Sign in to use this feature.

Years

Between: -

Subjects

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Journals

Article Types

Countries / Regions

Search Results (6)

Search Parameters:
Keywords = non-degenerate chaotic system

Order results
Result details
Results per page
Select all
Export citation of selected articles as:
23 pages, 16115 KiB  
Article
Image Privacy Protection Communication Scheme by Fibonacci Interleaved Diffusion and Non-Degenerate Discrete Chaos
by Zhiyu Xie, Weihong Xie, Xiyuan Cheng, Zhengqin Yuan, Wenbin Cheng and Yiting Lin
Entropy 2025, 27(8), 790; https://doi.org/10.3390/e27080790 - 25 Jul 2025
Viewed by 135
Abstract
The rapid development of network communication technology has led to an increased focus on the security of image storage and transmission in multimedia information. This paper proposes an enhanced image security communication scheme based on Fibonacci interleaved diffusion and non-degenerate chaotic system to [...] Read more.
The rapid development of network communication technology has led to an increased focus on the security of image storage and transmission in multimedia information. This paper proposes an enhanced image security communication scheme based on Fibonacci interleaved diffusion and non-degenerate chaotic system to address the inadequacy of current image encryption technology. The scheme utilizes a hash function to extract the hash characteristic values of the plaintext image, generating initial perturbation keys to drive the chaotic system to generate initial pseudo-random sequences. Subsequently, the input image is subjected to a light scrambling process at the bit level. The Q matrix generated by the Fibonacci sequence is then employed to diffuse the obtained intermediate cipher image. The final ciphertext image is then generated by random direction confusion. Throughout the encryption process, plaintext correlation mechanisms are employed. Consequently, due to the feedback loop of the plaintext, this algorithm is capable of resisting known-plaintext attacks and chosen-plaintext attacks. Theoretical analysis and empirical results demonstrate that the algorithm fulfils the cryptographic requirements of confusion, diffusion, and avalanche effects, while also exhibiting a robust password space and excellent numerical statistical properties. Consequently, the security enhancement mechanism based on Fibonacci interleaved diffusion and non-degenerate chaotic system proposed in this paper effectively enhances the algorithm’s resistance to cryptographic attacks. Full article
Show Figures

Figure 1

16 pages, 4720 KiB  
Article
Dynamics of a New Four-Thirds-Degree Sub-Quadratic Lorenz-like System
by Guiyao Ke, Jun Pan, Feiyu Hu and Haijun Wang
Axioms 2024, 13(9), 625; https://doi.org/10.3390/axioms13090625 - 12 Sep 2024
Cited by 4 | Viewed by 852
Abstract
Aiming to explore the subtle connection between the number of nonlinear terms in Lorenz-like systems and hidden attractors, this paper introduces a new simple sub-quadratic four-thirds-degree Lorenz-like system, where x˙=a(yx), [...] Read more.
Aiming to explore the subtle connection between the number of nonlinear terms in Lorenz-like systems and hidden attractors, this paper introduces a new simple sub-quadratic four-thirds-degree Lorenz-like system, where x˙=a(yx), y˙=cxx3z, z˙=bz+x3y, and uncovers the following property of these systems: decreasing the powers of the nonlinear terms in a quadratic Lorenz-like system where x˙=a(yx), y˙=cxxz, z˙=bz+xy, may narrow, or even eliminate the range of the parameter c for hidden attractors, but enlarge it for self-excited attractors. By combining numerical simulation, stability and bifurcation theory, most of the important dynamics of the Lorenz system family are revealed, including self-excited Lorenz-like attractors, Hopf bifurcation and generic pitchfork bifurcation at the origin, singularly degenerate heteroclinic cycles, degenerate pitchfork bifurcation at non-isolated equilibria, invariant algebraic surface, heteroclinic orbits and so on. The obtained results may verify the generalization of the second part of the celebrated Hilbert’s sixteenth problem to some degree, showing that the number and mutual disposition of attractors and repellers may depend on the degree of chaotic multidimensional dynamical systems. Full article
(This article belongs to the Section Mathematical Analysis)
Show Figures

