Next Article in Journal
An Effective Bearing Fault Diagnosis Technique via Local Robust Principal Component Analysis and Multi-Scale Permutation Entropy
Next Article in Special Issue
A High Spectral Entropy (SE) Memristive Hidden Chaotic System with Multi-Type Quasi-Periodic and its Circuit
Previous Article in Journal
Upper Bound on the Joint Entropy of Correlated Sources Encoded by Good Lattices
Previous Article in Special Issue
New Nonlinear Active Element Dedicated to Modeling Chaotic Dynamics with Complex Polynomial Vector Fields
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Entropy Analysis and Image Encryption Application Based on a New Chaotic System Crossing a Cylinder

by
Alaa Kadhim Farhan
1,
Nadia M.G. Al-Saidi
2,
Abeer Tariq Maolood
1,
Fahimeh Nazarimehr
3 and
Iqtadar Hussain
4,*
1
Department of Computer Sciences, University of Technology, Baghdad 10011, Iraq
2
Department of Applied Sciences, University of Technology, Baghdad 10011, Iraq
3
Department of Biomedical Engineering, Amirkabir University of Technology, 350 Hafez Ave., Tehran 1591634311, Iran
4
Department of Mathematics, Statistics and Physics, Qatar University, Doha 2713, Qatar
*
Author to whom correspondence should be addressed.
Entropy 2019, 21(10), 958; https://doi.org/10.3390/e21100958
Submission received: 20 July 2019 / Revised: 18 August 2019 / Accepted: 19 August 2019 / Published: 30 September 2019

Abstract

:
Designing chaotic systems with specific features is a hot topic in nonlinear dynamics. In this study, a novel chaotic system is presented with a unique feature of crossing inside and outside of a cylinder repeatedly. This new system is thoroughly analyzed by the help of the bifurcation diagram, Lyapunov exponents’ spectrum, and entropy measurement. Bifurcation analysis of the proposed system with two initiation methods reveals its multistability. As an engineering application, the system’s efficiency is tested in image encryption. The complexity of the chaotic attractor of the proposed system makes it a proper choice for encryption. States of the chaotic attractor are used to shuffle the rows and columns of the image, and then the shuffled image is XORed with the states of chaotic attractor. The unpredictability of the chaotic attractor makes the encryption method very safe. The performance of the encryption method is analyzed using the histogram, correlation coefficient, Shannon entropy, and encryption quality. The results show that the encryption method using the proposed chaotic system has reliable performance.

1. Introduction

The chaotic dynamic has been a hot topic recently [1,2,3]. For many years, there was a hypothesis that chaotic attractors are related to a saddle point equilibria [4,5]. In the last decade, some chaotic systems were proposed, which were counterexamples of that hypothesis [6,7]. Chaotic systems with stable equilibria [8], chaotic flows with no equilibria [9,10], and chaotic flow with circular equilibria [11,12] are some of such counterexamples. Investigating new chaotic flows has been done in the literature [13]. Many chaotic flows with various features are being proposed every year [14,15,16]. Researchers hope that such studies help to investigate the reason of generating chaotic attractors [17,18,19,20]. Dynamical properties of two discs with viscous friction and multiple delays have been studied in [21]. An infinite lattice of chaotic attractors was discussed in [22]. Chaotic dynamics can be modeled using electronic circuits [23,24].
Each attractor of a system has a basin of attraction [25]. Based on the basin of attraction, attractors can be categorized into self-excited or hidden attractors [26,27]. An attractor is self-excited if its basin of attraction has an intersect with unstable equilibrium, while it is hidden if it does not [26,28]. Hidden attractors of an economical supply have been studied in [29]. In [30], hidden attractors of Rabinovich-Fabrikant system have been investigated. Multistability is an exciting phenomenon in the study of dynamical systems [31,32,33]. Many studies have been done on chaotic systems with multistability [34]. In the multistable systems, each attractor has its basin of attraction [35].
There are some useful measurements to quantify chaotic dynamics. Lyapunov exponent is one of the most reliable measures in this area [36]. In the chaotic attractors, there is at least one positive Lyapunov exponent [37]. Entropy is another measurement which can be used in the study of chaotic attractors [38]. Different entropy measures have been proposed to study the complexity of chaotic attractors [39]. Chaotic dynamics and their complexities have been analyzed in [40,41,42]. Local entropy has been used for image segmentation in [43].
In these days, the transmission of data without leakage is an important topic. Many methods have been proposed for data encryption [44,45,46]. Chaotic systems have many applications in various areas, such as biology and communication [47,48,49]. In [50], chaotic dynamics were investigated in the cryptocurrency market. Some features of chaotic dynamics, such as randomness and sensitivity to initial conditions, are desirable in the field of cryptology [51,52]. The unpredictability of chaotic time-series is an important feature, which is useful in the encryption [53]. Many studies have been done on the application of chaotic systems in encryption [54,55]. In [56], a watermarking method to embed an invisible watermark into the intra-frames of a MPEG video sequence has been studied. A hybrid non-blind MPEG video watermarking method was proposed in [57]. A robust image watermarking method, such as copyright protection, was studied in [58].
In this paper, a new chaotic system is proposed. The system has a special property which crosses a pre-defined cylinder repeatedly. The system is introduced in Section 2. The structural features of the proposed system are analyzed in Section 3. Additionally, bifurcation diagram, Lyapunov exponents, and entropy analysis of the system are studied in Section 3. In Section 4, an encryption method based on the proposed system is presented, and its results are discussed. Section 5 is the conclusion.

