Based on some analyses of existing chaotic image encryption frameworks and a new designed three-dimensional improved logistic chaotic map(3D-ILM),an asymmetric image encryption algorithm using public-key Rivest–Shami...Based on some analyses of existing chaotic image encryption frameworks and a new designed three-dimensional improved logistic chaotic map(3D-ILM),an asymmetric image encryption algorithm using public-key Rivest–Shamir–Adleman(RSA)is presented in this paper.In the first stage,a new 3D-ILM is proposed to enhance the chaotic behavior considering analysis of time sequence,Lyapunov exponent,and Shannon entropy.In the second stage,combined with the public key RSA algorithm,a new key acquisition mathematical model(MKA)is constructed to obtain the initial keys for the 3D-ILM.Consequently,the key stream can be produced depending on the plain image for a higher security.Moreover,a novel process model(NPM)for the input of the 3D-ILM is built,which is built to improve the distribution uniformity of the chaotic sequence.In the third stage,to encrypt the plain image,a pre-process by exclusive OR(XOR)operation with a random matrix is applied.Then,the pre-processed image is performed by a permutation for rows,a downward modulo function for adjacent pixels,a permutation for columns,a forward direction XOR addition-modulo diffusion,and a backward direction XOR addition-modulo diffusion to achieve the final cipher image.Moreover,experiments show that the the proposed algorithm has a better performance.Especially,the number of pixels change rate(NPCR)is close to ideal case 99.6094%,with the unified average changing intensity(UACI)close to 33.4634%,and the information entropy(IE)close to 8.展开更多
A new three-dimensional (3D) continuous autonomous system with one parameter and three quadratic terms is presented firstly in this paper. Countless embedded trumpet-shaped chaotic attractors in two opposite directi...A new three-dimensional (3D) continuous autonomous system with one parameter and three quadratic terms is presented firstly in this paper. Countless embedded trumpet-shaped chaotic attractors in two opposite directions are generated from the system as time goes on. The basic dynamical behaviors of the strange chaotic system are investigated. Another more complex 3D system with the same capability of generating countless embedded trumpet-shaped chaotic attractors is also put forward.展开更多
At present, many chaos-based image encryption algorithms have proved to be unsafe, few encryption schemes permute the plain images as three-dimensional(3D) bit matrices, and thus bits cannot move to any position, th...At present, many chaos-based image encryption algorithms have proved to be unsafe, few encryption schemes permute the plain images as three-dimensional(3D) bit matrices, and thus bits cannot move to any position, the movement range of bits are limited, and based on them, in this paper we present a novel image encryption algorithm based on 3D Brownian motion and chaotic systems. The architecture of confusion and diffusion is adopted. Firstly, the plain image is converted into a 3D bit matrix and split into sub blocks. Secondly, block confusion based on 3D Brownian motion(BCB3DBM)is proposed to permute the position of the bits within the sub blocks, and the direction of particle movement is generated by logistic-tent system(LTS). Furthermore, block confusion based on position sequence group(BCBPSG) is introduced, a four-order memristive chaotic system is utilized to give random chaotic sequences, and the chaotic sequences are sorted and a position sequence group is chosen based on the plain image, then the sub blocks are confused. The proposed confusion strategy can change the positions of the bits and modify their weights, and effectively improve the statistical performance of the algorithm. Finally, a pixel level confusion is employed to enhance the encryption effect. The initial values and parameters of chaotic systems are produced by the SHA 256 hash function of the plain image. Simulation results and security analyses illustrate that our algorithm has excellent encryption performance in terms of security and speed.展开更多
A new three-dimensional (3D) system is constructed and a novel spherical chaotic attractor is generated from the system. Basic dynamical behaviors of the chaotic system are investigated respectively. Novel spherical...A new three-dimensional (3D) system is constructed and a novel spherical chaotic attractor is generated from the system. Basic dynamical behaviors of the chaotic system are investigated respectively. Novel spherical chaotic attractors can be generated from the system within a wide range of parameter values. The shapes of spherical chaotic attractors can be impacted by the variation of parameters. Finally, a simpler 3D system and a more complex 3D system with the same capability of generating spherical chaotic attractors are put forward respectively.展开更多
The finding of the compound structure of a new four-scrolls chaotic system is reported, which is obtained by merging together two symmetrical attractors. And the two symmetrical attractors are generated only by adding...The finding of the compound structure of a new four-scrolls chaotic system is reported, which is obtained by merging together two symmetrical attractors. And the two symmetrical attractors are generated only by adding a constant gain to the original system. Also, the forming procedure of the new four-scrolls chaotic attractor is explored and the relation between the constant gain and the properties of the system is given.展开更多
