SlideShare a Scribd company logo
1 of 4
Download to read offline
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 03 Issue: 05 | May-2014, Available @ http://www.ijret.org 284
AN AREA AND POWER EFFICIENT ON CHIP COMMUNICATION
ARCHITECTURES FOR IMAGE ENCRYPTION AND DECRYPTION
Y.Amar Babu1
, G.M.V.Prasad2
1
Dept. of ECE, L.B.R. College of Engineering, Mylavaram, India
2
Principal, B.V.C. Institute of Technology and Science, Batlapalem, India
Abstract
The design of new electronic systems is getting more complex as more functionality is integrated into these systems. To design
complex system, a predictable design flow is needed. A soft processor based System-on-Chip (SoC) is often mentioned as the
hardware platform to be used in modern electronics systems for fast prototyping on FPGA. In this paper, a novel area and power
efficient on chip communication architectures has been proposed for image encryption and decryption using single soft
processor(Micro Blaze). Proposed System On Chip explores On chip Communication architectures features to efficiently implement
the application. The SoC offers scalability and guarantees on the timing behavior when communicating data between various
processing and storage elements. Proposed SoC has been implemented on Spartan6 FPGA and evaluated at 83.33MHz. It has
occupied only 19% of resources available on target FPGA , consumes very low power. The proposed on chip communication
architectures compared with device utilization on FPGA and power consumed.
Keywords: SoC, FPGA, Encryption and Decryption, Micro Blaze
-----------------------------------------------------------------------***-------------------------------------------------------------------
1. INTRODUCTION
SoC architectures are used to provide the required
computational power for novel embedded systems. The ITRS
predicts that while manufacturing complex SoC will be
feasible, the production cost will grow rapidly as the costs of
masks is raising drastically. The growing complexity of
embedded systems leads to a large in their development effort.
At the same time, the market dynamics for these systems push
for shorter and shorter development times. The NRE cost
associated with the design and tools of complex chips is
growing rapidly. To address these issues, a platform based
design methodology is proposed. The main objective of this
design methodology is to increase the re-use of soft cores and
IPs. The SoC consists of both hardware, and the software
controlling the soft processor or DSP cores, peripherals and
interfaces. The design flow for a SoC aims to develop this
hardware and software in parallel.
Most SoCs are developed from pre-designed hardware blocks
for the hardware, together with the software drivers that
control their operation. The hardware blocks are put together
using EDA tools. The software modules are integrated using a
Software development environment. In this paper, a novel soft
processor based SoC architecture is proposed for Image
encryption and decryption, which is based on shared processor
local bus (PLB) and developed using Xilinx Platform Studio
(XPS)[1][2].
Proposed SoC has three layers, hardware layer which is based
on soft processor (Micro Blaze), Standalone OS layer which
has low level drivers for different controllers and interfaces
and application layer which is developed using above two
layers as shown in Figure1[3].
2. MICRO BLAZE SOFT PROCESSOR
The micro blaze embedded processor soft core is a reduced
instruction set computer (RISC) optimized for implementation
in Xilinx Field Programmable Gate Arrays (FPGAs).
Compared to other general purpose processors, micro blaze is
quite flexible with a few configurable parts and capable of
being extended by customized co-processors. There are a
number of on-chip communication strategies available
including a variety of memory interfaces. The operating
frequency of micro blaze on spartan-6 SP605 kit is 83.33Mhz.
Hence we use micro blaze soft-core processor in order to
develop hardware platform for JPEG compression application.
Micro blaze processor has an instruction decoding unit, 32x32
bit general purpose register file, arithmetic unit and special
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 03 Issue: 05 | May-2014, Available @ http://www.ijret.org 285
purpose registers. In addition, it has an instruction pre fetch
buffer. The arithmetic unit is configurable, as shown in core
block diagram. The Barrel Shift, Multiplier, Divider and FPU
are optional features. Micro blaze processor has a three- stage
pipeline: fetch, decode and execute. For most of instructions,
each stage takes one clock cycle. There is no branch prediction
logic. Branch with delay slot is supported to reduce the branch
penalty. Micro blaze is a Harvard architecture processor, with
both 32-bit I-bus and D-bus. Cache is also an optional feature.
Three types of buses, FSL, LMB and OPB are available. FSL
bus is a fast co-processor interface. LMB is one-clock-cycle,
on-chip memory bus while OPB is a general bus with
arbitration.
MicroBlaze has an orthogonal instruction set architecture. It
has thirty-two 32-bit general purpose registers and up to
eighteen 32-bit special purpose registers, depending on
configured options.
3. PROPOSED SoC ARCHITECTURES
We proposed two On Chip Communication architectures. First
one is based on IBM Coreconnect Bus Processor Local
Bus(PLB) and second on chip communication is AMBA AXI
interconnect[3] System on chip for Image encryption and
decryption has three layers as shown in figure 1. The three
layers are hardware platform followed by operating system
(OS) and the required application that is to be carried out. In
this third layer is Image encryption and decryption. First layer
is hardware platform. It is generated using micro blaze. Micro
blaze is flexible and can be configurable customized soft core
processor. Second layer is operating system. Standalone OS is
used for controlling hardware platform. The application is
developed using the two layer. Hardware platform for the
image encryption and decryption requires components like,
Block RAM, Instruction Local Memory Bus controller ,
Data Local Memory Bus controller, Micro blaze Debug
Module, UART, System_ACE controller for Compact
flash, Multiport Memory controller for DDR3 SDRAM,
PLB-Bus. All these hardware components are configured
for Image encryption and decryption. Its architecture is as
shown in the figure 2a. And second On chip
communication architecture is based on AMBA AXI
Interconnect for Image encryption and decryption as shown
in Figure 2b[4][5].
4. IMAGE ENCRYPTION AND DECRYPTION
The Image encryption and decryption is developed on
proposed SoC using AES algorithm. Embedded C is used to
develop the AES algorithm and to access images from
Compact flash. AES comes in three favors, namely AES -
128, AES - 192, and AES-256, with the number in each case
representing the size (in bits) of the key used. All the modes
are done in 10, 12 or 14 round depends on the size of the block
and the key length chosen. AES merely allows a 128 bit data
length that can be divided into four basic operation blocks.
These blocks operate on array of bytes and organized as a 4*4
matrix that is called the state. The algorithm begins with an
Add round key stage followed by nine rounds of four stages
and a tenth round of three stages which applies for both
encryption and decryption algorithm [6] [7] [8].
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 03 Issue: 05 | May-2014, Available @ http://www.ijret.org 286
These rounds are governed by the following four stages:
 Substitute Bytes
 Shift rows
 Mix columns
 Add round key
The tenth round Mix columns stage is not included. The first
nine rounds of the decryption algorithm are governed by the
following four stages:
 Inverse Shift rows
 Inverse Substitute Bytes
 Add round key
 Inverse Mix columns
Again the tenth round Inverse Mix columns stage is not
included. The Overall flow of the encryption and decryption
algorithm of the AES algorithm is show in Figure 3.
5. IMPLEMENTATION
This AES algorithm is implemented for the text. But It can be
used for the images, pdf file formats, any other types of
documents. For every image there will be a header and footer
which gives the information regarding resolution, pixels,
starting and ending of image. In order to acquire the proper
image this header and footer information should be proper so
we need not to encrypt this part and the remaining part which
contains pixel information will be encrypted and decrypted. In
this paper jpeg images are used for the encryption and
decryption. First copy the header part into the encryption file.
The header part does not go for the encryption to support the
jpeg format. After copying the header part in the encrypted
file, encrypt the remaining data using AES algorithm and then
copy the footer part without encryption. For the decrypted
image, use the same procedure. The header and footer part
does not go for the encryption or decryption to support jpeg
format.
6. RESULTS
Proposed On chip communication architectures for image
encryption and decryption has been implemented using Xilinx
EDK tool and Image encryption and decryption application
developed using SDK tool. Device utilization of two
communication architectures are compared as shown in figure
5.Figure 5 provides how many SLICEs and LUTs are used for
proposed SoC design. On chip power detail are as shown in
figure 6, provides power consumption of PLB based SoC, AXI
based SoC. The SoC occupied only 19% resources and it is
area efficient design. The design consumes very low power of
0.67 W. Experimental results as shown in figure 4 provides
encrypted and decrypted images with original image and
takes only 45 sec for both encryption and decryption process.
The proposed design has been evaluated with 83.33MHZ. AXI
based SoC has better performance when compared with PLB
based SoC.
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 03 Issue: 05 | May-2014, Available @ http://www.ijret.org 287
7. CONCLUSIONS
In this paper, a novel shared bus based SoC architecture and
AXI based SoC has been proposed and implemented on
Spartan 6 FPGA using single soft processor. The effectiveness
of design flow and SoC architecture is illustrated by
experimental results obtained from the image encryption and
decryption on proposed SoC design. In comparison to
hardware methods and software methods which are often used
to implement cryptographic applications, proposed SoC offers
fast prototyping , area efficient and consumes less power. This
work can be extended to research on HW/SW portioning and
Multi Processors SoC (MPSoC) with shared bus
REFERENCES
[1]. Shaila S Math, Manjula R B, “Survey of system on chip
buses based on industry standards”, Conference on
Evolutionary Trends in Information Technology(CETIT),
Bekgaum,Karnataka, India, pp. 52, May 2011
[2]. ARM, AMBA Specifications (Rev2.0). [Online].
Available at http://www.arm.com, 1999
[3]. ARM, AMBA AXI Protocol Specification (Rev 2.0).
[Online]. Available at http://www.arm.com, March 2010
[4]. IBM, Core connect bus architecture. IBM
Microelectronics. [Online].
Available:http://www.ibm.com/chips/products/coreconnect,
2000
[5]. Silicore Corporation, Wishbone system-on-chip (soc)
interconnection architecture for portable ip cores, (Rev B.3).
[Online]. Available at
http://www.opencores.org/projects.cgi/web/wishbone/wishbon
e, Sept 2002
[6]. ARM, AMBA AXI protocol specifications, Available at,
http://www.arm.com, 2003
[7]. National Institute of Standards and Technology, “Federal
Information Processing Standard Publication 197, the
Advanced Encryption Standard (AES),” Nov. 2001.
[8]. William Stalling, Cryptography and Network Security:
Principles and Practices, Principles and Practices, 4th ed.
Prentice Hall, 2006.
[9]. Charles H Roth, Jr. Digital Systems Design Using VHDL,
Thomson, India Edition 2007.
[10]. Atul Kahate, Cryptography and Network Security,
Second Edition, Tata McGraw-Hill Edition 2008.
[11]. Abdulkarim Amer Shtewi, Bahaa Eldin M. Hasan, Abd
El Fatah .A. Hegazy “An Efficient Modified Advanced
Encryption Standard (MAES) Adapted for Image
Cryptosystems” IJCSNS International Journal of Computer
Science and Network Security, VOL.10 No.2,pp.226-232
February 2010.
[12]. P.Karthigaikumar, Soumiya Rasheed “Simulation of
Image Encryption using AES Algorithm” IJCA Special Issue
on “Computational Science - New Dimensions &
Perspectives” NCCSE, pp166-172, 2011.
[13]. Mr. Atul M. Borkar, Dr. R. V. Kshirsagar, Mrs. M. V.
Vyawahare “FPGA Implementation of AES Algorithm” IEEE,
pp.401-405, 2011.
[14]. Xinmiao Zhang, Keshab K. Parhi, Fellow, “High-Speed
VLSI Architectures for the AES Algorithm” IEEE
Transactions on vlsi systems, vol. 12, no. 9, pp.957-966,
September 2004.
[15]. Manoj. B, Manjula N Harihar “Image Encryption and
Decryption using AES” IJEAT, Volume-1, Issue-5, June 2012.

