Search results for: Chaotic map
157 Design of a Chaotic Trajectory Generator Algorithm for Mobile Robots
Authors: J. J. Cetina-Denis, R. M. López-Gutiérrez, R. Ramírez-Ramírez, C. Cruz-Hernández
Abstract:
This work addresses the problem of designing an algorithm capable of generating chaotic trajectories for mobile robots. Particularly, the chaotic behavior is induced in the linear and angular velocities of a Khepera III differential mobile robot by infusing them with the states of the H´enon chaotic map. A possible application, using the properties of chaotic systems, is patrolling a work area. In this work, numerical and experimental results are reported and analyzed. In addition, two quantitative numerical tests are applied in order to measure how chaotic the generated trajectories really are.Keywords: chaos, chaotic trajectories, differential mobile robot, Henon map, Khepera III robot, patrolling applications
Procedia PDF Downloads 308156 Chaotic Behavior in Monetary Systems: Comparison among Different Types of Taylor Rule
Authors: Reza Moosavi Mohseni, Wenjun Zhang, Jiling Cao
Abstract:
The aim of the present study is to detect the chaotic behavior in monetary economic relevant dynamical system. The study employs three different forms of Taylor rules: current, forward, and backward looking. The result suggests the existence of the chaotic behavior in all three systems. In addition, the results strongly represent that using expectations especially rational expectation hypothesis can increase complexity of the system and leads to more chaotic behavior.Keywords: taylor rule, monetary system, chaos theory, lyapunov exponent, GMM estimator
Procedia PDF Downloads 527155 Chaotic Control, Masking and Secure Communication Approach of Supply Chain Attractor
Authors: Unal Atakan Kahraman, Yilmaz Uyaroğlu
Abstract:
The chaotic signals generated by chaotic systems have some properties such as randomness, complexity and sensitive dependence on initial conditions, which make them particularly suitable for secure communications. Since the 1990s, the problem of secure communication, based on chaos synchronization, has been thoroughly investigated and many methods, for instance, robust and adaptive control approaches, have been proposed to realize the chaos synchronization. In this paper, an improved secure communication model is proposed based on control of supply chain management system. Control and masking communication simulation results are used to visualize the effectiveness of chaotic supply chain system also performed on the application of secure communication to the chaotic system. So, we discover the secure phenomenon of chaos-amplification in supply chain systemKeywords: chaotic analyze, control, secure communication, supply chain attractor
Procedia PDF Downloads 515154 A Voice Signal Encryption Scheme Based on Chaotic Theory
Authors: Hailang Yang
Abstract:
To ensure the confidentiality and integrity of speech signals in communication transmission, this paper proposes a voice signal encryption scheme based on chaotic theory. Firstly, the scheme utilizes chaotic mapping to generate a key stream and then employs the key stream to perform bitwise exclusive OR (XOR) operations for encrypting the speech signal. Additionally, the scheme utilizes a chaotic hash function to generate a Message Authentication Code (MAC), which is appended to the encrypted data to verify the integrity of the data. Subsequently, we analyze the security performance and encryption efficiency of the scheme, comparing and optimizing it against existing solutions. Finally, experimental results demonstrate that the proposed scheme can resist common attacks, achieving high-quality encryption and speed.Keywords: chaotic theory, XOR encryption, chaotic hash function, Message Authentication Code (MAC)
Procedia PDF Downloads 50153 A Very Efficient Pseudo-Random Number Generator Based On Chaotic Maps and S-Box Tables
Authors: M. Hamdi, R. Rhouma, S. Belghith
Abstract:
Generating random numbers are mainly used to create secret keys or random sequences. It can be carried out by various techniques. In this paper we present a very simple and efficient pseudo-random number generator (PRNG) based on chaotic maps and S-Box tables. This technique adopted two main operations one to generate chaotic values using two logistic maps and the second to transform them into binary words using random S-Box tables. The simulation analysis indicates that our PRNG possessing excellent statistical and cryptographic properties.Keywords: Random Numbers, Chaotic map, S-box, cryptography, statistical tests
Procedia PDF Downloads 365152 Backstepping Design and Fractional Differential Equation of Chaotic System
Authors: Ayub Khan, Net Ram Garg, Geeta Jain
Abstract:
In this paper, backstepping method is proposed to synchronize two fractional-order systems. The simulation results show that this method can effectively synchronize two chaotic systems.Keywords: backstepping method, fractional order, synchronization, chaotic system
