An Image Encryption Scheme Based on Hybrid Orbit of Hyper-chaotic Systems

Size: px
Start display at page:

Download "An Image Encryption Scheme Based on Hybrid Orbit of Hyper-chaotic Systems"

Transcription

1 I. J. Computer Network and Informaton Securty Publshed Onlne Aprl 5 n MECS ( DOI:.585/jcns An Image Encrypton Scheme Based on Hybrd Orbt of Hyper-chaotc Systems Junmng Ma and Rusong Ye* Department of Mathematcs Shantou Unversty Shantou Guangdong 5563 P. R. Chna * Correspondng author Emal: rsye@stu.edu.cn Abstract hs paper puts forward a novel mage encrypton scheme based on ordnary dfferental equaton system. Frstly a hyper-chaotc dfferental equaton system s used to generate two hyper-chaotc orbt sequences. Introducng the dea of hybrd orbt two orbts are mxed to generate a hybrd hyper-chaotc sequence whch s used to be the ntal chaotc key stream. Secondly the fnal encrypton key stream s generated through two rounds of dffuson operaton whch s related to the ntal chaotc key stream and plan-mage. herefore the algorthm s key stream not only depends on the cpher keys but also depends on plan-mage. Last but not least the securty and performance analyss have been performed ncludng key space analyss hstogram analyss correlaton analyss nformaton entropy analyss peak sgnal-to-nose rato analyss key senstvty analyss dfferental analyss etc. All the expermental results show that the proposed mage encrypton scheme s secure and sutable for practcal mage and vdeo encrypton. Index erms Hyper-chaotc system hybrd hyperchaotc sequence mage encrypton dffuson operaton. I. INRODUCION Wth the rapd developments of multmeda processng and network technques n the last decades dgtal multmeda data lke mages vdeos audos s beng stored on dfferent meda ncreasngly shared and communcated over the Internet and wreless networks. Protecton of dgtal nformaton aganst llegal usage becomes extremely urgent. Image encrypton s a drect and effcent way to protect mage nformaton from unauthorzed eavesdroppng. Dgtal mages possess some ntrnsc features such as bulk data capacty hgh correlaton among adjacent pxels and human vsual propertes. As a consequence tradtonal encrypton algorthms such as DES RSA [] are there not sutable for practcal dgtal mage encrypton due to the weakness of low-level effcency whle encryptng mages. Chaotc system has been popularzed n most aspects of scence such as mathematcs physcs bology computer fnance and even arts. In partcular chaotc system has been successfully ntroduced to modern cryptography thanks to ts fantastc features such as topologcal transtvty orbt nscrutablty senstvty to ntal condtons and control parameters pseudorandomness etc. whch meet the fundamental requrements such as mxng and dffuson n the sense of cryptography. hese propertes make chaotc system a potental canddate for constructng cryptosystems [-5]. As a consequence many chaos-based mage cryptosystems have been proposed. However most of the exstng chaos-based mage cryptosystems adopted low dmensonal chaotc systems wth permutaton-dffuson archtecture. he permutaton dffuson chaos-based mage encrypton scheme s frstly proposed Frdrch n 998 []. he proposed archtecture s usually composed of two processes: chaotc confuson of pxel postons permutaton process and dffuson of pxel gray values dffuson process where the former permutes the plan-mage pxel postons governed a D chaotc map whle the latter changes the pxel gray values sequentally controlled a D chaotc map so that a tny change for one pxel can spread out to almost all pxels n the whole mage. he Frdrch archtecture has become the most popular structure adopted n a great number of chaos-based mage encrypton algorthms subsequently proposed [-8 -]. However some mage encrypton schemes based on low dmensonal chaotc systems wth permutaton dffuson archtecture are broken recently [6-]. he common drawbacks of permutaton dffuson based mage encrypton algorthms are outlned as follows. Frstly the key stream n the dffuson step only depends on the cpher key. he key streams used to encrypt dfferent plan-mages are the same f the cpher key keeps unchanged. he attacker can obtan the key stream known-plantext attack and chosen-plantext attack. Secondly the two processes wll become ndependent f the plan-mage s a homogeneous one wth dentcal pxel gray value []. hrdly the cryptosystems based on low dmensonal chaotc systems have some weakness such as small key space short perodcty and weak securty. Such a knd of encrypton algorthms can be generally attacked the followng steps: () a homogeneous mage wth dentcal pxel gray values s adopted to elmnate the confuson effect; () the key-stream of the dffuson process s obtaned va known-plantext or chosen plantext attacks; () the remanng cpher-mage can be regarded as the output of a knd of permutaton-only cpher whch has been shown nsecure and can be cryptanalyzed known-plantext or chosen plantext attacks [ 3].

2 6 An Image Encrypton Scheme Based on Hybrd Orbt of Hyper-chaotc Systems It has been ponted out that the permutaton process s not necessary n an mage encrypton scheme. Usually omttng the permutaton process wll mprove the executng tme and make the proposed scheme more smple and easy to mplement. For example the two stages of permutaton and dffuson were combned and were executng at the same tme at the pxel level or bt level [7]. Regardng the securty ssue hyper-chaotc systems can be employed to mprove the securty of the cryptosystem proposed [7 4]. Hgher dmensonal chaotc systems wth hgher dmensonal attractors shall have good chaotc features. he adoptng of hgher dmensonal chaotc systems whch own more than one postve Lyapunov exponents clearly mproves the securty of encrypton scheme generatng more complex dynamcal behavor or hgh randomness. It s more dffcult to predct the chaotc sequences generated hgher dmensonal chaotc systems. herefore some hgh dmensonal chaotc systems are used n mage encrypton. In ths paper we propose an mage encrypton scheme based on hybrd orbt of hyper-chaotc system and dffuson-only mechansm. As far as we know mage encrypton scheme based on hybrd orbt of hyper-chaotc system only wth dffuson operaton has not been reported. he adoptng of hybrd orbt of hyper-chaotc system can enlarge the key space effcently and therefore enhance the securty. Gven two sets of ntal states the fourth order Ronge-Kutta method s used to generate two orbts of the hyper-chaotc system consstng of four ordnary dfferental equatons. ent map s appled to generate one pseudo-random sequence to determne the hybrd orbt ponts from whch of the two yelded orbts. Based on the mproved hyper-chaotc sequences derved the hybrd orbt we desgn an mage encrypton scheme wth plan-mage dependent key stream. he proposed scheme apples dfferent key streams when encryptng dfferent plan-mages (even wth the same hybrd hyper-chaotc sequences). o make the proposed scheme resst dfferental analyss attack we perform one dffuson process wth two rounds of dffuson operaton whch depends on both the cpher keys and the planmage. he dffuson process can modfy the pxel values and break the correlatons between adjacent pxels of an mage smultaneously. he securty and performance analyss of the proposed mage encrypton are carred out usng the hstograms correlaton coeffcents nformaton entropy key senstvty analyss dfferental analyss key space analyss etc. All the expermental results show that the proposed mage encrypton scheme s hghly secure and excellent performance whch makes t sutable for practcal applcaton. he rest of the paper s organzed as follows. In Secton II we brefly ntroduce the hyper-chaotc system and dscuss ts chaotc natures. he mproved hybrd sequence from hyper-chaotc sequences s outlned as well. Secton III devotes to desgnng the mage encrypton scheme. One dffuson functon s presented to encrypt mages. In Secton IV we present the results of securty and performance analyss of the proposed mage encrypton scheme usng the hstograms correlaton coeffcents nformaton entropy key senstvty analyss dfferental analyss key space analyss encrypton rate analyss etc. Secton V concludes the paper. II. HE HYPER-CHAOIC SYSEM AND IS HYBRID ORBIS A. he hyper-chaotc system he notaton of hyper-chaotc system s frstly put forward Rössler n 979 [5]. Hyper-chaotc system s a hgh order ordnary dfferental equaton whch s wdely appled n cryptography and crcut desgn. Hyperchaotc system presents more than one postve Lyapunov exponents and therefore generates more complex dynamcal behavor or hgh randomness. he hyperchaotc sequences generated surely mprove the securty of encrypton scheme. In ths paper a hyper-chaotc system s used n key schemng and modeled x a( y x) yz y cx y xz w z xy bz dw xz w where a b c and d are system parameters. When a 35 b 8/ 3 c 55 d.3 the Lyapunov exponents of system () are mplyng that system () exhbts a hyper-chaotc behavor. For the ntal condton ( x y z w ) one can obtan four hyper-chaotc sequences { x y z w : 3 } the fourth order Runge Kutta algorthm. hese hyper-chaotc sequences are non-perodcty and very senstve dependence on ntal condtons ( x y z w ). Settng the ntal condtons ( x 5 y z 5 w ) and ntegraton step h=. we solve system () and get the frst 5 real values of each sequence. he correspondng sequence pars are depcted n Fgure. (a) x y projecton ()

