{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T05:06:43Z","timestamp":1750309603057,"version":"3.41.0"},"reference-count":27,"publisher":"Association for Computing Machinery (ACM)","issue":"1","license":[{"start":{"date-parts":[[2024,12,10]],"date-time":"2024-12-10T00:00:00Z","timestamp":1733788800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Trans. Embed. Comput. Syst."],"published-print":{"date-parts":[[2025,1,31]]},"abstract":"<jats:p>For encryption applications on embedded systems, operating in real-time while using minimal system resources is essential. It is expected that efficient and rapid encryption of high-resolution images is to be accomplished with limited hardware resources. Therefore, to ensure the desired efficiency of encryption of high-resolution images, the system must possess a digital architecture capable of achieving high speeds with minimal hardware resources. This study considered the limitations of a hardware architecture for an image encryption algorithm based on the Profile Hidden Markov Model called PHMMRGB. The proposed architecture is relatively simple in comparison to its alternatives. The hardware architecture, designed with the objective of using minimal resources, has been implemented on an FPGA. Based on the results of the proposed architecture, it is believed that the implementation of the specified method on an FPGA would yield high efficiency. Experiments conducted using large-sized satellite images confirmed this expectation.<\/jats:p>","DOI":"10.1145\/3701727","type":"journal-article","created":{"date-parts":[[2024,10,28]],"date-time":"2024-10-28T09:48:56Z","timestamp":1730108936000},"page":"1-20","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Hardware Area Efficient and Real-Time FPGA Implementation of PHMMRGB."],"prefix":"10.1145","volume":"24","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-1340-8972","authenticated-orcid":false,"given":"Suhap","family":"\u015eahin","sequence":"first","affiliation":[{"name":"Faculty of Engineering, Computer Engineering, Kocaeli University, Kocaeli, Turkey"}]},{"ORCID":"https:\/\/orcid.org\/0009-0007-6905-8293","authenticated-orcid":false,"given":"O\u011fuz","family":"Narl\u0131","sequence":"additional","affiliation":[{"name":"Faculty of Engineering, Computer Engineering, Kocaeli University, Kocaeli, Turkey"}]},{"ORCID":"https:\/\/orcid.org\/0009-0000-6001-2116","authenticated-orcid":false,"given":"Muhammet Bahad\u0131r","family":"T\u00fcrko\u011flu","sequence":"additional","affiliation":[{"name":"Faculty of Engineering, Computer Engineering, Kocaeli University, Kocaeli, Turkey"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7146-203X","authenticated-orcid":false,"given":"Hikmetcan","family":"\u00d6zcan","sequence":"additional","affiliation":[{"name":"Faculty of Engineering, Computer Engineering, Kocaeli University, Kocaeli, Turkey"}]}],"member":"320","published-online":{"date-parts":[[2024,12,10]]},"reference":[{"unstructured":"NASA Goddard Space Flight Center. 2017. Hurricane Patricia over Mexico. https:\/\/imagesassets.nasa.gov\/image\/GSFC_20171208_Archive_e000520\/GSFC_20171208_Archive_e000520orig.jpg","key":"e_1_3_1_2_2"},{"unstructured":"NASA Goddard Space Flight Center. 2017. Salt Lake City Utah 2002. https:\/\/images.nasa.gov\/details-GSFC_20171208_Archive_e000520","key":"e_1_3_1_3_2"},{"doi-asserted-by":"publisher","key":"e_1_3_1_4_2","DOI":"10.1109\/FPL.2009.5272532"},{"doi-asserted-by":"publisher","key":"e_1_3_1_5_2","DOI":"10.1016\/j.jksuci.2018.05.002"},{"doi-asserted-by":"publisher","key":"e_1_3_1_6_2","DOI":"10.1016\/j.asr.2019.09.027"},{"issue":"5","key":"e_1_3_1_7_2","first-page":"177","article-title":"Blowfish encryption: A comparative analysis using VHDL","volume":"1","author":"Dakate Deepak Kumar","year":"2012","unstructured":"Deepak Kumar Dakate and Pawan Dubey. 2012. Blowfish encryption: A comparative analysis using VHDL. Int. J. Eng. Advan. Technol. 1, 5 (2012), 177\u2013179.","journal-title":"Int. J. Eng. Advan. Technol."