Table of Contents Author Guidelines Submit a Manuscript
Mathematical Problems in Engineering
Volume 2014, Article ID 698608, 15 pages
http://dx.doi.org/10.1155/2014/698608
Research Article

A Systematic Methodology for Multi-Images Encryption and Decryption Based on Single Chaotic System and FPGA Embedded Implementation

College of Automation, Guangdong University of Technology, Guangzhou 510006, China

Received 2 February 2014; Accepted 18 May 2014; Published 24 June 2014

Academic Editor: Giuseppe Rega

Copyright © 2014 Hanzhong Zheng et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Linked References

  1. E. Ott, C. Grebogi, and J. A. Yorke, “Controlling chaos,” Physical Review Letters, vol. 64, no. 11, pp. 1196–1199, 1990. View at Publisher · View at Google Scholar · View at Zentralblatt MATH · View at MathSciNet
  2. S. J. Schiff, K. Jerger, D. H. Duong, T. Chang, M. L. Spano, and W. L. Ditto, “Controlling chaos in the brain,” Nature, vol. 370, no. 6491, pp. 615–620, 1994. View at Publisher · View at Google Scholar · View at Scopus
  3. G. Chen and D. Lai, “Feedback control of Lyapunov exponents for discrete-time dynamical systems,” International Journal of Bifurcation and Chaos in Applied Sciences and Engineering, vol. 6, no. 7, pp. 1341–1349, 1996. View at Publisher · View at Google Scholar · View at Scopus
  4. X. F. Wang and G. Chen, Chaotification of Dynamical Systems-Theory, Method and Applications, Shanghai Jiaotong University Press, Shanghai, China, 2006 (Chinese).
  5. G. Chen and D. Lai, “Feedback anticontrol of discrete chaos,” International Journal of Bifurcation and Chaos in Applied Sciences and Engineering, vol. 8, no. 7, pp. 1585–1590, 1998. View at Publisher · View at Google Scholar · View at Zentralblatt MATH · View at MathSciNet
  6. D. Lai and G. Chen, “Chaotification of discrete-time dynamical systems: an extension of the Chen-Lai algorithm,” International Journal of Bifurcation and Chaos in Applied Sciences and Engineering, vol. 15, no. 1, pp. 109–117, 2005. View at Publisher · View at Google Scholar · View at Zentralblatt MATH · View at MathSciNet
  7. C. Li and G. Chen, “On the Marotto-Li-Chen theorem and its application to chaotification of multi-dimensional discrete dynamical systems,” Chaos, Solitons & Fractals, vol. 18, no. 4, pp. 807–817, 2003. View at Publisher · View at Google Scholar · View at Zentralblatt MATH · View at MathSciNet
  8. X. F. Wang and G. Chen, “On feedback anticontrol of discrete chaos,” International Journal of Bifurcation and Chaos in Applied Sciences and Engineering, vol. 9, no. 7, pp. 1435–1441, 1999. View at Publisher · View at Google Scholar · View at Zentralblatt MATH · View at MathSciNet
  9. S. M. Yu, J. Lü, and G. Chen, Anticontrol of Dynamical Systems and Its Applications, Science Press, Beijing, China, 2013 (Chinese).
  10. S. Yu and G. Chen, “Anti-control of continuous-time dynamical systems,” Communications in Nonlinear Science and Numerical Simulation, vol. 17, no. 6, pp. 2617–2627, 2012. View at Publisher · View at Google Scholar · View at Zentralblatt MATH · View at MathSciNet
  11. S. M. Yu and G. R. Chen, “Chaotifying continuous-time nonlinear autonomous systems,” International Journal of Bifurcation and Chaos, vol. 17, pp. 2617–2627, 2012. View at Google Scholar
  12. G. Chen, Y. Mao, and C. K. Chui, “A symmetric image encryption scheme based on 3D chaotic cat maps,” Chaos, Solitons and Fractals, vol. 21, no. 3, pp. 749–761, 2004. View at Publisher · View at Google Scholar · View at Zentralblatt MATH · View at MathSciNet
  13. G. Jakimoski and L. Kocarev, “Chaos and cryptography: block encryption ciphers based on chaotic maps,” IEEE Transactions on Circuits and Systems. I: Fundamental Theory and Applications, vol. 48, no. 2, pp. 163–169, 2001. View at Publisher · View at Google Scholar · View at Zentralblatt MATH · View at MathSciNet