More Related Content

What's hot

Introduction to Microprocessor & Code
Introduction to Microprocessor & CodeIntroduction to Microprocessor & Code
Introduction to Microprocessor & CodeAvijit Adhikary
 
Origin of Microprocessor and Classification of Microprocessor
Origin of Microprocessor and  Classification of Microprocessor Origin of Microprocessor and  Classification of Microprocessor
Origin of Microprocessor and Classification of Microprocessor Vijay Kumar
 
Network and Computer security
Network and Computer securityNetwork and Computer security
Network and Computer securityDeepak John
 
Inpainting scheme for text in video a survey
Inpainting scheme for text in video   a surveyInpainting scheme for text in video   a survey
Inpainting scheme for text in video a surveyeSAT Journals
 
Phasor data concentrator or i pdc
Phasor data concentrator or i pdcPhasor data concentrator or i pdc
Phasor data concentrator or i pdcNitesh Pandit
 
SECURE OMP BASED PATTERN RECOGNITION THAT SUPPORTS IMAGE COMPRESSION
SECURE OMP BASED PATTERN RECOGNITION THAT SUPPORTS IMAGE COMPRESSIONSECURE OMP BASED PATTERN RECOGNITION THAT SUPPORTS IMAGE COMPRESSION
SECURE OMP BASED PATTERN RECOGNITION THAT SUPPORTS IMAGE COMPRESSIONsipij
 
raymart aborque
raymart aborqueraymart aborque
raymart aborquecas123
 
High Performance Medical Reconstruction Using Stream Programming Paradigms
High Performance Medical Reconstruction Using Stream Programming ParadigmsHigh Performance Medical Reconstruction Using Stream Programming Paradigms
High Performance Medical Reconstruction Using Stream Programming ParadigmsQuEST Global (erstwhile NeST Software)
 
Implementation of Speed Efficient Image Processing algorithm on Multi-Process...
Implementation of Speed Efficient Image Processing algorithm on Multi-Process...Implementation of Speed Efficient Image Processing algorithm on Multi-Process...
Implementation of Speed Efficient Image Processing algorithm on Multi-Process...AM Publications
 
Synthesis of nanoparticals
Synthesis of nanoparticalsSynthesis of nanoparticals
Synthesis of nanoparticalskumarnipom1
 
New modification on feistel DES algorithm based on multi-level keys
New modification on feistel DES algorithm based on  multi-level keys New modification on feistel DES algorithm based on  multi-level keys
New modification on feistel DES algorithm based on multi-level keys IJECEIAES
 
FPGA Based Implementation of Electronic Safe Lock
FPGA Based Implementation of Electronic Safe LockFPGA Based Implementation of Electronic Safe Lock
FPGA Based Implementation of Electronic Safe LockIOSR Journals
 
