19 research outputs found
Recommended from our members
High-security image encryption based on a novel simple fractional-order memristive chaotic system with a single unstable equilibrium point
YesFractional-order chaotic systems have more complex dynamics than integer-order chaotic systems. Thus, investigating fractional chaotic systems for the creation of image cryptosystems has been popular recently. In this article, a fractional-order memristor has been developed, tested, numerically analyzed, electronically realized, and digitally implemented. Consequently, a novel simple three-dimensional (3D) fractional-order memristive chaotic system with a single unstable equilibrium point is proposed based on this memristor. This fractional-order memristor is connected in parallel with a parallel capacitor and inductor for constructing the novel fractional-order memristive chaotic system. The system’s nonlinear dynamic characteristics have been studied both analytically and numerically. To demonstrate the chaos behavior in this new system, various methods such as equilibrium points, phase portraits of chaotic attractor, bifurcation diagrams, and Lyapunov exponent are investigated. Furthermore, the proposed fractional-order memristive chaotic system was implemented using a microcontroller (Arduino Due) to demonstrate its digital applicability in real-world applications. Then, in the application field of these systems, based on the chaotic behavior of the memristive model, an encryption approach is applied for grayscale original image encryption. To increase the encryption algorithm pirate anti-attack robustness, every pixel value is included in the secret key. The state variable’s initial conditions, the parameters, and the fractional-order derivative values of the memristive chaotic system are used for contracting the keyspace of that applied cryptosystem. In order to prove the security strength of the employed encryption approach, the cryptanalysis metric tests are shown in detail through histogram analysis, keyspace analysis, key sensitivity, correlation coefficients, entropy analysis, time efficiency analysis, and comparisons with the same fieldwork. Finally, images with different sizes have been encrypted and decrypted, in order to verify the capability of the employed encryption approach for encrypting different sizes of images. The common cryptanalysis metrics values are obtained as keyspace = 2648, NPCR = 0.99866, UACI = 0.49963, H(s) = 7.9993, and time efficiency = 0.3 s. The obtained numerical simulation results and the security metrics investigations demonstrate the accuracy, high-level security, and time efficiency of the used cryptosystem which exhibits high robustness against different types of pirate attacks
Entropy analysis and image encryption application based on a new chaotic system crossing a cylinder
Designing chaotic systems with specific features is a hot topic in nonlinear dynamics. In this study, a novel chaotic system is presented with a unique feature of crossing inside and outside of a cylinder repeatedly. This new system is thoroughly analyzed by the help of the bifurcation diagram, Lyapunov exponents' spectrum, and entropy measurement. Bifurcation analysis of the proposed system with two initiation methods reveals its multistability. As an engineering application, the system's efficiency is tested in image encryption. The complexity of the chaotic attractor of the proposed system makes it a proper choice for encryption. States of the chaotic attractor are used to shue the rows and columns of the image, and then the shued image is XORed with the states of chaotic attractor. The unpredictability of the chaotic attractor makes the encryption method very safe. The performance of the encryption method is analyzed using the histogram, correlation coefficient, Shannon entropy, and encryption quality. The results show that the encryption method using the proposed chaotic system has reliable performance. - 2019 by the authors.Scopu
Symmetry in Chaotic Systems and Circuits
Symmetry can play an important role in the field of nonlinear systems and especially in the design of nonlinear circuits that produce chaos. Therefore, this Special Issue, titled “Symmetry in Chaotic Systems and Circuits”, presents the latest scientific advances in nonlinear chaotic systems and circuits that introduce various kinds of symmetries. Applications of chaotic systems and circuits with symmetries, or with a deliberate lack of symmetry, are also presented in this Special Issue. The volume contains 14 published papers from authors around the world. This reflects the high impact of this Special Issue
A novel conservative chaos driven dynamic DNA coding for image encryption
In this paper, we propose a novel conservative chaotic standard map-driven
dynamic DNA coding (encoding, addition, subtraction and decoding) for the image
encryption. The proposed image encryption algorithm is a dynamic DNA coding
