scholarly journals The Establishment and Dynamic Properties of a New 4D Hyperchaotic System with Its Application and Statistical Tests in Gray Images

Entropy ◽  
2020 ◽  
Vol 22 (3) ◽  
pp. 310 ◽  
Author(s):  
Lina Ding ◽  
Qun Ding

In this paper, a new 4D hyperchaotic system is generated. The dynamic properties of attractor phase space, local stability, poincare section, periodic attractor, quasi-periodic attractor, chaotic attractor, bifurcation diagram, and Lyapunov index are analyzed. The hyperchaotic system is normalized and binary serialized, and the binary hyperchaotic stream generated by the system is statistically tested and entropy analyzed. Finally, the hyperchaotic binary stream is applied to the gray image encryption. The histogram, correlation coefficient, entropy test, and security analysis show that the hyperchaotic system has good random characteristics and can be applied to the gray image encryption.

2019 ◽  
Vol 2019 ◽  
pp. 1-12 ◽  
Author(s):  
Xuncai Zhang ◽  
Lingfei Wang ◽  
Ying Niu ◽  
Guangzhao Cui ◽  
Shengtao Geng

In this paper, an image encryption algorithm based on the H-fractal and dynamic self-invertible matrix is proposed. The H-fractal diffusion encryption method is firstly used in this encryption algorithm. This method crosses the pixels at both ends of the H-fractal, and it can enrich the means of pixel diffusion. The encryption algorithm we propose uses the Lorenz hyperchaotic system to generate pseudorandom sequences for pixel location scrambling and self-invertible matrix construction to scramble and diffuse images. To link the cipher image with the original image, the initial values of the Lorenz hyperchaotic system are determined using the original image, and it can enhance the security of the encryption algorithm. The security analysis shows that this algorithm is easy to implement. It has a large key space and strong key sensitivity and can effectively resist plaintext attacks.


2015 ◽  
Vol 719-720 ◽  
pp. 1030-1037
Author(s):  
Tao Song

In recent years, chaos-based image encryption technologies have been widely studied to meet the increasing demand for real-time secure image transmission applications. To overcome the drawbacks of small key space and weak security in many existing schemes based on low-dimensional chaotic maps, this paper suggests a security improved scheme with a permutation-diffusion architecture. In the permutation stage, baker map is employed to shuffle the pixel positions. In the diffusion stage, the value of each pixel is altered by using a key stream derived from hyperchaotic system. Compared with ordinary chaotic systems, hyperchaotic systems, with more complex dynamical behaviors and number of system variables, offer greater potential for secure cryptosystem construction. Extensive security analysis has been performed on the proposed scheme, including the most important ones like key space analysis, statistical analysis and key sensitivity, which has demonstrated the satisfactory security of the proposed scheme.


Symmetry ◽  
2021 ◽  
Vol 13 (12) ◽  
pp. 2290
Author(s):  
Jingya Wang ◽  
Xianhua Song ◽  
Huiqiang Wang ◽  
Ahmed A. Abd El-Latif

Hyperchaotic systems are widely applied in the cryptography domain on account of their more complex dynamical behavior. In view of this, the greatest contribution of this paper is that a two-dimensional Sine coupling Logistic modulated Sine (2D-SCLMS) system is proposed based on Logistic map and Sine map. By a series of analyses, including Lyapunov index (LE), 0–1 test, two complexity analysis methods, and two entropy analysis methods, it is concluded that the new 2D-SCLMS map is hyperchaotic with a wider range of chaos and more complex randomness. The new system combined with two-dimensional Logistic-Sine Coupling Mapping (2D-LSCM) is further applied to an image encryption application. SHA-384 is used to generate the initial values and parameters of the two chaotic systems. Symmetric keys are generated during this operation, which can be applied to the proposed image encryption and decryption algorithms. The encryption process and the decryption process of the new image encryption approaches mainly include pixel scrambling, exclusive NOR (Xnor), and diffusion operations. Multiple experiments illustrate that this scheme has higher security and lower time complexity.


2021 ◽  
Vol 31 (07) ◽  
pp. 2150099
Author(s):  
Dengwei Yan ◽  
Lidan Wang ◽  
Shukai Duan ◽  
Jiahao Chen

Memristor, as a nonlinear element in nanometer size, is feasible to generate chaotic signals. Especially, it can improve the randomness of the signals and the complexity of chaotic systems. A novel multiscroll hyperchaotic system based on the flux-controlled memristor is designed. Its twin system with a different topological structure is obtained by varying only the flux variable of the memristor, which is a considerable difference from other chaotic systems existing in the literature. Scroll numbers of the proposed system and its twin, especially, are sensitive to the system parameters. To further investigate the characteristics of the system and its twin, their behaviors with respect to the strengths of the memristor, simulation time and coexistence of multiscroll hyperchaotic attractors are analyzed. Moreover, complex dynamical behaviors of the system and its twin are analyzed by phase diagrams, Poincaré cross-sections, Lyapunov indexes, power spectra, 0-1 test diagrams, and time series. Finally, a novel image encryption scheme is proposed based on the system and its twin. The system and its twin have independent key spaces, and the proposed algorithm makes them have an intersection, which greatly improves the key spaces. In addition, the security and reliability of the image encryption algorithm are demonstrated by different security analysis methods, including correlation analysis, robustness analysis and information entropy test. The results of all experiments prove that the proposed image encryption scheme is superior to other existing ones.


2021 ◽  
Author(s):  
Hongwei Xie ◽  
Yuzhou Zhang ◽  
Hao Zhang ◽  
Zhenyu Li

Abstract This paper proposes a novel medical image encryption method based on fast and robust fuzzy C-means clustering image segmentation method and deoxyribonucleic acid encoding. Firstly, the plain medical image is split to interested pixels and uninterested pixels, respectively. Then, the uninterested 0-value pixels are abandoned to reduce the pixels in encryption. Secondly, for the interested pixels, some low-value pixels are also discarded by image segmentation to further reduce the encryption time. Thirdly, a 4-dimensional hyperchaotic system is utilized to process the main pixels of medical image with deoxyribonucleic acid encoding. Finally, lossless encryption and fast encryption are done for different purposes and security analysis shows that the encryption method is robust and secure to resist various attacks.


Entropy ◽  
2021 ◽  
Vol 23 (2) ◽  
pp. 258
Author(s):  
Heping Wen ◽  
Chongfu Zhang ◽  
Lan Huang ◽  
Juxin Ke ◽  
Dongqing Xiong

Fractional-order chaos has complex dynamic behavior characteristics, so its application in secure communication has attracted much attention. Compared with the design of fractional-order chaos-based cipher, there are fewer researches on security analysis. This paper conducts a comprehensive security analysis of a color image encryption algorithm using a fractional-order hyperchaotic system (CIEA-FOHS). Experimental simulation based on excellent numerical statistical results supported that CIEA-FOHS is cryptographically secure. Yet, from the perspective of cryptanalysis, this paper found that CIEA-FOHS can be broken by a chosen-plaintext attack method owing to its some inherent security defects. Firstly, the diffusion part can be eliminated by choosing some special images with all the same pixel values. Secondly, the permutation-only part can be deciphered by some chosen plain images and the corresponding cipher images. Finally, using the equivalent diffusion and permutation keys obtained in the previous two steps, the original plain image can be recovered from a target cipher image. Theoretical analysis and experimental simulations show that the attack method is both effective and efficient. To enhance the security, some suggestions for improvement are given. The reported results would help the designers of chaotic cryptography pay more attention to the gap of complex chaotic system and secure cryptosystem.


