A Non-symmetric Digital Image Secure Communication Scheme Based on Generalized Chaos Synchronization System

Size: px
Start display at page:

Download "A Non-symmetric Digital Image Secure Communication Scheme Based on Generalized Chaos Synchronization System"

Transcription

1 Commun. Theor. Phys. (Beijing China) 44 (2005) pp c International Academic Publishers Vol. 44 No. 6 December A Non-symmetric Digital Image Secure Communication Scheme Based on Generalized Chaos Synchronization System ZHANG Xiao-Hong 12 and MIN Le-Quan 1 1 Applied Science School and Information Engineering School University of Science and Technology Beijing Beijing China 2 Information Engineering School Jiangxi University of Science and Technology Ganzhou China (Received April ) Abstract Based on a generalized chaos synchronization system and a discrete Sinai map a non-symmetric true color (RGB) digital image secure communication scheme is proposed. The scheme first changes an ordinary RGB digital image with 8 bits into unrecognizable disorder codes and then transforms the disorder codes into an RGB digital image with 16 bits for transmitting. A receiver uses a non-symmetric key to verify the authentication of the received data origin and decrypts the ciphertext. The scheme can encrypt and decrypt most formatted digital RGB images recognized by computers and recover the plaintext almost without any errors. The scheme is suitable to be applied in network image communications. The analysis of the key space sensitivity of key parameters and correlation of encrypted images imply that this scheme has sound security. PACS numbers: Sn Xt Vx Pq Key words: generalized chaos synchronization Sinai map image confusion non-symmetric key data origin authentication network communication 1 Introduction Chaos is one type of complex dynamic behaviors generated by determined nonlinear dynamic systems but is similar to statistic process. A chaos signal has the characteristics of aperiodicity continuous wide spectrum similarity to noise and so on. In the past decade the study of chaos-based secure communication systems has been fascinatingly developed. [1 19] Recently the Generalized Chaos Synchronization (GCS) approaches have also been gradually developed [ ] which may provided new tools for constructing secure communication systems. [ ] In recent papers [232526] several text secure communication schemes have been proposed via GCS systems. Network communication has become a main tool for information distributions. Digital image transformations have played more and more roles. In this paper a nonsymmetric GCS-based digital true color (RGB) image encryption scheme is proposed. The scheme uses the chaotic source signals generated by the responding system in a GCS system and a discrete Sinai map to encrypt RGB images. A receiver may use his non-symmetric keys for the authentication of received data origin without communication with the sender of the data origin. Theoretical analysis experimental simulation and statistical analysis show that this scheme is extreme sensitivity to keys and has a large key space sound security and university. Our researches imply that the digital image encryption scheme may be used in digital image network communications. 2 Digital Image Secure Communication Scheme 2.1 Some Basics Firstly let us remember the definition on GCS and a GCS theorem to be used for constructing chaotic source generators. Definition 1 be (Similar to Refs. [6] and [20]) Let systems Ẋ = F (X) (1) Ẏ = G(Y X m ) (2) X(t) = (x 1 (t) x 2 (t)... x n (t)) T R n Y R m (3) X m (t) = (x 1 (t) x 2 (t)... x m (t)) T m n (4) F (X) = (f 1 (X) f 2 (X)... f n (X)) T (5) G(Y X m ) = (g 1 (Y X m ) g 2 (Y X m )... g m (Y X m )) T. (6) System (1) is called the driving system and system (2) is said to be the responding system. The two systems The project supported by National Natural Science Foundation of China under Grant Nos and the Foundation for University Key Teachers and the Research Fund for the Doctoral Program of Higher Education under Grant No by the Ministry of Education of China Correspondence author lqmin@sohu.com

2 1116 ZHANG Xiao-Hong and MIN Le-Quan Vol. 44 are said to be in GCS with respect to a transformation H : R m R m if there exists an open subset B = B X B Y R n R m such that any trajectory (X(t) Y (t)) of systems (1) and (2) with initial conditions (X(0) Y (0)) B has the property: lim t + X m(t) H 1 (Y (t)) = 0. Theorem 1 [20] Let X X m Y F (X) and G(Y X) be defined by Eqs. (1) (6). Suppose that H : R m R m is a C 1 diffeomorphism and X m = V (Y ) is the inverse function of H. If systems (1) and (2) are in GCS via transformation Y = H(X m ) then the function G(Y X) in Eq. (2) takes the following form: G(Y X) = [ V (Y )] 1 [F m (X) q(x m Y )] (7) V 1 V 1 y 1 y 2 V 2 V 2 y V (Y ) = 1 y 2 V m V m y 1 y 2 and the function V 1 y m V 2 y m (8) V m y m F m (X) = (f 1 (X) f 2 (X)... f m (X)) T (9) q(x m Y ) = (q 1 (X m Y ) q 2 (X m Y )... q m (X m Y )) T guarantees that the zero solution of the error equation (10) ė = Ẋm V (Y )Ẏ = q(x m Y ) (10) is asymptotically stable. In subsection 2.2 we shall first construct a Lorenz GCS system by means of Theorem 1. A non-symmetric digital RGB image secure communication scheme will be presented in subsection 2.3 via the discrete Sinai map. 2.2 GCS System Let the driving system Ẋ = F (X) be the Lorenz system ẋ 1 = f 1 (X) = σ(x 1 x 2 ) ẋ 2 = f 2 (X) = γx 1 x 2 x 1 x 3 ẋ 3 = f 3 (X) = x 1 x 2 βx 3. (11) Now construct a diffeomorphism H : R 3 R 3 as follows: H(X) = (h 1 (X) h 2 (X) h 3 (X)) T = ( 4 e x 1/20 h(x) 3 ex2/15 h(x) 5 ) ex3/18 (12) h(x) h(x) = ( e x1/20 e x2/ e x2/15 e x3/ e x1/20 e x3/18 ). (13) Then V (Y ) = (V 1 (Y ) V 2 (Y ) V 3 (Y )) (14) V 1 (Y ) = 20[ln(15y 1 ) ln( )] (15) V 2 (Y ) = 15[ln(20y 2 ) ln( )] (16) V 3 (Y ) = 18[ln(12y 3 ) ln( )]. (17) It follows that a 11 a 12 a 13 V (Y ) = a 21 a 22 a 23 a 31 a 32 a 33 a 11 = 160y 2 y 3 y 1 ( ) 20(5y 1 + 8y 3 ) a 12 = 20(9y 1 + 8y 2 ) a 13 = 15(5y 2 + 9y 3 ) a 21 = a 22 = 135y 1 y 3 y 2 ( ) 15(9y 1 + 8y 2 ) a 23 = 18(5y 2 + 9y 3 ) a 31 = 18(5y 1 + 8y 3 ) a 32 = a 33 = 90y 1 y 2 y 3 ( ). Consequently b 11 b 12 b 13 [ V (Y )] 1 = b 21 b 22 b 23 b 31 b 32 b 33 b 11 = 2y 1 y 2 y 3 5( ) y 1 y 2 (5y 1 + 8y 3 ) b 12 = 15( ) y 1 y 3 (9y 1 + 8y 2 ) b 13 = 18( ) y 1 y 2 (5y 2 + 9y 3 ) b 21 = 20( ) b 22 = 3y 1 y 2 y 3 5( ) y 2 y 3 (9y 1 + 8y 2 ) b 23 = 18( )

3 No. 6 A Non-symmetric Digital Image Secure Communication Scheme Based on Generalized Chaos Synchronization System 1117 Let y 1 y 3 (5y 2 + 9y 3 ) b 31 = 20( ) y 2 y 3 (5y 1 + 8y 3 ) b 32 = 15( ) b 33 = 5y 1 y 2 y 3 18( ). q(x Y ) = (q 1 (X Y ) q 2 (X Y ) q 3 (X Y )) T = (V 1 (Y ) x 1 V 2 (Y ) x 2 V 3 (Y ) x 3 ) G(Y X) = [ V (Y )] 1 [F (X) q(x Y )]. Then from Theorem 1 we obtain the responding system Ẏ = G(Y X). (18) Select the initial states of the systems (11) and (18) as follows: and X(0) = (x 1 (0) x 2 (0) x 3 (0)) = ( ) (19) Y (0) = (y 1 (0) y 2 (0) y 3 (0)) = (h 1 (X(0)) h 2 (X(0)) h 3 (X(0))). (20) The trajectories of the GCS system are shown in Fig. 1. It can be seen that the state variables X and Y are in GCS with respect to the transformation V. Fig. 1 Chaotic trajectories of the state variables. (a) x 1 x 2 and x 3; (b) y 1 y 2 and y 3; (c) the decoded trajectory; (d) the variables are in chaotic GCS via a transformation V Sinai Map Discrete Sinai map is a 2-dimensional chaotic system. The representation of Sinai map has the form x n+1 = x n + y n + α cos(2πy n ) mod (1) y n+1 = x n + 2y n mod (1) (21) α [0 1]. From the Sinai EQ. it follows that 0 x n 1 0 y n 1. Let (x(0) y(0)) = (0 0). (22) Then figures 2(a) 2(c) show the positions of the points (x n y n ) of the first 1000 iterations of Sinai maps with pa-

