piecewise linear chaotic map
Recently Published Documents


TOTAL DOCUMENTS

40
(FIVE YEARS 7)

H-INDEX

10
(FIVE YEARS 1)

2021 ◽  
Vol 03 (04) ◽  
pp. 35-46
Author(s):  
Alyaa M. Abdul MAJEED

This paper suggests a novel algorithm for encrypting speech signals in common image formats and retrieve them from these image files. The speech signal is encrypted in three levels. In the first level,the sample positions are permuted based on keys generated using Game of Life matrix and Piecewise linear Chaotic Map (PWLCM) in order to reduce the correlation between adjust samples. In the second level, the resulting samples are then converted to Fast Walsh Hadamard Transform (FWHT) and their transactions are encrypted by using circular transformations in the row and column depending on the generated key. At the third level, the values of encrypted samples are converted to color pixels, which are then arranged in a puzzled manner and put in a 2-D matrix to achieve the secured data transfer across networks, with the image file contains the encrypted speech signal. Several objective measures have been used to evaluate the performance of the suggested method. The experimental results and numerical analyses show that the algorithm gives a high degree of security and robust against brute force attackers, statistical attack, strong diffusion and ambiguity so that the encrypted message has been saved in a different format from the original signal, and finally give the good quality of the reconstructed speech signal from image files.


2021 ◽  
Vol 2021 ◽  
pp. 1-6
Author(s):  
Yong-Guo Shi ◽  
Kai Chen ◽  
Wei Liao

It is well-known that Sharkovskii’s theorem gives a complete structure of periodic order for a continuous self-map on a closed bounded interval. As a further study, a natural problem is how to determine the location and number of periodic points for a specific map. This paper considers the periodic points of asymmetric Bernoulli shift, which is a piecewise linear chaotic map.


2021 ◽  
Vol 2021 ◽  
pp. 1-17
Author(s):  
Lee Mariel Heucheun Yepdia ◽  
Alain Tiedeu ◽  
Guillaume Kom

This paper introduces a new image encryption scheme using a mixing technique as a way to encrypt one or multiple images of different types and sizes. The mixing model follows a nonlinear mathematical expression based on Cramer’s rule. Two 1D systems already developed in the literature, namely, the May-Gompertz map and the piecewise linear chaotic map, were used in the mixing process as pseudo-random number generators for their good chaotic properties. The image to be encrypted was first of all partitioned into N subimages of the same size. The subimages underwent a block permutation using the May-Gompertz map. This was followed by a pixel-based permutation using the piecewise linear chaotic map. The result of the two previous permutations was divided into 4 subimages, which were then mixed using pseudo-random matrices generated from the two maps mentioned above. Tests carried out on the cryptosystem designed proved that it was fast due to the 1D maps used, robust in terms of noise and data loss, exhibited a large key space, and resisted all common attacks. A very interesting feature of the proposed cryptosystem is that it works well for simultaneous multiple-image encryption.


Complexity ◽  
2020 ◽  
Vol 2020 ◽  
pp. 1-23
Author(s):  
Yucheng Chen ◽  
Chunming Tang ◽  
Zongxiang Yi

In the past decades, considerable attention has been paid to the chaos-based image encryption schemes owing to their characteristics such as extreme sensitivity to initial conditions and parameters, pseudo-randomness, and unpredictability. However, some schemes have been proven to be insecure due to using a single chaotic system. To increase the security, this work proposes a novel image encryption scheme based on the piecewise linear chaotic map (PWLCM) and the standard map. To the best of our knowledge, it is the first chaos-based image encryption scheme combining the PWLCM with the standard map, which adopts permutation-diffusion structure. Unlike the traditional scrambling way, a hierarchical diffusion strategy, which not only changes the pixel position but also modifies the value, is employed in the permutation phase. The operation model of row-by-row and column-by-column is further used to enhance the efficiency in the diffusion process. Consequently, a good trade-off efficiency and security can be achieved. Furthermore, the numerical simulations and performance analyses illustrate that the proposed encryption scheme can be used in practical application scenarios requiring lightweight security.


2020 ◽  
Vol 10 (21) ◽  
pp. 7469
Author(s):  
Zhen Li ◽  
Changgen Peng ◽  
Weijie Tan ◽  
Liangrong Li

To ensure the security and privacy of digital image when its transmitting online or storing in the cloud, we proposed a novel chaos based image encryption scheme by using randomly DNA encode and plaintext related permutation. In our scheme, we first randomly encode plain image into a nucleotide sequence under the control by the piecewise linear chaotic map(PWLCM). After that, the plaintext related permutation would be done under the control sequence which generated by hyper chaotic Lorenz system (HCLS). Next, we make diffusion processing with key DNA sequence which is generated by another PWLCM system and also encoded randomly. Finally, we decode DNA sequence into cipher image matrix. In addition, we used many common security analysis methods to test our scheme, and the result compared with other works. The tests and comparison results are shown that our proposed image cryptosystem has excellent security performance to ensure the digital image security on communication.


Paper In the field of medication, information security is central. The photographs that are dealt with in the information base and those that are transmitted over the web ought to be shielded from threatening exercises. This paper proposes a novel picture encryption plan helped with reversible information covering framework to improve the nature of the shielded picture transmission. Confusion and DNA encoding norms are utilized for the encryption philosophy. Piecewise Linear Chaotic Map (PWLCM) and Logistic Map are related with produce all parameters the demonstrated calculation needs and DNA encoding headway fills in as an accomplice instrument. The information disguising and extraction process in the blended area submits mistake during the unraveling framework. This is in light of the way that the pixel estimations of the blended spread picture change during the information concealing technique. Thusly the usage of reversible information covering structure rather than the standard information masking methods helps in recuperation of the spread picture, acknowledging immaculate unscrambling. The test results display that the proposed procedure beats the current secure picture transmission approachs


Author(s):  
Salma Bendaoud ◽  
Fatima Amounas ◽  
El Hassan El Kinani

Elliptic curve cryptography (ECC) is an effective approach to protect privacy and security of information. Digital Image encryption is an important issue widely used to protect the data and to ensure the security. Several encryption and decryption cryptosystems are available to keep image secure from unauthorized user. Elliptic Curve Cryptography (ECC) has proven to be the best solution for public key encryption. It provides a good level of security with smaller key size. In this paper we attempt to develop an enhanced Image Encryption Scheme based on ECC and PWLCM (Piecewise Linear Chaotic Map). Here, we generate a key image to enhance data security using ECC and PWLCM. From the experiment results and security analysis, we prove that our scheme cannot only achieve good encryption, but also resist the exhaustive, statistical and differential attacks.


Sign in / Sign up

Export Citation Format

Share Document