scholarly journals An Amplitude-controllable 3-D Hyperchaotic Map with Homogenous Multistability

Author(s):  
Xuejiao Zhou ◽  
Chunbiao Li ◽  
Yongxin Li ◽  
Xu Lu ◽  
Tengfei Lei

Abstract By introducing a sinusoidal function into a three-dimensional map, a hyperchaotic map with three positive Lyapunov exponents is derived. The system has two amplitude controllers, a total controller, and a partial controller. The hyperchaotic map shares a unique structure of two-leaf and three-leaf attractors under united Lyapunov exponents. Furthermore, homogenous multistability is found in the 3-D map, where the initial data determine the attractor structure combined with the distance between any two leaves. Experimental hardware based on STM32 is built to prove the numerical findings. The hyperchaotic map is introduced for color image encryption. The analysis of key space, histogram, information entropy, correlation, and anti-noise infection shows its powerful performance in encryption and security.

2019 ◽  
Vol 29 (09) ◽  
pp. 1950115 ◽  
Author(s):  
Guangfeng Cheng ◽  
Chunhua Wang ◽  
Hua Chen

In recent years, scholars studied and proposed some secure color image encryption algorithms. However, the majority of the published algorithms encrypted red, green and blue (called [Formula: see text], [Formula: see text], [Formula: see text] for short) components independently. In the paper, we propose a color image encryption scheme based on hyperchaotic system and permutation-diffusion architecture. The encryption algorithm utilizes a block permutation which is realized by mixing [Formula: see text], [Formula: see text], [Formula: see text] components to strengthen the dependence of each component. Besides, it can reduce time consumption. Then, the key streams generated by the hyperchaotic system are exploited to diffuse the pixels, the three components affect each other again. And in the diffusion process, we can get two totally different encrypted images even though we change the last pixel because the [Formula: see text] component is diffused in reverse order. The experimental results reveal that our algorithm possesses better abilities of resisting statistical attacks and differential attacks, larger key space, closer information entropy to 8, and faster encryption speed compared with other chaos-based color image encryption algorithms.


Entropy ◽  
2020 ◽  
Vol 22 (11) ◽  
pp. 1276
Author(s):  
Khushbu Khalid Butt ◽  
Guohui Li ◽  
Fawad Masood ◽  
Sajid Khan

Several secure image encryption systems have been researched and formed by chaotic mechanisms in current decades. This work recommends an innovative quantum color image encryption method focused on the Lucas series-based substitution box to enhance the competence of encryption. The suggested encryption technique has more excellent key space and significant confidentiality. The chaotic system, along with the substitution box, exhibits additional complicated dynamical behavior, sufficient arbitrariness, and uncertainty than all others focused on just chaotic models. Theoretical and simulation assessments show that the offered image encryption performs admirably, its traditional equivalents in terms by efficiency in terms of statistical analysis.


2019 ◽  
Vol 9 (22) ◽  
pp. 4854
Author(s):  
Li-Lian Huang ◽  
Shi-Ming Wang ◽  
Jian-Hong Xiang

This paper proposes a novel tweak-cube color image encryption scheme jointly manipulated by chaos and hyper-chaos. One-dimensional (1D) chaotic maps are effortless to operate, but the key space is relatively small. The hyperchaotic system has complex dynamics properties, which are capable of compensating for the defects of 1D chaotic maps. Thus, we first raise an improved 1D chaotic map with an increased key space. Then, we associate it with a four-dimensional (4D) hyperchaotic system to generate the key streams and further rotate and shift the rows and columns of each component of Red (R), Green (G), and Blue (B) for the color image. The permuting mode is to disturb the original position of the pixels by mimicking the way of twisting the Rubik’s cube. Moreover, the key stream updated by the plain images is also utilized for diffusion and scramble at the bit level. As a consequence, our cryptosystem enhances the security without at the expense of increasing time cost.


