Next Article in Journal
Computation of Implicit Representation of Volumetric Shells with Predefined Thickness
Previous Article in Journal
Estimating the Tour Length for the Close Enough Traveling Salesman Problem
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

A Two-Dimensional mKdV Linear Map and Its Application in Digital Image Cryptography

Department of Mathematics, Universitas Lampung, Bandar Lampung 35145, Indonesia
*
Author to whom correspondence should be addressed.
Algorithms 2021, 14(4), 124; https://doi.org/10.3390/a14040124
Submission received: 23 March 2021 / Revised: 10 April 2021 / Accepted: 11 April 2021 / Published: 16 April 2021

Abstract

:
Cryptography is the science and study of protecting data in computer and communication systems from unauthorized disclosure and modification. An ordinary difference equation (a map) can be used in encryption–decryption algorithms. In particular, the Arnold’s cat and the sine-Gordon linear maps can be used in cryptographic algorithms for encoding digital images. In this article, a two-dimensional linear mKdV map derived from an ordinary difference mKdV equation will be used in a cryptographic encoding algorithm. The proposed encoding algorithm will be compared with those generated using sine-Gordon and Arnold’s cat maps via the correlations between adjacent pixels in the encrypted image and the uniformity of the pixel distribution. Note that the mKdV map is derived from the partial discrete mKdV equation with Consistency Around the Cube (CAC) properties, whereas the sine-Gordon map is derived from the partial discrete sine-Gordon equation, which does not have CAC properties.

1. Introduction

The mathematical principles used in operating systems, database systems, and computer networks play an important role in cryptography. There are many algorithms for securing data that involve mathematics, two of which can be found in [1]. In addition to mathematical principles, mapping concepts can be used in encryption–decryption algorithms. A cryptographic encoding algorithm for digital images, namely, Arnold’s Cat Map (ACM), was studied in [2], whereas the logistic map was outlined in [3], and the Nonlinear Chaotic Algorithm (NCA) was investigated in [4]. Additional cryptographic encoding algorithms can be found in [5], which outlines a chaotic cryptosystem based on a Hènon map [6] and investigates an independent component analysis, and [7,8,9], which provide algorithms for all data file types. Furthermore, in [10], the authors suggest a fast color image encryption scheme containing both permutation and substitution key streams that have been quantified from a sequence extracted from the orbit of Chen’s chaotic system.
Recently, several approaches used in various encryption algorithms have concerned digital images. Two of the techniques were proposed in 2017 in [10,11]. In [11], the authors proposed an algorithm that involves scrambling pixel positions and changing the intensities of the pixels (see [12] for a different method in hiding an image using reference point coding to embed data in the spatial domain). In this article, a two-dimensional linear map derived from a partial discrete equation (partial discrete mKdV equation) with Consistency Around the Cube (CAC) properties will be discussed (see [13,14] for the construction of a generalized mKdV map and the investigation of its properties) and applied in cryptographic encoding algorithms for digital image data (see [15] for digital text data). This article consists of four Sections. In Section 1, previous research results (related to the use of mathematical concepts and algorithms in cryptography) are provided. In Section 2, the CAC properties of the partial discrete mKdV equation will be shown. In addition, a two-dimensional mKdV map derived from a partial discrete mKdV equation is described. Section 3 details the construction of a two-dimensional linear mKdV map and the application of the map in an encryption–decryption algorithm for image data. The Mathematica programming language was used to implement the algorithm. In the last section, the concluding remarks are provided.

2. Formulation of the Problem

Natural phenomena formulated through mathematical models have existed since the 17th century. For example, the phenomenon of waves and mathematical formulations such as the sine-Gordon equation, the Korteweg de Vries equation (KdV), Schrödinger’s nonlinear equation, the Kadomsetv–Petviashvili (KP) equation, and the Davey–Stewartson equation [16,17]. Initially, the mKdV equation was a partial differential equation. The mKdV equation is known to have soliton solutions. Therefore, it is known as the soliton equation (see [18] for a nonlinear hyperbolic partial differential equation involving the d’Alembert operator of the mKdV and [19] for a method for finding the solitary wave solutions of the mKdV).
Discretization of the mKdV equation has been carried out in various ways [20,21,22]. By following the compatible state requirements in the Lax pair’s vertical and horizontal interchangeability, a mapping called the mapping of generalized mKdV discrete equations can be derived. In several pieces of literature related to discrete dynamical system integration, attention has been devoted to studying the integrability of the mKdV equation and the resulting geometry.

2.1. The CAC Properties of P∆E mKdV

The partial discrete mKdV equation (P∆E mKdV) can be studied through the quadrilateral equation. The quadrilateral equation is used to study the dependent variables in discrete integrated systems via a two-dimensional regular lattice quadratic approach. The method uses a four-sided planar graph (planar quadgraph) that represents the cell decomposition of a surface (see Figure 1a). As shown in Figure 1b, a geometric shape constructed with quadrilaterals is known as a simple cube. A quadrilateral equation is said to have CAC properties if it has the properties of a tetrahedron.
Suppose that a point in a cell is referred to as u p = u ( i α 1 , j α 2 ) = u i , j . Meanwhile, suppose the other three points are u 1 = u i + 1 , j , u 2 = u i , j + 1 , and u 12 = u i + 1 , j + 1 . A simple quadrilateral (orange block in Figure 1) represents an equation that is expressed as
Ξ ( u , u 1 , u 2 , u 12 ; α 1 , α 2 ) = 0
In Equation (1), Ξ is affine-linear for all arguments. Thus, for a quadrilateral, as in Figure 1a, Equation (1) is equivalent to
B ( u , u 2 , α 2 , λ ) B ( 2 u , u 12 , α 1 , λ ) B ( u 12 , u 1 , α 2 , λ ) B ( u 1 , u , α 1 , λ ) = I
or
B ( u 12 , u 1 , α 2 , λ ) B ( u 1 , u , α 1 , λ ) = B ( u 2 , u , α 2 , λ ) B ( u 12 , u 2 , α 1 , λ )
where B is a matrix depending on an arbitrary parameter λ .
In [23], the mathematicians Adler, Bobenko, and Suris (ABS) classified all quadrilateral equations as having CAC properties (tetrahedron properties). For a simple cube, these properties mean that variable u 123 depends only on u 1 , u 2 , and u 3 . One of the quadrilateral equations classified as having CAC properties by ABS classification is the P∆E mKdV. On the other hand, the P∆E sine-Gordon is not classified as having CAC properties.
Consider the standard P∆E mKdV equation defined as in [24]:
p ( V l + 1 , m V l + 1 , m + 1 V l , m V l , m + 1 ) = q ( V l , m + 1 V l + 1 , m + 1 V l , m V l + 1 , m )
for the fields V l , m defined at the sites ( l , m ) of a two-dimensional lattice Z 2 . In Equation (3), the subscripts denote the values of the independent variable, V is the dependent variable, and p and q are arbitrary constants.
Suppose θ 3 = θ 4 = p and θ 1 = θ 2 = q . Then, Equation (3) can be written as follows:
θ 1 V l , m V l , m + 1 θ 2 V l + 1 , m V l + 1 , m + 1 θ 3 V l , m V l + 1 , m + θ 4 V l , m + 1 V l + 1 , m + 1 = 0
Let V l , m = u , V l + 1 , m = u 1 , V l , m + 1 = u 2 , and V l + 1 , m + 1 = u 12 . Then, Equation (3) can be expressed with a quadrilateral equation—i.e.,
p ( u u 2 u 1 u 12 ) q ( u u 1 u 2 u 12 ) = 0
According to the cube in Figure 1b, several quadrilateral equations can be derived in terms of the down side ( u 12 = u ( p u 2 q u 1 ) p u 1 q u 2 ) , left side ( u 13 = u ( p u 3 k u 1 ) p u 1 k u 3 ) , back side ( u 23 = u ( q u 3 k u 2 ) q u 2 k u 3 ) , top side u 123 = u 3 ( p u 23 q u 13 ) p u 13 q u 23 , right side ( u 123 = u 2 ( p u 23 k u 12 ) p u 12 k u 23 ) , and front side ( u 123 = u 1 ( q u 13 k u 12 ) q u 12 k u 13 ) . Substituting these quadrilateral equations into Equation (5) and solving for the variable u 123 , we arrive at the same quadrilateral equation for the right-top-back side lattices—i.e.,
u 123 = u 1 ( q u 3 ( p 2 k 2 ) + k u 2 ( q 2 p 2 ) ) + p u 2 u 3 ( k 2 q 2 ) q u 2 ( p 2 k 2 ) + p u 1 ( k 2 q 2 ) + k u 3 ( q 2 p 2 )
In Equation (6), the variable u 123 depends on u 1 , u 2 , and u 3 only, which means that the P∆E mKdV has CAC properties.

