Table of Contents Author Guidelines Submit a Manuscript
Complexity
Volume 2017, Article ID 8412093, 10 pages
https://doi.org/10.1155/2017/8412093
Research Article

Multimedia Security Application of a Ten-Term Chaotic System without Equilibrium

1Institute for Advanced Study, Shenzhen University, Shenzhen, Guangdong 518060, China
2Department of Electrical and Electronics Engineering, Faculty of Technology, Sakarya University, Serdivan, Turkey
3Modeling Evolutionary Algorithms Simulation and Artificial Intelligent, Faculty of Electrical & Electronics Engineering, Ton Duc Thang University, Ho Chi Minh City, Vietnam

Correspondence should be addressed to Viet-Thanh Pham; nv.ude.tdt@hnahtteivmahp

Received 19 July 2017; Revised 4 October 2017; Accepted 31 October 2017; Published 15 November 2017

Academic Editor: Dimitri Volchenkov

Copyright © 2017 Xiong Wang et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Abstract

A system without equilibrium has been proposed in this work. Although there is an absence of equilibrium points, the system displays chaos, which has been confirmed by phase portraits and Lyapunov exponents. The system is realized on an electronic card, which exhibits chaotic signals. Furthermore, chaotic property of the system is applied in multimedia security such as image encryption and sound steganography.

1. Introduction

Recently, there is an increased interest in multimedia communication, which is vital in various areas ranging from entertainment industries, economics, and medical applications to militaries [1, 2]. Several attempts have been made to provide confidentiality, identity, and integrity. A considerable amount of studies about multimedia security has been introduced, for example, data encryption, steganographic messages, watermarking, or multimedia authentication [16].

Extensive researches have shown that the use of chaos for multimedia communication is a potential application [711]. Because of the similar characteristics between chaotic systems and cryptographic primitives, chaotic cryptography is a major area of interest [12]. Liu et al. presented the audio encryption scheme with confusion and diffusion [13]. They based on a multiscroll chaotic system and one-time keys [13]. By using complex hyperchaotic systems, color image encryption was proposed [14]. Chaos maps with Markov properties were applied to construct a new encryption algorithm [15]. In addition, Ghebleh and Kanso introduced a robust chaos scheme to image steganography [16]. In order to generate message authentication codes, suitability of chaos functions was studied in [17].

In this work, we study a ten-term chaotic system without equilibrium and its multimedia security application. The chaotic attractors in this system are “hidden attractors” because the basin of attraction for a hidden attractor is not connected with any unstable fixed point [1821]. It is noted that the concept of hidden attractors has been suggested in connection with the occurrence of unpredictable attractors in multistable systems [21]. Researchers have shown that multistability is connected with the occurrence of unpredictable attractors [2130]. Recently, hidden attractor has been investigated in numerous systems such as Chua system [19], drilling system [31], Lorenz-like system [32], Goodwin oscillator [33], electromechanical systems [34], two-dimensional maps [35], phase-locked loop circuits [36], and Rabinovich–Fabrikant system [37].

2. A System without Equilibrium and Its Implementation

2.1. A System without Equilibrium

Chaotic systems without equilibrium attract have been attracting a lot of interest [3842]. When mentioning a chaotic system without equilibrium, it means that there is no real equilibrium in such a system. In this work, we study a general three-dimensional form described byin which are parameters and .

We can solve the following three equations to find the system’s equilibrium:

From (2), we havein whichforAs a result, there is no equilibrium in general form (1) for

Based on conditions (5) and (6) and , we have applied a search procedure [40] to find the set of parameters for which general form (1) does not have equilibrium. A set of parameters has been found as follows:where . General form (1) is rewritten by

It is simple to see that system (8) has no equilibrium for , , , and . However, it displays chaos as shown in Figure 1. In this case, calculated Lyapunov exponents of the system are illustrated in Figure 2. Lyapunov exponents are , , and for . Positive Lyapunov exponent verifies the chaotic behavior of system (8). Attractors of system (8) are hidden attractors according the introduced definition in [21]. It is noted that the hidden attractors are observed in systems without equilibria, with no unstable fixed points or with one stable fixed point [21].