Evolution Of Microprocessor
Evolution Of MicroprocessorEvolution Of Microprocessor
Evolution Of Microprocessorguest3870d0
 

What's hot (19)

Introduction to Microprocessor & Code
Introduction to Microprocessor & CodeIntroduction to Microprocessor & Code
Introduction to Microprocessor & Code
 
Origin of Microprocessor and Classification of Microprocessor
Origin of Microprocessor and  Classification of Microprocessor Origin of Microprocessor and  Classification of Microprocessor
Origin of Microprocessor and Classification of Microprocessor
 
Network and Computer security
Network and Computer securityNetwork and Computer security
Network and Computer security
 
Co question 2006
Co question 2006Co question 2006
Co question 2006
 
Inpainting scheme for text in video a survey
Inpainting scheme for text in video   a surveyInpainting scheme for text in video   a survey
Inpainting scheme for text in video a survey
 
Phasor data concentrator or i pdc
Phasor data concentrator or i pdcPhasor data concentrator or i pdc
Phasor data concentrator or i pdc
 
SECURE OMP BASED PATTERN RECOGNITION THAT SUPPORTS IMAGE COMPRESSION
SECURE OMP BASED PATTERN RECOGNITION THAT SUPPORTS IMAGE COMPRESSIONSECURE OMP BASED PATTERN RECOGNITION THAT SUPPORTS IMAGE COMPRESSION
SECURE OMP BASED PATTERN RECOGNITION THAT SUPPORTS IMAGE COMPRESSION
 
A LITERATURE SURVEY ON SECURE JOINT DATA HIDING AND COMPRESSION SCHEME TO STO...
A LITERATURE SURVEY ON SECURE JOINT DATA HIDING AND COMPRESSION SCHEME TO STO...A LITERATURE SURVEY ON SECURE JOINT DATA HIDING AND COMPRESSION SCHEME TO STO...
A LITERATURE SURVEY ON SECURE JOINT DATA HIDING AND COMPRESSION SCHEME TO STO...
 
G010334554
G010334554G010334554
G010334554
 
raymart aborque
raymart aborqueraymart aborque
raymart aborque
 
Smart cards
Smart cards Smart cards
Smart cards
 
High Performance Medical Reconstruction Using Stream Programming Paradigms
High Performance Medical Reconstruction Using Stream Programming ParadigmsHigh Performance Medical Reconstruction Using Stream Programming Paradigms
High Performance Medical Reconstruction Using Stream Programming Paradigms
 
Implementation of Speed Efficient Image Processing algorithm on Multi-Process...
Implementation of Speed Efficient Image Processing algorithm on Multi-Process...Implementation of Speed Efficient Image Processing algorithm on Multi-Process...
Implementation of Speed Efficient Image Processing algorithm on Multi-Process...
 
K0445660
K0445660K0445660
K0445660
 
11 2014
11 201411 2014
11 2014
 
Synthesis of nanoparticals
Synthesis of nanoparticalsSynthesis of nanoparticals
Synthesis of nanoparticals
 
New modification on feistel DES algorithm based on multi-level keys
New modification on feistel DES algorithm based on  multi-level keys New modification on feistel DES algorithm based on  multi-level keys
New modification on feistel DES algorithm based on multi-level keys
 
FPGA Based Implementation of Electronic Safe Lock
FPGA Based Implementation of Electronic Safe LockFPGA Based Implementation of Electronic Safe Lock
FPGA Based Implementation of Electronic Safe Lock
 
Evolution Of Microprocessor
Evolution Of MicroprocessorEvolution Of Microprocessor
Evolution Of Microprocessor
 

Viewers also liked

Motion based action recognition using k nearest neighbor
Motion based action recognition using k nearest neighborMotion based action recognition using k nearest neighbor
Motion based action recognition using k nearest neighboreSAT Publishing House
 
A novel approach in identification of blood group using laser technology
A novel approach in identification of blood group using laser technologyA novel approach in identification of blood group using laser technology
A novel approach in identification of blood group using laser technologyeSAT Publishing House
 
A study on mhd boundary layer flow over a nonlinear
A study on mhd boundary layer flow over a nonlinearA study on mhd boundary layer flow over a nonlinear
A study on mhd boundary layer flow over a nonlineareSAT Publishing House
 
Frequency regulation of deregulated power system
Frequency regulation of deregulated power systemFrequency regulation of deregulated power system
Frequency regulation of deregulated power systemeSAT Publishing House
 
Study on the effects of ceramic particulates (sic, al2 o3
Study on the effects of ceramic particulates (sic, al2 o3Study on the effects of ceramic particulates (sic, al2 o3
Study on the effects of ceramic particulates (sic, al2 o3eSAT Publishing House
 
Optimization of 3 d geometrical soil model for
Optimization of 3 d geometrical soil model forOptimization of 3 d geometrical soil model for
Optimization of 3 d geometrical soil model foreSAT Publishing House
 
Nickel nanoparticles modified carbon paste electrode
Nickel nanoparticles modified carbon paste electrodeNickel nanoparticles modified carbon paste electrode
Nickel nanoparticles modified carbon paste electrodeeSAT Publishing House
 
A mobile based microscope for sample recognition
A mobile based microscope for sample recognitionA mobile based microscope for sample recognition
A mobile based microscope for sample recognitioneSAT Publishing House
 
Transmission of image using sms technique
Transmission of image using sms techniqueTransmission of image using sms technique
Transmission of image using sms techniqueeSAT Publishing House
 
A model to find the agent who responsible for data leakage
A model to find the agent who responsible for data leakageA model to find the agent who responsible for data leakage
A model to find the agent who responsible for data leakageeSAT Publishing House
 
Compressed sensing system for efficient ecg signal
Compressed sensing system for efficient ecg signalCompressed sensing system for efficient ecg signal
Compressed sensing system for efficient ecg signaleSAT Publishing House
 
Credit risk value based detection of multiple selfish node attacks in cogniti...
Credit risk value based detection of multiple selfish node attacks in cogniti...Credit risk value based detection of multiple selfish node attacks in cogniti...
Credit risk value based detection of multiple selfish node attacks in cogniti...eSAT Publishing House
 
Ontology based clustering in research project
Ontology based clustering in research projectOntology based clustering in research project
Ontology based clustering in research projecteSAT Publishing House
 
Real time voting system using face recognition for different expressions and ...
Real time voting system using face recognition for different expressions and ...Real time voting system using face recognition for different expressions and ...
Real time voting system using face recognition for different expressions and ...eSAT Publishing House
 
A comprehensive survey on data mining
A comprehensive survey on data miningA comprehensive survey on data mining
A comprehensive survey on data miningeSAT Publishing House
 
Performance analysis of autonomous microgrid
Performance analysis of autonomous microgridPerformance analysis of autonomous microgrid
Performance analysis of autonomous microgrideSAT Publishing House
 
Review on redundancy removal of rules for optimizing firewall
Review on redundancy removal of rules for optimizing firewallReview on redundancy removal of rules for optimizing firewall
Review on redundancy removal of rules for optimizing firewalleSAT Publishing House
 
Invalidating vulnerable broadcaster nodes using
Invalidating vulnerable broadcaster nodes usingInvalidating vulnerable broadcaster nodes using
Invalidating vulnerable broadcaster nodes usingeSAT Publishing House
 
