Version 1
: Received: 4 February 2024 / Approved: 5 February 2024 / Online: 5 February 2024 (10:03:09 CET)
How to cite:
Wang, M.; Fu, X.; Teng, L.; Yan, X. A New 2D Cross Hyperchaotic Sine-Modulation-Logistic Map and Its Application in Bit-Level Image Encryption. Preprints2024, 2024020205. https://doi.org/10.20944/preprints202402.0205.v1
Wang, M.; Fu, X.; Teng, L.; Yan, X. A New 2D Cross Hyperchaotic Sine-Modulation-Logistic Map and Its Application in Bit-Level Image Encryption. Preprints 2024, 2024020205. https://doi.org/10.20944/preprints202402.0205.v1
Wang, M.; Fu, X.; Teng, L.; Yan, X. A New 2D Cross Hyperchaotic Sine-Modulation-Logistic Map and Its Application in Bit-Level Image Encryption. Preprints2024, 2024020205. https://doi.org/10.20944/preprints202402.0205.v1
APA Style
Wang, M., Fu, X., Teng, L., & Yan, X. (2024). A New 2D Cross Hyperchaotic Sine-Modulation-Logistic Map and Its Application in Bit-Level Image Encryption. Preprints. https://doi.org/10.20944/preprints202402.0205.v1
Chicago/Turabian Style
Wang, M., Lin Teng and Xiaopeng Yan. 2024 "A New 2D Cross Hyperchaotic Sine-Modulation-Logistic Map and Its Application in Bit-Level Image Encryption" Preprints. https://doi.org/10.20944/preprints202402.0205.v1
Abstract
Chaotic theory is commonly being researched for application in image encryption scheme (IES). In this paper, a novel two-dimensional cross hyperchaotic Sine-modulation-Logistic map (2D-CHSLM) based on the famous Sine and Logistic maps. The hyperchaotic behaviors of 2D-CHSLM is testified with the help of their bifurcation diagrams, trajectory plots, Lyapunov exponents, sample entropy, C0 complexity, permutation entropy and 0-1 test. A new bit-level IES with traditional encryption structure is proposed utilizing 2D-CHSLM. The 2D-CHSLM-IES performs a 2D-CHSLM-based bit-level confusion using zig-zag transform and a 2D-CHSLM-based cross coupled diffusion operations for generating a highly secure cipher-image. Then the simulations and security analyses are further carried out with the help of key space, key sensitivity, histogram, correlation, information entropy, differential attack, noise and data loss attacks, prove that the security of the proposed 2D-CHSLM-IES
Computer Science and Mathematics, Security Systems
Copyright:
This is an open access article distributed under the Creative Commons Attribution License which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.