﻿ 基于硬件平台的图像加密算法 Image Encryption Algorithm Based on the Hardware Platform

Journal of Image and Signal Processing
Vol. 08  No. 02 ( 2019 ), Article ID: 29963 , 5 pages
10.12677/JISP.2019.82014

Image Encryption Algorithm Based on the Hardware Platform

Xiaoqiang Zhang1,2, Hang Yang3, Xun Wang1, Wei Zeng3

1School of Information and Control Engineering, China University of Mining and Technology, Xuzhou Jiangsu

2School of Electrical and Power Engineering, China University of Mining and Technology, Xuzhou Jiangsu

3Xuzhou Key Laboratory of Artificial Intelligence and Big Data, Xuzhou Jiangsu

Received: Apr. 3rd, 2019; accepted: Apr. 14th, 2019; published: Apr. 28th, 2019

ABSTRACT

The image is an important carrier under the network platform. With the development of the Internet, the image transmission becomes fast and easy. These images always carry a lot of confidential information. In recent years, the image security attracts the attention of scholars at home and abroad. Traditional image encryption is mostly designed based on the software. In recent years, with the development of hardware platforms, DSPs and FPGAs are applied to image encryption for its processing speed, logic computing power and low cost. This paper introduces the technology of image encryption. Meanwhile, this paper mainly describes the image encryption algorithm based on DSP and the image encryption algorithm based on FPGA. Their advantages and disadvantages are also discussed. Finally, we prospect the application prospect of FPGA in the field of image encryption.

Keywords:Information Security, Image Encryption, FPGA, Zu Chongzhi, DSP, Chaos

1中国矿业大学信息与控制工程学院，江苏 徐州

2徐州市人工智能与大数据重点实验室，江苏 徐州

3中国矿业大学电气与动力工程学院，江苏 徐州

1. 引言

2. 图像加密技术综述

2.1. 基于软件的图像加密算法

2.2. 基于硬件的图像加密算法

3. 基于FPGA的图像加密算法

Figure 1. Zu Chong’s algorithm

4. 基于DSP的图像加密算法

(1)

DSP基于哈弗结构，DSP的零消耗循环控制和哈佛式结构使其在完成混沌系统的多次迭代时具有较大的优势，在图像加密领域涌现出了较好的应用前景。混沌加密及解密的原理及其实现过程如图2所示，编码后的图像信息以二进制数据流的形式传输，利用DSP产生混沌序列与二进制数据流相互作用，得到用于发送的密文，利用DSP编写该加密程序执行速度快，加密效果良好，安全性高。

Figure 2. Chaos encryption and decryption process

5. 结论

Image Encryption Algorithm Based on the Hardware Platform[J]. 图像与信号处理, 2019, 08(02): 98-102. https://doi.org/10.12677/JISP.2019.82014

1. 1. 颜世银. 基于混沌的图像加密方案研究及实现[D]: [硕士学位论文]. 上海: 华东师范大学, 2008.

2. 2. Matthews, R. (1989) On the Derivation of a “Chaotic” Encryption Algorithm. Cryptologia, 13, 29-42.
https://doi.org/10.1080/0161-118991863745

3. 3. Zhen, P., Zhao, G., Min, L., et al. (2016) Chaos-Based Image Encryption Scheme Combining DNA Coding and Entropy. Multimedia Tools and Applications, 75, 6303-6319.
https://doi.org/10.1007/s11042-015-2573-x

4. 4. 张晓强, 王蒙蒙, 朱贵良. 图像加密算法研究新进展[J]. 计算机工程与科学, 2012, 34(5): 1-5.

5. 5. Nassar, N., Newhook, R. and Miller, G. (2014) Enhanced Mobile Security Using SIM Encryption. 2014 International Conference on Collaboration Technologies and Systems (CTS), Minneapolis, 19-23 May 2014, 189-196.
https://doi.org/10.1109/cts.2014.6867563

6. 6. 程海. 基于FPGA的图像加密关键技术研究[D]: [博士学位论文]. 哈尔滨: 黑龙江大学, 2015.

7. 7. 黄璐. 图像的混沌置乱算法研究[D]: [硕士学位论文]. 长沙: 长沙理工大学, 2011.

8. 8. Liu, Y., Wang, J., Fan, J., et al. (2016) Image Encryption Algorithm Based on Chaotic System and Dynamic S-Boxes Composed of DNA Sequences. Multimedia Tools and Applications, 75, 4363-4382.
https://doi.org/10.1007/s11042-015-2479-7

9. 9. Hua, Z.Y., Zhou, Y.C., Pun, C.M., et al. (2015) 2D Sine Logistic Modulation Map for Image Encryption. Information Science, 297, 80-94.
https://doi.org/10.1016/j.ins.2014.11.018