The Method of Obtaining Best Unary Polynomial for the Chaotic Sequence of Image Encryption

Similar documents
HX-TYPE CHAOTIC (HYPERCHAOTIC) SYSTEM BASED ON FUZZY INFERENCE MODELING

Four-dimensional hyperchaotic system and application research in signal encryption

Study on Proportional Synchronization of Hyperchaotic Circuit System

Generalized projective synchronization of a class of chaotic (hyperchaotic) systems with uncertain parameters

Secure Communication Using H Chaotic Synchronization and International Data Encryption Algorithm

Stability and hybrid synchronization of a time-delay financial hyperchaotic system

An efficient parallel pseudorandom bit generator based on an asymmetric coupled chaotic map lattice

Controlling a Novel Chaotic Attractor using Linear Feedback

Simulation and Digital Implementation of Eight Dimensional Hyper Chaotic System for Secured Chaotic Communication

Cryptanalysis of a Multistage Encryption System

arxiv: v2 [cs.cr] 6 Aug 2017

Time-delay feedback control in a delayed dynamical chaos system and its applications

An Image Encryption Scheme Based on Hyperchaotic Rabinovich and Exponential Chaos Maps

Construction of four dimensional chaotic finance model and its applications

Complete Synchronization, Anti-synchronization and Hybrid Synchronization Between Two Different 4D Nonlinear Dynamical Systems

arxiv: v1 [cs.cr] 18 Jul 2009

The Research of Railway Coal Dispatched Volume Prediction Based on Chaos Theory

A Novel Three Dimension Autonomous Chaotic System with a Quadratic Exponential Nonlinear Term

No. 6 Determining the input dimension of a To model a nonlinear time series with the widely used feed-forward neural network means to fit the a

Function Projective Synchronization of Fractional-Order Hyperchaotic System Based on Open-Plus-Closed-Looping

Nonchaotic random behaviour in the second order autonomous system

Finite-time hybrid synchronization of time-delay hyperchaotic Lorenz system

GLOBAL CHAOS SYNCHRONIZATION OF HYPERCHAOTIC QI AND HYPERCHAOTIC JHA SYSTEMS BY ACTIVE NONLINEAR CONTROL

A Non-symmetric Digital Image Secure Communication Scheme Based on Generalized Chaos Synchronization System

Synchronization of identical new chaotic flows via sliding mode controller and linear control

A Novel Image Encryption Scheme Using the Composite Discrete Chaotic System

A Novel Hyperchaotic System and Its Control

BIFURCATIONS AND SYNCHRONIZATION OF THE FRACTIONAL-ORDER SIMPLIFIED LORENZ HYPERCHAOTIC SYSTEM

Experimental and numerical realization of higher order autonomous Van der Pol-Duffing oscillator

ADAPTIVE CONTROLLER DESIGN FOR THE ANTI-SYNCHRONIZATION OF HYPERCHAOTIC YANG AND HYPERCHAOTIC PANG SYSTEMS

Anti-synchronization of a new hyperchaotic system via small-gain theorem

Research Article Periodic and Chaotic Motions of a Two-Bar Linkage with OPCL Controller

Bearing fault diagnosis based on Shannon entropy and wavelet package decomposition

Adaptive synchronization of chaotic neural networks with time delays via delayed feedback control

A SYSTEMATIC APPROACH TO GENERATING n-scroll ATTRACTORS

Research Article Adaptive Control of Chaos in Chua s Circuit

International Journal of PharmTech Research CODEN (USA): IJPRIF, ISSN: Vol.8, No.3, pp , 2015

CHAPTER 3 CHAOTIC MAPS BASED PSEUDO RANDOM NUMBER GENERATORS

Image encryption based on a delayed fractional-order chaotic logistic system

THE ACTIVE CONTROLLER DESIGN FOR ACHIEVING GENERALIZED PROJECTIVE SYNCHRONIZATION OF HYPERCHAOTIC LÜ AND HYPERCHAOTIC CAI SYSTEMS

Backstepping synchronization of uncertain chaotic systems by a single driving variable

