La teoría del caos estudia el comportamiento errático de los sistemas dinámicos no lineales, altamente sensibles a las condiciones iniciales (efecto mariposa). Su estudio se remonta a los 1950s, en que el meteorólogo Edward N. Lorenz... more
This paper describes how to determine the parameter values of the chaotic Lorenz system from one of its variables waveform. The geometrical properties of the system are used firstly to reduce the parameter search space. Then, a... more
This paper illustrates a general framework in which a neural network application can be easily integrated and proposes a traffic forecasting approach that uses neural networks based on graphs. Neural networks based on graphs have the... more
The symbolic time series generated by a unimodal chaotic map starting from any initial condition creates a binary sequence that contains information about the initial condition. A binary sequence of a given length generated this way has a... more
The purpose of this paper is to investigate the logistic model using Ishikawa iterative procedure through time series and Lyapunov exponent analysis. It is observed that for certain choices there is an appreciable growth in the stability... more
Lightweight cryptographic algorithms must develop to ensure the confidentiality and integrity of the data in resource-constrained devices. Keys are vital to every cryptography algorithm because they provide randomness, complexity,... more
Recently, the use of nonlinear discrete dynamic systems to construct cryptographic applications has received a great deal of attention. The encryption applications are intrinsically related to the chaotic behavior of the system, by... more
This paper analyzes the use of the logistic map for cryptographic applications. The most important characteristics of the logistic map are shown in order to prove the inconvenience of considering this map in the design of new chaotic... more
In recent years many chaotic cryptosystems based on Baptista's seminal work have been proposed. We analyze the security of two of the newest and most interesting ones, which use a dynamically updated look-up table and also work as stream... more
We propose a new audio signal encryption scheme based on the chaotic Hénon map. The scheme mainly comprises two phases: one is the preprocessing stage where the audio signal is transformed into a data by the lifting wavelet scheme and the... more
There are many algorithms used with different purposes in the area of cryptography. Amongst these, Genetic Algorithms have been used, particularly in the cryptanalysis of block ciphers. Interest in the use of and research on such... more
In the era of a global village, a huge amount of people are connected to the web through their PC, mobile and any type of communication tool for communication purposes, hence we require a safe approach that provides security and... more
The binary patterns of the shares, however, have no visual meaning and hinder the objectives of visual cryptography. By improving the intensity transformation in Myodo’s method, authors have proposed a method to generate high quality... more
A new probabilistic symmetric-key encryption scheme based on chaotic-classified properties of Hopfield neural networks is described. In an overstoraged Hopfield Neural Network (OHNN) the phenomenon of chaotic-attractors is well documented... more
Security of multimedia data is a major concern due to its widespread transmission over various communication channels. Hence design and study of good image encryption schemes has become a major research topic. During the last few decades,... more
In this paper, we have discussed the dynamics of 1-D Mouse map which is also known as Gaussian Iterated map or simply Gauss map and analyzed their chaotic behaviors in several senses. We have mainly focused on several chaotic dynamics... more
In this paper, a fast encryption scheme based on chaotic maps is proposed. Firstly the dynamical 8×8 S-box is<br> produced by using logistic map and 2D standard map. Secondly a sequence of pseudo-random bytes is generated by... more
This Letter describes how to determine the parameter of the chaotic Lorenz system used in a two-channel cryptosystem. First the geometrical properties of the Lorenz system are used to reduce the parameter search space. Second the... more
This paper analyzes and evaluates the performance of neural network testing using microcontrollers. The finite precision of microcontrollers registers and the computation time were considered for evaluation. The paper illustrates a... more
The frequency of occurrence of ordinal patterns in an observed (or measured) times series can be used to identify equivalent dynamical system. We demonstrate this approach for system identification and parameter estimation for dynamics... more
A technique for the recursive inversion of matrices and matrix functions is presented. The proposed method can be modelled as a discrete nonlinear dynamic system. Convergence, stability and robustness properties are discussed and... more
This paper analyzes and evaluates the performance of neural network testing using microcontrollers. The finite precision of microcontrollers registers and the computation time were considered for evaluation. The paper illustrates a... more
This paper presents a medical image cipher with hierarchical diffusion and non-sequential encryption mechanism. An improved permutation approach is developed, which can contribute to not only image shuffling but also lightweight pixel... more
Turizam je podrucje koje se danas u sferama ponude i potražnje iznimno brzo transformira, sto uvelike utjece na intenzitet i kvalitetu razvoja tur
In this paper, a symmetric key block cipher cryptosystem is proposed, involving multiple twodimensional chaotic maps and using 128-bits external secret key. Computer simulations indicate that the cipher has good diffusion and confusion... more
