Implementation of a Real Time Analog Secure Image Communication System via a Chaotic Circuit

A new secure image communication system has been designed and implemented based on a synchronized chaotic circuit. The new chaotic circuit, which has recently proposed by one of the authors contains a resistor, two inductors, and two diodes (i.e. R2L2D). The synchronization part operates with a master – slave configuration. In order to achieve the real-time communication, initially the analog master circuit has been implemented to generate chaotic sequences of numbers. Then, that analog tool has been transmitted to a computer via an analog/digital converter and a hidden image has been obtained. Besides, the slave circuit has also received a copy of that chaotic sequences in order to use it in subtraction process of image gray levels. The digital chaotic image has been transmitted to the slave circuit via a digital/analog converter with an efficient method and the decrypted image has been obtained in real-time. The advantage of that technique over the conversional ones is that it does not require any saved copy of the digital data, even for sending them in gray images to the receiver, since it is real-time. The conventional techniques use the stored and processed data and that can cause security problems in today’s advanced web media. Thus to send the encrypted image in a real-time device by using an analog chaotic equipment has certain security superiority. The analyses on the preliminary decrypted images proves that the process is efficient in time and secure.

Implementation of a Real Time Analog Secure Image Communication System via a Chaotic Circuit

A new secure image communication system has been designed and implemented based on a synchronized chaotic circuit. The new chaotic circuit, which has recently proposed by one of the authors contains a resistor, two inductors, and two diodes (i.e. R2L2D). The synchronization part operates with a master – slave configuration. In order to achieve the real-time communication, initially the analog master circuit has been implemented to generate chaotic sequences of numbers. Then, that analog tool has been transmitted to a computer via an analog/digital converter and a hidden image has been obtained. Besides, the slave circuit has also received a copy of that chaotic sequences in order to use it in subtraction process of image gray levels. The digital chaotic image has been transmitted to the slave circuit via a digital/analog converter with an efficient method and the decrypted image has been obtained in real-time. The advantage of that technique over the conversional ones is that it does not require any saved copy of the digital data, even for sending them in gray images to the receiver, since it is real-time. The conventional techniques use the stored and processed data and that can cause security problems in today’s advanced web media. Thus to send the encrypted image in a real-time device by using an analog chaotic equipment has certain security superiority. The analyses on the preliminary decrypted images proves that the process is efficient in time and secure.

