• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    FPGA implementation and image encryption application of a new PRNG based on a memristive Hopfield neural network with a special activation gradient

    2022-02-24 09:37:54FeiYu余飛ZinanZhang張梓楠HuiShen沈輝YuanyuanHuang黃園媛ShuoCai蔡爍andSichunDu杜四春
    Chinese Physics B 2022年2期
    關(guān)鍵詞:張梓

    Fei Yu(余飛), Zinan Zhang(張梓楠), Hui Shen(沈輝), Yuanyuan Huang(黃園媛),Shuo Cai(蔡爍), and Sichun Du(杜四春)

    1School of Computer and Communication Engineering,Changsha University of Science and Technology,Changsha 410114,China

    2College of Computer Science and Electronic Engineering,Hunan University,Changsha 410082,China

    A memristive Hopfield neural network (MHNN) with a special activation gradient is proposed by adding a suitable memristor to the Hopfield neural network(HNN)with a special activation gradient.The MHNN is simulated and dynamically analyzed, and implemented on FPGA.Then, a new pseudo-random number generator (PRNG) based on MHNN is proposed.The post-processing unit of the PRNG is composed of nonlinear post-processor and XOR calculator, which effectively ensures the randomness of PRNG.The experiments in this paper comply with the IEEE 754-1985 high precision 32-bit floating point standard and are done on the Vivado design tool using a Xilinx XC7Z020CLG400-2 FPGA chip and the Verilog-HDL hardware programming language.The random sequence generated by the PRNG proposed in this paper has passed the NIST SP800-22 test suite and security analysis,proving its randomness and high performance.Finally,an image encryption system based on PRNG is proposed and implemented on FPGA, which proves the value of the image encryption system in the field of data encryption connected to the Internet of Things(IoT).

    Keywords: memristive Hopfield neural network(MHNN),pseudo-random number generator(PRNG),FPGA,image encryption,decryption system

    1.Introduction

    With the rapid development and large-scale application of the Internet of Things(IoT)technology,a number of issues and challenges have emerged, including greater concern over the secure transmission of private information.[1–5]The secure transmission of private information cannot be achieved without the information security system provided by cryptography.Therefore,pseudo-random number generators(PRNGs),as the most prevalent information security systems in cryptography,are receiving increasing attention from researchers.[6,7]Privacy information, as information data, can be encrypted with the random sequence generated by the PRNG during secure transmission and decrypted using the PRNG’s security key to obtain the correct privacy information at the end of the transmission.

    Chaotic systems, the most common source of entropy in PRNGs, have randomness and high sensitivity to initial conditions.As a consequence, many chaotic systems possessing abundant dynamical behaviors have been investigated in recent years.[8–13]As a fourth circuit element with natural non-linearity and plasticity, memristors can easily be combined with chaotic system circuits to construct chaotic systems based on memristors.[14–22]Currently, chaotic systems have been used in a wide range of applications such as neural network chaotic systems,[23–32]secure communications,[33–37]synchronization,[38–40]PRNG,[41–44]image encryption,[45–53]and fractional-order chaotic system.[54–56]In recent years,the combination of memristors and neural network chaotic systems to form a memristive neural network model has attracted a lot of research and discussion.[57–59]Xiuet al.[58]proposed a five-dimensional memristive cellular neural network(CNN)hyperchaotic system,and used the chaotic system to synchronise and design a secure communication system, in which a sliding mode control method was used to enhance the robustness to system parameter uncertainties and disturbances.Zhanget al.[59]developed a novel memristive Hopfield neural network(HNN)model with multiple double vortex attractors, in which a non-ideal flux-controlled memristor model was used to replace the synapses of the HNN and applied to pseudo-random generators and image encryption.While the above are memristive neural network chaotic systems and their applications, there has been little research into PRNGs based on memristive neural network chaotic systems and their implementation on FPGA.

    In recent years,PRNGs based on neural network chaotic systems have become a hot research topic as a variety of neural network chaotic system structures have been proposed.[60–62]Yanget al.[61]proposed a fractional order HNN chaotic system using the Caputo definition and HNN chaotic system,analyzed the rich dynamical behavior of the system, and implemented the digital circuit of the system based on a DSP platform.Finally, as a source of entropy for PRNG.Tlelo–Cuautleet al.[62]proposed an artificial neural network chaotic system using Hopfield and Hindmarsh–Rose as neurons, which passed the NIST test after implementation on FPGA.Finally, it was applied in image encryption.However,so far there has been no research on the implementation of PRNGs based on the memristive Hopfield neural networks(MHNN) with a special activation gradient on FPGAs, and equally few engineering applications of PRNGs implemented on FPGAs have been reported.

    In this work, a PRNG based on an MHNN is proposed,in which the post-processing unit consists of a nonlinear postprocessor and an XOR calculator to improve the randomness of the resulting random sequence.First,the MHNN is discretised for FPGA implementation and a detailed dynamics analysis of the discretised system is carried out.The MHNN is implemented on FPGA and compared with the simulated phase diagram in MATLAB to determine the effectiveness of the implementation.Next,a PRNG based on the MHNN is designed and implemented on the FPGA.The random sequence generated by the PRNG is analysed for security and the randomness of this PRNG is demonstrated.Finally, an image encryption and decryption system based on this PRNG is designed and implemented on FPGA.Through simulation on MATLAB and image security analysis,the value of the PRNG in the field of IoT-related data encryption is determined.

    The rest of the paper is presented below.Section 2 analyses the discretized numerical model of the MHNN and implements it on an FPGA.Section 3 describes the structure and flow of the designed PRNG, giving the chip resource utilisation and rate after implementation on FPGA.Section 4 presents security analysis and randomness analysis of the random sequence generated by the PRNG.Section 5 describes the image encryption and decryption system based on the PRNG proposed in this paper and implemented on an FPGA.Finally,Section 6 concludes the full paper.

