Sie sind auf Seite 1von 6

Paper Title (use style: paper title)

Subtitle as needed

Authors Name/s per 1st Affiliation (Author)


line 1 (of Affiliation): dept. name of organization line 2: name of organization, acronyms acceptable line 3: City, Country line 4: e-mail: name@xyz.com

Authors Name/s per 2nd Affiliation (Author)


line 1 (of Affiliation): dept. name of organization line 2: name of organization, acronyms acceptable line 3: City, Country line 4: e-mail: name@xyz.com

Abstract we developed a new technique to simultaneously compress & encrypt multiple images using a DCT and Chaotic keyThe proposed method exploits the DCT properties to achieve the compression and the encryption simultaneously. First, to realize the compression, 8-point DCT applied to several images are done. To this end, the spectral plane should be divided into several areas and each of them corresponds to the spectrum of one image. On the other hand, Encryption is achieved using the multiplexing, a specific rotation functions, encryption keys. Finally, many simulations have been conducted. Obtained results corroborate the good performance of our approach. We should also mention that the recording of the multiplexed and encrypted spectra is optimized using an adapted quantification technique to improve the overall compression rate.
Keywords-component; formatting; style; styling; insert (key words)

I.

INTRODUCTION (HEADING 1)

Images form the significant part of data, particularly in remote sensing, biomedical and video conferencing applications [1]. The use of and dependence on information and computers continue to grow, so too does our need for efficient ways of storing and transmitting large amounts of data. For example, someone with a web page or online catalog that uses dozens or perhaps hundreds of images will certainly need to use some form of image compression to store those images. This is because the amount of space required to hold unadulterated images can be prohibitively large in terms of cost. Fortunately, there are several methods of image compression available today [2]. However, the digital pictures require far more computer memory and transmission time than that needed for plain text. For real time applications, in order to handle huge amount of data, the image compression schemes are needed.need to create these components, incorporating the

of redundant data, but the reduction is in such a way that redundancy can be subsequently restored into the data. Nonreversible compression results in the reduction of information itself in which the lost information can never be recovered. The non-reversible scheme provides more compression than its reversible counterpart [3]. The security of digital images is another important issue that has been receiving considerable attention in the recent past. Recently, owing to advances in communication technology, there has been strong interest in digital signal transmission, for instance, in the ISDN networks, the HDTV systems, and the distributed multimedia systems. Because there has been fully developed in communication transmission and receiving equipment, illegal data access has become more easy and prevalent in wireless and general communication networks. Hence, data security has become a critical and imperative issue. In order to protect valuable data from undesirable readers, many encryption techniques [I]-[6] have been proposed. This paper is organized as follows: the description of the proposed simultaneous compression and encryption method is presented in section II. Section III is dedicated to the optimization of the DCT architecture. Implementation results using FPGA are illustrated in the last section before conclusion. I. ALGORITHMIC SPECIFICATIONS We proposed a new technique, based on our methods presented in [3] and [6], which can carry out compression and simultaneous encryption using Discrete Cosine Transform (DCT) and Chaotic key kased algorithm
According to a binary sequence generated from a chaotic system, the gray level of each pixel is XORed or XNORed bit-by-bit to one of the two predetermined keys. The desirable result of the encrypted image being completely disordered can be obtained. Moreover, its VLSI architectureis designed and the architecture of integrating thecompression and encryption scheme is also proposed. Finally, simulation results are given.

applicable criteria that follow. Image compression is a process intended to yield a compact representation of an image, thereby reducing the image storage / transmission requirements. Generally, data compression is of two types: reversible compression (lossless) and non-reversible (lossy) compression. Reversible compression results in a reduction

A. Compression by Discrete Cosine Transform (DCT) The choice of the DCT is justified by the use of the DCT in many standards such as JPEG [7], MPEG [8] and ITU-T H261 [9]. Moreover, we need fewer DCT coefficients than DFT coefficients to get a good approximation to a typical signal [10]. In fact, by applying the DCT, the most of the

