Papers by siva janakiraman
Lecture notes in electrical engineering, Sep 4, 2022
2019 International Conference on Computer Communication and Informatics (ICCCI)
Lightweight property has been an indispensable requisite for embedded devices that insists securi... more Lightweight property has been an indispensable requisite for embedded devices that insists security on its data. Less complex operations, minimal memory footprint and execution in fewer clock cycles are the prime features that guarantee the lightweight property of security algorithms. This paper presents the formation of exclusive Look-Up Tables (LUTs) that brings in the lightweight property to employ the steganography algorithm that embeds the encrypted secret bits based on an encoder circuit. The suggested LUT method has been realized on LPC 2148, an embedded device with ARM 7 core. The above said lightweight features are analyzed through code size and timing analysis; while the security analysis from visual and statistical tests ensure the algorithm’s security level. When compared against procedural technique, LUT method provides 25% to 30% improvement in execution speed with no additional demand in code space and compromise in security level.
Journal of Intelligent & Fuzzy Systems
Digitized forms of images do widely used for medical diagnostics. To maintain the privacy of an i... more Digitized forms of images do widely used for medical diagnostics. To maintain the privacy of an individual in e-health care applications, securing the medical image becomes essential. Hence exclusive encryption algorithms have been developed to protect the confidentiality of medical images. As an alternative to software implementations, the realization of image encryption architectures on hardware platforms such as FPGA offers significant benefit with its reconfigurable feature. This paper presents a lightweight image encryption scheme for medical image security feasible to realize as concurrent architectural blocks on reconfigurable hardware like FPGA to achieve higher throughput. In the proposed encryption scheme, Lorentz attractor’s chaotic keys perform the diffusion process. Simultaneously, the pseudo-random memory addresses obtained from a Linear Feedback Shift Register (LFSR) circuit accomplishes the confusion process. The proposed algorithm implemented on Intel Cyclone IV FPG...
2019 International Conference on Computer Communication and Informatics (ICCCI)
True Random Number Generators (TRNGs) became the basic building block of modern cryptography. Tho... more True Random Number Generators (TRNGs) became the basic building block of modern cryptography. Though most of the noise source of TRNGs is analog circuit, to provide compactness and high throughput, hardware based TRNG solutions are recommended. This work aims at the generation of true random bits through beat frequency detection influenced by identical length of ring oscillators on FPGA. The main idea of this work is to extract the true randomness from one jitter clock produced by a ring oscillator through another jitter clock generated by the second ring oscillator. To enhance the randomness, Von Neumann Corrector (VNC) post processing is utilized. Proposed TRNG is designed using VHDL and Quartus II 8.0 EDA tool. It consumes 523 combinational functions and 539 logic registers on Altera Cyclone II EP2C20F4S4C7 FPGA where it achieves the throughput of 26.640650 Mbps when 27 MHz is used as sampling clock. Statistical efficiency of the TRNG is evaluated using entropy, correlation and NIST SP 800 -22 analyses. True randomness of the TRNG is verified through restart experiment.
Medical Data Security for Bioengineers, 2019
The healthcare industry has been facing a lot of challenges in securing electronic health records... more The healthcare industry has been facing a lot of challenges in securing electronic health records (EHR). Medical images have found a noteworthy position for diagnosis leading to therapeutic requirements. Millions of medical images of various modalities are generally safeguarded through software-based encryption. DICOM format is a widely used medical image type. In this chapter, DICOM image encryption implemented on cyclone FPGA and ARM microcontroller platforms is discussed. The methodology includes logistic map, DNA coding, and LFSR towards a balanced confusion – diffusion processes for encrypting 8-bit depth 256 × 256 resolution of DICOM images. For FPGA realization of this algorithm, the concurrency feature has been utilized by simultaneous processing of 128 × 128 pixel blocks which yielded a throughput of 79.4375 Mbps. Noticeably, the ARM controller which replicated this approach through sequential embedded “C” code took 1248 bytes in flash code memory and Cyclone IV FPGA consum...
2018 4th International Conference on Devices, Circuits and Systems (ICDCS), 2018
Internet advancements and the arrival of new embedded gadgets have radically raised the informati... more Internet advancements and the arrival of new embedded gadgets have radically raised the information sharing in the form of images. In turn, the encryption algorithms have been widely used to secure images. Most of these image encryption algorithms have to run on resource-constrained devices that demand less computational complexity. In this regard, the algorithm proposed in this paper satisfies the need for a computationally less complex image encryption process with its simpler and efficient key generation procedure. The analysis of the implementation results in terms of statistical parameters in addition to its ability to withstand differential attacks validates the security level of the proposed Iightweight image encryption algorithm.
