Constructing multi-dimensional hydrogen bond(H-bond)regulated single-molecule systems with multiemission remains a challenge.Herein,we report the design of a new excited-state intramolecular proton transfer(ESIPT)feat...Constructing multi-dimensional hydrogen bond(H-bond)regulated single-molecule systems with multiemission remains a challenge.Herein,we report the design of a new excited-state intramolecular proton transfer(ESIPT)featured chromophore(HBT-DPI)that shows flexible emission tunability via the multidimensional regulation of intra-and intermolecular H-bonds.The feature of switchable intramolecular Hbonds is induced via incorporating several hydrogen bond acceptors and donors into one single HBT-DPI molecule,allowing the“turn on/off”of ESIPT process by forming isomers with distinct intramolecular Hbonds configurations.In response to different external H-bonding environments,the obtained four types of crystal/cocrystals vary in the contents of isomers and the molecular packing modes,which are mainly guided by the intermolecular H-bonds,exhibiting non-emissive features or emissions ranging from green to orange.Utilizing the feature of intermolecular H-bond guided molecular packing,we demonstrate the utility of this fluorescent material for visualizing hydrophobic/hydrophilic areas on large-scale heterogeneous surfaces of modified poly(1,1-difluoroethylene)(PVDF)membranes and quantitatively estimating the surface hydrophobicity,providing a new approach for hydrophobicity/hydrophilicity monitoring and measurement.Overall,this study represents a new design strategy for constructing multi-dimensional hydrogen bond regulated ESIPT-based fluorescent materials that enable multiple emissions and unique applications.展开更多
Starting from an extended mapping approach, a new type of variable separation solution with arbitrary functions of generalized (2+1)-dimensional Broer-Kaup system (GBK) system is derived. Then based on the derived sol...Starting from an extended mapping approach, a new type of variable separation solution with arbitrary functions of generalized (2+1)-dimensional Broer-Kaup system (GBK) system is derived. Then based on the derived solitary wave solution, we obtain some specific chaotic solitons to the (2+1)-dimensional GBK system.展开更多
Chaotic cryptography has been applied to image encryption;however,only the traditional low-dimensional chaotic systems has been widely analyzed or deciphered,which does not show satisfied security and efficiency.To so...Chaotic cryptography has been applied to image encryption;however,only the traditional low-dimensional chaotic systems has been widely analyzed or deciphered,which does not show satisfied security and efficiency.To solve this problem,a new algorithm based on cross-chaos map has been created in this article.The image pixels are scrambled under control of high-dimensional chaotic sequence,which is generated by cross chaotic map.The image pixels are substituted by ciphertext feedback algorithm.It can relate encryption required parameters with plaintext and can make a plaintext byte affect more ciphertext bytes.Proved by theoretical analysis and experimental results,the algorithm has higher complex degree and has passed SP800-22 pseudo-random number standard tests,and it has high encryption speed,high security,etc.It can be widely applied in the field of image encryption.展开更多
This paper proposed a novel fragile watermarking scheme based on singular value decomposition (SVD) and 2D chaotic mapping. It obtains chaotic initial values from the image blocks singular value decomposition and the ...This paper proposed a novel fragile watermarking scheme based on singular value decomposition (SVD) and 2D chaotic mapping. It obtains chaotic initial values from the image blocks singular value decomposition and the user’s key, then uses the chaotic mapping to get the chaotic sequence and inserts the sequence into the LSBs of the image blocks to get the watermarked image blocks. The paper reconstructed the watermarked image from all the embedded blocks. The analysis and experimental results show that the scheme is pretty fragile to tampering, and it can localize the tampering position accurately, reach 3×3 blocks.展开更多
A color image encryption method combining deoxyribonucleic(DNA)encoding and hyperchaotic mapping is proposed to solve the problems of simple structure,low complexit and low security of the existing encryption system f...A color image encryption method combining deoxyribonucleic(DNA)encoding and hyperchaotic mapping is proposed to solve the problems of simple structure,low complexit and low security of the existing encryption system for low-dimensional chaotic mapping encoding system and a single DNA encoding system.Firstly,according to the information of the plaintext images,the initial values of all chaotic maps and the random matrices with the same size as the plaintext images are iteratively generated.Then,the generated initial values and random matrices are divided into the sub-blocks with the same size.The DNA encoding mode of each sub-block and the DNA operation rules between the sub-blocks are determined by the dynamic hyperchaotic sequence.Finally,the diffusion operation is adopted to achieve a better encryption effect.The simulation results indicate that the proposed encryption algorithm can resist a variety of attacks due to its high complexity,strong security and large key space.展开更多
