chaotic sequence
Recently Published Documents


TOTAL DOCUMENTS

256
(FIVE YEARS 55)

H-INDEX

17
(FIVE YEARS 3)

2021 ◽  
Vol 2021 ◽  
pp. 1-17
Author(s):  
Dongyao Zou ◽  
Ming Li ◽  
Jun Li ◽  
Zhigang Li

Aiming at the problem of a small parameter value range when a one-dimensional chaotic system presents a chaotic state, this paper proposes a new type of hybrid power exponential chaotic system (HPECS). HPECS combines the classic one-dimensional Sine chaotic system to form a new chaotic system (HPECS-SS). Experiments show that the obtained new chaotic system has better chaotic performance, a more extensive parameter value range, and higher sensitivity. Simultaneously, on the basis of HPECS-SS, a new image encryption algorithm is proposed. The algorithm uses the key generated by the SHA-512 algorithm and HPECS-SS to iteratively output the chaotic sequence, SFY algorithm combines the chaotic sequence to perform two rounds of scrambling on the plaintext sequence to obtain the scrambling sequence, and finally, through the modulus operation to diffuse the scrambling sequence to form the encryption matrix of the plaintext image, simulation experiment analysis shows that the algorithm has a large key space, good encryption effect, and security; the pixel change rate (NPCR) and the normalized average change intensity (UACI) are close to ideal values which can resist various cryptanalysis and attacks.


Author(s):  
Chao Chen ◽  
Hongying Zhang ◽  
Bin Wu

In view of the problem of cracking easily and partial distortion of images after encryption or decryption, a novel image encryption and decryption algorithm based on Arnod Transform and fractional chaotic is proposed. To begin with, the Arnold transform is used to encrypt. So that the spatial confidence of the original image has been comprehensively disturbed. Secondly, the XOR involving the fractional order chaotic sequence is used to encrypt. The key sequence is dynamically generated to ensure the randomness and difference of key generation. When decryption is required, the first decryption is performed using the key and XOR. Then the second decryption is carried out by using the inverse Arnold transform, and finally the decrypted image is obtained. Experimental results show that the improved algorithm has achieved better performance in encryption and decryption.


2021 ◽  
Author(s):  
Y. A. Liu ◽  
L. Chen ◽  
X. W. Li ◽  
Y. L. Liu ◽  
S. G. Hu ◽  
...  

Abstract This paper proposes an Advanced Encryption Standard (AES) encryption technique based on memristive neural network. A memristive chaotic neural network is constructed by the use of the nonlinear characteristics of the memristor. The chaotic sequence, which is sensitive to the initial value and has good random characteristics, is used as the initial key of AES grouping to realize "one-time-one-secret" dynamic encryption. Results show that the algorithm has higher security, larger key space and stronger robustness than the conventional AES. It can effectively resist the initial key fixed and exhaustive attacks.


2021 ◽  
pp. 2150465
Author(s):  
Jilei Sun

3D image is a kind of image closer to life, and 3D image has a stronger visual impact. In the past, researchers mostly protected flat images, but ignored the protection of 3D images. This paper combines the 2D chaotic system and uses random cross diffusion to propose a new encryption algorithm for 3D images which are STL format. Different from the traditional scrambling and diffusion operations, this paper uses only one iterative operation to achieve the effects of scrambling and diffusion, making the algorithm more secure. In the encryption algorithm, each value of the ciphertext is XORed with the value of the plaintext on the same coordinate axis and different from the coordinate where the ciphertext is located, the chaotic sequence, the ciphertext of different coordinate axes significantly reduces the correlation between the adjacent coordinate values. In addition, the proposed 3D image encryption algorithm is tested by statistical analysis. The experimental results show that this 3D image encryption algorithm has high security.