  14. J. Fridrich, “Symmetric ciphers based on two-dimensional chaotic maps,” International Journal of Bifurcation and Chaos in Applied Sciences and Engineering, vol. 8, no. 6, pp. 1259–1284, 1998. View at Publisher · View at Google Scholar · View at Zentralblatt MATH · View at MathSciNet
  15. H. S. Kwok and W. K. S. Tang, “A fast image encryption system based on chaotic maps with finite precision representation,” Chaos, Solitons & Fractals, vol. 32, no. 4, pp. 1518–1529, 2007. View at Publisher · View at Google Scholar · View at Zentralblatt MATH · View at MathSciNet
  16. K. D. Rao and C. Gangadhar, “Discrete wavelet transform and modified chaotic key-based algorithm for image encryption and its VLSI realization,” IETE Journal of Research, vol. 58, no. 2, pp. 114–120, 2012. View at Publisher · View at Google Scholar · View at Scopus
  17. H. Khanzadi, M. Eshghi, and S. E. Borujeni, “Design and FPGA implementation of a pseudo random bit generator using chaotic maps,” IETE Journal of Research, vol. 59, pp. 63–73, 2013. View at Google Scholar
  18. M. S. Azzaz, C. Tanougast, S. Sadoudi, A. Bouridane, and A. Dandache, “FPGA implementation of new real-time image encryption based switching chaotic systems,” in Proceedings of the IET Irish Signals and Systems Conference (ISSC '09), pp. 1–6, 2009.
  19. M. S. Azzaz, C. Tanougast, S. Sadoudi, R. Fellah, and A. Dandache, “A new auto-switched chaotic system and its FPGA implementation,” Communications in Nonlinear Science and Numerical Simulation, vol. 18, no. 7, pp. 1792–1804, 2013. View at Publisher · View at Google Scholar · View at Zentralblatt MATH · View at MathSciNet
  20. H.-C. Chen and J.-C. Yen, “A new cryptography system and its VLSI realization,” Journal of Systems Architecture, vol. 49, no. 7–9, pp. 355–367, 2003. View at Publisher · View at Google Scholar · View at Scopus
  21. R. Mitter and M. Sridevi Sathya Priya, “A non linear equation based cryptosystem for image encryption and decryption,” in Proceedings of the International Conference on Computing, Electronics and Electrical Technologies (ICCEET '12), pp. 533–537, Kumaracoil, India, March 2012. View at Publisher · View at Google Scholar · View at Scopus
  22. K. D. Rao and C. Gangadhar, “Finite field DWT and MCKBA for image encryption and its VLSI realization,” in Proceedings of the 8th International Conference on Information, Communications and Signal Processing (ICICS '11), pp. 1–5, Singapore, December 2011. View at Publisher · View at Google Scholar · View at Scopus
  23. J. Giesl, L. Behal, and K. Vlcek, “Hardware solution of chaos based image encryption,” in Proceedings of the IEEE Symposium on Design and Diagnostics of Electronic Circuits and Systems (DDECS '09), pp. 198–201, Liberec, Czech Republic, April 2009. View at Publisher · View at Google Scholar · View at Scopus
  24. M. S. Azzaz, C. Tanougast, S. Sadoudi, A. Dandache, and F. Monteiro, “Real-time image encryption based chaotic synchronized embedded cryptosystems,” in Proceedings of the 8th IEEE International NEWCAS Conference (NEWCAS '10), pp. 61–64, Montreal, Canada, June 2010. View at Publisher · View at Google Scholar · View at Scopus
  25. K. D. Rao and C. Gangadhar, “VLSI realization of a secure cryptosystem for image encryption and decryption,” in Proceedings of the International Conference on Communications and Signal Processing (ICCSP '11), pp. 543–547, Kozhikode, India, February 2011. View at Publisher · View at Google Scholar · View at Scopus
  26. J. C. Yen and J. I. Guo, “Efficient hierarchical chaotic image encryption algorithm and its VLSI realization,” IEE Proceedings-Vision, Image and Signal Processing, vol. 147, pp. 167–175, 2000. View at Google Scholar