A well known chaotic mapping in symbol space is a shift mapping.However,other chaotic mappings in symbol space exist too.The basic change is to consider the process not only at a set of times which are equally spaced,...A well known chaotic mapping in symbol space is a shift mapping.However,other chaotic mappings in symbol space exist too.The basic change is to consider the process not only at a set of times which are equally spaced,say at unit time apart(a shift mapping),but at a set of times which are not equally spaced,say if the unit time can not be fixed.The increasing mapping as a generalization of the shift mapping and the k-switch mapping are introduced.The increasing and k-switch mappings are chaotic.展开更多
Fractional discrete systems can enable the modeling and control of the complicated processes more adaptable through the concept of versatility by providing systemdynamics’descriptions withmore degrees of freedom.Nume...Fractional discrete systems can enable the modeling and control of the complicated processes more adaptable through the concept of versatility by providing systemdynamics’descriptions withmore degrees of freedom.Numerical approaches have become necessary and sufficient to be addressed and employed for benefiting from the adaptability of such systems for varied applications.A variety of fractional Layla and Majnun model(LMM)system kinds has been proposed in the current work where some of these systems’key behaviors are addressed.In addition,the necessary and sufficient conditions for the stability and asymptotic stability of the fractional dynamic systems are investigated,as a result of which,the necessary requirements of the LMM to achieve constant and asymptotically steady zero resolutions are provided.As a special case,when Layla and Majnun have equal feelings,we propose an analysis of the system in view of its equilibrium and fixed point sets.Considering that the system has marginal stability if its eigenvalues have both negative and zero real portions,it is demonstrated that the system neither converges nor diverges to a steady trajectory or equilibrium point.It,rather,continues to hover along the line separating stability and instability based on the fractional LMM system.展开更多
This letter presents a new type of chaotic encryption system based on combined chaotic mapping pseudo-random number generator, Hash table, and elliptic curve. In this program, the elliptic curve algorithm is used for ...This letter presents a new type of chaotic encryption system based on combined chaotic mapping pseudo-random number generator, Hash table, and elliptic curve. In this program, the elliptic curve algorithm is used for the key distribution. After the linear transformation, the original chaotic sequence generated by drive system will be combined to chaotic mapping, converted to an encryption key sequence and constructed as Hash table for message authentication. The communication experiment used in the letter proves that the combination of combined chaotic encryption and conventional encryption is safe, feasible, and easy to implement by software.展开更多
Bit-plane decomposition makes images obtain a number of layers. According to the amount of data information, images are encrypted, and the paper proposes image encryption method with Chaotic Mapping based on multi-lay...Bit-plane decomposition makes images obtain a number of layers. According to the amount of data information, images are encrypted, and the paper proposes image encryption method with Chaotic Mapping based on multi-layer parameter disturbance. The advantage of multi-layer parameter disturbance is that it not only scrambles pixel location of images, but also changes pixel values of images. Bit-plane decomposition can increase the space of key. And using chaotic sequence generated by chaotic system with different complexities to encrypt layers with different information content can save operation time. The simulation experiments show that using chaotic mapping in image encryption method based on multi-layer parameter disturbance can cover plaintext effectively and safely, which makes it achieve ideal encryption effect.展开更多
This paper proposes a secure approach for encryption and decryption of digital images with chaotic map lattices. In the proposed encryption process, eight different types of operations are used to encrypt the pixels o...This paper proposes a secure approach for encryption and decryption of digital images with chaotic map lattices. In the proposed encryption process, eight different types of operations are used to encrypt the pixels of an image and one of them will be used for particular pixels decided by the outcome of the chaotic map lattices. To make the cipher more robust against any attacks, the secret key is modified after encrypting each block of sixteen pixels of the image. The experimental results and security analysis show that the proposed image encryption scheme achieves high security and efficiency.展开更多
