Sign in to use this feature.

Years

Between: -

Subjects

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Journals

Article Types

Countries / Regions

Search Results (5)

Search Parameters:
Keywords = digital Henon map

Order results
Result details
Results per page
Select all
Export citation of selected articles as:
30 pages, 5036 KB  
Article
Chaotic Hénon–Logistic Map Integration: A Powerful Approach for Safeguarding Digital Images
by Abeer Al-Hyari, Mua’ad Abu-Faraj, Charlie Obimbo and Moutaz Alazab
J. Cybersecur. Priv. 2025, 5(1), 8; https://doi.org/10.3390/jcp5010008 - 18 Feb 2025
Cited by 2 | Viewed by 2672
Abstract
This paper presents an integrated chaos-based algorithm for image encryption that combines the chaotic Hénon map and chaotic logistic map (CLM) to enhance the security of digital image communication. The proposed method leverages chaos theory to generate cryptographic keys, utilizing a 1D key [...] Read more.
This paper presents an integrated chaos-based algorithm for image encryption that combines the chaotic Hénon map and chaotic logistic map (CLM) to enhance the security of digital image communication. The proposed method leverages chaos theory to generate cryptographic keys, utilizing a 1D key from the logistic map generator and a 2D key from the chaotic Hénon map generator. These chaotic maps produce highly unpredictable and complex keys essential for robust encryption. Extensive experiments demonstrate the algorithm’s resilience against various attacks, including chosen-plaintext, noise, clipping, occlusion, and known-plaintext attacks. Performance evaluation in terms of encryption time, throughput, and image quality metrics validates the effectiveness of the proposed integrated approach. The results indicate that the chaotic Hénon–logistic map integration provides a powerful and secure method for safeguarding digital images during transmission and storage with a key space that reaches up to 2200. Moreover, the algorithm has potential applications in secure image sharing, cloud storage, and digital forensics, inspiring new possibilities. Full article
(This article belongs to the Special Issue Cybersecurity in the Age of AI and IoT: Challenges and Innovations)
Show Figures

Figure 1

15 pages, 4965 KB  
Article
Symmetric Pseudo-Multi-Scroll Attractor and Its Application in Mobile Robot Path Planning
by Yongxin Li, Chunbiao Li, Wanning Yu, Tengfei Lei and Rita Yi Man Li
Symmetry 2024, 16(7), 868; https://doi.org/10.3390/sym16070868 - 9 Jul 2024
Cited by 2 | Viewed by 1267
Abstract
The symmetric multi-scroll strange attractor has shown great potential in chaos-based applications due to its high complexity in phase space. Here, the approach of symmetrization is employed for attractor doubling to generate pseudo-multi-scroll attractors in a discrete map, where a carefully selected offset [...] Read more.
The symmetric multi-scroll strange attractor has shown great potential in chaos-based applications due to its high complexity in phase space. Here, the approach of symmetrization is employed for attractor doubling to generate pseudo-multi-scroll attractors in a discrete map, where a carefully selected offset constant is the key to organizing coexisting attractors. By choosing the Hénon map to generate the pseudo-multi-scroll attractor and implementing the digital circuit on a microcontroller, this study fills a significant gap in the research on discrete chaotic systems. The complexity performance is further validated using a pseudo-random number generator, demonstrating substantial academic contributions to the field of chaos theory. Additionally, a pseudo-multi-scroll attractor-based squirrel search algorithm is first developed, showcasing its practical application in mobile robot path planning. This work not only advances the theoretical understanding of chaotic systems but also provides practical methods for implementation in digital systems, offering valuable insights for policy-making in advanced robotic systems and intelligent manufacturing. Full article
(This article belongs to the Section Computer)
Show Figures

