LFSR state sequence image encryption method based on VHDL language

Research Article
Open access

LFSR state sequence image encryption method based on VHDL language

Hongwei Niu 1*
  • 1 McMaster University    
  • *corresponding author hongweiniukevin@gmail.com
Published on 8 December 2023 | https://doi.org/10.54254/2753-8818/19/20230494
TNS Vol.19
ISSN (Print): 2753-8826
ISSN (Online): 2753-8818
ISBN (Print): 978-1-83558-203-9
ISBN (Online): 978-1-83558-204-6

Abstract

In the modern society of digitalization, integration, intelligence, and networking, while people enjoy the convenience of information technology to their production and lives, information security in the network, as the cornerstone of information communication, becomes more and more important. The research is to establish a new image encryption (IE) method based on LFSR state sequence (SS)s in VHDL language, and the stream cipher of LFSR is studied in detail to induce the idea of LFSR SSs based on VHDL language. The correlation coefficient (CC) of the original image (OI) and encrypted image (EI) pixel points (PP) are analyzed from horizontal direction, vertical direction and diagonal direction, and the results show that the CC of adjacent PP of the OI is large, which approaches 1. However, using the encryption algorithm proposed in this paper, the correlation coefficient of the PP of the EI is -0.0282 in the diagonal direction, and the highest correlation coefficient in the horizontal direction is only 0.0122, which indicates that the adjacent PP of the EI are almost uncorrelated with each other. Therefore, the encryption method can well resist statistical attacks, which illustrates the effectiveness, security, and reliability of this new IE method.

Keywords:

VHDL Language, LFSR State Sequence, Digital Image, Image Encryption, Stream Cipher.

Niu,H. (2023). LFSR state sequence image encryption method based on VHDL language. Theoretical and Natural Science,19,63-69.
Export citation

References

[1]. Khan S, Han L, Lu H, et al. 2019. A new hybrid IE algorithm based on 2D-CA, FSM-DNA rule generator, and FSBI [J]. IEEE Access, PP(99):1-1.

[2]. Karimzadeh F, Cao N, Crafton B, et al. 2020. A Hardware-Friendly Approach Towards Sparse Neural Networks Based on LFSR-Generated Pseudo-Random Sequences [J]. Circuits and Systems I: Regular Papers, IEEE Transactions on, PP(99):1-14.

[3]. Geng S, Wu T, Wang S, et al. 2020. IE Algorithm Based on Block Scrambling and Finite State Machine [J]. IEEE Access, PP(99):1-1.

[4]. Man Z, Li J, Di X, et al. 2019. An Image Segmentation Encryption Algorithm Based on Hybrid Chaotic System [J]. IEEE Access, PP(99):1-1.

[5]. Sun S, Guo Y, Wu R. 2019. A Novel Plaintext-Related IE Algorithm Based on Stochastic Signal Insertion and Block Swapping [J]. IEEE Access, 7(12):123049-123060.

[6]. Paul, A., Kandar, S., & Dhara, B. C. 2022. Image encryption using permutation generated by modified Regula-Falsi method. Applied Intelligence, 1-20.

[7]. Kapinesh, G., Sachin Kumaran, K., Gayatri, K., Mohan, T., Thanikaiselvan, V., Subashanthini, S., & Amirtharajan, R. 2022. New Image Encryption Method using Multiple Chaotic Map Computation and Irregular Diffusion Process. Journal of Uncertain Systems.

[8]. Subhajit Adhikari, Sunil Karforma. 2022. A novel IE method for e-governance application using elliptic curve pseudo random number and chaotic random number sequence. Multim. Tools Appl. 81(1): 759-784

[9]. Noor Munir, Majid Khan, Abd Al Karim Haj Ismail, Iqtadar Hussain. 2022. Cryptanalysis and Improvement of Novel IE Technique Using Hybrid Method of Discrete Dynamical Chaotic Maps and Brownian Motion. Multim. Tools Appl. 81(5): 6571-6584

[10]. Kaimeng Chen, Chinchen Chang. 2021. High-capacity separable reversible data-Hiding method in EIs based on block-level encryption and Huffman compression coding. Connect. Sci. 33(4): 975-994

[11]. Walaa M. Abd-Elhafiez, Mohamed Heshmat. 2020. Medical IE via lifting method. j. Intell. Fuzzy Syst. 38(3): 2823-2832

[12]. Mahdieh Ghazvini, Mojdeh Mirzadi, Negin Parvar. 2020. A modified method for IE based on chaotic map and genetic algorithm. Multim. Tools Appl. 79(37-38): 26927-26950

[13]. Farah Naz, Ijaz Ali Shoukat, Rehan Ashraf, Umer Iqbal, Abdul Rauf. 2020. An ASCII based effective and multi-operation IE method. Multim. Tools. Appl. 79(31-32): 22107-22129.


