2022
DOI: 10.1088/1402-4896/ac55bb
|View full text |Cite
|
Sign up to set email alerts
|

Dynamic analysis of a fractional-order hyperchaotic system and its application in image encryption

Abstract: Compared with integer order chaotic systems, fractional order chaotic systems can reflect natural phenomena more accurately, which are more suitable for chaotic cryptosystems. In order to explore the application of fractional order chaotic system in cryptography, a novel fractional order hyperchaotic system is constructed and implemented on DSP platform. More progressively, based on Adomian decomposition method, the dynamic behavior is studied by phase diagram, bifurcation diagram, Lyapunov exponent spectrum a… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
12
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
9

Relationship

2
7

Authors

Journals

citations
Cited by 25 publications
(12 citation statements)
references
References 58 publications
0
12
0
Order By: Relevance
“…Then, we can get the cipher image by encrypting the modified plain image. Table 18 shows the simulation results, and we can see that the NPCR and UACI values of the proposed algorithm are much closer to the theoretical values in comparison with those algorithms in [43,44,47,48]. In other words, our algorithm has a strong ability to withstand the differential attacks.…”
Section: Differential Attack Analysismentioning
confidence: 51%
See 1 more Smart Citation
“…Then, we can get the cipher image by encrypting the modified plain image. Table 18 shows the simulation results, and we can see that the NPCR and UACI values of the proposed algorithm are much closer to the theoretical values in comparison with those algorithms in [43,44,47,48]. In other words, our algorithm has a strong ability to withstand the differential attacks.…”
Section: Differential Attack Analysismentioning
confidence: 51%
“…The theoretical values of NPCR and UACI are 99.6094% and 33.4635%, respectively [10]. The closer the NPCR and UACI values of an algorithm are to the theoretical values, the stronger the ability of the algorithm to resist differential attacks [47]. In our simulation, we randomly select one pixel in the plain image and its value is changed by adding 1 to the original value.…”
Section: Differential Attack Analysismentioning
confidence: 99%
“…In 1989, the chaos theory was first combined with image encryption algorithms by R. Matthews [14]. Since then, chaotic cryptography has entered a period of rapid development, and more and more image encryption algorithms based on chaotic systems have been proposed [15][16][17][18][19][20][21]. For instance, An et al [15] constructed a neuron model based on electromagnetic induction and applied it to the image encryption algorithm.…”
Section: Introductionmentioning
confidence: 99%
“…Traditional text encryption methods are not suitable for it. Therefore, researchers have been committed to finding new technologies to encrypt medical images, such as Deoxyribonucleic acid (DNA) coding [11,12] and compressed sensing [13]. Chaotic systems are characterized by initial condition sensitivity, nonperiodicity, pseudo-randomness, and large key space.…”
Section: Introductionmentioning
confidence: 99%