A Very Efficient Pseudo-Random Number Generator Based On Chaotic Maps and S-Box Tables M. Hamdi, R. Rhouma, S. Belghith

Generalized Function Projective Lag Synchronization in Fractional-Order Chaotic Systems

Generating hyperchaotic Lu attractor via state feedback control

Breaking an encryption scheme based on chaotic Baker map

RESEARCH ON AEROCRAFT ATTITUDE TESTING TECHNOLOGY BASED ON THE BP ANN

150 Zhang Sheng-Hai et al Vol. 12 doped fibre, and the two rings are coupled with each other by a coupler C 0. I pa and I pb are the pump intensities

Memristor Based Chaotic Circuits

A Generalization of Some Lag Synchronization of System with Parabolic Partial Differential Equation

A Chaotic Encryption System Using PCA Neural Networks

ADAPTIVE DESIGN OF CONTROLLER AND SYNCHRONIZER FOR LU-XIAO CHAOTIC SYSTEM

Image encryption based on the tracking control Hindmarsh-Rose system via Genesio-Tesi system

Making Method of the Data Processing System in the Experiment of. the Planck Constant Measuring with Photoelectric Effect

Experimental Characterization of Nonlinear Dynamics from Chua s Circuit

ADAPTIVE SYNCHRONIZATION FOR RÖSSLER AND CHUA S CIRCUIT SYSTEMS

K. Pyragas* Semiconductor Physics Institute, LT-2600 Vilnius, Lithuania Received 19 March 1998

Hybrid Projective Dislocated Synchronization of Liu Chaotic System Based on Parameters Identification

A robust and efficient scheme for image encryption-decryption

Research Article Convex Polyhedron Method to Stability of Continuous Systems with Two Additive Time-Varying Delay Components

Lyapunov Exponents Analysis and Phase Space Reconstruction to Chua s Circuit

Acceleration of Levenberg-Marquardt method training of chaotic systems fuzzy modeling

698 Zou Yan-Li et al Vol. 14 and L 2, respectively, V 0 is the forward voltage drop across the diode, and H(u) is the Heaviside function 8 < 0 u < 0;

Projective synchronization of a complex network with different fractional order chaos nodes

Dynamics of the Fractional-order Lorenz System Based on Adomian Decomposition Method and Its DSP Implementation

Research Article A Novel True Random Number Generator Based on Mouse Movement and a One-Dimensional Chaotic Map

Tracking the State of the Hindmarsh-Rose Neuron by Using the Coullet Chaotic System Based on a Single Input

A Six-Dimensional Hyperchaotic System Selection and Its Application in DS-CDMA System

Dynamical Behavior And Synchronization Of Chaotic Chemical Reactors Model

Multi-Map Orbit Hopping Chaotic Stream Cipher

Research on entropy properties comparison of different one-dimensional chaotic maps

ADAPTIVE CONTROL AND SYNCHRONIZATION OF A GENERALIZED LOTKA-VOLTERRA SYSTEM

HYBRID CHAOS SYNCHRONIZATION OF HYPERCHAOTIC LIU AND HYPERCHAOTIC CHEN SYSTEMS BY ACTIVE NONLINEAR CONTROL

Impulsive Stabilization for Control and Synchronization of Chaotic Systems: Theory and Application to Secure Communication

ADAPTIVE CHAOS SYNCHRONIZATION OF UNCERTAIN HYPERCHAOTIC LORENZ AND HYPERCHAOTIC LÜ SYSTEMS

On the dynamics of new 4D Lorenz-type chaos systems

Hybrid particle swarm algorithm for solving nonlinear constraint. optimization problem [5].

