a prototype of an automatic voltage regulator (AVR)-type industrial controller for tuning the parameters of the PID controller.
An improved modulation technique suitable for a three level flying capacitor ...IJECEIAES
This research paper introduces an innovative modulation technique for controlling a 3-level flying capacitor multilevel inverter (FCMLI), aiming to streamline the modulation process in contrast to conventional methods. The proposed
simplified modulation technique paves the way for more straightforward and
efficient control of multilevel inverters, enabling their widespread adoption and
integration into modern power electronic systems. Through the amalgamation of
sinusoidal pulse width modulation (SPWM) with a high-frequency square wave
pulse, this controlling technique attains energy equilibrium across the coupling
capacitor. The modulation scheme incorporates a simplified switching pattern
and a decreased count of voltage references, thereby simplifying the control
algorithm.
A review on features and methods of potential fishing zoneIJECEIAES
This review focuses on the importance of identifying potential fishing zones in seawater for sustainable fishing practices. It explores features like sea surface temperature (SST) and sea surface height (SSH), along with classification methods such as classifiers. The features like SST, SSH, and different classifiers used to classify the data, have been figured out in this review study. This study underscores the importance of examining potential fishing zones using advanced analytical techniques. It thoroughly explores the methodologies employed by researchers, covering both past and current approaches. The examination centers on data characteristics and the application of classification algorithms for classification of potential fishing zones. Furthermore, the prediction of potential fishing zones relies significantly on the effectiveness of classification algorithms. Previous research has assessed the performance of models like support vector machines, naïve Bayes, and artificial neural networks (ANN). In the previous result, the results of support vector machine (SVM) were 97.6% more accurate than naive Bayes's 94.2% to classify test data for fisheries classification. By considering the recent works in this area, several recommendations for future works are presented to further improve the performance of the potential fishing zone models, which is important to the fisheries community.
Electrical signal interference minimization using appropriate core material f...IJECEIAES
As demand for smaller, quicker, and more powerful devices rises, Moore's law is strictly followed. The industry has worked hard to make little devices that boost productivity. The goal is to optimize device density. Scientists are reducing connection delays to improve circuit performance. This helped them understand three-dimensional integrated circuit (3D IC) concepts, which stack active devices and create vertical connections to diminish latency and lower interconnects. Electrical involvement is a big worry with 3D integrates circuits. Researchers have developed and tested through silicon via (TSV) and substrates to decrease electrical wave involvement. This study illustrates a novel noise coupling reduction method using several electrical involvement models. A 22% drop in electrical involvement from wave-carrying to victim TSVs introduces this new paradigm and improves system performance even at higher THz frequencies.
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...IJECEIAES
Climate change's impact on the planet forced the United Nations and governments to promote green energies and electric transportation. The deployments of photovoltaic (PV) and electric vehicle (EV) systems gained stronger momentum due to their numerous advantages over fossil fuel types. The advantages go beyond sustainability to reach financial support and stability. The work in this paper introduces the hybrid system between PV and EV to support industrial and commercial plants. This paper covers the theoretical framework of the proposed hybrid system including the required equation to complete the cost analysis when PV and EV are present. In addition, the proposed design diagram which sets the priorities and requirements of the system is presented. The proposed approach allows setup to advance their power stability, especially during power outages. The presented information supports researchers and plant owners to complete the necessary analysis while promoting the deployment of clean energy. The result of a case study that represents a dairy milk farmer supports the theoretical works and highlights its advanced benefits to existing plants. The short return on investment of the proposed approach supports the paper's novelty approach for the sustainable electrical system. In addition, the proposed system allows for an isolated power setup without the need for a transmission line which enhances the safety of the electrical network
Bibliometric analysis highlighting the role of women in addressing climate ch...IJECEIAES
Fossil fuel consumption increased quickly, contributing to climate change
that is evident in unusual flooding and draughts, and global warming. Over
the past ten years, women's involvement in society has grown dramatically,
and they succeeded in playing a noticeable role in reducing climate change.
A bibliometric analysis of data from the last ten years has been carried out to
examine the role of women in addressing the climate change. The analysis's
findings discussed the relevant to the sustainable development goals (SDGs),
particularly SDG 7 and SDG 13. The results considered contributions made
by women in the various sectors while taking geographic dispersion into
account. The bibliometric analysis delves into topics including women's
leadership in environmental groups, their involvement in policymaking, their
contributions to sustainable development projects, and the influence of
gender diversity on attempts to mitigate climate change. This study's results
highlight how women have influenced policies and actions related to climate
change, point out areas of research deficiency and recommendations on how
to increase role of the women in addressing the climate change and
achieving sustainability. To achieve more successful results, this initiative
aims to highlight the significance of gender equality and encourage
inclusivity in climate change decision-making processes.
Voltage and frequency control of microgrid in presence of micro-turbine inter...IJECEIAES
The active and reactive load changes have a significant impact on voltage
and frequency. In this paper, in order to stabilize the microgrid (MG) against
load variations in islanding mode, the active and reactive power of all
distributed generators (DGs), including energy storage (battery), diesel
generator, and micro-turbine, are controlled. The micro-turbine generator is
connected to MG through a three-phase to three-phase matrix converter, and
the droop control method is applied for controlling the voltage and
frequency of MG. In addition, a method is introduced for voltage and
frequency control of micro-turbines in the transition state from gridconnected mode to islanding mode. A novel switching strategy of the matrix
converter is used for converting the high-frequency output voltage of the
micro-turbine to the grid-side frequency of the utility system. Moreover,
using the switching strategy, the low-order harmonics in the output current
and voltage are not produced, and consequently, the size of the output filter
would be reduced. In fact, the suggested control strategy is load-independent
and has no frequency conversion restrictions. The proposed approach for
voltage and frequency regulation demonstrates exceptional performance and
favorable response across various load alteration scenarios. The suggested
strategy is examined in several scenarios in the MG test systems, and the
simulation results are addressed.
Enhancing battery system identification: nonlinear autoregressive modeling fo...IJECEIAES
Precisely characterizing Li-ion batteries is essential for optimizing their
performance, enhancing safety, and prolonging their lifespan across various
applications, such as electric vehicles and renewable energy systems. This
article introduces an innovative nonlinear methodology for system
identification of a Li-ion battery, employing a nonlinear autoregressive with
exogenous inputs (NARX) model. The proposed approach integrates the
benefits of nonlinear modeling with the adaptability of the NARX structure,
facilitating a more comprehensive representation of the intricate
electrochemical processes within the battery. Experimental data collected
from a Li-ion battery operating under diverse scenarios are employed to
validate the effectiveness of the proposed methodology. The identified
NARX model exhibits superior accuracy in predicting the battery's behavior
compared to traditional linear models. This study underscores the
importance of accounting for nonlinearities in battery modeling, providing
insights into the intricate relationships between state-of-charge, voltage, and
current under dynamic conditions.