Procedia PDF Downloads 456151 Bifurcation and Chaos of the Memristor Circuit
Authors: Wang Zhulin, Min Fuhong, Peng Guangya, Wang Yaoda, Cao Yi
Abstract:
In this paper, a magnetron memristor model based on hyperbolic sine function is presented and the correctness proved by studying the trajectory of its voltage and current phase, and then a memristor chaotic system with the memristor model is presented. The phase trajectories and the bifurcation diagrams and Lyapunov exponent spectrum of the magnetron memristor system are plotted by numerical simulation, and the chaotic evolution with changing the parameters of the system is also given. The paper includes numerical simulations and mathematical model, which confirming that the system, has a wealth of dynamic behavior.Keywords: memristor, chaotic circuit, dynamical behavior, chaotic system
Procedia PDF Downloads 502150 Penguins Search Optimization Algorithm for Chaotic Synchronization System
Authors: Sofiane Bououden, Ilyes Boulkaibet
Abstract:
In terms of security of the information signal, the meta-heuristic Penguins Search Optimization Algorithm (PeSOA) is applied to synchronize chaotic encryption communications in the case of sensitive dependence on initial conditions in chaotic generator oscillator. The objective of this paper is the use of the PeSOA algorithm to exploring search space with random and iterative processes for synchronization of symmetric keys in both transmission and reception. Simulation results show the effectiveness of the PeSOA algorithm in generating symmetric keys of the encryption process and synchronizing.Keywords: meta-heuristic, PeSOA, chaotic systems, encryption, synchronization optimization
Procedia PDF Downloads 193149 Secure Image Encryption via Enhanced Fractional Order Chaotic Map
Authors: Ismail Haddad, Djamel Herbadji, Aissa Belmeguenai, Selma Boumerdassi
Abstract:
in this paper, we provide a novel approach for image encryption that employs the Fibonacci matrix and an enhanced fractional order chaotic map. The enhanced map overcomes the drawbacks of the classical map, especially the limited chaotic range and non-uniform distribution of chaotic sequences, resulting in a larger encryption key space. As a result, this strategy improves the encryption system's security. Our experimental results demonstrate that our proposed algorithm effectively encrypts grayscale images with exceptional efficiency. Furthermore, our technique is resistant to a wide range of potential attacks, including statistical and entropy attacks.Keywords: image encryption, logistic map, fibonacci matrix, grayscale images
Procedia PDF Downloads 316148 Design Fractional-Order Terminal Sliding Mode Control for Synchronization of a Class of Fractional-Order Chaotic Systems with Uncertainty and External Disturbances
Authors: Shabnam Pashaei, Mohammadali Badamchizadeh
Abstract:
This paper presents a new fractional-order terminal sliding mode control for synchronization of two different fractional-order chaotic systems with uncertainty and external disturbances. A fractional-order integral type nonlinear switching surface is presented. Then, using the Lyapunov stability theory and sliding mode theory, a fractional-order control law is designed to synchronize two different fractional-order chaotic systems. Finally, a simulation example is presented to illustrate the performance and applicability of the proposed method. Based on numerical results, the proposed controller ensures that the states of the controlled fractional-order chaotic response system are asymptotically synchronized with the states of the drive system.Keywords: terminal sliding mode control, fractional-order calculus, chaotic systems, synchronization
Procedia PDF Downloads 408147 Chaotic Motion of Single-Walled Carbon Nanotube Subject to Damping Effect
Authors: Tai-Ping Chang
Abstract:
In the present study, the effects on chaotic motion of single-walled carbon nanotube (SWCNT) due to the linear and nonlinear damping are investigated. By using the Hamilton’s principle, the nonlinear governing equation of the single-walled carbon nanotube embedded in a matrix is derived. The Galerkin’s method is adopted to simplify the integro-partial differential equation into a nonlinear dimensionless governing equation for the SWCNT, which turns out to be a forced Duffing equation. The variations of the Lyapunov exponents of the SWCNT with damping and harmonic forcing amplitudes are investigated. Based on the computations of the top Lyapunov exponent, it is concluded that the chaotic motion of the SWCNT occurs when the amplitude of the periodic excitation exceeds certain value, besides, the chaotic motion of the SWCNT occurs with small linear damping and tiny nonlinear damping.Keywords: chaotic motion, damping, Lyapunov exponents, single-walled carbon nanotube