Multispectral image compression and encryption algorithms commonly suffer from issues such as low compression efficiency,lack of synchronization between the compression and encryption proces-ses,and degradation of int...Multispectral image compression and encryption algorithms commonly suffer from issues such as low compression efficiency,lack of synchronization between the compression and encryption proces-ses,and degradation of intrinsic image structure.A novel approach is proposed to address these is-sues.Firstly,a chaotic sequence is generated using the Lorenz three-dimensional chaotic mapping to initiate the encryption process,which is XORed with each spectral band of the multispectral image to complete the initial encryption of the image.Then,a two-dimensional lifting 9/7 wavelet transform is applied to the processed image.Next,a key-sensitive Arnold scrambling technique is employed on the resulting low-frequency image.It effectively eliminates spatial redundancy in the multispectral image while enhancing the encryption process.To optimize the compression and encryption processes further,fast Tucker decomposition is applied to the wavelet sub-band tensor.It effectively removes both spectral redundancy and residual spatial redundancy in the multispectral image.Finally,the core tensor and pattern matrix obtained from the decomposition are subjected to entropy encoding,and real-time chaotic encryption is implemented during the encoding process,effectively integrating compression and encryption.The results show that the proposed algorithm is suitable for occasions with high requirements for compression and encryption,and it provides valuable insights for the de-velopment of compression and encryption in multispectral field.展开更多
This article introduces a new chaotic system of three-dimensional quadratic autonomous ordinary differential equations, which can display different attractors with two unstable equilibrium points and four unstable equ...This article introduces a new chaotic system of three-dimensional quadratic autonomous ordinary differential equations, which can display different attractors with two unstable equilibrium points and four unstable equilibrium points respectively. Dynamical properties of this system are then studied. Furthermore, by applying the undetermined coefficient method, heteroclinic orbit of Shil'nikov's type in this system is found and the convergence of the series expansions of this heteroclinic orbit are proved in this article. The Shil'nikov's theorem guarantees that this system has Smale horseshoes and the horseshoe chaos.展开更多
This paper establishes two theorems for two time-delayed (chaotic) discrete systems to achieve timedelayed generalized synchronization (TDGS). These two theorems uncover the genera/forms of two TDGS systems via a ...This paper establishes two theorems for two time-delayed (chaotic) discrete systems to achieve timedelayed generalized synchronization (TDGS). These two theorems uncover the genera/forms of two TDGS systems via a prescribed transformation. As examples, we convert the Lorenz three-dimensional chaotic map to an equal time-delayed system as the driving system, and construct the TDGS driven systems according to the Theorems 1 and 2. Numerical simulations demonstrate the effectiveness of the proposed theorems.展开更多
Quaternion algebra has been used to apply the fractional Fourier transform(FrFT)to color images in a comprehensive approach.However,the discrete fractional random transform(DFRNT)with adequate basic randomness remains...Quaternion algebra has been used to apply the fractional Fourier transform(FrFT)to color images in a comprehensive approach.However,the discrete fractional random transform(DFRNT)with adequate basic randomness remains to be examined.This paper presents a novel multistage privacy system for color medical images based on discrete quaternion fractional Fourier transform(DQFrFT)watermarking and three-dimensional chaotic logistic map(3D-CLM)encryption.First,we describe quaternion DFRNT(QDFRNT),which generalizes DFRNT to handle quaternion signals effectively,and then use QDFRNT to perform color medical image adaptive watermarking.To efficiently evaluate QDFRNT,this study derives the relationship between the QDFRNT of a quaternion signal and the four components of the DFRNT signal.Moreover,it uses the human vision system's(HVS)masking qualities of edge,texture,and color tone immediately from the color host image to adaptively modify the watermark strength for each block in the color medical image using the QDFRNT-based adaptive watermarking and support vector machine(SVM)techniques.The limitations of watermark embedding are also explained to conserve watermarking energy.Second,3D-CLM encryption is employed to improve the system's security and efficiency,allowing it to be used as a multistage privacy system.The proposed security system is effective against many types of channel noise attacks,according to simulation results.展开更多
基金the National Natural Science Foundation of China(Grant No.61972103)the Natural Science Foundation of Guangdong Province of China(Grant No.2023A1515011207)+3 种基金the Special Project in Key Area of General University in Guangdong Province of China(Grant No.2020ZDZX3064)the Characteristic Innovation Project of General University in Guangdong Province of China(Grant No.2022KTSCX051)the Postgraduate Education Innovation Project of Guangdong Ocean University of China(Grant No.202263)the Foundation of Guangdong Provincial Engineering and Technology Research Center of Far Sea Fisheries Management and Fishing of South China Sea.