    2.Introduction and FPGA implementation of MHNN with a special activation gradient

    Neurons, as the basic building blocks of the brain, are capable of generating abundant dynamical behaviors, and the HNN that it constitutes is an extremely significant nonlinear dynamical model in artificial neurology.The MHNN, constructed by introducing a memristor, has a more complex dynamical behavior that allows the system to offer great flexibility and thus be more suitable for engineering applications.Recently, Baoet al.[28]proposed an HNN with an adjustable gradient of neuron activation,as shown below:

    where the state variablesx,y,zdenote the three neurons of the neural network,andris the gradient control parameter of the neuron activation function.Meanwhile, the memristor function of an ideal active flux-controlled memristor with absolute value nonlinearity can be expressed as

    By adding the memristor represented by Eq.(2) to the second equation of the system of Eq.(1),a novel MHNN can be built,which is mathematically modeled as

    Same as Eq.(1), μ = [x,y,z]Tdenote the neuron state vectors of MHNN.In MHNN,neurons have connection synaptic weights between them, which are represented by the system parametersa,b,c,d,e,f,g,h,respectively.wis the internal dimensionless state variable of the memristor and α,β,k,m,nare the internal parameters of the memristor.tanh(ri)denotes the neuron activation function with an adjustable activation gradient,whereris the activation gradient control parameter.

    FPGA, as an efficient chip design tool, is able to transform the system model from software to hardware successfully by using special design algorithms in MATLAB.In this paper,the Runge–Kutta 4th-order(RK4)design algorithm is used to realize the discretization of the system model.The specific algorithm is as follows:

    In this paper,the iteration step size is Δh=0.01.R(i)=(x(i),y(i),z(i),w(i)) is the output value of the state variable in thei-th iteration and the input value of the next iterationR(i+1)=(x(i+1),y(i+1),z(i+1),w(i+1)).Similarly,the limitation of the number of logic gates in the FPGA chip poses some challenges to the implementation of the hyperbolic tangent function.Kwanet al.[63]proposed a second-order piecewise function for replacing the hyperbolic tangent function as the activation function, which enables the numerical implementation of the MHNN model.The second-order piecewise function is shown in below:

    2.1.Simulation and dynamics analysis of system models

    In this part, the simulation and analysis of the system are based on the MATLAB platform using the RK4 algorithm of Eq.(4) and the alternative activation function of Eq.(5).In Eq.(3), we set the parameters of the system and the memristor asa=1.5,b=2.9,c=0.7,d=2,e=1.18,f=2.977,g=22,h=0.49,k=0.1,α =1,β =1,m=0.5,n=1.When the initial condition and step size are chosen as(x(0),y(0),z(0),w(0))=(0,1,0,0)and Δh=0.01,respectively.The finite-time Lyapunov exponent spectrum when the activation gradient control parameterr∈(0.8,1.4)is shown in Fig.1.It is obvious from Fig.1.that whenr=1.3,the system has a Lyapunov exponentL1as positive,L2is equal to 0,L3,andL4as negative.At this time,the system is in a chaotic state andL1=0.4496,L2=0.007,L3=?0.472,L4=?0.998.In Eq.(1), the initial condition (x′(0),y′(0),z′(0))=(0,1,0) is selected, and the corresponding Lyapunov exponent is=0.3182,=0.0185,=?0.4349.The Lyapunov index represents the periodic separation rate of the chaotic system,and the separation rate increases with the increase of the Lyapunov index.Therefore,it can be seen fromL1≥that MHNN has a better separation rate.

    Fig.1.The Lyapunov exponential spectrum of the activated gradient control parameter r ∈(0.8,1.4).

    Fig.2.Phase diagram obtained by MHNN in MALTBA platform using the RK4 algorithm and alternative activation functions.(a) Phase diagram projected on z–x plane;(b)phase diagram projected on z–y plane.

    In Fig.2,the phase diagram trajectory obtained from the MATLAB numerical simulation can be observed,from which the chaotic behavior inscribed by different types of singular attractors can be revealed.The series diagram of state variablesxandyover time is shown in Fig.3.

    Fig.3.Time series diagram of state variables.(a)State variable x; (b)state variable y.

    2.2.FPGA-based implementation of MHNN

    FPGA design tools have rich hardware resources, such as input and output units, ram, logic units,etc., which provide guarantee for the implementation of MHNN.In this section,the RK4 design algorithm and alternative activation functions are implemented in the vivado design suite using the Verilog HDL language and adders/subtracters,multipliers,and floating-point operators in the IP catalog,and the RK4 design algorithm file is set as a top file.dx, dy, dz, and dwfiles are designed to correspond to the four dimensions of MHNN respectively,and are called by the top file to complete the implementation of FPGA.All operations in this experiment complies with IEEE 754-1985 high precision 32-bit floating point standard.

    The flow of the FPGA-based implementation of MHNN is shown in Fig.4.Rst and Clk are the reset signal and clock signal respectively.The step size and initial conditions at the MHNN iteration need to be assigned in the top header file,where Δh=0.01 and(x(0),y(0),z(0),w(0))=(0,1,0,0).The output vector (x(i),y(i),z(i),w(i)) generated by thei-th iteration of the MHNN chaotic oscillator will be input to the floating point to fixed point unit to generate the desired phase value,and finally the corresponding bitstream file will be generated by the digital-to-analog conversion module of the Xilinx XC7Z020CLG400-2 FPGA chip.Meanwhile, the output vectors (x(i),y(i),z(i),w(i)) will be used as the initial values for the next iteration.The end of each iteration of the MHNN chaotic oscillator is controlled by the Clk time control signal.Figure 5 shows the simulation results of MHNN in the Vivado design suite.The bitstream file of the corresponding phase is transmitted to the oscilloscope, and the result is shown in Fig.6.Figures 6(a) and 6(b) show the phase diagram of MHNN chaotic system.Figures 6(c) and 6(d) show the experiment environment of oscilloscope and development board.The simulation results and experimental results of Vivado design suite are consistent with the simulation results of MALTAB software,which show that the MHNN chaotic system based on FPGA is feasible.

    Fig.4.Flow diagram of MHNN implementation with FPGA.

    Fig.5.The simulation results of MHNN in the Vivado design tool.

    Fig.6.Experimental results of the MHNN chaotic system based on FPGA.(a)Phase diagram projected on z–x plane; (b)phase diagram projected on z–y plane;(c)and(d)the environments of phase diagram experiment.