Procedia PDF Downloads 319146 Robust Quantum Image Encryption Algorithm Leveraging 3D-BNM Chaotic Maps and Controlled Qubit-Level Operations
Authors: Vivek Verma, Sanjeev Kumar
Abstract:
This study presents a novel quantum image encryption algorithm, using a 3D chaotic map and controlled qubit-level scrambling operations. The newly proposed 3D-BNM chaotic map effectively reduces the degradation of chaotic dynamics resulting from the finite word length effect. It facilitates the generation of highly unpredictable random sequences and enhances chaotic performance. The system’s efficacy is additionally enhanced by the inclusion of a SHA-256 hash function. Initially, classical plain images are converted into their quantum equivalents using the Novel Enhanced Quantum Representation (NEQR) model. The Generalized Quantum Arnold Transformation (GQAT) is then applied to disrupt the coordinate information of the quantum image. Subsequently, to diffuse the pixel values of the scrambled image, XOR operations are performed using pseudorandom sequences generated by the 3D-BNM chaotic map. Furthermore, to enhance the randomness and reduce the correlation among the pixels in the resulting cipher image, a controlled qubit-level scrambling operation is employed. The encryption process utilizes fundamental quantum gates such as C-NOT and CCNOT. Both theoretical and numerical simulations validate the effectiveness of the proposed algorithm against various statistical and differential attacks. Moreover, the proposed encryption algorithm operates with low computational complexity.Keywords: 3D Chaotic map, SHA-256, quantum image encryption, Qubit level scrambling, NEQR
Procedia PDF Downloads 10145 Evolutional Substitution Cipher on Chaotic Attractor
Authors: Adda Ali-Pacha, Naima Hadj-Said
Abstract:
Nowadays, the security of information is primarily founded on the calculation of algorithms that confidentiality depend on the number of bits necessary to define a cryptographic key. In this work, we introduce a new chaotic cryptosystem that we call evolutional substitution cipher on a chaotic attractor. In this research paper, we take the Henon attractor. The evolutional substitution cipher on Henon attractor is based on the principle of monoalphabetic cipher and it associates the plaintext at a succession of real numbers calculated from the attractor equations.Keywords: cryptography, substitution cipher, chaos theory, Henon attractor, evolutional substitution cipher
Procedia PDF Downloads 428144 An Implementation of a Dual-Spin Spacecraft Attitude Reorientation Using Properties of Its Chaotic Motion
Authors: Anton V. Doroshin
Abstract:
This article contains a description of main ideas for the attitude reorientation of spacecraft (small dual-spin spacecraft, nanosatellites) using properties of its chaotic attitude motion under the action of internal perturbations. The considering method based on intentional initiations of chaotic modes of attitude motion with big amplitudes of the nutation oscillations, and also on the redistributions of the angular momentum between coaxial bodies of the dual-spin spacecraft (DSSC), which perform in the purpose of system’s phase space changing.Keywords: spacecraft, attitude dynamics, control, chaos
Procedia PDF Downloads 396143 Chaotic Analysis of Acid Rains with Times Series of pH Degree, Nitrate and Sulphate Concentration on Wet Samples
Authors: Aysegul Sener, Gonca Tuncel Memis, Mirac Kamislioglu
Abstract:
Chaos theory is one of the new paradigms of science since the last century. After determining chaos in the weather systems by Edward Lorenz the popularity of the theory was increased. Chaos is observed in many natural systems and studies continue to defect chaos to other natural systems. Acid rain is one of the environmental problems that have negative effects on environment and acid rains values are monitored continuously. In this study, we aim that analyze the chaotic behavior of acid rains in Turkey with the chaotic defecting approaches. The data of pH degree of rain waters, concentration of sulfate and nitrate data of wet rain water samples in the rain collecting stations which are located in different regions of Turkey are provided by Turkish State Meteorology Service. Lyapunov exponents, reconstruction of the phase space, power spectrums are used in this study to determine and predict the chaotic behaviors of acid rains. As a result of the analysis it is found that acid rain time series have positive Lyapunov exponents and wide power spectrums and chaotic behavior is observed in the acid rain time series.Keywords: acid rains, chaos, chaotic analysis, Lypapunov exponents
Procedia PDF Downloads 145142 An Improved Prediction Model of Ozone Concentration Time Series Based on Chaotic Approach
Authors: Nor Zila Abd Hamid, Mohd Salmi M. Noorani
Abstract:
This study is focused on the development of prediction models of the Ozone concentration time series. Prediction model is built based on chaotic approach. Firstly, the chaotic nature of the time series is detected by means of phase space plot and the Cao method. Then, the prediction model is built and the local linear approximation method is used for the forecasting purposes. Traditional prediction of autoregressive linear model is also built. Moreover, an improvement in local linear approximation method is also performed. Prediction models are applied to the hourly ozone time series observed at the benchmark station in Malaysia. Comparison of all models through the calculation of mean absolute error, root mean squared error and correlation coefficient shows that the one with improved prediction method is the best. Thus, chaotic approach is a good approach to be used to develop a prediction model for the Ozone concentration time series.Keywords: chaotic approach, phase space, Cao method, local linear approximation method
Procedia PDF Downloads 329141 Secured Embedding of Patient’s Confidential Data in Electrocardiogram Using Chaotic Maps
Authors: Butta Singh
Abstract:
This paper presents a chaotic map based approach for secured embedding of patient’s confidential data in electrocardiogram (ECG) signal. The chaotic map generates predefined locations through the use of selective control parameters. The sample value difference method effectually hides the confidential data in ECG sample pairs at these predefined locations. Evaluation of proposed method on all 48 records of MIT-BIH arrhythmia ECG database demonstrates that the embedding does not alter the diagnostic features of cover ECG. The secret data imperceptibility in stego-ECG is evident through various statistical and clinical performance measures. Statistical metrics comprise of Percentage Root Mean Square Difference (PRD) and Peak Signal to Noise Ratio (PSNR). Further, a comparative analysis between proposed method and existing approaches was also performed. The results clearly demonstrated the superiority of proposed method.Keywords: chaotic maps, ECG steganography, data embedding, electrocardiogram
Procedia PDF Downloads 194140 Investigating the Effects of Data Transformations on a Bi-Dimensional Chi-Square Test
Authors: Alexandru George Vaduva, Adriana Vlad, Bogdan Badea
Abstract:
In this research, we conduct a Monte Carlo analysis on a two-dimensional χ2 test, which is used to determine the minimum distance required for independent sampling in the context of chaotic signals. We investigate the impact of transforming initial data sets from any probability distribution to new signals with a uniform distribution using the Spearman rank correlation on the χ2 test. This transformation removes the randomness of the data pairs, and as a result, the observed distribution of χ2 test values differs from the expected distribution. We propose a solution to this problem and evaluate it using another chaotic signal.Keywords: chaotic signals, logistic map, Pearson’s test, Chi Square test, bivariate distribution, statistical independence
Procedia PDF Downloads 96139 Real-Time Image Encryption Using a 3D Discrete Dual Chaotic Cipher
Authors: M. F. Haroun, T. A. Gulliver
Abstract:
In this paper, an encryption algorithm is proposed for real-time image encryption. The scheme employs a dual chaotic generator based on a three dimensional (3D) discrete Lorenz attractor. Encryption is achieved using non-autonomous modulation where the data is injected into the dynamics of the master chaotic generator. The second generator is used to permute the dynamics of the master generator using the same approach. Since the data stream can be regarded as a random source, the resulting permutations of the generator dynamics greatly increase the security of the transmitted signal. In addition, a technique is proposed to mitigate the error propagation due to the finite precision arithmetic of digital hardware. In particular, truncation and rounding errors are eliminated by employing an integer representation of the data which can easily be implemented. The simple hardware architecture of the algorithm makes it suitable for secure real-time applications.Keywords: chaotic systems, image encryption, non-autonomous modulation, FPGA
Procedia PDF Downloads 506138 Optimized and Secured Digital Watermarking Using Entropy, Chaotic Grid Map and Its Performance Analysis
Authors: R. Rama Kishore, Sunesh
Abstract:
