Indonesi
an
Journa
l
of El
ect
ri
cal Engineer
ing
an
d
Comp
ut
er
Scie
nce
Vo
l.
13
,
No.
1
,
Jan
uar
y
201
9
,
pp.
1
29
~
1
37
IS
S
N: 25
02
-
4752, DO
I: 10
.11
591/ijeecs
.v1
3
.i
1
.pp
1
2
9
-
1
3
7
129
Journ
al h
om
e
page
:
http:
//
ia
es
core.c
om/j
ourn
als/i
ndex.
ph
p/ij
eecs
FPGA im
pleme
ntation o
f color i
mage en
cryption
using
a new
chaotic
map
Ha
ms
a A.
Ab
dull
ah
,
Hikm
at N
.
Abdull
ah
Coll
ege of
Infor
m
at
ion
Eng
ine
e
r
ing,
Al
-
Nah
rai
n
Univer
sit
y
,
Bag
hdad,
I
raq
Art
ic
le
In
f
o
ABSTR
A
CT
Art
ic
le
history:
Re
cei
ved
J
ul
13
, 2
018
Re
vised
Oct
2
,
2018
Accepte
d Oct
1
9
, 201
8
In
thi
s
pap
er,
an
FP
GA
implementa
t
ion
of
eff
icient
image
enc
r
y
p
ti
on
al
gorit
hm
using
a
ch
aotic
m
ap
has
be
en
prop
osed.
Th
e
prop
osed
s
y
stem
consists
of
two
phase
s
image
enc
r
y
p
ti
on
t
ec
hni
que.
First
phase
consists
of
scra
m
bli
ng
of
p
ixe
l
posit
ion
an
d
sec
ond
phase
consist
of
diff
usion
of
bit
val
ue
.
In
the
first
phase
,
origi
na
l
pixe
l
val
u
es
remai
n
uncha
nged
.
In
sec
ond
phase
,
p
ixe
l
va
l
ues
are
m
odifi
e
d.
Th
ese
m
odifications
are
don
e
b
y
using
cha
ot
ic
beh
avi
or
of
a
re
ce
nt
l
y
de
vel
o
ped
cha
ot
ic
m
ap
ca
lled
Nahr
ai
n.
A c
olo
r
image
en
cr
y
pti
o
n
using
Nahra
in
cha
o
ti
c
m
ap
is
sim
ula
te
d
in
s
oftwa
re
v
ia
Matl
ab
,
Alte
r
a
Quart
us
Prim
e
17.
0
Li
t
e
Editio
nI
and
ModelSi
m
software
tool
s
the
n
imple
m
ent
ed
in
har
d
ware
via
C
y
c
lo
ne
V
GX
Start
er
Kit
FP
GA
pla
tform.
The
result
s
show
the
f
ea
sib
il
i
t
y
and
eff
ectiv
e
ness
of
the
cr
y
p
tos
y
st
em.
As
a
t
y
pi
ca
l
appl
i
ca
t
ion,
the
image
enc
r
y
pt
ion/
de
c
r
y
pt
ion
is
used
to
demons
tra
te
and
ver
if
y
t
he
oper
a
ti
on
of
the
cr
y
p
tos
y
st
e
m
har
dware
.
Com
ple
te
ana
l
y
s
is
on
robustness
of
the
m
et
hod
i
s
inve
stiga
te
d
.
Corre
lation
,
Enc
r
y
pt
ion
t
ime,
Dec
r
y
pt
ion
t
ime
and
ke
y
sensi
tivit
y
show
that
th
e
proposed
cr
y
p
to
pro
ce
ss
or
offe
rs
h
igh
sec
urity
and
r
el
i
able
en
cr
y
pti
on
spe
ed
for
real
-
ti
m
e
ima
ge
enc
r
y
p
ti
on
and
tr
ansm
ission.
To
eva
luate
the
per
form
anc
e
,
histo
gra
m
,
cor
re
la
ti
on
,
information
ent
rop
y
,
nu
m
ber
of
pixe
l
cha
nge
ra
t
e
(NP
CR),
and
unifi
ed
ave
rag
e
ch
angi
ng
intensit
y
(UA
CI)
m
ea
sur
es
are
use
d
for
sec
urity
an
aly
s
is.
The
sim
ula
ti
on
r
esult
s
and
sec
urity
an
aly
s
is
hav
e
demons
tra
te
d
th
at
the
proposed
enc
r
y
p
ti
on
s
y
st
em
is
robust
and
fle
xibl
e
.
For
exa
m
ple
th
e
amount
of
ent
r
op
y
obt
ai
n
ed
b
y
the
proposed
algorithm
is
7.
9964,
whi
ch
i
s
ver
y
cl
ose
to
i
ts
ide
a
l
amount:
8,
and
NP
CR
i
s
99.
76
%
,
which
is
the
ex
c
el
l
ent
val
u
e
to
o
bta
in
.
The
h
ard
ware
sim
ula
ti
on
result
s
show
tha
t
th
e
num
ber
of
pins
tha
t
use
d
of
the
propose
d
s
y
stem
reaches
to
6%
of
tot
al pi
ns
and Lo
gic
u
ti
l
iz
a
ti
on
(i
n
ALMs
)
is 1%
.
Ke
yw
or
ds:
FPGA
Im
age en
crypti
on
Nahrain
ch
a
otic m
ap
Scram
bling
Secu
rity
analy
sis
Copyright
©
201
9
Instit
ut
e
o
f Ad
vanc
ed
Engi
n
e
er
ing
and
S
cienc
e
.
Al
l
rights re
serv
ed.
Corres
pond
in
g
Aut
h
or
:
Ham
sa A
. Ab
dull
ah,
Dep
a
rtm
ent o
f Sy
stem
En
gin
e
erin
g,
Al
-
Na
hr
ai
n U
niv
e
rsity
,
Ba
gh
dad,
Ir
a
q.
Em
a
il
: ha
m
sa.abdulk
a
reem
@co
ie
-
nahrain
.e
du.iq
1.
INTROD
U
CTION
Chaotic
syst
em
of
si
m
ple
structu
re
c
an
dem
on
strat
e
com
plex
dyna
m
ic
al
pr
operti
es
in
infin
it
e
m
at
he
m
at
ic
a
l
world
,
s
uch
as
sensiti
vit
y
to
init
ia
l
conditi
ons,
to
po
l
og
ic
al
tra
nsi
ti
vity
and
m
ixing
,
exp
a
ns
i
ven
es
s,
an
d
decayi
ng
autoc
orrelat
io
n
f
unct
io
n.
C
hao
ti
c
syst
em
can
be
div
i
de
d
int
o
tw
o
t
ypes
o
f
m
od
el
:
chao
ti
c
flow
m
od
el
a
nd
c
ha
otic
m
a
p
m
od
el
[1]
.
Su
c
h
pro
pe
rtie
s
hav
e
subtl
e
relat
ion
with
s
om
e
requirem
ents
of
sec
ur
e
enc
ryption
syst
em
,
especial
ly
sens
it
ivit
y
with
res
pect
to
cha
nge
of
sec
ret
key
[2
-
3]
.
So
,
desi
gn
i
ng
ch
ao
s
-
base
d
en
crypti
on
sc
he
m
es
e
m
erg
ed
a
s
a
ne
w
resea
r
ch
di
recti
on
t
o
reinfo
rce
in
for
m
at
ion
secur
it
y o
f dat
a sent t
hroug
h t
he
I
nter
net.