2. The New Chaotic System and Its Structural Properties

The novel three-dimensional chaotic system is as follows:
x ˙ =   z y ˙ = x 2 + y 2 a 2 z ˙ =   0.4 z + 3 x y .
The system shows chaotic dynamic in a   =   1.7 with initial conditions ( x 0 , y 0 , z 0 )   =   ( 0.29 , 1.81 , 0.17 ) . Figure 1 shows the chaotic attractor in three different projections.

3. Dynamical Properties of the Proposed System

In the study of dynamical systems, bifurcation diagram is handy. It shows various dynamics of the system by changing parameters. In the following parts of this section, dynamical properties of the proposed system have been discussed by changing parameters.

3.1. Equilibrium Points and Their Stability

To investigate equilibrium points of the system, the right-hand side of Equation (1) should be zero as follows:
z   =   0 x 2 + y 2 a 2   =   0 . x y   =   0
Therefore, we have four equilibrium points as E q 1 :   ( 0 , a , 0 ) ,   E q 2 :   ( 0 , a , 0 ) ,   E q 3 :   ( a , 0 , 0 ) ,   E q 4 :   ( a , 0 , 0 ) . The stability of these equilibrium points is investigated using the Jacobian matrix and roots of characteristic equations in each equilibrium point. Figure 2 shows the real and imaginary parts of equilibrium points for a [ 1.7 , 2.4 ] . Figure 2a,b shows Eigenvalues of E q 1 . E q 1 is a saddle point in the studied interval, and it is not spiral since the imaginary part of Eigenvalues is zero. Figure 2c,d shows Eigenvalues of E q 2 . It shows that E q 2 has two complex conjugates with a positive real part and one negative real Eigenvalue. Therefore, it is a spiral saddle point. Eigenvalues of E q 3 and E q 4 are shown in Figure 2e–h. It shows that these equilibrium points are saddles and spiral when there are one positive and two negative real parts of Eigenvalues. Numerical investigations show that initial conditions in a small neighborhood of equilibrium points lead to the chaotic attractor, so the attractor is self-excited.

3.2. Attractor around a Pre-Defined Cylinder

The average of x ˙ , y ˙ , and z ˙ of the system should be zero to have a bounded solution [59]. Therefore, in each attractor of the system, such as periodic and chaotic, the average of each derivative is zero. In other words, we have x ˙   =   y ˙   =   z ˙   =   0 . Thus, z   =   0 , x 2 + y 2   = a 2 , and 0.4 z + 3 x y   =   0 . The condition z   =   0 means that the attractor of the system should be above the plane z = 0 at sometimes and bellow the plane at some other times. Therefore z can be zero on the attractor of the proposed system. Condition x 2 + y 2   = a 2 means that each bounded solution of the proposed system should cross the inside and outside of the cylinder x 2 + y 2   =   a 2 repeatedly. The attractor of the system should cross the manifold z = 7.5 x y to satisfy the condition 0.4 z + 3 x y   =   0 . Figure 3 shows the chaotic attractor in a   =   1.7 and these three conditions which are satisfied by the attractor. Figure 3a,b shows the cylinder x 2 + y 2   = 1.7 2 (from two points of view) which is crossed by the chaotic attractor repeatedly. The manifold z   =   7.5 x y and the chaotic attractor are shown in Figure 3c of the figure. Finally, the plane z   =   0 and the attractor are shown in Figure 3d.

3.3. Bifurcation Diagram

Here, the bifurcation diagram of System (1) with respect to changing parameter a is studied. Bifurcation diagram can be plotted by different initiation methods. Two methods are used in this paper. The first method is backward continuation. In this method, the parameter is decreasing, and initial conditions in each parameter are selected from the end values of the states in the previous parameter, which is higher than the current parameter. The second method is plotting bifurcation diagram with constant initial conditions. Figure 4 shows a bifurcation diagram of System (1) with backward continuation. Initial conditions in the first parameter ( a = 2.4 ) are ( x 0 , y 0 , z 0 ) = ( 0.29 , 1.81 , 0.17 ) . The system has a period-doubling route to chaos by decreasing parameter a . Bifurcation diagram of System (1) with constant initial conditions ( x 0 , y 0 , z 0 ) = ( 0.29 , 1.81 , 0.17 ) are plotted in Figure 5. The figure shows a period-doubling route to chaos by decreasing parameter a . However, some jumps can be seen in this route. Comparing bifurcation diagrams which are plotted by two initiation methods in Figure 4 and Figure 5, it can be seen that the system has multistability since its attractor can differ by varying initial conditions.

3.4. Lyapunov Exponents

Lyapunov exponents of System (1) related to the bifurcation diagrams of Figure 4 and Figure 5 are calculated using Wolf’s method [60] and run time 20000. Figure 6a presents Lyapunov exponents of System (1) with backward continuation. Positive Lyapunov exponents of the system in some intervals of parameter a prove the existence of chaos. Figure 6b shows Lyapunov exponents of System (1) with constant initial conditions. Comparing Lyapunov exponents plotting by these two methods shows that however, the system shows multistability by two initiation methods, but the quality of the multistable attractors is the same since their Lyapunov exponents are the same.