This paper presents an optimized, robust, and secured watermarking technique. The methodology used in this work is the combination of entropy and chaotic grid map. The proposed methodology incorporates Discrete Cosine Transform (DCT) on the host image. To improve the imperceptibility of the method, the host image DCT blocks, where the watermark is to be embedded, are further optimized by considering the entropy of the blocks. Chaotic grid is used as a key to reorder the DCT blocks so that it will further increase security while selecting the watermark embedding locations and its sequence. Without a key, one cannot reveal the exact watermark from the watermarked image. The proposed method is implemented on four different images. It is concluded that the proposed method is giving better results in terms of imperceptibility measured through PSNR and found to be above 50. In order to prove the effectiveness of the method, the performance analysis is done after implementing different attacks on the watermarked images. It is found that the methodology is very strong against JPEG compression attack even with the quality parameter up to 15. The experimental results are confirming that the combination of entropy and chaotic grid map method is strong and secured to different image processing attacks.Keywords: digital watermarking, discreate cosine transform, chaotic grid map, entropy
Procedia PDF Downloads 252137 A Double Differential Chaos Shift Keying Scheme for Ultra-Wideband Chaotic Communication Technology Applied in Low-Rate Wireless Personal Area Network
Authors: Ghobad Gorji, Hasan Golabi
Abstract:
The goal of this paper is to describe the design of an ultra-wideband (UWB) system that is optimized for the low-rate wireless personal area network application. To this aim, we propose a system based on direct chaotic communication (DCC) technology. Based on this system, a 2-GHz wide chaotic signal is directly generated into the lower band of the UWB spectrum, i.e., 3.1–5.1 GHz. For this system, two simple modulation schemes, namely chaotic on-off keying (COOK) and differential chaos shift keying (DCSK), were studied before, and their performance was evaluated. We propose a modulation scheme, namely Double DCSK, to improve the performance of UWB DCC. Different characteristics of these systems, with Monte Carlo simulations based on the Additive White Gaussian Noise (AWGN) and the IEEE 802.15.4a standard channel models, are compared.Keywords: UWB, DCC, IEEE 802.15.4a, COOK, DCSK
Procedia PDF Downloads 73136 Melnikov Analysis for the Chaos of the Nonlocal Nanobeam Resting on Fractional-Order Softening Nonlinear Viscoelastic Foundations
Authors: Guy Joseph Eyebe, Gambo Betchewe, Alidou Mohamadou, Timoleon Crepin Kofane
Abstract:
In the present study, the dynamics of nanobeam resting on fractional order softening nonlinear viscoelastic pasternack foundations is studied. The Hamilton principle is used to derive the nonlinear equation of the motion. Approximate analytical solution is obtained by applying the standard averaging method. The Melnikov method is used to investigate the chaotic behaviors of device, the critical curve separating the chaotic and non-chaotic regions are found. It is shown that appearance of chaos in the system depends strongly on the fractional order parameter.Keywords: chaos, fractional-order, Melnikov method, nanobeam
Procedia PDF Downloads 159135 Applying a Noise Reduction Method to Reveal Chaos in the River Flow Time Series
Authors: Mohammad H. Fattahi
Abstract:
Chaotic analysis has been performed on the river flow time series before and after applying the wavelet based de-noising techniques in order to investigate the noise content effects on chaotic nature of flow series. In this study, 38 years of monthly runoff data of three gauging stations were used. Gauging stations were located in Ghar-e-Aghaj river basin, Fars province, Iran. The noise level of time series was estimated with the aid of Gaussian kernel algorithm. This step was found to be crucial in preventing removal of the vital data such as memory, correlation and trend from the time series in addition to the noise during de-noising process.Keywords: chaotic behavior, wavelet, noise reduction, river flow
Procedia PDF Downloads 467134 Chaotic Sequence Noise Reduction and Chaotic Recognition Rate Improvement Based on Improved Local Geometric Projection
Authors: Rubin Dan, Xingcai Wang, Ziyang Chen
Abstract:
A chaotic time series noise reduction method based on the fusion of the local projection method, wavelet transform, and particle swarm algorithm (referred to as the LW-PSO method) is proposed to address the problem of false recognition due to noise in the recognition process of chaotic time series containing noise. The method first uses phase space reconstruction to recover the original dynamical system characteristics and removes the noise subspace by selecting the neighborhood radius; then it uses wavelet transform to remove D1-D3 high-frequency components to maximize the retention of signal information while least-squares optimization is performed by the particle swarm algorithm. The Lorenz system containing 30% Gaussian white noise is simulated and verified, and the phase space, SNR value, RMSE value, and K value of the 0-1 test method before and after noise reduction of the Schreiber method, local