Preprint Article Version 1 Preserved in Portico This version is not peer-reviewed

A New 2D Cross Hyperchaotic Sine-Modulation-Logistic Map and Its Application in Bit-Level Image Encryption

Version 1 : Received: 4 February 2024 / Approved: 5 February 2024 / Online: 5 February 2024 (10:03:09 CET)

How to cite: Wang, M.; Fu, X.; Teng, L.; Yan, X. A New 2D Cross Hyperchaotic Sine-Modulation-Logistic Map and Its Application in Bit-Level Image Encryption. Preprints 2024, 2024020205. https://doi.org/10.20944/preprints202402.0205.v1 Wang, M.; Fu, X.; Teng, L.; Yan, X. A New 2D Cross Hyperchaotic Sine-Modulation-Logistic Map and Its Application in Bit-Level Image Encryption. Preprints 2024, 2024020205. https://doi.org/10.20944/preprints202402.0205.v1

Abstract

Chaotic theory is commonly being researched for application in image encryption scheme (IES). In this paper, a novel two-dimensional cross hyperchaotic Sine-modulation-Logistic map (2D-CHSLM) based on the famous Sine and Logistic maps. The hyperchaotic behaviors of 2D-CHSLM is testified with the help of their bifurcation diagrams, trajectory plots, Lyapunov exponents, sample entropy, C0 complexity, permutation entropy and 0-1 test. A new bit-level IES with traditional encryption structure is proposed utilizing 2D-CHSLM. The 2D-CHSLM-IES performs a 2D-CHSLM-based bit-level confusion using zig-zag transform and a 2D-CHSLM-based cross coupled diffusion operations for generating a highly secure cipher-image. Then the simulations and security analyses are further carried out with the help of key space, key sensitivity, histogram, correlation, information entropy, differential attack, noise and data loss attacks, prove that the security of the proposed 2D-CHSLM-IES

Keywords

2D cross hyperchaotic map; Zig-zag transform; Cross coupled diffusion; Bit-level image encryption

Subject

Computer Science and Mathematics, Security Systems

Comments (0)

We encourage comments and feedback from a broad range of readers. See criteria for comments and our Diversity statement.

Leave a public comment
Send a private comment to the author(s)
* All users must log in before leaving a comment
Views 0
Downloads 0
Comments 0
Metrics 0


×
Alerts
Notify me about updates to this article or when a peer-reviewed version is published.
We use cookies on our website to ensure you get the best experience.
Read more about our cookies here.