3 An Image Encrypton Scheme Based on Hybrd Orbt of Hyper-chaotc Systems 7 { x y z w : 3 L / 4}. hen we process the four hyper-chaotc sequences to be four 8-bt gray value sequences s fx s fx( s )) ) () * 4 mod( ( - 56 (b) x z projecton where fx ( x) rounds the elements of x to the nearest ntegers towards zero mod( xy ) represents the remander of x dvded y. We then get four hyper- chaotc sequences { xs ys zs ws... L / 4}. We ntegrate the four sequences to be one mxed sequence S { k... L} k43 xs k4 ys k4 zs. (3) k ws... L / 4. 4 (c) x w projecton (d) y z projecton Set the ntal condton to be ( x y z w ) dfferent from ( x y z w ) one can smlarly obtan another ntegrated sequence S { k... L}. C. Generaton of hybrd hyper-chaotc sequences he tent map s used to generate one random sequence { t n... L} whch s quantzed to be one n two-value sequence { ln n... L}. l n s used to determne l n k n to form one hybrd sequence { k l n n L}. he chaotc tent map s defned n t t q q t t n t qt -q (4) (e) y w projecton (f) z w projecton Fg.. he phase dagrams of hyper-chaotc sequence pars. B. Generaton of hyper-chaotc sequences Assume that we need one hyper-chaotc sequence wth length L. Set the ntal condton to be ( x y z w ) one can solve system () the fourth order Runge Kutta algorthm to obtan four hyper-chaotc sequences where q s the control parameter t s the state varable t s the ntal value. he tent map shows good chaotc nature ncludng ergodcty pseudo-randomness hgh senstvty to control parameters and ntal values etc. Set the control parameter and ntal value q.3 t.4 we terate the system (4) to get chaotc sequence { tn n... L} and yeld the choce sequence l floor ( t ) L. (5) o mprove the computaton effcency we ntroduce two counter varables () () whch are used to count the number of ponts selected from the k th hyper-chaotc k sequence S. () () are ntalzed to be zero. As the k th hyper-chaotc sequence k s k S s chosen ncreased. When the hybrd hyper-chaotc sequence wth length L s fnally generated () L. We denote

4 8 An Image Encrypton Scheme Based on Hybrd Orbt of Hyper-chaotc Systems the hybrd hyper-chaotc sequence wth length L to be { mk... L} yelded l mk.... k ( l ) L (6) III. HE PROPOSED IMAGE ENCRYPION SCHEME We assume that the plan-mage s a 8-bt gray-scale mage of sze L M N t s an nteger matrx of M rows and N columns n whch the values range from to 55. he D pxel gray value matrx can be convert to a D vector P { p p... p L } where p denotes the gray level of the mage pxel n the row floor( / N ) and column mod ( N ) where floor( x ) rounds x to the nearest nteger less than or equal to x. he hyper-chaotc system () s used to generate the ntal chaotc key stream. he mage encrypton scheme s based on the fnal secret key stream whch s not only related on the orgnal chaotc key stream but also the plan-mage. he mage encrypton scheme ncludes generatng ntal chaotc key stream and two rounds of dffuson operaton. A. he generaton of ntal chaotc key stream Step. Input the ntal condtons ( x y z w ) and ( x y z w ) set the step h and nteger N 5 the control parameter and ntal condton qt nteger C 55. Step. Solve the hyper-chaotc system () wth the ntal condtons ( x y z w ) and ( x y z w ) respectvely. Dscard the frst N ponts of the orbts to overcome the transent effect. Set the N th ponts ( x y z w ) and ( x y z w ) to the new N N N N N N N N ntal condtons. Step 3. Iterate the tent map (4) for N L tmes and dscard the frst N transent ponts and preserve the remander whch s stll denoted as { t... L} and then generate the two-value orbt choce sequence Ln ( l l... l L ). Step 4. o reduce the workload we count the number of and n Ln ( l l... l L ). It s then easy to calculate needed orbt pont numbers and of the two hyperchaotc orbt derved from the new ntal condtons ( x y z w ) and ( x y z w ). N N N N N N N N We note that and should satsfy 4 ( ) L and can be calculated cel( sum( Ln j) / 4) j j where sum( x y) denotes the total number of x( ) y( ) L cel( x ) rounds x to the nearest nteger greater than or equal to x. Step 5. Solve the system () ntal condton ( x y z w ) and step h and get four hyper-chaotc N N N N sequences{ x y z w N... N ()}. We then generate the frst mproved hyper-chaotc sequence { k...4 } () and (3). Smlarly the second mproved hyper-chaotc sequence { k...4 } ether generated wth ntal condton ( x y z w ) N N N N and step h. Step 6. Combne the mproved hyper-chaotc sequences { k...4 } and { k...4 } to be one hybrd ntal key stream mk... L (6). B. wo rounds of dffuson operaton Assume that the D gray value matrx of the plan- P p p... pl mage s converted to be one vector and C c c c... L denotes the correspondng vector of the cpher-mage. One dffuson process s outlned as follows. Step. Set. Step. Compute the frst pxel gray value of the cpher-mage usng the frst pxel gray value of the plan-mage the nteger C and the frst ntal key stream element mk c btxor ( p btxor (mod( C mk 56) mk )) where btxor x y returns the result after btwse XOR operaton. Step 3. Let and calculate the next pxel gray value of the cpher-mage usng c the th pxel gray value of the plan-mage and the th ntal key stream element mk c btxor ( p btxor (mod( c mk 56) mk )) Step 4. Return to Step 3 untl L and fnally we get the cpher-mage vector C c c... cl after one round of dffuson. Step 5. Set. Step 6. Utlzed the frst pxel gray value c the last one c L and mk to get c c btxor ( c btxor (mod( c mk 56) mk )) L Step 7. Let then calculate c c btxor ( c btxor (mod( c mk 56) mk )) Step 8. Return to Step 7 untl L. he fnally yelded vector C c c... cl s the resulted cphermage after two rounds of dffuson operaton. s

5 An Image Encrypton Scheme Based on Hybrd Orbt of Hyper-chaotc Systems 9 IV. SECURIY AND PERFORMANCE ANALYSIS Accordng to the basc prncple of cryptology [] an deal encrypton cryptosystem requres senstvty to cpher keys.e. the cpher-text should have close correlaton wth the keys. Furthermore an deal encrypton scheme should have a large key space to make brute-force attack nfeasble; t should also well resst varous knds of attacks lke statstcal attack dfferental attack etc. Some securty analyss wll be performed on the proposed mage encrypton scheme ncludng the most mportant ones lke key senstvty test key space analyss statstcal analyss and dfferental attack analyss. he plan-mage s 56 gray-scale and of sze (ncludng Lena Boat Cameraman). In the smulaton experment we set two ntal condtons ( x 5 y z 5 w ) ( x y 5 z w 5) Shannon ponted out n hs masterpece [6] the possblty to solve many knds of cphers statstcal analyss. herefore passng the statstcal analyss on cpher-mage s of crucal mportance for a cryptosystem. Indeed an deal cryptosystem should be robust aganst any statstcal attack. In order to prove the securty of the proposed encrypton scheme the followng statstcal tests are performed. () Hstogram analyss. We encrypt the plan-mage Lena (Fgure (a)) and get the cpher-mage Fgure (b). We also plot the hstograms of plan-mage and cphermage as shown n Fgures (c)-(d). Fgure (d) shows that the hstograms of cpher-mage s farly unform and sgnfcantly dfferent from the hstogram of the orgnal plan-mage Fgure (c). Hence t does not provde any useful nformaton for the opponents to perform any statstcal analyss attack on the encrypted mage. (a) plan-mage Lena and step h. N C 3 q.3 t.4. All the analyss shows that the proposed mage encrypton scheme s hghly secure thanks to ts hgh senstvty of the control parameters and ntal condtons of the consdered chaotc systems large key space and satsfactory dffuson mechansm. A. Key space analyss Key space conssts of all the possble cpher keys. A good mage encrypton scheme needs to contan suffcently large key space for compensatng the degradaton dynamcs n PC. It should be also large enough to effectvely resst brute-force attack and prevent nvaders decryptng orgnal data even after they nvest large amounts of tme and resources. We can just set the two ntal condtons ( ) x y z w of x y z w the hyper-chaotc system the ntal condton t and the control parameter q of chaotc tent map to be the cpher keys. If they are represented as floatng number wth -4 4 precson then the number of x s herefore the total cpher keys wll be as many as ( ) whch s large enough to make brute-force attack nfeasble. B. Statstcal analyss (b) cpher-mage of Lena (c) Hstogram of Lena (d) hstogram of choer-mage of Lena Fg.. he hstogram analyss result.