Cite this article

Niu,H. (2023). LFSR state sequence image encryption method based on VHDL language. Theoretical and Natural Science,19,63-69.

Data availability

The datasets used and/or analyzed during the current study will be available from the authors upon reasonable request.

Disclaimer/Publisher's Note

The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of EWA Publishing and/or the editor(s). EWA Publishing and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

About volume

Volume title: Proceedings of the 2nd International Conference on Computing Innovation and Applied Physics

ISBN:978-1-83558-203-9(Print) / 978-1-83558-204-6(Online)
Editor:Marwan Omar, Roman Bauer
Conference website: https://www.confciap.org/
Conference date: 25 March 2023
Series: Theoretical and Natural Science
Volume number: Vol.19
ISSN:2753-8818(Print) / 2753-8826(Online)

© 2024 by the author(s). Licensee EWA Publishing, Oxford, UK. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license. Authors who publish this series agree to the following terms:
1. Authors retain copyright and grant the series right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgment of the work's authorship and initial publication in this series.
2. Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the series's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgment of its initial publication in this series.
3. Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See Open access policy for details).

References

[1]. Khan S, Han L, Lu H, et al. 2019. A new hybrid IE algorithm based on 2D-CA, FSM-DNA rule generator, and FSBI [J]. IEEE Access, PP(99):1-1.

[2]. Karimzadeh F, Cao N, Crafton B, et al. 2020. A Hardware-Friendly Approach Towards Sparse Neural Networks Based on LFSR-Generated Pseudo-Random Sequences [J]. Circuits and Systems I: Regular Papers, IEEE Transactions on, PP(99):1-14.

[3]. Geng S, Wu T, Wang S, et al. 2020. IE Algorithm Based on Block Scrambling and Finite State Machine [J]. IEEE Access, PP(99):1-1.

[4]. Man Z, Li J, Di X, et al. 2019. An Image Segmentation Encryption Algorithm Based on Hybrid Chaotic System [J]. IEEE Access, PP(99):1-1.

[5]. Sun S, Guo Y, Wu R. 2019. A Novel Plaintext-Related IE Algorithm Based on Stochastic Signal Insertion and Block Swapping [J]. IEEE Access, 7(12):123049-123060.

[6]. Paul, A., Kandar, S., & Dhara, B. C. 2022. Image encryption using permutation generated by modified Regula-Falsi method. Applied Intelligence, 1-20.

[7]. Kapinesh, G., Sachin Kumaran, K., Gayatri, K., Mohan, T., Thanikaiselvan, V., Subashanthini, S., & Amirtharajan, R. 2022. New Image Encryption Method using Multiple Chaotic Map Computation and Irregular Diffusion Process. Journal of Uncertain Systems.

[8]. Subhajit Adhikari, Sunil Karforma. 2022. A novel IE method for e-governance application using elliptic curve pseudo random number and chaotic random number sequence. Multim. Tools Appl. 81(1): 759-784

[9]. Noor Munir, Majid Khan, Abd Al Karim Haj Ismail, Iqtadar Hussain. 2022. Cryptanalysis and Improvement of Novel IE Technique Using Hybrid Method of Discrete Dynamical Chaotic Maps and Brownian Motion. Multim. Tools Appl. 81(5): 6571-6584

[10]. Kaimeng Chen, Chinchen Chang. 2021. High-capacity separable reversible data-Hiding method in EIs based on block-level encryption and Huffman compression coding. Connect. Sci. 33(4): 975-994

[11]. Walaa M. Abd-Elhafiez, Mohamed Heshmat. 2020. Medical IE via lifting method. j. Intell. Fuzzy Syst. 38(3): 2823-2832

[12]. Mahdieh Ghazvini, Mojdeh Mirzadi, Negin Parvar. 2020. A modified method for IE based on chaotic map and genetic algorithm. Multim. Tools Appl. 79(37-38): 26927-26950

[13]. Farah Naz, Ijaz Ali Shoukat, Rehan Ashraf, Umer Iqbal, Abdul Rauf. 2020. An ASCII based effective and multi-operation IE method. Multim. Tools. Appl. 79(31-32): 22107-22129.