{"title":"The effect of multi-scrolls distribution on image encryption","authors":"A. Radwan, S. Abd-El-Hafiz","doi":"10.1109/ICECS.2014.7050015","DOIUrl":null,"url":null,"abstract":"This paper introduces the mathematical formulation of a ID digital control multi-scroll chaotic jerk system. The eigenvalue analysis of such systems is presented and validated through different numerical examples. A generalized 2D multi-scrolls chaotic system is also presented with numerical examples. As an application, these ID and 2D chaotic systems are used in a simple encryption technique. Two different cases from each ID and 2D multi-scrolls, having a total of 12 scrolls under the same initial conditions, are utilized as a random source after postprocessing. Correlation coefficients, differential attack measures and histograms are used to evaluate the encrypted images as well as the effect of the used nonlinear block.","PeriodicalId":133747,"journal":{"name":"2014 21st IEEE International Conference on Electronics, Circuits and Systems (ICECS)","volume":"47 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"4","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2014 21st IEEE International Conference on Electronics, Circuits and Systems (ICECS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICECS.2014.7050015","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 4
Abstract
This paper introduces the mathematical formulation of a ID digital control multi-scroll chaotic jerk system. The eigenvalue analysis of such systems is presented and validated through different numerical examples. A generalized 2D multi-scrolls chaotic system is also presented with numerical examples. As an application, these ID and 2D chaotic systems are used in a simple encryption technique. Two different cases from each ID and 2D multi-scrolls, having a total of 12 scrolls under the same initial conditions, are utilized as a random source after postprocessing. Correlation coefficients, differential attack measures and histograms are used to evaluate the encrypted images as well as the effect of the used nonlinear block.