Figure 1: Projections of attractors without equilibrium in (a) plane, (b) plane, and (c) plane for , , , and and initial conditions . The attractor of system (8) is “hidden” according to the definition introduced in [21].
Figure 2: Lyapunov exponents of system without equilibrium (8) for , , , and and initial conditions : (red), (green), and (blue). Positive value of Lyapunov exponent indicates chaos of system (8).
2.2. Electronic Circuit Implementation of the Chaotic System without Equilibrium

Electronic implementation of a chaotic model is useful for confirming the model’s feasibility as well as realizing applications [4345]. The main aim of this section is to design a circuit to realize the system without equilibrium by using electronic elements [4651]. The chaotic system must be rescaled for electronic circuit implementation. The amplitude values of system (, , and ) are in the interval of . They are higher than the interval of which are electronic materials limitations. For scale process, let , , and and then adjust the original state variables , , instead of the variables , , . As a result, the scaled system finally becomes of the following form:An electronic circuit is designed for the scaled system as shown in Figure 3.

Figure 3: The circuit schematic of the scaled system.

As can be seen in Figure 3, we selected 1 = 2 = 3 = 1 nF, 1 = 66 k, 2 = 3 = 8 = 9 = 15 = 16 = 100 k, 4 = 1200 k, 5 = 4000 k, 6 = 240 k, 7 = 30 k, 10 = 800 k, 11 = 400 k, 12 = 24000 k, 13 = 67 k, and 14 = 14 k. The scaled chaotic system was done on the electronic card (see Figure 4). All phase portraits on the oscilloscope are shown in Figure 5, which illustrate the feasibility of the system.

Figure 4: The experimental circuit of the scaled chaotic system.
Figure 5: All phase portraits of the scaled chaotic system on the oscilloscope: (a) plane, (b) plane, and (c) plane.

3. Image Encryption and Sound Steganography Applications of the System without Equilibrium

After considering the circuit implementation of the system, in this section, image encryption and hiding of encrypted image data in a sound file have been implemented to show that the no-equilibrium chaotic system can be used in multimedia security applications. In order to realize these applications, firstly random number generator design has been done.

3.1. Random Number Generator (RNG) Design

One of the most basic structures used in chaos-based encryption and stenography applications is RNG. In this study, before the security applications, a RNG design has been implemented for use in these applications. In RNG design, mod (256) operation has been performed by taking 13, 14, and 15 digits after the point of state variables obtained by using Runge–Kutta 4 (RK4) algorithm. In this case, 8 bits of each state variable are obtained in each iteration of the RK4 algorithm. Finally, each 8-bit sequence obtained from 3 state variables (, , ) has been XORed at each iteration to obtain a random bit sequence of RNG. In Table 1, the statistical NIST-800-22 test results of the random number sequence of 1,000,000 bits obtained from the designed RNG are shown.

Table 1: NIST-800-22 test results of the new chaotic system based RNG.

The statistical NIST-800-22 test is known as the internationally accepted best random test. The NIST test is a comprehensive test consisting of 15 different tests. In order to be able to speak of a complete randomness, obtained values from the all of 15 tests must be provided with the condition of 1 > value > 0.01. When the values in Table 1 are examined, it is seen that the RNG based on the new system is successful in all tests.

3.2. Image Encryption Application

In this application, image encryption is performed using RNG obtained in Section 3.1. In the application pixel size image with gray scale (“pepper”) is used. All pixels of the original image have converted to binary and all binary bits have been subjected to XOR processing with a random bit sequence obtained from the RNG to perform encryption. The decryption process is also performed by applying the reverse of the encryption process. Figure 6 shows the original, encrypted, and decrypted images. As seen in the figure, the encrypted image is not understood. So, the encryption is visually very successful. Correlation, histogram, entropy, and differential attack analyses were also performed to analyze the performance of the encryption. Figures 7 and 8 show correlation distributions and histogram graphs. In these graphs, it is seen that encryption process provides a very homogeneous distribution. The homogeneity of the encrypted image distributions shows the encryption is good. In addition, we have implemented some existing image encryption methods to compare with our encryption method (see Tables 2 and 3). The entropy, correlation, and differential attack (NPCR and UACI) results and encryption time show the good performance of the proposed image encryption method.