Crypto
gr
a
phy
are
r
eal
iz
ed
i
n
s
of
t
war
e
to
ve
rify
the
ef
fecti
ven
es
s
of
al
gorithm
s
oth
er
tha
n
i
n
hard
war
e
for
c
omm
un
ic
at
ion
a
nd
sto
rag
e
a
ppli
cat
ion
s.
I
n
f
act
,
the
m
ai
n
adv
a
ntage
of
usi
ng
of
ha
rdwa
r
e
for
Evaluation Warning : The document was created with Spire.PDF for Python.
IS
S
N
:
2502
-
4752
Ind
on
esi
a
n
J
E
le
c Eng &
Co
m
p
Sci,
Vo
l.
13
, N
o.
1
,
Ja
nu
a
ry 20
19
:
1
2
9
–
1
3
7
130
cryptosyst
em
i
s
that
m
ulti
ple
pa
rts
of
syst
em
can
op
e
rate
sim
ultaneou
sl
y,
i.e.
t
he
generator
of
secre
t
keys,
su
bst
it
ution
a
nd
pe
rm
utati
on
processes
.
Tha
t
m
akes
chao
ti
c
cryptosyst
em
s
su
it
able
f
or
app
li
cat
io
ns
in
high
sp
ee
d
com
m
u
nicat
ion
s
or
m
assive
stora
ge
[4]
.
I
n
ge
ner
al
,
the
e
nc
ryptio
n
proces
s
condu
ct
e
d
by
us
ing
so
ft
war
e
that
i
s
pro
gram
m
ed
in
c
om
pu
te
r.
In
pract
ic
e,
only
a
few
a
pp
li
cat
ion
s
re
qu
iri
ng
th
rou
ghput
w
hile
flexible
s
olu
ti
on
s
an
d
lo
w
cost
enc
ryptio
n
/
dec
ryptio
n
is
need
e
d
t
o
protect
the
da
ta
that
m
akes
sense
,
especial
ly
fo
r
e
m
bed
de
d
hardw
a
re
a
pp
li
cat
ion
s
.
So
m
e
s
m
al
l
dev
ic
es
su
c
h
as
Fiel
d
P
r
ogram
m
able
Gate
Arra
y
(F
P
GA)
ha
ve
been
po
te
ntial
to
be
a
pp
li
ed
t
o
rep
la
ce
the
c
om
pu
te
r
as
a
m
edium
fo
r
i
m
age
enc
ryption.
T
he
data
enc
ryptio
n
syst
em
will
be
opti
m
iz
ed
wh
e
n
im
ple
m
e
nted
int
o
the
F
PGA
beca
us
e
i
t
has
ad
van
ta
ge
s
wh
ic
h
include
f
le
xib
il
it
y, dev
el
opm
ent cost
and c
ost
s low p
e
r
-
unit
, h
ig
h spee
d
a
nd
has
a
go
od level o
f
sec
uri
ty
[5]
.
In
[
4]
,
an
im
pl
e
m
entat
ion
of
secur
e
S
PN
c
ha
os
-
base
d
cryp
tosyst
e
m
on
FPGA
is
introd
uced.
In
this
pap
e
r,
t
he
sec
ur
e
s
ubsti
tuti
on
pe
rm
utati
on
netw
ork
(S
P
N)
c
ha
os
-
base
d
cry
pto
syst
e
m
is
reali
zed
us
in
g
so
ft
war
e
to
ols
C/
C+
+,
Alte
ra
Qu
a
rtus
I
I
an
d
Mod
el
Sim
and
i
m
ple
m
ented
in
hard
war
e
usi
ng
F
PGA
platf
or
m
.
In
[
5]
,
the
S
um
of
P
rod
uct
(
S
OP
)
E
ncr
y
ptio
n
us
in
g
sim
ple
al
gorithm
based
on
Bo
olean
a
lgeb
ra
is
i
ntrod
uced.
It
is
i
m
ple
m
ented
us
in
g
im
age
encr
y
ption
al
gorithm
to
pro
duce
a
qu
ic
k
im
age
e
ncr
ypti
on
syst
e
m
.
Howe
ver
it
has
dra
wb
ac
k
of
hav
i
ng
fixe
d
enc
ryptio
n
pa
tt
ern
.
I
n
[
6]
,
FPGA
Im
ple
m
entat
ion
of
C
ha
otic
base
d
AE
S
Im
age
Encr
y
ption
Al
gorithm
is
pr
es
ented.
Th
e
al
gorithm
is
a
co
m
bin
at
ion
of
c
hao
ti
c
m
aps
an
d
A
ES.
The
pr
opos
e
d
arch
it
ect
ure
is
i
m
ple
m
ented
usi
ng
Ver
il
og
H
DL
a
nd
Xili
nx
IS
E
Desig
n
S
uite
14.5.
H
ow
ever
it
ha
s
dra
wb
ac
k
of h
a
ving c
omplex
struct
ur
es
of im
age en
cry
ption.
In
[
7]
,
Com
par
at
ive
analy
sis
of
c
olo
r
im
age
enc
ryptio
n
us
i
ng
3D
c
hao
ti
c
m
aps
i
s
pr
ese
nte
d.
The
c
olo
r
im
age
enc
ryptio
n
us
in
g
diff
e
ren
t
3D
c
ha
otic
m
aps,
i
nclu
ding
3D
l
og
ist
ic
m
a
p,
Heno
n
m
ap,
Ba
ker
m
ap
an
d
cr
os
s
chaos
m
ap
wh
i
ch
ar
e
the
further
e
xten
sio
n
of
2D
cha
otic
m
aps.
I
n
[
8]
,
c
olor
im
age
encr
ypti
on
us
in
g
c
hao
ti
c
m
aps
tria
ngula
r
scram
bling
,
with
D
N
A
Se
qu
e
nces
is
i
ntr
oduce
d,
T
he
s
chem
e
ta
kes
a
m
ast
er
key
with
a
le
ngth
of
320
bit,
and
pro
du
ces
a
grou
p
of
s
ub
-
keys
wit
h
two
le
ng
th
(32
an
d
12
8
bit)
to
e
ncr
y
pt
the
blo
c
ks
of
im
ages,
then
a
new
tria
ng
ular
scram
bling
m
et
hod
is
us
ed
to
increase
the
secur
it
y
of
the
i
m
age.
Howe
ver
it
ha
s
dr
a
wback
of
hav
i
ng
li
m
it
e
d
le
ngth
of
m
ast
er
key.
I
n
[9]
,
Fi
nite
pr
e
ci
sion
lo
gisti
c
m
ap
betwee
n
c
om
pu
ta
ti
on
al
eff
ic
ie
ncy
a
nd
acc
ur
acy
with
e
ncry
ption
a
ppli
cat
ion
s
is
i
nt
rodu
ce
d.
Digital
i
m
plem
entat
ion
of
the
ge
ne
rali
zed
log
ist
ic
m
ap
with
sig
ne
d
pa
ram
et
er
is
con
sidere
d.
T
hey
pr
ese
nt
a
fixe
d
-
po
i
nt
ha
rdw
are
reali
za
ti
on
of
a
ps
e
udo
-
ra
ndom
nu
m
ber
ge
ne
rator
us
i
ng
the
log
ist
ic
m
ap
that
exp
e
riences
a
trade
-
off
bet
ween
com
pu
ta
ti
on
al
ef
fici
en
cy
and
accu
ra
cy
.
The
t
rad
e
-
off
facto
rs
i
nc
lud
e:
the
us
e
d
preci
sion,
the
orde
r
of
exec
utio
n
of
t
he
op
e
rati
ons,
pa
ram
et
er,
an
d
init
ia
l
po
int
value
s
af
fe
ct
the
pro
per
ti
es
of
the
fi
nite
pr
eci
s
ion
m
ap.