Grey prediction model-based men s 100m freestyle Olympic Games performance prediction research

Using Artificial Neural Networks (ANN) to Control Chaos

Chaotic Signal for Signal Masking in Digital Communications

Lyapunov exponent calculation of a two-degreeof-freedom vibro-impact system with symmetrical rigid stops

Research Article. The Study of a Nonlinear Duffing Type Oscillator Driven by Two Voltage Sources

Hyperchaos and hyperchaos control of the sinusoidally forced simplified Lorenz system

5618 IEEE TRANSACTIONS ON IMAGE PROCESSING, VOL. 26, NO. 12, DECEMBER 2017

A Color Image Encryption Scheme Based on Arnold Scrambling and Quantum Chaotic

Open Access Combined Prediction of Wind Power with Chaotic Time Series Analysis

Experimental Characterization of Nonlinear Dynamics from Chua s Circuit

Image Encryption Algorithm Using Natural Interval Extensions

Unidirectional Synchronization of Jerk Circuit. and it s Uses in Secure Communication System

Analysis of FIPS Test and Chaos-Based Pseudorandom Number Generator

Research Article Chaotic Attractor Generation via a Simple Linear Time-Varying System

A Novel Image Encryption Algorithm Based on DNA Encoding and Spatiotemporal Chaos

ANALYSIS AND CONTROLLING OF HOPF BIFURCATION FOR CHAOTIC VAN DER POL-DUFFING SYSTEM. China

Applying Snapback Repellers in Ecology

Crisis in Amplitude Control Hides in Multistability

1618. Dynamic characteristics analysis and optimization for lateral plates of the vibration screen

Synchronization of different chaotic systems and electronic circuit analysis

SIMULATED CHAOS IN BULLWHIP EFFECT

A new pseudorandom number generator based on complex number chaotic equation

A Source Cell-phone Identification Scheme Based on Canonical Correlation Analysis of Photo Response Non-uniformity

Information Mining for Friction Torque of Rolling Bearing for Space Applications Using Chaotic Theory

Transcription:

Journal of Information Hiding and Multimedia Signal Processing c 2017 ISSN 2073-4212 Ubiquitous International Volume 8, Number 5, September 2017 The Method of Obtaining Best Unary Polynomial for the Chaotic Sequence of Image Encryption Meng Yu 1,Zhifan Du 2,Xin Liu 2,Ding Qun 2 and Hong Chen 2 1 College of Economics and Business Administration Heilongjiang University No.74, Xuefu Raod, Nangang District, Harbin, 150080,P.R.China my100dreams@126.com 2 College of Electronic Engineering Heilongjiang University No.74, Xuefu Raod, Nangang District, Harbin, 150080,P.R.China Corresponding author: hbjingjie@126.com Received February, 2017; revised June, 2017 Abstract. In order to get a better chaotic sequence which not only is safer for image encryption but also avoids the complex hardware structure of producing the chaotic sequence, a new method of obtaining a best unary polynomial (for shot BUP) has been studied out in this paper. BUP can make a chaotic sequence more complicated and more suited for encrypting image. Based on Chua s system, the working principle and process of obtaining a BUP are given, and the characteristics of the chaotic sequence transformed by the BUP are analyzed. Then the experiments that an image is encrypted by the sequence before and after the BUP transformation are conducted. The results of experiments demonstrate that the sequence transformed by the BUP not only has better characteristics and greater security but also enlarges the key space of image encryption. Keywords: Best unary polynomial, Transformation, Chaotic sequence, Image encryption 1. Introduction. Since chaos is sensitive to parameters and initial values and owns good randomness, it is very applicable for the image encryption. People have researched a lot of chaotic systems [1-3] and chaos encryption methods [4-6]. With the improvement of the deciphering techniques and the difficulties of finding out a new chaotic system, it is urgent to research some new methods which can make existing chaotic systems produce better characteristics and more kinds of the chaotic sequences for image encryption. Due to the sensitivity of chaos and very short cycle windows in the chaotic area, the chaotic sequence may be easy in a degradation state or weak chaotic state, influences encryption effect, even cannot encrypt image. In order to make chaos stronger and avoid degeneration, [7] puts forward a new method of unary polynomial transformation (UPT) chaos for chaotic image encryption, which is not only very easy to realize but also can greatly improve chaos characteristics without changing the original chaotic system. Although it has proved the effectiveness of UPT from many ways, it only chooses a simple unary polynomial x 2 + x 3 among a variety of unary polynomials for researching on the effect of UPT image encryption, and has not researched which the unary polynomials used for transforming chaos can be more suitable for encryption. Since UPT can not only improve chaos characteristics and make encryption safer, but also under different limit conditions, there are the different unary polynomials which can produce many different 1103