signal information tends to be concentrated in a few lowfrequency components. Consequently, the higher frequency coefficients are small in magnitude and can be ignored in the compression process.The DCT works by separating images into parts of differing frequencies.During a step called quantization,where compression actually occurs,less important frequencies are discarded,hence the use of the term lossy.Then,only the most important frequencies that remain are used to retrieve the image in the decompression process using IDCT. 1) Encoding System There are four steps in DCT technique to encode or compress the image Step1. The image is broken into N*N blocks of pixels. Here N may be 4, 8, 16,etc. Step2. Working from left to right, top to bottom, the DCT is applied to each block. Step3. Each blocks elements are compressed through quantization means dividing by some specific value. Step4. The array of compressed blocks that constitute the image is stored in a drastically reduced amount of space. So first the whole image is divided into small N*N blocks then DCT is applied on these blocks. After that for reducing the storage space DCT coefficients [5] are quantized through dividing by some value or by quantization matrix. So that large value is become small and it need small size of space. This step is lossy step. So selection of quantization value or quantization matrix[10] is affect the entropy and compression ratio. If we take small value for quantization then we get the better quality or less MSE(Mean Square Error) but less compression ratio. Block size value also affects quality and compression ratio. Simply the higher the block size higher the compression ratio but with loss of more information and quality. 2) Decoding System Decoding system is the exact reverse process of encoding. There are four steps for getting the originalimage not exact but identical to original from compressed image. Step1. Load compressed image from disk Step2. Image is broken into N*N blocks of pixels. Step3. Each block is de-quantized by applying reverse process of quantization. Step4. Now apply inverse DCT on each block. And combine these blocks into an image which is identical to the original image. In this decoding process, we have to keep Ns value same as it used in encoding process. Then we do de-quantization process by multiplying with quantization value or quantization matrix. As earlier said that this is lossy technique so output image is not exact copy of original image but it is same as original image. So this process efficiency is measure by compression ratio. Compression ratio[3] is defined by ratio of storage bits of original image and storage bits of compressed image.

cr= Where n1 is number of bits to store original image and n2 is number of bits to store compressed image. B. Encryption/Decryption Algorithm
Let f denote an image of size MxN pixels and fix, y), 0 x M-1, 0 yS N-1, be the gray level of f at position (x, y). The proposed encryption scheme is as follows.

1) The Chaotic Key-Based Algorithm (CKBA) Step 1 : Determine the two keys, keyl and key2, and the two parameters, M and N, and set l= 0. Step 2: Determine a 1-D chaotic system and its initial point x(0).Generate the chaotic sequence x(O), x( l ) , x(2),. . . ,
x(MNI8-1) from the chaotic system and then create b(O), b(l), b(2) ,..., b(2MN-1) fromx(O), x(l), x(2) ,..., x(MN?8-1) by the generating scheme that O.b( 16n+O)b( 16n+l) b(16n+I 3)b(16n+14)b( 16n+l5) is the binary representation of x(n) for n = 0, 1, 2 ,...., (MN/8-1)

Step 3: For x = 0 to M- 1 For y = 0 to N - 1 Switch ( 2xb(l) + b(l+l) ) case 3: f(x , y) =f(x, y ) XOR keyl case 2: f(x,y)=f(x,y)XNORkeyl case 1 : f(x,y)=flx,y)XORkey2 case 0: f ( x , y) =f(x, y) XNOR key2 l=1+2; End End Step 4: The resultf is obtained and stop the algorithm. II. PROPOSED VLSI ARCHITECTURE

The DCT is the heart of the proposed compression and method. Therefore, an optimization of the whole proposed method requires a DCT optimization. In this section, we present the modified DCT architecture in order to allow an acceptable compression ratio and a relatively high image quality.In literature, many fast DCT algorithms are reported. In [11], the authors show that the theoretical lower limit of 8-point DCT algorithm is 11 multiplications. Since the number of multiplications of Loefflers algorithm [5] reaches the theoretical limit, we use this algorithm as the reference to this work. In [12] one realization based on Loeffler algorithm is shown. A low power design is obtained with this algorithm. In [13] use the recursive DCT algorithm and their design requires less area than conventional algorithms. The authors of [13] use Distributed Arithmetic (DA) multipliers and show that N-point DCT can be obtained by computing N N/2-point inner products instead of computing N N-point inner products. In [14], a new DA architecture called NEDA is proposed, aimed at reducing the cost metrics of power and area while maintaining high speed and accuracy in digital signal processing (DSP) applications. Mathematical analysis proves that DA can implement inner product of vectors in the form of twos complement numbers using only