Chaotic encryption is one of hot topics in cryptography, which has received increasing attention. Among many encryption methods, chaotic map is employed as an important source of pseudo-random numbers(PRNS). Although ...Chaotic encryption is one of hot topics in cryptography, which has received increasing attention. Among many encryption methods, chaotic map is employed as an important source of pseudo-random numbers(PRNS). Although the randomness and the butterfly effect of chaotic map make the generated sequence look very confused, its essence is still the deterministic behavior generated by a set of deterministic parameters. Therefore, the unceasing improved parameter estimation technology becomes one of potential threats for chaotic encryption, enhancing the attacking effect of the deciphering methods. In this paper, for better analyzing the cryptography, we focus on investigating the condition of chaotic maps to resist parameter estimation. An improved particle swarm optimization(IPSO) algorithm is introduced as the estimation method. Furthermore, a new piecewise principle is proposed for increasing estimation precision. Detailed experimental results demonstrate the effectiveness of the new estimation principle, and some new requirements are summarized for a secure chaotic encryption system.展开更多
This paper presents a new scheme to achieve generalized synchronization(GS) between different discrete-time chaotic(hyperchaotic) systems.The approach is based on a theorem,which assures that GS is achieved when a...This paper presents a new scheme to achieve generalized synchronization(GS) between different discrete-time chaotic(hyperchaotic) systems.The approach is based on a theorem,which assures that GS is achieved when a structural condition on the considered class of response systems is satisfied.The method presents some useful features:it enables exact GS to be achieved in finite time(i.e.,dead-beat synchronization);it is rigorous,systematic,and straightforward in checking GS;it can be applied to a wide class of chaotic maps.Some examples of GS,including the Grassi-Miller map and a recently introduced minimal 2-D quadratic map,are illustrated.展开更多
In order to solve the problem of patient information security protection in medical images,whilst also taking into consideration the unchangeable particularity of medical images to the lesion area and the need for med...In order to solve the problem of patient information security protection in medical images,whilst also taking into consideration the unchangeable particularity of medical images to the lesion area and the need for medical images themselves to be protected,a novel robust watermarking algorithm for encrypted medical images based on dual-tree complex wavelet transform and discrete cosine transform(DTCWT-DCT)and chaotic map is proposed in this paper.First,DTCWT-DCT transformation was performed on medical images,and dot product was per-formed in relation to the transformation matrix and logistic map.Inverse transformation was undertaken to obtain encrypted medical images.Then,in the low-frequency part of the DTCWT-DCT transformation coefficient of the encrypted medical image,a set of 32 bits visual feature vectors that can effectively resist geometric attacks are found to be the feature vector of the encrypted medical image by using perceptual hashing.After that,different logistic initial values and growth parameters were set to encrypt the watermark,and zero-watermark technology was used to embed and extract the encrypted medical images by combining cryptography and third-party concepts.The proposed watermarking algorithm does not change the region of interest of medical images thus it does not affect the judgment of doctors.Additionally,the security of the algorithm is enhanced by using chaotic mapping,which is sensitive to the initial value in order to encrypt the medical image and the watermark.The simulation results show that the pro-posed algorithm has good homomorphism,which can not only protect the original medical image and the watermark information,but can also embed and extract the watermark directly in the encrypted image,eliminating the potential risk of decrypting the embedded watermark and extracting watermark.Compared with the recent related research,the proposed algorithm solves the contradiction between robustness and invisibility of the watermarking algorithm for encrypted medical images,and it has good results against both conventional attacks and geometric attacks.Under geometric attacks in particular,the proposed algorithm performs much better than existing algorithms.展开更多
A digital image encryption scheme using chaotic map lattices has been proposed recently. In this paper, two fatal flaws of the cryptosystem are pointed out. According to these two drawbacks, cryptanalysts could recove...A digital image encryption scheme using chaotic map lattices has been proposed recently. In this paper, two fatal flaws of the cryptosystem are pointed out. According to these two drawbacks, cryptanalysts could recover the plaintext by applying the chosen plaintext attack. Therefore, the proposed cryptosystem is not secure enough to be used in the image transmission system. Experimental results show the feasibility of the attack. As a result, we make some improvements to the encryption scheme, which can completely resist our chosen plaintext attack.展开更多
We study a novel class of two-dimensional maps with infinitely many coexisting attractors.Firstly,the mathematical model of these maps is formulated by introducing a sinusoidal function.The existence and the stability...We study a novel class of two-dimensional maps with infinitely many coexisting attractors.Firstly,the mathematical model of these maps is formulated by introducing a sinusoidal function.The existence and the stability of the fixed points in the model are studied indicating that they are infinitely many and all unstable.In particular,a computer searching program is employed to explore the chaotic attractors in these maps,and a simple map is exemplified to show their complex dynamics.Interestingly,this map contains infinitely many coexisting attractors which has been rarely reported in the literature.Further studies on these coexisting attractors are carried out by investigating their time histories,phase trajectories,basins of attraction,Lyapunov exponents spectrum,and Lyapunov(Kaplan–Yorke)dimension.Bifurcation analysis reveals that the map has periodic and chaotic solutions,and more importantly,exhibits extreme multi-stability.展开更多
