2019
DOI: 10.3390/e21100958
|View full text |Cite
|
Sign up to set email alerts
|

Entropy Analysis and Image Encryption Application Based on a New Chaotic System Crossing a Cylinder

Abstract: Designing chaotic systems with specific features is a hot topic in nonlinear dynamics. In this study, a novel chaotic system is presented with a unique feature of crossing inside and outside of a cylinder repeatedly. This new system is thoroughly analyzed by the help of the bifurcation diagram, Lyapunov exponents’ spectrum, and entropy measurement. Bifurcation analysis of the proposed system with two initiation methods reveals its multistability. As an engineering application, the system’s efficiency is tested… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
45
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
8
2

Relationship

1
9

Authors

Journals

citations
Cited by 56 publications
(45 citation statements)
references
References 61 publications
0
45
0
Order By: Relevance
“…In [28], the detailed explanation of the majority logic criterion (MLC) is represented. These analyses give a comparison of plaintext image and encrypted image and hence give the true assessment of an encryption scheme.…”
Section: E Majority Logic Criterion Testmentioning
confidence: 99%
“…In [28], the detailed explanation of the majority logic criterion (MLC) is represented. These analyses give a comparison of plaintext image and encrypted image and hence give the true assessment of an encryption scheme.…”
Section: E Majority Logic Criterion Testmentioning
confidence: 99%
“…In 2020, Wang et al introduced a novel GA for the generation of bijective substitution boxes with high nonlinearity [49]. Besides the aforementioned, there are some recently published papers that combine chaotic number generators, elliptic curves, quantum computing, and heuristic methods in the design of dynamic and key-dependent S-boxes with good cryptographic properties [22]- [27], [50]- [56], [58]- [60].…”
Section: Introductionmentioning
confidence: 99%
“…Depending upon how data is processed, the cryptographic algorithms can be classified as block ciphers and stream ciphers. A block cipher is a method of encrypting text in which a cryptographic key and algorithm are applied to a block of data at once as a group, called blocks, with an unvarying transformation [3][4][5]. The block ciphers employ the layers of permutation and substitution for strong design capable of exhibiting strong confusion and diffusion properties.…”
Section: Introductionmentioning
confidence: 99%