    3.Design and FPGA implementation of digital PRNG

    3.1.The design of PRNG based on MHNN

    In this part, a novel PRNG is proposed by combining the nonlinear post-processor proposed in Ref.[43] and the characteristics of MHNN in this paper.The workflow of the PRNG is shown in Fig.7.As the entropy source of PRNG, the MHNN chaotic oscillator provides random numbers for post-processing unit, where step size Δh=0.01 and initial condition(x(0),y(0),z(0),w(0))=(0,1,0,0).(x(i),y(i),z(i),w(i)),as the output vector of entropy source,enters the post-processing unit under the control of CLK clock control signal.The specific steps of the post-processing unit are as follows:

    Step 1According to the IEEE 754-1985 high precision 32-bit floating point standard,the fractional part of a floating point number is more random.Therefore,in the nonlinear post-processor,the 10th to 31st bits of the input vector are retained,and the output is

    Step 2The first λ and last 22 ?λ bits of the output vector are swapped by translation, respectively, as shown in Fig.8,where the 0-th and 23-rd bits ofx(I)are XORed to obtainQ.IfQ=1,then λ =8,and otherwise,λ =9.The output vector

    is obtained.

    Step 3The vectors

    are fed into the XOR.Because the Lyapunov index of the first dimension of MHNN chaotic oscillator is the largest.Therefore,x(i)(22:1)is used for bitwise XOR with

    respectively.Finally,each iteration produces a random sequence of 88 bits.

    In the random sequence quantization unit,the desired random sequence is finally obtained by several iterations.

    Fig.7.Workflow diagram of the PRNG.

    Fig.8.Schematic diagram of position exchange of nonlinear post processor.

    3.2.Implementation of the PRNG based on FPGA

    In this part, the MHNN chaotic oscillator is synthesized as the entropy source of PRNG by using RK4 design algorithm and alternative activation function for a Xilinx XC7Z020CLG400-2 FPGA chip.The behavior simulation results of PRNG based on MHNN are obtained by Vivado design tools,as shown in Fig.9,where x_reg represents the output of the random sequence.Table 1 shows the chip resource consumption and clock frequency required for the synthesis of the proposed PRNG.Finally,the bit stream generated by the random sequence is obtained and displayed on an oscilloscope,as shown in Fig.10.

    Table 1.Statistical results of chip resource consumption and clock frequency.

    Fig.9.The behavior simulation results of PRNG based on MHNN on Vivado design suite.

    Fig.10.Experimental results of the MHNN-based PRNG implemented on an FPGA are shown on an oscilloscope.

    4.Safety analysis

    4.1.Randomness test

    Today,more and more PRNGs is being used in areas such as key data and encryption programs.As a consequence, the quality of the random sequences generated by PRNGs is increasingly required.To meet this request, the National Institute of Standards and Technology(NIST)has published NIST SP800-22, a randomness test standard for application to random sequences and PRNGs.[64]This standard contains 15 statistical tests, all of which are evaluated by aP-value, with aP-value greater than 0.01 indicating that the test results meet the standard; otherwise, the test results do not meet the standard.The order of the 15 statistical tests in the test suite is arbitrary.However, frequency tests are normally given priority because this statistical test provides the most basic guarantee for randomness and inhomogeneity of random sequences.If this statistical test fails, other statistical tests are likely to fail as well.Finally,the test suite was developed in ANSI C.

    In this paper, the MHNN-based PRNG implemented by FPGA generates a 100-Ms bit random sequence and saves the random sequence in a text file.First, we opened the NIST SP800-22 test suite and set each group of random sequences to 1-M bit.Then,in the test suite,select the address of the text file to save the random sequence and set the number of random sequence groups.Finally, set the random sequence type to binary.The results are shown in Table 2.

    Table 2.The randomness test results of the MHNN-based PRNG implemented in FPGA.

    4.2.Key space test

    The PRNGs based on neural network chaotic systems each have their own key space,the size of which is positively related to the length of the PRNG key.When the key length isn, the key space is 2n.Currently, PRNG key space is required to be greater than 2128in order to resist the exhaustive attack of high computing power computers.The initial conditions and system parameters of MHNN based on FPGA are set according to IEEE 745-1985 high-precision 32-bit floating point standard, which can ensure the randomness and security of PRNG.Therefore,the key lengthn=512 of the PRNG proposed in this paper makes the key space 2512greater than 2128.It shows that the MHNN-based PRNG implemented on FPGAs can effectively resist exhaustive attacks.

    4.3.Key sensitivity test

    Key sensitivity analysis can show the influence of small changes in initial conditions or system parameters on the corresponding output of a chaotic system.MHNN chaotic system has key sensitivity based on chaos.Therefore, MHNN-based PRNGs can be subjected to key sensitivity analysis.The bit conversion rate is used to evaluate the sensitivity of binary random sequence keys.The calculation formula is as follows:

    Here,{B1(k)} represents the random sequence generated by PRNG under normal conditions, and {B2(k)}represents the random sequence generated when the initial conditions of PRNG or system parameters change slightly.The length of the two random sequences is represented byN.The length of the random sequence tested in this paper isN=840 kB.The bit conversion rateBtis used as the result of the key sensitivity test,and the best result of the test is whenBt=50%.Table 3 shows the bit conversion rate of PRNG proposed in this paper.Where,I′anda′are the initial conditions and parameters added by 10?8respectively.On the basis of the changed initial conditionI′and parametera′,two random sequences {} and {} were generated,which were subjected to the bit conversion rate calculation with {B1(k)} respectively to obtain the resultBt≈50%.Small changes in the system parameters or initial conditions will directly cause changes in the chaotic sequence of the MHNN chaotic system, as shown in Fig.11.So the proposed PRNG has a high key sensitivity and meets the test requirements.

    Table 3.The bit conversion rate is obtained under the conditions of I′and a′.

    Fig.11.Time-series diagram of the first dimension x of the MHNN chaotic system when the initial conditions I′and the system parameters a′.(a)Timeseries diagram of x when the initial conditions change to I′.(b)Time-series diagram of x when the initial conditions change to a′.

