[go: up one dir, main page]
More Web Proxy on the site http://driver.im/
Skip to main content

Deliberate Exponential Chaotic Encryption Map

  • Conference paper
  • First Online:
Emerging Trends in Intelligent Computing and Informatics (IRICT 2019)

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 1073))

  • 1704 Accesses

Abstract

In the given work a new chaotic map is presented, referred to as deliberate exponential chaotic encryption map (DECM), the proposed map characteristics meets the recent demand of simple encryption algorithms with strong security. The methodology of iterative examination and correction was used to reach the optimal characteristics of the map. The chaotic behavior of the proposed map is examined, and its characteristics are proved experimentally, the achieved results shows advantages of the proposed map over the well-known chaotic maps. This gives the proposed map a potential to be implemented in real-time encryption algorithms for different kinds of information

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
£29.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
GBP 19.95
Price includes VAT (United Kingdom)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
GBP 143.50
Price includes VAT (United Kingdom)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
GBP 179.99
Price includes VAT (United Kingdom)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Peng, Y., Sun, K., Peng, D., Ai, W.: Dynamics of a higher dimensional fractional-order chaotic map. Phys. A 525, 96–107 (2019)

    Article  MathSciNet  Google Scholar 

  2. Zhang, T., Yicong Zhou, C.L., Chen, P.: A new combined chaotic system for image encryption. In: 2012 International Conference on System Science and Engineering (ICSSE) (2012)

    Google Scholar 

  3. Kocarev, L.: Chaos-based cryptography a brief overview. In: Proceedings of the 5th WSEAS International Conference on Nonlinear Analysis, Non-Linear Systems and Chaos 2011, pp. 6–21 (2011)

    Google Scholar 

  4. Abanda1, Y., Tiedeu, A.: Image encryption by chaos mixing. IET Image Process. 10(10), 742–750 (2016)

    Google Scholar 

  5. Shyamsunder, S., Kaliyaperumal, G.: Image encryption and decryption using chaotic maps and modular arithmetic. Am. J. Sign. Process. 1(1), 24–33 (2011)

    Article  Google Scholar 

  6. Ye, R., Xi, Y., Ma, Y.: A chaotic image encryption scheme using swapping based confusion approach: a survey. In: First IEEE International Conference on Computer Communication and the Internet, pp. 374–377 (2016)

    Google Scholar 

  7. Hossain, B., Rahman, T., Rahman, S., Islam, S.: A new approach of image encryption using 3D chaotic map to enhance security of multimedia component. In: International Conference on Informatics, Electronics & Vision (ICIEV), pp. 1–6 (2014)

    Google Scholar 

  8. Hua, Z., Zhou, B., Zhou, Y.: Sine chaotification model for enhancing chaos and its hardware implementation. IEEE Trans. Ind. Electron. 66(2), 1273–1284 (2019)

    Article  MathSciNet  Google Scholar 

  9. Kuo, C.L., Huang, L.C., Wang, S.J., Lin, J.S., Wang, C.C., Yan, J.J.: Image encryption based on fuzzy synchronization of chaos systems. In: IEEE 37th Annual Computer Software and Applications Conference (COMPSAC), pp. 153–154 (2013)

    Google Scholar 

  10. Glendinning, P.: Stability. Instability and Chaos. Cambridge University Press, Cambridge (1994)

    Book  Google Scholar 

  11. Aguirregabiria, J.M.: Robust chaos with variable lyapunov exponent in smooth one-dimensional maps. Chaos, Solitons Fractals 42(4), 2531–2539 (2009)

    Article  Google Scholar 

  12. Dachselt, F., Schwarz, W.: Chaos and cryptography. IEEE Trans. Circ. Syst. I: Fundam. Theor. Appl. 48, 1498–1501 (2001)

    Google Scholar 

  13. Shastry, M., Nagaraj, N., Vaidya, P.: The B-exponential map: a generalization of the logistic map, and its applications in generating pseudo-random numbers. Comput. Res. Repository, vol. 7. arXiv preprint cs/0607069 (2006)

    Google Scholar 

  14. Gao, H., Zhang, Y., Liang, S., Li, D.: A new chaotic algorithm for image encryption. Chaos, Solitons Fractals 29, 393–399 (2006)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Aladdein M. S. Amro .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Amro, A.M.S. (2020). Deliberate Exponential Chaotic Encryption Map. In: Saeed, F., Mohammed, F., Gazem, N. (eds) Emerging Trends in Intelligent Computing and Informatics. IRICT 2019. Advances in Intelligent Systems and Computing, vol 1073. Springer, Cham. https://doi.org/10.1007/978-3-030-33582-3_78

Download citation

Publish with us

Policies and ethics