Sign in to use this feature.

Years

Between: -

Subjects

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Journals

Article Types

Countries / Regions

Search Results (5)

Search Parameters:
Keywords = 3D infinite collapse map

Order results
Result details
Results per page
Select all
Export citation of selected articles as:
19 pages, 735 KB  
Article
The New Four-Dimensional Fractional Chaotic Map with Constant and Variable-Order: Chaos, Control and Synchronization
by Tareq Hamadneh, Souad Bensid Ahmed, Hassan Al-Tarawneh, Omar Alsayyed, Gharib Mousa Gharib, Maha S. Al Soudi, Abderrahmane Abbes and Adel Ouannas
Mathematics 2023, 11(20), 4332; https://doi.org/10.3390/math11204332 - 18 Oct 2023
Cited by 6 | Viewed by 1701
Abstract
Using fractional difference equations to describe fractional and variable-order maps, this manuscript discusses the dynamics of the discrete 4D sinusoidal feedback sine iterative chaotic map with infinite collapse (ICMIC) modulation map (SF-SIMM) with fractional-order. Also, it presents a novel variable-order version of SF-SIMM [...] Read more.
Using fractional difference equations to describe fractional and variable-order maps, this manuscript discusses the dynamics of the discrete 4D sinusoidal feedback sine iterative chaotic map with infinite collapse (ICMIC) modulation map (SF-SIMM) with fractional-order. Also, it presents a novel variable-order version of SF-SIMM and discusses their chaotic dynamic behavior by employing a distinct function for the variable fractional-order. To establish the existence of chaos in the suggested discrete SF-SIMM, some numerical methods such as phase plots, bifurcation and largest Lyapunov exponent diagrams, C0 complexity and 0–1 test are utilized. After that, two different control schemes are used for the conceived discrete system. The states are stabilized and asymptotically forced towards zero by the first controller. The second controller is used to synchronize a pair of maps with non–identical parameters. Finally, MATLAB simulations will be executed to confirm the results provided. Full article
(This article belongs to the Special Issue Advances in Chaos Theory and Dynamical Systems)
Show Figures

Figure 1

16 pages, 8701 KB  
Article
A Joint Encryption and Compression Algorithm for Multiband Remote Sensing Image Transmission
by Weijia Cao, Xiaoran Leng, Tao Yu, Xingfa Gu and Qiyue Liu
Sensors 2023, 23(17), 7600; https://doi.org/10.3390/s23177600 - 1 Sep 2023
Cited by 10 | Viewed by 2254
Abstract
Due to the increasing capabilities of cybercriminals and the vast quantity of sensitive data, it is necessary to protect remote sensing images during data transmission with “Belt and Road” countries. Joint image compression and encryption techniques exhibit reliability and cost-effectiveness for data transmission. [...] Read more.
Due to the increasing capabilities of cybercriminals and the vast quantity of sensitive data, it is necessary to protect remote sensing images during data transmission with “Belt and Road” countries. Joint image compression and encryption techniques exhibit reliability and cost-effectiveness for data transmission. However, the existing methods for multiband remote sensing images have limitations, such as extensive preprocessing times, incompatibility with multiple bands, and insufficient security. To address the aforementioned issues, we propose a joint encryption and compression algorithm (JECA) for multiband remote sensing images, including a preprocessing encryption stage, crypto-compression stage, and decoding stage. In the first stage, multiple bands from an input image can be spliced together in order from left to right to generate a grayscale image, which is then scrambled at the block level by a chaotic system. In the second stage, we encrypt the DC coefficient and AC coefficient. In the final stage, we first decrypt the DC coefficient and AC coefficient, and then restore the out-of-order block through the chaotic system to get the correct grayscale image. Finally, we postprocess the grayscale image and reconstruct it into a remote sensing image. The experimental results show that JECA can reduce the preprocessing time of the sender by 50% compared to existing joint encryption and compression methods. It is also compatible with multiband remote sensing images. Furthermore, JECA improves security while maintaining the same compression ratio as existing methods, especially in terms of visual security and key sensitivity. Full article
Show Figures