4 1118 ZHANG Xiao-Hong and MIN Le-Quan Vol. 44 rameters α = and 0.99 respectively. It can be seen that the Sinai map with parameter α = 0.01 has an orbit with uniform density. Fig. 2 The orbits of Sinai maps for the first 1000 iterations. (a) α = 0.01 (b) α = 0.30 (c) α = Digital Image Secure Communication Scheme Popular digital images recognized by Matlab are classified into three kinds: (i) RGB images. An RGB image can be represented as an m n 3 data matrix m n stand for the rows and the columns of the pixels in the image and 3 represents 3 color planes red green and blue each plane with 256 levels of intensity denoted as (R G B). Such an image is called an RGB 24 bitmap. Since each color has an 8-bit binary system representation there are altogether 2 24 kinds of colors. (ii) Index images. An index image includes a data matrix X and a color map matrix P. P is an m 3 data matrix and 3 represents 3 color planes red green and blue with double accuracy in [0 1] of intensity. (iii) Intensity images. An intensity image is a gray scale image consisting of one gray scale intensity m n matrix. The gray scale intensity at each pixel (i j) is a double accuracy value in [0 1]. Now let us describe the image communication scheme for the case that the image to be sent is an RGB image. In the cases of other kind images the scheme is still effective after slightly amending. Assume that sender A has the systems (11) and (18) and receiver B holds the system (11) non-symmetric key K n = (V 1 V 2 ) defined by Eqs. (15) and (16). Both A and B have three Sinai maps (21) with system parameter α = and A and B share a symmetric keys K s = {k1 k 2 k 3 k 4 k 5 k 6 k 7 k 8 k 9 }. Here {k 1 k 2 k 3 } = {σ γ β} which are the parameters of the Lorenz equation; {k 4 k 5 k 6 } = {k x1(0) k x2(0) k x3(0)} which are real numbers to be used to encrypt the initial X(0) conditions of the Lorenz equation in our cryptographic algorithm; {k 7 k 8 k 9 } = {α x(0) y(0)} α x(0) and y(0) are the parameter and the initial condition of the Sinai map (21) respectively. The sender A and the receiver B hold a meeting before the remote transmission start and agree on iterate times 2N for the Lorenz equation and N for the Sinai map N = m n is the number of all the pixels of the image (m rows and n columns) received by B. Now sender A wants to transmit an RGB image M to receiver B. Denote the level of intensity of the 3 color planes as g(r) g(g) and g(b) respectively. The following procedure describes our secure communication scheme: (i) Sender A first uses the GCS systems (11) and (18) with initial conditions (19) and (20) to generate a chaotic trajectory (X(t) Y (t)) as shown in Fig. 1. Then the sender A uses the chaotic signal y 1 (t) to diffuse the intensity of the 3 color planes red green and blue by c 1 = g(r) + round(kkk 1 reshap(y 1 (m n + 1 : 2m n) m n)) + round(kk 1 reshap(ys 1 m n)) + round(200 reshap(x 1 (m n + 1 : 2m n) m n) reshap(xs 1 m n)) + round(400 reshap(y 1 (m n + 1 : 2m n) m n) reshap(ys 2 + xs 3 m n)) c 2 = g(g) + round(kkk 2 reshap(y 1 (m n + 1 : 2m n) m n))

5 No. 6 A Non-symmetric Digital Image Secure Communication Scheme Based on Generalized Chaos Synchronization System round(kk 2 reshap(ys 2 m n)) + round(150 reshap(x 2 (m n + 1 : 2m n) m n) reshap(xs 2 m n)) + round(300 reshap(y 1 (m n + 1 : 2m n) m n) reshap(ys 3 + xs 1 m n)) c 3 = g(b) + round(kkk 3 reshap(y 1 (m n + 1 : 2m n) m n)) + round(kk 3 reshap(ys 3 m n)) + round(250 reshap(x 3 (m n + 1 : 2m n) m n) reshap(xs 3 m n)) + round(500 reshap(y 1 (m n + 1 : 2m n) m n) reshap(ys 1 + xs 2 m n)) (x 1 x 2 x 3 ) are the trajectory of Eq. (11) y 1 is the component of the trajectory of Eq. (18) and (xs i ys i ) (i = 1 2 3) are the trajectories of the Sinai maps with parameters α = respectively. A B represents the cross product of two matrices A and B. kk 1 = 4.5e + 4 kkk 1 = 3e + 4 kk 2 = 4.8e + 4 kkk 2 = 2e + 4 kk 3 = 5e + 4 kkk 3 = 1.5e + 4. (23) Then sender A transforms these array data into a 16-bit RGB ciphertext image: (c 1 c 2 c 3 ) C = (g (R) g (G) g (B)). (ii) Sender A transmits the diffused initial condition X(0) + (k x1(0) k x2(0) k x3(0)) the ciphertext C and a tag σ = y 2 + C to receiver B. (iii) Receiver B uses the keys {k 4 k 5 k 6 } = {k x1(0) k x2(0) k x3(0)} to figure out the initial condition X(0) and then solves the system (11) and obtains the trajectory X. (iv) Receiver B uses the key K n and X to obtain y 1 y 2. (v) Receiver B calculates = σ y 2. If C then B stops decrypting otherwise goes to step (vi). (vi) Receiver B uses the inverse procedures of the steps 2 and 1 to decrypt the ciphertext and obtains the plaintext M. Remarks This scheme uses two chaotic systems to encrypt the plaintext. Therefore ciphertext has stronger ability against the attack than one chaos system based encryption scheme. Since the GCS system has been used the scheme has a data origin authentication function which is difficult to be realized in the chaos synchronization based scheme. Since a receiver only knows partially the diffeomorphism function V = (V 1 V 2 V 3 ) he cannot reconstruct the GCS responding system (18). Consequently as tools of encryption GCS systems have higher security than chaos synchronization systems. 3 Experiment Simulation Our scheme can be realized by using Matlab 6.1. We select a plain-image M: flowers.tif stored in \matlab6p1\ toolbox\images\imdemos. The picture M is a 8-bit RGB image. We use the scheme described in Sec Here N = m n = Our simulation results are shown in Fig. 3. It can be seen that the original image flowers.tif (Fig. 3(a)) has been successfully changed into un-recognizable disorder codes (Fig. 3(b)). The decrypted image is shown in Fig. 3(c) which is almost the same as the original image that is the maximum error and the mean error between the levels of intensity of the color planes {g(r) g(g) g(b)} of the original image Fig. 3(a) and the decrypted image (see Fig. 3(c)) are 1 and respectively. We have also used the scheme to encrypt and decrypt some other kinds of digital images which can be recognized by computer (For examples:.bmp.jpg.jpeg.tif.tag.gif.hdf.png.xwd.pcd.ico.cur). The similar results are

6 1120 ZHANG Xiao-Hong and MIN Le-Quan Vol. 44 obtained. This implies that our GCS-based encryption scheme has universality. Fig. 3 (a) Original image; (b) Encrypted image; (c) Decrypted image. 4 Security Analysis A good encryption scheme should resist all kinds of known attacks. In the following subsections key space analysis and statistical analysis are given. The results show that our scheme has satisfactory security. 4.1 Key Space and Sensitivity Analysis Key space The symmetric key used in the scheme is double precision numbers. We take that K s = {k 1 k 2 k 3 k 4 k 5 k 6 k 7 k 8 k 9 } to be decimals with 16 characters long. Consequently our symmetric key space size is > Additionally the space size of our non-symmetric key K n = (V 1 V 2 ) is uncountable. Therefore the key space of our scheme should be large enough for the requirements of secure communications. Key sensitivity test The key sensitivity test is proceeded as follows. (i) The image flowers.tif is encrypted by using the key K s as above. (ii) The key K s is slightly perturbed in nine fashions: K s ( i ) = K s + [ δ }{{} i ] (24) i i = δ i = (iii) Using the four of the nine perturbed keys encrypts the image flowers.tif respectively. (iv) Compare the five encrypted images each other. Table 1 lists the percentages of numbers of pixels with different RGB values in the images encrypted via two keys and the means of different RGB values in the images. (v) Compare the image flowers.tif with the decrypted flowers.tif image G ij which is encrypted by key K( i ) but decrypted via key K( j ). The comparison results are given in Table 2 in which the two values at position (K s ( i ) K s ( j )) stand for (a) The percentages of the numbers of the pixels with different RGB values in the flowers.tif and G ij ; (b) The mean of the different RGB values in the two images. Table 1 Comparisons between two images encrypted by keys K s( i) and K s( j). %/mean K s K s( 1 ) K s( 4 ) K s( 7 ) K s( 8 ) K s 0%/ %/ %/ %/ %/16003 K s( 1 ) 99.98%/2417 0%/ %/ %/ %/16219 K s( 4 ) 99.98%/ %/2407 0%/ %/ %/16219 K s( 7 ) 99.98%/ %/ %/ %/ %/15995 Table 2 Comparisons between flowers.tif and G ij. %/mean K s K s( 1 ) K s( 4 ) K s( 7 ) K s( 8 ) K s 0%/ %/ %/ %/ %/ K s( 1 ) 99.26%/ %/ %/ %/ %/ K s( 4 ) 99.15%/ %/ %/ %/ %/ K s( 7 ) 99.25%/ %/ %/ %/ %/ K s( 8 ) 99.25%/ %/ %/ %/ %/0