6 3 An Image Encrypton Scheme Based on Hybrd Orbt of Hyper-chaotc Systems () Correlaton analyss of adjacent pxels. o test the correlaton between two adjacent pxels the followng performances are carred out. Frst we select pars of two adjacent pxels randomly from coeffcent of the selected pars usng the followng formulae: Cr cov xy D x D y x y x E x y E y cov E x x D x x E x where xyare the gray-scale values of two adjacent pxels n the mage and s the total pars of pxels randomly selected from the mage. he correlatons of two adjacent pxels n the plan-mage and n the cphermage are shown n able. It s clear from able that the proposed mage encrypton technque sgnfcantly reduces the correlaton between the adjacent pxels of the plan-mage. able. Correlaton between adjacent pxels of plan-mage and cpher-mage. horzontal vertcal dagonal Plan-mage Lena Cpher-mage of Lena Plan-mage Boat Cpher-mage of Boat Plan-mage Cameraman Cpher-mage of Cameraman () Correlaton between plan-mages and cphermages. We have also analyzed the correlaton between plan-mage and cpher-mage computng the two-dmensonal correlaton coeffcents between of plan-mage and cpher-mage. he D-correlaton coeffcents are calculated C AB H W ( A j A)( B j B) HW j H W H W ( A j A) ( B j B) H W j H W j H W H W A A B B H W H W j j j j where A represents one of the red green and blue channel of the plan mage B represents one of the red green and blue channel of the cpher mage A and B are the mean values of the elements of D matrces A and B respectvely; M and N are respectvely the heght and wdth of the plan/cpher mage. We have computed the correlaton coeffcents for the par of plan-mage Lena and ts correspondng cpher-mage. he results are shown n able. One can see from the results that the correlaton coeffcents between plan-mage and cphermage are very small (or practcally zero) hence the cpher-mage owns the characterstcs of a random mage. able. Correlaton between plan-mage and cpher mage. Image Encrypton CC entropy PSNR Decrypton CC Lena Boat Cameraman (v) Informaton entropy analyss. Informaton entropy s a measure of the uncertanty assocated wth a random varable and can be also a measure of dsorder and randomness. It quantfes the amount of nformaton contaned n data usually n bts/symbol. wo extremely cases are: a long sequence of repeatng characters and a truly random sequence. he former has entropy of snce every character s predctable and the latter has maxmum entropy snce there s no way to predct the next character n the sequence. Regardng mage t can be used to measure the unformty of mage hstograms. he entropy Hm ( ) of a message source m can be measured L H( m) p( m )log( p( m )) (bts) where L s the total number of symbols m pm ( ) represents the probablty of occurrence of symbol m and log denotes the base logarthm so that the entropy s expressed n bts. For a random source emttng 56 symbols ts entropy s Hm ( ) 8 bts. For a 8-bt gray mage the nformaton entropy s gven as 8 H( m) P( I )log (bts). PI ( )

7 An Image Encrypton Scheme Based on Hybrd Orbt of Hyper-chaotc Systems 3 We have calculated the nformaton entropes for planmages and ther correspondng cpher-mages. he results are shown n able. he value of nformaton entropy for the cpher-mage produced the proposed mage encrypton scheme s very-very close to the expected value of truly random mage.e. 8bts. Hence the proposed encrypton scheme s extremely robust aganst entropy attacks. (v) Peak sgnal-to-nose rato analyss. Another parameter to descrbe the encrypton qualty s the peak sgnal-to-nose rato (PSNR). hs term s descrbed based on that the mean squared error (MSE) s calculated. hs crteron provdes the error between nput mage and output mage. he MSE value s M N MSE IO j IE j M N j where O E I j s the pxel value of plan-mage I j s the pxel value of cpher-mage. hus the PSNR s descrbed log I max PSNR MSE where I max s the maxmum of pxel value of the mage. he PSNR should be a low value whch corresponds to great dfference between the orgnal mage and the encrypted mage. o determne the encrypton qualty the PSNR s computed for the encrypton of Lena Boat and Cameraman. In able the PSNR values are shown n the fourth column. he results show that these PSNR values are all very low. herefore the encrypton qualty s good n sense of PSNR. C. Senstvty Analyss o test the senstvty of cpher keys and plan-mage two measures NPCR (net pxel change rate) and UACI (unfed average changng ntensty) are usually used. NPCR measures the percentage of dfferent pxel numbers between the two encrypted mages. UACI measures the average ntensty of dfference between the two encrypted mages. hey can be calculated the followng formulae: / j ( ) NPCR D j % M N c ( j) - c ( j) UACI % M N j 55 where c and c are the two cpher-mages and D( j ) s defned c( j) c( j) D( j) otherwse. he NPCR for two random mages whch s an expected estmate for an deal mage cryptosystem s L gven NPCR ( ) % where L s the Expected number of bts used to represent all the gray values of the consdered mage. For a 8-bt gray scale mage L hence NPCR Expected %. he UACI for two random mages whch s an expected estmate for an deal mage cryptosystem s L ( ) gven UACI Expected %. For a 8- L L bt gray mage UACI Expected %. () Key senstvty analyss. A good mage encrypton scheme should be extremely senstve to cpher keys whch s an essental feature for any good cryptosystem n the sense that t can effectvely prevent nvaders decryptng orgnal data even after they nvest large amounts of tme and resources. Assume that we want to verfy the senstvty of cpher key K we encrypt the plan-mage A ( A( j)) M N wth K and K+ K respectvely whle keepng the other keys unchanged the correspondng encrypted mages are A A respectvely where K s the perturbng value. We then calculate the correspondng NPCRUACICC and PSNR. We set the perturbng value to be and get the results shown n able 3. All the expermental results show that the cpher keys are all strongly senstve. able 3. Key senstvty analyss Perturbng value NPCR UACI CC PSNR x y z w a t () Plan-mage senstvty analyss. he dfferental cryptanalyss of a block cpher s the study of how dfferences n a plantext can affect the resultant dfferences n the cphertext wth the same cpher key. It

8 3 An Image Encrypton Scheme Based on Hybrd Orbt of Hyper-chaotc Systems s usually done mplementng the chosen plantext attack but now there are extensons whch use known plantext as well as cphertext attacks also. As for mage cryptosystems attackers may generally make a slght change (e.g. modfy only one pxel) of the plan-mage and compare the two cpher-mages (obtaned applyng the same cpher key on two plan-mages havng one pxel dfference only) to fnd out some meanngful relatonshps between the plan-mage and the cphermage. If a meanngful relatonshp between plan-mage and cpher-mage can be found n such analyss whch may further facltate the opponents to determne the cpher key. If one mnor change n the plan-mage wll cause sgnfcant random and unpredctable changes n the cpher-mage then the encrypton scheme wll resst dfferental attack effcently. o test the robustness of mage cryptosystems aganst the dfferental cryptanalyss We have performed the dfferental analyss calculatng NPCR and UACI on plan-mage Lena. he analyss has been done randomly choosng pxels (one at a tme ncludng the very frst and very last pxels) n each plan-mage and changng ther all three color values one unt. he average values of NPCR and UACI thus obtaned for all three mages are gven n Fgure 3. It s clear that the NPCR and UACI values are very close to the expected values thus the proposed mage encrypton technque shows extreme senstvty on the plantext and hence not vulnerable to the dfferental attacks. he average of the NPCR values s % and the average of UACI s % they are both hghly close to ther expectaton values % and % respectvely. (a) NPCR values D. Resstance to known-plantext and chosen-plantext attacks It follows from the encrypton scheme that mk s related to the ntal cpher keys of the hyper-chaotc system and c depends on the pxel gray values of the plan-mage. Hence the pxel gray values of the planmage are employed to change the fnal encrypton keys except for the frst pxel n the frst round of dffuson operaton. Hence the fnal encrypton keys depend on not only the ntal state value of the hyper-chaotc system but also the plan-mage. When dfferent plan-mages are encrypted the correspondng key stream s not the same. he attacker cannot obtan useful nformaton encryptng some specal mages snce the resultant nformaton s related to those chosen-mages. herefore the attacks proposed n Refs. [6 ] become neffectve on ths new scheme. he proposed scheme can well resst the known-plantext and the chosen-plantext attacks. V. CONCLUSIONS In ths paper a novel plan-mage dependent encrypton scheme based on hybrd orbt of hyper-chaotc system s proposed. wo hyper-chaotc sequences are generate from one hyper-chaotc system and then are mproved and ntegrated nto one hybrd sequence to acheve better randomness and securty for mage encrypton. One dffuson procedure wth two rounds of dffuson operatons are performed whch makes the key stream depend on both the ntal hybrd hyper-chaotc sequence and plan-mage. herefore the key stream n the encrypton process depends on both the ntal keys and the plan-mage and the cpher-mage can resst the known-plantext and chosen-plantext attacks effcently. he key space s large enough to resst brute-force attacks as well. All the performance analyss shows that the scheme can well prevent the mage from statstcal attackng and that the scheme possesses hgh key senstvty and gets a good ablty to resst dfferental attack. Wth hgh-level securty t can be used n nternet applcatons such as network securty and secure mage communcatons. ACKNOWLEDGMEN hs research s supported Natonal Natural Scence Foundaton of Chna (No. 75 & No. 738). REFERENCES (b) UACI values Fg. 3. he dfferental analyss. [] B. Schener Appled Cryptography: Protocols Algorthms and Source Code n C John Wley and sons New York 996. [] F. Huang Z.-H. Guan A modfed method of a class of recently presented cryptosystems Chaos Soltons and Fractals 3(5) [3] G. J. Zhang Q. Lu A novel mage encrypton method based on total shufflng scheme Optcs Communcatons 84()

