Abstract— In this paper, we suggest a proposed image encryption scheme based on multiple chaotic systems in different modes of operation using the development of a Hénon chaotic system also using FRFT which is introduced in order to match... more
Abstract— In this paper, we suggest a proposed image encryption scheme based on multiple chaotic systems in different modes of operation using the development of a Hénon chaotic system also using FRFT which is introduced in order to match the requirements of secure image transfer. We use fractional Fourier transform (FRFT) before the encryption, this process can achieve a large degree of randomization and it makes our proposed algorithm more sensitive to any change in key or plain image. The development of the hénon chaotic map increases the available chaotic range of parameter r to be very wide which make using a development of the hénon chaotic map more robust against attacks. The results of security analysis show that the proposed model provides efficient and secure way for real-time image encryption and transmission.
Over the past few decades, many algorithms have been proposed to improve the performance of speech encryption over un-secure channel (i.e., Internet). In this paper, the security level was enhanced using a dynamic dual chaotic based on... more
Over the past few decades, many algorithms have been proposed to improve the performance of speech encryption over un-secure channel (i.e., Internet). In this paper, the security level was enhanced using a dynamic dual chaotic based on Hénon chaotic map. In the proposed algorithm, the speech elements are shuffled in a random fashion. Moreover, when both Hénon state variables are free to be used for shuffling the index is toggled randomly between them according to toggle bit. After index shuffling each speech element is modified with XOR operation between the original speech element value and the key that is selected randomly from the updated key table. The same chaotic map is used to initiate the empty or full table and provide new table entries from the values that are already shuffled. The experimental results show that the proposed crypto-system is simple, fast with extra random toggling behavior. The high order of substitution make it sensitive to initial condition, common cryptanalysis attacks such as linear and differential attacks are infeasible.
Over the past few decades, many algorithms have been proposed to improve the performance of speech encryption over un-secure channel (i.e., Internet). In this paper, the security level was enhanced using a dynamic dual chaotic based on... more
Over the past few decades, many algorithms have been proposed to improve the performance of speech encryption over un-secure channel (i.e., Internet). In this paper, the security level was enhanced using a dynamic dual chaotic based on Hénon chaotic map. In the proposed algorithm, the speech elements are shuffled in a random fashion. Moreover, when both Hénon state variables are free to be used for shuffling the index is toggled randomly between them according to toggle bit. After index shuffling each speech element is modified with XOR operation between the original speech element value and the key that is selected randomly from the updated key table. The same chaotic map is used to initiate the empty or full table and provide new table entries from the values that are already shuffled. The experimental results show that the proposed crypto-system is simple, fast with extra random toggling behavior. The high order of substitution make it sensitive to initial condition, common crypt...
We present an original proposal, that adds a modern twist to an almost centenary idea, the hydraulic computer. First a brief introduction to the main character, the hydraulic computer. Second some variations to the idea, adding some more... more
We present an original proposal, that adds a modern twist to an almost centenary idea, the hydraulic computer. First a brief introduction to the main character, the hydraulic computer. Second some variations to the idea, adding some more dimensions that may find a new use for the old device. Third the main proposal, the quantum variety, with some details and a sketch of possible applications.
For Hénon map of nearly classical parameter values, we search numerically for Newhouse sinks. We show how to find successively the Newhouse sinks of higher period, which is the estimation of coordinates of the sinks from power laws of... more
For Hénon map of nearly classical parameter values, we search numerically for Newhouse sinks. We show how to find successively the Newhouse sinks of higher period, which is the estimation of coordinates of the sinks from power laws of properties of the sinks, and investigate numerically a sequence of sinks of period from 8 to 60 that we obtained. We also show how to verify the existences of obtained sinks by interval arithmetic. The sinks of period from 8 to 14 from among our obtained sinks was verified mathematically. In the case that we observed, when the sink exists, most orbits converge to it, and the orbit that seems to be Hénon attractor is not an attractor but just a long chaotic transient. The narrowness of the main bands of basins of the sinks causes the long chaotic transients. We also investigate numerically the chaotic transients and their rambling time.
Este artigo trata da utilização do sistema caótico bidimensional denominado Mapa de Hénon como gerador de repositórios composicionais. A criação de um aplicativo em Java, que automatizou o modelo matemático deste sistema, possibilitou a... more
Este artigo trata da utilização do sistema caótico bidimensional denominado Mapa de Hénon como gerador de repositórios composicionais. A criação de um aplicativo em Java, que automatizou o modelo matemático deste sistema, possibilitou a identificação de padrões de notas, classes-de-notas (ordenadas e desordenadas) e formas primas e, a partir daí, o planejamento de uma obra para oboé, fagote e piano.
Over the past few decades, many algorithms have been proposed to improve the performance of speech encryption over un-secure channel (i.e., Internet). In this paper, the security level was enhanced using a dynamic dual chaotic based on... more
Over the past few decades, many algorithms have been proposed to improve the performance of speech encryption over un-secure channel (i.e., Internet). In this paper, the security level was enhanced using a dynamic dual chaotic based on Hénon chaotic map. In the proposed algorithm, the speech elements are shuffled in a random fashion. Moreover, when both Hénon state variables are free to be used for shuffling the index is toggled randomly between them according to toggle bit. After index shuffling each speech element is modified with XOR operation between the original speech element value and the key that is selected randomly from the updated key table. The same chaotic map is used to initiate the empty or full table and provide new table entries from the values that are already shuffled. The experimental results show that the proposed crypto-system is simple, fast with extra random toggling behavior. The high order of substitution make it sensitive to initial condition, common crypt...