3.5. Entropy Analysis

Entropy is a measure of complexity. Entropy can be used in the analysis of biological signals [61,62]. A well-known entropy is Shannon entropy [63], as shown in Equation (3). In this equation, ρ i is the probability of each possible i state.
H   =   i ρ i log ( ρ i )
Another entropy measure which is more applicable in chaotic systems is KolmogorovSinai entropy as Equation (4). τ i is the first Poincaré recurrence times (FPRs). β is a D-dimensional box in the state space with side ε , and the FPRs are observed. ρ ( τ , β ) is the probability distribution of τ i . This entropy is positive in chaotic dynamics [64,65]. Moreover, approaching the bifurcation points can be seen in the entropy if it is calculated without removing transient time. It is because of the slowness near bifurcation points, which causes the state to be more distributed.
H k s ( β [ ε ] ) = 1 τ m i n ( β [ ε ] )   τ ρ ( τ , β [ ε ] ) log ( 1 ρ ( τ , β [ ε ] ) )  
Figure 7a,b shows the results of Shannon entropy and KolmogorovSinai entropy of the proposed system with respect to changing parameter a and backward continuation method. By increasing parameter a an inverse route of a period-doubling route to chaos happens. Thus, the entropy is decreased by increasing parameter a . KolmogorovSinai entropy shows positive values in chaotic regions and also when approaching bifurcation points.
Investigating variations of the attractor of the system by changing parameter a is very interesting. Parameter a changes the radios of the cylinder. It was discussed that each attractor of the system should cross the cylinder repeatedly. Therefore, we can change the domain of attractor in the x y plane by changing parameter a . Figure 7 shows the attractor of System (1) which crosses the cylinder with radios a in three parameters   =   1.74 , a   =   1.8 ,   a   =   2 , as shown in Figure 8a–c.
The system is highly dependent on parameter a since it can have various dynamics in a small interval. Moreover, initial conditions are critical in the dynamic of the system since the system is multistable. In overall, the sensitivity of the dynamic of the system to the parameter and initial conditions makes it a proper choice for encryption.

4. Image Encryption

The proposed system has a complex chaotic dynamic. Besides the sensitivity of its chaotic attractor to initial conditions, the system is multistable, which makes it more complex. The encryption method, which is based on [55] is discussed below.

4.1. Encryption Method

The parameter a and initial conditions of the chaotic attractor of Figure 1 enter the first block of the Algorithm 1. The system is run using the RungKutta method (Ode15s in Matlab program) with constant time steps 0.01 and run time 300. Therefore, 30000 bits are generated using the time series of each variable. The float values of the time series are transferred to 32-bit binary values with 3 bits for the integer part and 29 bits for fraction part since the maximum amplitude of the chaotic attractor 4. In the next step, the 20 least significant bits are selected to be used in the generation of random numbers. Then the 20 least significant bits of the following values of time series are put in a vector which is used in the encryption process.
Lena image is used to test the power of the chaotic attractor of the proposed system in image encryption. The image is shown in Figure 9a. In the first step of encryption, the Lena image is loaded with the size 256 × 256 . Then a random line mixing is used to shuffle rows and columns of the picture. The random vector of x variable, which was generated in the previous part, is used to shuffle the rows of the image. Every eight bits of the vector are considered as a row number. In this step, it is possible that some redundancies exist in the generated indices. Therefore, we remove the duplicates until 256 distinct numbers between 1 to 256 are generated. After that, the rows are shuffled using the random indices. Then, the random vector of z variable is used to shuffle the columns of the image with the same process. Figure 9b shows the shuffled rows and columns of the Lena image. Then, the shuffled image is converted to a vector. In the next step, the image is converted to binary values with eight bits for the integer part, and its values are XORed with the eight bits sequences of the random generated sequence of x and y variables. After that, the results are converted to decimal. Next, the encrypted vector is converted into the encrypted image which is shown in Figure 9c. The parameter and initial conditions of System (1) have been sent to the receiver side as the key in the Algorithm 1. In the decryption, the inverse of the encryption steps should be used to obtain the original image, as shown in Figure 9d.
As another example, the baby image is used (Figure 10a) to test the encryption method using the chaotic attractor of the proposed system. The shuffled rows and columns of the image using the random sequence generated by x and z variables are shown in Figure 10b. Then, the results are XORed with the random sequences which are generated by x and y variables and the encrypted image are shown in Figure 10c. The inverse process should be applied to decrypt the image on the receiver side, as shown in Figure 10d.
Altogether, the encryption algorithm is as follows:
Algorithm 1 Encryption Algorithm
1. Parameter and initial conditions are entered into the system.
2. The proper run time’s step is selected.
3. The float values of the time series are transferred to 32-bit binary values with 3 bits for the integer part and 29 bits for the fraction part.
4. The 20 least significant bits are selected to be used in the generation of random numbers, and they are put in a vector.
5. The rows and columns are shuffled using the randomly generated indices from x and z variable of chaotic attractor.
6. The random vectors generated by x and y of chaotic attractor are XORed, and then they are XORed with the shuffled image.
7. The results are converted to decimal.
In the decryption, the inverse of the encryption steps is applied to the encrypted image. The results show that the decrypted images are loss-less since the mean square error of the original and decrypted image in both cases is zero. Dynamical properties of the previous section show that the system is highly dependent on initial conditions, which make the system a proper choice to be used in encryption.