Smart grid deployment: from a bibliometric analysis to a surveyIJECEIAES
Smart grids are one of the last decades' innovations in electrical energy.
They bring relevant advantages compared to the traditional grid and
significant interest from the research community. Assessing the field's
evolution is essential to propose guidelines for facing new and future smart
grid challenges. In addition, knowing the main technologies involved in the
deployment of smart grids (SGs) is important to highlight possible
shortcomings that can be mitigated by developing new tools. This paper
contributes to the research trends mentioned above by focusing on two
objectives. First, a bibliometric analysis is presented to give an overview of
the current research level about smart grid deployment. Second, a survey of
the main technological approaches used for smart grid implementation and
their contributions are highlighted. To that effect, we searched the Web of
Science (WoS), and the Scopus databases. We obtained 5,663 documents
from WoS and 7,215 from Scopus on smart grid implementation or
deployment. With the extraction limitation in the Scopus database, 5,872 of
the 7,215 documents were extracted using a multi-step process. These two
datasets have been analyzed using a bibliometric tool called bibliometrix.
The main outputs are presented with some recommendations for future
research.
Use of analytical hierarchy process for selecting and prioritizing islanding ...IJECEIAES
One of the problems that are associated to power systems is islanding
condition, which must be rapidly and properly detected to prevent any
negative consequences on the system's protection, stability, and security.
This paper offers a thorough overview of several islanding detection
strategies, which are divided into two categories: classic approaches,
including local and remote approaches, and modern techniques, including
techniques based on signal processing and computational intelligence.
Additionally, each approach is compared and assessed based on several
factors, including implementation costs, non-detected zones, declining
power quality, and response times using the analytical hierarchy process
(AHP). The multi-criteria decision-making analysis shows that the overall
weight of passive methods (24.7%), active methods (7.8%), hybrid methods
(5.6%), remote methods (14.5%), signal processing-based methods (26.6%),
and computational intelligent-based methods (20.8%) based on the
comparison of all criteria together. Thus, it can be seen from the total weight
that hybrid approaches are the least suitable to be chosen, while signal
processing-based methods are the most appropriate islanding detection
method to be selected and implemented in power system with respect to the
aforementioned factors. Using Expert Choice software, the proposed
hierarchy model is studied and examined.
Enhancing of single-stage grid-connected photovoltaic system using fuzzy logi...IJECEIAES
The power generated by photovoltaic (PV) systems is influenced by
environmental factors. This variability hampers the control and utilization of
solar cells' peak output. In this study, a single-stage grid-connected PV
system is designed to enhance power quality. Our approach employs fuzzy
logic in the direct power control (DPC) of a three-phase voltage source
inverter (VSI), enabling seamless integration of the PV connected to the
grid. Additionally, a fuzzy logic-based maximum power point tracking
(MPPT) controller is adopted, which outperforms traditional methods like
incremental conductance (INC) in enhancing solar cell efficiency and
minimizing the response time. Moreover, the inverter's real-time active and
reactive power is directly managed to achieve a unity power factor (UPF).
The system's performance is assessed through MATLAB/Simulink
implementation, showing marked improvement over conventional methods,
particularly in steady-state and varying weather conditions. For solar
irradiances of 500 and 1,000 W/m2
, the results show that the proposed
method reduces the total harmonic distortion (THD) of the injected current
to the grid by approximately 46% and 38% compared to conventional
methods, respectively. Furthermore, we compare the simulation results with
IEEE standards to evaluate the system's grid compatibility.
Enhancing photovoltaic system maximum power point tracking with fuzzy logic-b...IJECEIAES
Photovoltaic systems have emerged as a promising energy resource that
caters to the future needs of society, owing to their renewable, inexhaustible,
and cost-free nature. The power output of these systems relies on solar cell
radiation and temperature. In order to mitigate the dependence on
atmospheric conditions and enhance power tracking, a conventional
approach has been improved by integrating various methods. To optimize
the generation of electricity from solar systems, the maximum power point
tracking (MPPT) technique is employed. To overcome limitations such as
steady-state voltage oscillations and improve transient response, two
traditional MPPT methods, namely fuzzy logic controller (FLC) and perturb
and observe (P&O), have been modified. This research paper aims to
simulate and validate the step size of the proposed modified P&O and FLC
techniques within the MPPT algorithm using MATLAB/Simulink for
efficient power tracking in photovoltaic systems.
Adaptive synchronous sliding control for a robot manipulator based on neural ...IJECEIAES
Robot manipulators have become important equipment in production lines, medical fields, and transportation. Improving the quality of trajectory tracking for
robot hands is always an attractive topic in the research community. This is a
challenging problem because robot manipulators are complex nonlinear systems
and are often subject to fluctuations in loads and external disturbances. This
article proposes an adaptive synchronous sliding control scheme to improve trajectory tracking performance for a robot manipulator. The proposed controller
ensures that the positions of the joints track the desired trajectory, synchronize
the errors, and significantly reduces chattering. First, the synchronous tracking
errors and synchronous sliding surfaces are presented. Second, the synchronous
tracking error dynamics are determined. Third, a robust adaptive control law is
designed,the unknown components of the model are estimated online by the neural network, and the parameters of the switching elements are selected by fuzzy
logic. The built algorithm ensures that the tracking and approximation errors
are ultimately uniformly bounded (UUB). Finally, the effectiveness of the constructed algorithm is demonstrated through simulation and experimental results.
Simulation and experimental results show that the proposed controller is effective with small synchronous tracking errors, and the chattering phenomenon is
significantly reduced.
Remote field-programmable gate array laboratory for signal acquisition and de...IJECEIAES
A remote laboratory utilizing field-programmable gate array (FPGA) technologies enhances students’ learning experience anywhere and anytime in embedded system design. Existing remote laboratories prioritize hardware access and visual feedback for observing board behavior after programming, neglecting comprehensive debugging tools to resolve errors that require internal signal acquisition. This paper proposes a novel remote embeddedsystem design approach targeting FPGA technologies that are fully interactive via a web-based platform. Our solution provides FPGA board access and debugging capabilities beyond the visual feedback provided by existing remote laboratories. We implemented a lab module that allows users to seamlessly incorporate into their FPGA design. The module minimizes hardware resource utilization while enabling the acquisition of a large number of data samples from the signal during the experiments by adaptively compressing the signal prior to data transmission. The results demonstrate an average compression ratio of 2.90 across three benchmark signals, indicating efficient signal acquisition and effective debugging and analysis. This method allows users to acquire more data samples than conventional methods. The proposed lab allows students to remotely test and debug their designs, bridging the gap between theory and practice in embedded system design.
