Loading

Chaotic Based Lightweight Image Encryption Algorithm for Real-time Application Systems
Aguru Aswani Devi1, Attada Venkata Ramana2

1Aguru Aswani Devi, M.Tech Student, Department of CSE, GMR Institute of Technology, Rajam (Andhra Pradesh), India.
2Attada Venkata Ramana, Professor, Department of CSE, GMR Institute of Technology, Rajam (Andhra Pradesh), India.
Manuscript received on 05 May 2019 | Revised Manuscript received on 17 May 2019 | Manuscript Published on 23 May 2019 | PP: 590-595 | Volume-7 Issue-6S5 April 2019 | Retrieval Number: F11030476S519/2019©BEIESP
Open Access | Editorial and Publishing Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: Several real-time applications in military, banking and biometric systems involves images which should be stored and transferred with security. Due to the sensitiveness on initial conditions, randomness and less complexity, chaotic maps are useful and effective for image encryption. The current work involves chaotic based lightweight image encryption algorithm along with lightweight properties is presented, which can be used in real time applications. The proposed cryptosystem can be implemented on Raspberry Pi or on any micro-controller to ensure its real time usability. Several lightweight algorithms with 1D chaotic map were implemented on microcontrollers. The proposed cryptosystem uses 2D chaotic map along with lightweight operations to achieve high randomness in the key stream. The original image, Shuffled image, Encrypted image, Decrypted image and Reverse shuffled image are generated in sequential order to depict the result of crypto system. This work also includes the experimental result analysis to ensure the security levels of the proposed encryption algorithm.
Keywords: Chaos, Image Encryption, Lightweight, Microcontroller, Raspberry Pi.
Scope of the Article: Image Security