Table 2: Security analysis result and comparisons (256 × 256 “pepper” image).
Table 3: Encryption time and comparisons ( “pepper” image).
Figure 6: Original, encrypted, and decrypted images.
Figure 7: Correlation distributions of original and encrypted images.
Figure 8: Histograms of original and encrypted images.
3.3. Sound Steganography Application

In this section, the encrypted picture obtained in Section 3.2 has been hidden in the original sound as in Figure 9. In this hiding process, firstly, the pixel values of the encrypted picture are converted into binary numbers. Secondly, the float values obtained from the sound data are converted to 32-bit binary numbers. Finally, all the bits belonging to the encrypted image are hidden by placing them in the LSB bits of the 32-bit binary numbers of the selected sound data using the RNG obtained in Section 3.1. As a result, the sound data in which the encrypted image is hidden is shown in Figure 9. There is no visual difference between the original and embedded sound data seen in Figure 9. This shows that the steganography application has a good performance. Since it is not enough that there is no difference visually between the original and embedded sounds, analyses of correlation, histogram, entropy, mean square error (MSE), maximum absolute error (MAXERR), and the energy ratio (L2RAT) were also performed. As seen in Figures 10 and 11, correlation distributions and histograms of the original and embedded sounds are the same. In addition, the results of the analyses in Table 4 indicate that there is no difference between the original and embedded sounds. This means that the sound steganography application based on the chaotic system without equilibrium has a good performance.

Table 4: Security analysis of the steganography process.
Figure 9: Original and embedded sound.
Figure 10: Correlation distributions of original and embedded sounds.
Figure 11: Histograms of original and embedded sounds.

4. Conclusions

This paper introduces a 3D system without equilibrium, which exhibits chaotic behavior. The system includes ten terms and has been implemented easily by an electronic circuit. The findings of this work add to a growing list of systems with hidden attractors. This work enhances our understanding of practical applications using systems with hidden attractors. We have used the system without equilibrium for image encryption and sound steganography. According to our knowledge, this is the first time that the 128 kbit data can be encrypted and hidden in sound files. Therefore the findings of this work have important implications for future practice. Other chaotic systems without equilibrium will be discovered in our future researches.

Conflicts of Interest

The authors declare that there are no conflicts of interest regarding the publication of this paper.

Acknowledgments

The authors acknowledge Professor GuanRong Chen, Department of Electronic Engineering, City University of Hong Kong, for suggesting many helpful references. The author Xiong Wang was supported by the National Natural Science Foundation of China (no. 61601306) and Shenzhen Overseas High Level Talent Peacock Project Fund (no. 20150215145C).