4.2. Encryption’s Performance

To investigate the performance of encryption, some measures are analyzed [55]. These measures help us to study the security of the encryption method.
Histogram of an image shows its distribution of color values. Figure 11a shows the histogram of the Lena image. It can be seen that the distribution has a special form which depends on the colors of this figure. The desired encryption method should change the distribution of the encrypted image to uniform, so there is no possibility that the encrypted image can be broken. Figure 11b shows the histogram of the encrypted Lena image. It can be seen that the distribution is approximately uniform. Figure 11c,d shows the histogram of the original baby image and its encrypted image. The results present the power of the proposed chaotic system in the encryption.
The second measure is the correlation coefficient. This measure presents the relation between the pixels of the image. Figure 12a,c shows the relationship between the pixels of Lena and baby image, respectively. The correlation coefficient for these two images is 0.1633 and 0.0611 . The graphic of the correlation of the encrypted images of Lena and baby are shown in Figure 12b,d. The results show that the encryption method using the proposed system has a proper correlation distribution. Correlation coefficients of the encrypted image are 2.3585 × 10 4 and 1.5770 × 10 5 , respectively.
Another measure which is used in the calculation of quality of encryption method is Shannon entropy. Entropy calculates the complexity of the encrypted data. The calculated entropy of the original Lena and baby image is 7.2253 and 7.1606 . This measure for encrypted Lena and the baby image is 7.9975 , and 7.9974 . The results show an increase in the entropy of the encrypted image.
Encryption quality is another measure for the quality of encryption. This measure quantifies the difference of distribution of gray levels of the original and encrypted image. It is calculated as Equation (5). P and C are the original and encrypted image. P and C can have L gray levels as { 0 , ,   L 1 } . H L ( P ) is the number of occurrences of each gray level in the original image, and H L ( C ) is the number of occurrences of each gray level in the encrypted image [66]. In this study, both figures have 256 gray levels. This measure is 2.1734 × 10 2 and 1.9934 × 10 2 for Lena and baby image, respectively.
E Q = L = 0 255 | H L ( C ) H L ( P ) | 256

5. Conclusions

A new three-dimensional chaotic flow has been proposed in this paper. The system has a particular property in which its attractor should cross inside and outside of a determined cylinder. Equilibrium points and their stabilities were analyzed in this paper. Bifurcation diagram of the system was studied using backward continuation method and constant initial conditions method. The results show that the system has multistability. Lyapunov exponents of the system were studied to determine the chaotic regions with respect to changing the bifurcation parameter. Entropy analysis of the system was used to investigate the complexity of attractors by changing the parameter. Finally, the proposed system was applied in an Algorithm 1, and its performance was discussed. Some Matlab codes of the paper are available in the following link, https://drive.google.com/drive/folders/1y96B_VZb1qQ7FLuNDiVEHZoG6K9gJT76?usp=sharing.

Author Contributions

Conceptualization, A.K.F. and A.T.M.; Methodology, N.M.G.A. and A.K.F.; Software, A.K.F. and A.T.M.; Validation, F.N. and I.H.; Formal analysis, N.M.G.A.; Investigation, F.N.; Resources, I.H.; Data Curation, F.N.; Writing-Original Draft Preparation, N.M.G.A.; Writing-Review and Editing, F.N. and I.H.; Visualization, F.N.; Supervision, N.M.G.A. and I.H.; Project Administration, N.M.G.A. and I.H.; Funding acquisition, I.H.; Image Encryption, A.K.F. and A.T.M.

Funding

This research received no external funding.

Conflicts of Interest

The authors declare that there is no conflict of interests regarding the publication of this paper.

