Abstract

In this paper, a new 4D hyperchaotic nonlinear dynamical system with two positive Lyapunov exponents is presented. Exhaustive dynamic analyses of the novel hyperchaotic model using several dynamical studies are described. The dynamics of the system considered are first investigated analytically and numerically to explore phenomena and the selection of hyperchaotic behavior utilized for designing image cryptosystem. Since the proposed hyperchaotic model has rich dynamics, it displays hidden attractors. It emerges from this dynamic the existence of a single unstable equilibrium point giving rise to self-excited attractors, hysteresis phenomenon, and hyperchaotic behavior strongly recommended for securing information by its character. Furthermore, the feasibility and synchronization of the proposed system are also presented by developing, respectively, Raspberry surveys and an adaptive synchronization approach of two identical hyperchaotic systems. By employing the hyperchaotic behavior of the 4D map, an image encryption scheme is proposed as well. It is one round of a pixel-based permutation and a bit-wise diffusion phase. The secret key of the 4D map is derived from the SHA-256 value of the input image. It acts as the signature of the input image. Hence, the secret key exhibits high sensitivity to single-bit alteration in the image, which makes the cryptosystem robust against chosen/known-plaintext attacks. Performance analyses prove that the proposed cryptosystem provides the best in terms of the performance/complexity trade-off, as compared to some recently published algorithms.

Highlights

  • With accelerated cybercrimes due to the rapid growth of the Internet and the latest technologies, multimedia information is increasingly transmitted online

  • Exultant implementation of an image cryptosystem using the randomness of hyperchaotic system with hyperbolic nonlinearity and permutation and substitution operations is presented

  • The system is investigated numerically and analytically for exploration and the selection of hyperchaotic behavior utilized for encryption

Read more

Summary

Introduction

With accelerated cybercrimes due to the rapid growth of the Internet and the latest technologies, multimedia information is increasingly transmitted online. Digital images are widely used daily due to their usefulness. Spying affects a wide range of data, notably passwords, email messages, bank codes, digital images, videos, etc. These attachments generally used daily can enter the individual or public sectors, institutions, or states in diverse sectors such as the medical, military, industrial, and many others; there is an obligation to preserve and secure the data exchanged. Due to the high correlation between the pixels of the image, the high redundancy of the exchanged images, and the particular type of image format, classic text encryption technology such as Advanced Encryption Standard (AES), IDES

Objectives
Methods
Conclusion
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call