___

  • Murali, K., M. Lakshmanan, and L.O. Chua, The simplest dissipative nonautonomous chaotic circuit. IEEE Transactions on Circuits and Systems I: Fundamental Theory and Applications, 1994. 41(6): p. 462-463.2. Kurt, E., S. Acar, and R. Kasap, A comparison of chaotic circuits from a statistical approach. Mathematical and Computational Applications, 2000. 5(2): p. 95-103.3. Adak, S., Cangi, H. and Yılmaz, A.S., Design of an LLCL type filter for stand-alone PV systems’ harmonics, Journal of Energy Systems, 2019; 3(1): 36-50, DOI: 10.30521/jes.5060764. Kiers, K., D. Schmidt, and J.C. Sprott, Precision measurements of a simple chaotic circuit. American Journal of Physics, 2004. 72(4): p. 503-509.5. Linsay, P.S., Period doubling and chaotic behavior in a driven anharmonic oscillator. Physical Review Letters, 1981. 47(19): p. 1349.6. Kurt, E., Nonlinearities from a non-autonomous chaotic circuit with a non-autonomous model of Chua's diode. Physica Scripta, 2006. 74(1): p. 22.7. Hanias, M., Z. Avgerinos, and G. Tombras, Period doubling, Feigenbaum constant and time series prediction in an experimental chaotic RLD circuit. Chaos, Solitons & Fractals, 2009. 40(3): p. 1050-1059.8. Andreatos, A.S. and C.K. Volos. Secure text encryption based on hardware chaotic noise generator. in 2nd International Conference on Cryptography and Its Applications in the Armed Forces. 2014.9. Feki, M., An adaptive chaos synchronization scheme applied to secure communication. Chaos, Solitons & Fractals, 2003. 18(1): p. 141-148.10. Cuomo, K.M., A.V. Oppenheim, and S.H. Strogatz, Synchronization of Lorenz-based chaotic circuits with applications to communications. IEEE Transactions on circuits and systems II: Analog and digital signal processing, 1993. 40(10): p. 626-633.11. Mu, X. and L. Pei, Synchronization of the near-identical chaotic systems with the unknown parameters. Applied Mathematical Modelling, 2010. 34(7): p. 1788-1797.12. Yang, T., A survey of chaotic secure communication systems. International Journal of Computational Cognition, 2004. 2(2): p. 81-130.13. Bourbakis, N. and C. Alexopoulos, Picture data encryption using scan patterns. Pattern Recognition, 1992. 25(6): p. 567-581.14. Pisarchik, A. and M. Zanin, Image encryption with chaotically coupled chaotic maps. Physica D: Nonlinear Phenomena, 2008. 237(20): p. 2638-2648.15. Xiangdong, L., et al., Image scrambling algorithm based on chaos theory and sorting transformation. IJCSNS International Journal of Computer Science and Network Security, 2008. 8(1): p. 64-68.16. Hu, J. and F. Han, A pixel-based scrambling scheme for digital medical images protection. Journal of Network and Computer Applications, 2009. 32(4): p. 788-794.17. Tong, X. and M. Cui, Image encryption scheme based on 3D baker with dynamical compound chaotic sequence cipher generator. Signal processing, 2009. 89(4): p. 480-491.18. Fridrich, J., Symmetric ciphers based on two-dimensional chaotic maps. International Journal of Bifurcation and chaos, 1998. 8(06): p. 1259-1284.19. Gao, H., et al., A new chaotic algorithm for image encryption. Chaos, Solitons & Fractals, 2006. 29(2): p. 393-399.20. Rulkov, N.F., et al., Generalized synchronization of chaos in directionally coupled chaotic systems. Physical Review E, 1995. 51(2): p. 980.21. Zhou, Q., et al., Parallel image encryption algorithm based on discretized chaotic map. Chaos, Solitons & Fractals, 2008. 38(4): p. 1081-1092.22. Shelke, F.M., A.A. Dongre, and P.D. Soni, Comparison of different techniques for Steganography in images.23. Celik, K. and E. Kurt. A new image encryption algorithm based on lorenz system. in Electronics, Computers and Artificial Intelligence (ECAI), 2016 8th International Conference on. 2016. IEEE.24. Kurt, E. and C. Bingol, A New Sweep Up/Down Phenomenon between the Chaotic and Regular Regions in a New R2L2D Circuit, page: 305-310. Politeknik Dergisi, 2016. 19(3).25. Pecora, L.M. and T.L. Carroll, Synchronization in chaotic systems. Physical review letters, 1990. 64(8): p. 821.26. Wu, C.W. and L.O. Chua, A simple way to synchronize chaotic systems with applications to secure communication systems. International Journal of Bifurcation and Chaos, 1993. 3(06): p. 1619-1627.27. Yang, T. and L.O. Chua, Secure communication via chaotic parameter modulation. IEEE Transactions on Circuits and Systems I: Fundamental Theory and Applications, 1996. 43(9): p. 817-819.28. Yau, H.-T. and J.-J. Yan, Chaos synchronization of different chaotic systems subjected to input nonlinearity. Applied Mathematics and Computation, 2008. 197(2): p. 775-788.29. Kurt, E. and C. Bingol, Exploration of Synchronization Secure Communication and Signal Recovery in New R2L2D Circuit, 58th Int. Sci. Conf. Riga Tech. Uni. Power and Elec. Eng. RTUCON2017, 12-13 Oct. 2017, Riga, Latvia.30. Hendriks, P., Specifying communications dacs. IEEE spectrum, 1997. 34(7): p. 58-69.