2.2. Traveling Wave Solution for P∆E mKdV (O∆E mKdV)

In [13,25], a four-parameter family of mappings derived from the generalized P∆E mKdV in Equation (4) was studied. Note that a system of ordinary difference equations, O∆E mKdV, can be derived from Equation (4) via the restriction of traveling wave solution with
V l , m = V n , n = z 1 l + z 2 m ,
where z 1 and z 2 are relatively prime integers (see [26,27] for other applications). Substituting Equation (7) into Equation (4), the following discrete mapping can be obtained:
θ 1 V n V n + z 2 θ 2 V n + z 1 V n + z 1 + z 2 θ 3 V n V n + z 1 + θ 4 V n + z 2 V n + z 1 + z 2 = 0
The map in Equation (8) represents an infinite hierarchy of mappings labeled with z 1 and z 2 . For fixed z 1 and z 2 , Equation (8) is a mapping R z 1 + z 2   R z 1 + z 2 . In [24], for z 1 = 1 and z 2 = 2 , the map in Equation (8) has been found to possess several properties—for example, the (anti)measure-preserving property.
Consider the discrete mapping in Equation (8). Let z 1 = 1 and z 2 = 2 . This gives the following relation:
V n + 3 = V n ( θ 3 V n + 2 θ 1 V n + 1 ) ( θ 4 V n + 1 θ 2 V n + 2 ) .
The discrete Equation (9) can be written as follows:
V n + 2 = V n ( θ 3 V n + 2 θ 1 V n + 1 ) ( θ 4 V n + 1 θ 2 V n + 2 ) V n + 1 = V n + 2 V n = V n + 1
where the prime denotes the upshift.
If ζ n 0 = V n + 2 V n + 1 and ζ n 1 = V n + 1 V n , then Equation (10) can be written as
ζ n + 1 = h θ ( ζ n )
where
h θ : R 2 R 2 ( x , y ) ( 1 x y ( θ 3 x θ 1 ) ( θ 2 x θ 4 ) , x ) .
Let us assume that θ 2 is not equal to zero. If α = θ 1 θ 2 , β = θ 3 θ 2 = 1 , and λ = θ 4 θ 2 = 1 , then the following 2D map can be derived from Equation (11):
h α , 1 , 1 : R 2 R 2 ( x , y ) ( ( α x ) x y ( x 1 ) , x ) .
Furthermore, its integral normal form is (see [13] for other integral normal forms):
H ( x , y : α ) = α ( 1 x + 1 y ) + ( x + y ) ( 1 x y ) ( x y )
where α R . Thus, for all n N , the solution for Equation (12) lies in a level set of H ( x , y : α ) .
The mapping Equation (12) has several properties:
  • Integrable: The mapping h α , 1 , 1 has an integral Equation (13), H ( x , y : α ) = H ( ( α x ) x y ( x 1 ) , x : α ) . In other words, H ( x , y : α ) is evidently a constant of the mapping’s motion (the orbits of all points in the plane lie on the level sets given by H ( x , y : α ) = C where for any orbit is determined from the initial condition, i.e., C = H ( x 0 , y 0 : α ) .
  • Measure-preserving: The mapping h α , 1 , 1 is measure-preserving, i.e.,
    | D h α , 1 , 1 | = ρ ( x , y ) ρ ( ( α x ) x y ( x 1 ) , x )
    where
    ρ ( x , y ) = ( x + y ) ( x y ) 2 [ α H ( x , y : α ) ] 1 = 1 x   y
  • Reversible: There is exists a reversing symmetry G ( x , y ) = ( y , x ) such that G ° h α , 1 , 1 ° G 1 = h α , 1 , 1 1 . It’s means that h α , 1 , 1 is reversible ( h α , 1 , 1 ° G ° h α , 1 , 1 = G ). Note that the mapping G is an involution, i.e., G G = I d , and I d is identity mapping. The reversibility property ensures that then mapping is invertible.