2021 ◽  
Vol 2021 ◽  
pp. 1-13
Author(s):  
Xuncai Zhang ◽  
Tao Wu ◽  
Yanfeng Wang ◽  
Liying Jiang ◽  
Ying Niu

To realize the safe transmission of images, a chaotic image encryption algorithm based on Latin square and random shift is proposed. The algorithm consists of four parts: key generation, pixel scrambling, pixel replacement, and bit scrambling. Firstly, the key is generated from the plain image to improve the sensitivity of the encryption method. Secondly, each pixel in each row of the image matrix is moved cyclically to the right, in turn, to change the position of the image pixel and realize pixel position scrambling. Then, a 256-order Latin square matrix composed of a chaotic sequence is used as a lookup table, and the replacement coordinates are calculated based on the image pixel value and the chaotic sequence value, replacing the corresponding coordinate elements in the image matrix. Finally, decompose the bitplane of the image matrix and combine it into two-bit matrices, scramble the two bit matrices, respectively, with the Latin square matrix, recombine the scrambled two-bit matrices, and convert them into decimal to obtain the ciphertext image. In the proposed encryption method, all the Latin square matrices used are generated by chaotic sequences, further enhancing the complexity of the generated Latin square matrix and improving the algorithm’s security. Experimental results and security analysis show that the proposed algorithm has good security performance and is suitable for image encryption.


2021 ◽  
Vol 2021 ◽  
pp. 1-8
Author(s):  
Bozuo Zhao ◽  
Rui Kong ◽  
Wei Miao

New media art is different from ready-made art, installation art, body art, and land art. New media art is a new art subject category with “optical” media and electronic media as the basic language. And, because of the continuous development of computer networks, distributed database management systems are becoming more and more popular. This article aims to study the information security control problem in the distributed new media system. Through comprehensive access control, reliable support, and many-to-many random mutual encryption, it solves the security requirements of supporting mobile computing in a distributed network environment, communication, and hierarchical grouping. Group key management and other issues have studied some key security technologies for building secure distributed information systems. This article proposes covering the behavior-based access control model ABAC (operation-based access control model), the architecture of the new Trusted Platform Module, the architecture of multithreaded crypto chips, and their service methods, as well as distributed information systems and key management solutions. Approximately obeying the chi-square distribution with 2 degrees of freedom, when the significance level is taken as 5%, the chi-square value for the skin is 5.99. Different initial values are selected for the chaotic sequence, 200 groups of chaotic sequences with a length of 2000 are selected for sequence inspection, and the pass rate is 97.5%. It can be seen that the autocorrelation and cross-correlation characteristics of the improved spatiotemporal chaotic sequence are still relatively ideal, so the usability of the platform is relatively high.


2021 ◽  
pp. 2150406
Author(s):  
Wanbo Yu ◽  
Hao Wang

Chaotic map is applied to numerous research fields, such as encryption of data and information. In this paper, a novel bit-level scrambling encryption based on three-dimensional trigonometric chaotic sequence is proposed. This encryption is operated on grayscale images because pixel value of which is between 0 and 255, which can be converted into 8-bit binary number, then each image can be converted into eight binary images. Combine binary images a three-dimensional matrix as input, which have three index values width, height, and page. Generate three numbers by the chaotic sequence to locate the value of the matrix need to be changed. After the value is located, change its value 0 to 1 or 1 to 0, this is the basic encryption scheme. This paper makes a three-dimensional binary matrix with 32 images to test the encryption scheme, and get average value of images’ number of pixel change rate at 0.9603, unified averaged change intensity at 31.27%, information entropy at 7.9891, also the histograms. And correlation coefficients of each pixel from three directions are small. There are comparisons with other encryptions too. The key space of this encryption is more than 10[Formula: see text].


Symmetry ◽  
2021 ◽  
Vol 13 (6) ◽  
pp. 1092
Author(s):  
Qing Duan ◽  
Lu Wang ◽  
Hongwei Kang ◽  
Yong Shen ◽  
Xingping Sun ◽  
...  

Swarm-based algorithm can successfully avoid the local optimal constraints, thus achieving a smooth balance between exploration and exploitation. Salp swarm algorithm(SSA), as a swarm-based algorithm on account of the predation behavior of the salp, can solve complex daily life optimization problems in nature. SSA also has the problems of local stagnation and slow convergence rate. This paper introduces an improved salp swarm algorithm, which improve the SSA by using the chaotic sequence initialization strategy and symmetric adaptive population division. Moreover, a simulated annealing mechanism based on symmetric perturbation is introduced to enhance the local jumping ability of the algorithm. The improved algorithm is referred to SASSA. The CEC standard benchmark functions are used to evaluate the efficiency of the SASSA and the results demonstrate that the SASSA has better global search capability. SASSA is also applied to solve engineering optimization problems. The experimental results demonstrate that the exploratory and exploitative proclivities of the proposed algorithm and its convergence patterns are vividly improved.


Sign in / Sign up

Export Citation Format

Share Document