2022
DOI: 10.3390/electronics11182925
|View full text |Cite
|
Sign up to set email alerts
|

Design and Implementation of Real-Time Image Acquisition Chip Based on Triple-Hybrid Encryption System

Abstract: With the improved hardware storage capabilities and the rapid development of artificial intelligence image recognition technology, information is becoming image-oriented. Increasingly sensitive image data needs to be processed. When facing a large amount of real-time sensitive image data encryption and decryption, ensuring both the speed and the security is an urgent demand. This paper proposes an original triple-hybrid encryption system for a real-time sensitive image acquisition chip. This encryption system … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
1
0
1

Year Published

2023
2023
2024
2024

Publication Types

Select...
4
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(2 citation statements)
references
References 62 publications
0
1
0
1
Order By: Relevance
“…Asimetrik kripto sistemlerinden biri olan ve temeli Diffie -Hellman (DH) anahtar değişimine dayanan El Gamal algoritması; Taher Elgamal [23] tarafından önerilmiştir. Ayrık logaritma problemleri önerisi, imzalama yapısı ve şifreleme algoritmasından oluşan şablonuyla çoğu kriptografik yöntemlerin esinlenilen durumunda konumlanmıştır [24,25].…”
Section: şEkil 7 Ecdh Kriptografik Süreci 3222 El-gamalunclassified
“…Asimetrik kripto sistemlerinden biri olan ve temeli Diffie -Hellman (DH) anahtar değişimine dayanan El Gamal algoritması; Taher Elgamal [23] tarafından önerilmiştir. Ayrık logaritma problemleri önerisi, imzalama yapısı ve şifreleme algoritmasından oluşan şablonuyla çoğu kriptografik yöntemlerin esinlenilen durumunda konumlanmıştır [24,25].…”
Section: şEkil 7 Ecdh Kriptografik Süreci 3222 El-gamalunclassified
“…Li et al proposed an original triple-hybrid encryption system for a real-time sensitive image acquisition chip. This encryption system optimizes the symmetric encryption algorithm AES, asymmetric encryption algorithm ECC, and chip authentication algorithm PUF in pursuit of security; AES reduced the hardware area by 60.1%, and ECC reduced the hardware area by 43.4% [15]. However, prevailing hybrid encryption systems often rely on conventional processor architectures, with their acceleration units mostly attached to the CPU's bus as peripherals, failing to fully exploit the flexibility and scalability inherent in the RISC-V instruction set.…”
Section: Introductionmentioning
confidence: 99%