7 No. 6 A Non-symmetric Digital Image Secure Communication Scheme Based on Generalized Chaos Synchronization System Discussions (i) Table 1 shows that encrypted images are very sensitive to perturbations of the keys k1 k4 k7 k8. In fact our computer simulation shows that encrypted images are also very sensitive to perturbations of the other 5 keys. (ii) Table 2 shows that decrypted images are very sensitive to perturbations of keys k1 k4 k7 k8. Any attempt that wants to use sightly modified keys to decrypt the encrypted images completely fails. The similar results can also be obtained for the perturbations of other 5 keys. (iii) Figures 4(a) 4(c) are the images that are encrypted by the same key Ks but decrypted via keys 1121 Ks ( 1 ) Ks ( 4 ) Ks ( 7 ) Ks ( 8 ). Table 2 shows that in these images the colors of about 80 /00 pixels are recovered correctly only. Figure 4 illustrates graphically the recovered colors of 80 /00 pixels are useless for recognizing the original image flowers.tif. (iv) We have also found that almost the same results can be obtained if using lager modified keys (10 1 perturbation) decrypts the images encrypted by unmodified one. The results imply that an intruder cannot judge from his decrypted images which one of his two approximate keys is closer to the real key even though one key is different from the real key by 10 1 and another by only. Fig. 4 Images generated via different encrypting keys and decrypting keys. (a) K( 0 ) and K( 1 ); (b) K( 0 ) and K( 4 ); (c) K( 0 ) and K( 7 ); (d) K( 0 ) and K( 8 ). In summary the sensitivity of key for decrypted images makes intruders difficult to decrypt ciphertexts. The results imply that intruders may not recognize two encrypted images to be the same one if sender uses slightly different initial values (X(0) ). Consequently our scheme may have the task similar to one-time pad scheme. 4.2 Statistical Analysis First let us compare the histograms between the plain-image (original image) and the encrypted image. Select the original color image flowers.tif shown in Fig. 3(a). The histograms of the intensity level of its three color planes are shown in the first row in Fig. 5. The graphs given in the second row in Fig. 5 are the histograms of the intensity level

8 1122 ZHANG Xiao-Hong and MIN Le-Quan Vol. 44 of the encrypted image shown in Fig. 3(b). It can be seen that the histograms of the ciphered images are fairly uniform and are significantly different from those of the plain-image. Fig. 5 RGB histograms. The first line is the RGB histograms of the original images; The second line is the RGB histograms of the encrypted images by the key K s. Secondly similar to the study given in Ref. [16] we discuss the correlations of two adjacent pixels in the original image flowers.tif and encrypted images. To test the correlation between two vertically adjacent pixels in a ciphered image the following procedure is carried out. First select all pairs of two adjacent pixels from the image flowers.tif. Then calculate the correlation coefficient of each pair by using the following formulas (25) (32). Our statistical analysis implies that the encryption algorithm posed here has superior confusion and diffusion properties which can strongly resist statistical attacks. Let P be an image with dimension m n the image grayscales of the color planes (red green and blue) at the position (i j) are denoted by x 1 ij x 2 ij x 3 ij respectively. The corresponding gray matrices are written as g x (R) g x (G) g x (B). Denote y 1 ij (= x 1 ij+1 ) y 2 ij (= x 2 ij+1 ) y 3 ij (= x 3 ij+1 ) as the gray-scales of the three color planes of the pixel which are on the right side of the pixel at the position (i j). Denote E(X k ) = E(Y k ) = D(X k ) = 1 m (n 1) 1 m (n 1) 1 m (n 1) m n 1 x k ij (25) i=1 j=1 m n 1 y k ij (26) i=1 j=1 m n 1 (x k ij E(X k )) 2 (27) i=1 j=1

9 No. 6 A Non-symmetric Digital Image Secure Communication Scheme Based on Generalized Chaos Synchronization System 1123 D(Y k ) = cov(x k Y k ) = 1 m (n 1) m n 1 (y k ij E(Y k )) 2 (28) i=1 j=1 1 m (n 1) m n 1 (x k ij E(X k )) i=1 j=1 (y k ij E(Y k )) k = (29) Then the correlation coefficients of the gray matrices g x (R) g x (G) g x (B) can be defined respectively by r R = cov(x 1 Y 1 ) D(X1 )) D(Y 1 ) (30) r G = r B = cov(x 2 Y 2 ) D(X2 )) D(Y 2 ) (31) cov(x 3 Y 3 ) D(X3 )) D(Y 3 ). (32) Figure 6 shows the correlation distribution of two vertically adjacent pixels in the image flowers.tif and that in the cipherimage for three color planes. The correlation coefficients are and respectively which are remarkably different from each other. Fig. 6 Correlations of two vertically adjacent pixels in the original images (a) (b) (c) and in the encrypted images (d) (e) and (f). 5 Concluding Remarks GCS system provides a new tool for secure communication. Based on a recent GCS theorem 1 [20] and the well-known Lorenz equation this paper constructs a GCS system. Combing the GCS system and the Sinai map a non-symmetric digital image encryption scheme is proposed. The scheme has a data origin authentication function and large key space. The sensitivity of the keys and the uniformity of the histograms of encrypted images imply that the new secure communication scheme is a promising candidates for images transmission. This scheme may be suitable for network image encryption.

10 1124 ZHANG Xiao-Hong and MIN Le-Quan Vol. 44 Acknowledgments The authors would like to express sincere gratitude to Prof. Guan-Rong Chen at the City University in Hong Kong for providing them references on chaos-based secure communications. References [1] L.M. Pecora and T.L. Carroll Phys. Rev. Lett. 64 (1990) 821. [2] L.J. Kocarev K.S. Halle K. Eckert L.O. Chua and U. Parliz Int. J. Bifurcation Chaos 2 (1992) 709. [3] U. Parliz L.O. Chua L.J. Kocarev K.S. Halle and A. Shang Int. J. Bifurcation Chaos 2 (1992) 973. [4] L.M. Cuomo and A.V. Oppenheim Phys. Rev. Lett. 71 (1993) 65. [5] C.W. Wu and L.O. Chua Int. J. Bifurcation and Chaos 3 (1993) [6] L. Kocarev and U. Parlitz Phys. Rev. Lett. 74 (1995) [7] L. Kocarev and U. Parlitz Phys. Rev. Lett. 76 (1996) [8] U. Feldmann M. Halser and W. Schwarz Int. J. Circuit Theory Appl. 24 (1996) 551. [9] T. Yang and L.O. Chua Int. J. Bifurcation Chaos 6 (1996) [10] T. Yang and L.O. Chua Int. J. Bifurcation Chaos 7 (1997) 645. [11] K. Murali and M. Lakshmanan Phys. Lett. A 241 (1998) 302. [12] J. Kawata Y. Nishio H. Dedieu and A. Ushida IEICE Trans. Fund. E 82-A (1999) [13] L. Kocarev IEEE Circuits and Syst. I: Fundam. Theory Appl. 48 (2001) [14] T.L. Carroll Phys. Rev. E 67 (2003) [15] F.C.M. Lau and C.K. Tse Chaos-Based Digital Communication Systems Springer (2003). [16] G. Chen Y. Mao and C.K. Chui Chaos Solitons and Fractals 21 (2004) 749. [17] W. Ye Q. Dai S. Wang et al. Phys. Lett. A 330 (2004) 75. [18] D. Zhao G. Chen and W. Liu Chaos Solitons and Fractals 22 (2004) 47. [19] T. Yang and L.O. Chua Int. J. Bifurcation Chaos 6 (1996) 215. [20] X. Zhang and L. Min J. Univ. of Sci. and Tech. Beijing 7 (2000) 224. [21] R. John and D. Gregory Chaos Solitons and Fractals 12 (2001) 145. [22] J. Lu and Y. Xi Chaos Solitons and Fractals 17 (2003) 825. [23] X. Zhang L. Zhang and L. Min Chin. Phys. Lett. 20 (2003) 211. [24] L. Min X. Zhang and M. Yang J. Beijing Univ. of Sci. and Tech. 10 (2003) 75. [25] L. Min G. Chen X. Zhang et al. Commun. Theor. Phys. (Beijing China) 41 (2004) 632. [26] J. Xu L. Min and G. Chen Chin. Phys. Lett. 21 (2004) 1445.