Detecting and resolving feature envy through automated machine learning and m...IJECEIAES
Efficiently identifying and resolving code smells enhances software project quality. This paper presents a novel solution, utilizing automated machine learning (AutoML) techniques, to detect code smells and apply move method refactoring. By evaluating code metrics before and after refactoring, we assessed its impact on coupling, complexity, and cohesion. Key contributions of this research include a unique dataset for code smell classification and the development of models using AutoGluon for optimal performance. Furthermore, the study identifies the top 20 influential features in classifying feature envy, a well-known code smell, stemming from excessive reliance on external classes. We also explored how move method refactoring addresses feature envy, revealing reduced coupling and complexity, and improved cohesion, ultimately enhancing code quality. In summary, this research offers an empirical, data-driven approach, integrating AutoML and move method refactoring to optimize software project quality. Insights gained shed light on the benefits of refactoring on code quality and the significance of specific features in detecting feature envy. Future research can expand to explore additional refactoring techniques and a broader range of code metrics, advancing software engineering practices and standards.
Smart monitoring technique for solar cell systems using internet of things ba...IJECEIAES
Rapidly and remotely monitoring and receiving the solar cell systems status parameters, solar irradiance, temperature, and humidity, are critical issues in enhancement their efficiency. Hence, in the present article an improved smart prototype of internet of things (IoT) technique based on embedded system through NodeMCU ESP8266 (ESP-12E) was carried out experimentally. Three different regions at Egypt; Luxor, Cairo, and El-Beheira cities were chosen to study their solar irradiance profile, temperature, and humidity by the proposed IoT system. The monitoring data of solar irradiance, temperature, and humidity were live visualized directly by Ubidots through hypertext transfer protocol (HTTP) protocol. The measured solar power radiation in Luxor, Cairo, and El-Beheira ranged between 216-1000, 245-958, and 187-692 W/m 2 respectively during the solar day. The accuracy and rapidity of obtaining monitoring results using the proposed IoT system made it a strong candidate for application in monitoring solar cell systems. On the other hand, the obtained solar power radiation results of the three considered regions strongly candidate Luxor and Cairo as suitable places to build up a solar cells system station rather than El-Beheira.
An efficient security framework for intrusion detection and prevention in int...IJECEIAES
Over the past few years, the internet of things (IoT) has advanced to connect billions of smart devices to improve quality of life. However, anomalies or malicious intrusions pose several security loopholes, leading to performance degradation and threat to data security in IoT operations. Thereby, IoT security systems must keep an eye on and restrict unwanted events from occurring in the IoT network. Recently, various technical solutions based on machine learning (ML) models have been derived towards identifying and restricting unwanted events in IoT. However, most ML-based approaches are prone to miss-classification due to inappropriate feature selection. Additionally, most ML approaches applied to intrusion detection and prevention consider supervised learning, which requires a large amount of labeled data to be trained. Consequently, such complex datasets are impossible to source in a large network like IoT. To address this problem, this proposed study introduces an efficient learning mechanism to strengthen the IoT security aspects. The proposed algorithm incorporates supervised and unsupervised approaches to improve the learning models for intrusion detection and mitigation. Compared with the related works, the experimental outcome shows that the model performs well in a benchmark dataset. It accomplishes an improved detection accuracy of approximately 99.21%.
A SYSTEMATIC RISK ASSESSMENT APPROACH FOR SECURING THE SMART IRRIGATION SYSTEMSIJNSA Journal
The smart irrigation system represents an innovative approach to optimize water usage in agricultural and landscaping practices. The integration of cutting-edge technologies, including sensors, actuators, and data analysis, empowers this system to provide accurate monitoring and control of irrigation processes by leveraging real-time environmental conditions. The main objective of a smart irrigation system is to optimize water efficiency, minimize expenses, and foster the adoption of sustainable water management methods. This paper conducts a systematic risk assessment by exploring the key components/assets and their functionalities in the smart irrigation system. The crucial role of sensors in gathering data on soil moisture, weather patterns, and plant well-being is emphasized in this system. These sensors enable intelligent decision-making in irrigation scheduling and water distribution, leading to enhanced water efficiency and sustainable water management practices. Actuators enable automated control of irrigation devices, ensuring precise and targeted water delivery to plants. Additionally, the paper addresses the potential threat and vulnerabilities associated with smart irrigation systems. It discusses limitations of the system, such as power constraints and computational capabilities, and calculates the potential security risks. The paper suggests possible risk treatment methods for effective secure system operation. In conclusion, the paper emphasizes the significant benefits of implementing smart irrigation systems, including improved water conservation, increased crop yield, and reduced environmental impact. Additionally, based on the security analysis conducted, the paper recommends the implementation of countermeasures and security approaches to address vulnerabilities and ensure the integrity and reliability of the system. By incorporating these measures, smart irrigation technology can revolutionize water management practices in agriculture, promoting sustainability, resource efficiency, and safeguarding against potential security threats.
Using recycled concrete aggregates (RCA) for pavements is crucial to achieving sustainability. Implementing RCA for new pavement can minimize carbon footprint, conserve natural resources, reduce harmful emissions, and lower life cycle costs. Compared to natural aggregate (NA), RCA pavement has fewer comprehensive studies and sustainability assessments.
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024Sinan KOZAK
Sinan from the Delivery Hero mobile infrastructure engineering team shares a deep dive into performance acceleration with Gradle build cache optimizations. Sinan shares their journey into solving complex build-cache problems that affect Gradle builds. By understanding the challenges and solutions found in our journey, we aim to demonstrate the possibilities for faster builds. The case study reveals how overlapping outputs and cache misconfigurations led to significant increases in build times, especially as the project scaled up with numerous modules using Paparazzi tests. The journey from diagnosing to defeating cache issues offers invaluable lessons on maintaining cache integrity without sacrificing functionality.
ACEP Magazine edition 4th launched on 05.06.2024Rahul
This document provides information about the third edition of the magazine "Sthapatya" published by the Association of Civil Engineers (Practicing) Aurangabad. It includes messages from current and past presidents of ACEP, memories and photos from past ACEP events, information on life time achievement awards given by ACEP, and a technical article on concrete maintenance, repairs and strengthening. The document highlights activities of ACEP and provides a technical educational article for members.
Understanding Inductive Bias in Machine LearningSUTEJAS
This presentation explores the concept of inductive bias in machine learning. It explains how algorithms come with built-in assumptions and preferences that guide the learning process. You'll learn about the different types of inductive bias and how they can impact the performance and generalizability of machine learning models.
The presentation also covers the positive and negative aspects of inductive bias, along with strategies for mitigating potential drawbacks. We'll explore examples of how bias manifests in algorithms like neural networks and decision trees.
By understanding inductive bias, you can gain valuable insights into how machine learning models work and make informed decisions when building and deploying them.