2017 International Conference on Computer Communication and Informatics (ICCCI), 2017
Image encryption plays a crucial role in modern day secure multimedia communication. Confusion an... more Image encryption plays a crucial role in modern day secure multimedia communication. Confusion and diffusion are the two important mechanisms to encrypt the images employed in most of the image encryption schemes. In this paper, a grayscale image encryption method has been proposed with the confluence of Linear Feedback Shift Register (LFSR), Cellular Automata (CA) and hardware generated synthetic image. CA manages scrambling as well as diffusion. LFSR generates diffused bits which are sampled with hardware created clock source on Cyclone II FPGA in order to generate synthetic image. Synthetic image obtained through this random sampling process on FPGA enhances the randomization of encrypted images which has been evaluated with parameters such as entropy, correlation, histogram, differential, encryption quality and error metric analyses. The encryption and decryption processes were implemented using LabVIEW 2013 platform.
2017 International Conference on Computer Communication and Informatics (ICCCI), 2017
Graphical systems have been in use in the embedded world for user authentication. Image based sys... more Graphical systems have been in use in the embedded world for user authentication. Image based systems use image, area or pattern selection process. This paper presents a novel method that employ image recognition at its first level and a modified PassPoint logic with randomization using LFSR at its next level to provide a well secured password authentication system. The proposed real-time authentication scheme for embedded system aims at reducing the password storage space against a similar implementation on embedded platform.
Advances in Intelligent Systems and Computing, 2020
True random number generator (TRNG) is a crucial part of any modern cryptographic primitives. Des... more True random number generator (TRNG) is a crucial part of any modern cryptographic primitives. Designing high entropy TRNG is still a challenging task to compete. Usually, TRNGs use physical mean as random source to generate random numbers which are unpredictable. TRNG has different application but not limited to symmetric key cryptography, random simulation, nonce, user authentication protocols, and gaming. In this work, ring oscillator (RO)-based pyramid entropy source is proposed for generating device-independent true random numbers. The de-synchronization technique has been utilized for extracting the randomness from entropy source wherein linear-feedback shift register (LFSR) is used as postprocessor to improve the statistical characteristics of proposed TRNG. The design of TRNG has been implemented on Altera Cyclone II EP2C20F484C6 FPGA which consumed 892 logic elements (5%), 67.75 mW power to generate 131,072 true random bits. It yields maximum entropy of 0.999987 through entropy analysis. Statistical properties of the proposed TRNG have been evaluated using NIST tests. Restart experiment is also conducted to evidence the true randomness of the proposed TRNG.
Applications and Techniques in Information Security, 2019
The analogous growth of threat and data communication among the connected devices invites special... more The analogous growth of threat and data communication among the connected devices invites specialised security algorithms for Internet of Things (IoT). The minimal computational capabilities and resource constraints of the processing devices used in IoT architecture do not afford the overhead incurred by the conventional encryption schemes. This paper proposes a lightweight image encryption algorithm that can be realised as an embedded software to run on microcontroller architectures suitable for IoT applications. The proposed algorithm uses the pseudo-random numbers produced by the Linear Feedback Shift Register (LFSR) to perform inherent confusion on the fly via random memory read. A synthetic image generated by extracting the random bits produced by the digitised Lorenz attractor has been used to diffuse the confused pixels on the fly. The proposed algorithm has been realised as embedded software to run on microcontrollers suitable for Internet of Things (IoT) applications. The proposed algorithm achieves better results than similar reliable encryption schemes in terms of security parameters such as entropy, correlation, histogram, PSNR, NPCR and UACI. Further, eliminating the storage of confusion and diffusion key beside the storage of encrypted image employing on the fly encryption process proposed in our algorithm reduces the demand on RAM for about 48 KB as compared to the conventional storage-based encryption schemes.
2018 International Conference on Computer Communication and Informatics (ICCCI), 2018
Medical image encryption plays a pivotal role in telemedicine and healthcare applications. Authen... more Medical image encryption plays a pivotal role in telemedicine and healthcare applications. Authentication of medical images require a must attention owing to the amount of medical data being communicated and number of digital records being created and maintained. In this work, a server - client model of authenticated medical image communication is proposed. Initially, the AES encrypted medical image is further secured by embedding a One Time Password (OTP) generated through Tent map. This OTP embedded image is shared to the intended user via intranet. Upon receiving the OTP through GSM, the authorized user verifies the similarity of received OTP in mobile and extracted one from the encrypted medical image. After integrity checking, the decryption is performed to retrieve the original medical record. The proposed work of medical image encryption has been developed using python 2.7 and validated by performing entropy, correlation, differential, error metric and NIST test analyses.