Figure 1

25 pages, 3245 KB  
Article
Security Analysis of the Image Encryption Algorithm Based on a Two-Dimensional Infinite Collapse Map
by Guanwen Shi, Simin Yu and Qianxue Wang
Entropy 2022, 24(8), 1023; https://doi.org/10.3390/e24081023 - 25 Jul 2022
Cited by 7 | Viewed by 2274
Abstract
This paper analyzes the security of the image encryption algorithm based on a two-dimensional (2D) infinite collapse map. The encryption algorithm adopts a permutation–diffusion structure and can perform two or more rounds to achieve a higher level of security. By cryptanalysis, it is [...] Read more.
This paper analyzes the security of the image encryption algorithm based on a two-dimensional (2D) infinite collapse map. The encryption algorithm adopts a permutation–diffusion structure and can perform two or more rounds to achieve a higher level of security. By cryptanalysis, it is found that the original diffusion process can be split into a permutation–diffusion structure, which comes after the original permutation, so these two permutations can be merged into one. Then, some theorems about round-down operation are summarized, and the encryption and decryption equations in the diffusion process are deduced and simplified accordingly. Since the chaotic sequences used in encryption algorithm are independent of the plaintext and ciphertext, there are equivalent keys. The original encryption algorithm with single-round, two-round, and multi-round of permutation–diffusion processes is cracked, and the data complexity of the cryptanalysis attacks is analyzed. Numerical simulation is carried out by MATLAB, and the experimental results and theoretical analysis show the effectiveness of the cryptanalysis attacks. Finally, some suggestions for improvement are given to overcome the shortcomings of the original encryption algorithm. Full article
(This article belongs to the Special Issue Computational Imaging and Image Encryption with Entropy)
Show Figures

Figure 1

16 pages, 7861 KB  
Article
A Three-Dimensional Infinite Collapse Map with Image Encryption
by Wenhao Yan, Zijing Jiang, Xin Huang and Qun Ding
Entropy 2021, 23(9), 1221; https://doi.org/10.3390/e23091221 - 17 Sep 2021
Cited by 9 | Viewed by 2763
Abstract
Chaos is considered as a natural candidate for encryption systems owing to its sensitivity to initial values and unpredictability of its orbit. However, some encryption schemes based on low-dimensional chaotic systems exhibit various security defects due to their relatively simple dynamic characteristics. In [...] Read more.
Chaos is considered as a natural candidate for encryption systems owing to its sensitivity to initial values and unpredictability of its orbit. However, some encryption schemes based on low-dimensional chaotic systems exhibit various security defects due to their relatively simple dynamic characteristics. In order to enhance the dynamic behaviors of chaotic maps, a novel 3D infinite collapse map (3D-ICM) is proposed, and the performance of the chaotic system is analyzed from three aspects: a phase diagram, the Lyapunov exponent, and Sample Entropy. The results show that the chaotic system has complex chaotic behavior and high complexity. Furthermore, an image encryption scheme based on 3D-ICM is presented, whose security analysis indicates that the proposed image encryption scheme can resist violent attacks, correlation analysis, and differential attacks, so it has a higher security level. Full article
Show Figures

Figure 1

17 pages, 14832 KB  
Article
A New Hyperchaotic Map for a Secure Communication Scheme with an Experimental Realization
by Nadia M. G. Al-Saidi, Dhurgham Younus, Hayder Natiq, M. R. K. Ariffin, M. A. Asbullah and Z. Mahad
Symmetry 2020, 12(11), 1881; https://doi.org/10.3390/sym12111881 - 15 Nov 2020
Cited by 24 | Viewed by 2907
Abstract
Using different chaotic systems in secure communication, nonlinear control, and many other applications has revealed that these systems have several drawbacks in different aspects. This can cause unfavorable effects to chaos-based applications. Therefore, presenting a chaotic map with complex behaviors is considered important. [...] Read more.
Using different chaotic systems in secure communication, nonlinear control, and many other applications has revealed that these systems have several drawbacks in different aspects. This can cause unfavorable effects to chaos-based applications. Therefore, presenting a chaotic map with complex behaviors is considered important. In this paper, we introduce a new 2D chaotic map, namely, the 2D infinite-collapse-Sine model (2D-ICSM). Various metrics including Lyapunov exponents and bifurcation diagrams are used to demonstrate the complex dynamics and robust hyperchaotic behavior of the 2D-ICSM. Furthermore, the cross-correlation coefficient, phase space diagram, and Sample Entropy algorithm prove that the 2D-ICSM has a high sensitivity to initial values and parameters, extreme complexity performance, and a much larger hyperchaotic range than existing maps. To empirically verify the efficiency and simplicity of the 2D-ICSM in practical applications, we propose a symmetric secure communication system using the 2D-ICSM. Experimental results are presented to demonstrate the validity of the proposed system. Full article
(This article belongs to the Special Issue Symmetry in Chaotic Systems and Circuits)
Show Figures

Figure 1

Back to TopTop