I
n
[
10]
,
a
col
or
im
a
ge
enc
ryptio
n
schem
e
based
on
a
r
no
l
d
scra
m
bl
ing
and
qua
ntu
m
chao
ti
c
is
i
ntr
oduce
d.
I
n
thi
s
pa
per,
a
n
a
lgorit
hm
fo
r
i
m
age
enc
ryptio
n
ba
sed
on
two
-
dim
ension
al
Arnold
transf
orm
w
it
h
keys an
d qu
a
ntu
m
ch
a
otic m
ap
is pro
po
s
ed
.
In
2018,
we
ha
ve
pr
opos
e
d
a
new
dynam
ic
al
syst
e
m
cal
le
d
Nahrain
c
ha
otic
syst
e
m
[11]
.
We
pr
ov
e
d
that
it
has
excell
ent
per
f
or
m
ance
f
or
m
ultim
edia
encr
ypti
on
a
nd
sec
ur
e
transm
issi
on
[
12
]
.
H
owev
er,
in
[11]
we
ha
ve
pr
ese
nted
on
ly
a
pa
rt
sta
nd
a
r
d
ra
ndom
ness
te
sts
to
pro
ve
the
s
yst
e
m
ran
do
m
ness
beh
a
vior.
In
thi
s
pap
e
r,
we
will
intr
odu
ce
t
he
hard
war
e
im
ple
m
entat
ion
of
i
m
age
encr
y
ption
ba
sed
on
N
ahr
ai
n
c
hao
ti
c
m
ap.
The
ha
rdwar
e
i
m
ple
m
entat
i
on
is
base
d
on
a
pro
gr
am
m
able
hard
wa
re
wh
ic
h
al
lo
ws
t
he
e
xp
e
ri
m
ental
char
act
e
rizat
ion
of
the
syst
e
m
dynam
ic
s
with
lo
w
co
st,
recon
fig
ur
a
ble
an
d
ra
pid
e
xp
e
rim
ental
set
up.
The
pap
e
r
is
orga
nized
as
f
ollows.
Sect
io
n
1
prese
nts
pr
ese
nts
the
c
urren
t
sta
ge
of
cha
os
base
d
i
m
age
encr
y
ption.
Se
ct
ion
2
i
nclu
des
desc
riptio
n
of
pro
pose
d
e
ncr
y
ption
al
gorithm
.
Sect
ion
3
i
nclu
des
t
he
si
m
ulati
on
res
ults
an
d
disc
ussi
on
of
the
pro
po
se
d
al
gorithm
.
Finall
y,
sect
ion
4
giv
es
the
co
ncl
us
io
ns
of the
pa
per
.
2.
IMAGE E
NCRY
PTI
ON B
AS
ED
O
N C
HAO
TI
C AL
GORIT
HM
The
Bl
ock
Dia
gr
am
of
the
pr
opos
e
d
im
age
encr
y
ption
al
gorithm
base
d
on
Nahrain
c
ha
otic
syst
em
i
s
sh
ow
n
in
Fi
gure1.
This
e
ncr
y
pti
on
al
gorith
m
con
sist
s
of
two
blo
c
ks
:
the
first
blo
c
k
is
t
he
Im
age
Scra
m
bl
ing
and
sec
ond
bl
ock
is
diffusio
n
base
d
on
Na
hr
ai
n
Cha
otic
syst
e
m
.
The
nonlinea
r
e
quat
ion
s
that
desc
ribe
th
e
Nahrain
ch
a
otic sy
stem
are
gi
ven in
(
1
)
:
+
1
=
1
−
−
2
−
2
+
1
=
(1)
+
1
=
−
Wh
e
re
a
and
b
are
the
bif
urcat
ion
pa
ram
eter
s
of
the
syst
e
m
.
Thr
ou
gh
a
series
of
num
erical
m
od
el
ing
an
d
si
m
ulati
on
ass
ociat
ed
with
MATLAB
,
T
he
phase
portrai
ts
of
cha
otic
be
hav
i
or
ha
ve
be
en
ac
qu
i
red
by
us
in
g
syst
e
m
par
am
e
te
r
value
s:
a=1
.52
a
nd
b=
0.05.
The
schem
at
i
c
blo
c
k
diag
ra
m
of
the
pro
po
sed
Nahrain
c
ha
otic
gen
e
rato
r
is
s
how
n
in
Fig
ur
e
1.
Fi
gure
2
s
hows
t
he
phas
e
portrait
s
of
t
he
pr
opos
e
d
s
yst
e
m
wh
en
it
s
init
ia
l
Evaluation Warning : The document was created with Spire.PDF for Python.
Ind
on
esi
a
n
J
E
le
c Eng &
Co
m
p
Sci
IS
S
N:
25
02
-
4752
FPGA
im
plem
entatio
n of c
olo
r im
age e
ncry
ption u
sin
g a n
ew
chao
ti
c
map
(
H
amsa
A. A
bdulla
h
)
131
conditi
ons
are:
X
(
0)
=
0.3,
Y(0
)=0.2
a
nd
Z(
0)=0.
1
[
11
]
.
T
he
p
r
opos
e
d
s
c
ra
m
bl
ing
m
et
ho
d
con
sist
of
tw
o
ty
pes
of
s
c
ram
bling
,
the
first
m
e
tho
d
is
Bl
oc
k
Sc
ram
bling
and
t
he
seco
nd
m
eth
od
is
ne
gativ
e
diag
on
al
sca
n.
T
he
m
ai
n
ste
ps
of e
ncr
y
ption m
et
h
od
are
li
ste
d
:
Figure
1. Pro
pose
d
Al
gorith
m
Step
1:
Bl
ock
Scram
bling
:
the
i
m
age
is
div
ided
to
f
our
bl
oc
ks
[Bloc
k
1,
Bl
ock2;
Bl
ock3,
Bl
ock
4]
and
then
scram
bling
the
b
loc
ks i
n
t
he o
rd
e
r [Bl
ock3,
Bl
ock
4; Bloc
k
1,
Bl
ock2] as s
how
n
in
Fig
ure
2
(
a
)
.
S
te
p 2:
Eac
h block is
div
ide
d
i
n
to
fo
ur
sub
bl
ock, a
nd scr
am
bled diag
onal
ly
.
Sterp 3:
Neg
at
i
ve diag
on
al
sc
an: the im
age is d
ivi
de
d
int
o bloc
ks
of size
8*8
a
nd the
n
e
ach
blo
c
k
is
re
ad
f
r
o
m
rig
ht to
le
ft
dia
gonally
as s
hown in Fi
gure
2
(
b
)
.
(a)
.
Bl
oc
k
sc
ra
m
bl
ing
(b)
.
Ne
gative
di
agonal scram
bl
ing
Figure
2. Im
age
scram
bling
Step
4:
T
hr
ee
dim
ension
al
c
ha
otic m
ap
is generat
ed by
us
in
g
(
1
)
.
Step
5:
C
hao
t
ic
(X1,
Y1,
a
nd
Z1
)
is
co
nv
e
rted
t
o
bi
nar
y
by
us
in
g
rand
o
m
bit
gen
e
rato
r
m
eth
od
as
sh
ow
n
[10]
:
(
1
,
2
)
=
{
1
1
>
2
0
1
≤
2
}
ℎ
1
0
≠
2
0
(2)
Evaluation Warning : The document was created with Spire.PDF for Python.
IS
S
N
:
2502
-
4752
Ind
on
esi
a
n
J
E
le
c Eng &
Co
m
p
Sci,
Vo
l.