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODELgerogepatton
As digital technology becomes more deeply embedded in power systems, protecting the communication
networks of Smart Grids (SG) has emerged as a critical concern. Distributed Network Protocol 3 (DNP3)
represents a multi-tiered application layer protocol extensively utilized in Supervisory Control and Data
Acquisition (SCADA)-based smart grids to facilitate real-time data gathering and control functionalities.
Robust Intrusion Detection Systems (IDS) are necessary for early threat detection and mitigation because
of the interconnection of these networks, which makes them vulnerable to a variety of cyberattacks. To
solve this issue, this paper develops a hybrid Deep Learning (DL) model specifically designed for intrusion
detection in smart grids. The proposed approach is a combination of the Convolutional Neural Network
(CNN) and the Long-Short-Term Memory algorithms (LSTM). We employed a recent intrusion detection
dataset (DNP3), which focuses on unauthorized commands and Denial of Service (DoS) cyberattacks, to
train and test our model. The results of our experiments show that our CNN-LSTM method is much better
at finding smart grid intrusions than other deep learning algorithms used for classification. In addition,
our proposed approach improves accuracy, precision, recall, and F1 score, achieving a high detection
accuracy rate of 99.50%.
Introduction- e - waste – definition - sources of e-waste– hazardous substances in e-waste - effects of e-waste on environment and human health- need for e-waste management– e-waste handling rules - waste minimization techniques for managing e-waste – recycling of e-waste - disposal treatment methods of e- waste – mechanism of extraction of precious metal from leaching solution-global Scenario of E-waste – E-waste in India- case studies.
Comparative analysis between traditional aquaponics and reconstructed aquapon...bijceesjournal
The aquaponic system of planting is a method that does not require soil usage. It is a method that only needs water, fish, lava rocks (a substitute for soil), and plants. Aquaponic systems are sustainable and environmentally friendly. Its use not only helps to plant in small spaces but also helps reduce artificial chemical use and minimizes excess water use, as aquaponics consumes 90% less water than soil-based gardening. The study applied a descriptive and experimental design to assess and compare conventional and reconstructed aquaponic methods for reproducing tomatoes. The researchers created an observation checklist to determine the significant factors of the study. The study aims to determine the significant difference between traditional aquaponics and reconstructed aquaponics systems propagating tomatoes in terms of height, weight, girth, and number of fruits. The reconstructed aquaponics system’s higher growth yield results in a much more nourished crop than the traditional aquaponics system. It is superior in its number of fruits, height, weight, and girth measurement. Moreover, the reconstructed aquaponics system is proven to eliminate all the hindrances present in the traditional aquaponics system, which are overcrowding of fish, algae growth, pest problems, contaminated water, and dead fish.
Manufacturing Process of molasses based distillery ppt.pptx
Field-programmable gate array design of image encryption and decryption using Chua’s chaotic masking
1. International Journal of Electrical and Computer Engineering (IJECE)
Vol. 12, No. 3, June 2022, pp. 2414~2424
ISSN: 2088-8708, DOI: 10.11591/ijece.v12i3.pp2414-2424 2414
Journal homepage: http://ijece.iaescore.com
Field-programmable gate array design of image encryption and
decryption using Chua’s chaotic masking
Wisal Adnan Al-Musawi, Wasan A. Wali, Mohammed Abd Ali Al-Ibadi
Department of Computer Engineering, College of Engineering, Basrah University, Basrah, Iraq
Article Info ABSTRACT
Article history:
Received Feb 1, 2021
Revised Dec 24, 2021
Accepted Jan 5, 2022
This article presents a simple and efficient masking technique based on Chua
chaotic system synchronization. It includes feeding the masked signal back
to the master system and using it to drive the slave system for
synchronization purposes. The proposed system is implemented in a field
programmable gate array (FPGA) device using the Xilinx system generator
tool. To achieve synchronization, the Pecora-Carroll identical cascading
synchronization approach was used. The transmitted signal should be mixed
or masked with a chaotic carrier and can be processed by the receiver
without any distortion or loss. For different images, the security analysis is
performed using the histogram, correlation coefficient, and entropy. In
addition, FPGA hardware co-simulation based Xilinx Artix7 xc7a100t-
1csg324 was used to check the reality of the encryption and decryption of
the images.
Keywords:
Chua's circuit
Hardware co-simulation
Image encryption and
decryption
Masking
Synchronization
XSG
This is an open access article under the CC BY-SA license.
Corresponding Author:
Wisal Adnan Al-Musawi
Department of Computer Engineering, University of Basrah
Basrah, Iraq
Email: wisal.eng@gmail.com
1. INTRODUCTION
Communication systems such as mobile and internet networks have increasingly developed in recent
years, and the area of information transmission has been expanded. This region, however, faces additional
challenges in the saving and exchange of media messages by means of illegal eavesdropping. Multimedia
communications such as photographs and videos should also be encrypted to avoid unauthorized attacks to
ensure secure transmission over the Internet. Traditional forms of encryption have some disadvantages in
high stream data encryption and are less efficient in securing photos using encryption schemes. To guarantee
secure Internet data transmission, images must be encrypted with high protection and low complexity in an
efficient way [1]. The application of chaotic cryptographic to the security of images has been proposed as a
way to resolve a variety of security issues, as chaotic systems have a number of advantages over random
systems, including their sensitivity to initial conditions and parameter settings, and their aperiodic signal
nature makes them an excellent choice for encryption systems [2].
This article contributed to the use of chaotic systems in the process of information security, rather
than conventional methods of encryption, and the approach used was simpler, more effective, and produced
good results as compared to other complex methods of image hiding such as. In the paper [3], a chaotic block
image permutation and XOR operation are performed to achieve image encryption. The chaotic/masking
scheme based on embedded message synchronization is introduced in [4]. An effective and high
security/communication/system based on two levels of encryption based on chaotic systems was proposed
in [5]. Merah et al. [6] present a novel stream cipher based on chaotic synchronization. Suggest an image
encryption model that combines chaotic maps such as logistic, sine, and tent chaotic systems [7].
2. Int J Elec & Comp Eng ISSN: 2088-8708
Field-programmable gate array design of image encryption and decryption … (Wisal Adnan Al-Musawi)
2415
Applying chaos to cryptography did not gain much attention until the discovery of chaotic
synchronization, which contributed to a turning point in the application of chaos dynamics to information
security. From Pecora and Carroll's work [8], a wide range of research efforts has focused on the study of
chaos synchronization. It is applied in a variety of fields, including secure communication, biological
systems, ecological systems, and physical systems [9]. Much attention was given to the control and
synchronization of Chua systems by researchers. Chua system have recently been synchronized with active
control [10], adaptive control [11], sliding control [12], fuzzy control [13], and backstepping control
methods [14].