New communication schemes based on adaptive synchronization

New communication schemes based on adaptive synchronization CHAOS 17, 0114 2007 New communication schemes based on adaptive synchronization Wenwu Yu a Department of Mathematics, Southeast University, Nanjing 210096, China, Department of Electrical Engineering,

More information

Study on Proportional Synchronization of Hyperchaotic Circuit System

Study on Proportional Synchronization of Hyperchaotic Circuit System Commun. Theor. Phys. (Beijing, China) 43 (25) pp. 671 676 c International Academic Publishers Vol. 43, No. 4, April 15, 25 Study on Proportional Synchronization of Hyperchaotic Circuit System JIANG De-Ping,

More information

Time-delay feedback control in a delayed dynamical chaos system and its applications

Time-delay feedback control in a delayed dynamical chaos system and its applications Time-delay feedback control in a delayed dynamical chaos system and its applications Ye Zhi-Yong( ), Yang Guang( ), and Deng Cun-Bing( ) School of Mathematics and Physics, Chongqing University of Technology,

More information

Bidirectional Partial Generalized Synchronization in Chaotic and Hyperchaotic Systems via a New Scheme

Bidirectional Partial Generalized Synchronization in Chaotic and Hyperchaotic Systems via a New Scheme Commun. Theor. Phys. (Beijing, China) 45 (2006) pp. 1049 1056 c International Academic Publishers Vol. 45, No. 6, June 15, 2006 Bidirectional Partial Generalized Synchronization in Chaotic and Hyperchaotic

More information

Function Projective Synchronization of Discrete-Time Chaotic and Hyperchaotic Systems Using Backstepping Method

Function Projective Synchronization of Discrete-Time Chaotic and Hyperchaotic Systems Using Backstepping Method Commun. Theor. Phys. (Beijing, China) 50 (2008) pp. 111 116 c Chinese Physical Society Vol. 50, No. 1, July 15, 2008 Function Projective Synchronization of Discrete-Time Chaotic and Hyperchaotic Systems

More information

Synchronizing Chaotic Systems Based on Tridiagonal Structure

Synchronizing Chaotic Systems Based on Tridiagonal Structure Proceedings of the 7th World Congress The International Federation of Automatic Control Seoul, Korea, July 6-, 008 Synchronizing Chaotic Systems Based on Tridiagonal Structure Bin Liu, Min Jiang Zengke

More information

arxiv: v1 [cs.cr] 18 Jul 2009

arxiv: v1 [cs.cr] 18 Jul 2009 Breaking a Chaotic Cryptographic Scheme Based on Composition Maps Chengqing Li 1, David Arroyo 2, and Kwok-Tung Lo 1 1 Department of Electronic and Information Engineering, The Hong Kong Polytechnic University,

More information

Secure Communication Using H Chaotic Synchronization and International Data Encryption Algorithm

Secure Communication Using H Chaotic Synchronization and International Data Encryption Algorithm Secure Communication Using H Chaotic Synchronization and International Data Encryption Algorithm Gwo-Ruey Yu Department of Electrical Engineering I-Shou University aohsiung County 840, Taiwan gwoyu@isu.edu.tw

More information

ADAPTIVE CHAOS SYNCHRONIZATION OF UNCERTAIN HYPERCHAOTIC LORENZ AND HYPERCHAOTIC LÜ SYSTEMS

ADAPTIVE CHAOS SYNCHRONIZATION OF UNCERTAIN HYPERCHAOTIC LORENZ AND HYPERCHAOTIC LÜ SYSTEMS ADAPTIVE CHAOS SYNCHRONIZATION OF UNCERTAIN HYPERCHAOTIC LORENZ AND HYPERCHAOTIC LÜ SYSTEMS Sundarapandian Vaidyanathan 1 1 Research and Development Centre, Vel Tech Dr. RR & Dr. SR Technical University

More information

Lorenz System Parameter Determination and Application to Break the Security of Two-channel Chaotic Cryptosystems

Lorenz System Parameter Determination and Application to Break the Security of Two-channel Chaotic Cryptosystems 1 Lorenz System Parameter Determination and Application to Break the Security of Two-channel Chaotic Cryptosystems A. B. Orue, G. Alvarez, M. Romera, G. Pastor, F. Montoya and Shujun Li arxiv:nlin/669v

More information

ADAPTIVE SYNCHRONIZATION FOR RÖSSLER AND CHUA S CIRCUIT SYSTEMS

ADAPTIVE SYNCHRONIZATION FOR RÖSSLER AND CHUA S CIRCUIT SYSTEMS Letters International Journal of Bifurcation and Chaos, Vol. 12, No. 7 (2002) 1579 1597 c World Scientific Publishing Company ADAPTIVE SYNCHRONIZATION FOR RÖSSLER AND CHUA S CIRCUIT SYSTEMS A. S. HEGAZI,H.N.AGIZA

More information

Function Projective Synchronization of Fractional-Order Hyperchaotic System Based on Open-Plus-Closed-Looping

Function Projective Synchronization of Fractional-Order Hyperchaotic System Based on Open-Plus-Closed-Looping Commun. Theor. Phys. 55 (2011) 617 621 Vol. 55, No. 4, April 15, 2011 Function Projective Synchronization of Fractional-Order Hyperchaotic System Based on Open-Plus-Closed-Looping WANG Xing-Yuan ( ), LIU

More information

Cryptanalysis of a computer cryptography scheme based on a filter bank

Cryptanalysis of a computer cryptography scheme based on a filter bank NOTICE: This is the author s version of a work that was accepted by Chaos, Solitons & Fractals in August 2007. Changes resulting from the publishing process, such as peer review, editing, corrections,

More information

Breaking an encryption scheme based on chaotic Baker map

Breaking an encryption scheme based on chaotic Baker map Breaking an encryption scheme based on chaotic Baker map Gonzalo Alvarez a, and Shujun Li b a Instituto de Física Aplicada, Consejo Superior de Investigaciones Científicas, Serrano 144 28006 Madrid, Spain

More information

Generalized-Type Synchronization of Hyperchaotic Oscillators Using a Vector Signal

Generalized-Type Synchronization of Hyperchaotic Oscillators Using a Vector Signal Commun. Theor. Phys. (Beijing, China) 44 (25) pp. 72 78 c International Acaemic Publishers Vol. 44, No. 1, July 15, 25 Generalize-Type Synchronization of Hyperchaotic Oscillators Using a Vector Signal

More information

K. Pyragas* Semiconductor Physics Institute, LT-2600 Vilnius, Lithuania Received 19 March 1998

K. Pyragas* Semiconductor Physics Institute, LT-2600 Vilnius, Lithuania Received 19 March 1998 PHYSICAL REVIEW E VOLUME 58, NUMBER 3 SEPTEMBER 998 Synchronization of coupled time-delay systems: Analytical estimations K. Pyragas* Semiconductor Physics Institute, LT-26 Vilnius, Lithuania Received

More information

HYBRID CHAOS SYNCHRONIZATION OF HYPERCHAOTIC LIU AND HYPERCHAOTIC CHEN SYSTEMS BY ACTIVE NONLINEAR CONTROL

HYBRID CHAOS SYNCHRONIZATION OF HYPERCHAOTIC LIU AND HYPERCHAOTIC CHEN SYSTEMS BY ACTIVE NONLINEAR CONTROL HYBRID CHAOS SYNCHRONIZATION OF HYPERCHAOTIC LIU AND HYPERCHAOTIC CHEN SYSTEMS BY ACTIVE NONLINEAR CONTROL Sundarapandian Vaidyanathan 1 1 Research and Development Centre, Vel Tech Dr. RR & Dr. SR Technical

More information

698 Zou Yan-Li et al Vol. 14 and L 2, respectively, V 0 is the forward voltage drop across the diode, and H(u) is the Heaviside function 8 < 0 u < 0;

698 Zou Yan-Li et al Vol. 14 and L 2, respectively, V 0 is the forward voltage drop across the diode, and H(u) is the Heaviside function 8 < 0 u < 0; Vol 14 No 4, April 2005 cfl 2005 Chin. Phys. Soc. 1009-1963/2005/14(04)/0697-06 Chinese Physics and IOP Publishing Ltd Chaotic coupling synchronization of hyperchaotic oscillators * Zou Yan-Li( ΠΛ) a)y,

More information

A Chaotic Encryption System Using PCA Neural Networks

A Chaotic Encryption System Using PCA Neural Networks A Chaotic Encryption System Using PCA Neural Networks Xiao Fei, Guisong Liu, Bochuan Zheng Computational Intelligence Laboratory, School of Computer Science and Engineering, University of Electronic Science

More information

Adaptive feedback synchronization of a unified chaotic system

Adaptive feedback synchronization of a unified chaotic system Physics Letters A 39 (4) 37 333 www.elsevier.com/locate/pla Adaptive feedback synchronization of a unified chaotic system Junan Lu a, Xiaoqun Wu a, Xiuping Han a, Jinhu Lü b, a School of Mathematics and