References

  1. Danca, M.F.; Tang, W.K.; Chen, G. Suppressing chaos in a simplest autonomous memristor-based circuit of fractional order by periodic impulses. Chaos Solitons Fractals 2016, 84, 31–40. [Google Scholar] [CrossRef]
  2. Rajagopal, K.; Kacar, S.; Wei, Z.; Duraisamy, P.; Kifle, T.; Karthikeyan, A.; Wei, Z. Dynamical investigation and chaotic associated behaviors of memristor Chua’s circuit with a non-ideal voltage-controlled memristor and its application to voice encryption. AEU Int. J. Electron. Commun. 2019, 107, 183–191. [Google Scholar] [CrossRef]
  3. Petržela, J.; Kolka, Z.; Hanus, S. Simple chaotic oscillator: From mathematical model to practical experiment. Radioengineering 2006, 15, 6–11. [Google Scholar]
  4. Chen, G.; Ueta, T. Yet another chaotic attractor. Int. J. Bifurc. Chaos 1999, 9, 1465–1466. [Google Scholar] [CrossRef]
  5. Lorenz, E.N. Deterministic nonperiodic flow. J. Atmos. Sci. 1963, 20, 130–141. [Google Scholar] [CrossRef]
  6. Wei, Z. Dynamical behaviors of a chaotic system with no equilibria. Phys. Lett. A 2011, 376, 102–108. [Google Scholar] [CrossRef]
  7. Wang, X.; Chen, G. A chaotic system with only one stable equilibrium. Commun. Nonlinear Sci. Numer. Simul. 2012, 17, 1264–1272. [Google Scholar] [CrossRef] [Green Version]
  8. Molaie, M.; Jafari, S.; Sprott, J.C.; Golpayegani, S.M.R.H. Simple chaotic flows with one stable equilibrium. Int. J. Bifurc. Chaos 2013, 23, 1350188. [Google Scholar] [CrossRef]
  9. Pham, V.T.; Volos, C.; Gambuzza, L.V. A Memristive Hyperchaotic System without Equilibrium. Sci. World J. 2014, 2014, 1–9. [Google Scholar] [CrossRef]
  10. Pham, V.-T.; Volos, C.; Jafari, S.; Wei, Z.; Wang, X. Constructing a Novel No-Equilibrium Chaotic System. Int. J. Bifurc. Chaos 2014, 24, 1450073. [Google Scholar] [CrossRef]
  11. Gotthans, T.; Petržela, J. New class of chaotic systems with circular equilibrium. Nonlinear Dyn. 2015, 81, 1143–1149. [Google Scholar] [CrossRef] [Green Version]
  12. Gotthans, T.; Sprott, J.C.; Petrzela, J. Simple Chaotic Flow with Circle and Square Equilibrium. Int. J. Bifurc. Chaos 2016, 26, 1650137. [Google Scholar] [CrossRef]
  13. Natiq, H.; Said, M.R.M.; Al-Saidi, N.M.G.; Kilicman, A. Dynamics and Complexity of a New 4D Chaotic Laser System. Entropy 2019, 21, 34. [Google Scholar] [CrossRef]
  14. Wei, Z.; Sprott, J.; Chen, H. Elementary quadratic chaotic flows with a single non-hyperbolic equilibrium. Phys. Lett. A 2015, 379, 2184–2187. [Google Scholar] [CrossRef]
  15. Pham, V.T.; Volos, C.; Jafari, S.; Wang, X. Generating a novel hyperchaotic system out of equilibrium. Optoelectron. Adv. Mater. Rapid Commun. 2014, 8, 535–539. [Google Scholar]
  16. Lai, Q.; Chen, S. Generating Multiple Chaotic Attractors from Sprott B System. Int. J. Bifurc. Chaos 2016, 26, 1650177. [Google Scholar] [CrossRef]
  17. Pham, V.T.; Jafari, S.; Volos, C.; Wang, X.; Golpayegani, S.M.R.H. Is that Really Hidden? The Presence of Complex Fixed-Points in Chaotic Flows with No Equilibria. Int. J. Bifurc. Chaos 2014, 24, 1450146. [Google Scholar] [CrossRef]
  18. Wang, Z.; Sun, W.; Wei, Z.; Xi, X. Dynamics analysis and robust modified function projective synchronization of Sprott E system with quadratic perturbation. Kybernetika 2014, 50, 616–631. [Google Scholar] [CrossRef]
  19. Li, C.; Thio, W.J.C.; Sprott, J.C.; Iu, H.H.C.; Xu, Y.; Iu, H.H.C. Constructing Infinitely Many Attractors in a Programmable Chaotic Circuit. IEEE Access 2018, 6, 29003–29012. [Google Scholar] [CrossRef]
  20. Ma, J.; Zhou, P.; Ahmad, B.; Ren, G.; Wang, C. Chaos and multi-scroll attractors in RCL-shunted junction coupled Jerk circuit connected by memristor. PLoS ONE 2018, 13, e0191120. [Google Scholar] [CrossRef]
  21. Wei, Z.; Zhu, B.; Yang, J.; Perc, M.; Slavinec, M. Bifurcation analysis of two disc dynamos with viscous friction and multiple time delays. Appl. Math. Comput. 2019, 347, 265–281. [Google Scholar] [CrossRef]
  22. Li, C.; Sprott, J.C. An infinite 3-D quasiperiodic lattice of chaotic attractors. Phys. Lett. A 2018, 382, 581–587. [Google Scholar] [CrossRef]
  23. PETRŽELA, J.; HRUBOŠ, Z.; GOTTHANS, T. Modeling Deterministic Chaos Using Electronic Circuits. Radioengineering 2011, 20, 438–444. [Google Scholar]
  24. Zhou, P.; Huang, K. A new 4-D non-equilibrium fractional-order chaotic system and its circuit implementation. Commun. Nonlinear Sci. Numer. Simul. 2014, 19, 2005–2011. [Google Scholar] [CrossRef]
  25. Danca, M.F.; Bourke, P.; Kuznetsov, N. Graphical Structure of Attraction Basins of Hidden Chaotic Attractors: The Rabinovich–Fabrikant System. Int. J. Bifurc. Chaos 2019, 29, 1930001. [Google Scholar] [CrossRef]