9 An Image Encrypton Scheme Based on Hybrd Orbt of Hyper-chaotc Systems 33 [4] R. Ye A novel chaos-based mage encrypton scheme wth an effcent permutaton-dffuson mechansm Optcs Communcatons 84() [5] N. K. Pareek V. Patdar K. K. Sud Image encrypton usng chaotc logstc map Image and Vson Computng 4(6) [6] N. Masuda K. Ahara Cryptosystems wth dscretzed chaotc maps IEEE rans. Crcuts Syst. I 49() 8 4. [7] H. Lu X. Wang Color mage encrypton usng spatal bt-level permutaton and hgh-dmenson chaotc system Optcs Communcatons 84() [8] S. Behna A. Akhshan S. Ahadpour H. Mahmod A. Akhavan A fast chaotc encrypton scheme based on pecewse nonlnear chaotc maps Phys. Lett. A 366(7) [9] R. Ye H. Huang Applcaton of the Chaotc Ergodcty of Standard Map n Image Encrypton and Watermarkng I. J. Image Graphcs and Sgnal Processng () 9 9. [] S. Lan J. Sun Z. Wang A block cpher based on a sutable use of the chaotc standard map Chaos Soltons and Fractals 6 (5) 7 9. [] V. Patdar N. K. Pareek K. K. Sud A new substtuton dffuson based mage cpher usng chaotc standard and logstc maps Communcatons n Nonlnear Scence and Numercal Smulaton 4 (9) [] N. Masuda K. Ahara Cryptosystems wth dscretzed chaotc maps IEEE rans. Crcuts Syst. I 49() 8 4. [3] R. Ye W. Guo An mage encrypton scheme based on chaotc system wth changeable parameters I.J.Computer Network and Informaton Securty 6:4(4) [4] S. Lan J. Sun Z. Wang A block cpher based on a sutable use of the chaotc standard map Chaos Soltons and Fractals 6 (5) 7 9. [5] L. Kocarev Chaos-based cryptography: a bref overvew IEEE Crcuts and Systems Magazne () 6. [6] G. Alvarez S. L Breakng an encrypton scheme based on chaotc baker map Physcs Letters A 35(6) [7] D. Xao X. Lao P. We Analyss and mprovement of a chaos-based mage encrypton algorthm Chaos Soltons and Fractals 4 (9) [8] J. M. Lu Q. Qu Cryptanalyss of a substtuton-dffuson based on cpher usng chaotc standard and logstc map n: hrd Internatonal Symposum on Informaton Processng pp [9] R. Rhouma E. Solak S. Belghth Cryptanalyss of a new substtuton-dffuson based mage cpher Communcatons n Nonlnear Scence and Numercal Smulaton 5 () [] X. Wang G. He Crytanalyss on a novel mage encrupton method based on tatal shufflng scheme[j]. Optcs Communcatons 84 () [] Y. Wang K.W. Wong X. F. Lao. Xang G. R. Chen A chaos-based mage encrypton algorthm wth varable control parameters. Chaos Soltons and Fractals 4(9) [] S. J. L C. Q. L G. R. Chen N. G. Bourbaks K.. Lo A general quanttatve cryptanalyss of permutaton-only multmeda cphers aganst plan-mage attacks. Sgnal Process. Image Commun 3(9) 3. [3] C. Q. L S. J. L G. R. Chen G. Chen L. Hu Cryptanalyss of a new sgnal securty system for multmeda data transmsson. EURASIP J. Appl. Sgnal Process. 8(5) [4] C. Zhu A novel mage encrypton scheme based on mproved hyper chaotc sequences Optcs Communcatons 85 () [5] O.E. Rössler. An equaton for hyper chaos. Physcs Letters A 979 7(-3): [6] C.E.Shannon. Communcaton heory of Secrecy Systems. Bell System echncal Journal 949 8(4): Authors Profles Junmng Ma master degree canddate at department of mathematcs n Shantou Unversty. Rusong Ye born n 968 and receved the B.S. degree n Computatonal Mathematcs n 99 from Shangha Unversty of Scence and echnology Shangha Chna and the Ph. D. degree n Computatonal Mathematcs n 995 from Shangha Unversty Shangha Chna. He s a professor at Department of Mathematcs n Shantou Unversty Shantou Guangdong Chna snce 3. Hs research nterest ncludes bfurcaton theory and ts numercal computaton fractal geometry and ts applcaton n computer scence chaotc dynamcal system and ts applcaton n computer scence specfcally the applcatons of fractal chaotc dynamcal systems n nformaton securty such as dgtal mage encrypton dgtal mage hdng dgtal mage watermarkng dgtal mage sharng.

Department of Mathematics, Shantou University, Shantou, Guangdong, , China.

Department of Mathematics, Shantou University, Shantou, Guangdong, , China. 205 Internatonal Conference on Computer Scence and Communcaton Engneerng (CSCE 205) ISN: 978--60595-249-9 A Novel Color Image Encrypton Scheme ased on Permutaton-substtuton Archtecture Ru-Song Ye,a, Mng

More information

Image Encryption Using Chaotic Signal and Max Heap Tree

Image Encryption Using Chaotic Signal and Max Heap Tree Image Encrypton Usng Chaotc Sgnal and Max Heap Tree Farborz Mahmoud 1, Rasul Enayatfar 2, and Mohsen Mrzashaer 1 1 Electrcal and Computer Engneerng Department, Islamc Azad Unversty, Qazvn Branch, Iran

More information

The Synchronous 8th-Order Differential Attack on 12 Rounds of the Block Cipher HyRAL

The Synchronous 8th-Order Differential Attack on 12 Rounds of the Block Cipher HyRAL The Synchronous 8th-Order Dfferental Attack on 12 Rounds of the Block Cpher HyRAL Yasutaka Igarash, Sej Fukushma, and Tomohro Hachno Kagoshma Unversty, Kagoshma, Japan Emal: {garash, fukushma, hachno}@eee.kagoshma-u.ac.jp

More information

Module 3 LOSSY IMAGE COMPRESSION SYSTEMS. Version 2 ECE IIT, Kharagpur

Module 3 LOSSY IMAGE COMPRESSION SYSTEMS. Version 2 ECE IIT, Kharagpur Module 3 LOSSY IMAGE COMPRESSION SYSTEMS Verson ECE IIT, Kharagpur Lesson 6 Theory of Quantzaton Verson ECE IIT, Kharagpur Instructonal Objectves At the end of ths lesson, the students should be able to:

More information

Kayhan CELİK. Erol KURT. x ' ay ax. y ' xz rx y. z ' xy bz

Kayhan CELİK. Erol KURT. x ' ay ax. y ' xz rx y. z ' xy bz ECAI 216 - Internatonal Conference 8th Edton Electroncs, Computers and Artfcal Intellgence 3 June -2 July, 216, Bucharest, ROMÂIA A ew Image Encrypton Algorthm Based on Lorenz System Kayhan CELİK Gaz Unversty,

More information

A New Scrambling Evaluation Scheme based on Spatial Distribution Entropy and Centroid Difference of Bit-plane

A New Scrambling Evaluation Scheme based on Spatial Distribution Entropy and Centroid Difference of Bit-plane A New Scramblng Evaluaton Scheme based on Spatal Dstrbuton Entropy and Centrod Dfference of Bt-plane Lang Zhao *, Avshek Adhkar Kouch Sakura * * Graduate School of Informaton Scence and Electrcal Engneerng,

More information

Chapter 5. Solution of System of Linear Equations. Module No. 6. Solution of Inconsistent and Ill Conditioned Systems

Chapter 5. Solution of System of Linear Equations. Module No. 6. Solution of Inconsistent and Ill Conditioned Systems Numercal Analyss by Dr. Anta Pal Assstant Professor Department of Mathematcs Natonal Insttute of Technology Durgapur Durgapur-713209 emal: anta.bue@gmal.com 1 . Chapter 5 Soluton of System of Lnear Equatons

More information

A Novel Feistel Cipher Involving a Bunch of Keys supplemented with Modular Arithmetic Addition

A Novel Feistel Cipher Involving a Bunch of Keys supplemented with Modular Arithmetic Addition (IJACSA) Internatonal Journal of Advanced Computer Scence Applcatons, A Novel Festel Cpher Involvng a Bunch of Keys supplemented wth Modular Arthmetc Addton Dr. V.U.K Sastry Dean R&D, Department of Computer

More information

Comments on a secure dynamic ID-based remote user authentication scheme for multiserver environment using smart cards

Comments on a secure dynamic ID-based remote user authentication scheme for multiserver environment using smart cards Comments on a secure dynamc ID-based remote user authentcaton scheme for multserver envronment usng smart cards Debao He chool of Mathematcs tatstcs Wuhan nversty Wuhan People s Republc of Chna Emal: hedebao@63com

More information

Performing Modulation Scheme of Chaos Shift Keying with Hyperchaotic Chen System

Performing Modulation Scheme of Chaos Shift Keying with Hyperchaotic Chen System 6 th Internatonal Advanced echnologes Symposum (IAS 11), 16-18 May 011, Elazığ, urkey Performng Modulaton Scheme of Chaos Shft Keyng wth Hyperchaotc Chen System H. Oğraş 1, M. ürk 1 Unversty of Batman,

More information

Cryptanalysis of pairing-free certificateless authenticated key agreement protocol

