multiple chaotic maps
Recently Published Documents


TOTAL DOCUMENTS

43
(FIVE YEARS 17)

H-INDEX

7
(FIVE YEARS 2)

Author(s):  
Mayada T. Wazi ◽  
Dalia S. Ali ◽  
Nadia M. G. Al-Saidi ◽  
Nawras A. Alawn

This work focused on introducing a new two-dimensional (2D) chaotic system. It is combined of some existing maps, the logistic, iterative chaotic map with infinite collapse, and Henon maps; we called it 2D-LCHM. The assessment of the actual performance of 2D-LCHM presents its sensitivity to a tiny change in the initial condition. Besides, its dynamics behavior is very complicated. It also has hyperchaotic properties and good ergodicity. The proposed system is occupied with designing a new image encryption system. Changing the image pixels’ locations is the primary step in the encryption process. The original image is splitting into four blocks to create four different keys based on 2D-LCHM; this reduces the computation time and increases the complexity. To obtain the encryption image, we have to repeat the partitioning process several times for each block. The encryption image’s efficiency is shown through some performance analysis such as; image histogram, the number of pixels changes rate (NPCR), the unified average changing intensity (UACI), pixels correlation, and entropy. The proposed system is compared with some efficient encryption algorithms in terms of chaocity attributes and image performance; the analysis result showed consistent improvement.


Author(s):  
Yousif S. Najaf ◽  
Maher K. Mahmood Al-Azawi

Image is one of the most important forms of information. In this paper, two public key encryption systems are proposed to protect images from various attacks. Both systems depend on generating a chaotic matrix (<em>I</em>) using multiple chaotic maps. The parameters for these maps are taken from the shared secret keys generated from Chebyshev map using public keys for Alice and secret key for Bob or vice versa. The second system has the feature of deceiving the third party for searching for fake keys. Analysis and tests showed that the two proposed systems resist various attacks and have very large key space. The results are compared with other chaos based systems to show the superiority of these two proposed systems.


2021 ◽  
Vol 11 (9) ◽  
pp. 3797
Author(s):  
Rong Huang ◽  
Fang Han ◽  
Xiaojuan Liao ◽  
Zhijie Wang ◽  
Aihua Dong

Coupled Map Lattice (CML) usually serves as a pseudo-random number generator for encrypting digital images. Based on our analysis, the existing CML-based systems still suffer from problems like limited parameter space and local chaotic behavior. In this paper, we propose a novel intermittent jumping CML system based on multiple chaotic maps. The intermittent jumping mechanism seeks to incorporate the multi-chaos, and to dynamically switch coupling states and coupling relations, varying with spatiotemporal indices. Extensive numerical simulations and comparative studies demonstrate that, compared with the existing CML-based systems, the proposed system has a larger parameter space, better chaotic behavior, and comparable computational complexity. These results highlight the potential of our proposal for deployment into an image cryptosystem.


Author(s):  
Vinay D R ◽  
◽  
Ananda Babu J

Most of the present hiding techniques on video are considered over plaintext domain and plain video sequences are used to embed information bits. The work presented here reveals the novelty for information embedding in a video sequence over the ciphered domain. The carrier video signal is encrypted using chaos technique which uses multiple chaotic maps for encryption. The proposed reversible video information hiding scheme (RVIHS) exhibits an innovative property that, at the decoding side we can perfectly extract the information along with carrier video without any distortion. The public key modulation is a mechanism used to achieve data embedding, where as in secret key encryption is not required. The proposed approach is used to differentiate encoded and non-encoded picture patches at decoder end by implementing 2 class Support Vector Machine grouping. This helps for us to retrieve the original visual sequence with embedded message and to scale up embedding capacity. The experiment is conducted using real time videos for embedding the information. The outcome of proposed work bring about best embedding capacity, compared to existing techniques.


IEEE Access ◽  
2021 ◽  
Vol 9 ◽  
pp. 52277-52291
Author(s):  
Mujeeb Ur Rehman ◽  
Arslan Shafique ◽  
Sohail Khalid ◽  
Iqtadar Hussain

IEEE Access ◽  
2021 ◽  
pp. 1-1
Author(s):  
Roayat Ismail Abdelfatah ◽  
B. Esraa Abdelkhalek ◽  
Mohamed E. Nasr

Sign in / Sign up

Export Citation Format

Share Document