The digital implementation of this system on an field programmable gate array (FPGA) system is
ideal because it eliminates part drift and has high power and throughput capability [15]. FPGAs are the
primary tool for implementing high-performance systems, especially in image processing applications and
digital signal processing systems. Additionally, FPGAs can perform signal processing at a high rate of
efficiency [16]. The Xilinx system generator (XSG) extends the capabilities of the FPGA and offers
important tools for developing image encryption models.
This paper is arranged as follows. In section 2, a Chua circuit design using XSG was illustrated; the
concept of the Pecora-Carroll (PC) cascaded synchronization method and its implementation using XSG is
given in section 3. In section 4, we explain the chaotic masking with feedback and the purpose of this
procedure. In section 5, the FPGA platform of image encryption using chaotic masking with feedback is
performed. Section 6 shows the randomness measures of the system proposed. The efficiency and security
review of the proposed model is presented in section 7. Next, section 8, which co-simulates image encryption
by FPGA hardware. Finally, section 9 presents the conclusion of this paper.
2. CHUA'S CIRCUIT DESIGN
The Circuit of Chua has a simple structure and easily generates chaotic dynamics with sufficient
parameters. Thus, several researchers have been interested in this circuit. For the implementation of the
chaotic system Chua, we use the Xilinx system generator (XSG) method in this section. The relevance of the
Chua circuit has recently made possible the birth of a big family of multi-scroll oscillators and techniques to
control the chaos [17]. Chua's circuit has found many applications in physics, communication, and control,
mechanics, as well as chemistry, economics, and medicine [18]. Chua's circuit has also been used as a chaotic
noise generator. Because of this property, it has found many applications in cryptography and steganography
[19]. The as nonlinear (1), (2) describe this chaotic system:
X˙ = Α (Y – X − F(X)
y˙ = x – y + z
Z˙ = −ΒY (1)
where 𝑓(𝑥)
𝑓 (𝑥) = 𝑚1𝑥 + 1/2(𝑚0 − 𝑚1) (|𝑥 + 𝑏1| − |𝑥 − 𝑏1 |) (2)
where α and β are the parameters of the system and 𝑓(𝑥) piecewise linear (PWL) function, m0 and m1 are the
negative slopes, and b1 is the breakpoint. Figure 1 shows XY phase portrait and 3D plot of the Chua attractor
using fixed-point data format (Fix 32_16). The initial values x0=-0.3, y0= 0.1, and z0= 0.2, and system
parameters are α =9, β = 100/7, m0=-3 and m1 =-0.3, b1=0.1, with step size dt = 0.01.
Figure 1. XY and XYZ phase portrait plot
3. ISSN: 2088-8708
Int J Elec & Comp Eng, Vol. 12, No. 3, June 2022: 2414-2424
2416
3. PC CASCADED SYNCHRONIZATION OF CHUA'S CHAOTIC SYSTEM
This method describes the two systems with chaotic dynamics coupled to each other. One of them is
the transmitter system, also called the drive (master) and the two receivers named the response (slave). The
response subsystems used here are the YZ response subsystem and XZ response subsystems. The Chua
cascaded synchronization system is implemented using the Xilinx system generator model shown in Figure 2.
Figure 2. PC cascaded synchronization of chua system using XSG
The master as (3)
𝑥𝑚˙ = 𝛼 (𝑦𝑚 – 𝑥𝑚 − 𝑓 (𝑥))
𝑦𝑚˙ = 𝑥𝑚 – 𝑦𝑚 + 𝑧𝑚
𝑧𝑚˙ = −𝛽𝑦𝑚 (3)
YZ response subsystem (4)
𝑦𝑠˙ = 𝑥𝑚 – 𝑦𝑠 + 𝑧𝑠
𝑧𝑠˙ = −𝛽𝑦𝑠 (4)
XZ response subsystem (5)
𝑥′𝑠˙ = 𝛼 (𝑦𝑠 – 𝑥′𝑠 − 𝑓 (𝑥′))
𝑧′𝑠˙ = −𝛽𝑦𝑠 (5)
The differences between master and slave are known as the synchronizing errors and the errors must
converge to zero when the synchronization occurs.
𝑒𝑥 = 𝑥′𝑠 − 𝑥𝑚
𝑒𝑦 = 𝑦𝑠 − 𝑦𝑚
𝑒𝑧 = 𝑧′𝑠 – 𝑧𝑚 (6)
The phase portrait and error signal in case of unsynchronized are shown in Figures 3(a) and 3(b)
respectively, here, the value of α and β of the drive system and the response systems are different.
Figures 4(a) and 4(b) show the phase portrait and error signal in case of synchronization between the drive
and the response system. In this case, the initial value of the two subsystems is different, but the value of α
and β is the same for both drive and response systems. The system parameters are defined in Table 1.
Simulation results show that the two subsystems are well synchronized. The design was implemented on an
Artix7 xc7a100t-1csg324 FPGA device and the resource utilization was estimated as shown in Table 2.
4. Int J Elec & Comp Eng ISSN: 2088-8708
Field-programmable gate array design of image encryption and decryption … (Wisal Adnan Al-Musawi)
2417
(a) (b)
Figure 3. PC synchronization in the case of mismatched parameters (a) phase portrait and (b) error signal in
case of unsynchronized
(a) (b)
Figure 4. PC synchronization in the case of matched parameters (a) phase portrait describes the xm versus xs
and (b) error signal in case of synchronization
Table 1. Cascaded synchronization system parameters
Synchronization Unsynchronized
Slops & breakpoint
Initial value α & β Initial value α & β
Drive system x0=0.3 y0=0 z0=0.1
α=10 β=15 x0=0.3 y0=0 z0=0.1
α=10 β=15 m0=-2.5
m1=-0.3
b1=0.1
Response systems
YZ Response y0=0.1 z0=0.4
α=9 β=100/7
XZ Response x0= 1 z0=0.4
Table 2. FPGA utilization summary of PC cascaded synchronization
Resource type Available Utilization
LUT 63400 1446
Slice Registers (FF) 126800 224
Bonded IOB (IO) 210 161
BUFGCTRL (BUFG) 32 1
DSP 240 40
Minimum period Ts (ns) 40
Worst negative slack (WNS) 0.060
Maximum Frequency (MHz) 25.04
Power(W) 0.153
4. CHAOTIC MASKING WITH FEEDBACK
There are different techniques for uses the chaotic signal in secure communications: chaotic
parameter modulation, chaotic shift keying, on-off key, and chaotic masking. The chaotic masking can be
viewed as one of the earliest and easiest techniques in chaotic secure communications, which is based on the
PC synchronization concept and mostly used for analog signal transmission. Additionally, it is quickly
ex
ey
ez
ex
ez
ey
Time (Sec)
5. ISSN: 2088-8708
Int J Elec & Comp Eng, Vol. 12, No. 3, June 2022: 2414-2424
2418
implemented in electronic circuits, which is why it is used in this proposed scheme [20]. As shown in
Figure 5 the general block diagram of chaotic masking, the information signal 𝑚(𝑡) is added to the wideband
chaotic signal 𝑋𝑚(𝑡), followed by transmitting the combined (masked) signal 𝑠(𝑡).
