• Title/Summary/Keyword: chaotic

Search Result 904, Processing Time 0.024 seconds

Modified Multi-Chaotic Systems that are Based on Pixel Shuffle for Image Encryption

  • Verma, Om Prakash;Nizam, Munazza;Ahmad, Musheer
    • Journal of Information Processing Systems
    • /
    • v.9 no.2
    • /
    • pp.271-286
    • /
    • 2013
  • Recently, a pixel-chaotic-shuffling (PCS) method has been proposed by Huang et al. for encrypting color images using multiple chaotic systems like the Henon, the Lorenz, the Chua, and the Rossler systems. All of which have great encryption performance. The authors claimed that their pixel-chaotic-shuffle (PCS) encryption method has high confidential security. However, the security analysis of the PCS method against the chosen-plaintext attack (CPA) and known-plaintext attack (KPA) performed by Solak et al. successfully breaks the PCS encryption scheme without knowing the secret key. In this paper we present an improved shuffling pattern for the plaintext image bits to make the cryptosystem proposed by Huang et al. resistant to chosen-plaintext attack and known-plaintext attack. The modifications in the existing PCS encryption method are proposed to improve its security performance against the potential attacks described above. The Number of Pixel Change Rate (NPCR), Unified Average Changed Intensity (UACI), information entropy, and correlation coefficient analysis are performed to evaluate the statistical performance of the modified PCS method. The simulation analysis reveals that the modified PCS method has better statistical features and is more resistant to attacks than Huang et al.'s PCS method.

A New Light Cryptosystem with a Discretized Chaotic Functions (이산화된 카오스 함수를 이용한 새로운 경량의 암호 시스템)

  • Lim, Dae-Woon;Yang, Gi-Joo;An, Ta-Ho
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.35 no.12C
    • /
    • pp.977-983
    • /
    • 2010
  • The output values of chaotic functions look highly unpredictable and random-like. These features are in accord with the requirements for secure cryptosystems. For this reason, many kinds of cryptosystems using chaotic functions have been proposed so far. However, most of those algorithms are not applicable for light cryptosystems because they need a high level of computing ability. In this paper, we propose a new light chaotic cryptosystems which are suitable for the systems with a low level of computing ability. From the simulations, we show the performance of proposed cryptosystems on computational complexity and security level.

Generalized Hardware Post-processing Technique for Chaos-Based Pseudorandom Number Generators

  • Barakat, Mohamed L.;Mansingka, Abhinav S.;Radwan, Ahmed G.;Salama, Khaled N.
    • ETRI Journal
    • /
    • v.35 no.3
    • /
    • pp.448-458
    • /
    • 2013
  • This paper presents a generalized post-processing technique for enhancing the pseudorandomness of digital chaotic oscillators through a nonlinear XOR-based operation with rotation and feedback. The technique allows full utilization of the chaotic output as pseudorandom number generators and improves throughput without a significant area penalty. Digital design of a third-order chaotic system with maximum function nonlinearity is presented with verified chaotic dynamics. The proposed post-processing technique eliminates statistical degradation in all output bits, thus maximizing throughput compared to other processing techniques. Furthermore, the technique is applied to several fully digital chaotic oscillators with performance surpassing previously reported systems in the literature. The enhancement in the randomness is further examined in a simple image encryption application resulting in a better security performance. The system is verified through experiment on a Xilinx Virtex 4 FPGA with throughput up to 15.44 Gbit/s and logic utilization less than 0.84% for 32-bit implementations.