  26. Kuznetsov, N.V.; Leonov, G.A.; Mokaev, T.N. Localization of a hidden attractor in the Rabinovich system. arXiv 2015, arXiv:150404723. [Google Scholar]
  27. Kuznetsov, N.V.; Leonov, G.A.; Mokaev, T.N.; Seledzhi, S.M. Hidden Attractor in the Rabinovich System, Chua Circuits and PLL. In AIP Conference Proceedings; AIP Publishing: Melville, NY, USA, 2016. [Google Scholar]
  28. Kuznetsov, N.V.; Leonov, G.A.; Mokaev, T.N. The Lyapunov dimension and its computation for self-excited and hidden attractors in the Glukhovsky-Dolzhansky fluid convection model. arXiv 2015, arXiv:150909161. [Google Scholar]
  29. Danca, M.-F.; Fečkan, M. Hidden chaotic attractors and chaos suppression in an impulsive discrete economical supply and demand dynamical system. Commun. Nonlinear Sci. Numer. Simul. 2019, 74, 1–13. [Google Scholar] [CrossRef] [Green Version]
  30. Danca, M.F.; Kuznetsov, N.; Chen, G. Unusual dynamics and hidden attractors of the Rabinovich–Fabrikant system. Nonlinear Dyn. 2017, 88, 791–805. [Google Scholar] [CrossRef]
  31. Lai, Q.; Akgul, A.; Zhao, X.W.; Pei, H. Various Types of Coexisting Attractors in a New 4D Autonomous Chaotic System. Int. J. Bifurc. Chaos 2017, 27, 1750142. [Google Scholar] [CrossRef]
  32. Chen, S.; Lai, Q. Coexisting attractors generated from a new 4D smooth chaotic system. Int. J. Control. Autom. Syst. 2016, 14, 1124–1131. [Google Scholar]
  33. Bao, B.; Jiang, T.; Xu, Q.; Chen, M.; Wu, H.; Hu, Y. Coexisting infinitely many attractors in active band-pass filter-based memristive circuit. Nonlinear Dyn. 2016, 86, 1711–1723. [Google Scholar] [CrossRef]
  34. Bao, B.C.; Li, Q.D.; Wang, N.; Xu, Q. Multistability in Chua’s circuit with two stable node-foci. Chaos Interdiscip. J. Nonlinear Sci. 2016, 26, 043111. [Google Scholar] [CrossRef] [PubMed]
  35. Bao, B.C.; Chen, M.; Bao, H.; Xu, Q. Extreme multistability in a memristive circuit. Electron. Lett. 2016, 52, 1008–1010. [Google Scholar] [CrossRef]
  36. Danca, M.-F. Lyapunov Exponents of a Discontinuous 4D Hyperchaotic System of Integer or Fractional Order. Entropy 2018, 20, 337. [Google Scholar] [CrossRef]
  37. Sprott, J.C. Elegant Chaos: Algebraically Simple Chaotic Flows; World Scientific: Singapore, 2010. [Google Scholar]
  38. Hilborn, R.C. Chaos and Nonlinear Dynamics: An Introduction for Scientists and Engineers; Oxford University Press: Oxford, UK, 2000. [Google Scholar]
  39. He, S.; Sun, K.; Wang, R. Fractional fuzzy entropy algorithm and the complexity analysis for nonlinear time series. Eur. Phys. J. Spec. Top. 2018, 227, 943–957. [Google Scholar] [CrossRef]
  40. He, S.-B.; Sun, K.-H.; Zhu, C.X. Complexity analyses of multi-wing chaotic systems. Chin. Phys. B 2013, 22, 050506. [Google Scholar] [CrossRef]
  41. He, S.; Sun, K.; Wang, H. Complexity Analysis and DSP Implementation of the Fractional-Order Lorenz Hyperchaotic System. Entropy 2015, 17, 8299–8311. [Google Scholar] [CrossRef]
  42. He, S.; Li, C.; Sun, K.; Jafari, S. Multivariate Multiscale Complexity Analysis of Self-Reproducing Chaotic Systems. Entropy 2018, 20, 556. [Google Scholar] [CrossRef]
  43. Hržić, F.; Štajduhar, I.; Tschauner, S.; Sorantin, E.; Lerga, J. Local-Entropy Based Approach for X-Ray Image Segmentation and Fracture Detection. Entropy 2019, 21, 338. [Google Scholar] [CrossRef]
  44. Bourbakis, N.; Alexopoulos, C. Picture data encryption using scan patterns. Pattern Recognit. 1992, 25, 567–581. [Google Scholar] [CrossRef]
  45. Pareek, N.; Patidar, V.; Sud, K. Image encryption using chaotic logistic map. Image Vis. Comput. 2006, 24, 926–934. [Google Scholar] [CrossRef]
  46. Natiq, H.; Al-Saidi, N.M.G.; Said, M.R.M.; Kilicman, A. A new hyperchaotic map and its application for image encryption. Eur. Phys. J. Plus 2018, 133, 6. [Google Scholar] [CrossRef]
  47. Nazarimehr, F.; Jafari, S.; Golpayegani, S.M.R.H.; Perc, M.; Sprott, J.C. Predicting tipping points of dynamical systems during a period-doubling route to chaos. Chaos Interdiscip. J. Nonlinear Sci. 2018, 28, 073102. [Google Scholar] [CrossRef] [Green Version]
  48. Nazarimehr, F.; Ghaffari, A.; Jafari, S.; Golpayegani, S.M.R.H. Sparse Recovery and Dictionary Learning to Identify the Nonlinear Dynamical Systems: One Step Toward Finding Bifurcation Points in Real Systems. Int. J. Bifurc. Chaos 2019, 29, 1950030. [Google Scholar] [CrossRef]
  49. Beritelli, F.; Di Cola, E.; Fortuna, L.; Italia, F. Multilayer Chaotic Encryption for Secure Communications in Packet Switching Networks. In Proceedings of the International Conference on Communication Technology Proceedings, Beijing, China, 21–25 August 2000. [Google Scholar]