A new synchronization scheme for chaotic(hyperchaotic) maps with different dimensions is presented.Specifically,given a drive system map with dimension n and a response system with dimension m,the proposed approach ...A new synchronization scheme for chaotic(hyperchaotic) maps with different dimensions is presented.Specifically,given a drive system map with dimension n and a response system with dimension m,the proposed approach enables each drive system state to be synchronized with a linear response combination of the response system states.The method,based on the Lyapunov stability theory and the pole placement technique,presents some useful features:(i) it enables synchronization to be achieved for both cases of n 〈 m and n 〉 m;(ii) it is rigorous,being based on theorems;(iii) it can be readily applied to any chaotic(hyperchaotic) maps defined to date.Finally,the capability of the approach is illustrated by synchronization examples between the two-dimensional H′enon map(as the drive system) and the three-dimensional hyperchaotic Wang map(as the response system),and the three-dimensional H′enon-like map(as the drive system) and the two-dimensional Lorenz discrete-time system(as the response system).展开更多
In the most recent decades,a major number of image encryption plans have been proposed.The vast majority of these plans reached a highsecurity level;however,their moderate speeds because of their complicated processes...In the most recent decades,a major number of image encryption plans have been proposed.The vast majority of these plans reached a highsecurity level;however,their moderate speeds because of their complicated processes made them of no use in real-time applications.Inspired by this,we propose another efficient and rapid image encryption plan dependent on the Trigonometric chaotic guide.In contrast to the most of current plans,we utilize this basic map to create just a couple of arbitrary rows and columns.Moreover,to additionally speed up,we raise the processing unit from the pixel level to the row/column level.The security of the new plot is accomplished through a substitution permutation network,where we apply a circular shift of rows and columns to break the solid connection of neighboring pixels.At that point,we join the XOR operation with modulo function to cover the pixels values and forestall any leaking of data.High-security tests and simulation analyses are carried out to exhibit that the scheme is very secure and exceptionally quick for real-time image processing at 80 fps(frames per second).展开更多
Chaotic systems produce pseudo-random sequences with good randomness;therefore, these systems are suitable to efficient image encryption. In this paper, a low complexity image encryption based on Nested Piece Wise Lin...Chaotic systems produce pseudo-random sequences with good randomness;therefore, these systems are suitable to efficient image encryption. In this paper, a low complexity image encryption based on Nested Piece Wise Linear Chaotic Map (NPWLCM) is proposed. Bit planes of the grey or color levels are shuffled to increase the encryption complexity. A security analysis of the proposed system is performed and presented. The proposed method combine pixel shuffling, bit shuffling, and diffusion, which is highly disorder the original image. The initial values and the chaos control parameters of NPWLCM maps are derived from external secret key. The cipher image generated by this method is the same size as the original image and is suitable for practical use in the secure transmission of confidential information over the Internet. The experimental results of the proposed method show advantages of low complexity, and high-level security.展开更多
We propose a new fractional two-dimensional triangle function combination discrete chaotic map(2D-TFCDM)with the discrete fractional difference.Moreover,the chaos behaviors of the proposed map are observed and the bif...We propose a new fractional two-dimensional triangle function combination discrete chaotic map(2D-TFCDM)with the discrete fractional difference.Moreover,the chaos behaviors of the proposed map are observed and the bifurcation diagrams,the largest Lyapunov exponent plot,and the phase portraits are derived,respectively.Finally,with the secret keys generated by Menezes-Vanstone elliptic curve cryptosystem,we apply the discrete fractional map into color image encryption.After that,the image encryption algorithm is analyzed in four aspects and the result indicates that the proposed algorithm is more superior than the other algorithms.展开更多
基金supported by the National Key R&D Program of China(No.2021YFC2103600)the National Natural Science Foundation of China(Nos.21878156,21978131,22275085,and 22278224)+2 种基金the Natural Science Foundation of Jiangsu Province(Nos.BK20200089 and BK20200691)the Project of Priority Academic Program Development of Jiangsu Higher Education Institutions(PAPD)the State Key Laboratory of Materials-Oriented Chemical Engineering(No.KL21-08).