additions, followed by a small number of shifts at the final stage. Comparative studies show that NEDA outperforms widely used approaches such as multiply/accumulate (MAC) and DA in many aspects. In this paper, we will not optimize the arithmetic operators but we present a new algorithm which makes dependency between the compression ratio and the material complexity. For encryption standard,according to a chaotic binary sequence, the gray level of each pixel is XORed or XNORed bit-by-bit to one of the two predetermined keys. The block diagram of CKBA is shown in Fig. 1. From Fig. 1, pixels are XORed or XNORed bit-by-bit to keyl or key2 according to the two bits in the sequence. By the transformation on each pixel, the desirable result of the encrypted image being completely disorder can be obtained. Many combinations of keyl and key2 can result in very disorderly image. The basic criterion to select keyl and key2 is based on the idea of CKBA that the gray level of each pixel is XORed or XNORed bit-by-bit to keyl or key2.From section A, the overall computational complexity is dominated by
Step 3. The operation numbers for Switch- Case statement, multiplication with 2, addition, and XOR or XNOR operation are MxNx1, MxNx~M, XNXS, and MXNx1, respectively. It is obvious that the computational complexity is low. Besides, the security problem is analyzed. For example, consider the case of M = 256 and N = 256. The number of all the possibilities is . Since the chaotic binary sequence is unpredictable, it is very difficult to decrypt an encrypted image correctly even by making an exhaustive search. Hence, CKBA is one of guaranteed high security. In Fig. 1, the pixel-based operation is used to simplify the data access from the image frame buffers. Moreover, both the data encryption unit (DEU) and the data decryption unit (DDU) are using the same hardware architecture. We adopt the concept of parallel processing such that the data encryption and decryption of eight pixels can be performed at a time with the bit-serial, pixel-parallel (BSPP) style of implementation. This architecture consists of 16 shift registers, 8 parallel-to-serial (P/S) converters, 8 serial-toparallel (S/P) converters and 8 processing elements (PEs). By adopting the BSPP style of implementation, the critical path will be located in the DEU and DDU, since that generating one chaotic bit string value can be used to encrypt and decrypt eight data pixels. Therefore, we can both shorten the critical path and achieve the high hardware utilization efficiency of the proposed design by exploiting the BSPP style of implementation.Processing elements consists of two data multiplexers, one XOR gate, and one inverter gate. Chaoctic Binary Sequence Grenerator is composed of two multipliers, one subtractor, one DFF, and one data multiplexer. The computation time (denoted as T,,,, ) to generate a chaotic bit string value is assumed to be the time for two multiplications and one data multiplexing. While, the cycle time for the computation in DEU or DDU (denoted as TDEu) is assumed to be the time for one P/S operation, one XNOR operation, two data multiplexing operations, and one S/P operation. Since that generating one chaotic bit string value can be used to encrypt and decrypteight data pixels, the critical path would be T,,, if T,,,, is smaller than 8 x TCIEU. However, if T,,,, is larger than 8 x TDEU, we can adopt suitable pipeline techniques to further reduce the time such that the critical path can be reduced. To summarize, the proposed hardware architecture is one of low

hardware cost, high computing speed, and high hardware utilization efficiency.

III.

VALIDATION

A. Methodology A fixed point Matlab Simulink model has been established to validate the proposed method. This step is very important to validate the the algorithm structure before the material implementation. Concerning the description language, we decide to use VHDL rather than DIME-C and Mitrion-C which produce less efficient hardware design. In fact, DIMEC and Mitrion-C are much easier to program than VHDL, but visibility to hardware details allowing optimizations is lost due to abstraction [16]. In addition, the VHDL standard language gives the choice of implementing target devices (FPGA family, CPLD, ASIC) at the end of the implementation flow. It means that the models reported here are synthesized and may be implemented on arbitrary technologies [17]. Simulation results of the VHDL model are reported in Fig. 5 and Fig. 6 and show that original images are rebuilt correctly with a PSNR average between four images about 28 dB. B. FPGA implementation The original DCT Loeffler architecture and the proposed done in this article have been implemented in the same kind of FPGA boards, that is, sparton 3. In order to illustrate the differences in hardware consumption, the FPGA implementation results are presented in Table 1. From this comparison we can notice that the proposed DCT architecture and CKBA reduces the area consumption (slices and Look Up Tables, LUTs) at a rate higher than 50 %. Furthermore, the throughput, expressed in Millions of Samples per second (MS/s), presents a light increase compared to the Loeffler architecture. The throughput of 206 MS/s allows the processing of more than 30 frames per second. Finally, it should be pointed out that the modified DCT and the proposed compression and encryption method

have the same throughput:the proposed method is for sure fully pipelined. IV. SIMULATION RESULTS