Data exchange in any form needs security irrespective of the mode and medium being used. Due to t... more Data exchange in any form needs security irrespective of the mode and medium being used. Due to the owing fact of high sensitivity, chaotic functions have been widely used in cryptography. Serial data communication using USART is being the cost-effective and efficient means for data transfer among the embedded devices. Secrecy of data shared between any two devices via USART in a multiprocessor network relies only on the honesty of other devices in rejecting the visible data that are not addressed to them. This chapter aims at providing a scheme to establish a secure private communication channel between two nodes in a wired network of embedded devices connected via their on-chip USART. A chaotic digital function implemented on AVR microcontroller produces a symmetric key, which encrypts the data and varies the baud rate of USART to act as a major synchronizing factor between the sending and receiving embedded devices. Optimal values of code size, execution time and throughput were ...
Proceedings of the International Conference on ISMAC in Computational Vision and Bio-Engineering 2018 (ISMAC-CVB), 2019
Medical image security attains a great appeal due to the challenges in transmitting them through ... more Medical image security attains a great appeal due to the challenges in transmitting them through an open network channel. Even a small change in medical information leads to a wrong diagnosis. Hence, methods to prevent the attacks and tampering on the medical images in the open channel have a great demand. This work proposes such an attractor-assisted medical image watermarking and double chaotic encryption which preserves the confidentiality, integrity and authenticity of the medical image. Patient diagnosis details are compressed using lossless compression approach and embedded in the pixels of patient’s DICOM image. Attractor-based selective watermarking is implemented using integer wavelet transform. Encryption will be carried out by employing chaotic maps using confusion and diffusion operations. The effectiveness of the work will be evaluated using standard analyses namely MSE, PSNR, SSIM, entropy, correlation, histogram and key space.
2020 International Conference on Computer Communication and Informatics (ICCCI), 2020
In recent years, image has become the most popular format for digital data sharing. Unlike the co... more In recent years, image has become the most popular format for digital data sharing. Unlike the common image formats such as JPEG, medical images uses special image formats like DICOM. The integrity among the medical image and a patient’s identity is undividable for any diagnostic purpose in medical application. This can be achieved by embedding the patient’s personal details as invisible watermark on their medical images. As one’s personal information needs to be kept confidential, performing encryption on watermark information can serve this purpose. Edges are considered as vital regions in medical images as it contains precise information required for diagnostic purpose and referred as region of interest. This paper suggests a method for the insertion of encrypted watermark on DICOM image via LSB embedding procedure to provide ownership identity and authentication. The proposed method preserves the edge information in the cover image by inserting the watermark only on non edge pixels of the cover image. Besides the encryption, additional security is given to watermark information via the randomness obtained from the PRNG in the selection pixel positions for watermark embedding. The proposed algorithm was implemented using Python. The analysis performed on the watermarked DICOM image through standard metrics such as MSE, PSNR and SSIM confirms the imperceptibility of the embedded watermark information.
2017 International Conference on Computer Communication and Informatics (ICCCI), 2017
In the modern days, the technology is evolved in all the aspects of our life. The demands on func... more In the modern days, the technology is evolved in all the aspects of our life. The demands on functional and non-functional characteristics such as low power, high performance, small size, light weight, and low cost for the electronic gadgets invites the solution called embedded systems. Experimenter boards from embedded device manufacturers facilitate the users in rapid prototype development. These boards houses many sophisticated on board peripherals supported by API library that helps the user in their software development phase. The paper is aimed to grab the interest among beginners of embedded design in implementing their creative applications on generic development or experimenter boards. This paper describes the development of an open maze game on MSP430F5529 experimenter board from TI equipped with ultra low power 16-bit microcontroller with RISC architecture. The game involves controlling the movements of the graphics displayed on the dot matrix LCD driven by the results of...