文摘Constructing multi-dimensional hydrogen bond(H-bond)regulated single-molecule systems with multiemission remains a challenge.Herein,we report the design of a new excited-state intramolecular proton transfer(ESIPT)featured chromophore(HBT-DPI)that shows flexible emission tunability via the multidimensional regulation of intra-and intermolecular H-bonds.The feature of switchable intramolecular Hbonds is induced via incorporating several hydrogen bond acceptors and donors into one single HBT-DPI molecule,allowing the“turn on/off”of ESIPT process by forming isomers with distinct intramolecular Hbonds configurations.In response to different external H-bonding environments,the obtained four types of crystal/cocrystals vary in the contents of isomers and the molecular packing modes,which are mainly guided by the intermolecular H-bonds,exhibiting non-emissive features or emissions ranging from green to orange.Utilizing the feature of intermolecular H-bond guided molecular packing,we demonstrate the utility of this fluorescent material for visualizing hydrophobic/hydrophilic areas on large-scale heterogeneous surfaces of modified poly(1,1-difluoroethylene)(PVDF)membranes and quantitatively estimating the surface hydrophobicity,providing a new approach for hydrophobicity/hydrophilicity monitoring and measurement.Overall,this study represents a new design strategy for constructing multi-dimensional hydrogen bond regulated ESIPT-based fluorescent materials that enable multiple emissions and unique applications.
基金浙江省自然科学基金,Foundation of New Century "151 Talent Engineering" of Zhejiang Province,丽水学院校科研和教改项目,the Scientific Research Foundation of Key Discipline of Zhejiang Province
文摘Starting from an extended mapping approach, a new type of variable separation solution with arbitrary functions of generalized (2+1)-dimensional Broer-Kaup system (GBK) system is derived. Then based on the derived solitary wave solution, we obtain some specific chaotic solitons to the (2+1)-dimensional GBK system.
基金Supported by the National Natural Science Foundation of China (60973162)the Natural Science Foundation of Shandong Province of China (ZR2009GM037)+2 种基金the Science and Technology Project of Shandong Province,China (2010GGX10132,2012GGX10110)the Key Natural Science Foundation of Shan-dong Province of China (Z2006G01)the Soft Science Project of Shangdong Province of China (2012RKA10009)
文摘Chaotic cryptography has been applied to image encryption;however,only the traditional low-dimensional chaotic systems has been widely analyzed or deciphered,which does not show satisfied security and efficiency.To solve this problem,a new algorithm based on cross-chaos map has been created in this article.The image pixels are scrambled under control of high-dimensional chaotic sequence,which is generated by cross chaotic map.The image pixels are substituted by ciphertext feedback algorithm.It can relate encryption required parameters with plaintext and can make a plaintext byte affect more ciphertext bytes.Proved by theoretical analysis and experimental results,the algorithm has higher complex degree and has passed SP800-22 pseudo-random number standard tests,and it has high encryption speed,high security,etc.It can be widely applied in the field of image encryption.
文摘This paper proposed a novel fragile watermarking scheme based on singular value decomposition (SVD) and 2D chaotic mapping. It obtains chaotic initial values from the image blocks singular value decomposition and the user’s key, then uses the chaotic mapping to get the chaotic sequence and inserts the sequence into the LSBs of the image blocks to get the watermarked image blocks. The paper reconstructed the watermarked image from all the embedded blocks. The analysis and experimental results show that the scheme is pretty fragile to tampering, and it can localize the tampering position accurately, reach 3×3 blocks.
