Hardware Implementation of Chaotic System for Security of JPEG2000 


Vol. 30,  No. 12, pp. 1193-1200, Dec.  2005


PDF
  Abstract

In this paper, we proposed an image hiding method which decreases the amount of calculation encrypting partial data rather than the whole image data using a discrete wavelet transform and a linear scalar quantization which have been adopted as the main technique in JPEG2000 standard and then implemented the proposed algorithm to hardware. A chaotic system was used instead of encryption algorithms to reduce further amount of calculation. It uses a method of random changing method using the chaotic system of the data in a selected subband. For ciphering the quantization index it uses a novel image encryption algorithm of cyclical shifting to the right or left direction and encrypts two quantization assignment method(Top-down coding and Reflection coding), made change of data less. The experiments have been performed with the proposed methods implemented in software for about 500 images. The hardware encryption system was synthesized to find the gate-level circuit with the Samsung 0.35㎛Phantom-cell library and timing simulation was performed, which resulted in the stable operation in the frequency above 100MHz.

  Statistics
Cumulative Counts from November, 2022
Multiple requests among the same browser session are counted as one view. If you mouse over a chart, the values of data points will be shown.


  Cite this article

[IEEE Style]

Y. Seo, "Hardware Implementation of Chaotic System for Security of JPEG2000," The Journal of Korean Institute of Communications and Information Sciences, vol. 30, no. 12, pp. 1193-1200, 2005. DOI: .

[ACM Style]

Young-Ho Seo. 2005. Hardware Implementation of Chaotic System for Security of JPEG2000. The Journal of Korean Institute of Communications and Information Sciences, 30, 12, (2005), 1193-1200. DOI: .

[KICS Style]

Young-Ho Seo, "Hardware Implementation of Chaotic System for Security of JPEG2000," The Journal of Korean Institute of Communications and Information Sciences, vol. 30, no. 12, pp. 1193-1200, 12. 2005.