1104 M. Yu, Z.F. Du, X. Liu, D. Qun, and H. Chen kinds of chaotic sequences with better characteristics, it is necessary to be further studied which kind of unary polynomials would be the best for making chaos more complex and safer for encryption. In order to make the chaos more complex and hardware circuit structure relatively simple, a method of getting a best unary polynomial (for shot BUP) is proposed in this paper. Since Lyapunov Exponent (LE) is an important index to quantitatively measure the complexity of chaos, the maximum Lyapunov Exponent [8] is used to study and determine a BUP by the simulation experiment. Firstly, Chapter two in this paper presents the principle and process of obtaining a BUP in detail. Then chapter three analyzes the characteristics of chaotic sequence transformed by the BUP. Furthermore image encryption and decryption experiments are conducted by the chaotic sequence before and after BUP transformation in chapter four. Finally, conclusions are given in chapter five. 2. Principle of Obtaining a BUP. Since Chua s system is a typical chaotic system [9], it is chosen as the chaotic signal source to produce the chaotic sequence for experiments. Its state equation is normalized into: x y z = α α 0 1 1 1 0 β 0 x y z + Where h(x) = m 1 x + 1 (m 2 0 m 1 ) ( x + 1 x 1 ). showed that when (1) satisfies α 0 0 h(x) (1) A number of experiments have α = 10, β = 14.87, m 0 = 0.27, m 1 = 0.32, x(0) = 0.2, y(0) = 0.2, z(0) = 0.2 (2) Chua s system is in chaos. We choose its x as the output terminal of a chaotic sequence to study the validity of proposed method in the paper. Lyapunov Exponent (LE) is an important index to quantitatively measure the complexity of chaos. When LE is positive, it indicates that system is in chaos. The bigger LE is, the more complex chaos is. Since the main purpose of using the BUP to transform chaotic sequence is to increase the complexity of chaotic sequence, we use Lyapunov Exponent experiment to find out the BUP, and its process is shown below. The maximum LE is: 1 LE = lim n n n i=1 ln d i d 0 (3) Where d i is Euclidean distance between points in chaotic system; d 0 is Euclidean distance between initial value points in chaotic system. In Matlab simulation environment, ode45 is used to numerically solve Chua s system (1). In order to consider the influence of simulation integral interval τ, (3) is rewritten as follows: 1 LE = lim n nτ n i=1 log( d i d 0 ) (4) The chaos will be more complex after being transformed by an appropriate unary polynomial. Therefore, the following will study how to get a best unary polynomial. The general form of a unary polynomial is: q p(x) = g i x i (5) i=0

The Method of Obtaining Best Unary Polynomial for the Chaotic Sequence of Image Encryption 1105 Where q is positive integer, g i is the coefficients in the unary polynomial. Since (5) has q + 1 independent coefficients and qth power, it is quite hard to analyze (5). In order to not lose the generality of the unary polynomials (5), it is changed as follows: p(x) = (ax + b) m (6) Where a and b are coefficients, m is exponent. They make sure that (6) not only retains each term in unary polynomial (5) but also reduces uncertain coefficients to two, when (6) is expanded. In the actual design of the polynomial hardware circuit, it is clear that the bigger the power of a polynomial is, the huger the structure of the hardware is, and the more complex the process is, because the bigger power may easily lead to a very large or very small calculated value. But if the digits of each coefficient are limited, the hardware structure and the process do not have big impact. In order to determine m, firstly, let both a and b in (6) equal to 1, and the range of m in (6) is chosen as {m 1 m 20, m N + }. Then the influence of coefficients is going to discuss later. According to (4), the LE corresponding to (6) in different m can be calculated. As we know, LE can be used to quantitatively determine the complexity of chaos, the best value of m in (6) can be determined. The relationship diagram between m in (6) and LE of Chua s chaotic x after transforming with (x + 1) m is shown in Figure 1. When m < 16, although m is increased, LE is decreased instead, as shown in Figure 1. Therefore, it is not necessary to use m < 16 in (6), which can save the hardware resource. Figure 1. The m-le relationship diagram for a = b = 1 and 1 m 20 On the basis of above analysis, the m of (6) is determined as {m 1 m 16, m N + }. It is clear that there are two undetermined coefficients a and b in (6). Firstly, one coefficient is fixed and the influence of the other coefficient will be analyzed on LE. After that, go back to analyze the opposite case in this way. Therefore, the complexity of chaos after UPT can be directly obtained. 2.1. Case 1. Assume that b in (6) is equal to 1, and only think about the LE changed condition when the range of values for a and m are {a 1 a 9, a N + } respectively. According to the simulation calculation results of LE, the changing relationship curve among m, a and LE is shown in Figure 2(a). In this figure, the maximum LE is 0.7695 corresponding to a = 2 and m = 8, which chaotic motions are the most complex. Therefore, (6) is determined and the unary polynomial becomes: p(x) = (2x + 1) 8 (7)