  • Kurt, E., S. Acar, and R. Kasap, A comparison of chaotic circuits from a statistical approach. Mathematical and Computational Applications, 2000. 5(2): p. 95-103.
  • Adak, S., Cangi, H. and Yılmaz, A.S., Design of an LLCL type filter for stand-alone PV systems’ harmonics, Journal of Energy Systems, 2019; 3(1): 36-50,
  • Kiers, K., D. Schmidt, and J.C. Sprott, Precision measurements of a simple chaotic circuit. American Journal of Physics, 2004. 72(4): p. 503-509.
  • Linsay, P.S., Period doubling and chaotic behavior in a driven anharmonic oscillator. Physical Review Letters, 1981. 47(19): p. 1349.
  • Kurt, E., Nonlinearities from a non-autonomous chaotic circuit with a non-autonomous model of Chua's diode. Physica Scripta, 2006. 74(1): p. 22.
  • Hanias, M., Z. Avgerinos, and G. Tombras, Period doubling, Feigenbaum constant and time series prediction in an experimental chaotic RLD circuit. Chaos, Solitons & Fractals, 2009. 40(3): p. 1050-1059.
  • Andreatos, A.S. and C.K. Volos. Secure text encryption based on hardware chaotic noise generator. in 2nd International Conference on Cryptography and Its Applications in the Armed Forces. 2014.
  • Feki, M., An adaptive chaos synchronization scheme applied to secure communication. Chaos, Solitons & Fractals, 2003. 18(1): p. 141-148.
  • Cuomo, K.M., A.V. Oppenheim, and S.H. Strogatz, Synchronization of Lorenz-based chaotic circuits with applications to communications. IEEE Transactions on circuits and systems II: Analog and digital signal processing, 1993. 40(10): p. 626-633.
  • Mu, X. and L. Pei, Synchronization of the near-identical chaotic systems with the unknown parameters. Applied Mathematical Modelling, 2010. 34(7): p. 1788-1797.
  • Yang, T., A survey of chaotic secure communication systems. International Journal of Computational Cognition, 2004. 2(2): p. 81-130.
  • Hu, J. and F. Han, A pixel-based scrambling scheme for digital medical images protection. Journal of Network and Computer Applications, 2009. 32(4): p. 788-794.
  • Pisarchik, A. and M. Zanin, Image encryption with chaotically coupled chaotic maps. Physica D: Nonlinear Phenomena, 2008. 237(20): p. 2638-2648.
  • Xiangdong, L., et al., Image scrambling algorithm based on chaos theory and sorting transformation. IJCSNS International Journal of Computer Science and Network Security, 2008. 8(1): p. 64-68.
  • Tong, X. and M. Cui, Image encryption scheme based on 3D baker with dynamical compound chaotic sequence cipher generator. Signal processing, 2009. 89(4): p. 480-491.
  • Fridrich, J., Symmetric ciphers based on two-dimensional chaotic maps. International Journal of Bifurcation and chaos, 1998. 8(06): p. 1259-1284.
  • Gao, H., et al., A new chaotic algorithm for image encryption. Chaos, Solitons & Fractals, 2006. 29(2): p. 393-399.
  • Rulkov, N.F., et al., Generalized synchronization of chaos in directionally coupled chaotic systems. Physical Review E, 1995. 51(2): p. 980.
  • Zhou, Q., et al., Parallel image encryption algorithm based on discretized chaotic map. Chaos, Solitons & Fractals, 2008. 38(4): p. 1081-1092.
  • Shelke, F.M., A.A. Dongre, and P.D. Soni, Comparison of different techniques for Steganography in images.
  • Celik, K. and E. Kurt. A new image encryption algorithm based on lorenz system. in Electronics, Computers and Artificial Intelligence (ECAI), 2016 8th International Conference on. 2016.
  • Kurt, E. and C. Bingol, A New Sweep Up/Down Phenomenon between the Chaotic and Regular Regions in a New R2L2D Circuit, page: 305-310. Politeknik Dergisi, 2016. 19(3).
  • Pecora, L.M. and T.L. Carroll, Synchronization in chaotic systems. Physical review letters, 1990. 64(8): p. 821.
  • Wu, C.W. and L.O. Chua, A simple way to synchronize chaotic systems with applications to secure communication systems. International Journal of Bifurcation and Chaos, 1993. 3(06): p. 1619-1627.
  • Yang, T. and L.O. Chua, Secure communication via chaotic parameter modulation. IEEE Transactions on Circuits and Systems I: Fundamental Theory and Applications, 1996. 43(9): p. 817-819.
  • Yau, H.-T. and J.-J. Yan, Chaos synchronization of different chaotic systems subjected to input nonlinearity. Applied Mathematics and Computation, 2008. 197(2): p. 775-788.
  • Kurt, E. and C. Bingol, Exploration of Synchronization Secure Communication and Signal Recovery in New R2L2D Circuit, 58th Int. Sci. Conf. Riga Tech. Uni. Power and Elec. Eng. RTUCON2017, 12-13 Oct. 2017, Riga, Latvia.
  • Hendriks, P., Specifying communications dacs. IEEE spectrum, 1997. 34(7): p. 58-69.
Politeknik Dergisi-Cover
  • ISSN: 1302-0900
  • Yayın Aralığı: Yılda 4 Sayı
  • Başlangıç: 1998
  • Yayıncı: GAZİ ÜNİVERSİTESİ
Sayıdaki Diğer Makaleler

