scispace - formally typeset
Journal ArticleDOI

A new hyperchaotic map and its application for image encryption

TLDR
Experimental results and security analysis show that SHAM-IEA has strong capability to withstand statistical analysis, differential attack, chosen-plaintext and chosen-ciphertext attacks.
Abstract
Based on the one-dimensional Sine map and the two-dimensional Henon map, a new two-dimensional Sine-Henon alteration model (2D-SHAM) is hereby proposed. Basic dynamic characteristics of 2D-SHAM are studied through the following aspects: equilibria, Jacobin eigenvalues, trajectory, bifurcation diagram, Lyapunov exponents and sensitivity dependence test. The complexity of 2D-SHAM is investigated using Sample Entropy algorithm. Simulation results show that 2D-SHAM is overall hyperchaotic with the high complexity, and high sensitivity to its initial values and control parameters. To investigate its performance in terms of security, a new 2D-SHAM-based image encryption algorithm (SHAM-IEA) is also proposed. In this algorithm, the essential requirements of confusion and diffusion are accomplished, and the stochastic 2D-SHAM is used to enhance the security of encrypted image. The stochastic 2D-SHAM generates random values, hence SHAM-IEA can produce different encrypted images even with the same secret key. Experimental results and security analysis show that SHAM-IEA has strong capability to withstand statistical analysis, differential attack, chosen-plaintext and chosen-ciphertext attacks.

read more

Citations
More filters
Journal ArticleDOI

A Blockchain-Based Secure Image Encryption Scheme for the Industrial Internet of Things.

TL;DR: This work proposes a permissioned private blockchain-based solution to secure the image while encrypting it, ensuring the privacy and security of the image data on the blockchain.
Journal ArticleDOI

Medical image encryption algorithm based on Latin square and memristive chaotic system

TL;DR: Simulation results and performance analyses show that the proposed image encryption scheme has good security and robustness, and it may be applied for medical image encryption applications.
Journal ArticleDOI

Fast image encryption algorithm with high security level using the Bülban chaotic map

TL;DR: This work proposes a new efficient and high-speed image encryption scheme based on the Bülban chaotic map that is extremely secure and highly fast for real-time image processing at 80 fps (frames per second).
Journal ArticleDOI

Fractional-order 4D hyperchaotic memristive system and application in color image encryption

TL;DR: The algorithm simulation results and security feature analysis show that the encryption scheme has good encryption effect and high safety performance, which provides an experimental basis and theoretical guidance for the safe transmission of image information.
Journal ArticleDOI

Self-excited and hidden attractors in a novel chaotic system with complicated multistability

TL;DR: A new 3D chaotic system with trigonometric function term as a nonlinear controller with high sensitivity to its initial values and parameters, hence it can be applied in chaos-based cryptographic applications and the non-periodicity of coexisting attractors of the system is investigated.
References
More filters
Journal ArticleDOI

Approximate entropy as a measure of system complexity.

TL;DR: Analysis of a recently developed family of formulas and statistics, approximate entropy (ApEn), suggests that ApEn can classify complex systems, given at least 1000 data values in diverse settings that include both deterministic chaotic and stochastic processes.
Journal ArticleDOI

Symmetric Ciphers Based on Two-Dimensional Chaotic Maps

TL;DR: Methods are shown how to adapt invertible two-dimensional chaotic maps on a torus or on a square to create new symmetric block encryption schemes to encrypt an N×N image.
Journal ArticleDOI

Some basic cryptographic requirements for chaos-based cryptosystems

TL;DR: The suggested guidelines address three main issues: implementation, key management and security analysis, aiming at assisting designers of new cryptosystems to present their work in a more systematic and rigorous way to fulfill some basic cryptographic requirements.
Journal ArticleDOI

Estimation of the Kolmogorov entropy from a chaotic signal

TL;DR: In this paper, a method for estimating the Kolmogorov entropy directly from a time signal is proposed and tested on examples, which should prove valuable for characterizing experimental chaotic signals.
Journal ArticleDOI

Cryptographic requirements for chaotic secure communications

TL;DR: In this paper, the authors provide a set of guidelines that new cryptosystems would benefit from adhering to, such as correct key management and security analysis, and some practical aspects of communications such as channel noise, limited bandwith, and attenuation.
Related Papers (5)