1106 M. Yu, Z.F. Du, X. Liu, D. Qun, and H. Chen 2.2. Case 2. Assume that a in (6) is equal to 1 and only think about the changed conditions of LE when the range of values for b and m are {b 1 b 9, b N + } and {m 1 m 16, m N + } respectively. The calculation results of LE are shown in Figure 2(b). Clearly, as shown in the Figure 2(b), the maximum LE is 0.8236 corresponding to b=2 and m=14, then the unary polynomial is changed into: p(x) = (x + 2) 14 (8) Comparing (8) with (7), it can be seen that when the power m increases by 6, but LE only increases by 0.0541. Comprehensively considering main factors such as hardware scale and signal process, the BUP is chosen as (7). (a) (b) Figure 2. The LE relationship curve:(a)a-m-le curve,(b)b-m-le curve 3. Analysis of Chaos Sequence Transformed by BUP. Chua s system (1) is discretized by fourth-order Runge-kutta iteration, which initial conditions are (2), iterative step h=0.05, and iterations n=75536. During initial stage of iteration, (1) can not enter chaos immediately. Therefore, the first 10000 points produced by variable x in (1) are discarded, the chaotic sequence x(n) is gotten. Then a cipher sequence p(n) is obtained by using the BUP (7) to transform x(n). But can p(n) satisfy the randomness? This question determines whether p(n) is suitable for image encryption, because the security of image encryption in the form of sequential cipher relies mostly on the randomness of cipher sequence. For this reason, the followings respectively from two angles of autocorrelation and randomness test analyze the randomness of the chaotic sequence transformed by the BUP. 3.1. Autocorrelation of Chaotic Sequence Transformed By BUP. According to the definition of autocorrelation: R(n) = x(j)x(j n) (9) j= In the Matlab environment, the autocorrelation function of the sequence p(n) can be realized by programming, as shown in Figure 3. Obviously, the autocorrelation of the sequence p(n) is a two-valued function. When n is zero, the correlation to its own is 1; When n is the value of any other sequences, R(n) are almost zero. It shows that any two of sequence value are uncorrelated, which satisfies the characteristic of a random sequence autocorrelation.