Figure 1

17 pages, 3033 KB  
Article
An Effective Color Image Encryption Based on Henon Map, Tent Chaotic Map, and Orthogonal Matrices
by Shamsa Kanwal, Saba Inam, Mohamed Tahar Ben Othman, Ayesha Waqar, Muhammad Ibrahim, Fariha Nawaz, Zainab Nawaz and Habib Hamam
Sensors 2022, 22(12), 4359; https://doi.org/10.3390/s22124359 - 8 Jun 2022
Cited by 39 | Viewed by 4472
Abstract
In the last decade, the communication of images through the internet has increased. Due to the growing demands for data transfer through images, protection of data and safe communication is very important. For this purpose, many encryption techniques have been designed and developed. [...] Read more.
In the last decade, the communication of images through the internet has increased. Due to the growing demands for data transfer through images, protection of data and safe communication is very important. For this purpose, many encryption techniques have been designed and developed. New and secured encryption schemes based on chaos theory have introduced methods for secure as well as fast communication. A modified image encryption process is proposed in this work with chaotic maps and orthogonal matrix in Hill cipher. Image encryption involves three phases. In the first phase, a chaotic Henon map is used for permuting the digital image. In the second phase, a Hill cipher is used whose encryption key is generated by an orthogonal matrix which further is produced from the equation of the plane. In the third phase, a sequence is generated by a chaotic tent map which is later XORed. Chaotic maps play an important role in the encryption process. To deal with the issues of fast and highly secured image processing, the prominent properties of non-periodical movement and non-convergence of chaotic theory play an important role. The proposed scheme is resistant to different attacks on the cipher image. Different tests have been applied to evaluate the proposed technique. The results of the tests such as key space analysis, key sensitivity analysis, and information entropy, histogram correlation of the adjacent pixels, number of pixel change rate (NPCR), peak signal to noise ratio (PSNR), and unified average changing intensity (UCAI) showed that our proposed scheme is an efficient encryption technique. The proposed approach is also compared with some state-of-the-art image encryption techniques. In the view of statistical analysis, we claim that our proposed encryption algorithm is secured. Full article
Show Figures

Figure 1

13 pages, 645 KB  
Article
Strengthening Quality of Chaotic Bit Sequences
by Michal Melosik and Wieslaw Marszalek
Electronics 2022, 11(2), 272; https://doi.org/10.3390/electronics11020272 - 15 Jan 2022
Cited by 3 | Viewed by 2528
Abstract
We discuss chaos and its quality as measured through the 0-1 test for chaos. When the 0-1 test indicates deteriorating quality of chaos, because of the finite precision representations of real numbers in digital implementations, then the process may eventually lead to a [...] Read more.
We discuss chaos and its quality as measured through the 0-1 test for chaos. When the 0-1 test indicates deteriorating quality of chaos, because of the finite precision representations of real numbers in digital implementations, then the process may eventually lead to a periodic sequence. A simple method for improving the quality of a chaotic signal is to mix the signal with another signal by using the XOR operation. In this paper, such mixing of weak chaotic signals is considered, yielding new signals with improved quality (with K values from the 0-1 test close to 1). In some sense, such a mixing of signals could be considered as a two-layer prevention strategy to maintain chaos. That fact may be important in those applications when the hardware resources are limited. The 0-1 test is used to show the improved chaotic behavior in the case when a continuous signal (for example, from the Chua, Rössler or Lorenz system) intermingles with a discrete signal (for example, from the logistic, Tinkerbell or Henon map). The analysis is presented for chaotic bit sequences. Our approach can further lead to hardware applications, and possibly, to improvements in the design of chaotic bit generators. Several illustrative examples are included. Full article
Show Figures

Figure 1

17 pages, 1494 KB  
Article
An Error Compensation Method for Improving the Properties of a Digital Henon Map Based on the Generalized Mean Value Theorem of Differentiation
by Yashuang Deng and Yuhui Shi
Entropy 2021, 23(12), 1628; https://doi.org/10.3390/e23121628 - 2 Dec 2021
Viewed by 2693
Abstract
Continuous chaos may collapse in the digital world. This study proposes a method of error compensation for a two-dimensional digital system based on the generalized mean value theorem of differentiation that can restore the fundamental performance of chaotic systems. Different from other methods, [...] Read more.
Continuous chaos may collapse in the digital world. This study proposes a method of error compensation for a two-dimensional digital system based on the generalized mean value theorem of differentiation that can restore the fundamental performance of chaotic systems. Different from other methods, the compensation sequence of our method comes from the chaotic system itself and can be applied to higher-dimensional digital chaotic systems. The experimental results show that the improved system is highly consistent with the real chaotic system, and it has excellent chaotic characteristics such as high complexity, randomness, and ergodicity. Full article
Show Figures

Figure 1

Back to TopTop