  50. Gunay, S.; Kaşkaloğlu, K. Seeking a Chaotic Order in the Cryptocurrency Market. Math. Comput. Appl. 2019, 24, 36. [Google Scholar] [CrossRef]
  51. Álvarez, G.; Li, S. Some basic cryptographic requirements for chaos-based cryptosystems. Int. J. Bifurc. Chaos 2006, 16, 2129–2151. [Google Scholar] [CrossRef]
  52. Wang, J.; Ding, Q. Dynamic Rounds Chaotic Block Cipher Based on Keyword Abstract Extraction. Entropy 2018, 20, 693. [Google Scholar] [CrossRef]
  53. Çavuşoğlu, Ü; Kaçar, S.; Pehlivan, I.; Zengin, A. Secure image encryption algorithm design using a novel chaos based S-Box. Chaos Solitons Fractals 2017, 95, 92–101. [Google Scholar]
  54. Lagmiri, S.; Elalami, N.; Elalami, J. Novel Chaotic System for Color Image Encryption Using Random Permutation. Int. J. Comput. Netw. Commun. Secur. 2018, 6, 9–16. [Google Scholar]
  55. Çavuşoğlu, Ü.; Panahi, S.; Akgül, A.; Jafari, S.; Kaçar, S. A new chaotic system with hidden attractor and its engineering applications: Analog circuit realization and image encryption. Analog Integr. Circuits Signal Process. 2019, 98, 85–99. [Google Scholar] [CrossRef]
  56. Abdallah, E.E.; Ben Hamza, A.; Bhattacharya, P. MPEG Video Watermarking Using Tensor Singular Value Decomposition. In Proceedings of the Computer Vision–ECCV 2012, Florence, Italy, 7–13 October 2012; Springer: Berlin/Heidelberg, Germany, 2017. [Google Scholar]
  57. Abdallah, E.E.; Hamza, A.B.; Bhattacharya, P. Video watermarking using wavelet transform and tensor algebra. Signal Image Video Process. 2010, 4, 233–245. [Google Scholar] [CrossRef]
  58. Ouhsain, M.; Ben Hamza, A. Image watermarking scheme using nonnegative matrix factorization and wavelet transform. Expert Syst. Appl. 2009, 36, 2123–2129. [Google Scholar] [CrossRef]
  59. Jafari, S.; Sprott, J.C.; Dehghan, S. Categories of conservative flows. Int. J. Bifurc. Chaos 2019, 29, 1950021. [Google Scholar] [CrossRef]
  60. Wolf, A.; Swift, J.B.; Swinney, H.L.; Vastano, J.A. Determining Lyapunov exponents from a time series. Phys. D Nonlinear Phenom. 1985, 16, 285–317. [Google Scholar] [CrossRef] [Green Version]
  61. Lerga, J.; Saulig, N.; Mozetič, V. Algorithm based on the short-term Rényi entropy and IF estimation for noisy EEG signals analysis. Comput. Biol. Med. 2017, 80, 1–13. [Google Scholar] [CrossRef]
  62. Lerga, J.; Saulig, N.; Mozetic, V.; Lerga, R. Number of EEG Signal Components estimated Using the Short-Term Rényi Entropy. In Proceedings of the International Multidisciplinary Conference on Computer and Energy Science (SpliTech), Split, Croatia, 13–15 July 2016. [Google Scholar]
  63. Cover, T.M.; Thomas, J.A. Elements of Information Theory; John Wiley & Sons: Hoboken, NJ, USA, 2012. [Google Scholar]
  64. Frigg, R. In What Sense is the Kolmogorov-Sinai Entropy a Measure for Chaotic Behaviour?--Bridging the Gap Between Dynamical Systems Theory and Communication Theory. Br. J. Philos. Sci. 2004, 55, 411–434. [Google Scholar] [CrossRef]
  65. Mihelich, M.; Dubrulle, B.; Paillard, D.; Herbert, C. Maximum Entropy Production vs. Kolmogorov-Sinai Entropy in a Constrained ASEP Model. Entropy 2014, 16, 1037–1046. [Google Scholar] [CrossRef] [Green Version]
  66. Jolfaei, A.; Mirghadri, A. A new approach to measure quality of image encryption. Int. J. Comput. Netw. Secur. 2010, 2, 38–44. [Google Scholar]
Figure 1. Chaotic attractor of System (1) in three different planes, (a) x y plane, (b) x z plane, (c) y z plane.
Figure 1. Chaotic attractor of System (1) in three different planes, (a) x y plane, (b) x z plane, (c) y z plane.
Entropy 21 00958 g001
Figure 2. Real and imaginary parts of equilibrium points in a∈[1.7,2.4]. (a) Real part of Eigenvalues of E q 1 , (b) imaginary part of Eigenvalues of E q 1 , (c) real part of Eigenvalues of E q 2 , (d) imaginary part of Eigenvalues of E q 2 , (e) real part of Eigenvalues of E q 3 , (f) imaginary part of Eigenvalues of E q 3 , (g) real part of Eigenvalues of E q 4 , (h) imaginary part of Eigenvalues of E q 4 .
Figure 2. Real and imaginary parts of equilibrium points in a∈[1.7,2.4]. (a) Real part of Eigenvalues of E q 1 , (b) imaginary part of Eigenvalues of E q 1 , (c) real part of Eigenvalues of E q 2 , (d) imaginary part of Eigenvalues of E q 2 , (e) real part of Eigenvalues of E q 3 , (f) imaginary part of Eigenvalues of E q 3 , (g) real part of Eigenvalues of E q 4 , (h) imaginary part of Eigenvalues of E q 4 .
Entropy 21 00958 g002
Figure 3. The chaotic attractor in a   =   1.7 and (a) the condition x 2 + y 2   = a 2 , (b) the condition x 2 + y 2   = a 2 from another viewpoint, (c) the condition 0.4 z + 3 x y   =   0 , (d) the condition z   =   0 .