projection method, wavelet transform method, and LW-PSO method are compared and analyzed, which proves that the LW-PSO method has a better noise reduction effect compared with the other three common methods. The method is also applied to the classical system to evaluate the noise reduction effect of the four methods and the original system identification effect, which further verifies the superiority of the LW-PSO method. Finally, it is applied to the Chengdu rainfall chaotic sequence for research, and the results prove that the LW-PSO method can effectively reduce the noise and improve the chaos recognition rate.Keywords: Schreiber noise reduction, wavelet transform, particle swarm optimization, 0-1 test method, chaotic sequence denoising
Procedia PDF Downloads 196133 Chaos Analysis of a 3D Finance System and Generalized Synchronization for N-Dimension
Authors: Muhammad Fiaz
Abstract:
The article in hand is the study of complex features like Zero Hopf Bifurcation, Chaos and Synchronization of integer and fractional order version of a new 3D finance system. Trusted tools of averaging theory and active control method are utilized for investigation of Zero Hopf bifurcation and synchronization for both versions respectively. Inventiveness of the paper is to find the answer of a question that is it possible to find a chaotic system which can be synchronized with any other of the same dimension? Based on different examples we categorically develop a theory that if a couple of master and slave chaotic dynamical system is synchronized by selecting a suitable gain matrix with special conditions then the master system is synchronized with any chaotic dynamical system of the same dimension. With the help of this study we developed generalized theorems for synchronization of n-dimension dynamical systems for integer as well as fractional versions. it proposed that this investigation will contribute a lot to control dynamical systems and only a suitable gain matrix with special conditions is enough to synchronize the system under consideration with any other chaotic system of the same dimension. Chaotic properties of fractional version of the new finance system are also analyzed at fractional order q=0.87. Simulations results, where required, also provided for authenticity of analytical study.Keywords: complex analysis, chaos, generalized synchronization, control dynamics, fractional order analysis
Procedia PDF Downloads 66132 A Study of Chaos Control Schemes for Plankton-Fish Dynamics
Authors: Rajinder Pal Kaur, Amit Sharma, Anuj Kumar Sharma, Govind Prasad Sahu
Abstract:
The existence of chaos in the marine ecosystems may cause planktonic blooms, disease outbreaks, extinction of some plankton species, or some complex dynamics in oceans, which can adversely affect the sustainable marine ecosystem. The control of the chaotic plankton-fish dynamics is one of the main motives of marine ecologists. In this paper, we have studied the impact of phytoplankton refuge, zooplankton refuge, and fear effect on the chaotic plankton-fish dynamics incorporating phytoplankton, zooplankton, and fish biomass. The fear of fish predation transfers the unpredictable(chaotic) behavior of the plankton system to a stable orbit. The defense mechanism developed by prey species due to fear of the predator population can also terminate chaos from the given dynamics. Moreover, the impact of external disturbances like seasonality, noise, periodic fluctuations, and time delay on the given chaotic plankton system has also been discussed. We have applied feedback mechanisms to control the complexity of the system through the parameter noise. The non-feedback schemes are implemented to observe the role of seasonal force, periodic fluctuations, and time delay in suppressing the given chaotic system. Analytical results are substantiated by numerical simulation.Keywords: plankton, chaos, noise, seasonality, fluctuations, fear effect, prey refuge
Procedia PDF Downloads 83131 On Dynamic Chaotic S-BOX Based Advanced Encryption Standard Algorithm for Image Encryption
Authors: Ajish Sreedharan
Abstract:
Security in transmission and storage of digital images has its importance in today’s image communications and confidential video conferencing. Due to the increasing use of images in industrial process, it is essential to protect the confidential image data from unauthorized access. Advanced Encryption Standard (AES) is a well known block cipher that has several advantages in data encryption. However, it is not suitable for real-time applications. This paper presents modifications to the Advanced Encryption Standard to reflect a high level security and better image encryption. The modifications are done by adjusting the ShiftRow Transformation and using On Dynamic chaotic S-BOX. In AES the Substitute bytes, Shift row and Mix columns by themselves would provide no security because they do not use the key. In Dynamic chaotic S-BOX Based AES the Substitute bytes provide security because the S-Box is constructed from the key. Experimental results verify and prove that the proposed modification to image cryptosystem is highly secure from the cryptographic viewpoint. The results also prove that with a comparison to original AES encryption algorithm the modified algorithm gives better encryption results in terms of security against statistical attacks.Keywords: advanced encryption standard (AES), on dynamic chaotic S-BOX, image encryption, security analysis, ShiftRow transformation
