An Image Encryption Scheme Based on Hyperchaotic Rabinovich and Exponential Chaos Maps
This paper proposes a new four-dimensional hyperchaotic map based on the Rabinovich system to realize chaotic encryption in higher dimension and improve the security. The chaotic sequences generated by Runge-Kutta method are combined with the chaotic sequences generated by an exponential chaos map t...
Main Authors: | , , , , |
---|---|
Format: | Article |
Language: | English |
Published: |
MDPI AG
2015-01-01
|
Series: | Entropy |
Subjects: | |
Online Access: | http://www.mdpi.com/1099-4300/17/1/181 |
id |
doaj-219b9b37601949c2b940bde5a34bf87c |
---|---|
record_format |
Article |
spelling |
doaj-219b9b37601949c2b940bde5a34bf87c2020-11-24T23:37:50ZengMDPI AGEntropy1099-43002015-01-0117118119610.3390/e17010181e17010181An Image Encryption Scheme Based on Hyperchaotic Rabinovich and Exponential Chaos MapsXiaojun Tong0Yang Liu1Miao Zhang2Hui Xu3Zhu Wang4School of Computer Science and Technology, Harbin Institute of Technology, Weihai, 264209, ChinaSchool of Computer Science and Technology, Harbin Institute of Technology, Weihai, 264209, ChinaSchool of Computer Science and Technology, Harbin Institute of Technology, Weihai, 264209, ChinaSchool of Computer Science and Technology, Harbin Institute of Technology, Weihai, 264209, ChinaSchool of Information and Electrical Engineering, Harbin Institute of Technology, Weihai, 264209, ChinaThis paper proposes a new four-dimensional hyperchaotic map based on the Rabinovich system to realize chaotic encryption in higher dimension and improve the security. The chaotic sequences generated by Runge-Kutta method are combined with the chaotic sequences generated by an exponential chaos map to generate key sequences. The key sequences are used for image encryption. The security test results indicate that the new hyperchaotic system has high security and complexity. The comparison between the new hyperchaotic system and the several low-dimensional chaotic systems shows that the proposed system performs more efficiently.http://www.mdpi.com/1099-4300/17/1/181exponential chaoshyperchaosimage encryptionpseudo-random sequence |
collection |
DOAJ |
language |
English |
format |
Article |
sources |
DOAJ |
author |
Xiaojun Tong Yang Liu Miao Zhang Hui Xu Zhu Wang |
spellingShingle |
Xiaojun Tong Yang Liu Miao Zhang Hui Xu Zhu Wang An Image Encryption Scheme Based on Hyperchaotic Rabinovich and Exponential Chaos Maps Entropy exponential chaos hyperchaos image encryption pseudo-random sequence |
author_facet |
Xiaojun Tong Yang Liu Miao Zhang Hui Xu Zhu Wang |
author_sort |
Xiaojun Tong |
title |
An Image Encryption Scheme Based on Hyperchaotic Rabinovich and Exponential Chaos Maps |
title_short |
An Image Encryption Scheme Based on Hyperchaotic Rabinovich and Exponential Chaos Maps |
title_full |
An Image Encryption Scheme Based on Hyperchaotic Rabinovich and Exponential Chaos Maps |
title_fullStr |
An Image Encryption Scheme Based on Hyperchaotic Rabinovich and Exponential Chaos Maps |
title_full_unstemmed |
An Image Encryption Scheme Based on Hyperchaotic Rabinovich and Exponential Chaos Maps |
title_sort |
image encryption scheme based on hyperchaotic rabinovich and exponential chaos maps |
publisher |
MDPI AG |
series |
Entropy |
issn |
1099-4300 |
publishDate |
2015-01-01 |
description |
This paper proposes a new four-dimensional hyperchaotic map based on the Rabinovich system to realize chaotic encryption in higher dimension and improve the security. The chaotic sequences generated by Runge-Kutta method are combined with the chaotic sequences generated by an exponential chaos map to generate key sequences. The key sequences are used for image encryption. The security test results indicate that the new hyperchaotic system has high security and complexity. The comparison between the new hyperchaotic system and the several low-dimensional chaotic systems shows that the proposed system performs more efficiently. |
topic |
exponential chaos hyperchaos image encryption pseudo-random sequence |
url |
http://www.mdpi.com/1099-4300/17/1/181 |
work_keys_str_mv |
AT xiaojuntong animageencryptionschemebasedonhyperchaoticrabinovichandexponentialchaosmaps AT yangliu animageencryptionschemebasedonhyperchaoticrabinovichandexponentialchaosmaps AT miaozhang animageencryptionschemebasedonhyperchaoticrabinovichandexponentialchaosmaps AT huixu animageencryptionschemebasedonhyperchaoticrabinovichandexponentialchaosmaps AT zhuwang animageencryptionschemebasedonhyperchaoticrabinovichandexponentialchaosmaps AT xiaojuntong imageencryptionschemebasedonhyperchaoticrabinovichandexponentialchaosmaps AT yangliu imageencryptionschemebasedonhyperchaoticrabinovichandexponentialchaosmaps AT miaozhang imageencryptionschemebasedonhyperchaoticrabinovichandexponentialchaosmaps AT huixu imageencryptionschemebasedonhyperchaoticrabinovichandexponentialchaosmaps AT zhuwang imageencryptionschemebasedonhyperchaoticrabinovichandexponentialchaosmaps |
_version_ |
1725518737213227008 |