Comparisons of Typical Discrete Logistic Map and Henon Map

Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 297)

Abstract

Applying chaos theory to the encryption scheme has become a hot spot. Although lots of chaotic maps have been proposed, they don’t have advantages in all respects. In this paper, the typical one-dimensional Logistic map and two-dimensional Henon map are studied. The digital output sequences of Logistic map and Henon map can be generated by building their models on DSP Builder platform. And the sequences are tested and compared according to the statistical properties, including balance test, run test and autocorrelation test. Meanwhile, run the transformed VHDL projects in Quartus II environment to compare these two kinds of resource utilizations. The results show that digital Henon sequences have better pseudo-randomness, but Logistic project uses less hardware resources.

Keywords

chaotic maps DSP Builder statistical properties hardware resources 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Zhan, M., Li, G.P.: Property Analysis of a Chaotic Sequence Generating Scheme and Its Improvement. J. Southwest University (Natural Science Edition) 30, 148–151 (2008)Google Scholar
  2. 2.
    Liu, B., Zhang, Y.Q., Liu, F.L.: A New Scheme on Perturbing Digital Chaotic Systems. J. Computer Science 32, 71–74 (2005)Google Scholar
  3. 3.
    Zhang, Y.P., Zuo, F., Zhai, Z.J.: A Color Image Encryption Algorithm Based on Chaotic Chebychev and Variable Parameters Logistic Systems. J. Northwestern Polytechnical University 28, 628–632 (2010)Google Scholar
  4. 4.
    Ding, L.N., Ding, Q., Chen, Q.: Design and Statistical Tests for Lorenz Chaotic Sequences Based on FPGA. J. Electron Devices 30, 1654–1657 (2007)Google Scholar
  5. 5.
    Jin, C.H., Yang, Y., Qi, C.D.: A Related-Key Attack on Chaotic Stream Ciphers. J. Electronics & Information Technology 28, 410–414 (2006)Google Scholar
  6. 6.
    Jin, C.H., Yang, Y.: A Divide-and-Conquer Attack on Self-synchronous Chaotic Ciphers. J. Acta Electronica Sinica 34, 1337–1341 (2006)Google Scholar
  7. 7.
    Zhang, F.: A New Six-Dimensional Chaotic Algorithms and Its Application in Image Encryption. J. Microelectronics & Computer 30, 62–65 (2013)Google Scholar
  8. 8.
    Wang, J.L., Cheng, L.Y.: Bifurcations and Chaos of the Model of Rossler System. J. Henan Science 30, 1403–1406 (2012)Google Scholar
  9. 9.
    Han, J.Q., Lun, S.X.: Method of Realizing Chaotic Masking Communication Based on Duffing System. J. Computer Science 40, 82–84 (2013)Google Scholar
  10. 10.
    Fan, J.L., Zhang, X.F.: Piecewise Logistic Chaotic Map and Its Performance Analysis. J. Acta Electronica Sinica 37, 720–725 (2009)MathSciNetGoogle Scholar
  11. 11.
    Tang, X.M., Zhao, D.F., Tan, M.C.: Study on an Improved Digital Chaotic Sequence of the Tent Map Applied in the DSSS. J. Yunnan University (Natural Science Edition) 32, 396–399 (2010)Google Scholar
  12. 12.
    Sun, H.Z., Mao, A.X., Su, X.Y., Liu, L., Wei, R.H., Liu, G.: Simulation of the Henon System’s Dynamical Behavior’s by Utlizing MATLAB. J. Shangqiu Teachers College 27, 54–57 (2011)MATHGoogle Scholar
  13. 13.
    Zhao, X.Z., Li, Y.R.: Research on the Digital Image Encryption Technology Based on the Logistic Sequence. J. Zhanjiang Normal College 30, 88–91 (2009)MATHGoogle Scholar
  14. 14.
    Zhang, H.L., Min, F.H., Wang, E.R.: The Comparison for Lyapunov Exponets Calculation Methods. J. Nanjing Normal University (Engineering and Technology Edition) 12, 5–9 (2012)Google Scholar
  15. 15.
    Liao, D.W., Zhu, W.Q.: Research on Lyapunov Exponents Algorithm and Its Application. J. Wenzhou Vocational & Technical College 8, 39–41 (2008)Google Scholar
  16. 16.
    Luo, L.J., Li, Y.S., Li, T., Dong, Q.T.: Research and Simulation of Lyapunov Exponents. J. Computer Simulation 22, 285–288 (2005)Google Scholar
  17. 17.
    He, S.L., Huang, Y., Huang, J.: Simulation Study on the Properties of Henon Mapping Sequences. J. Kunming University 34, 81–83 (2012)Google Scholar
  18. 18.
    Liu, X.K., Sun, X.H., Wan, L.H.: A New Image Encryption Based on Henon Mapping. J. China Jiliang University 19, 338–341 (2008)Google Scholar
  19. 19.
    Yu, Y.H., Liu, W.D.: Analysis of Balance of Chaotic Spreading Spectrum Sequences Based on Logistic-Map and Tent-Map. J. Chongqing University of Posts and Telecommunications (Natural Science) 16, 61–64 (2004)MATHGoogle Scholar
  20. 20.
    Liao, N.H., Gao, J.F.: The Chaotic Spreading Sequences Generated by the Extended Chaotic Map and Its Performance Analysis. J. Electronics & Information Technology 28, 1255–1257 (2006)Google Scholar

Copyright information

© Springer International Publishing Switzerland 2014

Authors and Affiliations

  1. 1.Electronic Engineering CollegeHeilongjiang UniversityHarbinChina

Personalised recommendations