Cryptanalysis of pairing-free certificateless authenticated key agreement protocol Cryptanalyss of parng-free certfcateless authentcated key agreement protocol Zhan Zhu Chna Shp Development Desgn Center CSDDC Wuhan Chna Emal: zhuzhan0@gmal.com bstract: Recently He et al. [D. He J. Chen

More information

Faster Image Encryption: A Semi-Tensor Product Approach

Faster Image Encryption: A Semi-Tensor Product Approach 207 Internatonal Conference on Computer Scence and Applcaton Engneerng (CSAE 207) ISBN: 978--60595-505-6 Faster Image Encrypton: A Sem-Tensor Product Approach Shpng Ye, Jnmng Wang *, Zhenyu Xu and Chaoxang

More information

arxiv: v2 [cs.cr] 29 Sep 2016

arxiv: v2 [cs.cr] 29 Sep 2016 Internatonal Journal of Bfurcaton and Chaos c World Scentfc Publshng Company Breakng a chaotc mage encrypton algorthm based on modulo addton and XOR operaton arxv:107.6536v [cs.cr] 9 Sep 016 Chengqng L

More information

A Robust Method for Calculating the Correlation Coefficient

A Robust Method for Calculating the Correlation Coefficient A Robust Method for Calculatng the Correlaton Coeffcent E.B. Nven and C. V. Deutsch Relatonshps between prmary and secondary data are frequently quantfed usng the correlaton coeffcent; however, the tradtonal

More information

Odd/Even Scroll Generation with Inductorless Chua s and Wien Bridge Oscillator Circuits

Odd/Even Scroll Generation with Inductorless Chua s and Wien Bridge Oscillator Circuits Watcharn Jantanate, Peter A. Chayasena, Sarawut Sutorn Odd/Even Scroll Generaton wth Inductorless Chua s and Wen Brdge Oscllator Crcuts Watcharn Jantanate, Peter A. Chayasena, and Sarawut Sutorn * School

More information

COMPARISON OF SOME RELIABILITY CHARACTERISTICS BETWEEN REDUNDANT SYSTEMS REQUIRING SUPPORTING UNITS FOR THEIR OPERATIONS

COMPARISON OF SOME RELIABILITY CHARACTERISTICS BETWEEN REDUNDANT SYSTEMS REQUIRING SUPPORTING UNITS FOR THEIR OPERATIONS Avalable onlne at http://sck.org J. Math. Comput. Sc. 3 (3), No., 6-3 ISSN: 97-537 COMPARISON OF SOME RELIABILITY CHARACTERISTICS BETWEEN REDUNDANT SYSTEMS REQUIRING SUPPORTING UNITS FOR THEIR OPERATIONS

More information

VQ widely used in coding speech, image, and video

VQ widely used in coding speech, image, and video at Scalar quantzers are specal cases of vector quantzers (VQ): they are constraned to look at one sample at a tme (memoryless) VQ does not have such constrant better RD perfomance expected Source codng

More information

Design and Optimization of Fuzzy Controller for Inverse Pendulum System Using Genetic Algorithm

Design and Optimization of Fuzzy Controller for Inverse Pendulum System Using Genetic Algorithm Desgn and Optmzaton of Fuzzy Controller for Inverse Pendulum System Usng Genetc Algorthm H. Mehraban A. Ashoor Unversty of Tehran Unversty of Tehran h.mehraban@ece.ut.ac.r a.ashoor@ece.ut.ac.r Abstract:

More information

High resolution entropy stable scheme for shallow water equations

High resolution entropy stable scheme for shallow water equations Internatonal Symposum on Computers & Informatcs (ISCI 05) Hgh resoluton entropy stable scheme for shallow water equatons Xaohan Cheng,a, Yufeng Ne,b, Department of Appled Mathematcs, Northwestern Polytechncal

More information

Uncertainty in measurements of power and energy on power networks

Uncertainty in measurements of power and energy on power networks Uncertanty n measurements of power and energy on power networks E. Manov, N. Kolev Department of Measurement and Instrumentaton, Techncal Unversty Sofa, bul. Klment Ohrdsk No8, bl., 000 Sofa, Bulgara Tel./fax:

More information

Scroll Generation with Inductorless Chua s Circuit and Wien Bridge Oscillator

Scroll Generation with Inductorless Chua s Circuit and Wien Bridge Oscillator Latest Trends on Crcuts, Systems and Sgnals Scroll Generaton wth Inductorless Chua s Crcut and Wen Brdge Oscllator Watcharn Jantanate, Peter A. Chayasena, and Sarawut Sutorn * Abstract An nductorless Chua

More information

NUMERICAL DIFFERENTIATION

NUMERICAL DIFFERENTIATION NUMERICAL DIFFERENTIATION 1 Introducton Dfferentaton s a method to compute the rate at whch a dependent output y changes wth respect to the change n the ndependent nput x. Ths rate of change s called the

More information

Robust Image Encryption Based on Balanced Cellular Automaton and Pixel Separation

Robust Image Encryption Based on Balanced Cellular Automaton and Pixel Separation 548 D. TRALIC, S. GRGIC, ROBUST IMAGE ENCRYPTION BASED ON BALANCED CA AND PIXEL SEPARATION Robust Image Encrypton Based on Balanced Cellular Automaton and Pxel Separaton Djana TRALIC, Sonja GRGIC Dept.

More information

Power law and dimension of the maximum value for belief distribution with the max Deng entropy

Power law and dimension of the maximum value for belief distribution with the max Deng entropy Power law and dmenson of the maxmum value for belef dstrbuton wth the max Deng entropy Bngy Kang a, a College of Informaton Engneerng, Northwest A&F Unversty, Yanglng, Shaanx, 712100, Chna. Abstract Deng

More information

Hiding data in images by simple LSB substitution

Hiding data in images by simple LSB substitution Pattern Recognton 37 (004) 469 474 www.elsever.com/locate/patcog Hdng data n mages by smple LSB substtuton Ch-Kwong Chan, L.M. Cheng Department of Computer Engneerng and Informaton Technology, Cty Unversty

More information

3.1 Expectation of Functions of Several Random Variables. )' be a k-dimensional discrete or continuous random vector, with joint PMF p (, E X E X1 E X

3.1 Expectation of Functions of Several Random Variables. )' be a k-dimensional discrete or continuous random vector, with joint PMF p (, E X E X1 E X Statstcs 1: Probablty Theory II 37 3 EPECTATION OF SEVERAL RANDOM VARIABLES As n Probablty Theory I, the nterest n most stuatons les not on the actual dstrbuton of a random vector, but rather on a number

More information

Chapter 13: Multiple Regression

Chapter 13: Multiple Regression Chapter 13: Multple Regresson 13.1 Developng the multple-regresson Model The general model can be descrbed as: It smplfes for two ndependent varables: The sample ft parameter b 0, b 1, and b are used to

More information

Tutorial 2. COMP4134 Biometrics Authentication. February 9, Jun Xu, Teaching Asistant

Tutorial 2. COMP4134 Biometrics Authentication. February 9, Jun Xu, Teaching Asistant Tutoral 2 COMP434 ometrcs uthentcaton Jun Xu, Teachng sstant csjunxu@comp.polyu.edu.hk February 9, 207 Table of Contents Problems Problem : nswer the questons Problem 2: Power law functon Problem 3: Convoluton

More information

CONTRAST ENHANCEMENT FOR MIMIMUM MEAN BRIGHTNESS ERROR FROM HISTOGRAM PARTITIONING INTRODUCTION

CONTRAST ENHANCEMENT FOR MIMIMUM MEAN BRIGHTNESS ERROR FROM HISTOGRAM PARTITIONING INTRODUCTION CONTRAST ENHANCEMENT FOR MIMIMUM MEAN BRIGHTNESS ERROR FROM HISTOGRAM PARTITIONING N. Phanthuna 1,2, F. Cheevasuvt 2 and S. Chtwong 2 1 Department of Electrcal Engneerng, Faculty of Engneerng Rajamangala

More information

Difference Equations

Difference Equations Dfference Equatons c Jan Vrbk 1 Bascs Suppose a sequence of numbers, say a 0,a 1,a,a 3,... s defned by a certan general relatonshp between, say, three consecutve values of the sequence, e.g. a + +3a +1

More information

A new Approach for Solving Linear Ordinary Differential Equations

A new Approach for Solving Linear Ordinary Differential Equations , ISSN 974-57X (Onlne), ISSN 974-5718 (Prnt), Vol. ; Issue No. 1; Year 14, Copyrght 13-14 by CESER PUBLICATIONS A new Approach for Solvng Lnear Ordnary Dfferental Equatons Fawz Abdelwahd Department of

More information

A Fast Computer Aided Design Method for Filters

A Fast Computer Aided Design Method for Filters 2017 Asa-Pacfc Engneerng and Technology Conference (APETC 2017) ISBN: 978-1-60595-443-1 A Fast Computer Aded Desgn Method for Flters Gang L ABSTRACT *Ths paper presents a fast computer aded desgn method

