Article
Computer Science, Information Systems
Med Sayah Moad, Mohamed Redouane Kafi, Amine Khaldi
Summary: This paper proposes a watermarking approach for patient identification and watermark integrity verification in telemedicine. The use of discrete wavelet transform allows generating a watermarked image almost similar to the host signal. The watermark also shows resistance to various attacks commonly used in watermarking.
MULTIMEDIA TOOLS AND APPLICATIONS
(2022)
Article
Mathematics, Applied
Qiang Lai, Genwen Hu, Ugur Erkan, Abdurrahim Toktas
Summary: This paper proposes a new medical image encryption scheme based on a new hyperchaotic map. The scheme demonstrates excellent security and efficiency, suitable for medical images with distinctive formats. A two-dimensional Logistic-Gaussian hyperchaotic map (2D-LGHM) is constructed, which exhibits superior ergodicity and unpredictability. The scheme utilizes chaotic sequences to break correlation between pixels and modify global pixel values. Tests on diverse medical images show that the scheme is highly robust and effective against security attacks and data loss.
APPLIED MATHEMATICS AND COMPUTATION
(2023)
Article
Physics, Multidisciplinary
Ning Mao, Xiaojun Tong, Miao Zhang, Zhu Wang
Summary: In order to address the issues of existing chaotic systems including simple permutation-diffusion structure, low encryption efficiency, and limited chaos range, this paper proposes a hyperchaotic image encryption algorithm based on LSTM neural network and lifting wavelet transform. A new hyperchaotic system is constructed by building upon the Lorenz chaotic system, which possesses more complex dynamic characteristics and higher Lyapunov exponent. The proposed algorithm utilizes lifting wavelet transform and zigzag conversion algorithm for image encryption, and integrates a trained LSTM neural network to generate a second key for encryption using Henon chaotic sequence, effectively preventing chosen-plaintext attack. Experimental results demonstrate that the proposed algorithm exhibits good performance in key security, differential attack, statistical analysis, and operation efficiency, indicating its high security level.
Article
Mathematics, Interdisciplinary Applications
Ziqi Zhou, Xuemei Xu, Yexia Yao, Zhaohui Jiang, Kehui Sun
Summary: This paper proposes a multiple-image encryption algorithm that can encrypt any number, size, and type of image. It introduces a two-dimensional chaotic model to generate multiple types of chaotic systems, improving the design difficulty of chaotic systems. The algorithm combines image fusion, secret key generation, and simultaneous permutation and diffusion to enhance security and efficiency, and experimental simulations and security analysis verify its effectiveness.
CHAOS SOLITONS & FRACTALS
(2023)
Article
Multidisciplinary Sciences
Arslan Shafique, Abid Mehmood, Mourad Elhadef, Kashif Hesham Khan
Summary: In this paper, a new encryption system based on the bit-plane extraction method, chaos theory, and Discrete Wavelet Transform (DWT) is proposed to improve the processing time efficiency and security. Multiple cyberattack analyses and statistical security analyses are performed to demonstrate the superiority of the proposed encryption system.
Article
Physics, Multidisciplinary
Taiyong Li, Duzhong Zhang
Summary: This paper proposes a novel hyperchaotic image encryption scheme MBPD, which enhances image security through multiple bit permutation and diffusion. Extensive experiments show that MBPD can effectively resist different types of attacks and outperforms other popular encryption methods.
Article
Computer Science, Information Systems
Lin Teng, Xingyuan Wang, Yongjin Xian
Summary: A two-dimensional cross-mode hyperchaotic map based on logistic and sine maps is proposed in this paper. The chaotic behavior and performance of the system are analyzed, showing that it possesses promising ergodicity and a wide range of hyperchaotic phenomena. An effective image encryption algorithm is developed using this map.
INFORMATION SCIENCES
(2022)
Article
Computer Science, Hardware & Architecture
R. Anandkumar, K. Dinesh, Ahmed J. Obaid, Praveen Malik, Rohit Sharma, Ankur Dumka, Rajesh Singh, Satish Khatak
Summary: This study proposes a secure framework that integrates e-Health and cloud using Hyper Chaos-based Image Encryption to protect sensitive image data transmitted in a cloud environment. The framework applies different chaos-based image encryption and image scrambling schemes depending on the type and intensity of the attack.
COMPUTERS & ELECTRICAL ENGINEERING
(2022)
Article
Computer Science, Artificial Intelligence
Mimoun Hamdi, Jamel Miri, Borhane Moalla
Summary: This paper introduces a hybrid encryption algorithm based on chaotic systems, utilizing block and stream ciphers. The algorithm achieves a high level of security due to the specific characteristics of chaotic systems, with the Chirikov Standard Map chosen to minimize encryption time. The proposed scheme shows excellent cryptographic properties, being sensitive to secret key changes, resistant to common attacks, fast, and easy to implement.
Article
Mathematics
Shenli Zhu, Xiaoheng Deng, Wendong Zhang, Congxu Zhu
Summary: This paper proposes a new two-dimensional discrete hyperchaotic system and uses it to design a pseudo-random number generator and an efficient color image encryption algorithm. The system has very complex dynamic properties and can generate highly random chaotic sequences. The proposed PRNG can generate highly random bit sequences that meet all NIST testing standards. The color image encryption algorithm achieves pixel permutation and diffusion in parallel, improving both encryption speed and security level.