More information

Multi-Map Orbit Hopping Chaotic Stream Cipher

Multi-Map Orbit Hopping Chaotic Stream Cipher Multi-Map Orbit Hopping Chaotic Stream Cipher Xiaowen Zhang 1, Li Shu 2, Ke Tang 1 Abstract In this paper we propose a multi-map orbit hopping chaotic stream cipher that utilizes the idea of spread spectrum

More information

Experimental Realization of Binary Signals Transmission Based on Synchronized Lorenz circuits

Experimental Realization of Binary Signals Transmission Based on Synchronized Lorenz circuits Experimental Realization of Binary Signals Transmission Based on Synchronized Lorenz circuits Cornelio PosadasCastillo. Faculty of Engineering Mechanic and Electrical (F.I.M.E.), Nuevo León Autonomous

More information

Synchronization and control in small networks of chaotic electronic circuits

Synchronization and control in small networks of chaotic electronic circuits Synchronization and control in small networks of chaotic electronic circuits A. Iglesias Dept. of Applied Mathematics and Computational Sciences, Universi~ of Cantabria, Spain Abstract In this paper, a

More information

An efficient parallel pseudorandom bit generator based on an asymmetric coupled chaotic map lattice

An efficient parallel pseudorandom bit generator based on an asymmetric coupled chaotic map lattice PRAMANA c Indian Academy of Sciences Vol. 85, No. 4 journal of October 215 physics pp. 617 627 An efficient parallel pseudorandom bit generator based on an asymmetric coupled chaotic map lattice RENFU

More information

Anti-synchronization of a new hyperchaotic system via small-gain theorem

Anti-synchronization of a new hyperchaotic system via small-gain theorem Anti-synchronization of a new hyperchaotic system via small-gain theorem Xiao Jian( ) College of Mathematics and Statistics, Chongqing University, Chongqing 400044, China (Received 8 February 2010; revised

More information

GLOBAL CHAOS SYNCHRONIZATION OF UNCERTAIN SPROTT J AND K SYSTEMS BY ADAPTIVE CONTROL

GLOBAL CHAOS SYNCHRONIZATION OF UNCERTAIN SPROTT J AND K SYSTEMS BY ADAPTIVE CONTROL GLOBAL CHAOS SYNCHRONIZATION OF UNCERTAIN SPROTT J AND K SYSTEMS BY ADAPTIVE CONTROL Sundarapandian Vaidyanathan 1 1 Research and Development Centre, Vel Tech Dr. RR & Dr. SR Technical University Avadi,

More information

A Novel Image Encryption Scheme Using the Composite Discrete Chaotic System

A Novel Image Encryption Scheme Using the Composite Discrete Chaotic System entropy Article A Novel Image Encryption Scheme Using the Composite Discrete Chaotic System Hegui Zhu 1, *, Xiangde Zhang 1, Hai Yu 2, Cheng Zhao 3 and Zhiliang Zhu 2 1 College of Sciences, Northeastern

More information

A Hybrid Method with Lorenz attractor based Cryptography and LSB Steganography

A Hybrid Method with Lorenz attractor based Cryptography and LSB Steganography International Journal of Current Engineering and Technology E-ISSN 2277 4106, P-ISSN 2347 5161 2015INPRESSCO, All Rights Reserved Available at http://inpressco.com/category/ijcet Research Article A Hybrid

More information

arxiv: v1 [cs.cr] 5 Dec 2007

arxiv: v1 [cs.cr] 5 Dec 2007 Cryptanalysis of an image encryption scheme based on the Hill cipher Chengqing Li a,, Dan Zhang b, and Guanrong Chen a arxiv:07120693v1 [cscr] 5 Dec 2007 a Department of Electronic Engineering, City University

More information

Average Range and Network Synchronizability

Average Range and Network Synchronizability Commun. Theor. Phys. (Beijing, China) 53 (2010) pp. 115 120 c Chinese Physical Society and IOP Publishing Ltd Vol. 53, No. 1, January 15, 2010 Average Range and Network Synchronizability LIU Chao ( ),

More information

Generalized projective synchronization of a class of chaotic (hyperchaotic) systems with uncertain parameters

Generalized projective synchronization of a class of chaotic (hyperchaotic) systems with uncertain parameters Vol 16 No 5, May 2007 c 2007 Chin. Phys. Soc. 1009-1963/2007/16(05)/1246-06 Chinese Physics and IOP Publishing Ltd Generalized projective synchronization of a class of chaotic (hyperchaotic) systems with

More information

Anti-synchronization Between Coupled Networks with Two Active Forms

Anti-synchronization Between Coupled Networks with Two Active Forms Commun. Theor. Phys. 55 (211) 835 84 Vol. 55, No. 5, May 15, 211 Anti-synchronization Between Coupled Networks with Two Active Forms WU Yong-Qing ( ï), 1 SUN Wei-Gang (êå ), 2, and LI Shan-Shan (Ó ) 3

More information

Impulsive Stabilization for Control and Synchronization of Chaotic Systems: Theory and Application to Secure Communication

Impulsive Stabilization for Control and Synchronization of Chaotic Systems: Theory and Application to Secure Communication 976 IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS I: FUNDAMENTAL THEORY AND APPLICATIONS, VOL. 44, NO. 10, OCTOBER 1997 Impulsive Stabilization for Control and Synchronization of Chaotic Systems: Theory and

More information

Impulsive synchronization of chaotic systems

Impulsive synchronization of chaotic systems CHAOS 15, 023104 2005 Impulsive synchronization of chaotic systems Chuandong Li a and Xiaofeng Liao College of Computer Science and Engineering, Chongqing University, 400030 China Xingyou Zhang College

More information

arxiv: v2 [cs.cr] 6 Aug 2017

arxiv: v2 [cs.cr] 6 Aug 2017 Cryptanalyzing an Image Scrambling Encryption Algorithm of Pixel Bits Chengqing Li a,, Dongdong Lin a, Jinhu Lü b a Hunan Province Cooperative Innovation Center for Wind Power Equipment and Energy Conversion,

More information

Projective synchronization of a complex network with different fractional order chaos nodes

Projective synchronization of a complex network with different fractional order chaos nodes Projective synchronization of a complex network with different fractional order chaos nodes Wang Ming-Jun( ) a)b), Wang Xing-Yuan( ) a), and Niu Yu-Jun( ) a) a) School of Electronic and Information Engineering,

More information

Complete Synchronization, Anti-synchronization and Hybrid Synchronization Between Two Different 4D Nonlinear Dynamical Systems

Complete Synchronization, Anti-synchronization and Hybrid Synchronization Between Two Different 4D Nonlinear Dynamical Systems Mathematics Letters 2016; 2(5): 36-41 http://www.sciencepublishinggroup.com/j/ml doi: 10.11648/j.ml.20160205.12 Complete Synchronization, Anti-synchronization and Hybrid Synchronization Between Two Different

More information

Observers based synchronization and input recovery for a class of nonlinear chaotic models.

Observers based synchronization and input recovery for a class of nonlinear chaotic models. Observers based synchronization and input recovery for a class of nonlinear chaotic models. Estelle Cherrier,, Mohamed Boutayeb, and José Ragot CRAN UMR CNRS 739 INPL 2 Avenue de la Forêt de Haye F-54516

More information

Image encryption based on the tracking control Hindmarsh-Rose system via Genesio-Tesi system

Image encryption based on the tracking control Hindmarsh-Rose system via Genesio-Tesi system ISSN 1746-7659, England, UK Journal of Information and Computing Science Vol. 1, No., 017, pp.13-19 Image encryption based on the tracking control Hindmarsh-Rose system via Genesio-Tesi system Keming Tang

More information

Chaos synchronization of nonlinear Bloch equations

Chaos synchronization of nonlinear Bloch equations Chaos, Solitons and Fractal7 (26) 357 361 www.elsevier.com/locate/chaos Chaos synchronization of nonlinear Bloch equations Ju H. Park * Robust Control and Nonlinear Dynamics Laboratory, Department of Electrical

More information

Hyperchaos and hyperchaos control of the sinusoidally forced simplified Lorenz system

Hyperchaos and hyperchaos control of the sinusoidally forced simplified Lorenz system Nonlinear Dyn (2012) 69:1383 1391 DOI 10.1007/s11071-012-0354-x ORIGINAL PAPER Hyperchaos and hyperchaos control of the sinusoidally forced simplified Lorenz system Keihui Sun Xuan Liu Congxu Zhu J.C.