文摘Based on some analyses of existing chaotic image encryption frameworks and a new designed three-dimensional improved logistic chaotic map(3D-ILM),an asymmetric image encryption algorithm using public-key Rivest–Shamir–Adleman(RSA)is presented in this paper.In the first stage,a new 3D-ILM is proposed to enhance the chaotic behavior considering analysis of time sequence,Lyapunov exponent,and Shannon entropy.In the second stage,combined with the public key RSA algorithm,a new key acquisition mathematical model(MKA)is constructed to obtain the initial keys for the 3D-ILM.Consequently,the key stream can be produced depending on the plain image for a higher security.Moreover,a novel process model(NPM)for the input of the 3D-ILM is built,which is built to improve the distribution uniformity of the chaotic sequence.In the third stage,to encrypt the plain image,a pre-process by exclusive OR(XOR)operation with a random matrix is applied.Then,the pre-processed image is performed by a permutation for rows,a downward modulo function for adjacent pixels,a permutation for columns,a forward direction XOR addition-modulo diffusion,and a backward direction XOR addition-modulo diffusion to achieve the final cipher image.Moreover,experiments show that the the proposed algorithm has a better performance.Especially,the number of pixels change rate(NPCR)is close to ideal case 99.6094%,with the unified average changing intensity(UACI)close to 33.4634%,and the information entropy(IE)close to 8.
基金supported by the Science Research Foundation of Liaoning Provincial Education Department,China(Grant No.L2013229)
文摘A new three-dimensional (3D) continuous autonomous system with one parameter and three quadratic terms is presented firstly in this paper. Countless embedded trumpet-shaped chaotic attractors in two opposite directions are generated from the system as time goes on. The basic dynamical behaviors of the strange chaotic system are investigated. Another more complex 3D system with the same capability of generating countless embedded trumpet-shaped chaotic attractors is also put forward.
基金Project supported by the National Natural Science Foundation of China(Grant Nos.41571417 and 61305042)the National Science Foundation of the United States(Grant Nos.CNS-1253424 and ECCS-1202225)+4 种基金the Science and Technology Foundation of Henan Province,China(Grant No.152102210048)the Foundation and Frontier Project of Henan Province,China(Grant No.162300410196)China Postdoctoral Science Foundation(Grant No.2016M602235)the Natural Science Foundation of Educational Committee of Henan Province,China(Grant No.14A413015)the Research Foundation of Henan University,China(Grant No.xxjc20140006)
文摘At present, many chaos-based image encryption algorithms have proved to be unsafe, few encryption schemes permute the plain images as three-dimensional(3D) bit matrices, and thus bits cannot move to any position, the movement range of bits are limited, and based on them, in this paper we present a novel image encryption algorithm based on 3D Brownian motion and chaotic systems. The architecture of confusion and diffusion is adopted. Firstly, the plain image is converted into a 3D bit matrix and split into sub blocks. Secondly, block confusion based on 3D Brownian motion(BCB3DBM)is proposed to permute the position of the bits within the sub blocks, and the direction of particle movement is generated by logistic-tent system(LTS). Furthermore, block confusion based on position sequence group(BCBPSG) is introduced, a four-order memristive chaotic system is utilized to give random chaotic sequences, and the chaotic sequences are sorted and a position sequence group is chosen based on the plain image, then the sub blocks are confused. The proposed confusion strategy can change the positions of the bits and modify their weights, and effectively improve the statistical performance of the algorithm. Finally, a pixel level confusion is employed to enhance the encryption effect. The initial values and parameters of chaotic systems are produced by the SHA 256 hash function of the plain image. Simulation results and security analyses illustrate that our algorithm has excellent encryption performance in terms of security and speed.