2.3. Construction of a Two-Dimensional Linear Map (Case Study: Sine-Gordon Map)

Consider a partial discrete sine-Gordon equation on a two-dimensional lattice Z 2 is defined as follows (see [25,26] for the construction of a generalized sine-Gordon map):
θ 1 ( V l , m + 1 V l + 1 , m V l + 1 , m + 1 V l , m ) + θ 2 V l + 1 , m + 1 V l , m + 1 V l + 1 , m V l , m = θ 3
where V , θ 1 , θ 2 , θ 3 R . A travelling wave solution of Equation (14) was obtained by the ansatz equation (Equation (7)). Therefore, from Equation (14) we then obtained
θ 1 ( V n + z 2 V n + z 1 V n + z 1 + z 2 V n ) + θ 2 V n + z 1 + z 2 V n + z 2 V n + z 1 V n = θ 3  
Let us take z 1 = z 2 = 1 and choose θ 1 = μ θ 2 and θ 3 = λ θ 2 ; we then have the following equation
μ ( V n + 1 2 V n + 2 V n ) + ( V n V n + 1 2 V n + 2 ) = λ
Equation (16) is equivalent to the mapping
V 1 = ( λ μ V 1 2 ) V 0 ( V 1 2 μ ) V 1 = V 1 }
According to Equation (17), we denote by x the sequence in R 2 , which is defined as x = ( x 1 = V 1 , x 2 = V 0 ) . Therefore, a general mapping of the plane f : R 2 R 2 , which assigns a point x = ( x 1 , x 2 ) and an image point x = ( x 1 , x 2 ) , can be written as
x = f ( μ , λ ) ( x )
where
f ( μ , λ ) : R 2 R 2 ( x 1 , x 2 ) ( ( λ μ x 1 2 ) x 2 ( x 1 2 μ ) , x ) .
It is easy to check that the mapping (18) has such integrals as follows.
F ( μ , λ ) ( x 1 , x 2 ) = μ ( x 1 x 2 + x 2 x 1 ) ( x 1 x 2 + λ 1 x 1 x 2 ) .
For all n N , the solution of Equation (16) is on a level set of F ( μ , λ ) ( x 1 , x 2 ) .
Let us fix λ = 1 to obtain a special case of Equation (18)—namely,
f μ , 1 : ( x 1 , x 2 ) ( ( 1 μ x 1 2 ) x 2 ( x 1 2 μ ) , x 1 )
It is easy to check that the mapping in Equation (20) has the integral:
F ^ ( x 1 , x 2 ; μ ) = μ ( x 1 x 2 + x 2 x 1 ) ( x 1 x 2 + 1 x 1 x 2 )
The mapping in Equation (20) has several properties:
  • The mapping f μ , 1 has an integral equation (Equation (21)).
  • f μ , 1 is measure-preserving—i.e.,
    | D f μ , 1 | = ρ ( x 1 , x 2 ) ρ ( ( 1 μ x 1 2 ) x 2 ( x 1 2 μ ) , x 1 )
    where
    ρ ( x 1 , x 2 ) = ( x 1 + x 2 ) ( x 1 x 2 ) 2 [ μ F ^ ( x 1 , x 2 ; μ ) ] 1 = 1 x 1 x 2
  • There is a reversing symmetry G ( x 1 , x 2 ) = ( x 2 , x 1 ) such that G ° f μ , 1 ° G 1 = f μ , 1 1 (small circle denoting the symbol for composition). This means that f μ , 1 is reversible ( f μ , 1 ° G ° f μ , 1 = G ).
Note that one of the fixed points on the map is (1,1) [13,26]. Thus, a linear map can be constructed based on the map form in Equation (20) at a closed fixed point (1,1) for which the Jacobian matrix A is written as follows:
A = ( 2 ( μ 2 1 ) ( 1 μ ) 2 1 1 0 )
From Equation (20) and Equation (22), for μ R \ { 1 } , we have the following linear map:
( x 1 x 2 ) = ( 2 ( μ 2 1 ) ( 1 μ ) 2 1 1 0 ) ( x 1 x 2 )
Together with the two-dimensional ACM (2D ACM), Equation (23) becomes [2,4,5,9,28]:
( x 1 x 2 ) = ( 1 p q p q + 1 ) ( x 1 x 2 )
where p , q R .
The map described in Equation (23) and Equation (24) can be used for a cryptographic algorithm for a digital image. The maps will be used to change the pixel position of an image without eliminating any information from the image. Note that, due to the reversible map, for the decryption process, we can use the inverse of Equation (24) and the preimage of Equation (23).

2.4. Encryption Scheme for Image Cryptography Based on a Mapping: A Case Study Involving ACM and a 2D Linear Sine-Gordon Map

After developing a mathematical tool, an experiment can be carried out to see how different encryption results will differ using the previous sections mappings. In our experiments, an original image was selected by the authors.
Let us consider Lena plain image in Figure 2. Assume that this image is a private image that will be hidden.
An encryption–decryption scheme for this digital image based on the mappings of (23) and (24) can be constructed as a flow chart in Figure 3.
Based on the encryption algorithm (Figure 3a), the plain image in Figure 2 can be hidden by the following Algorithm 1:
Algorithm 1: encryption algorithm
Input:
I: PlainImage (* Figure 2 *);
Procedure 2DPlanarMap ( A 1 , A 2 , B 1 , B 2 : real, numits, dimimage: integer): real;
(* numits = number of iterations,
   A 1 , A 2 , B 1 , and B 2 are the entry of matrix coefficient described in Equation (24) *);
Begin
  For i = 1 to numits do
      For j = 1 to dimimage do
         Begin
           x ( i ) ( x 1 ( j ) , x 2 ( j ) ) ( A 1 x 1 ( j ) + A 2 x 2 ( j ) ) , ( B 1 x 1 ( j ) + B 2 x 2 ( j ) ) ;
          (* x is the map described in Equation (24) and
           x ( i ) = x ( x ( x ( x ( x numits   times ( ( A 1 x 1 ( j ) + A 2 x 2 ( j ) ) , ( B 1 x 1 ( j ) + B 2 x 2 ( j ) ) ) *)
      End {for j)
    End {for i};
End{2DPlanarMap }
Procedure Image_Transformation (2DPlanarMap:real, I: image): image;
    Begin
      Image_Transformation (I, 2DPlanarMap);
    End{Image_Transformation }
{Main Program}
Begin
Read(I);
dimimage Imagedimension(I);
Read ( A 1 , A 2 , B 1 , B 2 , numits);
cipherby2DPlanarMap Image_Transformation;
Write (cipherby2DPlanarMap);
End{Main}
Output:
chiperby2DPlanarMap: Cipher Image {Figures 4 and 8}
This encryption algorithm for hiding the plain image in Figure 2 in a cipher image is shown in Figures 4 and 8. In Figure 4, the cipher images are the diagrams of the results of the randomization of the original image pixels using a 2D ACM linear map from Equation (24) (Figure 4a) and the 2D sine-Gordon linear map from Equation (23) (Figure 4b). The key parameter values that must be kept secret are µ, p, q, and number of iterations of the map (N). The decryption process requires the same key parameters to retrieve the plain image. To obtain the cipher images based on 2D ACM, we used Equation (24) for { p , q } = { 0.75 , 1.25 } and Equation (23) for μ = 0.995 , respectively.
Note that the cipher images look similar, although they are actually different. To see these differences, pixel data correlations and covariances can be calculated (see Table 1).

