Design and FPGA implementation of a Rössler-driven 4D-HCR-AES framework for image encryption


Abstract

Real-time secure transmission of digital images encounters substantial computational obstacles owing to the constraints of software-based encryption and the escalating throughput requirements in embedded systems. This paper introduces an innovative hardware-accelerated image encryption system that integrates the Advanced Encryption Standard (AES) in Cipher Feedback (CFB) and Galois Counter Mode (GCM) with a hyperchaotic Rössler system to improve security performance. The present paper reports on a highly efficient, hardware-implemented encryption system, the 4D-HCR-AES Framework, of real-time images that uses the four-dimensional hyperchaotic Rössler system to produce strong cryptographic keys that are strictly checked through the use of a hash algorithm, namely the SHA-512. The system is implemented on a PYNQ-Z2 FPGA board and uses parallel processing to bring about a 20% improvement in throughput (40.96 Mb/s) and a 12% improvement in operating frequency (160 MHz) over current chaos-enhanced methods, and this system only consumes 1.736 W of power. Security analysis helps to prove its stability with the level of entropy close to 8.0 and the correlation coefficients close to zero, as well as NPCR values mostly of 99.7%, which is why it is a perfect and resource-efficient solution to the need of secure image transmission in time-sensitive scenarios within the areas of healthcare, military surveillance, and IoT systems.
Ask to review this manuscript

Notes for potential reviewers

  • Volunteering is not a guarantee that you will be asked to review. There are many reasons: reviewers must be qualified, there should be no conflicts of interest, a minimum of two reviewers have already accepted an invitation, etc.
  • This is NOT OPEN peer review. The review is single-blind, and all recommendations are sent privately to the Academic Editor handling the manuscript. All reviews are published and reviewers can choose to sign their reviews.
  • What happens after volunteering? It may be a few days before you receive an invitation to review with further instructions. You will need to accept the invitation to then become an official referee for the manuscript. If you do not receive an invitation it is for one of many possible reasons as noted above.

  • PeerJ Computer Science does not judge submissions based on subjective measures such as novelty, impact or degree of advance. Effectively, reviewers are asked to comment on whether or not the submission is scientifically and technically sound and therefore deserves to join the scientific literature. Our Peer Review criteria can be found on the "Editorial Criteria" page - reviewers are specifically asked to comment on 3 broad areas: "Basic Reporting", "Experimental Design" and "Validity of the Findings".
  • Reviewers are expected to comment in a timely, professional, and constructive manner.
  • Until the article is published, reviewers must regard all information relating to the submission as strictly confidential.
  • When submitting a review, reviewers are given the option to "sign" their review (i.e. to associate their name with their comments). Otherwise, all review comments remain anonymous.
  • All reviews of published articles are published. This includes manuscript files, peer review comments, author rebuttals and revised materials.
  • Each time a decision is made by the Academic Editor, each reviewer will receive a copy of the Decision Letter (which will include the comments of all reviewers).

If you have any questions about submitting your review, please email us at [email protected].