Analysis of trigonometric chaotic sequence by proposing an index-based bit level scrambling image encryption

2021 ◽  
pp. 2150406
Author(s):  
Wanbo Yu ◽  
Hao Wang

Chaotic map is applied to numerous research fields, such as encryption of data and information. In this paper, a novel bit-level scrambling encryption based on three-dimensional trigonometric chaotic sequence is proposed. This encryption is operated on grayscale images because pixel value of which is between 0 and 255, which can be converted into 8-bit binary number, then each image can be converted into eight binary images. Combine binary images a three-dimensional matrix as input, which have three index values width, height, and page. Generate three numbers by the chaotic sequence to locate the value of the matrix need to be changed. After the value is located, change its value 0 to 1 or 1 to 0, this is the basic encryption scheme. This paper makes a three-dimensional binary matrix with 32 images to test the encryption scheme, and get average value of images’ number of pixel change rate at 0.9603, unified averaged change intensity at 31.27%, information entropy at 7.9891, also the histograms. And correlation coefficients of each pixel from three directions are small. There are comparisons with other encryptions too. The key space of this encryption is more than 10[Formula: see text].

2018 ◽  
Vol 29 (07) ◽  
pp. 1850058 ◽  
Author(s):  
Nabil Ben Slimane ◽  
Nahed Aouf ◽  
Kais Bouallegue ◽  
Mohsen Machhout

In this paper, an efficient scheme for image encryption based on the nested chaotic map and deoxyribonucleic acid (DNA) is introduced. In order to generate the initial condition values of the nested chaotic system, the Secure Hash Algorithm SHA-256 is used. The algorithm consists of two main layers: confusion and diffusion. In the first layer, the nested chaotic map is employed to create the scrambled image. The scrambled image is obtained through the ascending sorting of the first component of the nested chaotic index sequence. To ensure higher sensitivity, higher complexity and higher security, DNA sequence and DNA operator are employed additionally with the nested chaotic map and hash algorithm to modify the pixel values. The important advantages of our algorithm are the improvement of Number of Pixel Change Rate (NPCR), Unified Average Changing Intensity (UACI) and entropy, which improve resistivity against several attacks. Experimental results and relevant security analysis demonstrated that our proposed encryption scheme has the highest security level because it is more complicated, and it has a sufficiently large key space. The proposed method is compared to other recent image encryption schemes using different security analysis factors, including NPCR, UACI, correlation coefficients (CCs), encryption quality (EQ) and entropy. It is also resistant to noise (Salt and Pepper, Gaussian and speckle) and data loss attacks. The illustrated results demonstrated that the proposed image encryption scheme is efficient, and can be adopted for image encryption and transmission.


Author(s):  
Xiaoming Song ◽  
Daihan Xu ◽  
Guodong Li ◽  
Wenxia Xu

Aiming at the problems of small value range of a single chaotic parameter, low sequence chaos, and transient effects, a composite chaotic system of cascaded Sine-Sine mapping, Logistic chaos and generalized third-order Fibonacci is proposed (S-L-F). The new system is highly sensitive to initial values, the maximum spectral entropy of the generated sequence can reach 0.95, and the value range of the parameter x is expanded to [0,4] compared with the traditional Logistic, indicating that the new system is suitable for generating pseudo-random sequences for image encryption. For the problem that the traditional multi-image encryption scheme can only encrypt images of the same type and size, the practicability is poor, and a multi-image encryption scheme based on image reorganization and biting is proposed. The algorithm recombines any number, different sizes and different types of images into a three-dimensional matrix, converts it into a binary matrix, performs bit-level scrambling and surface cyclic scrambling, and then restores the scrambling matrix to decimal, and the chaotic sequence performs exclusive-or diffusion, and completes simultaneous encryption at one time, which greatly improves the encryption efficiency and scope of application. The NPCR of the ciphertext image is 0.9961, and the UACI is 0.3345, which proves that the ciphertext image can effectively resist the difference attack. The information entropy is greater than 7.999, which can effectively resist attacks. It has certain application value in image information security. Experimental analysis shows that the algorithm has high security and strong practicability.