Study of shear walls in multistoried buildings with different thickness and r...
Study of shear walls in multistoried buildings with different thickness and r...Study of shear walls in multistoried buildings with different thickness and r...
Study of shear walls in multistoried buildings with different thickness and r...eSAT Publishing House
 
Fractals for complexity analysis of diabetic retinopathy in retinal vasculatu...
Fractals for complexity analysis of diabetic retinopathy in retinal vasculatu...Fractals for complexity analysis of diabetic retinopathy in retinal vasculatu...
Fractals for complexity analysis of diabetic retinopathy in retinal vasculatu...eSAT Publishing House
 

Viewers also liked (20)

Motion based action recognition using k nearest neighbor
Motion based action recognition using k nearest neighborMotion based action recognition using k nearest neighbor
Motion based action recognition using k nearest neighbor
 
A novel approach in identification of blood group using laser technology
A novel approach in identification of blood group using laser technologyA novel approach in identification of blood group using laser technology
A novel approach in identification of blood group using laser technology
 
A study on mhd boundary layer flow over a nonlinear
A study on mhd boundary layer flow over a nonlinearA study on mhd boundary layer flow over a nonlinear
A study on mhd boundary layer flow over a nonlinear
 
Frequency regulation of deregulated power system
Frequency regulation of deregulated power systemFrequency regulation of deregulated power system
Frequency regulation of deregulated power system
 
Study on the effects of ceramic particulates (sic, al2 o3
Study on the effects of ceramic particulates (sic, al2 o3Study on the effects of ceramic particulates (sic, al2 o3
Study on the effects of ceramic particulates (sic, al2 o3
 
Optimization of 3 d geometrical soil model for
Optimization of 3 d geometrical soil model forOptimization of 3 d geometrical soil model for
Optimization of 3 d geometrical soil model for
 
Nickel nanoparticles modified carbon paste electrode
Nickel nanoparticles modified carbon paste electrodeNickel nanoparticles modified carbon paste electrode
Nickel nanoparticles modified carbon paste electrode
 
A mobile based microscope for sample recognition
A mobile based microscope for sample recognitionA mobile based microscope for sample recognition
A mobile based microscope for sample recognition
 
Transmission of image using sms technique
Transmission of image using sms techniqueTransmission of image using sms technique
Transmission of image using sms technique
 
A model to find the agent who responsible for data leakage
A model to find the agent who responsible for data leakageA model to find the agent who responsible for data leakage
A model to find the agent who responsible for data leakage
 
Compressed sensing system for efficient ecg signal
Compressed sensing system for efficient ecg signalCompressed sensing system for efficient ecg signal
Compressed sensing system for efficient ecg signal
 
Credit risk value based detection of multiple selfish node attacks in cogniti...
Credit risk value based detection of multiple selfish node attacks in cogniti...Credit risk value based detection of multiple selfish node attacks in cogniti...
Credit risk value based detection of multiple selfish node attacks in cogniti...
 
Ontology based clustering in research project
Ontology based clustering in research projectOntology based clustering in research project
Ontology based clustering in research project
 
Real time voting system using face recognition for different expressions and ...
Real time voting system using face recognition for different expressions and ...Real time voting system using face recognition for different expressions and ...
Real time voting system using face recognition for different expressions and ...
 
A comprehensive survey on data mining
A comprehensive survey on data miningA comprehensive survey on data mining
A comprehensive survey on data mining
 
Performance analysis of autonomous microgrid
Performance analysis of autonomous microgridPerformance analysis of autonomous microgrid
Performance analysis of autonomous microgrid
 
Review on redundancy removal of rules for optimizing firewall
Review on redundancy removal of rules for optimizing firewallReview on redundancy removal of rules for optimizing firewall
Review on redundancy removal of rules for optimizing firewall
 
Invalidating vulnerable broadcaster nodes using
Invalidating vulnerable broadcaster nodes usingInvalidating vulnerable broadcaster nodes using
Invalidating vulnerable broadcaster nodes using
 
Study of shear walls in multistoried buildings with different thickness and r...
Study of shear walls in multistoried buildings with different thickness and r...Study of shear walls in multistoried buildings with different thickness and r...
Study of shear walls in multistoried buildings with different thickness and r...
 
Fractals for complexity analysis of diabetic retinopathy in retinal vasculatu...
Fractals for complexity analysis of diabetic retinopathy in retinal vasculatu...Fractals for complexity analysis of diabetic retinopathy in retinal vasculatu...
Fractals for complexity analysis of diabetic retinopathy in retinal vasculatu...
 

Similar to An area and power efficient on chip communication architectures for image encryption and decryption

Designing of telecommand system using system on chip soc for spacecraft contr...
Designing of telecommand system using system on chip soc for spacecraft contr...Designing of telecommand system using system on chip soc for spacecraft contr...
Designing of telecommand system using system on chip soc for spacecraft contr...IAEME Publication
 
Designing of telecommand system using system on chip soc for spacecraft contr...
Designing of telecommand system using system on chip soc for spacecraft contr...Designing of telecommand system using system on chip soc for spacecraft contr...
Designing of telecommand system using system on chip soc for spacecraft contr...IAEME Publication
 
An octa core processor with shared memory and message-passing
An octa core processor with shared memory and message-passingAn octa core processor with shared memory and message-passing
An octa core processor with shared memory and message-passingeSAT Journals
 
Performance evaluation of ecc in single and multi( eliptic curve)
Performance evaluation of ecc in single and multi( eliptic curve)Performance evaluation of ecc in single and multi( eliptic curve)
Performance evaluation of ecc in single and multi( eliptic curve)Danilo Calle
 
The Basics of Cell Computing Technology
The Basics of Cell Computing TechnologyThe Basics of Cell Computing Technology
The Basics of Cell Computing TechnologySlide_N
 
Accelerating Real Time Applications on Heterogeneous Platforms
Accelerating Real Time Applications on Heterogeneous PlatformsAccelerating Real Time Applications on Heterogeneous Platforms
Accelerating Real Time Applications on Heterogeneous PlatformsIJMER
 
Biomedical image transmission based on Modified feistal algorithm
Biomedical image transmission based on Modified feistal algorithmBiomedical image transmission based on Modified feistal algorithm
Biomedical image transmission based on Modified feistal algorithmijcsit
 
UNIT 1 SONCA.pptx
UNIT 1 SONCA.pptxUNIT 1 SONCA.pptx
UNIT 1 SONCA.pptxmohan134666
 
IMPLEMENTATION OF AES AS A CUSTOM HARDWARE USING NIOS II PROCESSOR
IMPLEMENTATION OF AES AS A CUSTOM HARDWARE USING NIOS II PROCESSORIMPLEMENTATION OF AES AS A CUSTOM HARDWARE USING NIOS II PROCESSOR
IMPLEMENTATION OF AES AS A CUSTOM HARDWARE USING NIOS II PROCESSORacijjournal
 
Optimization of Latency of Temporal Key Integrity Protocol (TKIP) Using Graph...
Optimization of Latency of Temporal Key Integrity Protocol (TKIP) Using Graph...Optimization of Latency of Temporal Key Integrity Protocol (TKIP) Using Graph...
Optimization of Latency of Temporal Key Integrity Protocol (TKIP) Using Graph...ijcseit
 