Article
Optics
Dongming Huo, Zhilong Zhu, Lisheng Wei, Chao Han, Xin Zhou
Summary: The proposed image encryption scheme combines 2DCS and IWT to ensure data security, increase the speed of the decryption algorithm, and achieve visual security without loss of information. The effectiveness, data security, visual security, and real-time performance of the scheme have been tested in simulation results and comprehensive performance analysis.
OPTICS COMMUNICATIONS
(2021)
Article
Physics, Multidisciplinary
Chengrui Zhang, Junxin Chen, Dongming Chen
Summary: This paper proposes an image encryption scheme based on a 2D hyperchaotic map and breaks this scheme with chosen-plaintext and chosen-ciphertext attacks. The feasibility of the attack methods is confirmed through theoretical derivations and experimental results. The attack time is relatively short and applicable to images of various sizes.
Article
Physics, Multidisciplinary
Xiaomeng Song, Mengna Shi, Yanqi Zhou, Erfu Wang
Summary: In order to improve the transmission efficiency and security of image encryption, we combined a ZUC stream cipher and chaotic compressed sensing. The algorithm demonstrated better encryption and compression performance.
Article
Optics
Yuexi Peng, Zixin Lan, Kehui Sun, Wei Xu
Summary: Chaotic maps are commonly used in image encryption, but many of them have limited chaotic ranges. To address this issue, a new chaotic map is proposed by combining modular sinusoidal discrete memristor and classical sine map. An image encryption algorithm is developed based on this new chaotic map, which allows controlling the encryption time by adjusting the block size. The algorithm consists of random-cross permutation and alternate-plane diffusion, which shuffle the pixels and process the image using chaotic sequences, respectively. Simulation experiments and performance analysis demonstrate the effectiveness and reliability of the proposed encryption algorithm.
OPTICS AND LASER TECHNOLOGY
(2023)
Article
Physics, Multidisciplinary
Yerui Guang, Longfei Yu, Wenjie Dong, Ya Wang, Jian Zeng, Jiayu Zhao, Qun Ding
Summary: This paper proposes an effective lightweight LZUC cipher based on chaotic system to improve the traditional ZUC algorithm, which achieves certain lightweighting effects and has good statistical properties and security of the output sequence. The performance of the LZUC cipher is verified through NIST statistical tests and analysis of typical attacks. In addition, an image security system is designed using the LZUC cipher to further validate the encryption effectiveness through analysis of plaintext and ciphertext data.
Article
Engineering, Electrical & Electronic
Danyang Qin, Shuang Jia, Songxiang Yang, Erfu Wang, Qun Ding
JOURNAL OF SENSORS
(2016)
Article
Physics, Multidisciplinary
Chuanfu Wang, Qun Ding
Article
Physics, Multidisciplinary
Juan Wang, Qun Ding
Article
Mathematics, Interdisciplinary Applications
Chuanfu Wang, Qun Ding
Article
Computer Science, Information Systems
Lina Ding, Qun Ding
Article
Multidisciplinary Sciences
Zijing Jiang, Qun Ding
Summary: In this paper, a construction method of S-boxes with good cryptographic properties is proposed by using chaos theory and Bent functions. The S-box's output consists of a set of Bent functions and is analyzed for nonlinearity, differential uniformity, strict avalanche criterion, and independence criterion. The security analysis shows that the proposed S-box has excellent cryptographic properties.
Article
Computer Science, Information Systems
Wenhao Yan, Qun Ding
Summary: This paper introduces a method to enhance the dynamic characteristics of one-dimensional chaotic maps, proposing a numerical chaotic map based on Logistic map and Sine map. Through analysis of its application in cryptology and security characteristics, the research shows the potential of the proposed chaotic system in cryptography study.
Article
Physics, Multidisciplinary
Chunlei Fan, Qun Ding
Summary: The performance of chaotic binary sequences has been degraded in varying degrees due to the influence of finite calculation accuracy and binary quantization method, resulting in the emergence of multi-period phenomena. This paper proposes a multi-period positioning algorithm (MPPA) to accurately detect and locate accurate period and local period phenomena in chaotic binary sequences.
Article
Mathematics, Interdisciplinary Applications
Chunlei Fan, Qun Ding, Chi K. Tse
Summary: This study investigates the round-off and quantization errors that may occur when converting chaotic real-valued sequences to binary sequences in chaotic systems, as well as the impact of these errors on the randomness of binary sequences. A fast period detection algorithm based on parallel computing is proposed to quickly and accurately locate local periodicities in chaotic binary sequences. Different logistic binary sequences are analyzed to demonstrate the effectiveness and practicality of the algorithm.
INTERNATIONAL JOURNAL OF BIFURCATION AND CHAOS
(2022)
Article
Engineering, Mechanical
Ya'nan Xing, Wenhao Yan, Yanpeng Zhang, Qun Ding
Summary: Discrete chaotic synchronization is crucial in secure communication, but some systems cannot achieve the required synchronization. In this study, a new algorithm blended with error control was proposed to design an inverse discrete chaotic synchronization system. By controlling the coefficient matrix of the system based on the eigenvalues of the synchronization error system, the positive Lyapunov exponents in the system can be precisely controlled. The results showed that the error control-blended inverse discrete chaotic synchronization system had good chaotic characteristics and high reliability and flexibility.
NONLINEAR DYNAMICS
(2023)
Article
Computer Science, Information Systems
Hai Cheng, Yu Song, Chunguang Huang, Qun Ding
JOURNAL OF INTERNET TECHNOLOGY
(2016)
Article
Computer Science, Information Systems
Zhong Zhang, Qun Ding
JOURNAL OF INTERNET TECHNOLOGY
(2013)