13
, N
o.
1
,
Ja
nu
a
ry 20
19
:
1
2
9
–
1
3
7
132
(
1
,
2
)
=
{
1
1
>
2
0
1
≤
2
}
ℎ
1
0
≠
2
0
(3)
(
1
,
2
)
=
{
1
1
>
2
0
1
≤
2
}
ℎ
1
0
≠
2
0
(4)
The
ra
n
do
m
bit
gen
erat
or
m
et
hod
ba
sed
on
com
par
in
g
t
he
outp
uts
of
two
Nahrain
c
hao
ti
c
m
aps
run
ning
side
-
by
-
side
an
d
sta
rting
f
r
om
ran
do
m
ind
epe
ndent
init
ia
l
con
diti
on
s
a
nd
sa
m
e
par
am
e
te
rs
valu
e
wh
e
re
(X1=
0.3
, Y1=
0.2, Z1=
0.1, X
2=0.2,
Y
2=0.1, Z
2=
0.2, a=
1.5
2,
a
nd
b=
0.05).
Step
6:
T
he
ou
tpu
t
of
row
Sc
r
a
m
bled
im
age
is
XO
Re
d
with
the
key
im
age
gen
e
rated
in
s
te
ps
(
4
a
nd
5)
to
get
colo
r
le
vel e
nc
rypted
im
age.
The
m
ai
n
ste
ps o
f
D
ecrypti
on
Me
thod ar
e
li
ste
d
belo
w:
Step
1:
Ge
ne
ra
te
thr
ee
dim
ension
al
c
hao
ti
c
m
ap
by
us
in
g
(
1
)
.
Step
2:
Co
nve
rt
chao
ti
c
(
X1,
Y1,
an
d
Z
1)
to
bin
a
ry
by
us
in
g
ra
ndom
bit
gen
erat
or
m
et
ho
d
as
sh
ow
n
in
(
2
-
4
)
.
Step
3:
T
he
Encr
y
pted
im
age
is
X
ORe
d
with
key
im
age
generat
ed
in
ste
p
1
to
get
col
or
le
vel
Scram
bled
im
a
ge.
Step 4
:
Sc
ram
bled
im
age
is
div
ide
d
to
bl
oc
k
of
siz
e
8*
8
a
nd
then
eac
h
blo
c
k
is read
in n
e
ga
ti
ve
dia
gonal scan
as sho
wn in F
igure
2.b.
Step
5:
T
he
de
scram
bled
i
m
a
ge
is
pa
ssed
t
hro
ugh
Bl
oc
k
S
cram
bling
w
he
re
im
age
is
div
ided
i
nto
f
our
blo
c
ks
[Block
1,
Bl
oc
k2
;
Bl
oc
k3,
Bl
ock4]
and
then
scram
ble
th
e
blo
c
k
i
n
the
or
der
[Blo
ck3,
Bl
oc
k4
;
Bl
ock1,
Bl
ock2] as s
hown in Fi
gure
2.
a.
3.
RESU
LT
A
N
D DIS
CUSSI
ON
In
t
his
sect
io
n,
the
sim
ulati
on
r
esults
of
th
e
secu
rity
m
easur
em
ents
f
or
the
pr
opos
e
d
c
olor
im
age
encr
y
ption
us
ing
a
ne
w
cha
otic
m
ap
is
s
i
m
ula
te
d
in
so
f
tw
are
via
Ma
tl
ab,
Alte
ra
Q
ua
rtus
Pr
im
e
17
.0
Lit
e
Editi
on
I
an
d
Mod
el
Sim
so
ft
war
e
to
ols
the
n
im
ple
m
ented
in
hard
war
e
vi
a
Cy
cl
on
e
V
GX
Starte
r
Kit
FP
G
A
platfo
rm
.
As
a
ty
pical
app
li
cat
ion
,
the
im
age
encr
ypti
on
/
de
crypti
on
is
to
dem
on
strat
e
an
d
ver
ify
the ope
rati
on
of the c
rypto
syst
e
m
h
ardwa
re.
Th
is
pro
j
ect
is
i
m
ple
m
ented
in tw
o ways,
n
a
m
el
y
.
a)
By
u
sin
g
MA
T
LAB
b)
By
u
sin
g
F
PGA
Her
e
an
V
H
D
L
bl
ock
is
us
e
d
as
an
inte
rm
ediat
e
bet
ween
the
Ma
tl
ab
as
sho
wn
in
Fig
ur
e
3,
wh
ic
h
m
eans
by
the
VHDL
c
ode
w
e
can’
t
read
th
e
i
m
age
dire
ct
ly
so
to
ov
e
rc
om
e
that
on
e
we
use
Ma
tl
ab
at
the
first,
we
re
an
i
m
age
is
convert
ed
into
te
xt
f
orm
and
on
ce
m
or
e
a
ny
rand
om
i
m
age
is
ta
ken
an
d
co
nvert
ed
into
te
xt
fo
rm
by
Ma
tl
ab,
wh
ic
h
act
s
as
key
i
m
age
fo
r
the
e
ncr
y
ption
this
key
sh
ould
be
sam
e
fo
r
enc
ryp
ti
on
as
well
as
dec
ryp
ti
on
.
Firstl
y
th
e
te
xt
file
rea
d
by
V
H
DL
a
nd
the
n
t
he
tw
o
ty
pes
of
sc
ra
m
bl
ing
im
ple
m
ented
on
it
.
Finall
y
an
X
OR
op
e
r
at
ion
is
done
betwee
n
scra
m
bled
te
xt
matri
x
and
key
te
xt
m
at
rix
to
get
an
encr
y
pted res
ult.
Figure
3. Ha
rdwar
e
i
m
ple
m
e
ntati
on
ste
ps
3.1
.
MA
TL
A
B Imple
men
tation
Color
im
age
of
siz
es
(64
x64,
128x
128,
176x144,
an
d
25
6×25
6)
a
re
co
ns
ide
red
for
e
xp
e
rim
ental
te
sts.
The
para
m
et
ers
of
Na
hr
ai
n
m
ap
are
ta
ken
to
be
a=1.
52,
b=
0.05,
and
the
init
ia
l
con
diti
ons
of
sta
te
var
ia
bles
are
X0
=
0.3;
Y
0=0.2
;
an
d
Z0=
0.1
.
Figure
4
s
ho
ws
the
plain
a
nd
e
ncr
y
pted
im
ages
us
in
g
Nahrai
n
Evaluation Warning : The document was created with Spire.PDF for Python.
Ind
on
esi
a
n
J
E
le
c Eng &
Co
m
p
Sci
IS
S
N:
25
02
-
4752
FPGA
im
plem
entatio
n of c
olo
r im
age e
ncry
ption u
sin
g a n
ew
chao
ti
c
map
(
H
amsa
A. A
bdulla
h
)
133
m
ap.
The
sec
uri
ty
analy
sis
of
encr
ypte
d
i
m
a
ges
is
perform
ed
by
us
i
ng
si
x
sta
ti
sti
cal
methods
as:
histogram
analy
sis, PS
N
R, Inf
or
m
at
ion
En
tr
opy, C
orr
el
at
ion
, NPCR
an
d U
ACI
[12
-
14]
.
64x64
128x12
8
176x14
4
256x25
6
a. Origi
nal I
m
age
b.
Enc
rypted
Im
age
c. D
ec
rypte
d
I
m
age
Figure
4. Plai
n an
d
e
ncr
y
pted im
ages
3.1.1
Hist
og
r
am An
aly
sis
Figure
5
show
s
the
histo
gr
a
m
analy
sis
resu
lt
s.