Rapid developments in network-based application demand a special attention to protect the confide... more Rapid developments in network-based application demand a special attention to protect the confidentiality of data. Cryptographic algorithms play a lead role in ensuring confidentiality assisted by key generation architecture. Keys have a fair role in modern cryptography, which can be generated through random number generators. To meet the real-time requirements, cryptographic primitives can be developed on reconfigurable hardware such as Field Programmable Gate Arrays (FPGAs). This work focuses on the development of Pseudo Random Number Generation (PRNG) architecture using Cellular Automata (CA) on Altera Cyclone II EP2C20F484C7 FPGA at an operating frequency of 50 MHz. Significantly, CA based random sequences were generated based on five rules namely R30, R90, R105, R150 and R165. The randomness of the proposed Pseudo Random Number Generator (PRNG) has been confirmed using entropy and NIST 800 – 22 tests. The proposed design has consumed only 461 logic elements which are 3% of tota...
Medical Data Security for Bioengineers, 2019
Images have been widely used in the medical field for various diagnostic purposes. In the field o... more Images have been widely used in the medical field for various diagnostic purposes. In the field of healthcare IoT, secure communication of a medical image concerned with an individual is a crucial task. Embedding patients' personal information as an invisible watermark in their medical images helps to authenticate the ownership identification process. Reliable communication of medical image can be thereby ensured concerning authentication and integrity. Images in DICOM format with a pixel resolution of 8-bit depth are used for medical diagnostics. This chapter deals about the development of a lightweight algorithm to insert patients' identities as an invisible watermark in random edge pixels of DICOM images. This chapter describes the implementation of the proposed lightweight watermarking algorithm on a RISC microcontroller suitable for healthcare IoT applications. Imperceptibility level of the watermarked medical image was analyzed besides its lightweight performance valid...
2018 International Conference on Computer Communication and Informatics (ICCCI), 2018
Looking at the demands of secure communication schemes, new platforms for information security ha... more Looking at the demands of secure communication schemes, new platforms for information security have a significant role in the data protection. In this paper, image encryption on reconfigurable hardware FPGA has been proposed with the confluence of the chaotic map and DNA schemes. Confusion and diffusion were performed with both Chaotic and DNA approaches. The image encryption architecture with 128 × 128 grayscale image which was implemented on Cyclone II FPGA EP2C35F672C6 consumed 23,877 (72%) logic elements, 131,072 (27%) internal M4KRAM memory units with a total thermal power dissipation of 273.55 mW for a test image. NPCR, UACI, Correlation, Uniform distribution and entropy analyses revealed the strength of the proposed scheme which requires a specific bitstream and hardware to retrieve and decrypt the hidden secret image on FPGA.
2018 International Conference on Computer Communication and Informatics (ICCCI), 2018
Security plays a vital role in the world of communication. In applications such as banking, makin... more Security plays a vital role in the world of communication. In applications such as banking, making access to any personal resource of an individual via wireless media requires the validation of authorized user at every moment. Static passwords have been in use which is vulnerable to attacks such as reply attack. One Time Password (OTP) is a particular kind of password that is valid only for only one login session or transaction. OTP provides a secure way for user authentication as it becomes invalid when used beyond the prescribed time frame. High level of randomness is the significant property required for OTPs. True randomness can be generated from real-world parameters that can produce unpredictable variations in its output. This paper presents an embedded hardware OTP generation system based on remote request via DTMF signals. The proposed hardware uses a confluence of real-world parameters and software-based chaotic function on an embedded platform for OTP generation. The proposed system also facilitates change in the generation of OTPs via discretionary external inputs from users.
2021 12th International Conference on Computing Communication and Networking Technologies (ICCCNT), 2021
Microprocessors are regarded as the “heart” of an operating system. Arithmetic and Logical Unit (... more Microprocessors are regarded as the “heart” of an operating system. Arithmetic and Logical Unit (ALU) plays a crucial role in microprocessors, taking care of all critical tasks. Thus, considering the varied applications of the microprocessor, the security of the data and the operations performed by the microprocessor is critical. Field Programmable Gate Array (FPGA) stands in its outstanding capability due to its field re-programmability unlike the semi-custom and full-custom designs. It has also has the capabilities of parallel processing, and its ability to process data high speeds due to its high clocking frequencies. Thus, FPGA can be a fruitful prototyping agent for Microprocessors. In this work, a lightweight pipelined computational unit (ALU), an important part of the microprocessor, has been realised on Intel Cyclone V FPGA using Verilog HDL. The lightweight computational unit also includes an optional lightweight S-Box that can provide adequate non-linearity and security to the data. Also, a custom testbench has been designed for functional verification. The optimised design occupies 515 logic elements and dissipates 199.75 mW of power when including the memory. Further, it takes four clocks as an accumulation period to initialise the pipeline and produces the computational results for every subsequent instruction at the same clock instant.
Uploads
Papers by siva janakiraman