{"title":"用于图像加密应用的耦合卡普兰-约克-逻辑图","authors":"Puneet Kumar Pal, Dhirendra Kumar","doi":"10.1016/j.compeleceng.2024.109850","DOIUrl":null,"url":null,"abstract":"<div><div>Chaos has practical significance in various domains, including the stock market, quantum physics, communication networks, disease diagnosis, cosmic events, and digital data security. Chaotic maps are widely utilised for encrypting multimedia data for secure communication due to their sensitivity to initial conditions and unpredictability. However, some chaotic maps suffer from weak chaotic dynamics that can make them vulnerable to certain types of attacks, limiting their effectiveness in sensitive applications such as encryption or secure communication in military operations and personal data. This research study proposes a novel nonlinear discrete chaotic map termed a coupled Kaplan–Yorke-Logistic map. By coupling chaotic maps, the Kaplan–Yorke map and the Logistic map, we have significantly enhanced key features such as the length of chaotic orbits, output distribution, and the security of chaotic sequences. An empirical assessment of the proposed coupled Kaplan–Yorke-Logistic map in terms of several measures such as bifurcation diagrams, phase diagrams, Lyapunov exponent analysis, permutation entropy, and sample entropy shows promising ergodicity and a diverse range of hyperchaotic behaviours compared to several recent chaotic maps. Consequently, the proposed map is utilised to develop an efficient image encryption algorithm. The encryption algorithm employs a methodology that utilises simultaneous confusion and diffusion processes aiming to significantly reduce the computation time for encryption and decryption processes for real-time applications without compromising the security parameters. A thorough assessment of the proposed image encryption algorithm is performed on a variety of image datasets by utilising multiple cryptanalysis methods, including key space analysis, information entropy, correlation coefficient evaluation, differential attack, key sensitivity testing, histogram analysis, computational time analysis, and occlusion and noise attacks. Comparative analysis with the state-of-the-art methods indicates the superiority of the proposed algorithm.</div></div>","PeriodicalId":50630,"journal":{"name":"Computers & Electrical Engineering","volume":"120 ","pages":"Article 109850"},"PeriodicalIF":4.0000,"publicationDate":"2024-11-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"The coupled Kaplan–Yorke-Logistic map for the image encryption applications\",\"authors\":\"Puneet Kumar Pal, Dhirendra Kumar\",\"doi\":\"10.1016/j.compeleceng.2024.109850\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"<div><div>Chaos has practical significance in various domains, including the stock market, quantum physics, communication networks, disease diagnosis, cosmic events, and digital data security. Chaotic maps are widely utilised for encrypting multimedia data for secure communication due to their sensitivity to initial conditions and unpredictability. However, some chaotic maps suffer from weak chaotic dynamics that can make them vulnerable to certain types of attacks, limiting their effectiveness in sensitive applications such as encryption or secure communication in military operations and personal data. This research study proposes a novel nonlinear discrete chaotic map termed a coupled Kaplan–Yorke-Logistic map. By coupling chaotic maps, the Kaplan–Yorke map and the Logistic map, we have significantly enhanced key features such as the length of chaotic orbits, output distribution, and the security of chaotic sequences. An empirical assessment of the proposed coupled Kaplan–Yorke-Logistic map in terms of several measures such as bifurcation diagrams, phase diagrams, Lyapunov exponent analysis, permutation entropy, and sample entropy shows promising ergodicity and a diverse range of hyperchaotic behaviours compared to several recent chaotic maps. Consequently, the proposed map is utilised to develop an efficient image encryption algorithm. The encryption algorithm employs a methodology that utilises simultaneous confusion and diffusion processes aiming to significantly reduce the computation time for encryption and decryption processes for real-time applications without compromising the security parameters. A thorough assessment of the proposed image encryption algorithm is performed on a variety of image datasets by utilising multiple cryptanalysis methods, including key space analysis, information entropy, correlation coefficient evaluation, differential attack, key sensitivity testing, histogram analysis, computational time analysis, and occlusion and noise attacks. Comparative analysis with the state-of-the-art methods indicates the superiority of the proposed algorithm.</div></div>\",\"PeriodicalId\":50630,\"journal\":{\"name\":\"Computers & Electrical Engineering\",\"volume\":\"120 \",\"pages\":\"Article 109850\"},\"PeriodicalIF\":4.0000,\"publicationDate\":\"2024-11-16\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Computers & Electrical Engineering\",\"FirstCategoryId\":\"94\",\"ListUrlMain\":\"https://www.sciencedirect.com/science/article/pii/S0045790624007778\",\"RegionNum\":3,\"RegionCategory\":\"计算机科学\",\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q1\",\"JCRName\":\"COMPUTER SCIENCE, HARDWARE & ARCHITECTURE\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Computers & Electrical Engineering","FirstCategoryId":"94","ListUrlMain":"https://www.sciencedirect.com/science/article/pii/S0045790624007778","RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"COMPUTER SCIENCE, HARDWARE & ARCHITECTURE","Score":null,"Total":0}
The coupled Kaplan–Yorke-Logistic map for the image encryption applications
Chaos has practical significance in various domains, including the stock market, quantum physics, communication networks, disease diagnosis, cosmic events, and digital data security. Chaotic maps are widely utilised for encrypting multimedia data for secure communication due to their sensitivity to initial conditions and unpredictability. However, some chaotic maps suffer from weak chaotic dynamics that can make them vulnerable to certain types of attacks, limiting their effectiveness in sensitive applications such as encryption or secure communication in military operations and personal data. This research study proposes a novel nonlinear discrete chaotic map termed a coupled Kaplan–Yorke-Logistic map. By coupling chaotic maps, the Kaplan–Yorke map and the Logistic map, we have significantly enhanced key features such as the length of chaotic orbits, output distribution, and the security of chaotic sequences. An empirical assessment of the proposed coupled Kaplan–Yorke-Logistic map in terms of several measures such as bifurcation diagrams, phase diagrams, Lyapunov exponent analysis, permutation entropy, and sample entropy shows promising ergodicity and a diverse range of hyperchaotic behaviours compared to several recent chaotic maps. Consequently, the proposed map is utilised to develop an efficient image encryption algorithm. The encryption algorithm employs a methodology that utilises simultaneous confusion and diffusion processes aiming to significantly reduce the computation time for encryption and decryption processes for real-time applications without compromising the security parameters. A thorough assessment of the proposed image encryption algorithm is performed on a variety of image datasets by utilising multiple cryptanalysis methods, including key space analysis, information entropy, correlation coefficient evaluation, differential attack, key sensitivity testing, histogram analysis, computational time analysis, and occlusion and noise attacks. Comparative analysis with the state-of-the-art methods indicates the superiority of the proposed algorithm.
期刊介绍:
The impact of computers has nowhere been more revolutionary than in electrical engineering. The design, analysis, and operation of electrical and electronic systems are now dominated by computers, a transformation that has been motivated by the natural ease of interface between computers and electrical systems, and the promise of spectacular improvements in speed and efficiency.
Published since 1973, Computers & Electrical Engineering provides rapid publication of topical research into the integration of computer technology and computational techniques with electrical and electronic systems. The journal publishes papers featuring novel implementations of computers and computational techniques in areas like signal and image processing, high-performance computing, parallel processing, and communications. Special attention will be paid to papers describing innovative architectures, algorithms, and software tools.