I
n
Fig
ur
e
5
(a
-
e
)
a
re
the
histo
gr
am
s
of
colo
r
plain
-
i
m
age
Re
d,
G
reen,
a
nd
Bl
ue
w
hile
(
f
-
i)
th
e
histo
gram
s
of
enc
rypte
d
-
i
m
ages
Re
d,
G
reen,
a
nd
Bl
ue
us
i
ng
Nahrain
c
ha
otic
m
ap.
As
it
is
cl
early
seen,
the
histo
gr
a
m
of
pr
opose
d
al
gorithm
is
fairly
unif
orm
and
sign
ific
a
ntly
diff
e
ren
t f
ro
m
that of
the p
la
in i
m
age an
d
the e
ncr
y
pted
im
ag
e
[4]
of
i
n
F
ig
ure 5
(
j
)
. Th
is r
e
veals
that
the
at
ta
ck
er
can
not
us
e
a
ny
valid
sta
ti
sti
cal
data
in
the
encr
y
pted
im
a
ge
to
sta
rt
a
ny
sta
ti
sti
cal
a
tt
ac
ks
to
the cry
pto
syst
e
m
.
6
4
x
6
4
1
2
8
x
1
2
8
1
7
6
x
1
4
4
2
5
6
x
2
5
6
Ref
[
4
]
Origin
al
(a)
(b)
(c)
(d)
(e)
Encryp
ted
(f
)
(g)
(h)
(i)
(j)
Decr
y
p
ted
(
k
)
(l)
(
m
)
(n)
(o
)
Figure
5. Histo
gr
am
analy
sis
3.1.2
PS
NR
Table
1
sho
w
the
resu
lt
s
of
MSE
and
P
S
NR
te
st
between
the
ori
gin
al
i
m
age,
ci
ph
er
i
m
age
and
reconstr
ucted
im
age.
T
he
c
om
par
ison
of
P
SN
R
values
be
tween
t
he
or
i
gin
al
im
age
and
the
rec
on
st
ru
ct
e
d
Evaluation Warning : The document was created with Spire.PDF for Python.
IS
S
N
:
2502
-
4752
Ind
on
esi
a
n
J
E
le
c Eng &
Co
m
p
Sci,
Vo
l.
13
, N
o.
1
,
Ja
nu
a
ry 20
19
:
1
2
9
–
1
3
7
134
i
m
age
de
no
te
d
that
the
tw
o
i
m
ages
are
ide
ntica
l.
Wh
er
ea
s
the
sim
il
arit
y
PS
NR
values
betwee
n
t
he
ori
gin
al
i
m
age an
d ci
ph
er im
age ar
e
ve
ry lo
w
w
hic
h m
eans th
e e
nc
r
ypte
d
im
age is v
ery st
ron
g
a
ga
inst the att
ack
s.
Table
1.
PS
NR and MSE
Res
ult usi
ng the
Propose
d Alg
or
it
hm
I
m
ag
e si
ze
Co
lo
r
lay
er
Cip
h
er
I
m
ag
e
Reco
n
stru
cted
I
m
a
g
e
PSNR
MSE
PSNR
MSE
6
4
x
6
4
R
1
2
.29
4
6
3
.83
3
7
e+0
3
Inf
0
G
1
2
.00
8
4
4
.09
4
9
e+0
3
Inf
0
B
1
1
.32
3
5
4
.79
4
3
e+0
3
Inf
0
1
2
8
x
1
2
8
R
1
2
.70
0
8
3
.49
1
4
e+0
3
Inf
0
G
1
2
.68
6
8
3
.50
2
7
e+0
3
Inf
0
B
1
2
.95
5
5
3
.29
2
6
e+0
3
Inf
0
1
7
6
x
1
4
4
R
1
3
.12
8
9
3
.16
3
7
e+0
3
Inf
0
G
1
3
.25
4
4
3
.07
3
6
e+0
3
Inf
0
B
1
3
.13
7
9
3
.15
7
1
e+0
3
Inf
0
2
5
6
x
2
5
6
R
1
2
.65
5
3
3
.52
8
2
e+0
3
Inf
0
G
1
2
.94
1
8
3
.30
2
9
e+0
3
Inf
0
B
1
3
.24
0
4
3
.08
3
5
e+0
3
Inf
0
3.1.3
C
orrela
tion C
oeffici
ents of T
w
o Ad
ja
ce
nt
Pixel
s
The
co
r
r
el
at
ion
coe
ff
ic
ie
nts
of
plain
an
d
e
ncr
y
pted
im
ages
are
sho
wn
i
n
T
able
2.
T
he
correla
ti
on
coeffic
ie
nts
of
encr
y
pted
im
ages
us
in
g
the
propose
d
al
gorithm
are
cl
ose
d
to
ze
ro,
w
hich
m
eans
th
at
the
correla
ti
on
s
of
neig
hbori
ng
pi
xels
in
the
plain
i
m
age
can
be
re
m
ov
ed
by
us
in
g
pr
opos
e
d
al
gorithm
,
and
c
a
n
ho
l
d
sta
ti
sti
cal
att
acks
[
15
]
.
Table
2.
C
orrel
at
ion
C
oeffici
ents Res
ults
Alg
o
rith
m
I
m
ag
e si
ze
Co
lo
r
lay
er
Ho
rizon
tal
Vertica
l
Diag
o
n
al
Prop
o
sed
Algo
rith
m
6
4
x
6
4
R
0
.01
2
1
-
0
.06
2
4
0
.1
083
G
-
0
.13
6
0
-
0
.15
5
0
0
.09
1
9
B
-
0
.11
7
1
0
.05
3
5
0
.03
1
9
1
2
8
x
1
2
8
R
-
0
.02
1
4
0
.01
7
8
0
.05
8
6
G
0
.07
7
9
0
.01
5
4
-
0
.00
3
2
B
0
.00
1
6
0
.07
0
7
-
0
.03
7
3
1
7
6
x
1
4
4
R
-
0
.05
2
5
-
0
.08
6
6
-
0
.07
5
7
G
0
.02
3
9
-
0
.17
2
7
0
.10
7
9
B
-
0
.05
5
3
7
.14
5
3
e
-
04
-
0
.04
4
8
2
5
6
x
2
5
6
R
0.
0079
0
.02
4
5
0
.12
5
9
G
-
0
.09
2
1
0
.03
7
2
0
.10
1
3
B
-
0
.04
1
0
-
0
.00
7
9
0
.03
1
6
Ref
[
7
]
2
5
6
x
2
5
6
Av
erage
0
.01
2
4
-
0
.00
5
6
4
0
.02
7
6
Ref
[
8
]
2
5
6
x
2
5
6
Av
erage
0
.00
0
7
0
.00
3
7
-
0
.00
5
1
Ref
[
9
]
2
5
6
x
2
5
6
R
-
0
.00
7
1
0
.00
0
7
0
.00
1
4
G
0
.00
0
6
0
.00
0
6
0
.00
0
1
B
0
.00
0
1
0
.00
4
5
-
0
.00
2
2
3.1.4
T
he In
f
orm
at
io
n En
t
ropy
The
e
ntr
op
ie
s
of
plain
an
d
e
ncr
y
pted
im
ages
are
s
how
n
i
n
Ta
ble
3.
T
he
res
ults
in
this
ta
ble
s
how
that
the
entr
opie
s
of
t
he
enc
rypted
im
age
generate
d
by
the
pro
posed
al
gorithm
are
cl
os
ed
to
8,
an
d
that
m
ea
ns
the en
c
rypte
d
i
m
ages ar
e cl
ose
d
to
a
rand
om.