Fpga based encryption design using vhdl
Fpga based encryption design using vhdlFpga based encryption design using vhdl
Fpga based encryption design using vhdleSAT Publishing House
 
ACTIVITY SPOTTER DURING MEDICAL TREATMENT USING VISUAL CRYPTOGRAPHY TECHNIQUE
ACTIVITY SPOTTER DURING MEDICAL TREATMENT USING VISUAL CRYPTOGRAPHY TECHNIQUEACTIVITY SPOTTER DURING MEDICAL TREATMENT USING VISUAL CRYPTOGRAPHY TECHNIQUE
ACTIVITY SPOTTER DURING MEDICAL TREATMENT USING VISUAL CRYPTOGRAPHY TECHNIQUEIRJET Journal
 
FPGA and ASIC Implementation of Speech Encryption and Decryption using AES Al...
FPGA and ASIC Implementation of Speech Encryption and Decryption using AES Al...FPGA and ASIC Implementation of Speech Encryption and Decryption using AES Al...
FPGA and ASIC Implementation of Speech Encryption and Decryption using AES Al...IJCSIS Research Publications
 
iPhone Architecture - Review
iPhone Architecture - ReviewiPhone Architecture - Review
iPhone Architecture - ReviewAbdelrahman Hosny
 
Design of a low power processor for Embedded system applications
Design of a low power processor for Embedded system applicationsDesign of a low power processor for Embedded system applications
Design of a low power processor for Embedded system applicationsROHIT89352
 
Implementation of linux based uart device driver
Implementation of linux based uart device driverImplementation of linux based uart device driver
Implementation of linux based uart device drivereSAT Publishing House
 
VJITSk 6713 user manual
VJITSk 6713 user manualVJITSk 6713 user manual
VJITSk 6713 user manualkot seelam
 

Similar to An area and power efficient on chip communication architectures for image encryption and decryption (20)

Designing of telecommand system using system on chip soc for spacecraft contr...
Designing of telecommand system using system on chip soc for spacecraft contr...Designing of telecommand system using system on chip soc for spacecraft contr...
Designing of telecommand system using system on chip soc for spacecraft contr...
 
Designing of telecommand system using system on chip soc for spacecraft contr...
Designing of telecommand system using system on chip soc for spacecraft contr...Designing of telecommand system using system on chip soc for spacecraft contr...
Designing of telecommand system using system on chip soc for spacecraft contr...
 
An octa core processor with shared memory and message-passing
An octa core processor with shared memory and message-passingAn octa core processor with shared memory and message-passing
An octa core processor with shared memory and message-passing
 
Performance evaluation of ecc in single and multi( eliptic curve)
Performance evaluation of ecc in single and multi( eliptic curve)Performance evaluation of ecc in single and multi( eliptic curve)
Performance evaluation of ecc in single and multi( eliptic curve)
 
The Basics of Cell Computing Technology
The Basics of Cell Computing TechnologyThe Basics of Cell Computing Technology
The Basics of Cell Computing Technology
 
Accelerating Real Time Applications on Heterogeneous Platforms
Accelerating Real Time Applications on Heterogeneous PlatformsAccelerating Real Time Applications on Heterogeneous Platforms
Accelerating Real Time Applications on Heterogeneous Platforms
 
Go3611771182
Go3611771182Go3611771182
Go3611771182
 
Biomedical image transmission based on Modified feistal algorithm
Biomedical image transmission based on Modified feistal algorithmBiomedical image transmission based on Modified feistal algorithm
Biomedical image transmission based on Modified feistal algorithm
 
Tdp.a029a10
Tdp.a029a10Tdp.a029a10
Tdp.a029a10
 
UNIT 1 SONCA.pptx
UNIT 1 SONCA.pptxUNIT 1 SONCA.pptx
UNIT 1 SONCA.pptx
 
IMPLEMENTATION OF AES AS A CUSTOM HARDWARE USING NIOS II PROCESSOR
IMPLEMENTATION OF AES AS A CUSTOM HARDWARE USING NIOS II PROCESSORIMPLEMENTATION OF AES AS A CUSTOM HARDWARE USING NIOS II PROCESSOR
IMPLEMENTATION OF AES AS A CUSTOM HARDWARE USING NIOS II PROCESSOR
 
Optimization of Latency of Temporal Key Integrity Protocol (TKIP) Using Graph...
Optimization of Latency of Temporal Key Integrity Protocol (TKIP) Using Graph...Optimization of Latency of Temporal Key Integrity Protocol (TKIP) Using Graph...
Optimization of Latency of Temporal Key Integrity Protocol (TKIP) Using Graph...
 
Fpga based encryption design using vhdl
Fpga based encryption design using vhdlFpga based encryption design using vhdl
Fpga based encryption design using vhdl
 
ACTIVITY SPOTTER DURING MEDICAL TREATMENT USING VISUAL CRYPTOGRAPHY TECHNIQUE
ACTIVITY SPOTTER DURING MEDICAL TREATMENT USING VISUAL CRYPTOGRAPHY TECHNIQUEACTIVITY SPOTTER DURING MEDICAL TREATMENT USING VISUAL CRYPTOGRAPHY TECHNIQUE
ACTIVITY SPOTTER DURING MEDICAL TREATMENT USING VISUAL CRYPTOGRAPHY TECHNIQUE
 
FPGA and ASIC Implementation of Speech Encryption and Decryption using AES Al...
FPGA and ASIC Implementation of Speech Encryption and Decryption using AES Al...FPGA and ASIC Implementation of Speech Encryption and Decryption using AES Al...
FPGA and ASIC Implementation of Speech Encryption and Decryption using AES Al...
 
iPhone Architecture - Review
iPhone Architecture - ReviewiPhone Architecture - Review
iPhone Architecture - Review
 
UNIT 1.docx
UNIT 1.docxUNIT 1.docx
UNIT 1.docx
 
Design of a low power processor for Embedded system applications
Design of a low power processor for Embedded system applicationsDesign of a low power processor for Embedded system applications
Design of a low power processor for Embedded system applications
 
Implementation of linux based uart device driver
Implementation of linux based uart device driverImplementation of linux based uart device driver
Implementation of linux based uart device driver
 
VJITSk 6713 user manual
VJITSk 6713 user manualVJITSk 6713 user manual
VJITSk 6713 user manual
 

More from eSAT Publishing House

Likely impacts of hudhud on the environment of visakhapatnam
Likely impacts of hudhud on the environment of visakhapatnamLikely impacts of hudhud on the environment of visakhapatnam
Likely impacts of hudhud on the environment of visakhapatnameSAT Publishing House
 
Impact of flood disaster in a drought prone area – case study of alampur vill...
Impact of flood disaster in a drought prone area – case study of alampur vill...Impact of flood disaster in a drought prone area – case study of alampur vill...
Impact of flood disaster in a drought prone area – case study of alampur vill...eSAT Publishing House
 
Hudhud cyclone – a severe disaster in visakhapatnam
Hudhud cyclone – a severe disaster in visakhapatnamHudhud cyclone – a severe disaster in visakhapatnam
Hudhud cyclone – a severe disaster in visakhapatnameSAT Publishing House
 
Groundwater investigation using geophysical methods a case study of pydibhim...
Groundwater investigation using geophysical methods  a case study of pydibhim...Groundwater investigation using geophysical methods  a case study of pydibhim...
Groundwater investigation using geophysical methods a case study of pydibhim...eSAT Publishing House
 
