VLSI Implementation of Image Encryption Using DNA Cryptography

被引:10
|
作者
Vinotha, P. [1 ]
Jose, Deepa [1 ]
机构
[1] KCG Coll Technol, Elect & Commun Engn, Chennai 600097, Tamil Nadu, India
关键词
MATLAB; Verilog; DNA cryptography; Polymerase chain reaction encoding technique;
D O I
10.1007/978-3-030-28364-3_17
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Image security is emerging as a major problem with the exponential growth of data stored and transformed through the network around the world. Many cryptographic techniques are used for securing the data like images, audio and text files. Anew technique ofDNAcryptography provides high security based on DNA nucleotides bases A-Adenine, C-Cytosine, G-Guanine and T-Thymine. These alphabets can be easily assigned to binary values (A-00,C-01,G-10,T-11). In this proposed model Polymerase Chain Reaction encoding technique is used in which the image to be encoded is flanked between primer keys. The DNA codons are encoded by the base of four provides keys of 256 combinations for high security, and it reduces the size of cipher text. Primer keys are generated by pseudo random sequence generator. Deciphering the image is possible with encryption key and primer sequence key. The HDL synthesis report for hardware design is implemented for encryption using verilog code on a device Virtex VII.
引用
收藏
页码:190 / 198
页数:9
相关论文
共 50 条
  • [31] Lightweight Substitution box using Elliptic Curve Cryptography for Image Encryption Applications
    Khan, Naqash Azeem
    Awang, Azlan
    IEEE CONFERENCE ON GLOBAL COMMUNICATIONS, GLOBECOM, 2023, : 2584 - 2589
  • [32] Cryptography. Data Encryption Standard (DES) implementation
    Ciner, E
    Liberatori, MC
    Lopardo, L
    LATIN AMERICAN APPLIED RESEARCH, 2000, 30 (02) : 179 - 184
  • [33] Visual Cryptography Secret Share Creation Techniques with Multiple Image Encryption and Decryption Using Elliptic Curve Cryptography
    Karolin, M.
    Meyyappan, T.
    IETE JOURNAL OF RESEARCH, 2024, 70 (02) : 1638 - 1645
  • [34] IMPLEMENTATION OF DNA CRYPTOGRAPHY IN CLOUD COMPUTING AND USING SOCKET PROGRAMMING
    Ashishkumar, Prajapati
    Barkha, Prajapati
    2016 INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATION AND INFORMATICS (ICCCI), 2016,
  • [35] Novel Approach Design of Elliptic curve Cryptography Implementation in VLSI
    Chandrasekaran, V.
    Nagarajan, N.
    RECENT ADVANCES IN NETWORKING, VLSI AND SIGNAL PROCESSING, 2010, : 99 - +
  • [36] VLSI implementation of reversible logic gates cryptography with LFSR key
    Karunamurthi, Saranya
    Natarajan, Vijeyakumar Krishnasamy
    MICROPROCESSORS AND MICROSYSTEMS, 2019, 69 : 68 - 78
  • [37] DIGITAL WATERMARKING FOR IMAGE USING FELICS ALGORITHM IN VLSI IMPLEMENTATION
    Priyadharshini, J.
    Sabeenian, R. S.
    2014 INTERNATIONAL CONFERENCE ON ELECTRONICS AND COMMUNICATION SYSTEMS (ICECS), 2014,
  • [38] VLSI IMPLEMENTATION OF PUBLIC-KEY ENCRYPTION ALGORITHMS
    ORTON, GA
    ROY, MP
    SCOTT, PA
    PEPPARD, LE
    TAVARES, SE
    LECTURE NOTES IN COMPUTER SCIENCE, 1987, 263 : 277 - 301
  • [39] VLSI architecture and FPGA implementation of ice encryption algorithm
    Fournaris, AP
    Sklavos, N
    Koufopavlou, O
    ICECS 2003: PROCEEDINGS OF THE 2003 10TH IEEE INTERNATIONAL CONFERENCE ON ELECTRONICS, CIRCUITS AND SYSTEMS, VOLS 1-3, 2003, : 88 - 91
  • [40] Image encryption based on nonlinear encryption system and public-key cryptography
    Zhao, Tieyu
    Ran, Qiwen
    Chi, Yingying
    OPTICS COMMUNICATIONS, 2015, 338 : 64 - 72