An Efficient DES-Based Architecture for Teleradiology Applications
-
https://doi.org/10.14419/4x2x0830
Received date: August 30, 2025
Accepted date: October 6, 2025
Published date: October 14, 2025
-
Cryptography; FPGA; Peak Signal to Noise Ratio; Triple Data Encryption Standard; VHDL -
Abstract
Ensuring the security of images transmitted openly is critical due to their high susceptibility to unauthorized access. To mitigate such risks, employing data security measures is essential. With the increasing importance of data security in today's digital age, Data Encryption Stand-ard (DES) stands out as a notable block cipher technique for encrypting and decrypting data. Protecting sensitive information is crucial in embedded applications. Implementing cryptographic algorithms on programmable devices like Field Programmable Gate Arrays (FPGAs) combines the physical security of hardware solutions with the speed superiority over software-based approaches. FPGAs offer flexibility like software applications, with the added advantage of being reprogrammable to adapt to different cryptographic algorithms or modifications within the same algorithm, ensuring robust data protection. This work introduces a hardware-oriented approach to executing the DES algorithm using FPGAs. The approach adopted utilizes an iterative loop process with a 128-bit key size, leveraging a lookup table based on S-boxes. Simulation waveforms confirm that the FPGA-based implementation meets the desired specifications, showcasing high throughput. The research highlights a novel hardware-based version of the Triple DES encryption algorithm that achieves high-speed performance with minimal hardware requirements.
-
References
- C. A. Sari, E. H. Rachmawanto, and D. R. I. M. Setiadi, "Robust and Imperceptible Image Watermarking by DC Coefficients Using Singular Val-ue Decomposition," International Conference on Electrical Engineering, Computer Science, and Informatics (EECSI), Yogyakarta, 2017.https://doi.org/10.1109/EECSI.2017.8239107.
- A. Susanto, D. R. I. M. Setiadi, C. A. Sari, and E. H. Rachmawanto, "Hybrid Method using HWT-DCT for Image Watermarking,"International Conference on Cyber and IT Service Management (CITSM), Denpasar, 2017.https://doi.org/10.1109/CITSM.2017.8089252.
- A. Setyono, D. R. I. M. Setiadi, and Muljono, "StegoCrypt Method using Wavelet Transform and One-Time Pad for Secret Image Deliv-ery,"International Conference on Information Technology, Computer, and Electrical Engineering (ICITACEE), Semarang, pp. 203–207, 2017.https://doi.org/10.1109/ICITACEE.2017.8257703.
- D. R. I. M. Setiadi, E. H. Rachmawanto, and C. A. Sari, "Secure Image Steganography Algorithm Based on DCT with OTP Encryption," Journal of Applied Intelligent System, vol. 2, no. 1, pp. 1-11, 2017.https://doi.org/10.33633/jais.v2i1.1330.
- U. Sudibyo, F. Eranisa, E. H. Rachmawanto, D. R. I. M. Setiadi and C. A. Sari, "A Secure Image Watermarking using Chinese Remainder Theorem Based on Haar Wavelet Transform,"International Conference on Information Technology, Computer, and Electrical Engineering (ICITACEE), Se-marang, 2017.https://doi.org/10.1109/ICITACEE.2017.8257704.
- E. H. Rachmawanto, R. S. Amin, D. R. I. M. Setiadi and C. A. Sari, "A Performance Analysis StegoCrypt Algorithm based on LSB-AES 128 bit in Various Image Size," International Seminar on Application for Technology of Information and Communication (ISemantic), Semarang, 2017.https://doi.org/10.1109/ISEMANTIC.2017.8251836.
- W. Stallings, Cryptography and Network Security: Principles and Practice, London: Pearson, 2014.
- A. Verma and R. Kaur, “A combined cryptography and steganography approach using bit-matching for grayscale and color images,” in Proc. Int. Conf. Advances in Computing, Communication and Security (ICACCS), Coimbatore, India, Dec. 2019, pp. 145–150.
- S. Arora and S. Anand, "A New Approach for Image Steganography using Edge Detection Method," International Journal of Innovative Research in Computer and Communication Engineering, vol. 1, no. 3, pp. 626-629, 2013.
- D. Mehta and S. Reddy, “Comparative analysis of edge detection operators for steganographic embedding,” in Proc. IEEE Int. Conf. Image Pro-cessing (ICIP), Abu Dhabi, UAE, Oct. 2020, pp. 2054–2058.
- H. Al-Dmour and A. Al-Ani, "A steganography embedding method based on edge identification and XOR coding," Expert Systems with Applica-tions, vol. 46, pp. 293-306, 2016.https://doi.org/10.1016/j.eswa.2015.10.024.
- K. Shah, E. H. Rachmawanto, and D. R. I. M. Setiadi, “Data confidentiality and privacy preservation using DES with DWT-based steganography,” in Proc. Int. Conf. Electrical Engineering, Computer Science and Informatics (EECSI), Yogyakarta, Indonesia, Sept. 2017, pp. 1–6.