    4.4.Auto-correlation and cross-correlation test

    Auto-correlation and cross-correlation are collectively referred to as correlation, which is used to assess the similarity of the random sequences generated by PRNG after shift.The correlation between random sequences after shift is calculated by the following formula:

    wherejis the number of shifts in the random sequence andR(j)∈[?1,1]denotes the correlation of the random sequence after a shift ofjbits.In this section,the random sequence used for testing is consistent with the random sequence used for key sensitivity analysis.In auto-correlation,the random sequence {B1(k)} is shifted byjbits to obtain the random sequence {B1(k)}′.SandDdenote the number of elements that are the same and the number of elements that are different between {B1(k)} and {B1(k)}′, respectively.In cross-correlation, the random sequence {B1(k)} is compared with the constantly shifted random sequence,withSandDdenoting the number of identical elements and the number of different elements between the two random sequences, respectively.Nis the number of elements of the random sequence being tested.In addition, whenSandDtend to be the same,R(j)tends to 0.Therefore,R(j)=0 is the ideal result of the correlation.

    Fig.12.The correlation analysis diagram of random sequence generated by PRNG based on FPGA.(a) The auto-correlation analysis diagram.(b) The cross-correlation analysis diagram.

    In this part, the correlation analysis diagram is obtained based on the calculation of Eq.(7),as shown in Fig.12.Figure 12(a) is the auto-correlation analysis diagram of random sequence {B1(k)} withN=840 kB,figure 12(b)is the crosscorrelation analysis of random sequence {B1(k)} and {B12(k)} withN=840 kB.From Fig.12,R(j)tends to 0 whenj/=0.Therefore,the random sequence generated by the FPGA-based PRNG proposed in this paper has a very low correlation.

    5.Application of PRNG in image encryption

    As the IoT continues to develop,more and more new applications are revolutionising people’s lives,such as the Internet of Vehicles and the Internet of Medical Things.However,the proliferation of IoT applications is likely to generate large amounts of private data and it is therefore extremely essential to ensure the security of data transmission.[65–67]Image encryption systems,as a basic application of PRNG based on chaotic systems, can provide security for the transmission of image data.[68–70]In this section,an image encryption and decryption system is designed using the MHNN-based PRNG proposed in this paper and implemented on an FPGA.In order to ensure the feasibility and security of the image encryption and decryption system,the system will be simulated and security analysed on MATLAB software.

    5.1.Structure design and security analysis of encryption and decryption system

    he architecture structure diagram of the image encryption and decryption system implemented on FPGA designed in this paper is shown in Fig.13.According to the structure diagram,we can obtain the system operation steps as follows.

    Fig.13.FPGA-based image encryption and decryption system architecture diagram.

    Step 1In this experiment, a 256×256 24-bit depth true colour image of “Lena” is used as the original image.Since each pixel of the image “Lena” is 24-bit of binary data, each pixel is divided into three 8-bit data,resulting in theR,G,andBbit planes.The binary data of the three bit planes is stored in the chip data RAM and connected to the monitor via the VGA display controller.

    Step 2The MHNN-based PRNG implemented on the FPGA generates 88-bit binary random numbers per iteration,so the binary random numbers generated by the iterations are divided into eight 11-bit binary data and performed self-XOR operations in turn,resulting in eight binary random numbers.Thus, by entering the correct key into the PRNG, three 524288-bit binary random sequencesR1,R2, andR3are obtained by iteration.

    Step 3In the image encryption system, the diffusion of the original image data is achieved byR⊕R1=R′,G⊕R2=G′,andB⊕R3=B′where ⊕denotes the XOR operation.The new three bit-planeR′,G′, andB′data obtained are stored in the chip data RAM as the encrypted image data.Finally,it is displayed on the monitor using the VGA display controller.

    Step 4In the decryption system,the PRNG with the correct key generates the random sequencesR1,R2andR3.The diffusion is completed byR′⊕R1=R,G′⊕R2=G, andB′⊕R3=Bto obtain the decrypted image data,which is stored in the chip data RAM.Finally, the connection to the monitor is made by the VGA display controller.

    The simulation result on MATLAB platform,as shown in Fig.14.Figures 14(a)and 14(b)are the original image and the encrypted image, respectively.Figure 14(c)is the decryption image after obtaining the correct key.

    Fig.14.The simulation results of image encryption and decryption systems:(a)original image;(b)encryption image,and(c)decryption image.

    The result of security analysis is an important index to evaluate the security and encryption performance of an image encryption and decryption system based on PRNG.The security analysis of this experiment includes histogram analysis,differential key attack analysis,and entropy analysis.The specific analysis is as follows:

    (i) Histogram analysis: The whole process of image encryption and decryption system proposed in this paper is based on binary series, so the system has similar encryption performance for any image to be encrypted.Histogram represents the digital spectrum of image data, and the ideal spectrum of encrypted image should be evenly distributed.The histogram analysis results are shown in Fig.15.Figures 15(a)and 15(c)show the original image and its histogram, and figures 15(b)and 15(d) show the encrypted image and the corresponding histogram.Figure 15(d) shows that the data frequencies of the encrypted images are uniformly distributed.Therefore,the proposed image encryption and decryption system has a high encryption performance.

    Fig.15.The histogram analysis results.Panels (a) and (b) are the original image and the encrypted image;panels(c)and(d)are histograms of the original image and the encrypted image.

    (ii) Differential key attack analysis: Differential key attack is an attack method in which a finite number of incorrect key results with tiny differences are analysed to finally arrive at the correct key.The differential key attack analysis evaluates the impact of distinct keys on the encrypted image by two metrics, the Number of Pixel Change Rate (NPCR) and the Uniform Average Change Intensity(UACI).The formulae for NPCR and UACI are shown below:

    whereM,N=256,andD=24 are the image pixel depths.P1is the binary data sequence of the encrypted image obtained with the correct key,andP2is the binary data sequence of the encrypted image obtained with the key whose initial condition becomes(10?8,1,0,0).The results of the differential key attack analysis,as shown in Table 4,are more satisfactory.

    Table 4.The results of NPCR and UACI in differential key attack analysis.

    (iii) Entropy analysis: Information entropy is used to analyse the complexity and randomness of image encryption and decryption systems.The result of information entropy can be calculated using

    The calculation of information entropy requires that the binary image data is first converted to decimal data in units of 8 bits.T(i) is the frequency of occurrence of decimal image data in the range 0 to 255.Since each pixel in the bit plane is 8 bits, the closer the information entropy calculation result is to 8,the better.The calculation results of this experiment are shown in Table 5.The results show that the image encryption and decryption system proposed in this paper has high complexity and randomness.