More information

Synchronization between different motifs

Synchronization between different motifs Synchronization between different motifs Li Ying( ) a) and Liu Zeng-Rong( ) b) a) College of Information Technology, Shanghai Ocean University, Shanghai 201306, China b) Institute of Systems Biology, Shanghai

More information

Chaos Synchronization of Nonlinear Bloch Equations Based on Input-to-State Stable Control

Chaos Synchronization of Nonlinear Bloch Equations Based on Input-to-State Stable Control Commun. Theor. Phys. (Beijing, China) 53 (2010) pp. 308 312 c Chinese Physical Society and IOP Publishing Ltd Vol. 53, No. 2, February 15, 2010 Chaos Synchronization of Nonlinear Bloch Equations Based

More information

Global Chaos Synchronization of Hyperchaotic Lorenz and Hyperchaotic Chen Systems by Adaptive Control

Global Chaos Synchronization of Hyperchaotic Lorenz and Hyperchaotic Chen Systems by Adaptive Control Global Chaos Synchronization of Hyperchaotic Lorenz and Hyperchaotic Chen Systems by Adaptive Control Dr. V. Sundarapandian Professor, Research and Development Centre Vel Tech Dr. RR & Dr. SR Technical

More information

Backstepping synchronization of uncertain chaotic systems by a single driving variable

Backstepping synchronization of uncertain chaotic systems by a single driving variable Vol 17 No 2, February 2008 c 2008 Chin. Phys. Soc. 1674-1056/2008/17(02)/0498-05 Chinese Physics B and IOP Publishing Ltd Backstepping synchronization of uncertain chaotic systems by a single driving variable

More information

CRYPTANALYSIS OF FRIDRICH S CHAOTIC IMAGE ENCRYPTION

CRYPTANALYSIS OF FRIDRICH S CHAOTIC IMAGE ENCRYPTION International Journal of Bifurcation and Chaos, Vol. 20, No. 5 (2010) 1405 1413 c World Scientific Publishing Company DOI: 10.1142/S0218127410026563 CRYPTANALYSIS OF FRIDRICH S CHAOTIC IMAGE ENCRYPTION

More information

Chaos and Cryptography

Chaos and Cryptography Chaos and Cryptography Vishaal Kapoor December 4, 2003 In his paper on chaos and cryptography, Baptista says It is possible to encrypt a message (a text composed by some alphabet) using the ergodic property

More information

Computers and Mathematics with Applications. Adaptive anti-synchronization of chaotic systems with fully unknown parameters

Computers and Mathematics with Applications. Adaptive anti-synchronization of chaotic systems with fully unknown parameters Computers and Mathematics with Applications 59 (21) 3234 3244 Contents lists available at ScienceDirect Computers and Mathematics with Applications journal homepage: www.elsevier.com/locate/camwa Adaptive

More information

One-way Hash Function Based on Neural Network

One-way Hash Function Based on Neural Network One-way Hash Function Based on Neural Network Shiguo Lian, Jinsheng Sun, Zhiquan Wang Department of Automation, Nanjing University of Science & echnology, Nanjing, 294, China, sg_lian@63.com Abstract A

More information

An Image Encryption Scheme Based on Hyperchaotic Rabinovich and Exponential Chaos Maps

An Image Encryption Scheme Based on Hyperchaotic Rabinovich and Exponential Chaos Maps Entropy 2015, 17, 181-196; doi:10.3390/e17010181 Article OPEN ACCESS entropy ISSN 1099-4300 www.mdpi.com/journal/entropy An Image Encryption Scheme Based on Hyperchaotic Rabinovich and Exponential Chaos

More information

ADAPTIVE CONTROLLER DESIGN FOR THE ANTI-SYNCHRONIZATION OF HYPERCHAOTIC YANG AND HYPERCHAOTIC PANG SYSTEMS

ADAPTIVE CONTROLLER DESIGN FOR THE ANTI-SYNCHRONIZATION OF HYPERCHAOTIC YANG AND HYPERCHAOTIC PANG SYSTEMS ADAPTIVE CONTROLLER DESIGN FOR THE ANTI-SYNCHRONIZATION OF HYPERCHAOTIC YANG AND HYPERCHAOTIC PANG SYSTEMS Sundarapandian Vaidyanathan 1 1 Research and Development Centre, Vel Tech Dr. RR & Dr. SR Technical

More information

SYNCHRONIZATION CRITERION OF CHAOTIC PERMANENT MAGNET SYNCHRONOUS MOTOR VIA OUTPUT FEEDBACK AND ITS SIMULATION

SYNCHRONIZATION CRITERION OF CHAOTIC PERMANENT MAGNET SYNCHRONOUS MOTOR VIA OUTPUT FEEDBACK AND ITS SIMULATION SYNCHRONIZAION CRIERION OF CHAOIC PERMANEN MAGNE SYNCHRONOUS MOOR VIA OUPU FEEDBACK AND IS SIMULAION KALIN SU *, CHUNLAI LI College of Physics and Electronics, Hunan Institute of Science and echnology,

More information

Cryptanalysis of a Multistage Encryption System

Cryptanalysis of a Multistage Encryption System Cryptanalysis of a Multistage Encryption System Chengqing Li, Xinxiao Li, Shujun Li and Guanrong Chen Department of Mathematics, Zhejiang University, Hangzhou, Zhejiang 310027, China Software Engineering

More information

Controlling a Novel Chaotic Attractor using Linear Feedback

Controlling a Novel Chaotic Attractor using Linear Feedback ISSN 746-7659, England, UK Journal of Information and Computing Science Vol 5, No,, pp 7-4 Controlling a Novel Chaotic Attractor using Linear Feedback Lin Pan,, Daoyun Xu 3, and Wuneng Zhou College of

More information

THE ACTIVE CONTROLLER DESIGN FOR ACHIEVING GENERALIZED PROJECTIVE SYNCHRONIZATION OF HYPERCHAOTIC LÜ AND HYPERCHAOTIC CAI SYSTEMS

THE ACTIVE CONTROLLER DESIGN FOR ACHIEVING GENERALIZED PROJECTIVE SYNCHRONIZATION OF HYPERCHAOTIC LÜ AND HYPERCHAOTIC CAI SYSTEMS THE ACTIVE CONTROLLER DESIGN FOR ACHIEVING GENERALIZED PROJECTIVE SYNCHRONIZATION OF HYPERCHAOTIC LÜ AND HYPERCHAOTIC CAI SYSTEMS Sarasu Pakiriswamy 1 and Sundarapandian Vaidyanathan 1 1 Department of

More information

The Method of Obtaining Best Unary Polynomial for the Chaotic Sequence of Image Encryption

The Method of Obtaining Best Unary Polynomial for the Chaotic Sequence of Image Encryption Journal of Information Hiding and Multimedia Signal Processing c 2017 ISSN 2073-4212 Ubiquitous International Volume 8, Number 5, September 2017 The Method of Obtaining Best Unary Polynomial for the Chaotic

More information

GLOBAL CHAOS SYNCHRONIZATION OF UNCERTAIN LORENZ-STENFLO AND QI 4-D CHAOTIC SYSTEMS BY ADAPTIVE CONTROL

GLOBAL CHAOS SYNCHRONIZATION OF UNCERTAIN LORENZ-STENFLO AND QI 4-D CHAOTIC SYSTEMS BY ADAPTIVE CONTROL GLOBAL CHAOS SYNCHRONIZATION OF UNCERTAIN LORENZ-STENFLO AND QI 4-D CHAOTIC SYSTEMS BY ADAPTIVE CONTROL Sundarapandian Vaidyanathan 1 1 Research and Development Centre, Vel Tech Dr. RR & Dr. SR Technical

More information

Chaos suppression of uncertain gyros in a given finite time

Chaos suppression of uncertain gyros in a given finite time Chin. Phys. B Vol. 1, No. 11 1 1155 Chaos suppression of uncertain gyros in a given finite time Mohammad Pourmahmood Aghababa a and Hasan Pourmahmood Aghababa bc a Electrical Engineering Department, Urmia

More information

GLOBAL CHAOS SYNCHRONIZATION OF HYPERCHAOTIC QI AND HYPERCHAOTIC JHA SYSTEMS BY ACTIVE NONLINEAR CONTROL

GLOBAL CHAOS SYNCHRONIZATION OF HYPERCHAOTIC QI AND HYPERCHAOTIC JHA SYSTEMS BY ACTIVE NONLINEAR CONTROL GLOBAL CHAOS SYNCHRONIZATION OF HYPERCHAOTIC QI AND HYPERCHAOTIC JHA SYSTEMS BY ACTIVE NONLINEAR CONTROL Sundarapandian Vaidyanathan 1 1 Research and Development Centre, Vel Tech Dr. RR & Dr. SR Technical

More information

arxiv:cs/ v1 [cs.cr] 2 Feb 2004

arxiv:cs/ v1 [cs.cr] 2 Feb 2004 Problems of Baptista s chaotic cryptosystems and countermeasures for enhancement of their overall performances arxiv:cs/0402004v1 [cs.cr] 2 Feb 2004 Shujun Li, Guanrong Chen Department of Electronic Engineering,