基金Research and Practice Project of“Double Innovation”Education and Teaching Model of Mechatronics Engineering Specialty。
文摘A color image encryption method combining deoxyribonucleic(DNA)encoding and hyperchaotic mapping is proposed to solve the problems of simple structure,low complexit and low security of the existing encryption system for low-dimensional chaotic mapping encoding system and a single DNA encoding system.Firstly,according to the information of the plaintext images,the initial values of all chaotic maps and the random matrices with the same size as the plaintext images are iteratively generated.Then,the generated initial values and random matrices are divided into the sub-blocks with the same size.The DNA encoding mode of each sub-block and the DNA operation rules between the sub-blocks are determined by the dynamic hyperchaotic sequence.Finally,the diffusion operation is adopted to achieve a better encryption effect.The simulation results indicate that the proposed encryption algorithm can resist a variety of attacks due to its high complexity,strong security and large key space.
基金supported by Latvian Scientific(09.1220)ESF Project(2009/0223/1DP/1.1.1.2.0/09APIA/VIAA/008)
文摘A well known chaotic mapping in symbol space is a shift mapping.However,other chaotic mappings in symbol space exist too.The basic change is to consider the process not only at a set of times which are equally spaced,say at unit time apart(a shift mapping),but at a set of times which are not equally spaced,say if the unit time can not be fixed.The increasing mapping as a generalization of the shift mapping and the k-switch mapping are introduced.The increasing and k-switch mappings are chaotic.
基金supported by Ajman University Internal Research Grant No.(DRGS Ref.2024-IRGHBS-3).
文摘Fractional discrete systems can enable the modeling and control of the complicated processes more adaptable through the concept of versatility by providing systemdynamics’descriptions withmore degrees of freedom.Numerical approaches have become necessary and sufficient to be addressed and employed for benefiting from the adaptability of such systems for varied applications.A variety of fractional Layla and Majnun model(LMM)system kinds has been proposed in the current work where some of these systems’key behaviors are addressed.In addition,the necessary and sufficient conditions for the stability and asymptotic stability of the fractional dynamic systems are investigated,as a result of which,the necessary requirements of the LMM to achieve constant and asymptotically steady zero resolutions are provided.As a special case,when Layla and Majnun have equal feelings,we propose an analysis of the system in view of its equilibrium and fixed point sets.Considering that the system has marginal stability if its eigenvalues have both negative and zero real portions,it is demonstrated that the system neither converges nor diverges to a steady trajectory or equilibrium point.It,rather,continues to hover along the line separating stability and instability based on the fractional LMM system.
文摘This letter presents a new type of chaotic encryption system based on combined chaotic mapping pseudo-random number generator, Hash table, and elliptic curve. In this program, the elliptic curve algorithm is used for the key distribution. After the linear transformation, the original chaotic sequence generated by drive system will be combined to chaotic mapping, converted to an encryption key sequence and constructed as Hash table for message authentication. The communication experiment used in the letter proves that the combination of combined chaotic encryption and conventional encryption is safe, feasible, and easy to implement by software.
文摘Bit-plane decomposition makes images obtain a number of layers. According to the amount of data information, images are encrypted, and the paper proposes image encryption method with Chaotic Mapping based on multi-layer parameter disturbance. The advantage of multi-layer parameter disturbance is that it not only scrambles pixel location of images, but also changes pixel values of images. Bit-plane decomposition can increase the space of key. And using chaotic sequence generated by chaotic system with different complexities to encrypt layers with different information content can save operation time. The simulation experiments show that using chaotic mapping in image encryption method based on multi-layer parameter disturbance can cover plaintext effectively and safely, which makes it achieve ideal encryption effect.
基金supported by the National Natural Science Foundation of China (Grant Nos. 61001099 and 10971120)the Foundation for the Author of National Excellent Doctoral Dissertation of China (Grant No. 200444)
文摘This paper proposes a secure approach for encryption and decryption of digital images with chaotic map lattices. In the proposed encryption process, eight different types of operations are used to encrypt the pixels of an image and one of them will be used for particular pixels decided by the outcome of the chaotic map lattices. To make the cipher more robust against any attacks, the secret key is modified after encrypting each block of sixteen pixels of the image. The experimental results and security analysis show that the proposed image encryption scheme achieves high security and efficiency.