3.1.5
NP
CR
NP
CR
cal
culat
es
the
pe
rcen
ta
ge
of
di
ff
e
ren
t
pix
el
num
ber
s
betwee
n
tw
o
I
m
ages.
This
a
na
ly
sis
helps
in
dete
rm
ining
th
e
vu
l
ner
a
bili
ty
of
the
syst
em
towards
dif
f
eren
ti
al
at
ta
cks
.
T
he
a
naly
sis
repor
t
f
or
e
nc
r
ypte
d
i
m
age
is
gi
ve
n
in
the
Ta
ble
3.
We
no
te
from
this
ta
bl
e
that
the
pr
opos
e
d
al
gorithm
has
the
e
xcell
ent
perform
ance where
the
value
of N
PCR
is
99.74%
.
3.1.6
U
AC
I
U
AC
I
cal
culat
e
the
a
ver
a
ge
i
ntensity
of
dif
f
eren
ces
bet
we
en
tw
o
im
ages.
T
he
a
naly
sis
repor
te
d
for
encr
y
pted
im
a
ge
is
giv
e
n
in
the
Table
3.
T
he
val
ue
of
U
ACI
is
over
33
%
w
hich
in
dicat
e
that
the
rate
of
influ
e
nce
due t
o on
e
p
i
xel c
ha
ng
e
is
ver
y l
ar
ge.
Evaluation Warning : The document was created with Spire.PDF for Python.
Ind
on
esi
a
n
J
E
le
c Eng &
Co
m
p
Sci
IS
S
N:
25
02
-
4752
FPGA
im
plem
entatio
n of c
olo
r im
age e
ncry
ption u
sin
g a n
ew
chao
ti
c
map
(
H
amsa
A. A
bdulla
h
)
135
T
able
3.
E
C
,
N
P
C
R
a
nd
U
A
C
I
R
e
s
ul
t
Alg
o
rith
m
I
m
ag
e si
ze
Co
lo
r
lay
er
EC
NPCR
UACI
Prop
o
sed
Algo
rith
m
6
4
x
6
4
R
7
.95
0
3
9
9
.66
3
4
.81
G
7
.93
4
2
9
9
.49
3
4
.59
B
7
.84
2
7
9
9
.73
4
0
.24
1
2
8
x
1
2
8
R
7
.96
9
2
9
9
.54
3
2
.33
G
7
.97
7
4
9
9
.62
3
3
.46
B
7
.96
6
6
9
9
.64
3
1
.94
1
7
6
x
1
4
4
R
7
.90
6
4
9
9
.66
3
2
.31
G
7
.81
6
9
9
9
.76
3
2
.91
B
7
.82
7
1
9
9
.74
3
3
.14
2
5
6
x
2
5
6
R
7
.99
6
4
9
9
.58
3
2
.60
G
7
.96
2
8
9
9
.65
3
2
.19
B
7
.82
9
4
9
9
.74
3
2
.70
Ref
[
7
]
2
5
6
x
2
5
6
Av
erage
7
.94
3
7
9
8
.92
3
3
.50
Ref
[
1
0
]
2
5
6
x
2
5
6
Av
erage
-
9
9
.69
3
3
.44
3.1.7
Key
Sp
ac
e A
n
alysi
s
The
siz
e
of
the
key
sp
ace
is
t
he
total
num
ber
of
di
ff
e
ren
t
ke
ys
that
can
be
app
li
ed
in
the
encr
y
ption/
decr
y
ption
pro
cess.
Th
e
key
sp
ace
s
hould
be
la
rg
e
e
nough
to
m
ake
br
ute
-
f
or
ce
at
ta
cks
i
nf
easi
ble.
F
rom
the
crypto
gr
a
phic
po
i
nt
of
vie
w,
the
siz
e
of
the
key
s
pace
s
houl
d
no
t
be
sm
all
er
tha
n
21
00
to
ens
ure
a
hi
gh
le
vel
of
sec
ur
it
y.
Th
e
set
of
al
l
ini
ti
al
nu
m
ber
s
c
om
po
se
the
ke
y
sp
ace.
The
key
sp
ace
of
the
i
m
age
encry
ption
schem
e
has
fi
ve
sec
ret
key
values
x0,
y
0,
z0,
a,
a
nd
b.
As
sta
te
d
in
IEEE
floati
ng
-
po
i
nt
sta
ndar
d,
th
e
com
pu
ta
ti
on
al
pr
eci
sio
n
of
th
e
64
-
bit
do
ub
l
e
-
preci
sio
n
num
ber
is
about
2−
52
[16
-
18]
.
The
refor
e
,
t
he
key
sp
ace
of
the
pr
op
os
e
d
al
gorithm
is
(2
52
)5
=
2260,
wh
ic
h
ve
ry
m
uch
hig
he
r
than
the
cl
assic
al
encr
y
ption sch
e
m
es.
3.2
.
FP
GA I
mple
ment
at
i
on
The
sec
ure
im
age
e
ncr
y
ption
base
d
on
cha
otic
syst
e
m
has
be
e
n
im
ple
m
ented
on
the
Alte
ra
FP
G
A
Boar
d,
Cy
cl
one
V
GX
Starte
r
Kit
as
sh
own
in
Figu
re
6
an
d
7.
T
he
colo
r
i
m
age
with
dif
fer
e
nt
siz
es
(64x6
4,
128x12
8,
176x14
4,
a
nd
256×25
6)
s
how
n
in
Figure
4
are
us
e
d
to
te
st
the
har
dware
im
ple
m
e
ntati
on
perform
ance.
The
am
ou
nt
of
ti
m
e
is
re
qu
i
red
f
or
en
crypti
on
an
d
decr
y
ption
are
sh
own
in
T
able
4.
The
ha
rdwa
re
resou
rce
requir
ed
f
or
the
cry
pt
os
yst
e
m
is
co
ns
ide
rab
ly
la
rge
du
e
to
sim
ult
aneous
op
e
rati
on
i
n
key
gen
e
rato
r
and
e
ncr
y
ptio
n/d
ec
ryptio
n
proces
ses.
T
he
hard
war
e
res
ources
t
hat
use
d
show
n
in
T
able
5.
The
plain,
E
nc
rypted
an
d
D
ecrypted
im
ages
ob
ta
ine
d
from
the
op
erat
ion
of
crypto
s
yst
e
m
on
FP
G
A
are
sh
ow
n
in
Fig
ure
4(a
-
c
).
Dec
r
ypti
on
is
exact
ly
rev
erse
to
th
e
encr
ypti
on
a
nd
final
Enc
ry
ption
a
nd
Dec
r
ypti
on
si
m
ulati
on
r
es
ul
t as F
ig
ur
e
8.
Figure
6. Bl
oc
k diag
ram
o
f
to
e pro
posed
sys
tem
in
FPGA
Table
4.
A
naly
sis & Sy
nth
esi
s CPU
Tim
e
I
m
ag
e si
ze
Encry
p
tio
n
ti
m
e (
i
n
sec.)
Decr
y
p
tio
n
ti
m
e
(i
n
sec.)
6
4
x
6
4
0
.44
1
.16
1
2
8
x
1
2
8
1
.20
1
.24
1
7
6
x
1
4
4
1
.55
2
.04
2
5
6
x
2
5
6
4
.14
4
.35
Evaluation Warning : The document was created with Spire.PDF for Python.
IS
S
N
:
2502
-
4752
Ind
on
esi
a
n
J
E
le
c Eng &
Co
m
p
Sci,
Vo
l.
13
, N
o.