algorithm i.e., for the encryption of each pixel different rules for encoding,
addition/subtraction, decoding etc. are randomly selected based on the
pseudorandom sequences generated with the help of the conservative chaotic
standard map. We propose a novel way to generate pseudo-random sequences
through the conservative chaotic standard map and also test them rigorously
through the most stringent test suite of pseudo-randomness, the NIST test
suite, before using them in the proposed image encryption algorithm. Our image
encryption algorithm incorporates a unique feed-forward and feedback mechanisms
to generate and modify the dynamic one-time pixels that are further used for
the encryption of each pixel of the plain image, therefore, bringing in the
desired sensitivity on plaintext as well as ciphertext. All the controlling
pseudorandom sequences used in the algorithm are generated for a different
value of the parameter (part of the secret key) with inter-dependency through
the iterates of the chaotic map (in the generation process) and therefore
possess extreme key sensitivity too. The performance and security analysis has
been executed extensively through histogram analysis, correlation analysis,
information entropy analysis, DNA sequence-based analysis, perceptual quality
analysis, key sensitivity analysis, plaintext sensitivity analysis, etc., The
results are promising and prove the robustness of the algorithm against various
common cryptanalytic attacks.Comment: 29 pages, 5 figures, 15 table
Medical Images Encryption Based on Adaptive-Robust Multi-Mode Synchronization of Chen Hyper-Chaotic Systems
In this paper, a novel medical image encryption method based on multi-mode synchronization of hyper-chaotic systems is presented. The synchronization of hyper-chaotic systems is of
great significance in secure communication tasks such as encryption of images. Multi-mode synchronization is a novel and highly complex issue, especially if there is uncertainty and disturbance. In
this work, an adaptive-robust controller is designed for multimode synchronized chaotic systems
with variable and unknown parameters, despite the bounded disturbance and uncertainty with a
known function in two modes. In the first case, it is a main system with some response systems,
and in the second case, it is a circular synchronization. Using theorems it is proved that the two
synchronization methods are equivalent. Our results show that, we are able to obtain the convergence
of synchronization error and parameter estimation error to zero using Lyapunov’s method. The
new laws to update time-varying parameters, estimating disturbance and uncertainty bounds are
proposed such that stability of system is guaranteed. To assess the performance of the proposed
synchronization method, various statistical analyzes were carried out on the encrypted medical
images and standard benchmark images. The results show effective performance of the proposed
synchronization technique in the medical images encryption for telemedicine application.MINECO/ FEDER under the RTI2018-098913-B100
CV20-45250 and A-TIC- 080-UGR18 project
A novel four-wing chaotic system with multiple equilibriums: Dynamical analysis, multistability, circuit simulation and pseudo random number generator (PRNG) based on the voice encryption
Recently, there has been tremendous interest worldwide in the possibility of using chaos in communication systems. Many different chaos-based secure communication schemes have been proposed up until now. However, systems with strong chaoticity are more suitable for chaos-based secure communication. From the viewpoint of Lyapunov exponents, a chaotic system with a larger positive Lyapunov exponent is said to be more complex. This paper constructing a multistable chaotic system that can produce coexisting attractors is an attractive field of research due to its theoretical and practical usefulness. An innovative 3D dynamical system is presented in this research. It can display various coexisting attractors for the same values of parameters. The new system is more suitable for chaos-based applications than recently reported systems since it exhibits strong multistable chaotic behavior, as proved by its large positive Lyapunov exponent. Furthermore, the accuracy of the numerical calculation and the system's physical implementations are confirmed by analog circuit simulation. Finally, implementing the proposed voice encryption is done using a four-wing chaotic system based on the PRNG
Entropy in Image Analysis III
Image analysis can be applied to rich and assorted scenarios; therefore, the aim of this recent research field is not only to mimic the human vision system. Image analysis is the main methods that computers are using today, and there is body of knowledge that they will be able to manage in a totally unsupervised manner in future, thanks to their artificial intelligence. The articles published in the book clearly show such a future