Flood related disasters concerned to urban flooding in bangalore, india
Flood related disasters concerned to urban flooding in bangalore, indiaFlood related disasters concerned to urban flooding in bangalore, india
Flood related disasters concerned to urban flooding in bangalore, indiaeSAT Publishing House
 
Enhancing post disaster recovery by optimal infrastructure capacity building
Enhancing post disaster recovery by optimal infrastructure capacity buildingEnhancing post disaster recovery by optimal infrastructure capacity building
Enhancing post disaster recovery by optimal infrastructure capacity buildingeSAT Publishing House
 
Effect of lintel and lintel band on the global performance of reinforced conc...
Effect of lintel and lintel band on the global performance of reinforced conc...Effect of lintel and lintel band on the global performance of reinforced conc...
Effect of lintel and lintel band on the global performance of reinforced conc...eSAT Publishing House
 
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...eSAT Publishing House
 
Wind damage to buildings, infrastrucuture and landscape elements along the be...
Wind damage to buildings, infrastrucuture and landscape elements along the be...Wind damage to buildings, infrastrucuture and landscape elements along the be...
Wind damage to buildings, infrastrucuture and landscape elements along the be...eSAT Publishing House
 
Shear strength of rc deep beam panels – a review
Shear strength of rc deep beam panels – a reviewShear strength of rc deep beam panels – a review
Shear strength of rc deep beam panels – a revieweSAT Publishing House
 
Role of voluntary teams of professional engineers in dissater management – ex...
Role of voluntary teams of professional engineers in dissater management – ex...Role of voluntary teams of professional engineers in dissater management – ex...
Role of voluntary teams of professional engineers in dissater management – ex...eSAT Publishing House
 
Risk analysis and environmental hazard management
Risk analysis and environmental hazard managementRisk analysis and environmental hazard management
Risk analysis and environmental hazard managementeSAT Publishing House
 
Review study on performance of seismically tested repaired shear walls
Review study on performance of seismically tested repaired shear wallsReview study on performance of seismically tested repaired shear walls
Review study on performance of seismically tested repaired shear wallseSAT Publishing House
 
Monitoring and assessment of air quality with reference to dust particles (pm...
Monitoring and assessment of air quality with reference to dust particles (pm...Monitoring and assessment of air quality with reference to dust particles (pm...
Monitoring and assessment of air quality with reference to dust particles (pm...eSAT Publishing House
 
Low cost wireless sensor networks and smartphone applications for disaster ma...
Low cost wireless sensor networks and smartphone applications for disaster ma...Low cost wireless sensor networks and smartphone applications for disaster ma...
Low cost wireless sensor networks and smartphone applications for disaster ma...eSAT Publishing House
 
Coastal zones – seismic vulnerability an analysis from east coast of india
Coastal zones – seismic vulnerability an analysis from east coast of indiaCoastal zones – seismic vulnerability an analysis from east coast of india
Coastal zones – seismic vulnerability an analysis from east coast of indiaeSAT Publishing House
 
Can fracture mechanics predict damage due disaster of structures
Can fracture mechanics predict damage due disaster of structuresCan fracture mechanics predict damage due disaster of structures
Can fracture mechanics predict damage due disaster of structureseSAT Publishing House
 
Assessment of seismic susceptibility of rc buildings
Assessment of seismic susceptibility of rc buildingsAssessment of seismic susceptibility of rc buildings
Assessment of seismic susceptibility of rc buildingseSAT Publishing House
 
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...eSAT Publishing House
 
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...eSAT Publishing House
 

More from eSAT Publishing House (20)

Likely impacts of hudhud on the environment of visakhapatnam
Likely impacts of hudhud on the environment of visakhapatnamLikely impacts of hudhud on the environment of visakhapatnam
Likely impacts of hudhud on the environment of visakhapatnam
 
Impact of flood disaster in a drought prone area – case study of alampur vill...
Impact of flood disaster in a drought prone area – case study of alampur vill...Impact of flood disaster in a drought prone area – case study of alampur vill...
Impact of flood disaster in a drought prone area – case study of alampur vill...
 
Hudhud cyclone – a severe disaster in visakhapatnam
Hudhud cyclone – a severe disaster in visakhapatnamHudhud cyclone – a severe disaster in visakhapatnam
Hudhud cyclone – a severe disaster in visakhapatnam
 
Groundwater investigation using geophysical methods a case study of pydibhim...
Groundwater investigation using geophysical methods  a case study of pydibhim...Groundwater investigation using geophysical methods  a case study of pydibhim...
Groundwater investigation using geophysical methods a case study of pydibhim...
 
Flood related disasters concerned to urban flooding in bangalore, india
Flood related disasters concerned to urban flooding in bangalore, indiaFlood related disasters concerned to urban flooding in bangalore, india
Flood related disasters concerned to urban flooding in bangalore, india
 
Enhancing post disaster recovery by optimal infrastructure capacity building
Enhancing post disaster recovery by optimal infrastructure capacity buildingEnhancing post disaster recovery by optimal infrastructure capacity building
Enhancing post disaster recovery by optimal infrastructure capacity building
 
Effect of lintel and lintel band on the global performance of reinforced conc...
Effect of lintel and lintel band on the global performance of reinforced conc...Effect of lintel and lintel band on the global performance of reinforced conc...
Effect of lintel and lintel band on the global performance of reinforced conc...
 
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
 
Wind damage to buildings, infrastrucuture and landscape elements along the be...
Wind damage to buildings, infrastrucuture and landscape elements along the be...Wind damage to buildings, infrastrucuture and landscape elements along the be...
Wind damage to buildings, infrastrucuture and landscape elements along the be...
 
Shear strength of rc deep beam panels – a review
Shear strength of rc deep beam panels – a reviewShear strength of rc deep beam panels – a review
Shear strength of rc deep beam panels – a review
 
Role of voluntary teams of professional engineers in dissater management – ex...
Role of voluntary teams of professional engineers in dissater management – ex...Role of voluntary teams of professional engineers in dissater management – ex...
Role of voluntary teams of professional engineers in dissater management – ex...
 
Risk analysis and environmental hazard management
Risk analysis and environmental hazard managementRisk analysis and environmental hazard management
Risk analysis and environmental hazard management
 
Review study on performance of seismically tested repaired shear walls
Review study on performance of seismically tested repaired shear wallsReview study on performance of seismically tested repaired shear walls
Review study on performance of seismically tested repaired shear walls
 
Monitoring and assessment of air quality with reference to dust particles (pm...
Monitoring and assessment of air quality with reference to dust particles (pm...Monitoring and assessment of air quality with reference to dust particles (pm...
Monitoring and assessment of air quality with reference to dust particles (pm...
 
Low cost wireless sensor networks and smartphone applications for disaster ma...
Low cost wireless sensor networks and smartphone applications for disaster ma...Low cost wireless sensor networks and smartphone applications for disaster ma...
Low cost wireless sensor networks and smartphone applications for disaster ma...
 