Figure 1

28 pages, 51104 KiB  
Article
N-Dimensional Non-Degenerate Chaos Based on Two-Parameter Gain with Application to Hash Function
by Xu Dai, Xiaotong Wang, Haotong Han and Erfu Wang
Electronics 2024, 13(13), 2627; https://doi.org/10.3390/electronics13132627 - 4 Jul 2024
Cited by 5 | Viewed by 1555
Abstract
The Lyapunov exponent serves as a measure of the average divergence or convergence between chaotic trajectories from the perspective of Lyapunov exponents (LEs). Chaotic systems with more and larger positive LEs have more complex dynamical behavior and can weaken the degeneration of digital [...] Read more.
The Lyapunov exponent serves as a measure of the average divergence or convergence between chaotic trajectories from the perspective of Lyapunov exponents (LEs). Chaotic systems with more and larger positive LEs have more complex dynamical behavior and can weaken the degeneration of digital chaos. Some existing control algorithms for chaos need more and larger preset parameters, which are not favorable for practical application; others require the original system to satisfy specific conditions, which lack generality. To address the deficiencies of these algorithms, this paper proposes a construction algorithm of N-dimensional discrete non-degenerate chaos based on two-parameter gain (ND-NCTG), which can realize the non-degenerate or non-chaotic control of chaotic systems by only two control parameters. We take a 3D chaotic system as an example and analyze the relationship between control parameters and LEs, as well as the characteristics of chaotic sequences, to verify the effectiveness and reliability of the algorithm. In addition, since the initial value sensitivity of the chaotic system coincides with the sensitivity in input information for the hash function, this paper takes the proposed chaotic construction algorithm as the basis to design a bidirectional diffusion chaotic hash function. The effectiveness and security of this hash algorithm are verified by sensitivity, statistical distribution and collision analysis. Compared with similar algorithms, both the non-degenerate chaotic construction algorithm and the hash function algorithm proposed in this paper have better performance and can meet the application requirements of secure communication. Full article
(This article belongs to the Special Issue Nonlinear Circuits and Systems: Latest Advances and Prospects)
Show Figures

Figure 1

25 pages, 6019 KiB  
Article
Chaos of the Six-Dimensional Non-Autonomous System for the Circular Mesh Antenna
by Ying Sun, Jingyi Liu, Junhua Zhang, Aiwen Wang and Fei Mao
Mathematics 2022, 10(23), 4454; https://doi.org/10.3390/math10234454 - 25 Nov 2022
Viewed by 1454
Abstract
In the process of aerospace service, circular mesh antennas generate large nonlinear vibrations under an alternating thermal load. In this paper, the Smale horseshoe and Shilnikov-type multi-pulse chaotic motions of the six-dimensional non-autonomous system for circular mesh antennas are first investigated. The Poincare [...] Read more.
In the process of aerospace service, circular mesh antennas generate large nonlinear vibrations under an alternating thermal load. In this paper, the Smale horseshoe and Shilnikov-type multi-pulse chaotic motions of the six-dimensional non-autonomous system for circular mesh antennas are first investigated. The Poincare map is generalized and applied to the six-dimensional non-autonomous system to analyze the existence of Smale horseshoe chaos. Based on the topological horseshoe theory, the three-dimensional solid torus structure is mapped into a logarithmic spiral structure, and the original structure appears to expand in two directions and contract in one direction. There exists chaos in the sense of a Smale horseshoe. The nonlinear equations of the circular mesh antenna under the conditions of the unperturbed and perturbed situations are analyzed, respectively. For the perturbation analysis of the six-dimensional non-autonomous system, the energy difference function is calculated. The transverse zero point of the energy difference function satisfies the non-degenerate conditions, which indicates that the system exists Shilnikov-type multi-pulse chaotic motions. In summary, the researches have verified the existence of chaotic motion in the six-dimensional non-autonomous system for the circular mesh antenna. Full article
(This article belongs to the Special Issue Modeling and Analysis in Dynamical Systems and Bistability)
Show Figures