More information

Spread-spectrum communication using binary spatiotemporal chaotic codes

Spread-spectrum communication using binary spatiotemporal chaotic codes Physics Letters A 334 (2005) 30 36 www.elsevier.com/locate/pla Spread-spectrum communication using binary spatiotemporal chaotic codes Xingang Wang a,,mengzhan a, Xiaofeng Gong a, Choy Heng Lai b, Ying-Cheng

More information

On the security of a chaotic encryption scheme: problems with computerized chaos in finite computing precision

On the security of a chaotic encryption scheme: problems with computerized chaos in finite computing precision On the security of a chaotic encryption scheme: problems with computerized chaos in finite computing precision Shujun Li a,, Xuanqin Mou a, Yuanlong Cai a, Zhen Ji b and Jihong Zhang b a School of Electronics

More information

A new parameter determination method for some double-scroll chaotic systems and its applications to chaotic cryptanalysis

A new parameter determination method for some double-scroll chaotic systems and its applications to chaotic cryptanalysis NOTICE: This is the author s version of a work that was published by Communications in Nonlinear Science and Numerical Simulations, vol. 15, no. 11, pp. 3471-3483, 21, DOI: 1.116/j.cnsns.29.12.17. Changes

More information

A Novel Hyperchaotic System and Its Control

A Novel Hyperchaotic System and Its Control 1371371371371378 Journal of Uncertain Systems Vol.3, No., pp.137-144, 009 Online at: www.jus.org.uk A Novel Hyperchaotic System and Its Control Jiang Xu, Gouliang Cai, Song Zheng School of Mathematics

More information

arxiv: v2 [cs.cr] 13 Oct 2016

arxiv: v2 [cs.cr] 13 Oct 2016 Nonlinear Dynamics manuscript No. (will be inserted by the editor) Cryptanalyzing image encryption scheme using chaotic logistic map Chengqing Li Tao Xie Qi Liu Ge Cheng arxiv:3.489v2 [cs.cr] 3 Oct 26

More information

Construction of a New Fractional Chaotic System and Generalized Synchronization

Construction of a New Fractional Chaotic System and Generalized Synchronization Commun. Theor. Phys. (Beijing, China) 5 (2010) pp. 1105 1110 c Chinese Physical Society and IOP Publishing Ltd Vol. 5, No. 6, June 15, 2010 Construction of a New Fractional Chaotic System and Generalized

More information

Synchronization of an uncertain unified chaotic system via adaptive control

Synchronization of an uncertain unified chaotic system via adaptive control Chaos, Solitons and Fractals 14 (22) 643 647 www.elsevier.com/locate/chaos Synchronization of an uncertain unified chaotic system via adaptive control Shihua Chen a, Jinhu L u b, * a School of Mathematical

More information

A Novel Image Encryption Algorithm Based on DNA Encoding and Spatiotemporal Chaos

A Novel Image Encryption Algorithm Based on DNA Encoding and Spatiotemporal Chaos Entropy 2015, 17, 6954-6968; doi:10.3390/e17106954 Article OPEN ACCESS entropy ISSN 1099-4300 www.mdpi.com/journal/entropy A Novel Image Encryption Algorithm Based on DNA Encoding and Spatiotemporal Chaos

More information

Generalized projective synchronization between two chaotic gyros with nonlinear damping

Generalized projective synchronization between two chaotic gyros with nonlinear damping Generalized projective synchronization between two chaotic gyros with nonlinear damping Min Fu-Hong( ) Department of Electrical and Automation Engineering, Nanjing Normal University, Nanjing 210042, China

More information

Robust Gain Scheduling Synchronization Method for Quadratic Chaotic Systems With Channel Time Delay Yu Liang and Horacio J.

Robust Gain Scheduling Synchronization Method for Quadratic Chaotic Systems With Channel Time Delay Yu Liang and Horacio J. 604 IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS I: REGULAR PAPERS, VOL. 56, NO. 3, MARCH 2009 Robust Gain Scheduling Synchronization Method for Quadratic Chaotic Systems With Channel Time Delay Yu Liang

More information

SYNCHRONIZATION IN SMALL-WORLD DYNAMICAL NETWORKS

SYNCHRONIZATION IN SMALL-WORLD DYNAMICAL NETWORKS International Journal of Bifurcation and Chaos, Vol. 12, No. 1 (2002) 187 192 c World Scientific Publishing Company SYNCHRONIZATION IN SMALL-WORLD DYNAMICAL NETWORKS XIAO FAN WANG Department of Automation,

More information

Dynamical analysis and circuit simulation of a new three-dimensional chaotic system

Dynamical analysis and circuit simulation of a new three-dimensional chaotic system Dynamical analysis and circuit simulation of a new three-dimensional chaotic system Wang Ai-Yuan( 王爱元 ) a)b) and Ling Zhi-Hao( 凌志浩 ) a) a) Department of Automation, East China University of Science and

More information

5618 IEEE TRANSACTIONS ON IMAGE PROCESSING, VOL. 26, NO. 12, DECEMBER 2017

5618 IEEE TRANSACTIONS ON IMAGE PROCESSING, VOL. 26, NO. 12, DECEMBER 2017 5618 IEEE TRANSACTIONS ON IMAGE PROCESSING, VOL. 26, NO. 12, DECEMBER 2017 Combination of Sharing Matrix and Image Encryption for Lossless (k, n)-secret Image Sharing Long Bao, Student Member, IEEE, Shuang

More information

ADAPTIVE CONTROL AND SYNCHRONIZATION OF HYPERCHAOTIC NEWTON-LEIPNIK SYSTEM

ADAPTIVE CONTROL AND SYNCHRONIZATION OF HYPERCHAOTIC NEWTON-LEIPNIK SYSTEM ADAPTIVE CONTROL AND SYNCHRONIZATION OF HYPERCHAOTIC NEWTON-LEIPNIK SYSTEM Sundarapandian Vaidyanathan 1 1 Research and Development Centre, Vel Tech Dr. RR & Dr. SR Technical University Avadi, Chennai-600

More information

Synchronization of Two Chaotic Duffing type Electrical Oscillators

Synchronization of Two Chaotic Duffing type Electrical Oscillators Proceedings of the 0th WSEAS International Conference on CIRCUITS, Vouliagmeni, Athens, Greece, July 0-, 006 (pp79-84) Synchronization of Two Chaotic Duffing type Electrical Oscillators Ch. K. VOLOS, I.

More information

Bifurcation control and chaos in a linear impulsive system

Bifurcation control and chaos in a linear impulsive system Vol 8 No 2, December 2009 c 2009 Chin. Phys. Soc. 674-056/2009/82)/5235-07 Chinese Physics B and IOP Publishing Ltd Bifurcation control and chaos in a linear impulsive system Jiang Gui-Rong 蒋贵荣 ) a)b),

More information

Image encryption based on a delayed fractional-order chaotic logistic system

Image encryption based on a delayed fractional-order chaotic logistic system Chin. Phys. B Vol. 21 No. 5 (212) 556 Image encryption based on a delayed fractional-order chaotic logistic system Wang Zhen( 王震 ) a) Huang Xia( 黄霞 ) b) Li Ning( 李宁 ) a) and Song Xiao-Na( 宋晓娜 ) c) a) College

More information

A novel pseudo-random number generator based on discrete chaotic iterations

A novel pseudo-random number generator based on discrete chaotic iterations A novel pseudo-random number generator based on discrete chaotic iterations Qianxue Wang, Christophe Guyeux and Jacques M. Bahi University of Franche-Comte Computer Science Laboratory LIFC, Belfort, France

More information

Generalized Function Projective Lag Synchronization in Fractional-Order Chaotic Systems

Generalized Function Projective Lag Synchronization in Fractional-Order Chaotic Systems Generalized Function Projective Lag Synchronization in Fractional-Order Chaotic Systems Yancheng Ma Guoan Wu and Lan Jiang denotes fractional order of drive system Abstract In this paper a new synchronization

More information

arxiv:quant-ph/ v2 2 Jan 2007

arxiv:quant-ph/ v2 2 Jan 2007 Revisiting controlled quantum secure direct communication using a non-symmetric quantum channel with quantum superdense coding arxiv:quant-ph/06106v Jan 007 Jun Liu 1, Yan Xia and Zhan-jun Zhang 1,, 1

More information

SYNCHRONIZATION OF HYPERCHAOTIC CIRCUITS VIA CONTINUOUS FEEDBACK CONTROL WITH APPLICATION TO SECURE COMMUNICATIONS

SYNCHRONIZATION OF HYPERCHAOTIC CIRCUITS VIA CONTINUOUS FEEDBACK CONTROL WITH APPLICATION TO SECURE COMMUNICATIONS International Journal of Bifurcation and Chaos, Vol. 8, No. 10 (1998) 2031 2040 c World Scientific Publishing Company SYNCHRONIZATION OF HYPERCHAOTIC CIRCUITS VIA CONTINUOUS FEEDBACK CONTROL WITH APPLICATION

More information

Linear matrix inequality approach for synchronization control of fuzzy cellular neural networks with mixed time delays

Linear matrix inequality approach for synchronization control of fuzzy cellular neural networks with mixed time delays Chin. Phys. B Vol. 21, No. 4 (212 4842 Linear matrix inequality approach for synchronization control of fuzzy cellular neural networks with mixed time delays P. Balasubramaniam a, M. Kalpana a, and R.

