• Title/Summary/Keyword: chaotic map

Search Result 114, Processing Time 0.035 seconds

New chaotic map development and its application in encrypted color image

  • JarJar, Abdellatif
    • Journal of Multimedia Information System
    • /
    • v.8 no.2
    • /
    • pp.131-142
    • /
    • 2021
  • This paper traces the process of constructing a new one-dimensional chaotic map, and will provide a simple application in color image encryption. The use of Sarkovskii's theorem will make it possible to determine the existence of chaos and restrict all conditions to ensure the existence of this new sequence. In addition, the sensitivity to initial conditions will be proved by Lyapunov's index value. Similarly, the performance of this new chaotic map will be illustrated graphically and compared with other chaotic maps most commonly used in cryptography. Finally, a humble color image encryption application will show the power of this new chaotic map.

The uniform laws of large numbers for the chaotic logistic map

  • Bae, Jongsig;Hwang, Changha;Jun, Doobae
    • Journal of the Korean Data and Information Science Society
    • /
    • v.28 no.6
    • /
    • pp.1565-1571
    • /
    • 2017
  • The standard logistic map is an iterative function, which forms a discrete-time dynamic system. The chaotic logistic map is a kind of ergodic map defined over the unit interval. In this paper we study the limiting behaviors on the several processes induced by the chaotic logistic map. We derive the law of large numbers for the process induced by the chaotic logistic map. We also derive the uniform law of large numbers for this process. When deriving the uniform law of large numbers, we study the role of bracketing of the indexed class of functions associated with the process. Then we apply the idea of DeHardt (1971) associated with the bracketing method to the process induced by the logistic map. We finally illustrate an application to Monte Carlo integration.

A Wireless Channel model for Sensor Network (센서 네트워크에서의 채널 모델링)

  • 한상섭;안종석
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2003.10c
    • /
    • pp.484-486
    • /
    • 2003
  • 무선 통신 채널에서 오류 패턴은 유선에 비해 다른 오류 특징을 가지고 오류가 빈번하게 발생한다. 특히 오류가 오랫동안 없는 상태가 지속되기도 한다. 그러나 시뮬레이션에서 이용되는 균일 분포(Uniform distribution)와 같은 간단한 오류 모델에 의해 발생된 오류는 실제적인 오류 패턴과는 많은 차이가 있다. 이러한 차이점을 없애기 위해 측정된 오류를 기반으로 해서 실제적인 오류 패턴과 비슷한 chaotic map 모델을 시뮬레이션에서 사용할 수 있다. Chaotic map 모델은 다른 오류모델에 비해서 실제적인 오류 패턴과 비슷한 오류 패턴을 가지고, 비교적 간단하게 필요한 파라미터를 구할 수 있다. 본 논문에서는 chaotic map 모델을 무선 센서 네트워크에 적용 했다. 센서 네트워크에서 수집된 데이터와 이 데이터를 통한 Chaotic Map 모델을 CCDF(complementary cumulative distribution function)를 통해 비교했다. 무선랜 환경에서 실험된 chaotic map model은 2/3이상의 결과에서 일치하였지만. 센서 네트워크를 적용하면 무선랜과는 다른 특성을 가지기 때문에 30%의 트레이스에서 chaotic map 모델과 일치한다.

  • PDF

Digital Chaotic Communication System Based on CDSK Modulation (CDSK 방식의 디지털 카오스 통신 시스템)

  • Bok, Junyeong;Ryu, Heung-Gyoon
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.38A no.6
    • /
    • pp.479-485
    • /
    • 2013
  • Recently, interest for wireless communication technology with improved security and low eavesdropping probability is increasing rapidly recognizing that information security is an important. Chaos signal can be used encode information efficiently due to irregular phenomena. Chaotic signal is very sensitive to the initial condition. Chaos signal is difficult to detect the signal if you do not know the initial conditions. Also, chaotic signal has robustness to multipath interference. In this paper, we evaluate the performance of correlation delay shift keying (CDSK) modulation with different chaotic map such as Tent map, Logistic map, Henon map, and Bernoulli shift map. Also, we analyze the BER performance depending on the selection of spreading factor (SF) in CDSK. Through the theoretical analyses and simulations, it is confirmed that Henon map has better BER performance than the other three chaotic maps when spreading factor is 70.

Design of Random Binary Sequence Generator using the Chaotic Map (혼돈맵을 사용한 난수성 2진 순서발생기의 설계)

  • Park, Kwang-Hyeon;Baek, Seung-Jae
    • The Journal of the Korea Contents Association
    • /
    • v.8 no.7
    • /
    • pp.53-57
    • /
    • 2008
  • The discretized saw-tooth map with the 16-bit finite precision which is one of the 1-dimensional chaotic maps is designed, and the circuit of chaotic binary sequence generator using the discretized saw-tooth map is presented also in this brief. The real implementation of designed chaotic map is accomplished by connecting the input and output lines exactly according to the simplified Boolean functions of output variables obtained from truth table which is discretized. The random binary output sequences generated by mLFSR generator were used for the inputs of descretized saw-tooth map, and, by the descretized map, chaotic binary sequence which has more long period of 16 times minimally is generated as a results.