References

  1. F. Y. Shih, Multimedia Security: Watermaking, Steganography, and Forensics, CRC Press, Boca Raton, Fla, USA, 2013.
  2. A. E. Hassanien, M. M. Fouad, A. A. Manaf, M. Zamani, R. Ahmad, and J. Kacpzyk, Multimedia Forensics and Security Foundations, Innovations, and Applications, Springer, Berlin, Germany, 2017.
  3. N. Dey and V. Santhi, Intelligent Techniques in Signal Processing for Multimedia Security, Springer, Berlin, Germany, 2017.
  4. I. J. Cox, J. Kilian, F. T. Leighton, and T. Shamoon, “Secure spread spectrum watermarking for multimedia,” IEEE Transactions on Image Processing, vol. 6, no. 12, pp. 1673–1687, 1997. View at Publisher · View at Google Scholar · View at Scopus
  5. M. U. Celik, G. Sharma, E. Saber, and A. M. Tekalp, “Hierarchical watermarking for secure image authentication with localization,” IEEE Transactions on Image Processing, vol. 11, no. 6, pp. 585–595, 2002. View at Publisher · View at Google Scholar · View at Scopus
  6. J. Eggers and B. Girod, Informed Watermarking, Kluwer Academic, 2002, Kluwer Academic, Dordrecht, The Netherlands, 2002.
  7. M. S. Baptista, “Cryptography with chaos,” Physics Letters A, vol. 240, no. 1-2, pp. 50–54, 1998. View at Publisher · View at Google Scholar · View at MathSciNet
  8. K.-W. Wong, “A combined chaotic cryptographic and hashing scheme,” Physics Letters. A, vol. 307, no. 5-6, pp. 292–298, 2003. View at Publisher · View at Google Scholar · View at MathSciNet · View at Scopus
  9. Z. Dawei, C. Guanrong, and L. Wenbo, “A chaos-based robust wavelet-domain watermarking algorithm,” Chaos, Solitons & Fractals, vol. 22, no. 1, pp. 47–54, 2004. View at Publisher · View at Google Scholar · View at Scopus
  10. Y.-T. Wu and F. Y. Shih, “Digital watermarking based on chaotic map and reference register,” Pattern Recognition, vol. 40, no. 12, pp. 3753–3763, 2007. View at Publisher · View at Google Scholar · View at Scopus
  11. D. Zhao, G. Chen, and W. Liu, “Image scrambling encryption algorithm of pixel bit based on chaos map,” Pattern Recognition Letters, vol. 31, no. 5, pp. 347–354, 2010. View at Publisher · View at Google Scholar · View at Scopus
  12. G. Alvarez and S. Li, “Some basic cryptographic requirements for chaos-based cryptosystems,” International Journal of Bifurcation and Chaos in Applied Sciences and Engineering, vol. 16, no. 8, pp. 2129–2151, 2006. View at Publisher · View at Google Scholar · View at MathSciNet · View at Scopus
  13. H. Liu, A. Kadir, and Y. Li, “Audio encryption scheme by confusion and diffusion based on multi-scroll chaotic system and one-time keys,” Optik - International Journal for Light and Electron Optics, vol. 127, no. 19, pp. 7431–7438, 2016. View at Publisher · View at Google Scholar · View at Scopus
  14. H. Liu, A. Kadir, and Y. Li, “Asymmetric color pathological image encryption scheme based on complex hyper chaotic system,” Optik, vol. 127, no. 15, pp. 5812–5819, 2016. View at Publisher · View at Google Scholar · View at Scopus
  15. Q. Liu, P.-Y. Li, M.-C. Zhang, Y.-X. Sui, and H.-J. Yang, “A novel image encryption algorithm based on chaos maps with Markov properties,” Communications in Nonlinear Science and Numerical Simulation, vol. 20, no. 2, pp. 506–515, 2015. View at Publisher · View at Google Scholar · View at Scopus
  16. M. Ghebleh and A. Kanso, “A robust chaotic algorithm for digital image steganography,” Communications in Nonlinear Science and Numerical Simulation, vol. 19, no. 6, pp. 1898–1907, 2014. View at Publisher · View at Google Scholar · View at Scopus
  17. G. Arumugam, V. Lakshmi Praba, and S. Radhakrishnan, “Study of chaos functions for their suitability in generating Message Authentication Codes,” Applied Soft Computing Journal, vol. 7, no. 3, pp. 1064–1071, 2007. View at Publisher · View at Google Scholar · View at Scopus