More information

Pulse Coded Modulation

Pulse Coded Modulation Pulse Coded Modulaton PCM (Pulse Coded Modulaton) s a voce codng technque defned by the ITU-T G.711 standard and t s used n dgtal telephony to encode the voce sgnal. The frst step n the analog to dgtal

More information

NON-CENTRAL 7-POINT FORMULA IN THE METHOD OF LINES FOR PARABOLIC AND BURGERS' EQUATIONS

NON-CENTRAL 7-POINT FORMULA IN THE METHOD OF LINES FOR PARABOLIC AND BURGERS' EQUATIONS IJRRAS 8 (3 September 011 www.arpapress.com/volumes/vol8issue3/ijrras_8_3_08.pdf NON-CENTRAL 7-POINT FORMULA IN THE METHOD OF LINES FOR PARABOLIC AND BURGERS' EQUATIONS H.O. Bakodah Dept. of Mathematc

More information

LINEAR REGRESSION ANALYSIS. MODULE IX Lecture Multicollinearity

LINEAR REGRESSION ANALYSIS. MODULE IX Lecture Multicollinearity LINEAR REGRESSION ANALYSIS MODULE IX Lecture - 30 Multcollnearty Dr. Shalabh Department of Mathematcs and Statstcs Indan Insttute of Technology Kanpur 2 Remedes for multcollnearty Varous technques have

More information

The Chaotic Robot Prediction by Neuro Fuzzy Algorithm (2) = θ (3) = ω. Asin. A v. Mana Tarjoman, Shaghayegh Zarei

The Chaotic Robot Prediction by Neuro Fuzzy Algorithm (2) = θ (3) = ω. Asin. A v. Mana Tarjoman, Shaghayegh Zarei The Chaotc Robot Predcton by Neuro Fuzzy Algorthm Mana Tarjoman, Shaghayegh Zare Abstract In ths paper an applcaton of the adaptve neurofuzzy nference system has been ntroduced to predct the behavor of

More information

Hongyi Miao, College of Science, Nanjing Forestry University, Nanjing ,China. (Received 20 June 2013, accepted 11 March 2014) I)ϕ (k)

Hongyi Miao, College of Science, Nanjing Forestry University, Nanjing ,China. (Received 20 June 2013, accepted 11 March 2014) I)ϕ (k) ISSN 1749-3889 (prnt), 1749-3897 (onlne) Internatonal Journal of Nonlnear Scence Vol.17(2014) No.2,pp.188-192 Modfed Block Jacob-Davdson Method for Solvng Large Sparse Egenproblems Hongy Mao, College of

More information

Psychology 282 Lecture #24 Outline Regression Diagnostics: Outliers

Psychology 282 Lecture #24 Outline Regression Diagnostics: Outliers Psychology 282 Lecture #24 Outlne Regresson Dagnostcs: Outlers In an earler lecture we studed the statstcal assumptons underlyng the regresson model, ncludng the followng ponts: Formal statement of assumptons.

More information

Negative Binomial Regression

Negative Binomial Regression STATGRAPHICS Rev. 9/16/2013 Negatve Bnomal Regresson Summary... 1 Data Input... 3 Statstcal Model... 3 Analyss Summary... 4 Analyss Optons... 7 Plot of Ftted Model... 8 Observed Versus Predcted... 10 Predctons...

More information

Improved Integral Cryptanalysis of FOX Block Cipher 1

Improved Integral Cryptanalysis of FOX Block Cipher 1 Improved Integral Cryptanalyss of FOX Block Cpher 1 Wu Wenlng, Zhang Wentao, and Feng Dengguo State Key Laboratory of Informaton Securty, Insttute of Software, Chnese Academy of Scences, Bejng 100080,

More information

Clock-Gating and Its Application to Low Power Design of Sequential Circuits

Clock-Gating and Its Application to Low Power Design of Sequential Circuits Clock-Gatng and Its Applcaton to Low Power Desgn of Sequental Crcuts ng WU Department of Electrcal Engneerng-Systems, Unversty of Southern Calforna Los Angeles, CA 989, USA, Phone: (23)74-448 Massoud PEDRAM

More information

CSci 6974 and ECSE 6966 Math. Tech. for Vision, Graphics and Robotics Lecture 21, April 17, 2006 Estimating A Plane Homography

CSci 6974 and ECSE 6966 Math. Tech. for Vision, Graphics and Robotics Lecture 21, April 17, 2006 Estimating A Plane Homography CSc 6974 and ECSE 6966 Math. Tech. for Vson, Graphcs and Robotcs Lecture 21, Aprl 17, 2006 Estmatng A Plane Homography Overvew We contnue wth a dscusson of the major ssues, usng estmaton of plane projectve

More information

Speeding up Computation of Scalar Multiplication in Elliptic Curve Cryptosystem

Speeding up Computation of Scalar Multiplication in Elliptic Curve Cryptosystem H.K. Pathak et. al. / (IJCSE) Internatonal Journal on Computer Scence and Engneerng Speedng up Computaton of Scalar Multplcaton n Ellptc Curve Cryptosystem H. K. Pathak Manju Sangh S.o.S n Computer scence

More information

Parameter Estimation for Dynamic System using Unscented Kalman filter

Parameter Estimation for Dynamic System using Unscented Kalman filter Parameter Estmaton for Dynamc System usng Unscented Kalman flter Jhoon Seung 1,a, Amr Atya F. 2,b, Alexander G.Parlos 3,c, and Klto Chong 1,4,d* 1 Dvson of Electroncs Engneerng, Chonbuk Natonal Unversty,

More information

Pop-Click Noise Detection Using Inter-Frame Correlation for Improved Portable Auditory Sensing

Pop-Click Noise Detection Using Inter-Frame Correlation for Improved Portable Auditory Sensing Advanced Scence and Technology Letters, pp.164-168 http://dx.do.org/10.14257/astl.2013 Pop-Clc Nose Detecton Usng Inter-Frame Correlaton for Improved Portable Audtory Sensng Dong Yun Lee, Kwang Myung Jeon,

More information

Grover s Algorithm + Quantum Zeno Effect + Vaidman

Grover s Algorithm + Quantum Zeno Effect + Vaidman Grover s Algorthm + Quantum Zeno Effect + Vadman CS 294-2 Bomb 10/12/04 Fall 2004 Lecture 11 Grover s algorthm Recall that Grover s algorthm for searchng over a space of sze wors as follows: consder the

More information

Appendix B. The Finite Difference Scheme

Appendix B. The Finite Difference Scheme 140 APPENDIXES Appendx B. The Fnte Dfference Scheme In ths appendx we present numercal technques whch are used to approxmate solutons of system 3.1 3.3. A comprehensve treatment of theoretcal and mplementaton

More information

Regularized Discriminant Analysis for Face Recognition

Regularized Discriminant Analysis for Face Recognition 1 Regularzed Dscrmnant Analyss for Face Recognton Itz Pma, Mayer Aladem Department of Electrcal and Computer Engneerng, Ben-Guron Unversty of the Negev P.O.Box 653, Beer-Sheva, 845, Israel. Abstract Ths

More information

The Study of Teaching-learning-based Optimization Algorithm

The Study of Teaching-learning-based Optimization Algorithm Advanced Scence and Technology Letters Vol. (AST 06), pp.05- http://dx.do.org/0.57/astl.06. The Study of Teachng-learnng-based Optmzaton Algorthm u Sun, Yan fu, Lele Kong, Haolang Q,, Helongang Insttute

More information

The Multiple Classical Linear Regression Model (CLRM): Specification and Assumptions. 1. Introduction

The Multiple Classical Linear Regression Model (CLRM): Specification and Assumptions. 1. Introduction ECONOMICS 5* -- NOTE (Summary) ECON 5* -- NOTE The Multple Classcal Lnear Regresson Model (CLRM): Specfcaton and Assumptons. Introducton CLRM stands for the Classcal Lnear Regresson Model. The CLRM s also

More information

Microwave Diversity Imaging Compression Using Bioinspired

Microwave Diversity Imaging Compression Using Bioinspired Mcrowave Dversty Imagng Compresson Usng Bonspred Neural Networks Youwe Yuan 1, Yong L 1, Wele Xu 1, Janghong Yu * 1 School of Computer Scence and Technology, Hangzhou Danz Unversty, Hangzhou, Zhejang,

More information

Recover plaintext attack to block ciphers

Recover plaintext attack to block ciphers Recover plantext attac to bloc cphers L An-Png Bejng 100085, P.R.Chna apl0001@sna.com Abstract In ths paper, we wll present an estmaton for the upper-bound of the amount of 16-bytes plantexts for Englsh

More information

Quantum and Classical Information Theory with Disentropy

Quantum and Classical Information Theory with Disentropy Quantum and Classcal Informaton Theory wth Dsentropy R V Ramos rubensramos@ufcbr Lab of Quantum Informaton Technology, Department of Telenformatc Engneerng Federal Unversty of Ceara - DETI/UFC, CP 6007

More information

arxiv:cs.cv/ Jun 2000

arxiv:cs.cv/ Jun 2000 Correlaton over Decomposed Sgnals: A Non-Lnear Approach to Fast and Effectve Sequences Comparson Lucano da Fontoura Costa arxv:cs.cv/0006040 28 Jun 2000 Cybernetc Vson Research Group IFSC Unversty of São