𝑠(𝑡) = 𝑋𝑚(𝑡) + 𝑚(𝑡) (7)
To successfully remove the mask, both master and slave chaotic signals need to be synchronized,
PC synchronization is one of the most powerful synchronization schemes to do this [5]. The image 𝑚(𝑡) is
precisely retrieved on the receiver side by subtracting the regenerated signal Xs(t) from the received signal
𝑠(𝑡) with the assumption that the system is free of noise. The recovered signal (image) is.
𝑚(𝑡) = 𝑠(𝑡) − 𝑋𝑠 (𝑡) = [𝑋𝑚(𝑡) + 𝑚(𝑡)] − 𝑋𝑠(𝑡) = 𝑚(𝑡) + 𝑒𝑥 (𝑡) (8)
where
𝑒𝑥(𝑡) = 𝑋𝑚(𝑡) − 𝑋𝑠(𝑡) (9)
𝑒𝑥(𝑡) it is triggered by the fact that the presence of an information signal causes the 𝑋𝑚(𝑡) does not to have
the same reply at the receiver. Therefore, 𝑒𝑥(𝑡) causes the synchronization mechanism to be disrupted. To
ignore the effect of the signal information sent to the receiver on the synchronization process, the information
signal is the feedback to the chaotic transmitter [21].
Figure 5. Chaotic masking with feedback and recovering information based on the Chua system
5. XSG DESIGN OF IMAGE ENCRYPTION AND DECRYPTION
The XSG block diagram for encrypting and decrypting the image is shown in Figure 6. XSG input
and output gateway functions are used to convert between the blocks of MATLAB/Simulink and XSG. The
original color image is divided into different red, green, and blue images. This image's data type is unint8. In
the first step of encryption, a pre-processing block is used to transform the original images I (Lr*Lc)
dimension (where Lr is row numbers and Lc is column numbers) into serial samples. The Pre-processing
block is used to transform matrix I to 8-bit serial samples (Unit8). Figure 7 displays the pre-
processing blocks. The gateway-in transforms the serial sample format to an unsigned fixed point format with
WL=8 and FL=0 with sample period 0.001. Then masked with the 𝑋𝑚(𝑡) signal produced by the Chua
chaotic system to obtain the encrypted image. In the decryption process, the 𝑋𝑠(𝑡) response signal is
subtracted from the masked signal 𝑆(𝑡). The post-processing blocks are used to transform the serial.sample
into the original size (Lr×Lc) to recover the original image of the same dimension. Figure 8 displays the post-
processing blocks. For all chaotic structures, like master and slave, it is implemented using a fixed-point
representation with WL=32 bits and FL=16 bits. The initial values for the master system are (α= 9, β=100/7,
m0=-3, m1=-0.3, b1=0.1, x0=-0.2, y0=0, z0=0.2) and for the slave system are (α= 9, β=100/7, m0=-3,
m1=-0.3, b1=0.1, x0= 0.7, y0= 0.1, z0=0.6). After 70 ns (simulation time), the original image, encrypted
image, and recovered image are shown in Figures 9(a) to 9(c) respectively.
6. Int J Elec & Comp Eng ISSN: 2088-8708
Field-programmable gate array design of image encryption and decryption … (Wisal Adnan Al-Musawi)
2419
Figure 6. XSG of image encryption and decryption
Figure 7. Pre-processing blocks
Figure 8. Post-processing blocks
(a) (b) (c)
Figure 9. Results (a) original images, (b) encrypted images, and (c) decrypted images
7. ISSN: 2088-8708
Int J Elec & Comp Eng, Vol. 12, No. 3, June 2022: 2414-2424
2420
6. STATISTICAL ANALYSIS
There are several analyses of the design's efficiency and security, including histogram, CCA,
information entropy, keyspace, and a differential analysis attack. A different color image is used for analysis.
Experiments are performed and data is analyzed using MATLAB environments.
6.1. Analysis of histogram
The image histogram shows the distribution of pixels by plotting the number of pixels at each level
of color intensity [22]. In Figures 10(a) and 10(b), a comparison of the distribution histograms of original
images and ciphered images was shown. It appears that the compression and encrypted image histograms (for
R, G, B-channels) are greatly different from the original image histograms (for R, G, B-channels) and do not
include any clues that could be used for any statistical analysis of the encrypted image. So, the algorithm can
effectively resist statistical attacks. The original and cipher images have completely different pixel
distribution at each level of intensity [23].
(a)
(b)
Figure 10. Histogram of three-channel (a) original images and (b) ciphered images
6.2. Correlation coefficient analysis (CCA)
A correlation factor is another significant factor in the study of the cryptosystem. The correlation
between the pixels of the original image is strong, while the correlation between the pixels of the encrypted
image is very low. An algorithm for image encryption would have succeeded if all its attributes were hidden
8. Int J Elec & Comp Eng ISSN: 2088-8708
Field-programmable gate array design of image encryption and decryption … (Wisal Adnan Al-Musawi)
2421
and the encrypted image was entirely unrelated and random. If the coefficient of correlation is =1, the two
images are the same. Therefore, the encryption failed in these cases. When the value =-1, the encrypted
image is opposite to the plain image. The (9) is used to measure the correlation coefficient of any two-pixel
color values at the same position in the original and cipher images [24].
𝐶𝑜𝑟𝑟(𝑥, 𝑦) =
𝐸[(𝑥−𝜇𝑥 )(𝑦−𝜇𝑦 )]
𝜎𝑥𝜎𝑦
(9)
Where 𝜇𝑥 and 𝜇𝑦 represent mean values of x and y, 𝜎𝑥 and 𝜎𝑦 are the standard deviations of x and y, and
𝐸 [
⋅
] is the expectation function [25]. Table 3 displays experimental correlation pixels for pictures of football,
and peppers with sizes 256*256.
Table 3. Correlation coefficient calculation of encrypted image with different channels
Image name
Channel
Red Green Blue
peppers -7.6527*10-4
-0.0020 0.0050
football 0.0013 0.0015 -7.3397*10-4
6.3. Entropy analysis
The content of an information signal is called entropy. It determines the redundancies of the
characteristic randomness [26]. The entropy of the signal information expressed as:
𝐸𝑛𝑡𝑟𝑝(𝑠) = ∑ 𝑃(𝑠𝑖) × log2 (
1
𝑃(𝑠𝑖)
) 𝑏𝑖𝑡𝑠
2𝑁−1
𝑛=0 (10)
where (𝑠𝑖) the probability that a pixel occurs in an image, N is the length of the binary number of a pixel
(usually N=8 for a gray image). An important property of the cryptosystem is it is sufficient to resist entropy
attacks; the ideal entropy value of the encrypted images is 8 bits/pixel [27]. Table 4 show the Information
Entropy results of two images with the size of 256×256 for different channels.