1
,
Ja
nu
a
ry 20
19
:
1
2
9
–
1
3
7
136
Table
5.
Hard
war
e
Reso
ur
ce
s
Total
Used
%
Log
ic utilizatio
n
(
i
n
ALM
s
)
2
9
,08
0
1
<1
%
Pin
s
364
22
6%
Figure
7. Alte
r
a FP
GA
boar
d
,
cy
cl
on
e
V G
X
sta
rter
kit
(a)
.
E
ncr
ypti
on
data
(b).
Dec
ryptio
n
data
Figure
8. Enc
r
ypti
on
a
nd
dec
ryptio
n data o
f im
age
s
iz
e 256x25
6
4.
CONCL
US
I
O
N
A
c
olor
im
age
enc
ryptio
n
us
in
g
a
ne
w
cha
otic
m
ap
is
sim
ulate
d
in
s
of
t
war
e
via
Ma
tl
ab,
Alte
ra
Qu
a
rtus
Pr
i
m
e
17
.0
Li
te
Editi
on
I
an
d
Mod
el
Sim
s
of
t
war
e
to
ols
then
im
ple
m
ent
ed
in
hard
ware
via
Cy
cl
on
e
V
G
X
Starte
r
Kit
FPGA
platf
orm
.
Th
e
resu
l
t
sh
ows
the
f
easi
bili
ty
and
eff
ect
ive
ness
of
the
cryptosyst
em
.
As
a
ty
pical
a
pp
li
cat
io
n,
t
he
i
m
age
enc
ryp
ti
on
/dec
ryptio
n
is
to
dem
on
st
rate
an
d
ve
rif
y
the
op
e
rati
on o
f
t
he
crypt
os
yst
em
ha
rdwar
e
.
T
he
pro
posed
sch
e
m
e
prov
i
des
la
rg
e
key
s
pace,
w
hic
h
is
se
ns
it
ive
to
sli
gh
t
cha
nge.
The
use
d
sec
ur
it
y
m
easur
em
ents
dem
on
strat
ed
that
the
j
oi
nt
wea
kn
e
sses
existe
d
i
n
ot
he
r
encr
y
ption
al
gorithm
s
can
be
def
eat
ed
by
the
propose
d
al
gorithm
,
and
th
e
secur
it
y
m
ea
su
rem
ents
sh
ow
tha
t
the
propose
d
al
gorithm
ro
bust
a
gains
t
al
l
ty
pes
of
at
ta
cks
s
uc
h
as
sta
ti
sti
cal
,
diff
ere
ntial
an
d
brut
e
-
f
or
c
e
at
ta
cks.
The
e
ncr
y
ption
e
xec
ution
ti
m
e
of
the
pro
posed
e
ncr
y
ption
sc
he
m
e
is
relat
ively
fast
and
flex
ible
to
diff
e
re
nt appli
cat
ion
s.
REFERE
NCE
S
[1]
Brani
slav
J., "S
y
nchr
onizati
on
T
e
chni
q
ues
for
Ch
aot
i
c
Com
m
unic
at
ion
S
y
st
ems
,
"
New
Zealand:
S
pringer,
2011
.
[2]
Qianxue
W
ang,
Sim
in
Yu,
Che
ngqing
Li,
Jinh
u
L
¨
u
,
Xi
aole
Fang,
Christoph
e
Gu
y
eux
,
and
Jac
ques
M.
B
ahi,
,
"The
ore
t
ical
De
sign
and
FP
GA
-
Based
Im
ple
m
e
nta
ti
on
of
High
er
-
Dim
ensiona
l
Digit
al
Chao
t
ic
S
y
stems
,
"
IEEE
TRANSA
CT
IONS ON CIR
CUIT
S
AND
S
Y
STEMS
–
I:
RE
GU
LAR
P
AR
E
R
,
vol. 63, n
o.
3
,
p
.
12
,
2016
.
[3]
Bika
sh
Barua
h
,
Monjul
Saiki
a
,
,
"A
n
F
PG
A
I
m
pl
ementa
t
ion
of
Chaos
base
d
Im
age
Enc
r
y
pt
ion
an
d
it
s
Perform
ance
Anal
y
sis
,
"
Int
ernati
onal Journal
of
Comput
er
S
c
i
enc
e
and
N
et
wor
k
(
IJCSN)
,
vol. 5
,
no
.
5
,
pp
.
712
-
720,
2016
.
[4]
Safwan
AI
As
sad,
T
a
Thi
Kim
Hue,
Chu
Van
La
m
,
Th
ang
Ma
nh
Hoang,
,
"Im
ple
m
ent
a
ti
on
of
sec
ure
SP
N
chaos
-
base
d
cr
y
p
tos
y
s
te
m
on
FP
GA
,
"
in
IEEE
Int
e
rnational
Symp
osium
on
Sign
al
Proce
ss
ing
and
Informa
ti
o
n
Technol
ogy
(
ISSPI
T)
,
Ho Chi
Mi
nh
Cit
y
,
Vi
et
na
m
,
2012.
Evaluation Warning : The document was created with Spire.PDF for Python.
Ind
on
esi
a
n
J
E
le
c Eng &
Co
m
p
Sci
IS
S
N:
25
02
-
4752
FPGA
im
plem
entatio
n of c
olo
r im
age e
ncry
ption u
sin
g a n
ew
chao
ti
c
map
(
H
amsa
A. A
bdulla
h
)
137
[5]
Barl
i
an
Henr
y
ra
nu
Praseti
o,
Ek
o
Seti
awa
n
,
Adharul
Mutt
aqi
n,
,
"Im
age
Enc
r
y
p
ti
on
using
Sim
ple
Algori
thm
on
FP
GA
,
"
TEL
K
OMNIKA
(Tele
communic
at
ion
Computing
El
e
ct
ronics
an
d
Control)
,
v
ol.
13,
no.
4,
pp
.
1153
-
1161
,
2015.
[6]
S
y
ed
Shah
za
d
Hus
sain
Shah,
Gulista
n
Ra
ja,,
"F
PGA
Im
ple
me
ntation
of
Ch
a
oti
c
b
ase
d
AES
Im
age
En
cr
y
ption
Algorit
hm
,
"
in
IEE
E
Int
ernati
o
nal
Confe
renc
e
on
Signal
and
Image
Proce
ss
ing
Appl
ic
at
ions
(ICSIP
A)
,
Kuala
Lumpur,
Mal
a
y
s
ia
,
2015.
[7]
Bhavna
Sinha
,
S
hubhendu
Kum
ar,
Chit
ta
r
anj
an
Pradha
n,
,
"Com
pa
rat
iv
e
Anal
y
sis
of
Color
Im
age
Enc
r
y
pt
ion
usin
g
3D Cha
otic
Map
s,"
in
In
te
rnatio
nal
Conf
ere
nce
on
Comm
unic
ation and
Signa
l Proce
ss
ing,
IE
EE
,
I
ndia
,
2016.
[8]
Haide
r
M.
Al
-
Mashhadi,
Im
a
n
Q.
Abdulja
leel,,
"Colo
r
Im
age
Enc
r
y
p
ti
on
using
Chaot
ic
Maps
Tri
angula
r
Scra
m
bli
ng,
wit
h
DN
A
Sequenc
es,
"
in
Inte
rnati
onal
Confe
renc
e
on
Cur
rent
Re
search
in
Computer
Sci
en
ce
and
Information
Tec
hnology
(
ICCIT)
,
Slemani
,
I
raq
,
2017.
[9]
A.
A.
R.
a
.
H.
H.
F.
W
afa
a
S.
Sa
y
ed
Ahm
ed
G
.
