A Novel Compound-Coupled Hyperchaotic Map for Image Encryption

Considering a nonlinear dynamic oscillator, a high Lyapunov exponent indicates a high degree of randomness useful in many applications, including cryptography. Most existing oscillators yield very low Lyapunov exponents. The proposed work presents a general strategy to derive an n-D hyperchaotic map...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:Symmetry (Basel) 2022-03, Vol.14 (3), p.493
Hauptverfasser: Etoundi, Christophe Magloire Lessouga, Nkapkop, Jean De Dieu, Tsafack, Nestor, Ngono, Joseph Mvogo, Ele, Pierre, Wozniak, Marcin, Shafi, Jana, Ijaz, Muhammad Fazal
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
Beschreibung
Zusammenfassung:Considering a nonlinear dynamic oscillator, a high Lyapunov exponent indicates a high degree of randomness useful in many applications, including cryptography. Most existing oscillators yield very low Lyapunov exponents. The proposed work presents a general strategy to derive an n-D hyperchaotic map with a high Lyapunov exponent. A 2D case study was analyzed using some well-known nonlinear dynamic metrics including phase portraits, bifurcation diagrams, finite time Lyapunov exponents, and dimension. These metrics indicated that the state of the novel map was more scattered in the phase plane than in the case of some traditional maps. Consequently, the novel map could produce output sequences with a high degree of randomness. Another important observation was that the first and second Lyapunov exponents of the proposed 2D map were both positive for the whole parameter space. Consequently, the attractors of the map could be classified as hyperchaotic attractors. Finally, these hyperchaotic sequences were exploited for image encryption/decryption. Various validation metrics were exploited to illustrate the security of the presented methodology against cryptanalysts. Comparative analysis indicated the superiority of the proposed encryption/decryption protocol over some recent state-of-the-art methods.
ISSN:2073-8994
2073-8994
DOI:10.3390/sym14030493