The outbreak of the novel coronavirus (COVID-19), which was firstly reported in China, has affected many countries worldwide. To understand and predict the transmission dynamics of this disease, mathematical models can be very effective. It has been shown that the fractional order is related to the memory effects, which seems to be more effective for modeling the epidemic diseases.
Chaos-based encryption schemes have attracted many researchers around the world in the digital image security domain. Digital images can be secured using existing chaotic maps, multiple chaotic maps, and several other hybrid dynamic systems that enhance the non-linearity of digital images. The combined property of confusion and diffusion was introduced by Claude Shannon which can be employed for digital image security. In this paper, we proposed a novel system that is computationally less expensive and provided a higher level of security. The system is based on a shuffling process with fractals key along with three-dimensional Lorenz chaotic map. The shuffling process added the confusion property and the pixels of the standard image is shuffled. Three-dimensional Lorenz chaotic map is used for a diffusion process which distorted all pixels of the image. In the statistical security test, means square error (MSE) evaluated error value was greater than the average value of 10000 for all standard images. The value of peak signal to noise (PSNR) was 7.69(dB) for the test image. Moreover, the calculated correlation coefficient values for each direction of the encrypted images was less than zero with a number of pixel change rate (NPCR) higher than 99%. During the security test, the entropy values were more than 7.9 for each grey channel which is almost equal to the ideal value of 8 for an 8-bit system. Numerous security tests and low computational complexity tests validate the security, robustness, and real-time implementation of the presented scheme.Entropy 2020, 22, 274 2 of 28 scientist Claude Shannon in the year 1949, the same person introduced the property of confusion and diffusion. The property of randomness helped in securing digital multimedia information. The security of digital bitstream became one of the central issues when the data was transformed into a digital bitstream. The privacy of digital information posed a new problem in the digital world. The secure digital data in the form of binary bits are openly accessible for hackers. The data can be easily obtainable from the far site using the internet. It needs proper measurements to secure digital information over an insecure line of communication [1][2][3]. The digital data can be secured by hiding the identity of the original digital image over the secret cover image or another approach is pixels distortion or encryption. The first method of securing digital information is information hiding techniques and the study of steganography, which means the value of the data is preserved under the secret image. The image security is a very important issue as compared to textual security, where image pixels are to be examined concerning nearby pixels in a different orientation. The more pixels are dissimilar means the proposed encryption technique is more suitable for brute force attacks. Moreover, plain image pixels are always correlated to each other where an attacker can easily find secret information. Chaos-based encryption technique is preferred over some ...
Over the last few decades, different mediums of secure communication use chaos which is demonstrated by some nonlinear dynamical systems. Chaos shows unpredictable behavior and this characteristic is quite helpful in different encryption techniques and for multimedia security. In this work, the chaotic behavior of the improved Tent-Sine map is conferred and ultimately a new method to construct substitution-boxes is proposed. This new method explores the features of chaos through TSS map and algebraic Mobius transformation to generate strong S-boxes. The S-boxes are assessed using standard tests suit which includes nonlinearity, strict avalanche criterion, bit independence criterion, linear approximation probability and differential uniformity. Moreover, the proposed S-boxes show excellent statistical properties under majority logic criterions such as correlation, homogeneity, energy, entropy, contrast. The statistical encryption results are demonstrate the better performance of the proposed S-boxes when compared with some of state of the art S-boxes including AES, Gray, APA S8 AES, Skipjack and validate the suitability of anticipated method. INDEX TERMS Substitution-box, block cipher, improved chaotic map, nonlinearity.
Designing chaotic systems with specific features is a hot topic in nonlinear dynamics. In this study, a novel chaotic system is presented with a unique feature of crossing inside and outside of a cylinder repeatedly. This new system is thoroughly analyzed by the help of the bifurcation diagram, Lyapunov exponents’ spectrum, and entropy measurement. Bifurcation analysis of the proposed system with two initiation methods reveals its multistability. As an engineering application, the system’s efficiency is tested in image encryption. The complexity of the chaotic attractor of the proposed system makes it a proper choice for encryption. States of the chaotic attractor are used to shuffle the rows and columns of the image, and then the shuffled image is XORed with the states of chaotic attractor. The unpredictability of the chaotic attractor makes the encryption method very safe. The performance of the encryption method is analyzed using the histogram, correlation coefficient, Shannon entropy, and encryption quality. The results show that the encryption method using the proposed chaotic system has reliable performance.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.