The chaotic motion analysis by hardware implementation of Bonhoeffer Van der Pol oscillation model (Bonhoeffer Van der Pol 오실레이터 모델의 하드웨어 구현에 의한 카오스 운동 해석)

  • Bae, Yeong-Cheol;Seo, Sam-Mun;Im, Hwa-Yeong
    • The Transactions of the Korea Information Processing Society
    • /
    • v.3 no.4
    • /
    • pp.877-882
    • /
    • 1996
  • The effects of periodic and chaotic behaviour in the Bonhoeffer-Van der Pol (BVP) oscillation of the nerve membrane driven by a periodic stimulating current A1 coswtare investigated through hardware implementation.For hardware implementation of the BVP model. real element values were escaled with computer simulation results to determine the parameter real value.As the parameter A1 varied in the range 0 to 1.3, the BVP model showed an ordinary and reversed period-doubling cascade and a chaotic state. At the low driving amplitude ofa1 the period-doubling showed and at the high driving amplitude of A1 the chaotic state occured. To analyse the BVP model for chaotic behaviour Phase Plane, Time series are used to verify that properties.

  • PDF

Introduction to Chaos Analysis Method of Time Series Signal: With Priority Given to Oceanic Underwater Ambient Noise Signal (시계열 신호의 흔돈분석 기법 소개: 해양 수중소음 신호를 중심으로)

  • Choi, Bok-Kyoung;Kim, Bong-Chae;Shin, Chang-Woong
    • Ocean and Polar Research
    • /
    • v.28 no.4
    • /
    • pp.459-465
    • /
    • 2006
  • Ambient noise as a background noise in the ocean has been well known for its the various and irregular signal characteristics. Generally, these signals we treated as noise and they are analyzed through stochastical level if they don't include definite sinusoidal signals. This study is to see how ocean ambient noise can be analyzed by the chaotic analysis technique. The chaotic analysis is carried out with underwater ambient noise obtained in areas near the Korean Peninsula. The calculated physical parameters of time series signal are as follows: histogram, self-correlation coefficient, delay time, frequency spectrum, sonogram, return map, embedding dimension, correlation dimension, Lyapunov exponent, etc. We investigate the chaotic pattern of noises from these parameters. From the embedding dimensions of underwater noises, the assesment of underwater noise by chaotic analysis shows similar results if they don't include a definite sinusoidal signal. However, the values of Lyapunov exponent (divergence exponent) are smaller than that of random noise signal. As a result we confirm the possibility of classification of underwater noise using Lyapunov analysis.

Robust Digital Watermarking Using Chaotic Sequence (카오스 시퀀스를 이용한 견고한 디지털 워터마킹)

  • 김현환;정기룡
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.7 no.4
    • /
    • pp.630-637
    • /
    • 2003
  • This paper proposed a new watermarking algorithm using chaotic sequence instead of conventional M-sequence for protecting copyright to the author. Robustness and security is very important for watermarking process. We use multi-threshold value according to the human visual system for improving robustness of watermarking to each subband images coefficient differently after wavelet transform. And then, we embedded watermark image to original image by multi-watermark weights which are made by random sequence generator. We detect watermark image from the difference data which is made from each wavelet subband images. We also simulate the efficiency from the various possible attacks. Chaotic sequence is better than M-sequence, because the one is very easy to make sequence and the chaotic sequence is changed easy according to the initial value. So, the chaotic sequence has the better security than the conventional M-sequence.

Design of the composition state machine based on the chaotic maps (혼돈맵들에 기반한 합성 상태머신의 설계)

  • Seo, Yong-Won;Park, Jin-Soo
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.10 no.12
    • /
    • pp.3688-3693
    • /
    • 2009
  • In this paper the design methode of a separated composition state machine based on the compositive map with connecting two chaotic maps together - sawtooth map $S_2(x)$ and tent map $T_2(x)$ and the result of that is proposed. this paper gives a graph of the chaotic states generated by the composition state machine using the compositive logic of two different chaotic maps - sawtooth map and tent map and also shows that the period of pseudo-random states has the length according to the precision of the discreet truth table.