    Table 5.The calculation results on information.

    (iv) Correlation analysis of adjacent pixels: The performance of image encryption system is related to the correlation of adjacent pixels of the image before and after encryption.Because the adjacent pixels of the image before encryption have high correlation, a high security image encryption system can effectively reduce the correlation of adjacent pixels of the image after encryption.Because the adjacent pixels of the image before encryption have high correlation,a high security image encryption system can effectively reduce the adjacent pixel correlation of the encrypted image.In this experiment,we select the first 196607 bits pixel of the image asS1and the last 196607 bits pixel asS2, and calculate the correlation coefficients of adjacent pixels of the image before and after encryption through Eq.(12), whereandare the average,n=196607.The results are shown in Table 6.Because the closer the correlation coefficient is to 0,the lower the correlation is, the image encryption system has high encryption performance.

    Table 6.Correlation analysis results of adjacent pixels.

    5.2.The FPGA implementation

    This experiment was done on the Vivado design tool,using Verilog-HDL as the hardware design language.The Xilinx XC7Z020CLG400-2 FPGA chip provided the chip data RAM and the VGA display controller for the experiment.The system structure and experimental flow are consistent with those of the simulation on the MATLAB software platform.The experimental results are shown in Fig.16.Figure 16(a)shows the original and encrypted images displayed by the system when the correct key is entered,and figure 16(b)shows the decryption results of the system when the correct key is obtained.With the results, it can be seen that the system is of great research value in data encryption related to the IoT.

    Fig.16.The PRNG-based image encryption and decryption system implemented on FPGA.Panel (a) is the encryption system and panel (b) is the decryption system.

    6.Conclusion

    In this paper, a PRNG based on MHNN is proposed and implemented on the Vivado design tool using the Xilinx XC7Z020CLG400-2 FPGA chip.the post-processing unit of the PRNG consists of a nonlinear post-processor and an XOR calculator,which also requires the MHNN chaotic oscillator’s the first dimensional output is used as input data as a way to improve the randomness of the PRNG implemented on the FPGA.The experimental results show that the PRNG produces a random sequence of 88 bits per iteration,with an output rate of up to 9.1221 Mbit/s.The security and high performance of the PRNG is confirmed by security analysis.Finally,the PRNG-based image encryption and decryption system was designed and passed the image security analysis,demonstrating the value of this PRNG in the field of IoT-related data encryption.

    Acknowledgments

    Project supported by the Scientific Research Fund of Hunan Provincial Education Department (Grant No.21B0345),the Postgraduate Scientific Research Innovation Project of Changsha University of Science and Technology (Grant Nos.CX2021SS69 and CX2021SS72), the Postgraduate Scientific Research Innovation Project of Hunan Province,China(Grant No.CX20200884), the Natural Science Foundation of Hunan Province, China (Grant Nos.2019JJ50648,2020JJ4622, and 2020JJ4221), the National Natural Science Foundation of China (Grant No.62172058), and the Special Funds for the Construction of Innovative Provinces of Hunan Province,China(Grant Nos.2020JK4046 and 2022SK2007).