Coastal zones – seismic vulnerability an analysis from east coast of india
Coastal zones – seismic vulnerability an analysis from east coast of indiaCoastal zones – seismic vulnerability an analysis from east coast of india
Coastal zones – seismic vulnerability an analysis from east coast of india
 
Can fracture mechanics predict damage due disaster of structures
Can fracture mechanics predict damage due disaster of structuresCan fracture mechanics predict damage due disaster of structures
Can fracture mechanics predict damage due disaster of structures
 
Assessment of seismic susceptibility of rc buildings
Assessment of seismic susceptibility of rc buildingsAssessment of seismic susceptibility of rc buildings
Assessment of seismic susceptibility of rc buildings
 
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
 
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
 

Recently uploaded

Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)dollysharma2066
 
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerAnamika Sarkar
 
complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...asadnawaz62
 
Correctly Loading Incremental Data at Scale
Correctly Loading Incremental Data at ScaleCorrectly Loading Incremental Data at Scale
Correctly Loading Incremental Data at ScaleAlluxio, Inc.
 
Why does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsync
Why does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsyncWhy does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsync
Why does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsyncssuser2ae721
 
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdfCCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdfAsst.prof M.Gokilavani
 
Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxHeart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxPoojaBan
 
Churning of Butter, Factors affecting .
Churning of Butter, Factors affecting  .Churning of Butter, Factors affecting  .
Churning of Butter, Factors affecting .Satyam Kumar
 
computer application and construction management
computer application and construction managementcomputer application and construction management
computer application and construction managementMariconPadriquez1
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxDeepakSakkari2
 
Introduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxIntroduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxk795866
 
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx959SahilShah
 
An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...Chandu841456
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...VICTOR MAESTRE RAMIREZ
 
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETEINFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETEroselinkalist12
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidNikhilNagaraju
 
Introduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECHIntroduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECHC Sai Kiran
 

Recently uploaded (20)

Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
 
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
 
complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...
 
Correctly Loading Incremental Data at Scale
Correctly Loading Incremental Data at ScaleCorrectly Loading Incremental Data at Scale
Correctly Loading Incremental Data at Scale
 
young call girls in Green Park🔝 9953056974 🔝 escort Service
young call girls in Green Park🔝 9953056974 🔝 escort Serviceyoung call girls in Green Park🔝 9953056974 🔝 escort Service
young call girls in Green Park🔝 9953056974 🔝 escort Service
 
Why does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsync
Why does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsyncWhy does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsync
Why does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsync
 
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdfCCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
 
Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxHeart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptx
 
Churning of Butter, Factors affecting .
Churning of Butter, Factors affecting  .Churning of Butter, Factors affecting  .
Churning of Butter, Factors affecting .
 
computer application and construction management
computer application and construction managementcomputer application and construction management
computer application and construction management
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptx
 
Introduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxIntroduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptx
 
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx
 
An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...
 
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETEINFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfid
 
POWER SYSTEMS-1 Complete notes examples
POWER SYSTEMS-1 Complete notes  examplesPOWER SYSTEMS-1 Complete notes  examples
POWER SYSTEMS-1 Complete notes examples
 
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Serviceyoung call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
 
Introduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECHIntroduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECH
 

An area and power efficient on chip communication architectures for image encryption and decryption