Table 4. Entropy calculation of ciphered images
Image name
channel
Red Green Blue
peppers 7.9906 7.9903 7.9908
football 7.9896 7.9905 7.9898
7. DIFFERENTIAL ATTACK ANALYSIS
It is the analysis of how variations in the input information will affect the resulting output variation
to obtain the secret key. The sensitivity of a cipher picture should be high before the original image or secret
key is slightly changed. As in (11) and (12), UACI and NPCR measures as shown in Table 5 are used to
determine the effect on the cipher image of the change of 1 bit/pixel in the original image [28], [29].
𝑈𝐴𝐶𝐼(𝐶1, 𝐶2) =
1
𝑊×𝐻
[∑
|𝑐1(𝑖,𝑗)−𝑐2(𝑖,𝑗)|
255
𝑖,𝑗 ] × 100% (11)
Where W and H are the width and height of the image, respectively, C1 and C2 are encrypted representations
of a plain image and a modified image.
𝑁𝑃𝐶𝑅(1, 𝐶2) =
∑ 𝐷(𝑖,𝑗)
𝑖,𝑗
𝑊×𝐻
× 100% (12)
Where
𝐷(𝑖, 𝑗) = {
0, 𝑖𝑓 𝑐1(𝑖, 𝑗) = 𝑐2(𝑖, 𝑗)
1, 𝑜𝑡ℎ𝑒𝑟𝑤𝑖𝑠𝑒
(13)
9. ISSN: 2088-8708
Int J Elec & Comp Eng, Vol. 12, No. 3, June 2022: 2414-2424
2422
Table 5. NPCR and UACI test calculation for different channels
Image name channel NPCR UACI
peppers Red 99.608 34.10
Green 99.600 33.98
Blue 99.585 33.90
football Red 99.621 32.31
Green 99.612 32.28
Blue 99.633 32.45
8. HARDWARE CO- SIMULATION OF IMAGE ENCRYPTION AND DECRYPTION
The proposed model is formulated using the FPGA board Artix7 xc7a100t-1csg324. The summary
of system resource utilization for the encryption and decryption method using chaotic masking with feedback
is shown in Table 6. The image encryption and decryption process are co-simulated with FPGA hardware.
When JTAG is connected, serial image signal data is transmitted via a USB JTAG port to FPGA. Then serial
samples were returned to the PC using the MATLAB/Simulink viewer to test the image, as shown
in Figure 11. The encrypted image has proved to be the same for system generators and co-simulation,
demonstrating that the actual time for the proposed encrypted image works correctly and is compatible with
the configuration expected.
Table 6. FPGA utilization summary for image encryption and decryption
Resource type Available Utilization
LUT 63400 1563
Slice registers (FF) 126800 192
Bonded IOB(IO) 210 89
BUFGCTRL(BUFG) 32 1
DSP 240 36
Minimum period Ts (ns) 41
Worst negative slack (WNS) 0.444
Maximum frequency (MHz) 24.66
Power (W) 0.128
Figure 11. Hardware co-simulation results
9. CONCLUSION
In this research, Chua's chaotic attractor was synchronized based on the PC cascading method. such
a chaotic synchronization phenomenon can serve as a basis for secure communication. Applying protection
to transmitted images is critical, as the communication channel is open and susceptible to attack. To protect
this channel, this article implements an image encryption algorithm based on chaotic masking with feedback.
This method, which is based on chaotic signals, was considered the simplest in terms of secure
10. Int J Elec & Comp Eng ISSN: 2088-8708
Field-programmable gate array design of image encryption and decryption … (Wisal Adnan Al-Musawi)
2423
communication because it produced an optimal analysis result that can resist various attacks and provides an
extremely high level of protection that can be used to transmit images over insecure networks. The design has
been implemented in an efficient way by using the XSG tool. The proposed method's synthesis results
indicate that its maximum frequency is approximately 24.66 MHz. In conclusion, the real-time evaluation of
the system proposed was co-simulated using the FPGA Xilinx Artix7 xc7a100t-1csg324 kit and resource
utilization has been measured.
REFERENCES
[1] F. S. Hasan and M. A. Saffo, “FPGA hardware co-simulation of image encryption using stream cipher based on chaotic maps,”
Sensing and Imaging, vol. 21, no. 1, Jul. 2020, doi: 10.1007/s11220-020-00301-7.
[2] M. K. Khan, “Editorial: Chaotic cryptography and its applications in telecommunication systems,” Telecommunication Systems,
vol. 52, no. 2, pp. 513–514, May 2013, doi: 10.1007/s11235-011-9456-x.
[3] R. A. Aboughalia and O. A. S. Alkishriwo, “Color image encryption based on chaotic block permutation and XOR operation,”
arXiv preprint arXiv:1808.10198, 2018.
[4] S. Čelikovský and V. Lynnyk, “Message embedded chaotic masking synchronization scheme based on the generalized Lorenz
system and its security analysis,” International Journal of Bifurcation and Chaos, vol. 26, no. 08, p. 1650140, 2016.
[5] S. S. Hreshee, H. N. Abdullah, and A. K. Jawad, “A high security communication system based on chaotic scrambling and chaotic
masking,” International Journal on Communications Antenna and Propagation, vol. 8, no. 3, pp. 257–264, Jun. 2018, doi:
10.15866/irecap.v8i3.13541.
[6] L. Merah, A. Ali-Pacha, N. Hadj-Said, B. Mecheri, and M. Dellassi, “FPGA hardware co-simulation of new chaos-based stream
cipher based on lozi map,” International Journal of Engineering and Technology, vol. 9, no. 5, pp. 420–425, Oct. 2018, doi:
10.7763/ijet.2017.v9.1010.
[7] R. Parvaz and M. Zarebnia, “A combination chaotic system and application in color image encryption,” Optics & Laser
Technology, vol. 101, pp. 30–41, 2018.
[8] L. M. Pecora and T. L. Carroll, “Synchronization in chaotic systems,” Physical Review Letters, vol. 64, no. 8, pp. 821–824, Feb.
1990, doi: 10.1103/PhysRevLett.64.821.
[9] R. Karthikeyan, S. A. Kumar, R. Babu, and D. Mathew, “FPGA implementation of novel synchronization methodology for a new
chaotic system,” Editorial Board, p. 48, 2015.
[10] U. E. Vincent, “Chaos synchronization using active control and backstepping control: a comparative analysis,” Nonlinear
Analysis: Modelling and Control, vol. 13, no. 2, pp. 253–261, Apr. 2008, doi: 10.15388/na.2008.13.2.14583.