Radw
an,
"F
ini
t
e
Prec
ision
Logis
ti
c
Map
be
tween
Com
puta
ti
onal
Eff
iciency
and
Acc
ura
c
y
with
E
ncr
y
p
ti
on
Applicati
ons,"
Com
pl
e
xity
,
Hindawi
.
,
v
ol.
2017
,
p
.
21
,
2
017.
[10]
Hui
Li
u,
Cong
Jin,
,
"A
Color
I
m
age
Enc
r
y
pti
o
n
Scheme
Based
on
Arnold
Scra
m
bli
ng
and
Quantum
Chaot
i
c
,
"
Inte
rnational
Jo
urnal
of
N
et
wor
k
Se
curit
y
,
vo
l. 1
9,
no
.
3
,
pp
.
347
-
357
,
2017
.
[11]
Ham
sa
A.
Abd
ull
ah
,
Hikm
at
N.
Abdulla
h,
,
"
A
New
Chaot
ic
Map
for
Secur
e
Tra
nsm
ission,
"
TEL
KOMNIK
A
(
Tele
communic
ati
on
Computing
El
e
ct
ronics
and
Control)
,
vol. 16
,
no
.
3
,
pp
.
1135
-
1142,
2018
.
[12]
Hikm
at
N.
Abdulla
h
,
Ham
sa
A.
Abdulla
h
,
"
Two
-
le
ve
l
Secur
e
Colore
d
Im
age
Tra
nsm
ission
U
sing
Novel
Cha
otic
Map,
"
in
Sec
on
d
Al
-
Sadiq
Int
ernati
onal
Conf
ere
nce
on
Mu
lt
id
i
scipl
inary
in
IT
and
Comm
unic
ati
on
Scienc
e
an
d
Appl
ic
a
ti
ons (
2nd
-
AIC
-
MITC'17)
,
Baghd
ad, I
raq
,
2017.
[13]
Hong
y
ao
Deng
,
Qingxin
Zhu,
Xiuli
Song,
Jin
gsong
Ta
o,
,
"C
haos
-
Based
Im
age
Enc
r
y
p
ti
on
Algorit
hm
Us
ing
Dec
om
positi
on,
"
TEL
KOMNIK
A
(
Tele
communic
ati
on
Comput
ing
El
e
ct
roni
cs
and
Control)
,
vol.
12,
no
.
1,
pp.
575
-
583
,
20
14.
[14]
Alia
Kari
m
Ab
dul
H
assan,
"P
roposed
H
y
per
ch
aot
i
c
S
y
st
em
for
Im
age
Enc
r
y
p
ti
on,
"
Int
ernati
o
nal
Journal
o
f
Adv
anc
ed
Comp
ute
r Sc
ie
nc
e
and
Applications (
IJA
CSA)
,
vol
.
7
,
n
o.
1
,
2016
.
[15]
Shivaput
ra
,
HS
Sheshadri,
V
Loke
sha,
"A
Naïve
Visual
Cr
y
ptog
rap
hic
Algori
th
m
for
the
Tra
nsfer
of
Com
pre
ss
e
d
Medic
a
l
Im
age
s,
"
Bul
l
et
in
of
Ele
ct
rical E
ng
ineering
and
Informati
cs
,
vol
.
5
,
no
.
3
,
pp.
347
-
365
,
20
16.
[16]
Borisla
v
Sto
y
an
ov,
Krasim
ir
Kordov,
"Im
age
En
cr
y
p
ti
on
Us
ing
Cheb
y
shev
Map
and
Rota
ti
on
E
quat
ion
,
"
Ent
rop
y
,
vol.
17
,
pp
.
2117
-
2139,
2015
.
[17]
An
Am
eri
ca
n
Nati
on
al
Stand
ard
,
"754
-
1985
-
I
EE
E
St
anda
rd
f
or
Bina
r
y
Floa
ting
-
Point
Arithmetic,
"
Standards
Comm
it
te
e
of th
e
IE
EE Computer
Soci
e
ty
,
1985
.
[18]
Ruisong
Ye,
"A
n
Im
age
Enc
r
y
p
t
ion
Scheme
wit
h
Eff
icient
Pe
rm
uta
ti
on
and
Diff
usion
Proce
ss
es,
"
in
In:
Zhou
M.
,
Ta
n
H.
(ed
s)
A
dvanc
es
in
Co
mputer
Scienc
e
and
Edu
cat
ion
Appl
i
cat
ions
,
Comm
unic
ati
ons
in
Computer
a
nd
Information
Sc
ience
,
Ber
li
n,
Hei
del
ber
g
,
Spring
e
r,
2011
,
pp
.
32
-
3
9.
BIOGR
AP
HI
ES OF
A
UTH
ORS
Ham
sa
A.
Abdu
ll
ah
was
born
in
Baghda
d,
Ira
q
i
n
1984.
She
obta
ine
d
her
B
.
Sc.
in
Inform
at
ion
Engi
ne
eri
ng
in
2005,
M.Sc
in
I
nform
at
ion
Enginee
ring
in
2008
at
Al
-
Nahr
ai
n
U
nive
rsit
y
,
Ira
q
.
She
worked
as
a
lectur
e
r
in
th
e
Coll
eg
e
of
Info
rm
at
ion
Engi
n
eering
at
Al
-
Nahr
ai
n
Univer
si
t
y
,
Ira
q
since
2008.
She
is
int
ere
sted
in
subjec
ts
Multi
m
edi
a,
Mult
imedia
sec
urity
tr
an
sm
ission
over
wire
le
ss
comm
unic
a
ti
on
s
y
stems
,
Pat
te
rn
Rec
ogn
it
ion and
N
et
wor
k
Secur
i
t
y
.
Hikm
at
.
N.
Abdulla
h
was
born
in
Baghda
d,
Ira
q
in
1974.
He
o
bta
in
ed
his
B.
Sc.
in
El
e
ct
ri
ca
l
Engi
ne
eri
ng
in
1995,
M.Sc.
in
Com
m
unic
at
ion
Engi
ne
eri
ng
i
n
1998
at
Uni
ver
sit
y
of
Al
-
Mus
ta
nsir
y
ah
,
I
raq
and
Ph.D.
in
Com
m
unic
at
ion
Engi
ne
ering
in
2004
at
Univer
sit
y
o
f
Te
chno
log
y
,
Ir
a
q.
From
1998
to
2015
he
wor
ked
as
l
ec
tu
rer
in
th
e
Elec
tri
c
al
Eng
ineeri
ng
Depa
rtment,
a
t
Al
-
Mus
ta
nsir
y
ah
Univer
sit
y
,
Ir
a
q.
Sinc
e
th
e
b
e
ginni
ng
of
201
5
he
works
a
s
profe
ss
or
in
col
l
ege
of
Inform
at
i
on
Engi
ne
eri
ng
at
Al
-
Nahra
in
un
ive
rsit
y
,
Ira
q
.
From
2011
–
2013
he
got
a
rese
arch
awa
rd
from
In
te
rna
ti
ona
l
Institute
of
Educ
a
ti
on
(IIE
/USA
)
at
B
onn
-
Rhei
n
-
Sieg
unive
rsit
y
of
ap
pli
ed
scie
n
ce
s,
Germ
an
y
.
He
is
a
senior
m
ember
of
IEE
E
association
since
2014.
He
is
intere
s
te
d
in
subject
of
m
odula
t
ion
and
co
di
ng
sche
m
es
for
wire
l
ess
comm
unic
at
ion s
y
stems
.
Evaluation Warning : The document was created with Spire.PDF for Python.