Article
Optics
Qiang Lai, Hui Zhang
Summary: This paper presents a new image encryption method based on a novel two-dimensional memristive-coupled hyperchaotic Sine map. The proposed map shows a higher propensity for hyperchaotic behavior in multiple parameter ranges, making it suitable for image encryption. The algorithm involves permutation and diffusion processes, which disorder the pixel arrangement and propagate changes across the entire cipher-image using a new bit-based double-loop-shift exclusive-OR (XOR) mechanism. The algorithm's encryption and decryption effects are numerically investigated, and its security is fully evaluated. Performance evaluations demonstrate its key sensitivity, robustness, and superiority over related algorithms in terms of information entropy, correlation coefficient, and resistance against differential attacks.
OPTICS AND LASER TECHNOLOGY
(2023)
Article
Physics, Multidisciplinary
M. Emin Sahin
Summary: This paper proposes an image encryption model that utilizes different chaotic systems, including the logistic map, Lorenz chaotic system, and memristor-based hyperchaotic system, combined with AES and RSA encryption algorithms. The proposed scheme applies bit-based pixel diffusion and confusion techniques to enhance the security of encrypted images. Statistical and security tests are conducted to compare the performance of different encryption systems and algorithms, and the experimental results demonstrate the effectiveness of the proposed image encryption scheme in terms of security, speed, and reliability, offering valuable insights for future chaos-based encryption systems.
Article
Computer Science, Artificial Intelligence
Qiang Lai, Yuan Liu
Summary: This paper proposes a high-sensitive cross-channel color image encryption algorithm (SFHM-IEA) using a two-dimensional hyperchaotic map (2D-SFHM) derived from Sine map and mathematical function. The performance of the proposed map is numerically investigated and shows that 2D-SFHM generates highly stochastic chaotic sequences. The algorithm combines peripheral-pixel extension technique to achieve strong confusion and diffusion properties, and experimental results demonstrate its ability to securely resist various illegal attacks.
EXPERT SYSTEMS WITH APPLICATIONS
(2023)
Article
Computer Science, Artificial Intelligence
Sachikanta Dash, Sasmita Padhy, S. Anjali Devi, Savya Sachi, K. Abhimanyu Kumar Patro
Summary: Digital images are frequently used for diagnosis in clinics, and the security of patient data during storage and transmission is crucial. This paper presents an efficient image encryption method that eliminates pixel correlation and provides strong security. The method involves intra-inter bit-level pixel operations and parallel execution, resulting in increased security and superior performance.
EXPERT SYSTEMS WITH APPLICATIONS
(2023)
Article
Physics, Multidisciplinary
Najeeb Alam Khan, Muhammad Ali Qureshi, Saeed Akbar, Asmat Ara
Summary: A new five-dimensional fractional-order chaotic system is proposed based on the Lorenz-Stenflo model with a feedback memristor, which exhibits a two-wing attractor with symmetrical coexistence. The system is found to be unstable and hyperchaotic through stability analysis and Lyapunov exponents calculation. Analogue circuits are implemented for both open-loop and closed-loop memristive systems, and the simulation results show good agreement with numerical simulations. Furthermore, a new cryptographic scheme is presented using random data from the chaotic system for multimedia encryption.
Article
Mathematics, Applied
Vladimir N. Belykh, Nikita V. Barabash, Igor Belykh
Summary: This study constructs an analytically tractable piecewise-smooth system and derives a Poincare return map to prove the existence of a double-scroll attractor and characterize its global dynamical properties. The study also discovers a set of saddle orbits associated with infinite-period Smale horseshoes. These complex hyperbolic sets arise from an ordered iterative process of sequential intersections between different horseshoes and their preimages.
Article
Mathematics, Interdisciplinary Applications
Joao Inacio Moreira Bezerra, Vinicius Valduga de Almeida Camargo, Alexandre Molter
Summary: The internet is now the main channel for private communication, with images being the most commonly shared files. Traditional algorithms are not suitable for large image files, leading to the rise of chaos theory as an alternative for image encryption. However, many existing methods are insecure or ineffective, prompting the development of a new chaotic cipher.
CHAOS SOLITONS & FRACTALS
(2021)
Article
Mathematics
Hanshuo Qiu, Xiangzi Zhang, Huaixiao Yue, Jizhao Liu
Summary: This paper proposes an encryption scheme based on an eighth-order hyperchaotic system, which offers a large key space and can resist various attacks, demonstrating excellent security performance.
