CFP last date
20 May 2024
Reseach Article

FPGA based Secure Biomedical Image Transmission

by Jinu Elizabeth John, Ajay Daniel Peter
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 69 - Number 6
Year of Publication: 2013
Authors: Jinu Elizabeth John, Ajay Daniel Peter
10.5120/11848-7597

Jinu Elizabeth John, Ajay Daniel Peter . FPGA based Secure Biomedical Image Transmission. International Journal of Computer Applications. 69, 6 ( May 2013), 39-43. DOI=10.5120/11848-7597

@article{ 10.5120/11848-7597,
author = { Jinu Elizabeth John, Ajay Daniel Peter },
title = { FPGA based Secure Biomedical Image Transmission },
journal = { International Journal of Computer Applications },
issue_date = { May 2013 },
volume = { 69 },
number = { 6 },
month = { May },
year = { 2013 },
issn = { 0975-8887 },
pages = { 39-43 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume69/number6/11848-7597/ },
doi = { 10.5120/11848-7597 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T21:29:31.886369+05:30
%A Jinu Elizabeth John
%A Ajay Daniel Peter
%T FPGA based Secure Biomedical Image Transmission
%J International Journal of Computer Applications
%@ 0975-8887
%V 69
%N 6
%P 39-43
%D 2013
%I Foundation of Computer Science (FCS), NY, USA
Abstract

This paper presents a reconfigurable, high performance hardware implementation of highly secure biomedical image transmission system which can be used for sending medical reports in military and high security environments. The algorithm for encryption is based on DES algorithm with a novel skew core key scheduling. The encrypted image is not intelligible to an intruder, but the recovered image has high level of clarity. This type of encryption can be used in applications where we need to discourage eavesdropping from co-channel users or RF scanners. The biomedical image encryption technique is implemented on Virtex 5 XC5VLX110T Field Programming Gate Arrays (FPGA) technology and NET FPGA. Final 16-stage pipelined design is achieved with encryption rate of 35. 5 Gbit/s and 2140 number of Configurable logic blocks (CLBs).

References
  1. Alani M. M "DES96-improved DES security" 7th International Multi-Conference on Systems Signals and Devices(SSD),2010
  2. First Int. Workshop on Cryptographic hardware and embedded systems, CHES '99, Worcester, MA, USA, August 1999 (Springer-Verlag, 1999), pp. 37–48
  3. Patterson, C. (Xilinx Inc. ): 'High performance DES encryption in virtex FPGAs using Jbits'. Proc. IEEE Symp. on Fieldprogrammable custom computing machines, FCCM '00, Napa Valley, CA, USA, April 2000 (IEEE Comput. Soc. , CA, USA, 2000), pp. 113–121
  4. Kaps, J. , Paar, C. : Fast DES implementations for FPGAs and its application to a Universal key-search machine. In: Proc. 5th Annual Workshop on selected areas in cryptography- Sac' 98, Ontario, Canada, Springer-Verlag,1998 (1998) 234–247.
  5. Core(2000), F. D. : (2000) URL: http://www. free-ip. com/DES/.
  6. McLoone, M. , McCanny, J. : High-performance FPGA implementation of DES using a novel method for implementing the key schedule. IEE Proc. : Circuits, Devices & Systems 150 (2003) 373–378.
  7. J Wilcox, D. , Pierson, L. , Robertson, P. , Witzke, E. L. , Gass, K. :A DES asic suitable for network encryption at 10 Gbs and beyond. In:CHESS 99, LNCS 1717 (1999) 37–48.
  8. Biham, E. : 'A fast new DES implementation in software'. Proc. 4th Int. Workshop on Fast software Encryption, FSE '97, Haifa, Israel, Jan. 1997 (Springer-Verlag, 1997), pp. 260– Van Der Lubbe, J. C. A. : 'Basic methods of cryptography' (Cambridge University Press, 1998)Proceedings of TENCO' 97,IEEE, December 1997
  9. Vishwanath Patel. C Joshi, A. K Saxena: FPGA implementation of DES using pipelining concept with skew core key scheduling, Journal of Theoritical and Applied Information Technology(2005-2009)
  10. Nascimento, J. C. ; Figueiredo, M. A. T. ; Marques, J. S. Image Processing,2013 IEEE Transactions on Activity Recognition Using a Mixture of Vector Fields
  11. Zhang Yun-Peng ; Liu Wei ; Cao Shui-ping ; Zhai Zheng-jun ; Nie Xuan ; Dai Wei-di Systems, Man and Cybernetics, 2009. SMC 2009. IEEE International Conference on Digital image encryption algorithm based on chaos and improved DES
  12. Bin, Ling ; Lichen, Liu ; Jan, Zhang Advanced Computer Control (ICACC), 2010 2nd International Conference on IEEE Conference Publications Image encryption algorithm based on chaotic map and S-DES
Index Terms

Computer Science
Information Sciences

Keywords

Steganography Image Encryption Eavesdropping