“…The verifications for all the configurations, the throughput can be ranged between 1.59 and 2.25 Gbps with the hardware cost of 0.54 and 3.92 mm2. Comparing with the existing designs [10][11][12][13][14], the performance of proposed design is better than the others in terms of the evaluation index DRPA. Obviously, with the provided high security, the proposed high performance IP is easily integrated for most of the requirement in high quality real-time multimedia applications with acceptable hardware cost.…”
Section: Introductionmentioning
confidence: 90%
“…They are defined as follows: 8,4), (1,9,5), (2,10,6), (3,11,7), (4,12,8), (5,13,9), (6,14,10), (7, 15, …”
Section: The Proposed Cryptographic System 21 Multimedia Cryptographmentioning
Section: The Proposed Cryptographic System 21 Multimedia Cryptographmentioning
confidence: 99%
“…In the following, we provide the performance evaluation of the proposed design and the other existing designs [10][11][12][13][14]. In order to eliminate the factor of different fabrication technologies, we define an index of normalized area (denoted as NArea), which is the silicon area normalized to a 0.35ptm technology as shown as NArea Area (Technology O.35)2 Besides, we also define an index of data rate per area (DRPA), i.e.…”
Section: Hardware Design Of Cmcsmentioning
confidence: 99%
“…Meanwhile, illegal data access has become more serious. Then the data security [1][2][3][4][5][6][7][8] must be a critical and imperative issue. In this paper, based on the Shannon product theory, we have proposed a multimedia cryptographic system (MCS) and its configurable version named CMCS.…”
In this paper, we have proposed a new cryptography system which combines both the position permutation and the value transformation encryption methods. Three good features involve in this system: (1) High security evaluated with the measure of fractal dimension, (2) The content of encrypted image is sensitive to the initial key, and (3) This system can easily defense against the exhaustive search attack. Besides, for the requirement of real-time in multimedia system, we also proposed the high performance reconfigurable architecture for this system as well as the IP core generator software. The proposed IP core generator can be parameterized by the parameters of system-type, packet size, throughput and security to create the proper IP core for the applications. All the architectures generated from the IP core generator have been verified; except for the coding guideline checking, there exist 100% code coverage. According to the UMC 0.18 um cell library, we further verified all the configurations of architecture for speed, area and power consumption as well as delivering the essential scripts. The verifications of all the configurations, the throughput can be ranged between 1.59 and 2.25 Gbps with the hardware cost of 0.54 and 3.92 mm2. Compared with the existing designs, the proposed design possesses performance enough for most of multimedia system applications.
“…The verifications for all the configurations, the throughput can be ranged between 1.59 and 2.25 Gbps with the hardware cost of 0.54 and 3.92 mm2. Comparing with the existing designs [10][11][12][13][14], the performance of proposed design is better than the others in terms of the evaluation index DRPA. Obviously, with the provided high security, the proposed high performance IP is easily integrated for most of the requirement in high quality real-time multimedia applications with acceptable hardware cost.…”
Section: Introductionmentioning
confidence: 90%
“…They are defined as follows: 8,4), (1,9,5), (2,10,6), (3,11,7), (4,12,8), (5,13,9), (6,14,10), (7, 15, …”
Section: The Proposed Cryptographic System 21 Multimedia Cryptographmentioning
Section: The Proposed Cryptographic System 21 Multimedia Cryptographmentioning
confidence: 99%
“…In the following, we provide the performance evaluation of the proposed design and the other existing designs [10][11][12][13][14]. In order to eliminate the factor of different fabrication technologies, we define an index of normalized area (denoted as NArea), which is the silicon area normalized to a 0.35ptm technology as shown as NArea Area (Technology O.35)2 Besides, we also define an index of data rate per area (DRPA), i.e.…”
Section: Hardware Design Of Cmcsmentioning
confidence: 99%
“…Meanwhile, illegal data access has become more serious. Then the data security [1][2][3][4][5][6][7][8] must be a critical and imperative issue. In this paper, based on the Shannon product theory, we have proposed a multimedia cryptographic system (MCS) and its configurable version named CMCS.…”
In this paper, we have proposed a new cryptography system which combines both the position permutation and the value transformation encryption methods. Three good features involve in this system: (1) High security evaluated with the measure of fractal dimension, (2) The content of encrypted image is sensitive to the initial key, and (3) This system can easily defense against the exhaustive search attack. Besides, for the requirement of real-time in multimedia system, we also proposed the high performance reconfigurable architecture for this system as well as the IP core generator software. The proposed IP core generator can be parameterized by the parameters of system-type, packet size, throughput and security to create the proper IP core for the applications. All the architectures generated from the IP core generator have been verified; except for the coding guideline checking, there exist 100% code coverage. According to the UMC 0.18 um cell library, we further verified all the configurations of architecture for speed, area and power consumption as well as delivering the essential scripts. The verifications of all the configurations, the throughput can be ranged between 1.59 and 2.25 Gbps with the hardware cost of 0.54 and 3.92 mm2. Compared with the existing designs, the proposed design possesses performance enough for most of multimedia system applications.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.