Article
Optics
Yin Xiao, Lina Zhou, Zilan Pan, Yonggui Cao, Wen Chen
Summary: In this research, a physically enhanced ghost encoding scheme is proposed by utilizing the optical channel characteristics and dynamically generated scaling factors as security keys. The dynamic scaling factors are controlled in the optical path to achieve physical enhancement of ghost encoding. The proposed method introduces a variable beam attenuator and an amplitude-only spatial light modulator (SLM) to generate dynamic scaling factors. Optical experiments are conducted to verify the feasibility and effectiveness of the proposed scheme, which could bring new research perspectives to optical ghost encoding.
Article
Mathematics, Interdisciplinary Applications
Melih Yildirim
Summary: This study proposes an optical setup with a unique color image cryptography technique using a chaotic system and DNA encoding. The encryption scheme is tested for security through various tests and simulations, demonstrating resistance against statistical and differential attacks.
CHAOS SOLITONS & FRACTALS
(2022)
Article
Engineering, Multidisciplinary
Xudong Liu, Xiaojun Tong, Zhu Wang, Miao Zhang, Yunhua Fan
Summary: This paper proposes a novel Devaney chaotic map with uniform trajectories to solve the problems of weak chaotic behaviors and uneven trajectory distribution in existing systems. The chaotic map possesses the three principal features of the Devaney definition and preserves uniform trajectory distribution. Simulation experiments show that the proposed algorithm has advantages in efficiency and security. A color image encryption algorithm is designed using the Devaney chaotic map, improving the confusion and diffusion structure of existing algorithms. The algorithm demonstrates excellent ability to resist probabilistic attacks and differential attacks, avoiding decryption failure caused by tampering with the hash value during transmission.
APPLIED MATHEMATICAL MODELLING
(2023)
Article
Mathematics, Interdisciplinary Applications
Chunbo Xiu, Jingyao Fang, Xin Ma
Summary: In this paper, a sixth-order memristive hyperchaotic system is designed to enhance the order and Kolmogorov entropy, and improve the realizability of the circuit. The dynamic characteristics of the system are analyzed through Lyapunov exponential spectrum, phase trajectory diagram, and bifurcation diagram, and the effects of system control parameters and initial state on the system dynamic behavior are explored. Equivalent circuit models of flux-controlled and charge-controlled memristors are constructed, and the hardware simulation design is completed. The experimental results demonstrate that the proposed system can exhibit various attractors and show the behavior of period doubling bifurcation entering chaos and anti-period doubling exiting chaos. The physical realizability of the hyperchaotic system is verified through hardware circuit simulation. The memristive hyperchaotic system can be applied to image encryption to enhance the confidentiality and security of images based on its strong initial value sensitivity and large K entropy.
CHAOS SOLITONS & FRACTALS
(2022)
Article
Computer Science, Information Systems
Heping Wen, Ruiting Chen, Jieyi Yang, Tianle Zheng, Jiahao Wu, Wenxing Lin, Huilin Jian, Yiting Lin, Linchao Ma, Zhen Liu, Chongfu Zhang
Summary: This study conducts a cryptographic security analysis on a color image encryption algorithm, finding that the algorithm can be completely cracked by a chosen-plaintext attack method due to equivalent keys and simplified linear transformation. Experimental results confirm the effectiveness and efficiency of our method.
MULTIMEDIA TOOLS AND APPLICATIONS
(2023)
Article
Computer Science, Information Systems
Sara M. Mohamed, Wafaa S. Sayed, Ahmed H. Madian, Ahmed G. Radwan, Lobna A. Said
Summary: This paper extends a memristive chaotic system with transcendental nonlinearities to the fractional-order domain. The chaotic properties of the extended system are validated through bifurcation analysis and spectral entropy. The presented system is employed in the substitution stage of an image encryption algorithm, demonstrating its efficiency through statistical tests, key sensitivity analysis, and resistance to brute force and differential attacks. The proposed system includes reconfigurable coordinate rotation digital computer (CORDIC) and Grunwald-Letnikov (GL) architectures for trigonometric and hyperbolic functions and fractional-order operator implementations, respectively. It achieved a throughput of 0.396 Gbit/s on the Artix-7 FPGA board.
Article
Mathematics, Interdisciplinary Applications
Lujie Ren, Jun Mou, Santo Banerjee, Yushu Zhang
Summary: This research constructs a new discrete memristor model and couples it with a new three-dimensional hyperchaotic map to discuss its stability and analyze its dynamical characteristics. The study demonstrates the coexistence of periodic, quasi-periodic, chaotic, and hyperchaotic attractors in the model, and successfully implements the hyperchaotic map on DSP hardware platforms. Finally, the discrete hyperchaotic map is applied to image encryption.
CHAOS SOLITONS & FRACTALS
(2023)