Procedia PDF Downloads 435130 Experimental Networks Synchronization of Chua’s Circuit in Different Topologies
Authors: Manuel Meranza-Castillon, Rolando Diaz-Castillo, Adrian Arellano-Delgado, Cesar Cruz-Hernandez, Rosa Martha Lopez-Gutierrez
Abstract:
In this work, we deal with experimental network synchronization of chaotic nodes with different topologies. Our approach is based on complex system theory, and we use a master-slave configuration to couple the nodes in the networks. In particular, we design and implement electronically complex dynamical networks composed by nine coupled chaotic Chua’s circuits with topologies: in nearest-neighbor, small-world, open ring, star, and global. Also, network synchronization is evaluated according to a particular coupling strength for each topology. This study is important by the possible applications to private transmission of information in a chaotic communication network of multiple users.Keywords: complex networks, Chua's circuit, experimental synchronization, multiple users
Procedia PDF Downloads 347129 Security of Database Using Chaotic Systems
Authors: Eman W. Boghdady, A. R. Shehata, M. A. Azem
Abstract:
Database (DB) security demands permitting authorized users and prohibiting non-authorized users and intruders actions on the DB and the objects inside it. Organizations that are running successfully demand the confidentiality of their DBs. They do not allow the unauthorized access to their data/information. They also demand the assurance that their data is protected against any malicious or accidental modification. DB protection and confidentiality are the security concerns. There are four types of controls to obtain the DB protection, those include: access control, information flow control, inference control, and cryptographic. The cryptographic control is considered as the backbone for DB security, it secures the DB by encryption during storage and communications. Current cryptographic techniques are classified into two types: traditional classical cryptography using standard algorithms (DES, AES, IDEA, etc.) and chaos cryptography using continuous (Chau, Rossler, Lorenz, etc.) or discreet (Logistics, Henon, etc.) algorithms. The important characteristics of chaos are its extreme sensitivity to initial conditions of the system. In this paper, DB-security systems based on chaotic algorithms are described. The Pseudo Random Numbers Generators (PRNGs) from the different chaotic algorithms are implemented using Matlab and their statistical properties are evaluated using NIST and other statistical test-suits. Then, these algorithms are used to secure conventional DB (plaintext), where the statistical properties of the ciphertext are also tested. To increase the complexity of the PRNGs and to let pass all the NIST statistical tests, we propose two hybrid PRNGs: one based on two chaotic Logistic maps and another based on two chaotic Henon maps, where each chaotic algorithm is running side-by-side and starting from random independent initial conditions and parameters (encryption keys). The resulted hybrid PRNGs passed the NIST statistical test suit.Keywords: algorithms and data structure, DB security, encryption, chaotic algorithms, Matlab, NIST
Procedia PDF Downloads 264128 Periodically Forced Oscillator with Noisy Chaotic Dynamics
Authors: Adedayo Oke Adelakun
Abstract:
The chaotic dynamics of periodically forced oscillators with smooth potential has been extensively investigated via theoretical, numerical and experimental simulations. With the advent of the study of chaotic dynamics by means of method of multiple time scale analysis, Melnikov theory, bifurcation diagram, Poincare's map, bifurcation diagrams and Lyapunov exponents, it has become necessary to seek for a better understanding of nonlinear oscillator with noisy term. In this paper, we examine the influence of noise on complex dynamical behaviour of periodically forced F6 - Duffing oscillator for specific choice of noisy parameters. The inclusion of noisy term improves the dynamical behaviour of the oscillator which may have wider application in secure communication than smooth potential.Keywords: hierarchical structure, periodically forced oscillator, noisy parameters, dynamical behaviour, F6 - duffing oscillator
Procedia PDF Downloads 324