This paper presents an improved version of GLS-coding for simultaneous data compression and encryption called Range GLS-coding. It removes implementation issue of infinite precision real numbers due to long products of real numbers in... more
In recent years, the need for secured communication research based on Speech Coding with chaos cryptography has highly increased. Therefore, it is absolutely necessary to have secure systems to protect the transferred data against... more
Information Security is a primary concern of communication. Increasing rate of Image applications demands a good cryptosystem for image security. Unfortunately traditional cryptosystem is not very suitable for multimedia applications due... more
Changes resulting from the publishing process, such as peer review, editing, corrections, structural formatting, and other quality control mechanisms may not be reflected in this document. Changes may have been made to this work since it... more
Cryptography is a method of storing and transmitting data in a particular form so that only those for whom it is intended can read and process it. Cryptography includes techniques such as microdots, merging words with images, and other... more
Based on the better properties of chaotic maps, the studies of chaotic-based image encryption have received much attentions by researchers in recent years. In this paper, an image encryption algorithm based on logistic map with... more
In contradiction to one-dimensional mapping, higher-dimensional mapping may be conservative (volume preserving) as well as dissipative (volume contracting), invertible as well as non-invertible, depending on the parameter in the model. In... more
In this comment, we analyze a recently proposed Baptista-like cryptosystem and show that it is not invertible. Others weaknesses are also reported. A modified version of this cryptosystem is proposed to show how to overcome the... more
With the development of chaos theory, many image encryption algorithmshave been designed using the properties associated withthechaotic map. The chaotic map shows high sensitivity to initial conditions and the sequence generated using... more
Security of multimedia data is a major concern due to its widespread transmission over various communication channels. Hence design and study of good image encryption schemes has become a major research topic. During the last few decades,... more
Security of multimedia data is a major concern due to its widespread transmission over various communication channels. Hence, design and study of good image encryption schemes has become a major research topic. During the last few... more
Global command and control system (GCCS-Joint) is a command, control, communications, computers and intelligence (C4I) system which consists of hardware, software, procedures and standards and which provides directory services, enterprise... more
We propose a general method for security evaluation of SNOW 2.0-like ciphers against correlation attacks that are built similarly to known attacks on SNOW 2.0. Unlike previously known methods, the method we propose is targeted at security... more
Encryption is to reorganize the message into discrepancy form so that the message is keep secret. The goal of encryption is to give an easy and inexpensive means of encryption and decryption to all authoritative users in possession of the... more
The residential environments are an important scenario for Ultra Wide Band (UWB) communication systems. In this paper, the performance of correlating receivers operating in a Line-Of-Sight (LOS) scenario in these environments is evalu-... more
In this paper, we study basic dynamical behavior of one-dimensional Doubling map. Especially emphasis is given on the chaotic behaviors of the said map. Several approaches of chaotic behaviors by some pioneers it is found that the... more
The data space for audio signals is large, the correlation is strong, and the traditional encryption algorithm cannot meet the needs of efficiency and safety. To solve this problem, an audio encryption algorithm based on Chen memristor... more
A chaotic system for an image encryption and decr yption is the basic theme of this paper. Presentably many image encryption algorithms have b een proposed, based on one chaotic system. An image encryption and decryption scheme based on... more
www.elsevier.com/locate/pla Cryptanalysis of a cryptosystem based on discretized two-dimensional
Recently, a cryptosystem based on two-dimensional discretized chaotic maps was proposed [T. Xiang, et al., Phys. Lett. A 364 (2007) 252]. In this Letter, we cryptanalyze the proposal using algebraic methods. We give three different... more
This article appeared in a journal published by Elsevier. The attached copy is furnished to the author for internal non-commercial research and education use, including for instruction at the authors institution and sharing with... more
In this paper, we study basic dynamical behavior of one-dimensional Doubling map. Especially emphasis is given on the chaotic behaviors of the said map. Several approaches of chaotic behaviors by some pioneers it is found that the... more
In this paper, a novel symmetric multiple image encryption algorithm is proposed. The scheme exploits the features of discrete wavelet transform, finite ridgelet transform and chaotic maps in a way to achieve completely distorted and... more
Chaos-based image encryption has great significance as a branch of image security. So, a series of chaos-based cryptosystems protecting digital images are proposed in recent years. But, most of them have been broken as a result of poor... more
The design of a secure, digital communication scheme based on the chaotic iterations of the logistic map is proposed. A two-stage encryption technique encapsulates encrypted initial conditions in a synchronization interval and produces a... more