3. Results and Discussion

3.1. Dynamics and Bifurcation of the Two-Dimensional mKdV Nonlinear Map

In [26], the dynamics and the bifurcations of the 2D sine-Gordon map in (Equation (20)) were studied. We observed an interesting local bifurcation of critical point in the system—namely, the period doubling bifurcation, where two period–2 points were created from a critical point. For the mapping of all values of μ R , we have four critical points: ( 1 , 1 ) , ( 1 , 1 ) , ( 1 , 1 ) , and ( 1 , 1 ) . When μ varies from positive to negative, these critical points change from a saddle type to an elliptic type. Then, we focused on dynamics and bifurcations of the 2-dimensional mKdV map.
Consider the two-dimensional mKdV map in Equation (12). The dynamics of mapping h α , 1 , 1 is contained in the level sets of H ( x , y : α ) . In Figure 5, Figure 6 and Figure 7, we have plotted a few of the level sets the function H ( x , y : α ) for various values of parameter α . We obtained a nonlocal bifurcation involving collision of homoclinic and heteroclinic connections between saddle type critical points (see Figure 6). Additionally, we obtained a change in stability of a critical point from a saddle type into an elliptic type.
Bifurcations. The word “bifurcation” refers to a sudden qualitative change in the nature of solutions that occurs as the parameter is varied. The bifurcation diagram shows many sudden qualitative changes in the attractor as well as in the periodic orbits [29].
Considering the level set diagrams in Figure 5, Figure 6 and Figure 7, when α varies, the critical points of H ( x , y : α ) change from an elliptic type to a saddle type. A known mechanism in the literature, for integrable systems, is through a Saddle-Center bifurcation, where one saddle point becomes degenerate, and breaks into three critical points: two saddles and one elliptic (or also known as center) point [26]. In the case of H ( x , y : α ) , the bifurcation diagram with respect to varying of α is shown in Figure 8. Note that the blue dots that spread out represent the chaotic region.
The Maximum Lyapunov Exponent: The chaotic behavior of a dynamical system is defined by its sensitiveness to initial conditions and unpredictability. The Lyapunov exponent (LE) is a quantitative measurement to determine the dynamical system’s chaotic behavior [30]. LE measures the degree of divergence between any two nearby trajectories of a dynamical system, stretching an orbit. The positive value of maximum LE shows exponential stretching of an orbit. Every chaotic system has at least one positive Lyapunov exponent to achieve chaotic behavior.
A multidimensional chaotic map with more than one LE, and if all the LEs are positive, then the dynamical systems possess hyperchaotic behavior. The hyperchaotic behavior is good for image encryption and it is very difficult for the attacker to predict the secret key [31]. For two-dimensional map ( x , y ) = ( f 1 ( x , y ) , f 2 ( x , y ) ) , in Equation (12) for example, we can calculate the maximum LE, λ max ( x 0 , y 0 ) at the point ( x 0 , y 0 ) by using the following formula [29]:
λ max ( x 0 , y 0 ) log ( η ( x 0 , y 0 ) + 4 ( κ ( x 0 , y 0 ) ) 2 + ( ϑ ( x 0 , y 0 ) ) 2 2 )
where
  • η = ( x f 1 ( x 0 , y 0 ) ) 2 + ( y f 1 ( x 0 , y 0 ) ) 2 + ( x f 2 ( x 0 , y 0 ) ) 2 + ( y f 2 ( x 0 , y 0 ) ) 2 ,
  • κ = ( x f 1 ( x 0 , y 0 ) ) 2 ( y f 1 ( x 0 , y 0 ) ) 2 + ( x f 2 ( x 0 , y 0 ) ) 2 ( y f 2 ( x 0 , y 0 ) ) 2 ,
  • ϑ = ( x f 1 ( x 0 , y 0 ) ) ( y f 1 ( x 0 , y 0 ) ) + ( x f 2 ( x 0 , y 0 ) ) ( y f 2 ( x 0 , y 0 ) ) .
Now, we can use λ max ( x 0 , y 0 ) to acquire the maximum LE for 2D nonlinear mKdV map in Equation (12). For α = 9.79 and the fixed point ( x * , y * ) = ( 2.5571 , 2.5571 ) , we have
η = 1 + ( ( 9.79 x ) ( 1 + x ) x 2 y ( 9.79 x ) ( 1 + x ) 2 x y 1 ( 1 + x ) x y ) 2 + ( 9.79 x ) 2 ( 1 + x ) 2 x 2 y 4 ,
κ = 1 + ( ( 9.79 x ) ( 1 + x ) x 2 y ( 9.79 x ) ( 1 + x ) 2 x y 1 ( 1 + x ) x y ) 2 ( 9.79 x ) 2 ( 1 + x ) 2 x 2 y 4 ,
ϑ = ( ( 9.79 x ) ( ( 9.79 x ) ( 1 + x ) x 2 y ( 9.79 x ) ( 1 + x ) 2 x y 1 ( 1 + x ) x y ) ( 1 + x ) x y 2 )
Substituting ( x , y ) = ( 2.5571 , 2.5571 ) , we get η = 2 . 55876 , κ =   2 . 1089 , and ϑ = 0 . 547745 . Finally, we have the maximum LE number is λ max ( x 0 = x * ) 0 . 451625   . Thus, the orbit of the mapping in Equation (12) is exponential stretching.