  18. G. A. Leonov, N. V. Kuznetsov, and V. I. Vagaitsev, “Localization of hidden Chua's attractors,” Physics Letters A, vol. 375, no. 23, pp. 2230–2233, 2011. View at Publisher · View at Google Scholar · View at MathSciNet · View at Scopus
  19. G. A. Leonov, N. V. Kuznetsov, and V. I. Vagaitsev, “Hidden attractor in smooth Chua systems,” Physica D: Nonlinear Phenomena, vol. 241, no. 18, pp. 1482–1486, 2012. View at Publisher · View at Google Scholar · View at MathSciNet · View at Scopus
  20. G. A. Leonov and N. V. Kuznetsov, “Hidden attractors in dynamical systems: from hidden oscillations in hilbert-kolmogorov, Aizerman, and Kalman problems to hidden chaotic attractor in chua circuits,” International Journal of Bifurcation and Chaos, vol. 23, no. 1, Article ID 1330002, 2013. View at Publisher · View at Google Scholar · View at Scopus
  21. D. Dudkowski, S. Jafari, T. Kapitaniak, N. V. Kuznetsov, G. A. Leonov, and A. Prasad, “Hidden attractors in dynamical systems,” Physics Reports, vol. 637, pp. 1–50, 2016. View at Publisher · View at Google Scholar · View at Scopus
  22. T. Kapitaniak, “Generating strange nonchaotic trajectories,” Physical Review E, vol. 47, no. 2, pp. 1408–1410, 1993. View at Publisher · View at Google Scholar · View at Scopus
  23. B. Blazejczyk-Okolewska and T. Kapitaniak, “Dynamics of impact oscillator with dry friction,” Chaos, Solitons & Fractals, vol. 7, no. 9, pp. 1455–1459, 1996. View at Publisher · View at Google Scholar · View at Scopus
  24. B. Blazejczyk-Okolewska and T. Kapitaniak, “Co-existing attractors of impact oscillator,” Chaos, Solitons & Fractals, vol. 9, no. 8, pp. 1439–1443, 1998. View at Publisher · View at Google Scholar · View at Scopus
  25. S. Kraut and U. Feudel, “Multistability, noise, and attractor hopping: the crucial role of chaotic saddles,” Physical Review E: Statistical, Nonlinear, and Soft Matter Physics, vol. 66, no. 1, Article ID 015207, pp. 015207/1–015207/4, 2002. View at Publisher · View at Google Scholar · View at Scopus
  26. S. L. T. de Souza, A. M. Batista, I. L. Caldas, R. L. Viana, and T. Kapitaniak, “Noise-induced basin hopping in a vibro-impact system,” Chaos, Solitons and Fractals, vol. 32, no. 2, pp. 758–767, 2007. View at Publisher · View at Google Scholar · View at Scopus
  27. U. Feudel, “Complex dynamics in multistable systems,” International Journal of Bifurcation and Chaos in Applied Sciences and Engineering, vol. 18, no. 6, pp. 1607–1626, 2008. View at Publisher · View at Google Scholar · View at MathSciNet · View at Scopus
  28. M. D. Shrimali, A. Prasad, R. Ramaswamy, and U. Feudel, “The nature of attractor basins in multistable systems,” International Journal of Bifurcation and Chaos, vol. 18, no. 6, pp. 1675–1688, 2008. View at Publisher · View at Google Scholar · View at MathSciNet · View at Scopus
  29. A. Chudzik, P. Perlikowski, A. Stefanski, and T. Kapitaniak, “Multistability and rare attractors in van der Pol-Duffing oscillator,” International Journal of Bifurcation and Chaos in Applied Sciences and Engineering, vol. 21, no. 7, pp. 1907–1912, 2011. View at Publisher · View at Google Scholar · View at MathSciNet · View at Scopus
  30. A. N. Pisarchik and U. Feudel, “Control of multistability,” Physics Reports, vol. 540, no. 4, pp. 167–218, 2014. View at Publisher · View at Google Scholar · View at Scopus
  31. G. A. Leonov, N. V. Kuznetsov, M. A. Kiseleva, E. P. Solovyeva, and A. M. Zaretskiy, “Hidden oscillations in mathematical model of drilling system actuated by induction motor with a wound rotor,” Nonlinear Dynamics, vol. 77, no. 1-2, pp. 277–288, 2014. View at Publisher · View at Google Scholar · View at Scopus