More information

Transfer Functions. Convenient representation of a linear, dynamic model. A transfer function (TF) relates one input and one output: ( ) system

Transfer Functions. Convenient representation of a linear, dynamic model. A transfer function (TF) relates one input and one output: ( ) system Transfer Functons Convenent representaton of a lnear, dynamc model. A transfer functon (TF) relates one nput and one output: x t X s y t system Y s The followng termnology s used: x y nput output forcng

More information

Appendix B: Resampling Algorithms

Appendix B: Resampling Algorithms 407 Appendx B: Resamplng Algorthms A common problem of all partcle flters s the degeneracy of weghts, whch conssts of the unbounded ncrease of the varance of the mportance weghts ω [ ] of the partcles

More information

Lecture 12: Discrete Laplacian

Lecture 12: Discrete Laplacian Lecture 12: Dscrete Laplacan Scrbe: Tanye Lu Our goal s to come up wth a dscrete verson of Laplacan operator for trangulated surfaces, so that we can use t n practce to solve related problems We are mostly

More information

Annexes. EC.1. Cycle-base move illustration. EC.2. Problem Instances

Annexes. EC.1. Cycle-base move illustration. EC.2. Problem Instances ec Annexes Ths Annex frst llustrates a cycle-based move n the dynamc-block generaton tabu search. It then dsplays the characterstcs of the nstance sets, followed by detaled results of the parametercalbraton

More information

A Hybrid Variational Iteration Method for Blasius Equation

A Hybrid Variational Iteration Method for Blasius Equation Avalable at http://pvamu.edu/aam Appl. Appl. Math. ISSN: 1932-9466 Vol. 10, Issue 1 (June 2015), pp. 223-229 Applcatons and Appled Mathematcs: An Internatonal Journal (AAM) A Hybrd Varatonal Iteraton Method

More information

Week3, Chapter 4. Position and Displacement. Motion in Two Dimensions. Instantaneous Velocity. Average Velocity

Week3, Chapter 4. Position and Displacement. Motion in Two Dimensions. Instantaneous Velocity. Average Velocity Week3, Chapter 4 Moton n Two Dmensons Lecture Quz A partcle confned to moton along the x axs moves wth constant acceleraton from x =.0 m to x = 8.0 m durng a 1-s tme nterval. The velocty of the partcle

More information

An Upper Bound on SINR Threshold for Call Admission Control in Multiple-Class CDMA Systems with Imperfect Power-Control

An Upper Bound on SINR Threshold for Call Admission Control in Multiple-Class CDMA Systems with Imperfect Power-Control An Upper Bound on SINR Threshold for Call Admsson Control n Multple-Class CDMA Systems wth Imperfect ower-control Mahmoud El-Sayes MacDonald, Dettwler and Assocates td. (MDA) Toronto, Canada melsayes@hotmal.com

More information

Improvement of Histogram Equalization for Minimum Mean Brightness Error

Improvement of Histogram Equalization for Minimum Mean Brightness Error Proceedngs of the 7 WSEAS Int. Conference on Crcuts, Systems, Sgnal and elecommuncatons, Gold Coast, Australa, January 7-9, 7 3 Improvement of Hstogram Equalzaton for Mnmum Mean Brghtness Error AAPOG PHAHUA*,

More information

The lower and upper bounds on Perron root of nonnegative irreducible matrices

The lower and upper bounds on Perron root of nonnegative irreducible matrices Journal of Computatonal Appled Mathematcs 217 (2008) 259 267 wwwelsevercom/locate/cam The lower upper bounds on Perron root of nonnegatve rreducble matrces Guang-Xn Huang a,, Feng Yn b,keguo a a College

More information

Problem Set 9 Solutions

Problem Set 9 Solutions Desgn and Analyss of Algorthms May 4, 2015 Massachusetts Insttute of Technology 6.046J/18.410J Profs. Erk Demane, Srn Devadas, and Nancy Lynch Problem Set 9 Solutons Problem Set 9 Solutons Ths problem

More information

Markov Chain Monte Carlo Lecture 6

Markov Chain Monte Carlo Lecture 6 where (x 1,..., x N ) X N, N s called the populaton sze, f(x) f (x) for at least one {1, 2,..., N}, and those dfferent from f(x) are called the tral dstrbutons n terms of mportance samplng. Dfferent ways

More information

EEE 241: Linear Systems

EEE 241: Linear Systems EEE : Lnear Systems Summary #: Backpropagaton BACKPROPAGATION The perceptron rule as well as the Wdrow Hoff learnng were desgned to tran sngle layer networks. They suffer from the same dsadvantage: they

More information

Application of B-Spline to Numerical Solution of a System of Singularly Perturbed Problems

Application of B-Spline to Numerical Solution of a System of Singularly Perturbed Problems Mathematca Aeterna, Vol. 1, 011, no. 06, 405 415 Applcaton of B-Splne to Numercal Soluton of a System of Sngularly Perturbed Problems Yogesh Gupta Department of Mathematcs Unted College of Engneerng &

More information

Comparative Studies of Law of Conservation of Energy. and Law Clusters of Conservation of Generalized Energy

Comparative Studies of Law of Conservation of Energy. and Law Clusters of Conservation of Generalized Energy Comparatve Studes of Law of Conservaton of Energy and Law Clusters of Conservaton of Generalzed Energy No.3 of Comparatve Physcs Seres Papers Fu Yuhua (CNOOC Research Insttute, E-mal:fuyh1945@sna.com)

More information

Note 10. Modeling and Simulation of Dynamic Systems

Note 10. Modeling and Simulation of Dynamic Systems Lecture Notes of ME 475: Introducton to Mechatroncs Note 0 Modelng and Smulaton of Dynamc Systems Department of Mechancal Engneerng, Unversty Of Saskatchewan, 57 Campus Drve, Saskatoon, SK S7N 5A9, Canada

More information

Construction and Chaos Properties Analysis of a Quadratic Polynomial Surjective Map

Construction and Chaos Properties Analysis of a Quadratic Polynomial Surjective Map INTERNATIONAL JOURNAL OF CIRCUITS, SYSTEMS AND SIGNAL PROCESSING Volume, 7 Constructon and Chaos Propertes Analyss of a Quadratc Polynomal Surjectve Map Jun Tang, Janghong Sh, Zhenmao Deng Abstract In

More information

Support Vector Machines. Vibhav Gogate The University of Texas at dallas

Support Vector Machines. Vibhav Gogate The University of Texas at dallas Support Vector Machnes Vbhav Gogate he Unversty of exas at dallas What We have Learned So Far? 1. Decson rees. Naïve Bayes 3. Lnear Regresson 4. Logstc Regresson 5. Perceptron 6. Neural networks 7. K-Nearest

More information

NP-Completeness : Proofs

NP-Completeness : Proofs NP-Completeness : Proofs Proof Methods A method to show a decson problem Π NP-complete s as follows. (1) Show Π NP. (2) Choose an NP-complete problem Π. (3) Show Π Π. A method to show an optmzaton problem

More information

Operating conditions of a mine fan under conditions of variable resistance

Operating conditions of a mine fan under conditions of variable resistance Paper No. 11 ISMS 216 Operatng condtons of a mne fan under condtons of varable resstance Zhang Ynghua a, Chen L a, b, Huang Zhan a, *, Gao Yukun a a State Key Laboratory of Hgh-Effcent Mnng and Safety

More information

Chapter 11: Simple Linear Regression and Correlation

Chapter 11: Simple Linear Regression and Correlation Chapter 11: Smple Lnear Regresson and Correlaton 11-1 Emprcal Models 11-2 Smple Lnear Regresson 11-3 Propertes of the Least Squares Estmators 11-4 Hypothess Test n Smple Lnear Regresson 11-4.1 Use of t-tests

More information

2E Pattern Recognition Solutions to Introduction to Pattern Recognition, Chapter 2: Bayesian pattern classification

2E Pattern Recognition Solutions to Introduction to Pattern Recognition, Chapter 2: Bayesian pattern classification E395 - Pattern Recognton Solutons to Introducton to Pattern Recognton, Chapter : Bayesan pattern classfcaton Preface Ths document s a soluton manual for selected exercses from Introducton to Pattern Recognton

More information

Composite Hypotheses testing

Composite Hypotheses testing Composte ypotheses testng In many hypothess testng problems there are many possble dstrbutons that can occur under each of the hypotheses. The output of the source s a set of parameters (ponts n a parameter

More information

Cryptography System for Information Security Using Chaos Arnold's Cat Map Function

Cryptography System for Information Security Using Chaos Arnold's Cat Map Function 4 th ICRIEMS Proceedngs Publshed by The Faculty Of Mathematcs And Natural Scences Yogyakarta State Unversty, ISBN 978-602-74529-2-3 Cryptography System for Informaton Securty Usng Chaos Arnold's Cat Map

More information

LOW BIAS INTEGRATED PATH ESTIMATORS. James M. Calvin

LOW BIAS INTEGRATED PATH ESTIMATORS. James M. Calvin Proceedngs of the 007 Wnter Smulaton Conference S G Henderson, B Bller, M-H Hseh, J Shortle, J D Tew, and R R Barton, eds LOW BIAS INTEGRATED PATH ESTIMATORS James M Calvn Department of Computer Scence