Optimal Design for Flexible Passive Biped Walker Based on Chaotic Particle Swarm Optimization

  • Wu, Yao;Yao, Daojin;Xiao, Xiaohui
    • Journal of Electrical Engineering and Technology
    • /
    • v.13 no.6
    • /
    • pp.2493-2503
    • /
    • 2018
  • Passive dynamic walking exhibits humanoid and energy efficient gaits. However, optimal design of passive walker at multi-variable level is not well studied yet. This paper presents a Chaotic Particle Swarm Optimization (CPSO) algorithm and applies it to the optimal design of flexible passive walker. Hip torsional stiffness and damping were incorporated into flexible biped walker, to imitate passive elastic mechanisms utilized in human locomotion. Hybrid dynamics were developed to model passive walking, and period-one gait was gained. The parameters global searching scopes were gained after investigating the influences of structural parameters on passive gait. CPSO were utilized to optimize the flexible passive walker. To improve the performance of PSO, multi-scroll Jerk chaotic system was used to generate pseudorandom sequences, and chaotic disturbance would be triggered if the swarm is trapped into local optimum. The effectiveness of CPSO is verified by comparisons with standard PSO and two typical chaotic PSO methods. Numerical simulations show that better fitness value of optimal design could be gained by CPSO presented. The proposed CPSO would be useful to design biped robot prototype.

Development of a Three-Dimensional Barrier Embedded Kenics Micromixer by Means of a Micro-Stereolithography Technology (마이크로 광 조형기술을 이용한 3차원의 배리어가 포함된 케닉스 마이크로 믹서의 개발)

  • Lee In Hwan;Kwon Tai Hun;Cho Dong-Woo;Kim Dong Sung
    • Transactions of the Korean Society of Mechanical Engineers A
    • /
    • v.29 no.6 s.237
    • /
    • pp.904-912
    • /
    • 2005
  • The flow in a microchannel is usually characterized as a low Reynolds number (Re) so that good mixing is quite difficult to be achieved. In this regard, we developed a novel chaotic micromixer, named Barrier Embedded Kenics Micromixer (BEKM). In the BEKM, the higher level of chaotic mixing can be achieved by combining two general chaotic mixing mechanisms: (i) splitting/reorientation by helical elements inside the microchannel and (ii) stretching/folding via periodically located barriers on the channel wall. The fully three-dimensional geometry of BEKM was realized by a micro-stereolithography technology, in this study, along with a Kenics micromixer and a circular T-pipe. Mixing performances of three micromixers were experimentally characterized in terms of an average mixing color intensity of phenolphthalein. Experimental results show that BEKM has better mixing performance than other two micromixers. Chaotic mixing mechanism, proposed in this study, could be integrated as a mixing component with Micro-Total-Analysis-System, Lab-on-a-chip and so on.

Enhanced Mutual Authentication Scheme based on Chaotic Map for PCM in NFC Service Environment

  • Park, Sung-Wook;Lee, Im-Yeong
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.2
    • /
    • pp.1180-1200
    • /
    • 2017
  • Currently, automated payment services provide intuitive user interfaces by adapting various wireless communication devices with mobile services. For example, companies like Samsung, Google, and Apple have selected the NFC payment method to service payments of existing credit cards. An electronic payment standard has been released for NFC activation within Korea and will strengthen the safety of payment service communications. However, there are various security risks regarding the NFC-based electronic payment method. In particular, the NFC payment service using the recently released lightweight devices cannot provide the cryptographic strength that is supported by many financial transaction services. This is largely due to its computational complexity and large storage resource requirements. The chaotic map introduced in this study can generate a highly complicated code as it is sensitive to the initial conditions. As the lightweight study using the chaotic map has been actively carried out in recent years, associated authentication techniques of the lightweight environment have been released. If applied with a chaotic map, a high level of cryptographic strength can be achieved that can provide more functions than simple XOR operations or HASH functions. Further, this technique can be used by financial transaction services. This study proposes a mutual authentication technique for NFC-PCM to support an NFC payment service environment based on the chaotic map.