    猜你喜歡
    張梓
    My Summer Holiday
    蝸?!白呗仿敝i
    Unchangeable Greeting
    兩雙腳丫
    我和紅領(lǐng)巾的故事
    張梓瑜:一分耕耘 一分收獲
    媽媽的同學(xué)會(huì)
    張梓澳
    小兔出逃記
    抓水母
    中国三级夫妇交换| 伊人久久国产一区二区| 亚洲久久久国产精品| 美女脱内裤让男人舔精品视频| freevideosex欧美| 在线观看国产h片| 国产精品嫩草影院av在线观看| 免费看日本二区| 欧美高清成人免费视频www| 国产有黄有色有爽视频| 七月丁香在线播放| 美女内射精品一级片tv| 亚洲精品一区蜜桃| 成人亚洲精品一区在线观看| 精华霜和精华液先用哪个| 久久午夜综合久久蜜桃| 性色av一级| 午夜视频国产福利| 永久免费av网站大全| 日韩大片免费观看网站| 老司机亚洲免费影院| 久久久久久久久久久丰满| 九草在线视频观看| 日韩不卡一区二区三区视频在线| 大片免费播放器 马上看| 国产无遮挡羞羞视频在线观看| 欧美变态另类bdsm刘玥| 亚洲一区二区三区欧美精品| 欧美少妇被猛烈插入视频| 五月天丁香电影| 在线观看人妻少妇| 国产精品久久久久久久电影| 亚洲精品久久午夜乱码| 成年人午夜在线观看视频| 国产亚洲一区二区精品| 国产欧美日韩一区二区三区在线 | 国产伦精品一区二区三区视频9| 成人国产麻豆网| 色吧在线观看| 久久久精品94久久精品| 亚洲精品久久午夜乱码| 美女福利国产在线| 高清av免费在线| 亚洲成人手机| 婷婷色综合www| 亚洲国产欧美日韩在线播放 | 夫妻性生交免费视频一级片| 日本黄大片高清| 一本—道久久a久久精品蜜桃钙片| 精品卡一卡二卡四卡免费| 熟妇人妻不卡中文字幕| 成人亚洲精品一区在线观看| 免费不卡的大黄色大毛片视频在线观看| 在线观看免费高清a一片| 18禁动态无遮挡网站| 欧美高清成人免费视频www| 老司机影院毛片| 精品人妻一区二区三区麻豆| 观看美女的网站| 黑人猛操日本美女一级片| 在线观看国产h片| 啦啦啦视频在线资源免费观看| av不卡在线播放| 人妻系列 视频| 99久久人妻综合| 日韩欧美一区视频在线观看 | 免费不卡的大黄色大毛片视频在线观看| 国产精品一区二区在线不卡| 欧美性感艳星| 人妻人人澡人人爽人人| 人妻系列 视频| 熟妇人妻不卡中文字幕| 午夜视频国产福利| 国产白丝娇喘喷水9色精品| 两个人的视频大全免费| 亚洲国产精品一区三区| 欧美日韩亚洲高清精品| 国产有黄有色有爽视频| 午夜久久久在线观看| 下体分泌物呈黄色| 欧美变态另类bdsm刘玥| 欧美bdsm另类| 免费观看的影片在线观看| 又黄又爽又刺激的免费视频.| 在线天堂最新版资源| 搡女人真爽免费视频火全软件| 精品少妇内射三级| 免费少妇av软件| 国产精品一区二区性色av| 免费久久久久久久精品成人欧美视频 | 少妇被粗大的猛进出69影院 | 久热这里只有精品99| 欧美精品一区二区大全| 伦理电影免费视频| 欧美 日韩 精品 国产| 国产欧美亚洲国产| 精品一区二区免费观看| av不卡在线播放| 精品一品国产午夜福利视频| 欧美日韩视频精品一区| 少妇猛男粗大的猛烈进出视频| 国产欧美日韩一区二区三区在线 | 99久久中文字幕三级久久日本| 亚洲精品国产av成人精品| 国产免费又黄又爽又色| 免费人妻精品一区二区三区视频| 91在线精品国自产拍蜜月| 国产91av在线免费观看| 寂寞人妻少妇视频99o| 亚洲内射少妇av| 亚洲欧美日韩另类电影网站| 亚洲中文av在线| 精品一区二区免费观看| 亚洲欧美清纯卡通| 亚洲美女搞黄在线观看| 肉色欧美久久久久久久蜜桃| 爱豆传媒免费全集在线观看| av国产精品久久久久影院| 国产深夜福利视频在线观看| 欧美三级亚洲精品| 99九九线精品视频在线观看视频| 亚洲不卡免费看| 人体艺术视频欧美日本| 日韩av免费高清视频| 少妇人妻精品综合一区二区| 日韩熟女老妇一区二区性免费视频| 色吧在线观看| 丰满饥渴人妻一区二区三| 日韩,欧美,国产一区二区三区| 99热国产这里只有精品6| 成人无遮挡网站| 国产免费又黄又爽又色| 久久99蜜桃精品久久| 少妇猛男粗大的猛烈进出视频| 久久久国产欧美日韩av| 中文欧美无线码| 啦啦啦视频在线资源免费观看| 久久久国产欧美日韩av| 最新的欧美精品一区二区| 久久精品久久精品一区二区三区| 伊人久久国产一区二区| av在线观看视频网站免费| 91在线精品国自产拍蜜月| 国产日韩欧美亚洲二区| 日产精品乱码卡一卡2卡三| 国产av国产精品国产| 中文在线观看免费www的网站| 欧美精品一区二区大全| av国产精品久久久久影院| av在线app专区| 永久免费av网站大全| 9色porny在线观看| 在线观看人妻少妇| 少妇人妻一区二区三区视频| 国产老妇伦熟女老妇高清| 亚洲精品一区蜜桃| 永久网站在线| 亚洲精品国产色婷婷电影| 久久精品国产亚洲网站| 亚洲人成网站在线观看播放| 欧美+日韩+精品| 日日啪夜夜爽| 高清午夜精品一区二区三区| 亚洲欧美精品自产自拍| 亚洲美女黄色视频免费看| 91aial.com中文字幕在线观看| 精品久久久久久电影网| 亚洲成人手机| 亚洲国产精品成人久久小说| 丁香六月天网| 久久精品熟女亚洲av麻豆精品| 你懂的网址亚洲精品在线观看| 一级毛片 在线播放| 欧美另类一区| 婷婷色综合www| 狠狠精品人妻久久久久久综合| 午夜视频国产福利| 22中文网久久字幕| 各种免费的搞黄视频| 久久青草综合色| av不卡在线播放| 亚洲精品一区蜜桃| 午夜视频国产福利| 欧美精品人与动牲交sv欧美| 99久久中文字幕三级久久日本| 一二三四中文在线观看免费高清| 99热全是精品| 精品一品国产午夜福利视频| 国产成人精品久久久久久| 精品国产一区二区久久| 我要看日韩黄色一级片| 在线 av 中文字幕| 在线观看人妻少妇| 精品国产一区二区三区久久久樱花| 观看av在线不卡| 久久午夜综合久久蜜桃| av卡一久久| 这个男人来自地球电影免费观看 | 午夜av观看不卡| 最近手机中文字幕大全| 精品酒店卫生间| 精品午夜福利在线看| 秋霞在线观看毛片| 全区人妻精品视频| 久久青草综合色| 又黄又爽又刺激的免费视频.