More information

GLOBAL CHAOS SYNCHRONIZATION OF PAN AND LÜ CHAOTIC SYSTEMS VIA ADAPTIVE CONTROL

GLOBAL CHAOS SYNCHRONIZATION OF PAN AND LÜ CHAOTIC SYSTEMS VIA ADAPTIVE CONTROL GLOBAL CHAOS SYNCHRONIZATION OF PAN AND LÜ CHAOTIC SYSTEMS VIA ADAPTIVE CONTROL Sundarapandian Vaidyanathan 1 and Karthikeyan Rajagopal 2 1 Research and Development Centre, Vel Tech Dr. RR & Dr. SR Technical

More information

A new pseudorandom number generator based on complex number chaotic equation

A new pseudorandom number generator based on complex number chaotic equation A new pseudorandom number generator based on complex number chaotic equation Liu Yang( 刘杨 ) and Tong Xiao-Jun( 佟晓筠 ) School of Computer Science and Technology, Harbin Institute of Technology, Weihai 264209,

More information

-Cryptosystem: A Chaos Based Public Key Cryptosystem

-Cryptosystem: A Chaos Based Public Key Cryptosystem International Journal of Cryptology Research 1(2): 149-163 (2009) -Cryptosystem: A Chaos Based Public Key Cryptosystem 1 M.R.K. Ariffin and 2 N.A. Abu 1 Al-Kindi Cryptography Research Laboratory, Laboratory

More information

Chaos, Solitons and Fractals

Chaos, Solitons and Fractals Chaos, Solitons and Fractals 41 (2009) 962 969 Contents lists available at ScienceDirect Chaos, Solitons and Fractals journal homepage: www.elsevier.com/locate/chaos A fractional-order hyperchaotic system

More information

OBSERVER BASED CHAOTIC MESSAGE TRANSMISSION

OBSERVER BASED CHAOTIC MESSAGE TRANSMISSION International Journal of Bifurcation and Chaos, Vol. 3, No. 4 (23) 3 7 c World Scientific Publishing Company OBSERVER BASED CHAOTIC MESSAGE TRANSMISSION ÖMER MORGÜL, ERCAN SOLAK and MURAT AKGÜL Department

More information

ADAPTIVE CHAOS CONTROL AND SYNCHRONIZATION OF HYPERCHAOTIC LIU SYSTEM

ADAPTIVE CHAOS CONTROL AND SYNCHRONIZATION OF HYPERCHAOTIC LIU SYSTEM International Journal o Computer Science, Engineering and Inormation Technology (IJCSEIT), Vol.1, No., June 011 ADAPTIVE CHAOS CONTROL AND SYNCHRONIZATION OF HYPERCHAOTIC LIU SYSTEM Sundarapandian Vaidyanathan

More information

Experimental and numerical realization of higher order autonomous Van der Pol-Duffing oscillator

Experimental and numerical realization of higher order autonomous Van der Pol-Duffing oscillator Indian Journal of Pure & Applied Physics Vol. 47, November 2009, pp. 823-827 Experimental and numerical realization of higher order autonomous Van der Pol-Duffing oscillator V Balachandran, * & G Kandiban

More information

ADAPTIVE CONTROL AND SYNCHRONIZATION OF A GENERALIZED LOTKA-VOLTERRA SYSTEM

ADAPTIVE CONTROL AND SYNCHRONIZATION OF A GENERALIZED LOTKA-VOLTERRA SYSTEM ADAPTIVE CONTROL AND SYNCHRONIZATION OF A GENERALIZED LOTKA-VOLTERRA SYSTEM Sundarapandian Vaidyanathan 1 1 Research and Development Centre, Vel Tech Dr. RR & Dr. SR Technical University Avadi, Chennai-600

More information

CONTROLLING HYPER CHAOS WITH FEEDBACK OF DYNAMICAL VARIABLES

CONTROLLING HYPER CHAOS WITH FEEDBACK OF DYNAMICAL VARIABLES International Journal of Modern Physics B Vol. 17, Nos. 22, 23 & 24 (2003) 4272 4277 c World Scientific Publishing Company CONTROLLING HYPER CHAOS WITH FEEDBACK OF DYNAMICAL VARIABLES XIAO-SHU LUO Department

More information

Phase Synchronization of Coupled Rossler Oscillators: Amplitude Effect

Phase Synchronization of Coupled Rossler Oscillators: Amplitude Effect Commun. Theor. Phys. (Beijing, China) 47 (2007) pp. 265 269 c International Academic Publishers Vol. 47, No. 2, February 15, 2007 Phase Synchronization of Coupled Rossler Oscillators: Amplitude Effect

More information

A Novel Hyper Chaos-based Image Encryption Algorithm Using Dynamic DNA Coding and SHA-256

A Novel Hyper Chaos-based Image Encryption Algorithm Using Dynamic DNA Coding and SHA-256 A Novel Hyper Chaos-based Image Encryption Algorithm Using Dynamic DNA Coding and SHA-256 Shuqin Zhu Wenhong Wang School of Computer Science; Liaocheng University Liaocheng, 252, China E-mail: wangwenhong@lcu-cs.com

More information

Synchronization-based parameter estimation from time series

Synchronization-based parameter estimation from time series PHYSICAL REVIEW E VOLUME 54, NUMBER 6 DECEMBER 1996 Synchronization-based parameter estimation from time series U. Parlitz and L. Junge Drittes Physikalisches Institut, Universität Göttingen, Bürgerstra

More information

ADAPTIVE DESIGN OF CONTROLLER AND SYNCHRONIZER FOR LU-XIAO CHAOTIC SYSTEM

ADAPTIVE DESIGN OF CONTROLLER AND SYNCHRONIZER FOR LU-XIAO CHAOTIC SYSTEM ADAPTIVE DESIGN OF CONTROLLER AND SYNCHRONIZER FOR LU-XIAO CHAOTIC SYSTEM WITH UNKNOWN PARAMETERS Sundarapandian Vaidyanathan 1 1 Research and Development Centre, Vel Tech Dr. RR & Dr. SR Technical University

More information

Adaptive synchronization of uncertain chaotic systems via switching mechanism

Adaptive synchronization of uncertain chaotic systems via switching mechanism Chin Phys B Vol 19, No 12 (2010) 120504 Adaptive synchronization of uncertain chaotic systems via switching mechanism Feng Yi-Fu( ) a) and Zhang Qing-Ling( ) b) a) School of Mathematics, Jilin Normal University,

More information

Digital Secure-Communication Using Robust Hyper-Chaotic Systems

Digital Secure-Communication Using Robust Hyper-Chaotic Systems Digital Secure-Communication Using Robust Hyper-Chaotic Systems Shih-Liang Chen Shu-Ming Chang Wen-Wei Lin Ting-Ting Hwang Abstract In this paper, we propose a robust hyper-chaotic system that is practically

More information

Synchronization and Bifurcation Analysis in Coupled Networks of Discrete-Time Systems

Synchronization and Bifurcation Analysis in Coupled Networks of Discrete-Time Systems Commun. Theor. Phys. (Beijing, China) 48 (2007) pp. 871 876 c International Academic Publishers Vol. 48, No. 5, November 15, 2007 Synchronization and Bifurcation Analysis in Coupled Networks of Discrete-Time

More information

ADAPTIVE STABILIZATION AND SYNCHRONIZATION OF HYPERCHAOTIC QI SYSTEM

ADAPTIVE STABILIZATION AND SYNCHRONIZATION OF HYPERCHAOTIC QI SYSTEM ADAPTIVE STABILIZATION AND SYNCHRONIZATION OF HYPERCHAOTIC QI SYSTEM Sundarapandian Vaidyanathan 1 1 Research and Development Centre, Vel Tech Dr. RR Dr. SR Technical University Avadi, Chennai-600 062,

More information

HYBRID CHAOS SYNCHRONIZATION OF UNCERTAIN LORENZ-STENFLO AND QI 4-D CHAOTIC SYSTEMS BY ADAPTIVE CONTROL

HYBRID CHAOS SYNCHRONIZATION OF UNCERTAIN LORENZ-STENFLO AND QI 4-D CHAOTIC SYSTEMS BY ADAPTIVE CONTROL HYBRID CHAOS SYNCHRONIZATION OF UNCERTAIN LORENZ-STENFLO AND QI 4-D CHAOTIC SYSTEMS BY ADAPTIVE CONTROL Sundarapandian Vaidyanathan 1 1 Research and Development Centre, Vel Tech Dr. RR & Dr. SR Technical

More information