3.2. Two-Dimensional Linear Map Derived from a Nonlinear O∆E mKdV Map

An essential element in the construction of the linear system in Equation (12) is a fixed point. A fixed point can be obtained by finding the critical point of the integral function. The critical points of the integral in Equation (12) are the solutions of
1 + x 2 y x 2 y 2 y α x 2 y = 0
and
1 + x y 2 x 2 y 2 x α x y 2 = 0
After taking the difference between the two equations, we have a line y = x . By substituting these solutions into one of the equations, we have the following critical points that depend on α :
( x , y ) = { ( x i , y i ) , i = 1 , 2 , 3 , 4 , 5 , 6 }
where x 1 = y 1 = 1 α 2 1 2 α 2 + 4 α 3 + α 4 2 α , x 2 = y 2 = 1 α 2 + 1 2 α 2 + 4 α 3 + α 4 2 α , x 3 = y 3 = 1 4 1 2 1 4 2 3 ( 4 + α ) τ 1 τ 1 3 2 3 1 2 1 2 + 2 3 ( 4 + α ) τ 1 + τ 1 3 2 3 1 8 α 4 1 4 2 3 ( 4 + α ) τ 1 τ 1 3 2 3 , x 4 = y 4 = 1 4 1 2 1 4 2 3 ( 4 + α ) τ 1 τ 1 3 2 3 + 1 2 1 2 + 2 3 ( 4 + α ) τ 1 + τ 1 3 2 3 1 8 α 4 1 4 2 3 ( 4 + α ) τ 1 τ 1 3 2 3 , x 5 = y 5 = 1 4 + 1 2 1 4 2 3 ( 4 + α ) τ 1 τ 1 3 2 3 1 2 1 2 + 2 3 ( 4 + α ) τ 1 + τ 1 3 2 3 1 8 α 4 1 4 2 3 ( 4 + α ) τ 1 τ 1 3 2 3 , x 6 = y 6 = 1 4 + 1 2 1 4 2 3 ( 4 + α ) τ 1 τ 1 3 2 3 + 1 2 1 2 + 2 3 ( 4 + α ) τ 1 + τ 1 3 2 3 1 8 α 4 1 4 2 3 ( 4 + α ) τ 1 τ 1 3 2 3 , where τ 1 = ( 9 + 9 α 2 + 3 283 192 α 6 α 2 4 α 3 + 27 α 4 ) 1 / 3 .
Let I be an interval in R (finite). Assume that α I . For α = { 9.79 , 4.79 , 0.1249 } , we then have some fixed point values, as seen in Table 2.
To construct a linear map derived from the map in Equation (12) around a fixed point ( x * , y * ) , we can use the values of α in Table 2. Thus, a linear map can be constructed based on the Jacobian matrix A m K d V as follows:
ϑ = ( 9.79 x ) ( 9.79 x ( 1 + x ) x 2 y 9.79 x ( 1 + x ) 2 x y 1 ( 1 + x ) x y ) ( 1 + x ) x y 2
From Equation (12) and Equation (29), for ( x * ) y * ( x * 1 ) 0 , we have the following linear map:
( x y ) = ( 1 + x * ( α x * 2 ) ( x * ) 2 y * ( x * 1 ) 2 ( α x * 1 ) ( y * ) 2 x * ( x * 1 ) 1 0 ) ( x y )
For example, at α = 9.79 and the point ( x 6 , x 6 ) = ( 2.5571 , 2.5571 ) , we have a linear map—namely,
( x y ) = ( 1.68064 1 1 0 ) ( x y )
Once more, based on the encryption algorithm in Figure 3a, we used 2D linear mKdV map in Equation (31) to hide the plain image in Figure 2. Applying the linear map in Equation (31), we obtained the cipher image shown in Figure 9.
Note that we used the values of α = 9.79 , fixed point ( x * , y * ) = ( x 6 , y 6 ) = ( 2.5571 , 2.5571 ) , and number of iterations N = 110 to obtain the cipher image shown in Figure 9. They are key values that must be kept secret.
We have already seen that in Figure 6, Figure 7 and Figure 8, different values of the parameter may yield qualitatively different solutions. We are especially interested in the changing nature of solutions as the parameter is varied. To investigate such changes, we shall use the bifurcation diagram plot for all linear maps discussed in this article. Next, we will show the bifurcation diagrams for the 2D linear ACM in Equation (24), sine-Gordon in Equation (23), and mKdV map in Equation (31). These maps have ( 0 , 0 ) as a fixed point. Using Mathematica, the bifurcation diagrams around ( 0 , 0 ) can be obtained and are shown in Figure 10, Figure 11 and Figure 12.
For the bifurcation diagram in Figure 10, we fixed p = 0.75 and use a parameter q in bifurcation plots. First, we started with the bifurcation diagram where q [ 9 , 1 ] , with 300 steps; 200 is the number of the first iteration shown, 150 is the maximum number of iterations, and (0.01, 0.01) is the starting point of the iteration. The range in the vertical axis is set to (−0.02, −0.02). Zooming in, we acquired an interesting “net pattern”. The bifurcation values for the periodic solutions of periods 19 can be located precisely on this plot with around q ( 0 . 121 , 0 . 118 ) . In the same procedure, to produce the bifurcation diagrams in Figure 11, we used the parameter values of μ [ 2 , 2 ] in bifurcation plots. Zooming in, we acquired an interesting “net pattern”. The bifurcation values for the periodic solutions of periods 21 can be located precisely on this plot with around μ ( 0.1384 , 0.1365 ) . As for the 2D sine-Gordon map, to produce the bifurcation diagrams for the 2D mKdV map, as shown in Figure 12, we fixed a parameter μ * = ( α x p 2 ) x p + 1 x p 2   y p ( x p 1 ) 2 [ 2 , 2 ] in bifurcation plots. This gave us the same bifurcation diagrams as with the 2D sine-Gordon map.
Consider the LE λ max ( x 0 ) formula in Section 3.1. We can use the formula to obtain the LEs for the 2D linear ACM map, sine-Gordon map, and mKdV map and also the Lyapunov number LN ( x 0 ) that defined as the exponent of the LE, LN ( x 0 ) = e λ max ( x 0 ) , as shown in Table 3.
Based on Table 3, the 2D linear sine-Gordon map and the 2D linear mKdV map are chaotic systems.

3.3. Histogram, Covariance, and Correlation Computations Based on the Weighted Data in the Image Pixels

When considering cryptographic image data processing, there are two important tools used to analyze image processing—i.e., the gradient filter and the gradient orientation filter. The gradient filter provides an image corresponding to the image gradient’s magnitude and is computed using the discrete derivatives of a Gaussian of the pixel radius. Meanwhile, the gradient orientation filter provides an image corresponding to the local orientation that is parallel to the image gradient and is computed using the discrete derivatives of a Gaussian of the pixel radius, thus returning values between π 2 and π 2 [32].
The important analyses for image cryptography via encryption algorithms are the histogram, covariance, and correlation analyses. Histogram analysis is conducted to determine the pixel distribution. The distribution of an image’s pixel values prior to encryption is usually concentrated on the pixels’ highest space value. Therefore, the best encryption spreads the pixel values out over the pixel space. Another tool, the adjacent pixel correlation, was used to test the correlations between pairs of adjacent pixels.
Mathematica was used to produce the histogram distributions for the ACM encryption in Equation (24), 2D linear map in Equation (23), and 2D linear map in Equation (31). Four histogram distributions of the weighted data for the images shown in Figure 2, Figure 4 and Figure 9 are shown in Figure 13. There are clear differences between the histograms for the plain image and those for the cipher images.
Generally, the histograms generated by the cipher images have flat distributions (uniform). In contrast, the histogram generated by the plain image focuses on some space pixel values. The covariances and correlations for the image data for N = 110 iterations are shown in Table 4.