- S. Mungmode, A. Patel, and R. Sharma, “Edge adaptive steganography using threshold and LSBMR,” Int. J. Computer Applications, vol. 175, no. 3, pp. 25–31, Oct. 2020.
- P. Gupta and N. Singh, “Canny edge detection-based randomized embedding for steganography,” Journal of Information Security and Applications, vol. 56, pp. 102–113, May 2021.
- Y. Zhang, X. Liu, and H. Wang, “Reconfigurable FPGA-based lightweight block cipher framework for IoT security,” IEEE Internet of Things Journal, vol. 10, no. 8, pp. 6550–6562, Apr. 2023.
- A. Kumar and R. Bansal, “Hybrid cryptography–steganography system for secure telemedicine applications,” IEEE Access, vol. 12, pp. 112340–112352, Sept. 2024.
- J. Lee, M. Tanaka, and P. Singh, “Quantum-resistant cryptography integrated with image steganography for secure multimedia transmission,” IEEE Transactions on Information Forensics and Security, vol. 20, no. 1, pp. 985–996, Jan. 2025.
- AyaJaradat, Eyad Taqieddin and Moad Mowafi, “A High-Capacity Image steganography Method Using Chaotic Particle Swarm Optimization”, Security and Communication Networks, Hindawi, pp. 1-11, 2021.https://doi.org/10.1155/2021/6679284.
- P. K. Muhuri, Z. Ashraf and S. Goel, “A novel image steganographic method based on integer wavelet transformation and particle swarm optimiza-tion,” Applied SoftComputing, Elsevier, vol. 92, pp. 1-41, 2020.79https://doi.org/10.1016/j.asoc.2020.106257.
- A.H. Mohsin, A. A. Zaidan, B. B. Zaidan, O. S. Albahri, A. S. Albahri, M. A. Alsalem, K. I. Mohammed, OdaiEnaizan, ShahadNidhal, A. H. Alamoodi, N. S. Jalood, Ali Najmjasim, Ali. H. Shareef, E. M. Almahdi, M. J. Baqer, H. A. Ameen and Salem Garfan “New method of image ste-ganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity,” IEEE Access, vol. 7, pp. 168994–169010, 2019.https://doi.org/10.1109/ACCESS.2019.2949622.
- P. Marakumbi and S. Bhairannawar, “9/7 LIFT Reconfigurable Architecture Implementation for Image Authentication”, IJRITCC, vol. 11, no. 7, pp. 23–31, Sep. 2023.https://doi.org/10.17762/ijritcc.v11i7.7826.
- Mohammed, Z. A.; Gheni, H. Q.; Hussein, Z. J.; Al-Qurabat, A. K. M. Advancing Cloud Image Security via AES Algorithm Enhancement Tech-niques. Eng. Technol. Appl. Sci. Res. 2024, 14, 12694-12701. https://doi.org/10.48084/etasr.6601.
- Charls H. Roth (Jr.), “Digital System Design using VHDL”, Cengage Learning, 2006.
- Subhi R. M. Zeebaree, "DES encryption and decryption algorithm implementation based on FPGA", Indonesian Journal of Electrical Engineering and Computer Science, Vol. 18, No. 2, May 2020, pp. 774~781.https://doi.org/10.11591/ijeecs.v18.i2.pp774-781.
- Shraddha P Tankasali, SunitaShirahatti, Thejaswini P, " Performance Analysis of DES and Triple DES Algorithm", International Research Journal of Engineering and Technology, Volume: 07 Issue: 10 , Oct 2020.
- M. El-Hadedy, M. M. Fouad, A. M. Khalifa, "Genetic Algorithm-Based Steganography for High Capacity and Security", International Journal of Computer Applications, Volume: 98 Issue: 4 ,July 2014.
- S. L. Chandel, R. K. Jha, "Secure Image Steganography using LSB and Edge Detection Technique", International Journal of Engineering Research & Technology (IJERT), Volume: 3 Issue: 6 , June 2014.
- T. A. Khan, R. K. Tiwari, "A Hybrid DWT-DCT Approach for Digital Image Steganography", International Journal of Advanced Research in Computer Science and Software Engineering, Volume: 3 Issue: 7 , July 2013.
- Rajeev Kumar, R. S. Anand, "Design and Performance Analysis of High-Speed Low-Power FPGA Architecture using Spartan-3A", International Journal of Advanced Research in Electrical, Electronics and Instrumentation Engineering, Volume: 4 Issue: 5 , May 2015.
- Nair, A. P., K. S. Shivaprasad, "Optimization of FPGA Resource Utilization using Spartan-6 for High-Performance Applications", International Journal of Scientific Research in Computer Science, Engineering and Information Technology, Volume: 2 Issue: 3 , June 2017.
-
Downloads
-
How to Cite
Marakumbi, P., & Bhairannawar, S. . . (2025). An Efficient DES-Based Architecture for Teleradiology Applications. International Journal of Basic and Applied Sciences, 14(6), 274-281. https://doi.org/10.14419/4x2x0830