Entropy ◽  
2020 ◽  
Vol 22 (3) ◽  
pp. 274 ◽  
Author(s):  
Fawad Masood ◽  
Jawad Ahmad ◽  
Syed Aziz Shah ◽  
Sajjad Shaukat Jamal ◽  
Iqtadar Hussain

Chaos-based encryption schemes have attracted many researchers around the world in the digital image security domain. Digital images can be secured using existing chaotic maps, multiple chaotic maps, and several other hybrid dynamic systems that enhance the non-linearity of digital images. The combined property of confusion and diffusion was introduced by Claude Shannon which can be employed for digital image security. In this paper, we proposed a novel system that is computationally less expensive and provided a higher level of security. The system is based on a shuffling process with fractals key along with three-dimensional Lorenz chaotic map. The shuffling process added the confusion property and the pixels of the standard image is shuffled. Three-dimensional Lorenz chaotic map is used for a diffusion process which distorted all pixels of the image. In the statistical security test, means square error (MSE) evaluated error value was greater than the average value of 10000 for all standard images. The value of peak signal to noise (PSNR) was 7.69(dB) for the test image. Moreover, the calculated correlation coefficient values for each direction of the encrypted images was less than zero with a number of pixel change rate (NPCR) higher than 99%. During the security test, the entropy values were more than 7.9 for each grey channel which is almost equal to the ideal value of 8 for an 8-bit system. Numerous security tests and low computational complexity tests validate the security, robustness, and real-time implementation of the presented scheme.


2021 ◽  
Vol 22 (1) ◽  
Author(s):  
Zhe Li ◽  
Guanzhi Liu ◽  
Run Tian ◽  
Ning Kong ◽  
Yue Li ◽  
...  

Abstract Background Our objective was to obtain normal patellofemoral measurements to analyse sex and individual differences. In addition, the absolute values and indices of tibial tuberosity-trochlear groove (TT-TG) distances are still controversial in clinical application. A better method to enable precise prediction is still needed. Methods Seventy-eight knees of 78 participants without knee pathologies were included in this cross-sectional study. A CT scan was conducted for all participants and three-dimensional knee models were constructed using Mimics and SolidWorks software. We measured and analysed 19 parameters including the TT-TG distance and dimensions and shapes of the patella, femur, tibia, and trochlea. LASSO regression was used to predict the normal TT-TG distances. Results The dimensional parameters, TT-TG distance, and femoral aspect ratio of the men were significantly larger than those of women (all p values < 0.05). However, after controlling for the bias from age, height, and weight, there were no significant differences in TT-TG distances and anterior-posterior dimensions between the sexes (all p values > 0.05). The Pearson correlation coefficients between the anterior femoral offset and other indexes were consistently below 0.3, indicating no relationship or a weak relationship. Similar results were observed for the sulcus angle and the Wiberg index. Using LASSO regression, we obtained four parameters to predict the TT-TG distance (R2 = 0.5612, p < 0.01) to achieve the optimal accuracy and convenience. Conclusions Normative data of patellofemoral morphology were provided for the Chinese population. The anterior-posterior dimensions of the women were thicker than those of men for the same medial-lateral dimensions. More attention should be paid to not only sex differences but also individual differences, especially the anterior condyle and trochlea. In addition, this study provided a new method to predict TT-TG distances accurately.


2021 ◽  
Vol 11 (1) ◽  
Author(s):  
Pieter-Jan Verhelst ◽  
H. Matthews ◽  
L. Verstraete ◽  
F. Van der Cruyssen ◽  
D. Mulier ◽  
...  