Figure 3. The chaotic attractor in a   =   1.7 and (a) the condition x 2 + y 2   = a 2 , (b) the condition x 2 + y 2   = a 2 from another viewpoint, (c) the condition 0.4 z + 3 x y   =   0 , (d) the condition z   =   0 .
Entropy 21 00958 g003
Figure 4. Bifurcation diagram of System (1) with backward continuation and the first initial conditions ( x 0 , y 0 , z 0 )   =   ( 0.29 , 1.81 , 0.17 ) . (a) maximum values of x variable by changing parameter a ; (b) maximum values of y variable by changing parameter a ; (c) maximum values of z variable by changing parameter a .
Figure 4. Bifurcation diagram of System (1) with backward continuation and the first initial conditions ( x 0 , y 0 , z 0 )   =   ( 0.29 , 1.81 , 0.17 ) . (a) maximum values of x variable by changing parameter a ; (b) maximum values of y variable by changing parameter a ; (c) maximum values of z variable by changing parameter a .
Entropy 21 00958 g004
Figure 5. Bifurcation diagram of System (1) with constant initial conditions ( x 0 , y 0 , z 0 )   =   ( 0.29 , 1.81 , 0.17 ) . (a) maximum values of x variable by changing parameter a ; (b) maximum values of y variable by changing parameter a ; (c) maximum values of z variable by changing parameter a .
Figure 5. Bifurcation diagram of System (1) with constant initial conditions ( x 0 , y 0 , z 0 )   =   ( 0.29 , 1.81 , 0.17 ) . (a) maximum values of x variable by changing parameter a ; (b) maximum values of y variable by changing parameter a ; (c) maximum values of z variable by changing parameter a .
Entropy 21 00958 g005
Figure 6. Lyapunov exponents of System (1) (a) with backward continuation, (b) with constant initial conditions.
Figure 6. Lyapunov exponents of System (1) (a) with backward continuation, (b) with constant initial conditions.
Entropy 21 00958 g006
Figure 7. (a) Shannon entropy and (b) KolmogorovSinai entropy of the proposed system with respect to changing parameter a and backward continuation method.
Figure 7. (a) Shannon entropy and (b) KolmogorovSinai entropy of the proposed system with respect to changing parameter a and backward continuation method.
Entropy 21 00958 g007
Figure 8. The attractor of System (1) in (a) a = 1.74 , (b) a = 1.8 , (c) a = 2 .
Figure 8. The attractor of System (1) in (a) a = 1.74 , (b) a = 1.8 , (c) a = 2 .
Entropy 21 00958 g008
Figure 9. (a) The original Lena image, (b) the shuffled rows and columns of the Lena image, (c) the encrypted image, (d) the decrypted image.
Figure 9. (a) The original Lena image, (b) the shuffled rows and columns of the Lena image, (c) the encrypted image, (d) the decrypted image.
Entropy 21 00958 g009
Figure 10. (a) The original baby image, (b) the shuffled rows and columns of the baby image, (c) the encrypted image, (d) the decrypted image.
Figure 10. (a) The original baby image, (b) the shuffled rows and columns of the baby image, (c) the encrypted image, (d) the decrypted image.
Entropy 21 00958 g010
Figure 11. (a) The histogram of Lena image, (b) the histogram of the encrypted Lena image, (c) the histogram of the baby image, (d) the histogram of the encrypted baby image.
Figure 11. (a) The histogram of Lena image, (b) the histogram of the encrypted Lena image, (c) the histogram of the baby image, (d) the histogram of the encrypted baby image.
Entropy 21 00958 g011
Figure 12. (a) The relation between pixels of Lena, (b) the correlation of the encrypted images of Lena, (c) the relationship between pixels of the baby image, (d) the correlation of the encrypted images of the baby.
Figure 12. (a) The relation between pixels of Lena, (b) the correlation of the encrypted images of Lena, (c) the relationship between pixels of the baby image, (d) the correlation of the encrypted images of the baby.
Entropy 21 00958 g012

Share and Cite

MDPI and ACS Style

Farhan, A.K.; Al-Saidi, N.M.G.; Maolood, A.T.; Nazarimehr, F.; Hussain, I. Entropy Analysis and Image Encryption Application Based on a New Chaotic System Crossing a Cylinder. Entropy 2019, 21, 958. https://doi.org/10.3390/e21100958

AMA Style

Farhan AK, Al-Saidi NMG, Maolood AT, Nazarimehr F, Hussain I. Entropy Analysis and Image Encryption Application Based on a New Chaotic System Crossing a Cylinder. Entropy. 2019; 21(10):958. https://doi.org/10.3390/e21100958

Chicago/Turabian Style

Farhan, Alaa Kadhim, Nadia M.G. Al-Saidi, Abeer Tariq Maolood, Fahimeh Nazarimehr, and Iqtadar Hussain. 2019. "Entropy Analysis and Image Encryption Application Based on a New Chaotic System Crossing a Cylinder" Entropy 21, no. 10: 958. https://doi.org/10.3390/e21100958

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop