quadratic map
Recently Published Documents


TOTAL DOCUMENTS

81
(FIVE YEARS 16)

H-INDEX

15
(FIVE YEARS 1)

Author(s):  
Iman Qays Abduljaleel ◽  
Amal Hameed Khaleel

<span lang="EN-US">Compression and encryption of speech signals are essential multimedia technologies. In the field of speech, these technologies are needed to meet the security and confidentiality of information requirements for transferring huge speech signals via a network, and for decreasing storage space for rapid retrieval. In this paper, we propose an algorithm that includes hybrid transformation in order to analyses the speech signal frequencies. The speech signal is then compressed, after removing low and less intense frequencies, to produce a well compressed speech signal and ensure the quality of the speech. The resulting compressed speech is then used as an input in a scrambling algorithm that was proposed on two levels. One of these is an external scramble that works on mixing up the segments of speech that were divided using Fuzzy C-Means and changing their locations. The internal scramble scatters the values of each block internally based on the pattern of a Sudoku puzzle and quadratic map so that the resulting speech is an input to a proposed encryption algorithm using the threefish algorithm. The proposed algorithm proved to be highly efficient in the compression and encryption of the speech signal based on approved statistical measures.</span>


2021 ◽  
Vol 2021 (11) ◽  
Author(s):  
Dmitri V. Alekseevsky ◽  
Alessio Marrani ◽  
Andrea Spiro

Abstract We consider the static, spherically symmetric and asymptotically flat BPS extremal black holes in ungauged N = 2 D = 4 supergravity theories, in which the scalar manifold of the vector multiplets is homogeneous. By a result of Shmakova on the BPS attractor equations, the entropy of this kind of black holes can be expressed only in terms of their electric and magnetic charges, provided that the inverse of a certain quadratic map (uniquely determined by the prepotential of the theory) is given. This inverse was previously known just for the cases in which the scalar manifold of the theory is a homogeneous symmetric space. In this paper we use Vinberg’s theory of homogeneous cones to determine an explicit expression for such an inverse, under the assumption that the scalar manifold is homogeneous, but not necessarily symmetric. As immediate consequence, we get a formula for the entropy of BPS black holes that holds in any model of N = 2 supergravity with homogeneous scalar manifold.


Electronics ◽  
2021 ◽  
Vol 10 (17) ◽  
pp. 2116
Author(s):  
Mustafa Kamil Khairullah ◽  
Ammar Ahmed Alkahtani ◽  
Mohd Zafri Bin Bin Baharuddin ◽  
Ammar Al-Jubari

Chaotic maps that can provide highly secure key sequences and ease of structure implementation are predominant requirements in image encryption systems. One Dimensional (1D) chaotic maps have the advantage of a simple structure and can be easily implemented by software and hardware. However, key sequences produced by 1D chaotic maps are not adequately secure. Therefore, to improve the 1D chaotic maps sequence security, we propose two chaotic maps: 1D Improved Logistic Map (1D-ILM) and 1D Improved Quadratic Map (1D-IQM). The proposed maps have shown higher efficiency than existing maps in terms of Lyapunov exponent, complexity, wider chaotic range, and higher sensitivity. Additionally, we present an efficient and fast encryption method based on 1D-ILM and 1D-IQM to enhance image encryption system performance. This paper also introduces a key expansion method to reduce the number of chaotic map iteration needs, thereby decreasing encryption time. The security analyses and experimental results are confirmed that 2D Correlation Coefficient (CC) Information Entropy (IE), Number of Pixels Change Rate (NPCR), Unified Average Changing Intensity (UACI), Mean Absolute Error (MAE), and decryption quality are able to meet the encryption security demands (CC = −0.00139, IE = 7.9990, NPCR = 99.6114%, UACI = 33.46952% and MAE = 85.3473). Furthermore, the proposed keyspace reaches 10240, and the encryption time is 0.025s for an image with a size of 256 × 256. The proposed system can yield efficacious security results compared to obtained results from other encryption systems.


2021 ◽  
Vol 31 (10) ◽  
pp. 2150146
Author(s):  
Yuanyuan Si ◽  
Hongjun Liu ◽  
Yuehui Chen

As the only nonlinear component for symmetric cryptography, S-Box plays an important role. An S-Box may be vulnerable because of the existence of fixed point, reverse fixed point or short iteration cycles. To construct a keyed strong S-Box, first, a 2D enhanced quadratic map (EQM) was constructed, and its dynamic behaviors were analyzed through phase diagram, Lyapunov exponent, Kolmogorov entropy, bifurcation diagram and randomness testing. The results demonstrated that the state points of EQM have uniform distribution, ergodicity and better randomness. Then a keyed strong S-Box construction algorithm was designed based on EQM, and the fixed point, reverse fixed point, and short cycles were eliminated. Experimental results verified the algorithm’s feasibility and effectiveness.


Author(s):  
Daniel Campbell ◽  
Stanislav Hencl
Keyword(s):  

Given a Sobolev homeomorphism $f\in W^{2,1}$ in the plane we find a piecewise quadratic homeomorphism that approximates it up to a set of $\epsilon$ measure. We show that this piecewise quadratic map can be approximated by diffeomorphisms in the $W^{2,1}$ norm on this set.


2020 ◽  
Vol 31 (12) ◽  
pp. 2050174
Author(s):  
Jason A. C. Gallas

Iteration of the quadratic map produces sequences of polynomials whose degrees explode as the orbital period grows more and more. The polynomial mixing all 335 period-12 orbits has degree [Formula: see text], while for the [Formula: see text] period-20 orbits the degree rises already to [Formula: see text]. Here, we show how to use preperiodic points to systematically extract exact equations of motion, one by one, without any need for iteration. Exact orbital equations provide valuable insight about the arithmetic structure and nesting properties of towers of algebraic numbers which define orbital points and bifurcation cascades of the map.


2020 ◽  
Vol 30 (12) ◽  
pp. 2050173 ◽  
Author(s):  
Hongjun Liu ◽  
Abdurahman Kadir ◽  
Chengbo Xu

Based on the classic quadratic map (CQM) with abundant bifurcations and periodic windows, a new 3D improved coupling quadratic map (3D-ICQM) is constructed, and its phase diagram, Lyapunov exponent (LE) and randomness testing by TestU01 demonstrated that it has better ergodicity, more complex nonlinear behavior, larger chaotic range and better randomness. To investigate its application in cryptography, a 3D-ICQM based color image encryption algorithm with round key expansion is designed. To further enhance the randomness of key stream, the hash value of intermediate cipher of the previous round is converted into new initial values and fed back into 3D-ICQM, to generate the key stream for the current round. The security and statistical analyses demonstrated that the encryption scheme has better security performance than several existing algorithms.


2020 ◽  
Vol 2020 ◽  
pp. 1-10
Author(s):  
Hongjun Liu ◽  
Abdurahman Kadir ◽  
Chao Ma ◽  
Chengbo Xu

A keyed hash algorithm is proposed based on 1-D enhanced quadratic map (EQM) with varying parameter. Three measures, including assigning unique one-time keys, key expansion, and hash length extension, are taken to enhance its security. First, the message is transformed into a parameter sequence for the EQM to be absorbed, and then the extended keys are generated as the initial values of the EQM. Finally, the EQM is iterated with redundant loops to transform the variable values into a hash value. The algorithm is so flexible that it can generate hash value with different lengths of 256, 512, 1024, or more bits through a parameter switcher, and redundant loops can eliminate the transient effect of chaos and mitigate the increasing threat of the side-channel attack. Security evaluations and comparison demonstrated its practicability and reliability.


2020 ◽  
Vol 19 (1) ◽  
pp. 442-479
Author(s):  
Arnd Bäcker ◽  
James D. Meiss
Keyword(s):  

Sign in / Sign up

Export Citation Format

Share Document