4. Conclusions

A 2D linear map derived from an O∆E mKdV equation was constructed. The 2D mKdV linear map can be used for the cryptographic encoding of an image. Based on the implementation of the encoding algorithm, a linear map derived from generalized sine-Gordon mapping can be used to secure a digital image. We compared three linear mappings—namely, the 2D Arnold’s cat map, 2D sine-Gordon linear map, and 2D mKdV linear map—in terms of their abilities to conceal an image. The comparison showed that the 2D mKdV linear map provided a very low correlation value compared to the other two mappings, which means that the 2D mKdV linear map provides a higher level of encryption. Nevertheless, we cannot conclude that the 2D mKdV linear map provides the best results under all conditions. However, this mapping’s decryption results can be tested using the concept of dilation and erosion operation, which is a crucial image processing algorithm. One method used in dilation and erosion operations is the quantum method (see [33] for details). Other than that, in the process of restoring the original image (decryption), we recommend that our proposed mappings be tested for resisting a certain degree of source noise pollution and effectively recover the original signal (see [9,34] for details). Further investigation is necessary.

Author Contributions

Conceptualization, L.Z. and A.A.; methodology, L.Z. and E.Y.; software, L.Z. and E.Y.; validation, L.Z., A.A. and E.Y.; formal analysis, L.Z.; investigation, L.Z. and E.Y.; resources, L.Z. and A.A.; data curation, L.Z.; writing—original draft preparation, L.Z.; writing—review and editing, L.Z. and A.A.; visualization, L.Z. and E.Y.; supervision, L.Z.; project administration, L.Z.; funding acquisition, A.A. All authors have read and agreed to the published version of the manuscript.

Funding

This research was funded by Directorate of Research and Community Services at Kemendikbud RI grant number 044/SP2H/LT/DRPM/2020 and the APC was funded by First Author.

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Acknowledgments

The authors would like to thank the Directorate of Research and Community Services at Kemendikbud RI for funding this research through Research Grant 044/SP2H/LT/DRPM/2020 and the Head of the Institute of Research and Community Services of Lampung University, who supported this research.

Conflicts of Interest

The authors confirm that they have no conflict of interest to declare.