More information

An Improved multiple fractal algorithm

An Improved multiple fractal algorithm Advanced Scence and Technology Letters Vol.31 (MulGraB 213), pp.184-188 http://dx.do.org/1.1427/astl.213.31.41 An Improved multple fractal algorthm Yun Ln, Xaochu Xu, Jnfeng Pang College of Informaton

More information

GEMINI GEneric Multimedia INdexIng

GEMINI GEneric Multimedia INdexIng GEMINI GEnerc Multmeda INdexIng Last lecture, LSH http://www.mt.edu/~andon/lsh/ Is there another possble soluton? Do we need to perform ANN? 1 GEnerc Multmeda INdexIng dstance measure Sub-pattern Match

More information

Solving Fractional Nonlinear Fredholm Integro-differential Equations via Hybrid of Rationalized Haar Functions

Solving Fractional Nonlinear Fredholm Integro-differential Equations via Hybrid of Rationalized Haar Functions ISSN 746-7659 England UK Journal of Informaton and Computng Scence Vol. 9 No. 3 4 pp. 69-8 Solvng Fractonal Nonlnear Fredholm Integro-dfferental Equatons va Hybrd of Ratonalzed Haar Functons Yadollah Ordokhan

More information

Irregular vibrations in multi-mass discrete-continuous systems torsionally deformed

Irregular vibrations in multi-mass discrete-continuous systems torsionally deformed (2) 4 48 Irregular vbratons n mult-mass dscrete-contnuous systems torsonally deformed Abstract In the paper rregular vbratons of dscrete-contnuous systems consstng of an arbtrary number rgd bodes connected

More information

Econ107 Applied Econometrics Topic 3: Classical Model (Studenmund, Chapter 4)

Econ107 Applied Econometrics Topic 3: Classical Model (Studenmund, Chapter 4) I. Classcal Assumptons Econ7 Appled Econometrcs Topc 3: Classcal Model (Studenmund, Chapter 4) We have defned OLS and studed some algebrac propertes of OLS. In ths topc we wll study statstcal propertes

More information

Notes on Frequency Estimation in Data Streams

Notes on Frequency Estimation in Data Streams Notes on Frequency Estmaton n Data Streams In (one of) the data streamng model(s), the data s a sequence of arrvals a 1, a 2,..., a m of the form a j = (, v) where s the dentty of the tem and belongs to

More information

The L(2, 1)-Labeling on -Product of Graphs

The L(2, 1)-Labeling on -Product of Graphs Annals of Pure and Appled Mathematcs Vol 0, No, 05, 9-39 ISSN: 79-087X (P, 79-0888(onlne Publshed on 7 Aprl 05 wwwresearchmathscorg Annals of The L(, -Labelng on -Product of Graphs P Pradhan and Kamesh

More information

Attacks on RSA The Rabin Cryptosystem Semantic Security of RSA Cryptology, Tuesday, February 27th, 2007 Nils Andersen. Complexity Theoretic Reduction

Attacks on RSA The Rabin Cryptosystem Semantic Security of RSA Cryptology, Tuesday, February 27th, 2007 Nils Andersen. Complexity Theoretic Reduction Attacks on RSA The Rabn Cryptosystem Semantc Securty of RSA Cryptology, Tuesday, February 27th, 2007 Nls Andersen Square Roots modulo n Complexty Theoretc Reducton Factorng Algorthms Pollard s p 1 Pollard

More information

On the Interval Zoro Symmetric Single-step Procedure for Simultaneous Finding of Polynomial Zeros

On the Interval Zoro Symmetric Single-step Procedure for Simultaneous Finding of Polynomial Zeros Appled Mathematcal Scences, Vol. 5, 2011, no. 75, 3693-3706 On the Interval Zoro Symmetrc Sngle-step Procedure for Smultaneous Fndng of Polynomal Zeros S. F. M. Rusl, M. Mons, M. A. Hassan and W. J. Leong

More information

Report on Image warping

Report on Image warping Report on Image warpng Xuan Ne, Dec. 20, 2004 Ths document summarzed the algorthms of our mage warpng soluton for further study, and there s a detaled descrpton about the mplementaton of these algorthms.

More information

A New Metric for Quality Assessment of Digital Images Based on Weighted-Mean Square Error 1

A New Metric for Quality Assessment of Digital Images Based on Weighted-Mean Square Error 1 A New Metrc for Qualty Assessment of Dgtal Images Based on Weghted-Mean Square Error Proceedngs of SPIE, vol. 4875, 2002 Kawen Zhang, Shuozhong Wang, and Xnpen Zhang School of Communcaton and Informaton

More information

Suppose that there s a measured wndow of data fff k () ; :::; ff k g of a sze w, measured dscretely wth varable dscretzaton step. It s convenent to pl

Suppose that there s a measured wndow of data fff k () ; :::; ff k g of a sze w, measured dscretely wth varable dscretzaton step. It s convenent to pl RECURSIVE SPLINE INTERPOLATION METHOD FOR REAL TIME ENGINE CONTROL APPLICATIONS A. Stotsky Volvo Car Corporaton Engne Desgn and Development Dept. 97542, HA1N, SE- 405 31 Gothenburg Sweden. Emal: astotsky@volvocars.com

More information

On balancing multiple video streams with distributed QoS control in mobile communications

On balancing multiple video streams with distributed QoS control in mobile communications On balancng multple vdeo streams wth dstrbuted QoS control n moble communcatons Arjen van der Schaaf, José Angel Lso Arellano, and R. (Inald) L. Lagendjk TU Delft, Mekelweg 4, 68 CD Delft, The Netherlands

More information

Impossible differential attacks on 4-round DES-like ciphers

Impossible differential attacks on 4-round DES-like ciphers INENAIONA JOUNA OF COMPUES AND COMMUNICAIONS Volume 9, 2015 Impossble dfferental attacks on 4-round DES-lke cphers Pavol Zajac Abstract Data Encrypton Standard was a man publc encrypton standard for more

More information

Chaos-Based Cryptography: End of the Road?

Chaos-Based Cryptography: End of the Road? Internatonal Conference on Emergng ecurty Informaton, ystems and Technologes Chaos-Based Cryptography: End of the Road? Danel-Ioan Curac, Danel Iercan Poltehnca Unversty Tmsoara, Romana danel.curac@aut.upt.ro

More information

Computation of Higher Order Moments from Two Multinomial Overdispersion Likelihood Models

Computation of Higher Order Moments from Two Multinomial Overdispersion Likelihood Models Computaton of Hgher Order Moments from Two Multnomal Overdsperson Lkelhood Models BY J. T. NEWCOMER, N. K. NEERCHAL Department of Mathematcs and Statstcs, Unversty of Maryland, Baltmore County, Baltmore,

More information

Supplementary Notes for Chapter 9 Mixture Thermodynamics

Supplementary Notes for Chapter 9 Mixture Thermodynamics Supplementary Notes for Chapter 9 Mxture Thermodynamcs Key ponts Nne major topcs of Chapter 9 are revewed below: 1. Notaton and operatonal equatons for mxtures 2. PVTN EOSs for mxtures 3. General effects

More information

Comparison of Regression Lines

Comparison of Regression Lines STATGRAPHICS Rev. 9/13/2013 Comparson of Regresson Lnes Summary... 1 Data Input... 3 Analyss Summary... 4 Plot of Ftted Model... 6 Condtonal Sums of Squares... 6 Analyss Optons... 7 Forecasts... 8 Confdence

More information

Chapter 9: Statistical Inference and the Relationship between Two Variables

Chapter 9: Statistical Inference and the Relationship between Two Variables Chapter 9: Statstcal Inference and the Relatonshp between Two Varables Key Words The Regresson Model The Sample Regresson Equaton The Pearson Correlaton Coeffcent Learnng Outcomes After studyng ths chapter,

More information

A Network Intrusion Detection Method Based on Improved K-means Algorithm

A Network Intrusion Detection Method Based on Improved K-means Algorithm Advanced Scence and Technology Letters, pp.429-433 http://dx.do.org/10.14257/astl.2014.53.89 A Network Intruson Detecton Method Based on Improved K-means Algorthm Meng Gao 1,1, Nhong Wang 1, 1 Informaton

More information

Uncertainty and auto-correlation in. Measurement

Uncertainty and auto-correlation in. Measurement Uncertanty and auto-correlaton n arxv:1707.03276v2 [physcs.data-an] 30 Dec 2017 Measurement Markus Schebl Federal Offce of Metrology and Surveyng (BEV), 1160 Venna, Austra E-mal: markus.schebl@bev.gv.at

More information

Comment on An arbitrated quantum signature scheme. with fast signing and verifying

Comment on An arbitrated quantum signature scheme. with fast signing and verifying Comment on n arbtrated quantum sgnature scheme wth fast sgnng and verfyng Y-Png Luo and Tzonelh Hwang * Department of Computer cence and Informaton Engneerng, Natonal Cheng ung Unversty, No, Unversty Rd,

More information