The Method of Obtaining Best Unary Polynomial for the Chaotic Sequence of Image Encryption 1107 Figure 3. The autocorrelation of p(n) 3.2. Randomness test of chaotic sequence transformed by BUP. Randomness of two-valued sequence in the mathematical statistic is reflected mainly in frequency test, sequential test and run test. In order to find out whether p(n) satisfies the statistical property of random sequence, 40000 points are extracted from the 20000th point of p(n) and quantified into binary sequence p(k), then the above three aspects are conducted as follows. 1. Frequency test is used to determine whether the number of 0 and 1 in the sequence p(k) are essentially equal. Since the total number of samples is N=40000, if the number of 0 and 1 appeared in p(k) are equal, the number of 0 and 1 should be all equal to 20000. After statistical analysis to quantized sequence p(k), its results show that the number of 0 and 1 appeared in p(k) respectively are N 0 = 19998 and N 1 = 20002. In this case, a hypothesis test to the fluctuation in p(k) should be carried on. x 2 hypothesis test is carried on as follow: x 2 = (N 0 N 1 ) 2 /N = 0.0001 (10) x 2 distribution table shows that the x 2 is 3.841 and significant level is 0.05 [10]. It is clearly seen that p(k) can pass hypothesis test. 2. Sequential test is used to determine whether the transition state probability appeared in p(k) are essentially equal. A transition state N 00 in p(k) is its current value and its next value respectively are 0 and 0; a transition state N 01 is from 0 and 1; Similarly, N 10 is from 1 and 0; and N 11 is from 1 to 1. If p(k) is a random sequence, the number of each transition state should be equal: ζ = (N 1)/4 10000. The results of statistical analysis to p(k) are N 00 = 10068, N 01 = 9949, N 10 = 9949 and N 11 = 10033. Therefore, x 2 hypothesis test to fluctuations in the sample should be carried on as follow: x 2 = [(N 00 ζ) 2 + (N 01 ζ) 2 + (N 10 ζ) 2 + (N 11 ζ) 2 ]/ζ = 1.2003 (11) x 2 distribution table shows that the value of x 2 is 5.9915 and significant level is 0.05[10]. Clearly, p(k) can pass hypothesis test. 3. Run test is used to determine whether the number of 0 runs and 1 runs in p(k) are essentially equal. If p(k) is a random sequence, the number of runs whose length is L is N/2 L accounting for 1/2 L of the ideal runs total number [11]. The statistical results are shown in Table 1. Obviously, the proportion of different length runs basically conforms to statistical property of random sequence in total proportion of runs. Therefore, p(k) can pass run test. In conclusion, the chaotic sequence transformed by the BUP has good randomness. 4. Image Encryption and Decryption Experiments. α in Chua s system (1) is chosen as a changed parameter for studying the impacts on the states of (1). The following

1108 M. Yu, Z.F. Du, X. Liu, D. Qun, and H. Chen Table 1. Run Test to p(k) L=1 Proportion L=2 Proportion L=3 Proportion 0 runs 19998 50.00% 10051 25.13% 5078 12.70% 1 runs 20002 50.01% 10057 25.14% 5079 12.70% does experiments on encrypting and decrypting image by using the chaotic sequence before and after being transformed by the BUP (7). The clear image is Figure 4(a). In the experiment, the initial values in (2) are used as keys, iteration step is h = 0.05, and iterations are N = N um +10000 (N um is the number of image pixels). The chaotic sequence transformed by (7) is used to encrypt clear image. After that obtained cipher image is Figure 4(b). Figure 4(b) shows that the pixel values of the cipher image are distributed in random way and pixel gray distribution is uniform. Clearly, the clear image is completely hidden and any details can not be seen. Chua s system (1) is not in chaos state when α = 6.5, and its sequence can not be used to encrypt the image, as shown in Figure 5(a). But after it transformed by the BUP (7), encryption effect is improved because most of outlines are covered although the clear image can not be completely encrypted, as shown in Figure 5(b). When α = 6.84, (1) is in the degeneration state of chaos and it is not suitable for encryption, and most of outlines and information can be seen, as shown in Figure 5(c). But after the degenerative chaos transformed by (7), the clear image is encrypted uniformly, and the image information can be completely hidden, as shown in Figure 5(d). Above analysis shows that the encryption effect of chaos transformed by the BUP is better than that of original chaos, which can improve the characteristics of degenerative chaos. (a) (b) Figure 4. The clear image and the cipher image Since chaos image encryption method belongs to symmetrical keys, the process of decryption is exactly the same as that of encryption. Therefore, under the conditions that are completely same to (2), the operation of decrypting the cipher image is exactly the same as that of encrypting the clear image. Under the conditions of the same as encryption keys, the cipher image in Figure 4(b) is decrypted, as shown in Figure 5(e). This decrypted image is entirely consistent with the clear image in Figure 4(a). But when only α in (2) is changed from 10 to 10 15, the wrong decryption image is shown in Figure 5(f). Although the value of only one parameter in (2) differs by 10 15, any clear image information can not be seen. Since there are 7 parameters in (2), the key space of the chaos transformed by BUP for image encryption has at least 7 10 15. This is very huge key space. In addition, in order to correctly decrypt the cipher image, all the others conditions, such as iteration step, iterations, etc., must match exactly with the those of encryption system. Therefore there is extremely difficult