Figure 1

18 pages, 5888 KiB  
Article
Secure DNA-Coding Image Optical Communication Using Non-Degenerate Hyperchaos and Dynamic Secret-Key
by Heping Wen, Zhen Liu, Haowen Lai, Chongfu Zhang, Linhao Liu, Jieyi Yang, Yiting Lin, Yunqi Li, Yunlong Liao, Linchao Ma, Zefeng Chen and Rui Li
Mathematics 2022, 10(17), 3180; https://doi.org/10.3390/math10173180 - 3 Sep 2022
Cited by 35 | Viewed by 2776
Abstract
With the aim of tackling insufficient security in the chaotic encryption algorithm for digital images in the Optical Access Network, a color image encryption scheme combining non-degenerate discrete hyperchaotic system and deoxyribonucleic acid (DNA) dynamic encoding is proposed. First, a new non-degenerate hyperchaotic [...] Read more.
With the aim of tackling insufficient security in the chaotic encryption algorithm for digital images in the Optical Access Network, a color image encryption scheme combining non-degenerate discrete hyperchaotic system and deoxyribonucleic acid (DNA) dynamic encoding is proposed. First, a new non-degenerate hyperchaotic system is constructed with all positive Lyapunov and more complex dynamic characteristics. Furthermore, the key sequence based on non-degenerate hyperchaotic system is generated using plaintext correlation to achieve the effect of a dynamic secret key. Next, a binary bit-planes permutation is performed on the image using one of the key sequences. Then, the chaotic key sequence is used to sequentially perform DNA encoding, obfuscation, and decoding. Finally, a binary bit-planes obfuscation is performed to obtain the final ciphertext. The research results show that the non-degenerate chaotic sequence can pass the NIST 800-22 test, and the corresponding encryption algorithm can resist various common attacks and has a strong anti-interference ability. In addition, the algorithm is verified on ARM-Embedded, which proves that the encryption system proposed in this paper is a feasible secure communication technology scheme. Therefore, the scheme proposed in this paper is helpful to provide new ideas for the design and application of high-security cryptosystem in optical access network. Full article
(This article belongs to the Special Issue Advances in Algebraic Coding Theory and Cryptography)
Show Figures

Figure 1

26 pages, 7271 KiB  
Article
Image Encryption Scheme with Compressed Sensing Based on a New Six-Dimensional Non-Degenerate Discrete Hyperchaotic System and Plaintext-Related Scrambling
by Chunyang Sun, Erfu Wang and Bing Zhao
Entropy 2021, 23(3), 291; https://doi.org/10.3390/e23030291 - 27 Feb 2021
Cited by 37 | Viewed by 2947
Abstract
Digital images can be large in size and contain sensitive information that needs protection. Compression using compressed sensing performs well, but the measurement matrix directly affects the signal compression and reconstruction performance. The good cryptographic characteristics of chaotic systems mean that using one [...] Read more.
Digital images can be large in size and contain sensitive information that needs protection. Compression using compressed sensing performs well, but the measurement matrix directly affects the signal compression and reconstruction performance. The good cryptographic characteristics of chaotic systems mean that using one to construct the measurement matrix has obvious advantages. However, existing low-dimensional chaotic systems have low complexity and generate sequences with poor randomness. Hence, a new six-dimensional non-degenerate discrete hyperchaotic system with six positive Lyapunov exponents is proposed in this paper. Using this chaotic system to design the measurement matrix can improve the performance of image compression and reconstruction. Because image encryption using compressed sensing cannot resist known- and chosen-plaintext attacks, the chaotic system proposed in this paper is introduced into the compressed sensing encryption framework. A scrambling algorithm and two-way diffusion algorithm for the plaintext are used to encrypt the measured value matrix. The security of the encryption system is further improved by generating the SHA-256 value of the original image to calculate the initial conditions of the chaotic map. A simulation and performance analysis shows that the proposed image compression-encryption scheme has high compression and reconstruction performance and the ability to resist known- and chosen-plaintext attacks. Full article
Show Figures

Figure 1

Back to TopTop