Pseudorandom Number Generator Based on Three Kinds of Four-Wing Memristive Hyperchaotic System and Its Application in Image Encryption
Xi Chen, Shuai Qian, Fei Yu, Zinan Zhang, Hui Shen, Yuanyuan Huang, Shuo Cai, Zelin Deng, Yi Li & Sichun Du
Complexity 2020:1-17 (2020)
AbstractIn this paper, we propose a method to design the pseudorandom number generator using three kinds of four-wing memristive hyperchaotic systems with different dimensions as multientropy sources. The principle of this method is to obtain pseudorandom numbers with good randomness by coupling XOR operation on the three kinds of FWMHSs with different dimensions. In order to prove its potential application in secure communication, the security of PRNG based on this scheme is analyzed from the perspective of cryptography. In addition, PRNG has passed the NIST 800.22 and ENT test, which shows that PRNG has good statistical characteristics. Finally, an image encryption algorithm based on PRNG is adopted. In the encryption algorithm, the optimized Arnold matrix scrambling method and the diffusion processing based on XOR are used to obtain the final encrypted image. Through the evaluation of encryption performance, it is concluded that there is no direct relationship between the pristine image and encrypted image. The results show that the proposed image encryption scheme has good statistical output characteristics and security performance in line with cryptography.
Similar books and articles
A New Algorithm Based on Magic Square and a Novel Chaotic System for Image Encryption.Sadiq A. Mehdi & Rageed Hussein Al-Hashemy - 2019 - Journal of Intelligent Systems 29 (1):1202-1215.
A Color Image Encryption Scheme Based on a Novel 3D Chaotic Mapping.Chunyuan Liu & Qun Ding - 2020 - Complexity 2020:1-20.
A Color Image Encryption Technique Based on Bit-Level Permutation and Alternate Logistic Maps.Priyanka Jaroli, Shelza Dua, Mohit Dua & Ankita Bisht - 2019 - Journal of Intelligent Systems 29 (1):1246-1260.
A Novel Quantum Encryption and Authentication Framework Integrated with IoT.R. Santhiya Devi, R. John Bosco Balaguru, R. Amirtharajan & Padmapriya Praveenkumar - 2019 - In Zaigham Mahmood (ed.), Security, Privacy and Trust in the Iot Environment. Springer Verlag. pp. 123-150.
A Bi-Objective Genetic Algorithm Optimization of Chaos-DNA Based Hybrid Approach.Shelza Suri & Ritu Vijay - 2019 - Journal of Intelligent Systems 28 (2):333-346.
Robust Multiple Authority and Attribute Based Encryption for Access Control in Cloud Computing.P. S. Mona & M. Dhande ProfNutan - 2018 - International Journal on Recent and Innovation Trends in Computing and Communication 6 (3).
Dynamic Analysis and Circuit Realization of a Novel No-Equilibrium 5D Memristive Hyperchaotic System with Hidden Extreme Multistability.Qiuzhen Wan, Zhaoteng Zhou, Wenkui Ji, Chunhua Wang & Fei Yu - 2020 - Complexity 2020:1-16.
Offline Privacy Preserving Proxy Re-Encryption in Mobile Cloud Computing.Yaping Lin & Voundi Koe Arthur Sandor - 2019 - Pervasive and Mobile Computing 59.
An Efficient Medical Image Watermarking Technique in E-Healthcare Application Using Hybridization of Compression and Cryptography Algorithm.Puvvadi Aparna & Polurie Venkata Vijay Kishore - 2018 - Journal of Intelligent Systems 27 (1):115-133.
A Novel Edge Detection Algorithm Based on Texture Feature Coding.Ömer Faruk Alcin, Mehmet Ustundag, Yanhui Guo & Abdulkadir Sengur - 2015 - Journal of Intelligent Systems 24 (2):235-248.
Ambiguous Encryption Implies That Consciousness Cannot Be Simulated.Anna Wegloop & Peter Vach - manuscript
Plenary Discussion: Towards a Socio-Technical Research Agenda for Community Informatics-Cryptographic Algorithms and Protocols-Public-Key Encryption From ID-Based Encryption Without One-Time.Chik How Tan - 2006 - In O. Stock & M. Schaerf (eds.), Lecture Notes in Computer Science. Springer Verlag. pp. 450-459.
A Comparative Study in the Application of IoT in Health Care: Data Security in Telemedicine.G. A. Pramesha Chandrasiri, Malka N. Halgamuge & C. Subhashi Jayasekara - 2019 - In Zaigham Mahmood (ed.), Security, Privacy and Trust in the Iot Environment. Springer Verlag. pp. 181-202.
A Novel Full-Reference Color Image Quality Assessment Based on Energy Computation in the Wavelet Domain.V. N. Manjunath Aradhya, D. R. Rameshbabu, M. Ravishankar & M. C. Hanumantharaju - 2013 - Journal of Intelligent Systems 22 (2):155-177.
Added to PP
Historical graph of downloads
Citations of this work
Chaos-Based Engineering Applications with a 6D Memristive Multistable Hyperchaotic System and a 2D SF-SIMM Hyperchaotic Map. [REVIEW]Fei Yu, Shuai Qian, Xi Chen, Yuanyuan Huang, Shuo Cai, Jie Jin & Sichun Du - 2021 - Complexity 2021:1-21.
Dynamic Analysis and FPGA Implementation of New Chaotic Neural Network and Optimization of Traveling Salesman Problem.Li Cui, Chaoyang Chen, Jie Jin & Fei Yu - 2021 - Complexity 2021:1-10.
Basin of Attraction Analysis of New Memristor-Based Fractional-Order Chaotic System.Long Ding, Li Cui, Fei Yu & Jie Jin - 2021 - Complexity 2021:1-9.
Recent Advances in Dimensionality Reduction Modeling and Multistability Reconstitution of Memristive Circuit.Yunzhen Zhang, Yuan Ping, Zhili Zhang & Guangzhe Zhao - 2021 - Complexity 2021:1-18.
References found in this work
No references found.