Entropy ◽  
2020 ◽  
Vol 22 (7) ◽  
pp. 772
Author(s):  
Shuqin Zhu ◽  
Congxu Zhu

In this paper, we construct a five dimensional continuous hyperchaotic system and propose an image encryption scheme based on the hyperchaotic system, which adopts DNA dynamic coding mechanism and classical scrambling diffusion encryption structure. In the diffusion stage, two rounds of diffusion are adopted and the rules of DNA encoding (DNA decoding) are dynamically changed according to the pixel value of the plaintext image, that is, the rules of DNA encoding (DNA decoding) used to encrypt different images are different, which makes the algorithm can resist chosen-plaintext attack. The encryption (decryption) key is only the initial value of the chaotic system, which overcomes the difficulty of key management in the “one time pad” encryption system. The experimental results and security analysis show that the algorithm has some advantages of large key space, no obvious statistical characteristics of ciphertext, sensitivity to plaintext and key and able to resist differential attacks and chosen plaintext attack. It has good application prospects.


Author(s):  
Showkat Ahmad Bhat ◽  
Amandeep Singh

Background & Objective: Digital multimedia exchange between different mobile communication devices has increased rapidly with the invention of the high-speed data services like LTE-A, LTE, and WiMAX. However, there are always certain security risks associated with the use of wireless communication technologies. Methods: To protect the digital images against cryptographic attacks different image encryption algorithms are being employed in the wireless communication networks. These algorithms use comparatively less key spaces and accordingly offer inadequate security. The proposed algorithm described in this paper based on Rubik’s cube principle because of its high confusion and diffusion properties, Arnold function having effective scrambling power, blocking cipher with block encryption and permutation powers. The main strength of the proposed algorithm lies in the large key spaces and the combination of different high power encryption techniques at each stage of algorithm. The different operations employed on the image are with four security keys of different key spaces at multiple stages of the algorithm. Results & Conclusion: Finally, the effectiveness and the security analysis results shows that the proposed image encryption algorithm attains high encryption and security capabilities along with high resistance against cryptanalytic attacks, differential attacks and statistical attacks.


Entropy ◽  
2020 ◽  
Vol 22 (4) ◽  
pp. 474 ◽  
Author(s):  
Lazaros Moysis ◽  
Christos Volos ◽  
Sajad Jafari ◽  
Jesus M. Munoz-Pacheco ◽  
Jacques Kengne ◽  
...  

A modification of the classic logistic map is proposed, using fuzzy triangular numbers. The resulting map is analysed through its Lyapunov exponent (LE) and bifurcation diagrams. It shows higher complexity compared to the classic logistic map and showcases phenomena, like antimonotonicity and crisis. The map is then applied to the problem of pseudo random bit generation, using a simple rule to generate the bit sequence. The resulting random bit generator (RBG) successfully passes the National Institute of Standards and Technology (NIST) statistical tests, and it is then successfully applied to the problem of image encryption.


Entropy ◽  
2021 ◽  
Vol 23 (4) ◽  
pp. 456
Author(s):  
Xitong Xu ◽  
Shengbo Chen

Image encryption is a confidential strategy to keep the information in digital images from being leaked. Due to excellent chaotic dynamic behavior, self-feedbacked Hopfield networks have been used to design image ciphers. However, Self-feedbacked Hopfield networks have complex structures, large computational amount and fixed parameters; these properties limit the application of them. In this paper, a single neuronal dynamical system in self-feedbacked Hopfield network is unveiled. The discrete form of single neuronal dynamical system is derived from a self-feedbacked Hopfield network. Chaotic performance evaluation indicates that the system has good complexity, high sensitivity, and a large chaotic parameter range. The system is also incorporated into a framework to improve its chaotic performance. The result shows the system is well adapted to this type of framework, which means that there is a lot of room for improvement in the system. To investigate its applications in image encryption, an image encryption scheme is then designed. Simulation results and security analysis indicate that the proposed scheme is highly resistant to various attacks and competitive with some exiting schemes.


Sign in / Sign up

Export Citation Format

Share Document