Advertisement

Deliberate Exponential Chaotic Encryption Map

  • Aladdein M. S. AmroEmail author
Conference paper
Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 1073)

Abstract

In the given work a new chaotic map is presented, referred to as deliberate exponential chaotic encryption map (DECM), the proposed map characteristics meets the recent demand of simple encryption algorithms with strong security. The methodology of iterative examination and correction was used to reach the optimal characteristics of the map. The chaotic behavior of the proposed map is examined, and its characteristics are proved experimentally, the achieved results shows advantages of the proposed map over the well-known chaotic maps. This gives the proposed map a potential to be implemented in real-time encryption algorithms for different kinds of information

Keywords

Chaotic map S-unimodality Chaotic behavior 

References

  1. 1.
    Peng, Y., Sun, K., Peng, D., Ai, W.: Dynamics of a higher dimensional fractional-order chaotic map. Phys. A 525, 96–107 (2019)MathSciNetCrossRefGoogle Scholar
  2. 2.
    Zhang, T., Yicong Zhou, C.L., Chen, P.: A new combined chaotic system for image encryption. In: 2012 International Conference on System Science and Engineering (ICSSE) (2012)Google Scholar
  3. 3.
    Kocarev, L.: Chaos-based cryptography a brief overview. In: Proceedings of the 5th WSEAS International Conference on Nonlinear Analysis, Non-Linear Systems and Chaos 2011, pp. 6–21 (2011)Google Scholar
  4. 4.
    Abanda1, Y., Tiedeu, A.: Image encryption by chaos mixing. IET Image Process. 10(10), 742–750 (2016)Google Scholar
  5. 5.
    Shyamsunder, S., Kaliyaperumal, G.: Image encryption and decryption using chaotic maps and modular arithmetic. Am. J. Sign. Process. 1(1), 24–33 (2011)CrossRefGoogle Scholar
  6. 6.
    Ye, R., Xi, Y., Ma, Y.: A chaotic image encryption scheme using swapping based confusion approach: a survey. In: First IEEE International Conference on Computer Communication and the Internet, pp. 374–377 (2016)Google Scholar
  7. 7.
    Hossain, B., Rahman, T., Rahman, S., Islam, S.: A new approach of image encryption using 3D chaotic map to enhance security of multimedia component. In: International Conference on Informatics, Electronics & Vision (ICIEV), pp. 1–6 (2014)Google Scholar
  8. 8.
    Hua, Z., Zhou, B., Zhou, Y.: Sine chaotification model for enhancing chaos and its hardware implementation. IEEE Trans. Ind. Electron. 66(2), 1273–1284 (2019)MathSciNetCrossRefGoogle Scholar
  9. 9.
    Kuo, C.L., Huang, L.C., Wang, S.J., Lin, J.S., Wang, C.C., Yan, J.J.: Image encryption based on fuzzy synchronization of chaos systems. In: IEEE 37th Annual Computer Software and Applications Conference (COMPSAC), pp. 153–154 (2013)Google Scholar
  10. 10.
    Glendinning, P.: Stability. Instability and Chaos. Cambridge University Press, Cambridge (1994)CrossRefGoogle Scholar
  11. 11.
    Aguirregabiria, J.M.: Robust chaos with variable lyapunov exponent in smooth one-dimensional maps. Chaos, Solitons Fractals 42(4), 2531–2539 (2009)CrossRefGoogle Scholar
  12. 12.
    Dachselt, F., Schwarz, W.: Chaos and cryptography. IEEE Trans. Circ. Syst. I: Fundam. Theor. Appl. 48, 1498–1501 (2001)Google Scholar
  13. 13.
    Shastry, M., Nagaraj, N., Vaidya, P.: The B-exponential map: a generalization of the logistic map, and its applications in generating pseudo-random numbers. Comput. Res. Repository, vol. 7. arXiv preprint cs/0607069 (2006)Google Scholar
  14. 14.
    Gao, H., Zhang, Y., Liang, S., Li, D.: A new chaotic algorithm for image encryption. Chaos, Solitons Fractals 29, 393–399 (2006)CrossRefGoogle Scholar

Copyright information

© Springer Nature Switzerland AG 2020

Authors and Affiliations

  1. 1.Computer Engineering DepartmentTaibah UniversityMedinaKingdom of Saudi Arabia

Personalised recommendations