  32. G. A. Leonov, N. V. Kuznetsov, and T. N. Mokaev, “Hidden attractor and homoclinic orbit in Lorenz-like system describing convective fluid motion in rotating cavity,” Communications in Nonlinear Science and Numerical Simulation, vol. 28, no. 1-3, pp. 166–174, 2015. View at Publisher · View at Google Scholar · View at MathSciNet · View at Scopus
  33. Z. T. Zhusubaliyev, E. Mosekilde, A. N. Churilov, and A. Medvedev, “Multistability and hidden attractors in an impulsive Goodwin oscillator with time delay,” European Physical Journal: Special Topics, vol. 224, no. 8, pp. 1519–1539, 2015. View at Publisher · View at Google Scholar · View at Scopus
  34. M. A. Kiseleva, N. V. Kuznetsov, and G. A. Leonov, “Hidden attractors in electromechanical systems with and without equilibria,” IFAC-PapersOnLine, vol. 49, no. 14, pp. 51–55, 2016. View at Publisher · View at Google Scholar
  35. H. Jiang, Y. Liu, Z. Wei, and L. Zhang, “Hidden chaotic attractors in a class of two-dimensional maps,” Nonlinear Dynamics, vol. 85, no. 4, pp. 2719–2727, 2016. View at Publisher · View at Google Scholar · View at Scopus
  36. N. V. Kuznetsov, G. A. Leonov, M. V. Yuldashev, and R. V. Yuldashev, “Hidden attractors in dynamical models of phase-locked loop circuits: limitations of simulation in MATLAB and SPICE,” Communications in Nonlinear Science and Numerical Simulation, vol. 51, pp. 39–49, 2017. View at Publisher · View at Google Scholar · View at Scopus
  37. M.-F. Danca, N. Kuznetsov, and G. Chen, “Unusual dynamics and hidden attractors of the Rabinovich–Fabrikant system,” Nonlinear Dynamics, vol. 88, no. 1, pp. 791–805, 2017. View at Publisher · View at Google Scholar · View at Scopus
  38. Z. Wei, “Dynamical behaviors of a chaotic system with no equilibria,” Physics Letters. A, vol. 376, no. 2, pp. 102–108, 2011. View at Publisher · View at Google Scholar · View at MathSciNet · View at Scopus
  39. Z. Wang, S. Cang, E. O. Ochola, and Y. Sun, “A hyperchaotic system without equilibrium,” Nonlinear Dynamics, vol. 69, no. 1-2, pp. 531–537, 2012. View at Publisher · View at Google Scholar · View at Scopus
  40. S. Jafari, J. C. Sprott, and S. . Hashemi Golpayegani, “Elementary quadratic chaotic flows with no equilibria,” Physics Letters A, vol. 377, no. 9, pp. 699–702, 2013. View at Publisher · View at Google Scholar · View at MathSciNet · View at Scopus
  41. X. Wang and G. Chen, “Constructing a chaotic system with any number of equilibria,” Nonlinear Dynamics, vol. 71, no. 3, pp. 429–436, 2013. View at Publisher · View at Google Scholar · View at Scopus
  42. Z. Wei, R. Wang, and A. Liu, “A new finding of the existence of hidden hyperchaotic attractors with no equilibria,” Mathematics and Computers in Simulation, vol. 100, pp. 13–23, 2014. View at Publisher · View at Google Scholar · View at MathSciNet · View at Scopus
  43. C. K. Volos, I. M. Kyprianidis, and I. N. Stouboulos, “A chaotic path planning generator for autonomous mobile robots,” Robotics and Autonomous Systems, vol. 60, no. 4, pp. 651–656, 2012. View at Publisher · View at Google Scholar · View at Scopus
  44. S. Bouali, A. Buscarino, L. Fortuna, M. Frasca, and L. V. Gambuzza, “Emulating complex business cycles by using an electronic analogue,” Nonlinear Analysis: Real World Applications, vol. 13, no. 6, pp. 2459–2465, 2012. View at Publisher · View at Google Scholar · View at MathSciNet · View at Scopus
  45. C. K. Volos, I. M. Kyprianidis, and I. N. Stouboulos, “Image encryption process based on chaotic synchronization phenomena,” Signal Processing, vol. 93, no. 5, pp. 1328–1340, 2013. View at Publisher · View at Google Scholar · View at Scopus
  46. A. Buscarino, L. Fortuna, M. Frasca, and G. Sciuto, “Design of time-delay chaotic electronic circuits,” IEEE Transactions on Circuits and Systems I: Regular Papers, vol. 58, no. 8, pp. 1888–1896, 2011. View at Publisher · View at Google Scholar · View at MathSciNet · View at Scopus
