2019
DOI: 10.3390/app9040781
|View full text |Cite
|
Sign up to set email alerts
|

S-Box Based Image Encryption Application Using a Chaotic System without Equilibrium

Abstract: Chaotic systems without equilibrium are of interest because they are the systems with hidden attractors. A nonequilibrium system with chaos is introduced in this work. Chaotic behavior of the system is verified by phase portraits, Lyapunov exponents, and entropy. We have implemented a real electronic circuit of the system and reported experimental results. By using this new chaotic system, we have constructed S-boxes which are applied to propose a novel image encryption algorithm. In the designed encryption al… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
71
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
6
2

Relationship

0
8

Authors

Journals

citations
Cited by 110 publications
(71 citation statements)
references
References 63 publications
(70 reference statements)
0
71
0
Order By: Relevance
“…For example, algorithms based on chaos need more steps for generating one iteration if the chaotic systems are based on ordinary differential equations (ODEs) instead of mappings. References [4,6,15,36,39] are based on ODEs which imply more computational operations to solve the systems than references [2,3,9,10,35,38,40] based on iterated maps. It would be unfair to compare the computational time between these algorithms that all of them generate good S-boxes.…”
Section: Performance Comparationmentioning
confidence: 99%
See 2 more Smart Citations
“…For example, algorithms based on chaos need more steps for generating one iteration if the chaotic systems are based on ordinary differential equations (ODEs) instead of mappings. References [4,6,15,36,39] are based on ODEs which imply more computational operations to solve the systems than references [2,3,9,10,35,38,40] based on iterated maps. It would be unfair to compare the computational time between these algorithms that all of them generate good S-boxes.…”
Section: Performance Comparationmentioning
confidence: 99%
“…In recent years, many papers have been reported and focus on studying cryptosystems based on chaos, see ref. [3][4][5][6][7][8][9][10][11][12][13][14][15][16], this is, because of the relationships that exists between the chaotic system properties and the cryptosystem properties. In ref.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…With the rapid development of network communication and big data applications, information security has become a more and more popular topic. Scholars have proposed a variety of information security technologies, including information encryption [1][2][3][4][5], watermarking [6,7], privacy protection [8][9][10], and so on. Among them, cryptography is the most basic technology in information security.…”
Section: Introductionmentioning
confidence: 99%
“…These features make the traditional encryption algorithms such as data encryption standard (DES), advanced encryption standard (AES), and Rivest-Shamir-Adleman (RSA) unsatisfactory. Thus, plenty of new encryption methods have been developed based on various technologies, such as chaos [2][3][4][5], compressed sensing [6,7], wave transmission [8,9], hash function [10,11], deoxyribonucleic acid coding [12,13], genetics [14], gray code [15], elliptical curve [16], and so on. Among them, the chaos-based image encryption schemes have received extensive attention due to the advantages of chaotic systems.…”
Section: Introductionmentioning
confidence: 99%