基金Project supported by the Science Research Foundation of Liaoning Provincial Education Department,China(Grant No.L2013229)
文摘A new three-dimensional (3D) system is constructed and a novel spherical chaotic attractor is generated from the system. Basic dynamical behaviors of the chaotic system are investigated respectively. Novel spherical chaotic attractors can be generated from the system within a wide range of parameter values. The shapes of spherical chaotic attractors can be impacted by the variation of parameters. Finally, a simpler 3D system and a more complex 3D system with the same capability of generating spherical chaotic attractors are put forward respectively.
文摘The finding of the compound structure of a new four-scrolls chaotic system is reported, which is obtained by merging together two symmetrical attractors. And the two symmetrical attractors are generated only by adding a constant gain to the original system. Also, the forming procedure of the new four-scrolls chaotic attractor is explored and the relation between the constant gain and the properties of the system is given.
基金the National Natural Science Foundation of China(No.11803036)Climbing Program of Changchun University(No.ZKP202114).
文摘Multispectral image compression and encryption algorithms commonly suffer from issues such as low compression efficiency,lack of synchronization between the compression and encryption proces-ses,and degradation of intrinsic image structure.A novel approach is proposed to address these is-sues.Firstly,a chaotic sequence is generated using the Lorenz three-dimensional chaotic mapping to initiate the encryption process,which is XORed with each spectral band of the multispectral image to complete the initial encryption of the image.Then,a two-dimensional lifting 9/7 wavelet transform is applied to the processed image.Next,a key-sensitive Arnold scrambling technique is employed on the resulting low-frequency image.It effectively eliminates spatial redundancy in the multispectral image while enhancing the encryption process.To optimize the compression and encryption processes further,fast Tucker decomposition is applied to the wavelet sub-band tensor.It effectively removes both spectral redundancy and residual spatial redundancy in the multispectral image.Finally,the core tensor and pattern matrix obtained from the decomposition are subjected to entropy encoding,and real-time chaotic encryption is implemented during the encoding process,effectively integrating compression and encryption.The results show that the proposed algorithm is suitable for occasions with high requirements for compression and encryption,and it provides valuable insights for the de-velopment of compression and encryption in multispectral field.
基金The project supported by National Natural Science Foundation of China under Grant Nos. 60074034 and 70271068
文摘This article introduces a new chaotic system of three-dimensional quadratic autonomous ordinary differential equations, which can display different attractors with two unstable equilibrium points and four unstable equilibrium points respectively. Dynamical properties of this system are then studied. Furthermore, by applying the undetermined coefficient method, heteroclinic orbit of Shil'nikov's type in this system is found and the convergence of the series expansions of this heteroclinic orbit are proved in this article. The Shil'nikov's theorem guarantees that this system has Smale horseshoes and the horseshoe chaos.
基金Supported by the National Natural Science Foundation of China under Grant No. 60674059
文摘This paper establishes two theorems for two time-delayed (chaotic) discrete systems to achieve timedelayed generalized synchronization (TDGS). These two theorems uncover the genera/forms of two TDGS systems via a prescribed transformation. As examples, we convert the Lorenz three-dimensional chaotic map to an equal time-delayed system as the driving system, and construct the TDGS driven systems according to the Theorems 1 and 2. Numerical simulations demonstrate the effectiveness of the proposed theorems.
基金Project supported by the Princess Nourah bint Abdulrahman University Researchers Supporting Project(No.PNURSP2023R66)。
文摘Quaternion algebra has been used to apply the fractional Fourier transform(FrFT)to color images in a comprehensive approach.However,the discrete fractional random transform(DFRNT)with adequate basic randomness remains to be examined.This paper presents a novel multistage privacy system for color medical images based on discrete quaternion fractional Fourier transform(DQFrFT)watermarking and three-dimensional chaotic logistic map(3D-CLM)encryption.First,we describe quaternion DFRNT(QDFRNT),which generalizes DFRNT to handle quaternion signals effectively,and then use QDFRNT to perform color medical image adaptive watermarking.To efficiently evaluate QDFRNT,this study derives the relationship between the QDFRNT of a quaternion signal and the four components of the DFRNT signal.Moreover,it uses the human vision system's(HVS)masking qualities of edge,texture,and color tone immediately from the color host image to adaptively modify the watermark strength for each block in the color medical image using the QDFRNT-based adaptive watermarking and support vector machine(SVM)techniques.The limitations of watermark embedding are also explained to conserve watermarking energy.Second,3D-CLM encryption is employed to improve the system's security and efficiency,allowing it to be used as a multistage privacy system.The proposed security system is effective against many types of channel noise attacks,according to simulation results.