The Method of Obtaining Best Unary Polynomial for the Chaotic Sequence of Image Encryption 1109 (a) (b) (c) (d) (e) (f) Figure 5. Image encryption and decryption before and after transformed by BUP to decipher for attacker. The experiment shows that the chaos transformed by BUP has higher reliability and security. 5. Conclusions. The new method of getting BUP is proposed in this paper. A BUP (7) has been obtained by using the method based on Chua s system. It is simple and easy to realize hardware circuit obviously. Then Simulation results demonstrate that the chaotic sequence transformed by the BUP has good randomness and is more suitable for image encryption. When only one parameter between encryption and decryption differs by 10 15, any clear image information can not be deciphered. However, when the same parameter in [6] differs by 10 10, the same difficult decryption effect can be gotten. All of those have further proved that the chaotic sequence transformed by the BUP is feasible and effective for image encryption. The method of obtaining a BUP is not only suitable for Chua s system but also for others current chaotic systems. Obviously, there is not only one BUP (7) to be suitable for chaos transformation. According to different chaotic systems and conditions, more kinds of chaotic sequences with better characteristics can be obtained by this method. Since the range of parameters m, a and b in (6), according to the conditions, can be expanded, the new BUPs can be found. Meanwhile, the key space of chaos transformed by BUP for image encryption is expanded greatly. Acknowledgment. This work is supported by the National Natural Science Foundation of China (Grant No. 61471158)

1110 M. Yu, Z.F. Du, X. Liu, D. Qun, and H. Chen REFERENCES [1] Y. S. Zhang, D. Xiao, Y. L. Shu, and J. Li, Adaptive synchronization of hyperchaotic CHEN systems with application to secure communication,ijicic, vol.9, no.3, pp. 1127-1144, 2013. [2] N. S. Maooui, A. Karouma, and M. Zribi,Color image encryption using one-time keys and coupled chaotic systems, Signal processing: image communication, vol.29, no.5, pp. 628-640, 2014. [3] Y. C. Zhou and L. Bao, Image encryption using a new parametric switching chaotic system, Signal processing: image communication, vol.9, no.11, pp. 3093-3052, 2013. [4] Y. L. Luo, M. H. Du, and J. X. Liu, A symmetrical image encryption scheme in wavelet and time domain,commun Nonlinear Sci Number Simulat, vol.9, no.2, pp.447-460, 2015. [5] M. Francois, T. Grosges, D. Barchiesi, and R. Erra, A new image encryption scheme based on a chaotic function, Signal Processing:Image Communication. vol.9, no.3, pp.846-860, 2015. [6] C.M. CHEN, W. FANG, K.H. WANG, T.Y. WU, Comments on an improved secure and efficient password and chaos-based two-party key agreement protocol, Nonlinear Dynamics, vol.87, no.3, pp. 2073-2075, 2017. [7] L. Wu, H. Chen, and K. Yang, Improvement of the chaotic image encryption effect based on unary polynomial transformation, ICIC-EL, vol.27, no.3, pp. 249-259, 2012. [8] A. Wolf, J. B. Swift, H. L. Swinney, and J. A. Vastano, Determining Lyapunov exponents from a time series, Physica D. vol.16, no.3, pp.285-317, 1985. [9] T. Matsumoto, L. O. Chua, and M. Komuro, The double scroll, JIEEE Transactions on Circuits and Systerms, vol.32, no.8, pp.797-818, 1985. [10] Z. Sheng, S. Q. Xie and C. Y. Pan, Probability and mathematical statistics, Higher Education Press, Beijing, 2008. [11] S. Sajic, N. Maletic, and B. M. Todorovic, Random binary sequences in telecommunications, Journal of Electrical Engineering-Elektrotechnicky Casopis, vol.64, no.4, pp.230-237, 2013.