  47. W.-J. Zhou, Z.-P. Wang, M.-W. Wu, W.-H. Zheng, and J.-F. Weng, “Dynamics analysis and circuit implementation of a new three-dimensional chaotic system,” Optik, vol. 126, no. 7-8, Article ID 55317, pp. 765–768, 2015. View at Publisher · View at Google Scholar · View at Scopus
  48. Q. Lai and L. Wang, “Chaos, bifurcation, coexisting attractors and circuit design of a three-dimensional continuous autonomous system,” Optik, vol. 127, no. 13, pp. 5400–5406, 2016. View at Publisher · View at Google Scholar · View at Scopus
  49. A. Akgul, I. Moroz, I. Pehlivan, and S. Vaidyanathan, “A new four-scroll chaotic attractor and its engineering applications,” Optik - International Journal for Light and Electron Optics, vol. 127, no. 13, pp. 5491–5499, 2016. View at Publisher · View at Google Scholar
  50. A. Akgul, S. Hussain, and I. Pehlivan, “A new three-dimensional chaotic system, its dynamical analysis and electronic circuit applications,” Optik, vol. 127, no. 18, pp. 7062–7071, 2016. View at Publisher · View at Google Scholar · View at Scopus
  51. B. Bao, T. Jiang, Q. Xu, M. Chen, H. Wu, and Y. Hu, “Coexisting infinitely many attractors in active band-pass filter-based memristive circuit,” Nonlinear Dynamics, vol. 86, no. 3, pp. 1711–1723, 2016. View at Publisher · View at Google Scholar · View at Scopus
  52. Ü. Çavuşoğlu, S. Kaçar, I. Pehlivan, and A. Zengin, “Secure image encryption algorithm design using a novel chaos based S-Box,” Chaos, Solitons and Fractals, vol. 95, pp. 92–101, 2017. View at Publisher · View at Google Scholar · View at Scopus
  53. O. M. Al-Hazaimeh, N. Alhindawi, S. M. A. Hayajneh, and A. Almomani, “HANON chaotic map - based new digital image encryption algorithm,” MAGNT Research Report, vol. 2, pp. 261–266, 2014. View at Google Scholar
  54. H. M. Al-Naijar, “Digital image encryption algorithm based on a linear independence scheme and the logistic map,” in Proceedings of the International Arab Conference on Information Technology (ACIT '11), pp. 215–219, 2011.
  55. H. Al-Najjar and N. Al-Rousan, “Data hiding in encrypted image based on multi-chaotic approach,” International Journal of Scientific and Engineering Research, vol. 4, pp. 1–5, 2013. View at Google Scholar
  56. R. Enayatifar, A. H. Abdullah, and I. F. Isnin, “Chaos-based image encryption using a hybrid genetic algorithm and a DNA sequence,” Optics and Lasers in Engineering, vol. 56, no. 5, pp. 83–93, 2014. View at Publisher · View at Google Scholar · View at Scopus
  57. R. Enayatifar, H. J. Sadaei, A. H. Abdullah, M. Lee, and I. F. Isnin, “A novel chaotic based image encryption using a hybrid model of deoxyribonucleic acid and cellular automata,” Optics and Lasers in Engineering, vol. 71, pp. 33–41, 2015. View at Publisher · View at Google Scholar · View at Scopus
  58. S. Lian, J. Sun, and Z. Wang, “A block cipher based on a suitable use of the chaotic standard map,” Chaos, Solitons & Fractals, vol. 26, no. 1, pp. 117–129, 2005. View at Publisher · View at Google Scholar · View at Scopus
  59. K. Wong, B. S. Kwok, and W. Law, “A fast image encryption scheme based on chaotic standard map,” Physics Letters, Section A: General, Atomic and Solid State Physics, vol. 372, no. 15, pp. 2645–2652, 2008. View at Publisher · View at Google Scholar · View at Scopus
  60. Y. Wu, G. Yang, H. Jin, and J. P. Noonan, “Image encryption using the two-dimensional logistic chaotic map,” Journal of Electronic Imaging, vol. 21, no. 1, Article ID 013014, 2012. View at Publisher · View at Google Scholar
  61. X. Liao, S. Lai, and Q. Zhou, “A novel image encryption algorithm based on self-adaptive wave transmission,” Signal Processing, vol. 90, no. 9, pp. 2714–2722, 2010. View at Publisher · View at Google Scholar · View at Scopus