The picture used for simulation is shown in Fig. 2. It is the original Lena picture of size 260 260. Fig. 4 is the lossy decompressed Lena picture with block size 10. The compression ratio obtained is 16:1. Fig. 5 is the encrypted Lena using chaotic key. Fig. is the decompressed lena image.The software portion of this scheme was developed and tested using MATLAB for low and high dimensional images. Then it is implemented in FPGA using Xilinx. V. CONCLUSION

In this paper, the novel chaotic key-based algorithm for image encryptioddecryption has been proposed and its VLSI architecture has been designed. The novel algorithm possesses the following features: 1) low computational complexity, 2) high security, and 3) no distortion. An optimized DCT algorithm is proposed to reduce real time application requirements. The encryption mechanism will not destroy the original architecture..The presented VLSI Architecture possesses the following advantages: 1) high hardware utilization efficiency, 2) low hardware cost, and 3) high computing speed.

a) Selection (Heading 4): Highlight all author and affiliation lines. b) Change number of columns: Select Format > Columns >Presets > One Column. c) Deletion: Delete the author and affiliation lines for the second affiliation. d) For author/s of more than two affiliations: To change the default, adjust the template as follows. e) Selection: Highlight all author and affiliation lines. f) Change number of columns: Select Format > Columns > Presets > One Column. g) Highlight author and affiliation lines of affiliation 1 and copy this selection. h) Formatting: Insert one hard return immediately after the last character of the last affiliation line. Then paste the copy of affiliation 1. Repeat as necessary for each additional affiliation. i) Reassign number of columns: Place your cursor to the right of the last character of the last affiliation line of an even numbered affiliation (e.g., if there are five affiliations, place your cursor at end of fourth affiliation). Drag the cursor up to highlight all of the above author and affiliation lines. Go to Format > Columns and select 2 Columns. If you have an odd number of affiliations, the final affiliation will be centered on the page; all previous will be in two columns. B. Identify the Headings Headings, or heads, are organizational devices that guide the reader through your paper. There are two types: component heads and text heads. Component heads identify the different components of your paper and are not topically subordinate to each other. Examples include Acknowledgments and References and, for these, the correct style to use is Heading 5. Use figure caption for your Figure captions, and table head for your table title. Run-in heads, such as Abstract, will require you to apply a style (in this case, italic) in addition to the style provided by the drop down menu to differentiate the head from the text. Text heads organize the topics on a relational, hierarchical basis. For example, the paper title is the primary text head because all subsequent material relates and elaborates on this one topic. If there are two or more subtopics, the next level head (uppercase Roman numerals) should be used and, conversely, if there are not at least two sub-topics, then no subheads should be introduced. Styles named Heading 1, Heading 2, Heading 3, and Heading 4 are prescribed. C. Figures and Tables 1) Positioning Figures and Tables: Place figures and tables at the top and bottom of columns. Avoid placing them in the middle of columns. Large figures and tables may span across both columns. Figure captions should be below the figures; table heads should appear above the tables. Insert

After the text edit has been completed, the paper is ready for the template. Duplicate the template file by using the Save As command, and use the naming convention prescribed by your conference for the name of your paper. In this newly created file, highlight all of the contents and import your prepared text file. You are now ready to style your paper. A. Authors and Affiliations The template is designed so that author affiliations are not repeated each time for multiple authors of the same affiliation. Please keep your affiliations as succinct as possible (for example, do not differentiate among departments of the same organization). This template was designed for two affiliations. 1) For author/s of only one affiliation (Heading 3): To change the default, adjust the template as follows.

figures and tables after they are cited in the text. Use the abbreviation Fig. 1, even at the beginning of a sentence.
TABLE I. Table Head copy TABLE TYPE STYLES Table Column Head
Table column subhead Subhead Subhead