基金Project supported by the National Natural Science Foundation of China(Grant Nos.61161006 and 61573383)the Key Innovation Project of Graduate of Central South University(Grant No.2018ZZTS009)the Postdoctoral Innovative Talents Support Program(Grant No.BX20180386)。
文摘Chaotic encryption is one of hot topics in cryptography, which has received increasing attention. Among many encryption methods, chaotic map is employed as an important source of pseudo-random numbers(PRNS). Although the randomness and the butterfly effect of chaotic map make the generated sequence look very confused, its essence is still the deterministic behavior generated by a set of deterministic parameters. Therefore, the unceasing improved parameter estimation technology becomes one of potential threats for chaotic encryption, enhancing the attacking effect of the deciphering methods. In this paper, for better analyzing the cryptography, we focus on investigating the condition of chaotic maps to resist parameter estimation. An improved particle swarm optimization(IPSO) algorithm is introduced as the estimation method. Furthermore, a new piecewise principle is proposed for increasing estimation precision. Detailed experimental results demonstrate the effectiveness of the new estimation principle, and some new requirements are summarized for a secure chaotic encryption system.
文摘This paper presents a new scheme to achieve generalized synchronization(GS) between different discrete-time chaotic(hyperchaotic) systems.The approach is based on a theorem,which assures that GS is achieved when a structural condition on the considered class of response systems is satisfied.The method presents some useful features:it enables exact GS to be achieved in finite time(i.e.,dead-beat synchronization);it is rigorous,systematic,and straightforward in checking GS;it can be applied to a wide class of chaotic maps.Some examples of GS,including the Grassi-Miller map and a recently introduced minimal 2-D quadratic map,are illustrated.
基金supported by the Key Research Project of Hainan Province[ZDYF2018129]the Higher Education Research Project of Hainan Province(Hnky2019-73)+3 种基金the National Natural Science Foundation of China[61762033]the Natural Science Foundation of Hainan[617175]the Special Scientific Research Project of Philosophy and Social Sciences of Chongqing Medical University[201703]the Key Research Project of Haikou College of Economics[HJKZ18-01].
文摘In order to solve the problem of patient information security protection in medical images,whilst also taking into consideration the unchangeable particularity of medical images to the lesion area and the need for medical images themselves to be protected,a novel robust watermarking algorithm for encrypted medical images based on dual-tree complex wavelet transform and discrete cosine transform(DTCWT-DCT)and chaotic map is proposed in this paper.First,DTCWT-DCT transformation was performed on medical images,and dot product was per-formed in relation to the transformation matrix and logistic map.Inverse transformation was undertaken to obtain encrypted medical images.Then,in the low-frequency part of the DTCWT-DCT transformation coefficient of the encrypted medical image,a set of 32 bits visual feature vectors that can effectively resist geometric attacks are found to be the feature vector of the encrypted medical image by using perceptual hashing.After that,different logistic initial values and growth parameters were set to encrypt the watermark,and zero-watermark technology was used to embed and extract the encrypted medical images by combining cryptography and third-party concepts.The proposed watermarking algorithm does not change the region of interest of medical images thus it does not affect the judgment of doctors.Additionally,the security of the algorithm is enhanced by using chaotic mapping,which is sensitive to the initial value in order to encrypt the medical image and the watermark.The simulation results show that the pro-posed algorithm has good homomorphism,which can not only protect the original medical image and the watermark information,but can also embed and extract the watermark directly in the encrypted image,eliminating the potential risk of decrypting the embedded watermark and extracting watermark.Compared with the recent related research,the proposed algorithm solves the contradiction between robustness and invisibility of the watermarking algorithm for encrypted medical images,and it has good results against both conventional attacks and geometric attacks.Under geometric attacks in particular,the proposed algorithm performs much better than existing algorithms.
基金Project supported by the National Natural Science Foundation of China (Grant Nos. 61173183, 60973152, and 60573172)the Doctoral Program Foundation of Institution of Higher Education of China (Grant No. 20070141014)+2 种基金the Program for Excellent Talents in Universities of Liaoning Province, China (Grant No. LR2012003)the Natural Science Foundation of Liaoning Province, China (Grant No. 20082165)the Fundamental Research Funds for the Central Universities of China (Grant No. DUT12JB06)
文摘A digital image encryption scheme using chaotic map lattices has been proposed recently. In this paper, two fatal flaws of the cryptosystem are pointed out. According to these two drawbacks, cryptanalysts could recover the plaintext by applying the chosen plaintext attack. Therefore, the proposed cryptosystem is not secure enough to be used in the image transmission system. Experimental results show the feasibility of the attack. As a result, we make some improvements to the encryption scheme, which can completely resist our chosen plaintext attack.