| 久久99蜜桃精品久久| 一区二区三区免费毛片| 国产在线视频一区二区| 午夜久久久在线观看| 国产无遮挡羞羞视频在线观看| 99视频精品全部免费 在线| 亚洲欧洲日产国产| av线在线观看网站| av播播在线观看一区| 亚洲精品国产av成人精品| 亚洲无线观看免费| 国产男女内射视频| 蜜桃久久精品国产亚洲av| 久久久亚洲精品成人影院| 国产高清有码在线观看视频| 国产欧美日韩精品一区二区| 亚洲伊人久久精品综合| 晚上一个人看的免费电影| 男女免费视频国产| 欧美性感艳星| 欧美变态另类bdsm刘玥| 日韩三级伦理在线观看| 男人狂女人下面高潮的视频| 精品人妻偷拍中文字幕| 老司机亚洲免费影院| 国产成人freesex在线| 五月玫瑰六月丁香| 一级av片app| 纵有疾风起免费观看全集完整版| 国产精品久久久久久av不卡| 亚洲久久久国产精品| 日韩中文字幕视频在线看片| 高清毛片免费看| 国产精品国产三级专区第一集| av国产久精品久网站免费入址| 欧美变态另类bdsm刘玥| 777米奇影视久久| 成人二区视频| 国产亚洲5aaaaa淫片| 能在线免费看毛片的网站| 18+在线观看网站| 精品一区二区免费观看| 亚洲av综合色区一区| 高清黄色对白视频在线免费看 | 你懂的网址亚洲精品在线观看| 久久人人爽av亚洲精品天堂| 久久久精品免费免费高清| 日韩精品有码人妻一区| 麻豆成人午夜福利视频| 亚洲成色77777| 青春草亚洲视频在线观看| 丁香六月天网| 久久精品国产自在天天线| 下体分泌物呈黄色| 国产av码专区亚洲av| 国产视频首页在线观看| 成人综合一区亚洲| 亚洲av.av天堂| 99热6这里只有精品| 欧美日韩综合久久久久久| 成人18禁高潮啪啪吃奶动态图 | 国产精品国产av在线观看| 九九久久精品国产亚洲av麻豆| 国产日韩欧美视频二区| 国产免费一级a男人的天堂| 人人妻人人添人人爽欧美一区卜| 欧美精品高潮呻吟av久久| 国产黄频视频在线观看| 日韩亚洲欧美综合| 高清午夜精品一区二区三区| 黄色毛片三级朝国网站 | 国产免费视频播放在线视频| 日日摸夜夜添夜夜添av毛片| 自拍欧美九色日韩亚洲蝌蚪91 | 欧美精品国产亚洲| 亚洲精品一区蜜桃| 精品久久久久久久久亚洲| 色婷婷久久久亚洲欧美| 全区人妻精品视频| 99九九在线精品视频 | 国模一区二区三区四区视频| 精品酒店卫生间| 一级毛片电影观看| 国产高清三级在线| 亚洲怡红院男人天堂| 嘟嘟电影网在线观看| 边亲边吃奶的免费视频| 美女cb高潮喷水在线观看| 麻豆成人av视频| 精品久久国产蜜桃| 男人添女人高潮全过程视频| 色吧在线观看| 亚洲图色成人| 国产黄色免费在线视频| 日韩 亚洲 欧美在线| 精品熟女少妇av免费看| 在线观看免费高清a一片| 国产精品人妻久久久久久| 18禁裸乳无遮挡动漫免费视频| 纯流量卡能插随身wifi吗| 欧美精品人与动牲交sv欧美| 99久久精品国产国产毛片| 国产在线视频一区二区| 国产高清国产精品国产三级| 免费黄网站久久成人精品| 亚洲电影在线观看av| 日韩强制内射视频| 成年av动漫网址| 高清黄色对白视频在线免费看 | 国产免费一级a男人的天堂| 毛片一级片免费看久久久久| 国产伦在线观看视频一区| 久久人人爽人人爽人人片va| 少妇精品久久久久久久| 我的女老师完整版在线观看| 极品少妇高潮喷水抽搐| 人人妻人人澡人人看| 欧美3d第一页| 亚洲美女黄色视频免费看| 国产 精品1| 久久国产精品大桥未久av | 免费观看在线日韩| 亚洲国产最新在线播放| 成人亚洲精品一区在线观看| 国产免费一区二区三区四区乱码| 伦理电影大哥的女人| 国产高清国产精品国产三级| 国产精品人妻久久久久久| 国产亚洲午夜精品一区二区久久| h视频一区二区三区| 国产极品天堂在线| 色视频在线一区二区三区| 韩国高清视频一区二区三区| kizo精华| 男人舔奶头视频| 久久久精品94久久精品| 亚洲精品成人av观看孕妇| 中国美白少妇内射xxxbb| 日本与韩国留学比较| 天美传媒精品一区二区| 极品教师在线视频| 亚洲成人av在线免费| 精品午夜福利在线看| 久久久久国产精品人妻一区二区| 人妻一区二区av| 精品国产乱码久久久久久小说| 国产高清有码在线观看视频| 在线亚洲精品国产二区图片欧美 | 久久久久精品久久久久真实原创| 国产欧美日韩一区二区三区在线 | 久久韩国三级中文字幕| 久久久国产精品麻豆| 综合色丁香网| 中国美白少妇内射xxxbb| 在线观看国产h片| 久久毛片免费看一区二区三区| 国产男人的电影天堂91| av在线老鸭窝| 久久久久视频综合| 国产免费又黄又爽又色| 大码成人一级视频| 久久久a久久爽久久v久久| 亚洲国产精品专区欧美| 乱码一卡2卡4卡精品| 久久精品久久久久久噜噜老黄| 秋霞在线观看毛片| 国产精品偷伦视频观看了| 色视频www国产| 午夜日本视频在线| 国产成人aa在线观看| 久久免费观看电影| 97精品久久久久久久久久精品| 永久网站在线| 日韩亚洲欧美综合| 男的添女的下面高潮视频| 乱系列少妇在线播放| 国产成人精品无人区| 99久国产av精品国产电影| 免费观看在线日韩| 麻豆成人午夜福利视频| 男的添女的下面高潮视频| 麻豆成人午夜福利视频| 2022亚洲国产成人精品| 青春草国产在线视频| 国产成人精品无人区| 亚洲精品日本国产第一区| 欧美三级亚洲精品| av女优亚洲男人天堂| 交换朋友夫妻互换小说| 国产精品国产三级国产专区5o| 亚洲av欧美aⅴ国产| av不卡在线播放| 国产成人精品久久久久久| 男人爽女人下面视频在线观看| 天堂中文最新版在线下载| 欧美日韩国产mv在线观看视频| 亚洲经典国产精华液单| 中文字幕精品免费在线观看视频 | 看十八女毛片水多多多| 大片免费播放器 马上看| .