This paper compares the performance of four different chaotic systems in path planning for surveillance applications. The four investigated systems are Lorenz, Arneodo, Liu, and Chen. While the Lorenz system was employed in a similar application before, Arneodo, Liu, and Chen systems are newly introduced in this paper. A bounded-grid chaotic path planner is proposed based on the mirror mapping technique, which keeps the robot bounded in the terrain and prevents it from going outside. The effect of using different state variables of each chaotic system to control the motion angle of the robot is discussed and shown to have a significant impact on the robot’s performance. The obtained trajectory and several performance metrics show promising results of the chaotic path planner for the four systems. © 2021 IEEE.
Chaos-Based Image Encryption Using DNA Manipulation and a Modified Arnold Transform
Digital images, which we store and communicate everyday, may contain confidential information that must not be exposed to others. Numerous researches are interested in encryption, which protects the images from ending up in the hands of unauthorized third parties. This paper proposes an image encryption scheme using chaotic systems, DNA manipulation, and a modified Arnold transform. Both DNA manipulation and hyperchaotic Lorenz system are utilized in the substitution of the images’ pixel values. An additional role of hyperchaotic Lorenz system is that it generates the random numbers required within the DNA manipulation steps. DNA cycling is implemented based on simple DNA coding rules and DNA addition and subtraction rules with modulus operation. The modified Arnold transform alters the pixels’ positions, where it guarantees effective pixel permutation that never outputs the same input pixels arrangement again. The proposed design is simple and amenable for hardware realization. Several well established performance evaluation tests including statistical properties of the encrypted image, key space, and differential attack analysis were conducted for several images. The proposed scheme passed the tests and demonstrated good results compared to several recent chaos-based image encryption schemes. © 2023, The Author(s), under exclusive license to Springer Nature Switzerland AG.
A Unified System for Encryption and Multi-Secret Image Sharing Using S-box and CRT
Multi-Secret Image Sharing (MSIS) is used when multiple images need to be shared to multiple participants, but the images can not be recovered without the presence of all shares. In this paper, a unified system for performing encryption and (n,n)-MSIS is proposed. While MSIS is based on the XOR operation, encryption combines the utilization of Chinese Remainder Theorem (CRT), SHA-256, and S-box for improved security. The same designed system is used for the generation of secret shares and the recovery of secret images. In addition, a sensitive system key is designed where three pairwise relatively prime subkeys are automatically generated for utilization in the CRT. The resulting secret shares pass statistical evaluation criteria such as RMSE, correlation, and entropy, and give good results for differential attack measures, and runtime. In addition, the proposed system succeeds in passing the NIST SP-800-22 statistical test suite and key sensitivity measures. © 2022 IEEE.
Registerless Multiplierless YCoCg-R and YCoCg Color Space Converters Hardware Implementation
Multimedia data, e.g., images and videos, are widely used over the internet and on computers. Image processing applications require color space conversion to be able to deal with these types of data more efficiently. This paper investigates three color space conversions and proposes simplified combinational hardware designs and FPGA realizations for RGB to YCoCg-R and YCoCg color spaces encoders and decoders and compares them to their sequential counterparts. The proposed hardware design for the encoders and decoders uses only adders and subtractors without any registers or multipliers. The proposed YCoCg-R converter exhibits better resources utilization compared to implementing the design using shift registers, where it uses 56.3% and 72.1% less LUTs and FFs, respectively. Similarly for the YCoCg color space, the combinational design used 48.1% less LUTs and 67.8% less FFs than its sequential counterpart. © 2022 IEEE.
Design of a generalized bidirectional tent map suitable for encryption applications
The discrete tent map is one of the most famous discrete chaotic maps that has widely-spread applications. This paper investigates a set of four generalized tent maps where the conventional map is a special case. The proposed maps have extra degrees of freedom which provide different chaotic characteristics and increase the design flexibility required for many applications. Mathematical analyses for generalized positive and mostly positive tent maps include: bifurcation diagrams relative to all parameters, effective range of parameters, bifurcation points. The maximum Lyapunov exponent (MLE) is also calculated to indicate chaotic behavior. Various scales of the bifurcation diagram are discussed for each generalized map as well as system responses versus the added parameters. © 2015 IEEE.
Chaotic systems based on jerk equation and discrete maps with scaling parameters
In the recent decades, applications of chaotic systems have flourished in various fields. Hence, there is an increasing demand on generalized, modified and novel chaotic systems. In this paper, we combine the general equation of jerk-based chaotic systems with simple scaled discrete chaotic maps. Numerical simulations of the properties of two systems, each with four control parameters, are presented. The parameters show interesting behaviors and dependencies among them. In addition, they exhibit controlling capabilities of the ranges of system responses, hence the size of the attractor diagram. Moreover, these behaviors and dependencies are analogous to those of the corresponding discrete chaotic maps. © 2017 IEEE.
Hardware Speech Encryption Using a Chaotic Generator, Dynamic Shift and Bit Permutation
This paper proposes a speech encryption and decryption system, its hardware architecture design and FPGA implementation. The system utilizes Nosé Hoover chaotic generator and/or dynamic shift and bit permutation. The effect of different blocks in the proposed encryption scheme is studied and the security of the system is validated through perceptual and statistical tests. The complete encryption scheme is simulated using Xilinx ISE 14.5 and realized on FPGA Xilinx Kintex 7, presenting the experimental results on the oscilloscope. The efficiency is also validated through hardware resources utilization compared to previous works based on maximum frequency and throughput. © 2018 IEEE.
Pixel-based Visual Secret Sharing Using Lorenz System
(n, n)-Visual Secret Sharing (VSS) allows a user to send an image in the form of shares to different participants. Every share can not reveal the secret alone, and only all shares together can reveal the secret with fast recovery. This paper proposes a pixel-based (n, n)-VSS system, where to share a pixel from the secret image, (n – 1) random pixels are generated from the Lorenz chaotic system for a varying set of (n – 1) shares. Then, the nth pixel is calculated for a random share using the secret pixel and the generated (n – 1) random pixels. The system is efficient, lossless, implemented for grayscale and color images, and has a simple XOR-based recovery scheme. It passed several security analysis tests and is robust against noise attacks. Moreover, performance analysis and comparisons with other VSS systems are presented, showing good results. © 2023 ACM.
Generalized synchronization involving a linear combination of fractional-order chaotic systems
In this paper, a generalized scheme for synchronizing a fractional order chaotic system with another one or with a linear combination of two other fractional order chaotic systems is presented
Switched active control synchronization of three fractional order chaotic systems
This paper discusses the continuous effect of fractional order parameter on two chaotic systems