[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.1145/2381716.2381860acmotherconferencesArticle/Chapter ViewAbstractPublication PagescubeConference Proceedingsconference-collections
research-article

Chaotic image encryption on GPU

Published: 03 September 2012 Publication History

Abstract

Several Chaotic Image Encryption algorithms have been proposed recently due to increase in the need of secure image/multimedia transmissions over public network. Even though chaotic image encryption algorithms perform better compared to normal cryptographic encryption techniques but still most of the algorithms require considerable amount of time which would increase the overall processing time. In this research we concentrated to achieve speed-up of chaotic encryption algorithm. We have shown a CUDA-based implementation of chaotic image encryption algorithm using logistic map with NVIDIA's Tesla C2050 GPU device. Compared to original implementation on CPU, CUDA based implementation works has shown significant amount of improvement in terms of operational speed up.

References

[1]
N. Pareek, V. Patidar, and K. Sud. Image encryption using chaotic logistic map. Image and Vision Computing, 24(9):926--934, 2006.
[2]
C.-C. Chang, M.-S. Hwang, and T.-S. Chen. A new encryption algorithm for image cryptosystems. Journal of Systems and Software, 58(2):83--91, 2001.
[3]
L. Bin, L. Lichen, and Z. Jan. Image encryption algorithm based on chaotic map and s-des. In Advanced Computer Control (ICACC), 2010 2nd International Conference on, volume 5, pages 41--44, march 2010.
[4]
H. Gao, Y. Zhang, S. Liang, and D. Li. A new chaotic algorithm for image encryption. Chaos, Solitons & Fractals, 29(2):393--399, 2006.
[5]
X. Zhang and W. Chen. A new chaotic algorithm for image encryption. In Audio, Language and Image Processing, 2008. ICALIP 2008. International Conference on, pages 889--892, july 2008.
[6]
W. Wang, X. Wang, and D. Song. A parallel chaotic cryptosystem for dual-core processor. In Information Science and Engineering (ICISE), 2010 2nd International Conference on, pages 920--923, dec. 2010.
[7]
P. L. V. Vihari and M. Mishra. Image authentication algorithm on gpu. In International Conference on Communication Systems and Network Technologies, 2012, May. 2012.
[8]
NVIDIA CUDA Programming Guide. 4.0 ed. 2011.
[9]
http://www.geforce.com/#/hardware/gpus/geforce-gtx-590/overview. Geforce gtx 590 cores, 2011.
[10]
C. Lin, L. Zhao, and J. Yang. A cuda based implementation of an image authentication algorithm. In Information Engineering and Computer Science (ICIECS), 2010 2nd International Conference on, pages 1--5, dec. 2010.
[11]
K. Al-Utaibi and E.-S. El-Alfy. A bio-inspired image encryption algorithm based on chaotic maps. In Evolutionary Computation (CEC), 2010 IEEE Congress on, pages 1--6, july 2010.

Cited By

View all
  • (2021)GPU-Accelerated implementation of a genetically optimized image encryption algorithmSoft Computing10.1007/s00500-021-06225-yOnline publication date: 30-Sep-2021
  • (2020)A novel parallel image encryption algorithm based on hybrid chaotic maps with OpenCL implementationSoft Computing10.1007/s00500-020-04683-4Online publication date: 14-Jan-2020
  • (2018)SPRING: a novel parallel chaos-based image encryption schemeNonlinear Dynamics10.1007/s11071-018-4076-692:2(575-593)Online publication date: 20-Jan-2018

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Other conferences
CUBE '12: Proceedings of the CUBE International Information Technology Conference
September 2012
879 pages
ISBN:9781450311854
DOI:10.1145/2381716
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

  • CUOT: Curtin University of Technology

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 03 September 2012

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. CUDA
  2. GPU
  3. chaotic
  4. encryption

Qualifiers

  • Research-article

Conference

CUBE '12
Sponsor:
  • CUOT

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)1
  • Downloads (Last 6 weeks)1
Reflects downloads up to 04 Jan 2025

Other Metrics

Citations

Cited By

View all
  • (2021)GPU-Accelerated implementation of a genetically optimized image encryption algorithmSoft Computing10.1007/s00500-021-06225-yOnline publication date: 30-Sep-2021
  • (2020)A novel parallel image encryption algorithm based on hybrid chaotic maps with OpenCL implementationSoft Computing10.1007/s00500-020-04683-4Online publication date: 14-Jan-2020
  • (2018)SPRING: a novel parallel chaos-based image encryption schemeNonlinear Dynamics10.1007/s11071-018-4076-692:2(575-593)Online publication date: 20-Jan-2018

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media