[11] H. N. Agiza and A. E. Matouk, “Adaptive synchronization of Chua’s circuits with fully unknown parameters,” Chaos, Solitons &
Fractals, vol. 28, no. 1, pp. 219–227, 2006.
[12] M. Feki, “Sliding mode control and synchronization of chaotic systems with parametric uncertainties,” Chaos, Solitons and
Fractals, vol. 41, no. 3, pp. 1390–1400, Aug. 2009, doi: 10.1016/j.chaos.2008.05.022.
[13] T.-C. Lin, M.-C. Chen, and M. Roopaei, “Synchronization of uncertain chaotic systems based on adaptive type-2 fuzzy sliding
mode control,” Engineering Applications of Artificial Intelligence, vol. 24, no. 1, pp. 39–49, 2011.
[14] S. Vaidyanathan and S. Rasappan, “Global Chaos synchronization of n-scroll chua circuit and lur’e system using backstepping
control design with recursive feedback,” Arabian Journal for Science and Engineering, vol. 39, no. 4, pp. 3351–3364, Jan. 2014,
doi: 10.1007/s13369-013-0929-y.
[15] J. Schmitz and Lei Zhang, “Rössler-based chaotic communication system implemented on FPGA,” in 2017 IEEE 30th Canadian
Conference on Electrical and Computer Engineering (CCECE), Apr. 2017, pp. 1–4, doi: 10.1109/CCECE.2017.7946729.
[16] B. Lakshmi, E. Kirubakaran, and T. N. Prabakar, “Design and Implementation of FPGA based dual key encryption,” International
Journal of Computer Applications, vol. 3, no. 3, pp. 21–27, Jun. 2010, doi: 10.5120/714-1006.
[17] A. Byagowi and W. Kinsner, “Implementation of a chua circuit to demonstrate bifurcations and strange attractors in a class,”
Proceedings of the Canadian Engineering Education Association (CEEA), Jun. 2012, doi: 10.24908/pceea.v0i0.4706.
[18] A. S. Andreatos and A. P. Leros, “Secure image encryption based on a Chua chaotic noise generator,” Journal of Engineering
Science and Technology Review, vol. 6, no. 4, pp. 90–103, Oct. 2013, doi: 10.25103/jestr.064.11.
[19] L. Merah, A. Ali-Pacha, N. H. Said, and M. Mamat, “A pseudo random number generator based on the chaotic system of Chua’s
circuit, and its real time FPGA implementation,” Applied Mathematical Sciences, vol. 7, no. 53–56, pp. 2719–2734, 2013, doi:
10.12988/ams.2013.13242.
[20] E. A. R. Hussein, M. K. Khashan, and A. K. Jawad, “A high security and noise immunity of speech based on double chaotic
masking,” International Journal of Electrical and Computer Engineering (IJECE), vol. 10, no. 4, pp. 4270–4278, Aug. 2020, doi:
10.11591/ijece.v10i4.pp4270-4278.
[21] H. N. Abdullah, S. S. Hreshee, and A. K. Jawad, “Noise reduction of chaotic masking system using repetition method,”
Unpublished. 2015, doi: 10.13140/rg.2.1.4023.7209.
[22] H. R. Hatem, “Color image compression and encryption based on compressive sensing,” Journal of Engineering and Sustainable
Development, vol. 22, no. 1, pp. 149–161, 2018.
[23] M. Alsaedi, “Colored image encryption and decryption using chaotic lorenz system and DCT2,” arXiv preprint
arXiv:1701.02896, 2017.
[24] M. Ahmad, M. N. Doja, and M. M. S. Beg, “Security analysis and enhancements of an image cryptosystem based on hyperchaotic
system,” Journal of King Saud University-Computer and Information Sciences, 2018.
[25] C. Fu, G. Zhang, M. Zhu, Z. Chen, and W. Lei, “A new chaos-based color image encryption scheme with an efficient substitution
keystream generation strategy,” Security and Communication Networks, vol. 2018, 2018.
[26] E. Rodríguez-Orozco et al., “FPGA-based chaotic cryptosystem by using voice recognition as access key,” Electronics
(Switzerland), vol. 7, no. 12, Dec. 2018, doi: 10.3390/electronics7120414.
[27] B. B. Saikia and Monjul, “An FPGA implementation of chaos based image encryption and its performance analysis,” IJCSN -
International Journal of Computer Science and Network, vol. 5, no. 5, pp. 712–720, 2016.
[28] I. A. Taqi and S. M. Hameed, “A new Color image encryption based on multi chaotic maps,” Iraqi Journal of Science, vol. 59,
no. 4, pp. 2117–2127, Nov. 2018, doi: 10.24996/IJS.2018.59.4B.17.
[29] H. A. Abdullah and H. N. Abdullah, “FPGA implementation of color image encryption using a new chaotic map,” Indonesian
Journal of Electrical Engineering and Computer Science (IJEECS), vol. 13, no. 1, pp. 129–137, Jan. 2019, doi:
10.11591/ijeecs.v13.i1.pp129-137.
11. ISSN: 2088-8708
Int J Elec & Comp Eng, Vol. 12, No. 3, June 2022: 2414-2424
2424
BIOGRAPHIES OF AUTHORS
Wisal Adnan Al-Musawi Holds the M.Sc. degree in computer engineering from
University of Basrah, Iraq, in 2021 and the B.Sc. degree in computer engineering from
University of Basrah, Iraq, in 2012. Her research includes cryptography, prediction, modular
neural networks, chaotic systems, and FPGA. Email: wisal.eng@gmail.com.
Wasan A. Wali Holds a PhD in Automation and Control Engineering, Built
Environment and Sustainable Technologies Institute (BEST), Faculty of Technology and
Environment, Liverpool John Moores University, UK. MSc, BSc in Electrical Engineering,
Electrical Engineering Department, College of Engineering, University of Basrah, Iraq. 1996,
1992 respectively. She is currently a lecturer in Computer Engineering Department, College of
Engineering- University of Basrah, Iraq. Research interests: automation and control
engineering, artificial intelligent control, microwave and microwave plasma control
technologies, renewable energy, and chaotic systems. Email: wasan.wali@uobasrah.edu.iq.
Mohammed Abd Ali Al-Ibadi Holds a PhD in Computer Engineering from
University of Basrah, Iraq. He is currently Head of Compuer Engineering Department at
Collage of Engineering, University of Basrah. His interest area of work is the Parallel and
Distributed Systems, PFGA based systems, and ASIC. He has many projects implemented in
the field of internet of things and computer vision systems. In addition, he is a member of
IEEE and a reviewer for many local and international journals and conferences. He can contact
at email: mohammed.joudah@uobasrah.edu.iq.