Preparation of Chitosan and Glycol Chitosan Coated Magnetic Nanoparticles Loaded with Carboplatin as Anticancer Drug

Ceren ATİLA DİNÇER, Ali Mert ERDEK, Ayşe KARAKEÇİLİ, Nuray YILDIZ

Dikdörtgen Parçalar ile İki Boyutlu Kesme ve Paketleme Problemi için Sezgisel Yöntemler Kullanılan Bir Hibrit Metodoloji

Hüseyin FIRAT, Nuh ALPASLAN, DAVUT HANBAY

Alternatif Gerilim Uygulanan Betonlarda S/Ç Oranının ve Hiperakışkanlaştırıcı Oranının Priz Bitiş Süresi ve Basınç Dayanımına Etkilerinin Araştırılması

İsmail HOCAOĞLU, Tayfun UYGUNOĞLU

Doluluk Oranlarının PLA ve PET Malzemelerin Mekanik Özellikleri Üzerine Etkileri

Hatice EVLEN, Merve Ayfer ÖZDEMİR, Aydın ÇALIŞKAN

Yenilenebilir Enerji Kullanımındaki Göreceli Etkinliklerin Veri Zarflama Analizi ile Değerlendirilmesi: Türkiye ve Yedi Avrupa Ülkesi Örneği

Zühre AYDIN YENİOĞLU, Vildan ATEŞ

Combustion Properties of Impregnated and Heat-Treated Wood Material

Osman PERÇİN, Musa ATAR

Türkiye’de Konut Tipi Binaların Isıtma Yükü Altında Ömür Maliyet Analizi Yöntemi ile Optimum Yalıtım Kalınlıklarının Belirlenmesi

Nusret AYDIN, Atilla BIYIKOĞLU

Correction: A Fuzzy MCDM Approach to Determine the Most Influential Logistic Factors

Mehmet Burak ŞENOL, Aylin ADEM, Metin DAĞDEVİREN

Sivas İli Şartlarında Yatay Toprak Kaynaklı Isı Pompasının Isıtma ve Soğutma İçin Performans Analizi

Ertan BUYRUK, Ferhat KILINÇ, Mustafa CANER

A Comparison of Copula Families on Dependence Structure of Extreme Order Statistics

Ferhan BAŞ KAMAN, Hülya OLMUŞ