AbstractAutomatic craniomaxillofacial (CMF) three dimensional (3D) dense phenotyping promises quantification of the complete CMF shape compared to the limiting use of sparse landmarks in classical phenotyping. This study assesses the accuracy and reliability of this new approach on the human mandible. Classic and automatic phenotyping techniques were applied on 30 unaltered and 20 operated human mandibles. Seven observers indicated 26 anatomical landmarks on each mandible three times. All mandibles were subjected to three rounds of automatic phenotyping using Meshmonk. The toolbox performed non-rigid surface registration of a template mandibular mesh consisting of 17,415 quasi landmarks on each target mandible and the quasi landmarks corresponding to the 26 anatomical locations of interest were identified. Repeated-measures reliability was assessed using root mean square (RMS) distances of repeated landmark indications to their centroid. Automatic phenotyping showed very low RMS distances confirming excellent repeated-measures reliability. The average Euclidean distance between manual and corresponding automatic landmarks was 1.40 mm for the unaltered and 1.76 mm for the operated sample. Centroid sizes from the automatic and manual shape configurations were highly similar with intraclass correlation coefficients (ICC) of > 0.99. Reproducibility coefficients for centroid size were < 2 mm, accounting for < 1% of the total variability of the centroid size of the mandibles in this sample. ICC’s for the multivariate set of 325 interlandmark distances were all > 0.90 indicating again high similarity between shapes quantified by classic or automatic phenotyping. Combined, these findings established high accuracy and repeated-measures reliability of the automatic approach. 3D dense CMF phenotyping of the human mandible using the Meshmonk toolbox introduces a novel improvement in quantifying CMF shape.


2015 ◽  
Vol 2015 ◽  
pp. 1-10 ◽  
Author(s):  
Hassam Nasarullah Chaudhry ◽  
John Kaiser Calautit ◽  
Ben Richard Hughes

The effect of wind distribution on the architectural domain of the Bahrain Trade Centre was numerically analysed using computational fluid dynamics (CFD). Using the numerical data, the power generation potential of the building-integrated wind turbines was determined in response to the prevailing wind direction. The three-dimensional Reynolds-averaged Navier-Stokes (RANS) equations along with the momentum and continuity equations were solved for obtaining the velocity and pressure field. Simulating a reference wind speed of 6 m/s, the findings from the study quantified an estimate power generation of 6.4 kW indicating a capacity factor of 2.9% for the benchmark model. At the windward side of the building, it was observed that the layers of turbulence intensified in inverse proportion to the height of the building with an average value of 0.45 J/kg. The air velocity was found to gradually increase in direct proportion to the elevation with the turbine located at higher altitude receiving maximum exposure to incoming wind. This work highlighted the potential of using advanced computational fluid dynamics in order to factor wind into the design of any architectural environment.


2018 ◽  
Vol 2018 ◽  
pp. 1-11 ◽  
Author(s):  
Guodong Ye ◽  
Kaixin Jiao ◽  
Chen Pan ◽  
Xiaoling Huang

In this paper, an effective framework for chaotic encryption based on a three-dimensional logistic map is presented together with secure hash algorithm-3 (SHA-3) and electrocardiograph (ECG) signal. Following the analysis of the drawbacks, namely, fixed key and low sensitivity, of some current algorithms, this work tries to solve these two problems and includes two contributions: (1) removal of the phenomenon of summation invariance in a plain-image, for which SHA-3 is proposed to calculate the hash value for the plain-image, with the results being employed to influence the initial keys for chaotic map; (2) resolution of the problem of fixed key by using an ECG signal, that can be different for different subjects or different for same subject at different times. The Wolf algorithm is employed to produce all the control parameters and initial keys in the proposed encryption method. It is believed that combining with the classical architecture of permutation-diffusion, the summation invariance in the plain-image and shortcoming of a fixed key will be avoided in our algorithm. Furthermore, the experimental results and security analysis show that the proposed encryption algorithm can achieve confidentiality.


Sign in / Sign up

Export Citation Format

Share Document