Entropy ◽  
2021 ◽  
Vol 23 (3) ◽  
pp. 361
Author(s):  
Duzhong Zhang ◽  
Lexing Chen ◽  
Taiyong Li

With increasing utilization of digital multimedia and the Internet, protection on this digital information from cracks has become a hot topic in the communication field. As a path for protecting digital visual information, image encryption plays a crucial role in modern society. In this paper, a novel six-dimensional (6D) hyper-chaotic encryption scheme with three-dimensional (3D) transformed Zigzag diffusion and RNA operation (HCZRNA) is proposed for color images. For this HCZRNA scheme, four phases are included. First, three pseudo-random matrices are generated from the 6D hyper-chaotic system. Second, plaintext color image would be permuted by using the first pseudo-random matrix to convert to an initial cipher image. Third, the initial cipher image is placed on cube for 3D transformed Zigzag diffusion using the second pseudo-random matrix. Finally, the diffused image is converted to RNA codons array and updated through RNA codons tables, which are generated by codons and the third pseudo-random matrix. After four phases, a cipher image is obtained, and the experimental results show that HCZRNA has high resistance against well-known attacks and it is superior to other schemes.


2013 ◽  
Vol 479-480 ◽  
pp. 948-952
Author(s):  
Xiao Wei Li ◽  
Sung Jin Cho ◽  
Seok Tae Kim

In this paper, we propose a novel three-dimensional (3D) color image encryption scheme based on computational integral imaging (CII) and Arnold transform technique. An elemental image array (EIA) is firstly captured by recording the light rays emanating from 3D image through a lenslet array. Then, the captured color EIA is decomposed into three independent channels: red, green and blue, and each channel is encrypted by Arnold transform. In the reconstruction process, the pseudo-inverse filter is used to improve quality of the reconstructed 3D color image in CII system. Numerical simulations have been done to prove the validity and the security of the proposed 3D color image encryption method.


Optik ◽  
2019 ◽  
Vol 193 ◽  
pp. 162921 ◽  
Author(s):  
Milad Yousefi Valandar ◽  
Milad Jafari Barani ◽  
Peyman Ayubi

2013 ◽  
Vol 24 (10) ◽  
pp. 1350071 ◽  
Author(s):  
PING PING ◽  
FENG XU ◽  
ZHI-JIAN WANG

Cellular automaton (CA) has a lot of inherent features, such as simple regular structure, local interaction, random-like behavior and massive parallelism, which make it a good candidate to design cryptosystems. Therefore, a number of CA-based image encryption systems have been proposed, though the drawbacks of small key space and weak security in one-dimensional (1D) CA cryptosystems are obvious. In this paper, a novel image encryption scheme is presented using a two-dimensional (2D) CA with nonlinear balanced rules. During the whole process of encryption, the confusion operation is performed by the nonlinear rule of CA, while the diffusion operation is achieved by the local interactions among cells. So confusion and diffusion are well integrated in our proposed scheme. The corresponding simulations and analyses illustrate that the scheme has quite prominent cryptographic properties as well as high security.


2017 ◽  
Vol 27 (11) ◽  
pp. 1750171 ◽  
Author(s):  
Wenhao Liu ◽  
Kehui Sun ◽  
Yi He ◽  
Mengyao Yu

Derived from Sine map and iterative chaotic map with infinite collapse (ICMIC), a three-dimensional hyperchaotic Sine ICMIC modulation map (3D-SIMM) is proposed based on a close-loop modulation coupling (CMC) method. Based on this map, a novel color image encryption algorithm is designed by employing a hybrid model of multidirectional circular permutation and deoxyribonucleic acid (DNA) masking. In this scheme, the pixel positions of image are scrambled by multidirectional circular permutation, and the pixel values are substituted by DNA sequence operations. The simulation results and security analysis show that the algorithm has good encryption effect and strong key sensitivity, and can resist brute-force, statistical, differential, known-plaintext and chosen-plaintext attacks.


Sign in / Sign up

Export Citation Format

Share Document