CHAOTIC HOMEOMORPHISMS OF C INDUCED BY HYPERBOLIC TORAL AUTOMORPHISMS AND BRANCHED COVERINGS OF C

  • Lee, Joo-Sung
    • Communications of the Korean Mathematical Society
    • /
    • v.18 no.1
    • /
    • pp.105-115
    • /
    • 2003
  • It is well known that there exists a regular branched covering map from T$^2$ onto $\={C}$ iff the ramification indices are (2,2,2,2), (2,4,4), (2,3,6) and (3,3,3). In this paper we construct (count-ably many) chaotic homeomorphisms induced by hyperbolic toral automorphism and regular branched covering map corresponding to the ramification indices (2,2,2,2). And we also gave an example which shows that the above construction of a chaotic map is not true in general if the ramification indices is (2,4,4) and also show that there are no chaotic homeomorphisms induced by hyperbolic toral automorphism and regular branched covering map corresponding to the ramification indices (2,3,6) and (3,3,3).

Improvement of Topology Algorithm's Convergence Rate Using Chaotic Map (카오틱 맵을 이용한 위상 최적화 알고리즘의 수렴속도 향상)

  • Kim, Yong-Ho;Kim, Gi-Chul;Lee, Jae-Hwan;Jang, Hyo-Jae;Han, Seog-Young
    • Journal of the Korean Society of Manufacturing Technology Engineers
    • /
    • v.23 no.3
    • /
    • pp.279-283
    • /
    • 2014
  • Recently, a topology algorithm based on the artificial bee colony algorithm (ABCA) has been proposed for static and dynamic topology optimization. From the results, the convergence rate of the algorithm was determined to be slightly slow. Therefore, we propose a new search method to improve the convergence rate of the algorithm using a chaotic map. We investigate the effect of the chaotic map on the convergence rate of the algorithm in static and dynamic topology optimization. The chaotic map has been applied to three cases, namely, employ bee search, onlooker bee search, and both employ bee as well as onlooker bee search steps. It is verified that the case in which the logistic function of the chaotic map is applied to both employ bee as well as onlooker bee search steps shows the best dynamic topology optimization, improved by 5.89% compared to ABCA. Therefore, it is expected that the proposed algorithm can effectively be applied to dynamic topology optimization to improve the convergence rate.

Design of image encryption system using multiple chaotic maps (다중 카오스 사상을 이용한 영상 암호시스템 설계)

  • 이성우;신재호
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.14 no.4
    • /
    • pp.183-194
    • /
    • 2004
  • The proliferation of the Internet and the rapid progress of wire/wireless communication technology makes security of digital images more and more important since the exchanges of digital images occur more and more frequently. And as the tight relationship between chaos theory and cryptography, many researches for development of new encryption systems based on chaotic maps have been widely progressed recently. In this paper, we propose a digital image encryption system based on both one-dimensional PLCM(Piecewise Linear Chaotic Map) and two-dimensional baker map. This proposed system is a product cipher that contains a perturbance-based chaotic stream cipher based on ID PLCM and a chaotic block cipher based on 2D baker map and is very high secure and easily implementable cipher having both a good confusion property and a good diffusion property. And with test results, we showed this system is very secure against statistical attacks.

The design of digital circuit for chaotic composition map (혼돈합성맵의 디지털회로설계)

  • Park, Kwang-Hyeon;Seo, Yong-Won
    • Journal of Advanced Navigation Technology
    • /
    • v.17 no.6
    • /
    • pp.652-657
    • /
    • 2013
  • In this paper the design methode of a separated composition state machine based on the compositive map with two chaotic maps together and the result of that is proposed. The digital circuits of chaotic composition map for the use of chaotic binary stream generator are designed in this work. The discretized truth table of chaotic composition function which is composed of two chaotic functions - the saw tooth function and skewed logistic function - is made out, and also simplefied Boolean algebras of digital circuits are obtained as a mathematical model. Consequently, the digital circuits of the map for chaotic composition function are presented in this paper.

Image Encryption Based on Quadruple Encryption using Henon and Circle Chaotic Maps

  • Hanchinamani, Gururaj;Kulkarni, Linganagouda
    • Journal of Multimedia Information System
    • /
    • v.2 no.2
    • /
    • pp.193-206
    • /
    • 2015
  • In this paper a new approach for image encryption based on quadruple encryption with dual chaotic maps is proposed. The encryption process is performed with quadruple encryption by invoking the encrypt and decrypt routines with different keys in the sequence EDEE. The decryption process is performed in the reverse direction DDED. The key generation for the quadruple encryption is achieved with a 1D Circle map. The chaotic values for the encrypt and decrypt routines are generated by using a 2D Henon map. The Encrypt routine E is composed of three stages i.e. permutation, pixel value rotation and diffusion. The permutation is achieved by: row and column scrambling with chaotic values, exchanging the lower and the upper principal and secondary diagonal elements based on the chaotic values. The second stage circularly rotates all the pixel values based on the chaotic values. The last stage performs the diffusion in two directions (forward and backward) with two previously diffused pixels and two chaotic values. The security and performance of the proposed scheme are assessed thoroughly by using the key space, statistical, differential, entropy and performance analysis. The proposed scheme is computationally fast with security intact.