  • 1. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 __________________________________________________________________________________________ Volume: 03 Issue: 05 | May-2014, Available @ http://www.ijret.org 284 AN AREA AND POWER EFFICIENT ON CHIP COMMUNICATION ARCHITECTURES FOR IMAGE ENCRYPTION AND DECRYPTION Y.Amar Babu1 , G.M.V.Prasad2 1 Dept. of ECE, L.B.R. College of Engineering, Mylavaram, India 2 Principal, B.V.C. Institute of Technology and Science, Batlapalem, India Abstract The design of new electronic systems is getting more complex as more functionality is integrated into these systems. To design complex system, a predictable design flow is needed. A soft processor based System-on-Chip (SoC) is often mentioned as the hardware platform to be used in modern electronics systems for fast prototyping on FPGA. In this paper, a novel area and power efficient on chip communication architectures has been proposed for image encryption and decryption using single soft processor(Micro Blaze). Proposed System On Chip explores On chip Communication architectures features to efficiently implement the application. The SoC offers scalability and guarantees on the timing behavior when communicating data between various processing and storage elements. Proposed SoC has been implemented on Spartan6 FPGA and evaluated at 83.33MHz. It has occupied only 19% of resources available on target FPGA , consumes very low power. The proposed on chip communication architectures compared with device utilization on FPGA and power consumed. Keywords: SoC, FPGA, Encryption and Decryption, Micro Blaze -----------------------------------------------------------------------***------------------------------------------------------------------- 1. INTRODUCTION SoC architectures are used to provide the required computational power for novel embedded systems. The ITRS predicts that while manufacturing complex SoC will be feasible, the production cost will grow rapidly as the costs of masks is raising drastically. The growing complexity of embedded systems leads to a large in their development effort. At the same time, the market dynamics for these systems push for shorter and shorter development times. The NRE cost associated with the design and tools of complex chips is growing rapidly. To address these issues, a platform based design methodology is proposed. The main objective of this design methodology is to increase the re-use of soft cores and IPs. The SoC consists of both hardware, and the software controlling the soft processor or DSP cores, peripherals and interfaces. The design flow for a SoC aims to develop this hardware and software in parallel. Most SoCs are developed from pre-designed hardware blocks for the hardware, together with the software drivers that control their operation. The hardware blocks are put together using EDA tools. The software modules are integrated using a Software development environment. In this paper, a novel soft processor based SoC architecture is proposed for Image encryption and decryption, which is based on shared processor local bus (PLB) and developed using Xilinx Platform Studio (XPS)[1][2]. Proposed SoC has three layers, hardware layer which is based on soft processor (Micro Blaze), Standalone OS layer which has low level drivers for different controllers and interfaces and application layer which is developed using above two layers as shown in Figure1[3]. 2. MICRO BLAZE SOFT PROCESSOR The micro blaze embedded processor soft core is a reduced instruction set computer (RISC) optimized for implementation in Xilinx Field Programmable Gate Arrays (FPGAs). Compared to other general purpose processors, micro blaze is quite flexible with a few configurable parts and capable of being extended by customized co-processors. There are a number of on-chip communication strategies available including a variety of memory interfaces. The operating frequency of micro blaze on spartan-6 SP605 kit is 83.33Mhz. Hence we use micro blaze soft-core processor in order to develop hardware platform for JPEG compression application. Micro blaze processor has an instruction decoding unit, 32x32 bit general purpose register file, arithmetic unit and special
  • 2. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 __________________________________________________________________________________________ Volume: 03 Issue: 05 | May-2014, Available @ http://www.ijret.org 285 purpose registers. In addition, it has an instruction pre fetch buffer. The arithmetic unit is configurable, as shown in core block diagram. The Barrel Shift, Multiplier, Divider and FPU are optional features. Micro blaze processor has a three- stage pipeline: fetch, decode and execute. For most of instructions, each stage takes one clock cycle. There is no branch prediction logic. Branch with delay slot is supported to reduce the branch penalty. Micro blaze is a Harvard architecture processor, with both 32-bit I-bus and D-bus. Cache is also an optional feature. Three types of buses, FSL, LMB and OPB are available. FSL bus is a fast co-processor interface. LMB is one-clock-cycle, on-chip memory bus while OPB is a general bus with arbitration. MicroBlaze has an orthogonal instruction set architecture. It has thirty-two 32-bit general purpose registers and up to eighteen 32-bit special purpose registers, depending on configured options. 3. PROPOSED SoC ARCHITECTURES We proposed two On Chip Communication architectures. First one is based on IBM Coreconnect Bus Processor Local Bus(PLB) and second on chip communication is AMBA AXI interconnect[3] System on chip for Image encryption and decryption has three layers as shown in figure 1. The three layers are hardware platform followed by operating system (OS) and the required application that is to be carried out. In this third layer is Image encryption and decryption. First layer is hardware platform. It is generated using micro blaze. Micro blaze is flexible and can be configurable customized soft core processor. Second layer is operating system. Standalone OS is used for controlling hardware platform. The application is developed using the two layer. Hardware platform for the image encryption and decryption requires components like, Block RAM, Instruction Local Memory Bus controller , Data Local Memory Bus controller, Micro blaze Debug Module, UART, System_ACE controller for Compact flash, Multiport Memory controller for DDR3 SDRAM, PLB-Bus. All these hardware components are configured for Image encryption and decryption. Its architecture is as shown in the figure 2a. And second On chip communication architecture is based on AMBA AXI Interconnect for Image encryption and decryption as shown in Figure 2b[4][5]. 4. IMAGE ENCRYPTION AND DECRYPTION The Image encryption and decryption is developed on proposed SoC using AES algorithm. Embedded C is used to develop the AES algorithm and to access images from Compact flash. AES comes in three favors, namely AES - 128, AES - 192, and AES-256, with the number in each case representing the size (in bits) of the key used. All the modes are done in 10, 12 or 14 round depends on the size of the block and the key length chosen. AES merely allows a 128 bit data length that can be divided into four basic operation blocks. These blocks operate on array of bytes and organized as a 4*4 matrix that is called the state. The algorithm begins with an Add round key stage followed by nine rounds of four stages and a tenth round of three stages which applies for both encryption and decryption algorithm [6] [7] [8].
  • 3. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 __________________________________________________________________________________________ Volume: 03 Issue: 05 | May-2014, Available @ http://www.ijret.org 286 These rounds are governed by the following four stages:  Substitute Bytes  Shift rows  Mix columns  Add round key The tenth round Mix columns stage is not included. The first nine rounds of the decryption algorithm are governed by the following four stages:  Inverse Shift rows  Inverse Substitute Bytes  Add round key  Inverse Mix columns Again the tenth round Inverse Mix columns stage is not included. The Overall flow of the encryption and decryption algorithm of the AES algorithm is show in Figure 3. 5. IMPLEMENTATION This AES algorithm is implemented for the text. But It can be used for the images, pdf file formats, any other types of documents. For every image there will be a header and footer which gives the information regarding resolution, pixels, starting and ending of image. In order to acquire the proper image this header and footer information should be proper so we need not to encrypt this part and the remaining part which contains pixel information will be encrypted and decrypted. In this paper jpeg images are used for the encryption and decryption. First copy the header part into the encryption file. The header part does not go for the encryption to support the jpeg format. After copying the header part in the encrypted file, encrypt the remaining data using AES algorithm and then copy the footer part without encryption. For the decrypted image, use the same procedure. The header and footer part does not go for the encryption or decryption to support jpeg format. 6. RESULTS Proposed On chip communication architectures for image encryption and decryption has been implemented using Xilinx EDK tool and Image encryption and decryption application developed using SDK tool. Device utilization of two communication architectures are compared as shown in figure 5.Figure 5 provides how many SLICEs and LUTs are used for proposed SoC design. On chip power detail are as shown in figure 6, provides power consumption of PLB based SoC, AXI based SoC. The SoC occupied only 19% resources and it is area efficient design. The design consumes very low power of 0.67 W. Experimental results as shown in figure 4 provides encrypted and decrypted images with original image and takes only 45 sec for both encryption and decryption process. The proposed design has been evaluated with 83.33MHZ. AXI based SoC has better performance when compared with PLB based SoC.
  • 4. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 __________________________________________________________________________________________ Volume: 03 Issue: 05 | May-2014, Available @ http://www.ijret.org 287 7. CONCLUSIONS In this paper, a novel shared bus based SoC architecture and AXI based SoC has been proposed and implemented on Spartan 6 FPGA using single soft processor. The effectiveness of design flow and SoC architecture is illustrated by experimental results obtained from the image encryption and decryption on proposed SoC design. In comparison to hardware methods and software methods which are often used to implement cryptographic applications, proposed SoC offers fast prototyping , area efficient and consumes less power. This work can be extended to research on HW/SW portioning and Multi Processors SoC (MPSoC) with shared bus REFERENCES [1]. Shaila S Math, Manjula R B, “Survey of system on chip buses based on industry standards”, Conference on Evolutionary Trends in Information Technology(CETIT), Bekgaum,Karnataka, India, pp. 52, May 2011 [2]. ARM, AMBA Specifications (Rev2.0). [Online]. Available at http://www.arm.com, 1999 [3]. ARM, AMBA AXI Protocol Specification (Rev 2.0). [Online]. Available at http://www.arm.com, March 2010 [4]. IBM, Core connect bus architecture. IBM Microelectronics. [Online]. Available:http://www.ibm.com/chips/products/coreconnect, 2000 [5]. Silicore Corporation, Wishbone system-on-chip (soc) interconnection architecture for portable ip cores, (Rev B.3). [Online]. Available at http://www.opencores.org/projects.cgi/web/wishbone/wishbon e, Sept 2002 [6]. ARM, AMBA AXI protocol specifications, Available at, http://www.arm.com, 2003 [7]. National Institute of Standards and Technology, “Federal Information Processing Standard Publication 197, the Advanced Encryption Standard (AES),” Nov. 2001. [8]. William Stalling, Cryptography and Network Security: Principles and Practices, Principles and Practices, 4th ed. Prentice Hall, 2006. [9]. Charles H Roth, Jr. Digital Systems Design Using VHDL, Thomson, India Edition 2007. [10]. Atul Kahate, Cryptography and Network Security, Second Edition, Tata McGraw-Hill Edition 2008. [11]. Abdulkarim Amer Shtewi, Bahaa Eldin M. Hasan, Abd El Fatah .A. Hegazy “An Efficient Modified Advanced Encryption Standard (MAES) Adapted for Image Cryptosystems” IJCSNS International Journal of Computer Science and Network Security, VOL.10 No.2,pp.226-232 February 2010. [12]. P.Karthigaikumar, Soumiya Rasheed “Simulation of Image Encryption using AES Algorithm” IJCA Special Issue on “Computational Science - New Dimensions & Perspectives” NCCSE, pp166-172, 2011. [13]. Mr. Atul M. Borkar, Dr. R. V. Kshirsagar, Mrs. M. V. Vyawahare “FPGA Implementation of AES Algorithm” IEEE, pp.401-405, 2011. [14]. Xinmiao Zhang, Keshab K. Parhi, Fellow, “High-Speed VLSI Architectures for the AES Algorithm” IEEE Transactions on vlsi systems, vol. 12, no. 9, pp.957-966, September 2004. [15]. Manoj. B, Manjula N Harihar “Image Encryption and Decryption using AES” IJEAT, Volume-1, Issue-5, June 2012.