References

  1. Elgamal, T. A public key cryptosystem and a signature scheme based on discrete logarithms. Lect. Notes Comput. Sci. (Incl. Subser. Lect. Notes Artif. Intell. Lect. Notes Bioinform.) 1985, 31, 10–18. [Google Scholar]
  2. Munir, R. Algoritma enkripsi selektif citra digital dalam Ranah frekuensi berbasis permutasi chaos (digital image selective encryption algorithm in frequency domain based on chaos permutation). J. Rekayasa Elektr. 2015, 10, 66–72. [Google Scholar]
  3. Hidayat, A.D.; Afrianto, I. Sistem kriptografi citra digital pada jaringan intranet menggunakan metode kombinasi chaos map dan teknik selektif (digital image cryptography system on intranet network using combination method of chaos map and selective techniques). J. Ultim. 2017, 9, 59–66. [Google Scholar] [CrossRef] [Green Version]
  4. Ronsen, P.; Halim, A.; Syahputra, I. Enkripsi citra digital menggunakan Arnold’s cat map dan nonlinear chaotic algorithm (digital image encryption using Arnold’s cat map and nonlinear chaotic algorithm). JSM STMIK Mikroskil 2014, 15, 61–71. [Google Scholar]
  5. Soleymani, A.; Nordin, J.; Sundararajan, E. A chaotic cryptosystem for images based on Henon and Arnold cat map. Sci. World J. 2014, 2014, 1–21. [Google Scholar] [CrossRef] [Green Version]
  6. Abbas, N.A. Image encryption based on independent component analysis and Arnold’s cat map. Egypt. Inform. J. 2016, 17, 139–146. [Google Scholar] [CrossRef] [Green Version]
  7. Revanna, C.R.; Keshavamurthy, C. A secure document image encryption using mixed chaotic system. Int. J. Appl. Eng. Res. 2017, 12, 8854–8865. [Google Scholar]
  8. Abaas, S.A.; Shibeeb, A.K. A new approach for video encryption based on modified AES algorithm. IOSR J. Comput. Eng. 2015, 17, 44–51. [Google Scholar]
  9. IEEE-Indonesia; Munir, R. Robustness Analysis of Selective Image Encryption Algorithm Based on Arnold Cat Map Permutation. In Proceedings of the 3rd Makassar International Conference on Electrical Engineering and Informatics (MICEEI), Makassar, Indonesia, 28 November–1 December 2012; pp. 1–5. [Google Scholar]
  10. Fu, C.; Chen, Z.; Zhao, W.; Jiang, H. A New Fast Color Image Encryption Scheme Using Chen Chaotic System. In Proceedings of the International Conference on Software Engineering, Artificial Intelligence, Kazanawa, Japan, 26–28 June 2017; Networking and Parallel/Distributed Computing (SNPD 2017): Los Alamitors, CA, USA, 2017; pp. 121–126. [Google Scholar]
  11. Abbadi, N.K.E.; Yahya, E.; Aladilee, A. Digital RGB Image Encryption Based on 2D Cat Map and Shadow Numbers. In Proceedings of the Annual Conference on New Trends in Information & Communications Technology Applications (NTICT 2017), Baghdad, Iraq, 7–9 March 2017; IEEE: Pistacaway, NJ, USA, 2017; pp. 162–167. [Google Scholar]
  12. Tan, Y.-F.; Guo, X.; Tan, W.-N. Reversible data hiding using reference points coding. In Proceedings of the 2017 IEEE 2nd Information Technology, Networking, Electronic and Automation Control Conference (ITNEC), Chengdu, China, 12–15 December 2017; pp. 55–59. [Google Scholar]
  13. Zakaria, L.; Notiragayu, N.; Nuryaman, A.; Suharsono, S. The integral normal form of a three-dimensional traveling wave solution mapping derived from generalized ∆∆-mKdV equation. Adv. Differ. Equ. Control Process. 2018, 19, 37–48. [Google Scholar] [CrossRef] [Green Version]
  14. Yuliani, E.; Zakaria, L. Asmiati A Two-Dimensional Map Derived From An Ordinary Difference Equation of mKdV and Its Properties. J. Phys. Conf. Ser. 2021, 1751, 012010. [Google Scholar] [CrossRef]
  15. Notiragayu, N.; Zakaria, L. The Implementation of Digital Text Coding Algorithm Through A Three Dimensional Mapping Derived from Generalized ΔΔ-mKdV Equation Using Mathematica. In Proceedings of the International Conference on Applied Sciences Mathematics and Informatics (ICASMI 2018), Bandar Lampung, Indonesia, 9–11 August 2018; Institute of Physics-UK: London, UK, 2019; Volume 1338, p. 7. [Google Scholar]
  16. Schief, W.K. Lattice geometry of the discrete darboux, KP, BKP, and CKP equations. Menelaus’ and Carnot’s theorems. J. Non-Linear Math. Phys. 2003, 10, 194–208. [Google Scholar] [CrossRef]
  17. Susanto, H.; Karjanto, N.; Zulkarnain; Nusantara, T.; Widjanarko, T. Soliton and breather splitting on star graphs from tricrystal josephson junctions. Symmetry 2019, 11, 271. [Google Scholar] [CrossRef] [Green Version]
  18. Ablowitz, M.J.; Ladik, J.F. Nonlinear differential-difference equations and Fourier analysis. J. Math. Phys. 1976, 17, 1011–1018. [Google Scholar] [CrossRef]
  19. Islam, S.; Khan, K.; Akbar, M.A. An analytical method for finding exact solutions of modified Korteweg–de Vries equation. Results Phys. 2015, 5, 131–135. [Google Scholar] [CrossRef] [Green Version]
  20. Das, A. Integrable Models (Work Scientific Lecture Notes in Physics); Work Scientific Publishing Co. Pte. Ltd.: Singapore, 1989; p. 30. [Google Scholar]
  21. Kou, X.; Zhang, D.J.; Shi, Y.; Zhao, S.L. Generating solutions to discrete Sine-Gordon equation from modified Backlund transformation. Commun. Theor. Phys. 2011, 55, 545–550. [Google Scholar] [CrossRef]
  22. der Kamp, P.H.V. Initial value problems for lattice equations. J. Phys. A Math. Theor. 2009, 42, 404–419. [Google Scholar] [CrossRef]
  23. Adler, V.; Bobenko, A.; Suris, Y. Classification of integrable equations on quad-graphs. The consistency approach. Commun. Math. Phys. 2003, 233, 513–543. [Google Scholar] [CrossRef] [Green Version]
  24. Hietarinta, J. Searching for CAC-maps. J. Nonlinear Math. Phys. 2005, 12, 223–230. [Google Scholar] [CrossRef]
  25. Zakaria, L.; Tuwankotta, J.M. Dynamics of A Re-Parametrization of A 2-Dimensional mapping derived from double discrete Sine-Gordon mapping. Int. J. Math. Eng. Manag. Sci. 2020, 5, 363–377. [Google Scholar] [CrossRef]
  26. Zakaria, L.; Tuwankotta, J.M. Dynamics and bifurcations in a two-dimensional map derived from a generalized\delta\delta-sine-gordon equation. Far East J. Dyn. Syst. 2016, 28, 165–194. [Google Scholar] [CrossRef]
  27. Quispel, G.; Capel, H.; Papageorgiou, V.; Nijhoff, F. Integrable mappings derived from soliton equations. Phys. A Stat. Mech. Its Appl. 1991, 173, 243–266. [Google Scholar] [CrossRef]
  28. Implementing Arnold’s Cat Map. Available online: https://mathematica.stackexchange.com/questions/164070/implementing-arnolds-cat-map (accessed on 22 July 2019).
  29. Kulenovic, M.R.S.; Merino, O. Discrete Dynamical Systems and Difference Equations with Mathematica; Chapman and Hall/CRC: Boca Raton, FL, USA, 2002. [Google Scholar]
  30. Mondal, B.; Behera, P.K.; Gangopadhyay, S. A secure image encryption scheme based on a novel 2D sine–cosine cross-chaotic (SC3) map. J. Real-Time Image Process. 2021, 18, 1–18. [Google Scholar] [CrossRef]
  31. Ali, M.; Saha, L. Local Lyapunov Exponents and characteristics of fixed/periodic points embedded within a chaotic attractor. J. Zhejiang Univ. A 2005, 6A, 296–304. [Google Scholar] [CrossRef]
  32. Mathematica Online: www. wolfram.com; Wolfram Research Inc.: Champaign, IL, USA, 2002.
  33. Ma, S.-Y.; Khalil, A.; Hajjdiab, H.; Eleuch, H. Quantum dilation and erosion. Appl. Sci. 2020, 10, 4040. [Google Scholar] [CrossRef]
  34. Yu, J.; Xie, Y.; Guo, S.; Zhou, Y.; Wang, E. Parallel encryzption of noisy images based on sequence generator and chaotic measurement matrix. Complexity 2020, 2020, 1–18. [Google Scholar] [CrossRef]
Figure 1. Simple quadrilateral (a) and simple cube (b).
Figure 1. Simple quadrilateral (a) and simple cube (b).
Algorithms 14 00124 g001
Figure 2. An example of an original (plain) image.
Figure 2. An example of an original (plain) image.
Algorithms 14 00124 g002