},{"doi-asserted-by":"publisher","key":"e_1_3_1_8_2","DOI":"10.1093\/bioinformatics\/14.9.755"},{"doi-asserted-by":"publisher","key":"e_1_3_1_9_2","DOI":"10.1109\/FPL.2009.5272559"},{"doi-asserted-by":"publisher","key":"e_1_3_1_10_2","DOI":"10.3390\/electronics12244895"},{"doi-asserted-by":"publisher","key":"e_1_3_1_11_2","DOI":"10.1002\/cta.3415"},{"doi-asserted-by":"publisher","unstructured":"Mohamed Gafsi Mohamed Ali Hajjaji Jihene Malek and Abdellatif Mtibaa. 2021. FPGA hardware acceleration of an improved chaos-based cryptosystem for real-time image encryption and decryption. Journal of Ambient Intelligence and Humanized Computing 14 (2021) 1\u201322. 10.1007\/s12652-021-03555-5","key":"e_1_3_1_12_2","DOI":"10.1007\/s12652-021-03555-5"},{"doi-asserted-by":"publisher","key":"e_1_3_1_13_2","DOI":"10.1007\/s11554-022-01244-w"},{"doi-asserted-by":"publisher","key":"e_1_3_1_14_2","DOI":"10.1007\/s11042-019-08517-w"},{"doi-asserted-by":"publisher","unstructured":"Apoorva Jangir and Jai Gopal Pandey. 2021. GIFT cipher usage in image data security: Hardware implementations performance and statistical analyses. J. Real-Time Image Process. 18 6 (Dec. 2021) 2551\u20132567. 10.1007\/s11554-021-01146-3","key":"e_1_3_1_15_2","DOI":"10.1007\/s11554-021-01146-3"},{"doi-asserted-by":"publisher","key":"e_1_3_1_16_2","DOI":"10.1006\/jmbi.1994.1104"},{"doi-asserted-by":"publisher","unstructured":"Assaad EL Makhloufi Samir EL Adib and Naoufal Raissouni. 2022. High throughput implementation of AES algorithm using radiation tolerant FPGA for secure LST-SW algorithm. In 2022 5th International Conference on Advanced Communication Technologies and Networking (CommNet). 1\u20136. 10.1109\/CommNet56067.2022.9993871","key":"e_1_3_1_17_2","DOI":"10.1109\/CommNet56067.2022.9993871"},{"doi-asserted-by":"publisher","unstructured":"Assaad El Makhloufi Noha Tagmouti Nisrine Chekroun Samir El Adib Jos\u00e9 A. Sobrino and Naoufal Raissouni. 2020. AES\/FPGA encryption module integration for satellite remote sensing systems: LST-SW case. In 2020 3rd International Conference on Advanced Communication Technologies and Networking (CommNet). 1\u20137. 10.1109\/CommNet49926.2020.9199644","key":"e_1_3_1_18_2","DOI":"10.1109\/CommNet49926.2020.9199644"},{"doi-asserted-by":"publisher","key":"e_1_3_1_19_2","DOI":"10.1201\/9780429466335"},{"doi-asserted-by":"publisher","key":"e_1_3_1_20_2","DOI":"10.1016\/j.micpro.2020.103214"},{"doi-asserted-by":"publisher","key":"e_1_3_1_21_2","DOI":"10.1109\/TIE.2007.898281"},{"doi-asserted-by":"publisher","key":"e_1_3_1_22_2","DOI":"10.4316\/AECE.2021.01003"},{"doi-asserted-by":"publisher","key":"e_1_3_1_23_2","DOI":"10.4218\/etrij.2020-0203"},{"doi-asserted-by":"publisher","key":"e_1_3_1_24_2","DOI":"10.1007\/s12652-022-03726-y"},{"doi-asserted-by":"publisher","key":"e_1_3_1_25_2","DOI":"10.32604\/iasc.2022.020681"},{"doi-asserted-by":"publisher","key":"e_1_3_1_26_2","DOI":"10.1007\/s12046-022-01994-0"},{"doi-asserted-by":"publisher","key":"e_1_3_1_27_2","DOI":"10.1049\/cp:19991186"},{"unstructured":"Hikmetcan \u00d6zcan. 2021. Visual cryptography based on profile Hidden Markov and probability transition. PhD thesis. Kocaeli \u00dcniversitesi Kocaeli Turkey. https:\/\/tez.yok.gov.tr\/UlusalTezMerkezi\/TezGoster?key=8tbPippmWV_b-Irrn9YEAtIuic_cqKU5JB0-Gc1klmd3t3DjkbkuTQZzAQvAIxZy","key":"e_1_3_1_28_2"}],"container-title":["ACM Transactions on Embedded Computing Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3701727","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3701727","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T01:57:16Z","timestamp":1750298236000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3701727"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,12,10]]},"references-count":27,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2025,1,31]]}},"alternative-id":["10.1145\/3701727"],"URL":"https:\/\/doi.org\/10.1145\/3701727","relation":{},"ISSN":["1539-9087","1558-3465"],"issn-type":[{"type":"print","value":"1539-9087"},{"type":"electronic","value":"1558-3465"}],"subject":[],"published":{"date-parts":[[2024,12,10]]},"assertion":[{"value":"2023-07-14","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2024-10-18","order":2,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2024-12-10","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}