R.B.G. thanks. Put applicable sponsor acknowledgments here; DO NOT place them on the first page of your paper or as a footnote. REFERENCES List and number all bibliographical references in 9-point Times, single-spaced, at the end of your paper. When referenced in the text, enclose the citation number in square brackets, for example [1]. Where appropriate, include the name(s) of editors of referenced books. The template will number citations consecutively within brackets [1]. The sentence punctuation follows the bracket [2]. Refer simply to the reference number, as in [3]do not use Ref. [3] or reference [3] except at the beginning of a sentence: Reference [3] was the first . . . Number footnotes separately in superscripts. Place the actual footnote at the bottom of the column in which it was cited. Do not put footnotes in the reference list. Use letters for table footnotes. Unless there are six authors or more give all authors names; do not use et al.. Papers that have not been published, even if they have been submitted for publication, should be cited as unpublished [4]. Papers that have been accepted for publication should be cited as in press [5]. Capitalize only the first word in a paper title, except for proper nouns and element symbols. For papers published in translation journals, please give the English citation first, followed by the original foreignlanguage citation [6].
[1] G. Eason, B. Noble, and I. N. Sneddon, On certain integrals of Lipschitz-Hankel type involving products of Bessel functions, Phil. Trans. Roy. Soc. London, vol. A247, pp. 529551, April 1955. (references) [2] J. Clerk Maxwell, A Treatise on Electricity and Magnetism, 3rd ed., vol. 2. Oxford: Clarendon, 1892, pp.6873. [3] I. S. Jacobs and C. P. Bean, Fine particles, thin films and exchange anisotropy, in Magnetism, vol. III, G. T. Rado and H. Suhl, Eds. New York: Academic, 1963, pp. 271350. [4] K. Elissa, Title of paper if known, unpublished. [5] R. Nicole, Title of paper with only first word capitalized, J. Name Stand. Abbrev., in press. [6] Y. Yorozu, M. Hirano, K. Oka, and Y. Tagawa, Electron spectroscopy studies on magneto-optical media and plastic substrate interface, IEEE Transl. J. Magn. Japan, vol. 2, pp. 740741, August 1987 [Digests 9th Annual Conf. Magnetics Japan, p. 301, 1982]. [7] M. Young, The Technical Writers Handbook. Mill Valley, CA: University Science, 1989. [8] Electronic Publication: Digital Object Identifiers (DOIs): Article in a journal: [9] D. Kornack and P. Rakic, Cell Proliferation without Neurogenesis in Adult Primate Neocortex, Science, vol. 294, Dec. 2001, pp. 21272130, doi:10.1126/science.1065467. Article in a conference proceedings: [10] H. Goto, Y. Hasegawa, and M. Tanaka, Efficient Scheduling Focusing on the Duality of MPL Representatives, Proc. IEEE Symp. Computational Intelligence in Scheduling (SCIS 07), IEEE Press, Dec. 2007, pp. 57-64, doi:10.1109/SCIS.2007.357670.

More table copya


a. Sample of a Table footnote. (Table footnote)

We suggest that you use a text box to insert a graphic (ideally 300 dpi), with all fonts embedded) because, in an MSW document, this method is somewhat more stable than directly inserting a picture. To have non-visible rules on your frame, use the MSWord pull-down menu, select Format > Borders and Shading > Select None.

Figure 1. Example of a ONE-COLUMN figure caption.

Please see last page of this document for AN EXAMPLE of a 2-COLUMN Figure. Figure Labels: Use 8 point Times New Roman for Figure labels. Use words rather than symbols or abbreviations when writing Figure axis labels to avoid confusing the reader. As an example, write the quantity Magnetization, or Magnetization, M, not just M. If including units in the label, present them within parentheses. Do not label axes only with units. In the example, write Magnetization (A/m) or Magnetization {A[m(1)]}, not just A/m. Do not label axes with a ratio of quantities and units. For example, write Temperature (K), not Temperature/K. D. Footnotes Use footnotes sparingly (or not at all) and place them at the bottom of the column on the page on which they are referenced. Use Times 8-point type, single-spaced. To help your readers, avoid using footnotes altogether and include necessary peripheral observations in the text (within parentheses, if you prefer, as in this sentence). VI. COPYRIGHT FORMS AND REPRINT ORDERS You must submit the IEEE Electronic Copyright Form (ECF) per Step 7 of the CPS author kits web page. THIS FORM MUST BE SUBMITTED IN ORDER TO PUBLISH YOUR PAPER. Please see Step 9 for ordering reprints of your paper. Reprints may be ordered using the form provided as <reprint.doc> or <reprint.pdf>. ACKNOWLEDGMENT The preferred spelling of the word acknowledgment in America is without an e after the g. Avoid the stilted expression, One of us (R.B.G.) thanks . . . Instead, try

Figure 2. Example of a TWO-COLUMN figure caption: (a) this is the format for referencing parts of a figure.

Das könnte Ihnen auch gefallen