基金National Natural Science Foundation of China(Grant Nos.11672257,11632008,11772306,and 11972173)the Natural Science Foundation of Jiangsu Province of China(Grant No.BK20161314)+1 种基金the 5th 333 High-level Personnel Training Project of Jiangsu Province of China(Grant No.BRA2018324)the Excellent Scientific and Technological Innovation Team of Jiangsu University.
文摘We study a novel class of two-dimensional maps with infinitely many coexisting attractors.Firstly,the mathematical model of these maps is formulated by introducing a sinusoidal function.The existence and the stability of the fixed points in the model are studied indicating that they are infinitely many and all unstable.In particular,a computer searching program is employed to explore the chaotic attractors in these maps,and a simple map is exemplified to show their complex dynamics.Interestingly,this map contains infinitely many coexisting attractors which has been rarely reported in the literature.Further studies on these coexisting attractors are carried out by investigating their time histories,phase trajectories,basins of attraction,Lyapunov exponents spectrum,and Lyapunov(Kaplan–Yorke)dimension.Bifurcation analysis reveals that the map has periodic and chaotic solutions,and more importantly,exhibits extreme multi-stability.
文摘A new synchronization scheme for chaotic(hyperchaotic) maps with different dimensions is presented.Specifically,given a drive system map with dimension n and a response system with dimension m,the proposed approach enables each drive system state to be synchronized with a linear response combination of the response system states.The method,based on the Lyapunov stability theory and the pole placement technique,presents some useful features:(i) it enables synchronization to be achieved for both cases of n 〈 m and n 〉 m;(ii) it is rigorous,being based on theorems;(iii) it can be readily applied to any chaotic(hyperchaotic) maps defined to date.Finally,the capability of the approach is illustrated by synchronization examples between the two-dimensional H′enon map(as the drive system) and the three-dimensional hyperchaotic Wang map(as the response system),and the three-dimensional H′enon-like map(as the drive system) and the two-dimensional Lorenz discrete-time system(as the response system).
基金This research work was partially funded by the Chiang Mai University.
文摘In the most recent decades,a major number of image encryption plans have been proposed.The vast majority of these plans reached a highsecurity level;however,their moderate speeds because of their complicated processes made them of no use in real-time applications.Inspired by this,we propose another efficient and rapid image encryption plan dependent on the Trigonometric chaotic guide.In contrast to the most of current plans,we utilize this basic map to create just a couple of arbitrary rows and columns.Moreover,to additionally speed up,we raise the processing unit from the pixel level to the row/column level.The security of the new plot is accomplished through a substitution permutation network,where we apply a circular shift of rows and columns to break the solid connection of neighboring pixels.At that point,we join the XOR operation with modulo function to cover the pixels values and forestall any leaking of data.High-security tests and simulation analyses are carried out to exhibit that the scheme is very secure and exceptionally quick for real-time image processing at 80 fps(frames per second).
文摘Chaotic systems produce pseudo-random sequences with good randomness;therefore, these systems are suitable to efficient image encryption. In this paper, a low complexity image encryption based on Nested Piece Wise Linear Chaotic Map (NPWLCM) is proposed. Bit planes of the grey or color levels are shuffled to increase the encryption complexity. A security analysis of the proposed system is performed and presented. The proposed method combine pixel shuffling, bit shuffling, and diffusion, which is highly disorder the original image. The initial values and the chaos control parameters of NPWLCM maps are derived from external secret key. The cipher image generated by this method is the same size as the original image and is suitable for practical use in the secure transmission of confidential information over the Internet. The experimental results of the proposed method show advantages of low complexity, and high-level security.
基金Project supported by the National Natural Science Foundation of China(Grant Nos.61072147 and 11271008)
文摘We propose a new fractional two-dimensional triangle function combination discrete chaotic map(2D-TFCDM)with the discrete fractional difference.Moreover,the chaos behaviors of the proposed map are observed and the bifurcation diagrams,the largest Lyapunov exponent plot,and the phase portraits are derived,respectively.Finally,with the secret keys generated by Menezes-Vanstone elliptic curve cryptosystem,we apply the discrete fractional map into color image encryption.After that,the image encryption algorithm is analyzed in four aspects and the result indicates that the proposed algorithm is more superior than the other algorithms.