国产精品久久| 久久 成人 亚洲| 99国产精品免费福利视频| 啦啦啦视频在线资源免费观看| 看十八女毛片水多多多| 日韩欧美精品免费久久| 亚洲国产精品一区二区三区在线| 国产美女午夜福利| 亚洲精品乱码久久久久久按摩| 少妇人妻精品综合一区二区| 日本色播在线视频| 99热这里只有精品一区| www.色视频.com| 久久久国产欧美日韩av| √禁漫天堂资源中文www| 日韩一区二区视频免费看| 欧美精品国产亚洲| 国产又色又爽无遮挡免| 综合色丁香网| 国产精品一区二区三区四区免费观看| 午夜91福利影院| 欧美日韩一区二区视频在线观看视频在线| 一区二区三区乱码不卡18| 成人亚洲欧美一区二区av| 性色avwww在线观看| 国产免费一级a男人的天堂| 中文乱码字字幕精品一区二区三区| 成年美女黄网站色视频大全免费 | 亚洲丝袜综合中文字幕| 青春草亚洲视频在线观看| 久久久久久久久久成人| 国产成人免费无遮挡视频| 99视频精品全部免费 在线| 国内精品宾馆在线| 22中文网久久字幕| 另类精品久久| 亚洲综合色惰| 少妇精品久久久久久久| 欧美另类一区| 精品少妇黑人巨大在线播放| 看非洲黑人一级黄片| 婷婷色av中文字幕| 免费播放大片免费观看视频在线观看| 乱人伦中国视频| 亚洲av.av天堂| 日韩视频在线欧美| 久久影院123| 99re6热这里在线精品视频| 在线观看美女被高潮喷水网站| 不卡视频在线观看欧美| 欧美日韩国产mv在线观看视频| 成年美女黄网站色视频大全免费 | kizo精华| 日日摸夜夜添夜夜爱| 国产精品久久久久久久电影| 99久国产av精品国产电影| a级毛片在线看网站| 欧美丝袜亚洲另类| 少妇被粗大猛烈的视频| 建设人人有责人人尽责人人享有的| 一级毛片黄色毛片免费观看视频| 天美传媒精品一区二区| av在线app专区| 汤姆久久久久久久影院中文字幕| av不卡在线播放| 亚洲欧美日韩东京热| 久久久国产一区二区| 丝袜在线中文字幕| .国产精品久久| 有码 亚洲区| 少妇精品久久久久久久| 美女国产视频在线观看| 国产深夜福利视频在线观看| 亚洲激情五月婷婷啪啪| 亚洲国产色片| 成年女人在线观看亚洲视频| 97超视频在线观看视频| 成人二区视频| 在线观看免费日韩欧美大片 | 亚洲色图综合在线观看| kizo精华| 久久人人爽人人爽人人片va| 国产成人精品一,二区| 在线观看免费日韩欧美大片 | 日韩 亚洲 欧美在线| 国产精品一区二区性色av| 少妇猛男粗大的猛烈进出视频| 亚洲精华国产精华液的使用体验| 中文精品一卡2卡3卡4更新| 精品一区二区三卡| 自拍欧美九色日韩亚洲蝌蚪91 | 2018国产大陆天天弄谢| 又爽又黄a免费视频| 搡女人真爽免费视频火全软件| 国产精品久久久久久精品古装| 男女边摸边吃奶| 国产精品熟女久久久久浪| 夫妻性生交免费视频一级片| 嫩草影院新地址| 国产精品人妻久久久久久| 精品久久久久久久久av| 精品人妻一区二区三区麻豆| 最新中文字幕久久久久| 亚洲av综合色区一区| 2022亚洲国产成人精品| 下体分泌物呈黄色| 成年美女黄网站色视频大全免费 | 乱系列少妇在线播放| 国产免费福利视频在线观看| 99九九在线精品视频 | 久久 成人 亚洲| 久久精品国产亚洲av涩爱| 成人影院久久| 午夜免费观看性视频| 在线观看三级黄色| 高清在线视频一区二区三区| 一区在线观看完整版| 亚洲欧美日韩另类电影网站| 人妻夜夜爽99麻豆av| 一级毛片我不卡| h日本视频在线播放| 国产黄片视频在线免费观看| 97超碰精品成人国产| 欧美另类一区| 国产淫语在线视频| 自拍欧美九色日韩亚洲蝌蚪91 | 亚洲精品色激情综合| 国产一区有黄有色的免费视频| 日日撸夜夜添| 日日啪夜夜爽| 亚洲国产av新网站| 国产91av在线免费观看| 日本色播在线视频| 国产精品伦人一区二区| 街头女战士在线观看网站| 国产精品国产三级国产专区5o| 久久免费观看电影| 少妇 在线观看| 最黄视频免费看| 一级爰片在线观看| 国产av国产精品国产| 午夜福利在线观看免费完整高清在| 国产亚洲一区二区精品| av又黄又爽大尺度在线免费看| 国产成人午夜福利电影在线观看| 91久久精品国产一区二区成人| 久久热精品热| 91精品国产九色| 爱豆传媒免费全集在线观看| 欧美激情国产日韩精品一区| 在线 av 中文字幕| 久久国产乱子免费精品| 99热这里只有是精品50| 午夜免费鲁丝| 国产有黄有色有爽视频| 热re99久久精品国产66热6| 亚洲国产欧美在线一区| 国产成人一区二区在线| 大香蕉97超碰在线| 成人黄色视频免费在线看| 涩涩av久久男人的天堂| 9色porny在线观看| 三级国产精品欧美在线观看| 国产一级毛片在线| 久久久国产一区二区| 国产白丝娇喘喷水9色精品| 国产精品99久久99久久久不卡 | 精品少妇久久久久久888优播| 永久网站在线| 精品99又大又爽又粗少妇毛片| 一边亲一边摸免费视频| 女性生殖器流出的白浆| 少妇人妻精品综合一区二区| 国产伦精品一区二区三区视频9| 午夜免费男女啪啪视频观看| 能在线免费看毛片的网站| 男人舔奶头视频| 一个人免费看片子| 人人澡人人妻人| 国产有黄有色有爽视频| 欧美成人精品欧美一级黄| 自拍欧美九色日韩亚洲蝌蚪91 | 我要看黄色一级片免费的| 欧美日韩视频精品一区| 亚洲av成人精品一区久久| 久久精品久久精品一区二区三区| 日韩av不卡免费在线播放| 高清毛片免费看| 国产高清国产精品国产三级| 你懂的网址亚洲精品在线观看| 丰满饥渴人妻一区二区三| 精品午夜福利在线看| 色94色欧美一区二区| 51国产日韩欧美| 少妇人妻久久综合中文| 国产伦理片在线播放av一区| 美女cb高潮喷水在线观看| 五月伊人婷婷丁香| 免费看不卡的av| av国产久精品久网站免费入址| 国产真实伦视频高清在线观看| 亚洲第一av免费看| 黄色怎么调成土黄色| 欧美精品人与动牲交sv欧美| 亚洲av在线观看美女高潮| 精品一区在线观看国产| 国产av码专区亚洲av| 亚洲精品国产av蜜桃| 成人特级av手机在线观看|