Figure 3. A flow chart for an encryption (a) and decryption (b) algorithm.
Figure 3. A flow chart for an encryption (a) and decryption (b) algorithm.
Algorithms 14 00124 g003
Figure 4. Cipher images after using Arnold’s Cat Map (ACM) (a) and sine-Gordon (b) map obtained from encrypting the original image in Figure 2 with Equation (24) and Equation (23).
Figure 4. Cipher images after using Arnold’s Cat Map (ACM) (a) and sine-Gordon (b) map obtained from encrypting the original image in Figure 2 with Equation (24) and Equation (23).
Algorithms 14 00124 g004
Figure 5. The level set of H ( x , y : α ) for α = 9.79 . The fixed point ( x 6 , x 6 ) = ( 2.5571 , 2.5571 ) is stable.
Figure 5. The level set of H ( x , y : α ) for α = 9.79 . The fixed point ( x 6 , x 6 ) = ( 2.5571 , 2.5571 ) is stable.
Algorithms 14 00124 g005
Figure 6. The level set of H ( x , y : α ) for α = 0.479 . The fixed point ( x 6 , x 6 ) = ( 2 . 1438 , 2 . 1438 ) is stable.
Figure 6. The level set of H ( x , y : α ) for α = 0.479 . The fixed point ( x 6 , x 6 ) = ( 2 . 1438 , 2 . 1438 ) is stable.
Algorithms 14 00124 g006
Figure 7. The level set of H ( x , y : α ) for α = 0.1249 . The fixed point ( x 6 , x 6 ) = ( 1.34332 , 1.34332 ) is unstable.
Figure 7. The level set of H ( x , y : α ) for α = 0.1249 . The fixed point ( x 6 , x 6 ) = ( 1.34332 , 1.34332 ) is unstable.
Algorithms 14 00124 g007
Figure 8. A bifurcation diagram of H ( x , y : α ) for x [ 3 , 3 ] and α [ 10 , 10 ] .
Figure 8. A bifurcation diagram of H ( x , y : α ) for x [ 3 , 3 ] and α [ 10 , 10 ] .
Algorithms 14 00124 g008
Figure 9. The cipher image obtained after using the 2D linear map in Equation (31) on the original image in Figure 2.
Figure 9. The cipher image obtained after using the 2D linear map in Equation (31) on the original image in Figure 2.
Algorithms 14 00124 g009
Figure 10. Two bifurcation diagrams and a Lyapunov exponent (LE) curve of the 2D ACM linear map in Equation (24) around fixed point ( x * , y * ) = ( 0 , 0 ) . (a) Bifurcation diagram for plotting q [ 9 , 1 ] . (b) Bifurcation diagram for zooming around q [ 0 . 13 ,   0 . 117 ] .
Figure 10. Two bifurcation diagrams and a Lyapunov exponent (LE) curve of the 2D ACM linear map in Equation (24) around fixed point ( x * , y * ) = ( 0 , 0 ) . (a) Bifurcation diagram for plotting q [ 9 , 1 ] . (b) Bifurcation diagram for zooming around q [ 0 . 13 ,   0 . 117 ] .
Algorithms 14 00124 g010
Figure 11. Two bifurcation diagrams of the 2D sine-Gordon linear map in Equation (23) around fixed point ( x * , y * ) = ( 0 , 0 ) . (a) Bifurcation diagram for plotting μ [ 2 , 2 ] . (b) Bifurcation diagram for zooming around μ [ 0.012 ,   0.012 ] .
Figure 11. Two bifurcation diagrams of the 2D sine-Gordon linear map in Equation (23) around fixed point ( x * , y * ) = ( 0 , 0 ) . (a) Bifurcation diagram for plotting μ [ 2 , 2 ] . (b) Bifurcation diagram for zooming around μ [ 0.012 ,   0.012 ] .
Algorithms 14 00124 g011
Figure 12. Two bifurcation diagrams of the 2D mKdV linear map in Equation (22) around fixed point ( x * , y * ) = ( 0 , 0 ) . (a) Bifurcation diagram for plotting μ * [ 2 , 2 ] . (b) Bifurcation diagram for blowing up around μ * [ 0.012 , 0.012 ] .
Figure 12. Two bifurcation diagrams of the 2D mKdV linear map in Equation (22) around fixed point ( x * , y * ) = ( 0 , 0 ) . (a) Bifurcation diagram for plotting μ * [ 2 , 2 ] . (b) Bifurcation diagram for blowing up around μ * [ 0.012 , 0.012 ] .
Algorithms 14 00124 g012
Figure 13. Histogram distributions based on weighted data: (a) Distribution of the plain image (before encryption). (b) Distribution of the cipher image after encryption with ACM in Equation (24). (c) Distribution of the cipher image after encryption with the 2D linear map in Equation (23). (d) Distribution of the cipher image after encryption with the 2D linear map in Equation (31).
Figure 13. Histogram distributions based on weighted data: (a) Distribution of the plain image (before encryption). (b) Distribution of the cipher image after encryption with ACM in Equation (24). (c) Distribution of the cipher image after encryption with the 2D linear map in Equation (23). (d) Distribution of the cipher image after encryption with the 2D linear map in Equation (31).
Algorithms 14 00124 g013
Table 1. The computation of the covariances and correlations of the image data based on the weighted data (gradient orientation filter, gradient filter) for the images.
Table 1. The computation of the covariances and correlations of the image data based on the weighted data (gradient orientation filter, gradient filter) for the images.
CovarianceCorrelation
Plain Image (Figure 2)0.0009196900.024302828
Cipher Image Generated by Equation (24) (Figure 4a)−0.000001413−0.000078930
Cipher Image Generated by Equation (23) (Figure 4b)0.0000052780.000295260
Table 2. The relationship between the parameter values and fixed points for three values of α.
Table 2. The relationship between the parameter values and fixed points for three values of α.
No.αFix PointFixed Point Positions
1. α = 9.79 ( x 1 x 2 x 5 x 6 , y 1 > 0 , y 2 > 0 , y 5 < 0 , y 6 > 0 ) ( x 1 x 2 x 5 x 6 ) = ( y 1 y 2 y 5 y 6 ) = ( 8.54172 1.14614 0.102025 2.55707 )
2. α = 4.79 ( x 1 x 2 x 5 x 6 , y 1 > 0 , y 2 > 0 , y 5 < 0 , y 6 > 0 ) ( x 1 x 2 x 5 x 6 ) = ( y 1 y 2 y 5 y 6 ) = ( 2.96658 1.61466 0.206549 2.14377 )
3. α = 0.1249 ( x 1 x 2 x 5 x 6 , y 1 < 0 , y 2 > 0 , y 5 < 0 , y 6 > 0 ) ( x 1 x 2 x 5 x 6 ) = ( y 1 y 2 y 5 y 6 ) = ( 0.0158155 7.89732 0.843271 1.34332 )
Table 3. The LE number and LN number for the 2D linear ACM map (Equation (24)), the 2D linear sine-Gordon map (Equation (23)), and the 2D linear mKdV map (Equation (31)) closed fixed points ( x * , y * ) = ( 0 , 0 ) .
Table 3. The LE number and LN number for the 2D linear ACM map (Equation (24)), the 2D linear sine-Gordon map (Equation (23)), and the 2D linear mKdV map (Equation (31)) closed fixed points ( x * , y * ) = ( 0 , 0 ) .
No.2D Linear Map ( x 0 , y 0 ) LE: λ max ( x 0 ) LN: e λ max ( x 0 )
1.ACM(0.001, 0.001)0.95331171892.59428699560
2.sine-Gordon(0.001, 0.001)6.6821101678798.001253131
3.mKdV(0.001, 0.001)0.76384556832.14651493883
Table 4. The covariances and correlations of the image data based on the weighted data (gradient orientation filter, gradient filter) of the image for N = 110 iterations.
Table 4. The covariances and correlations of the image data based on the weighted data (gradient orientation filter, gradient filter) of the image for N = 110 iterations.
CovarianceCorrelation
Plain Image0.0010480700.01704610
Cipher Image Generated by Equation (24) 0.0002029340.00928261
Cipher Image Generated by Equation (23)0.0000422650.00187458
Cipher Image Generated by Equation (31)−0.00000098−0.00041965
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Share and Cite

MDPI and ACS Style

Zakaria, L.; Yuliani, E.; Asmiati, A. A Two-Dimensional mKdV Linear Map and Its Application in Digital Image Cryptography. Algorithms 2021, 14, 124. https://doi.org/10.3390/a14040124

AMA Style

Zakaria L, Yuliani E, Asmiati A. A Two-Dimensional mKdV Linear Map and Its Application in Digital Image Cryptography. Algorithms. 2021; 14(4):124. https://doi.org/10.3390/a14040124

Chicago/Turabian Style

Zakaria, La, Endah Yuliani, and Asmiati Asmiati. 2021. "A Two-Dimensional mKdV Linear Map and Its Application in Digital Image Cryptography" Algorithms 14, no. 4: 124. https://doi.org/10.3390/a14040124

APA Style

Zakaria, L., Yuliani, E., & Asmiati, A. (2021). A Two-Dimensional mKdV Linear Map and Its Application in Digital Image Cryptography. Algorithms, 14(4), 124. https://doi.org/10.3390/a14040124

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop