2023
DOI: 10.11591/ijai.v12.i1.pp347-356
|View full text |Cite
|
Sign up to set email alerts
|

Artificial intelligence techniques for encrypt images based on the chaotic system implemented on field-programmable gate array

Abstract: <span lang="EN-US">Image encryption is an important issue in protecting the content of images and in the area of information security. This article proposes a novel method for image encryption and decryption using the structure of the artificial neural network (ANN)-based chua chaotic system (CCS). This structure was efficiently designed on a field-programmable gate array (FPGA) chip utilizing the xilinx system generator (XSG) tool with the IEEE-754-1985 32-bit floating-point number format. For ANN-based… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
3
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
4
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(4 citation statements)
references
References 21 publications
0
3
0
Order By: Relevance
“…The transformation of mix column round is defined by the (9). where ⊕ is the XOR operation and the • is a multiplication modulo the irreducible polynomial 𝑚(𝑥) = 𝑥 8 + 𝑥 4 + 𝑥 3 + 𝑥 + 1. Multiplication of a value by {02} can be implemented as a 1-bit left shift followed by a conditional bitwise XOR with (0001 1011) if the leftmost bit of the original value (prior to the shift) is 1.…”
Section: Columnmentioning
confidence: 99%
See 1 more Smart Citation
“…The transformation of mix column round is defined by the (9). where ⊕ is the XOR operation and the • is a multiplication modulo the irreducible polynomial 𝑚(𝑥) = 𝑥 8 + 𝑥 4 + 𝑥 3 + 𝑥 + 1. Multiplication of a value by {02} can be implemented as a 1-bit left shift followed by a conditional bitwise XOR with (0001 1011) if the leftmost bit of the original value (prior to the shift) is 1.…”
Section: Columnmentioning
confidence: 99%
“…This process involves key-based encryption methods, where a key is an essential component that transforms plaintext into ciphertext. The overarching goal of cryptography is to achieve confidentiality, integrity, non-repudiation, and authentication as major objectives [3], [4]. Symmetric cryptographic algorithms, also known as conventional encryption, utilize a single key for both the encryption and decryption processes [5].…”
Section: Introductionmentioning
confidence: 99%
“…For example, numerous stockpiles of in-person health data are required for DL models [32]. Nowadays, personal health data like notes from regular visits to physicians, self-monitoring of paces, heartbeats, sleep, medical imaging, and DNA repositories are being quickly collected and used to train DL algorithms in a rising array of AI healthcare applications [33,34]. In fact, in comparison with profits from personal healthcare AI, much less regard has been paid to potential unintentional or inadvertent results of these improvements for humans and society [35].…”
Section: Introductionmentioning
confidence: 99%
“…In the last few years, many investigations have been performed on chaos-based image encryption and secure communication systems. Examples can be found in [31][32][33][34][35][36][37][38][39], which are all implemented on the field programmable gate array (FPGA) cards. For electronic implementations, the FPGA has become a better choice over operational amplifiers (OPAMPs) because it is reusable, very cost-effective, faster in performing parallel processing, and faster and efficient with regard to system design.…”
Section: Introductionmentioning
confidence: 99%