Applicable Image Security Based on New Hyperchaotic System

Hyperchaotic systems are widely applied in the cryptography domain on account of their more complex dynamical behavior. In view of this, the greatest contribution of this paper is that a two-dimensional Sine coupling Logistic modulated Sine (2D-SCLMS) system is proposed based on Logistic map and Sin...

Full description

Bibliographic Details
Main Authors: Jingya Wang, Xianhua Song, Huiqiang Wang, Ahmed A. Abd El-Latif
Format: Article
Language:English
Published: MDPI AG 2021-12-01
Series:Symmetry
Subjects:
Online Access:https://www.mdpi.com/2073-8994/13/12/2290
_version_ 1811153747187859456
author Jingya Wang
Xianhua Song
Huiqiang Wang
Ahmed A. Abd El-Latif
author_facet Jingya Wang
Xianhua Song
Huiqiang Wang
Ahmed A. Abd El-Latif
author_sort Jingya Wang
collection DOAJ
description Hyperchaotic systems are widely applied in the cryptography domain on account of their more complex dynamical behavior. In view of this, the greatest contribution of this paper is that a two-dimensional Sine coupling Logistic modulated Sine (2D-SCLMS) system is proposed based on Logistic map and Sine map. By a series of analyses, including Lyapunov index (LE), 0–1 test, two complexity analysis methods, and two entropy analysis methods, it is concluded that the new 2D-SCLMS map is hyperchaotic with a wider range of chaos and more complex randomness. The new system combined with two-dimensional Logistic-Sine Coupling Mapping (2D-LSCM) is further applied to an image encryption application. SHA-384 is used to generate the initial values and parameters of the two chaotic systems. Symmetric keys are generated during this operation, which can be applied to the proposed image encryption and decryption algorithms. The encryption process and the decryption process of the new image encryption approaches mainly include pixel scrambling, exclusive NOR (Xnor), and diffusion operations. Multiple experiments illustrate that this scheme has higher security and lower time complexity.
first_indexed 2024-03-10T03:00:56Z
format Article
id doaj.art-85ac5526497f4e7c8a7fb304845f7b36
institution Directory Open Access Journal
issn 2073-8994
language English
last_indexed 2024-03-10T03:00:56Z
publishDate 2021-12-01
publisher MDPI AG
record_format Article
series Symmetry
spelling doaj.art-85ac5526497f4e7c8a7fb304845f7b362023-11-23T10:44:56ZengMDPI AGSymmetry2073-89942021-12-011312229010.3390/sym13122290Applicable Image Security Based on New Hyperchaotic SystemJingya Wang0Xianhua Song1Huiqiang Wang2Ahmed A. Abd El-Latif3School of Science, Harbin University of Science and Technology, Harbin 150080, ChinaSchool of Science, Harbin University of Science and Technology, Harbin 150080, ChinaSchool of Computer Science and Technology, Harbin Engineering University, Harbin 150001, ChinaDepartment of Mathematics and Computer Science, Faculty of Science, Menoufia University, Shebin El-Koom 32511, EgyptHyperchaotic systems are widely applied in the cryptography domain on account of their more complex dynamical behavior. In view of this, the greatest contribution of this paper is that a two-dimensional Sine coupling Logistic modulated Sine (2D-SCLMS) system is proposed based on Logistic map and Sine map. By a series of analyses, including Lyapunov index (LE), 0–1 test, two complexity analysis methods, and two entropy analysis methods, it is concluded that the new 2D-SCLMS map is hyperchaotic with a wider range of chaos and more complex randomness. The new system combined with two-dimensional Logistic-Sine Coupling Mapping (2D-LSCM) is further applied to an image encryption application. SHA-384 is used to generate the initial values and parameters of the two chaotic systems. Symmetric keys are generated during this operation, which can be applied to the proposed image encryption and decryption algorithms. The encryption process and the decryption process of the new image encryption approaches mainly include pixel scrambling, exclusive NOR (Xnor), and diffusion operations. Multiple experiments illustrate that this scheme has higher security and lower time complexity.https://www.mdpi.com/2073-8994/13/12/2290chaotic systemshyperchaotic systemssymmetric image encryptionsecurity analysis
spellingShingle Jingya Wang
Xianhua Song
Huiqiang Wang
Ahmed A. Abd El-Latif
Applicable Image Security Based on New Hyperchaotic System
Symmetry
chaotic systems
hyperchaotic systems
symmetric image encryption
security analysis
title Applicable Image Security Based on New Hyperchaotic System
title_full Applicable Image Security Based on New Hyperchaotic System
title_fullStr Applicable Image Security Based on New Hyperchaotic System
title_full_unstemmed Applicable Image Security Based on New Hyperchaotic System
title_short Applicable Image Security Based on New Hyperchaotic System
title_sort applicable image security based on new hyperchaotic system
topic chaotic systems
hyperchaotic systems
symmetric image encryption
security analysis
url https://www.mdpi.com/2073-8994/13/12/2290
work_keys_str_mv AT jingyawang applicableimagesecuritybasedonnewhyperchaoticsystem
AT xianhuasong applicableimagesecuritybasedonnewhyperchaoticsystem
AT huiqiangwang applicableimagesecuritybasedonnewhyperchaoticsystem
AT ahmedaabdellatif applicableimagesecuritybasedonnewhyperchaoticsystem