Skip to main content
Top

2022 | OriginalPaper | Chapter

Image Hashing Based on SHA-3 Implemented on FPGA

Authors : Argyrios Sideris, Theodora Sanida, Dimitris Tsiktsiris, Minas Dasygenis

Published in: Recent Advances in Manufacturing Modelling and Optimization

Publisher: Springer Nature Singapore

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

In recent years, in our digital world, images play an essential part in everyday's communication or in remote sensing, so techniques to validate the integrity and correctness of the transmission are required. The most popular technique is hashing. In this article, we focus on the SHA-3 (Keccak) algorithm for hashing images. We use the images of dimensions 256 × 256 pixel for our implementations based on the VHDL. Our implementations were performed on the Intel Arria 10 GX field-programmable gate array (FPGA) and Nios II processor. Also, experimental results such as entropy, number of pixel changing rate (NPCR), and unified averaged changed intensity (UACI), metrics show that the SHA-3 (Keccak) algorithm is reliable, secure and has a high application potential for hashing images. The proposed design aims to improve the criteria of efficiency, security, and throughput. Finally, we augmented our design using the Floating Point Hardware 2 (FPH2) IP Block and we compared the results of our research with other existing architectures.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
2.
go back to reference Swaminathan A, Mao Y, Wu M (2006) Robust and secure image hashing. IEEE Trans Inf Forens Secur 1(2):215–230CrossRef Swaminathan A, Mao Y, Wu M (2006) Robust and secure image hashing. IEEE Trans Inf Forens Secur 1(2):215–230CrossRef
3.
go back to reference Monga V, Banerjee A, Evans BL (2006) A clustering based approach to perceptual image hashing. IEEE Trans Inf Forens Secur 1(1):68–79CrossRef Monga V, Banerjee A, Evans BL (2006) A clustering based approach to perceptual image hashing. IEEE Trans Inf Forens Secur 1(1):68–79CrossRef
4.
go back to reference Ye G, Huang X (2016) A secure image encryption algorithm based on chaotic maps and SHA-3. Secur Commun Netw 9(13):2015–2023 Ye G, Huang X (2016) A secure image encryption algorithm based on chaotic maps and SHA-3. Secur Commun Netw 9(13):2015–2023
5.
go back to reference Ye G, Zhao H, Chai H (2016) Chaotic image encryption algorithm using wave-line permutation and block diffusion. Nonlinear Dyn 83(4):2067–2077MathSciNetCrossRef Ye G, Zhao H, Chai H (2016) Chaotic image encryption algorithm using wave-line permutation and block diffusion. Nonlinear Dyn 83(4):2067–2077MathSciNetCrossRef
6.
go back to reference Mestiri H, Kahri F, Bedoui M, Bouallegue B, Machhout M (2016) High throughput pipelined hardware implementation of the KECCAK hash function. In: 2016 international symposium on signal, image, video and communications (ISIVC) IEEE, 2016, pp 282–286 Mestiri H, Kahri F, Bedoui M, Bouallegue B, Machhout M (2016) High throughput pipelined hardware implementation of the KECCAK hash function. In: 2016 international symposium on signal, image, video and communications (ISIVC) IEEE, 2016, pp 282–286
10.
go back to reference Intel®FPGA (2017) Nios II custom instruction user guide. © Intel Corporation [Online]. Available at: Nios II Custom Instruction User Guide (intel.com). Accessed 22 Jan 2021 Intel®FPGA (2017) Nios II custom instruction user guide. © Intel Corporation [Online]. Available at: Nios II Custom Instruction User Guide (intel.com). Accessed 22 Jan 2021
12.
go back to reference Wu Y, Noonan JP, Agaian S (2011) NPCR and UACI randomness tests for image encryption. Cyber J: Multidiscipl J Sci Technol J Sel Areas Telecommun (JSAT) 1(2):31–38 Wu Y, Noonan JP, Agaian S (2011) NPCR and UACI randomness tests for image encryption. Cyber J: Multidiscipl J Sci Technol J Sel Areas Telecommun (JSAT) 1(2):31–38
Metadata
Title
Image Hashing Based on SHA-3 Implemented on FPGA
Authors
Argyrios Sideris
Theodora Sanida
Dimitris Tsiktsiris
Minas Dasygenis
Copyright Year
2022
Publisher
Springer Nature Singapore
DOI
https://doi.org/10.1007/978-981-16-9952-8_44

Premium Partners