Discrete Dynamics in Nature and Society

Discrete Dynamics in Nature and Society / 2018 / Article
Special Issue

Recent Trends in Dynamical Systems on Time Scales

View this Special Issue

Research Article | Open Access

Volume 2018 |Article ID 4585083 | https://doi.org/10.1155/2018/4585083

Zeyu Liu, Tiecheng Xia, Jinbo Wang, "Image Encryption Technology Based on Fractional Two-Dimensional Triangle Function Combination Discrete Chaotic Map Coupled with Menezes-Vanstone Elliptic Curve Cryptosystem", Discrete Dynamics in Nature and Society, vol. 2018, Article ID 4585083, 24 pages, 2018. https://doi.org/10.1155/2018/4585083

Image Encryption Technology Based on Fractional Two-Dimensional Triangle Function Combination Discrete Chaotic Map Coupled with Menezes-Vanstone Elliptic Curve Cryptosystem

Academic Editor: Youssef N. Raffoul
Received07 Dec 2017
Revised10 Feb 2018
Accepted22 Feb 2018
Published23 Apr 2018


A new fractional two-dimensional triangle function combination discrete chaotic map (2D-TFCDM) with the discrete fractional difference is proposed. We observe the bifurcation behaviors and draw the bifurcation diagrams, the largest Lyapunov exponent plot, and the phase portraits of the proposed map, respectively. On the application side, we apply the proposed discrete fractional map into image encryption with the secret keys ciphered by Menezes-Vanstone Elliptic Curve Cryptosystem (MVECC). Finally, the image encryption algorithm is analysed in four main aspects that indicate the proposed algorithm is better than others.

1. Introduction

Nowadays, image encryption plays a significant role with the development of security technology in the areas of network, communication, and cloud service. Multifarious chaos-based image encryption algorithms have been developed up to now, such as in [16]; however a few of them have referred to the image encryption algorithm based on fractional discrete chaotic map accompanied with Elliptic Curve Cryptography (ECC).

The theory of the fractional difference has been developed for decades [713]. Recently, Wu et al. [1416] made a contribution to the application of the discrete fractional calculus (DFC) on an arbitrary time scale, and the theories of delta difference equations were utilized to reveal the discrete chaos behavior.

ECC is a widely used technology in data security and communication security; it can achieve the same level of security with smaller key sizes and higher computational efficiency [17]. Many famous public-key algorithms, such as Diffie-Hellman, EIGamal, and Schnorr, can be implemented by means of elliptic curves over finite fields. MVECC is one of the popular elliptic curve public-key cryptosystems [18] and we adopt it in our cryptosystem.

Many encryption methods based on fractional derivatives have been proposed in recent time, like fractional logistic maps [19], fractional-order chaos systems [20], and fractional form of hyperchaotic system [21].

In [22], a new image encryption algorithm based on one-dimensional fractional chaotic time series within fractional-order difference has been proposed; however, the two-dimensional discrete chaotic map has seldom been used in image encryption except [23, 24].

Our main purpose is to introduce a new two-dimensional discrete chaotic map based on fractional-order difference and apply it in image encryption. The rest of this paper is organized as follows. In Section 2, the definitions and the properties of the DFC are introduced. After that, the definitions and operation of ECC are given. Then, the working principle of MVECC is described in the next section. In Section 5, we give the fractional 2D-TFCDM on time scales from the discrete integral expression. The bifurcation diagrams and the phase portraits of the map are presented while the difference orders and the coefficients are changing; the largest Lyapunov exponent plots are also displayed. Afterwards, we apply the proposed map into image encryption and show several examples. In Section 7, the performance of the proposed image encryption method is analysed systematically. Finally, we have come to some conclusions.

2. Preliminaries

The definitions of the fractional sum and difference are given as follows. Let denote the isolated time scale and ( fixed). Within the DFC, the function is changed as a sequence . The difference operator is defined as .

Definition 1 (see [25]). Let : and be given. The th fractional sum is defined byNote that is the starting point; is the falling function defined as

Definition 2 (see [26]). For , , and defined on , the -order Caputo fractional difference is defined by

Theorem 3 (see [27]). For the delta fractional difference equationthe equivalent discrete integral equation iswhereThe complex difference equation with long-term memory is obtained here. It can reduce to the integer order one with the difference order but the integer one does not hold the discrete memory. From (3) to (5), the domain is shifted from to and the function is preserved to be defined on the isolated time scale in the fractional sums.

3. Introduction to Elliptic Curve

Definition 4. An elliptic curve (EC) over a prime field denoted by refers to the set of all points () that satisfy the equationtogether with a special point at infinity, where , and [28, 29].

3.1. Elliptic Curve Operations

If , ; then if but , ; that is, [29]. where

The scalar multiplication over is defined by where is an integer.

Definition 5. The order of an EC is defined by the number of points that lie on the EC denoted by [29].

Definition 6. Set , and then is called a generator point if ( is the smallest positive integer that makes ) [29].

4. Menezes-Vanstone Elliptic Curve Cryptosystem (MVECC)

MVECC is one of most significant extensions of ECC; the working principle of MVECC is as follows.

If Andy wants to encrypt and send the message to Bob, they should do the step as mentioned hereunder:

Andy and Bob make an agreement on an elliptic curve and the base point .

Bob firstly selects a private key to compute the public key ().

If Andy wants to send a message to Bob, he firstly chooses a random private key () and then computes his public key . On the other hand, Andy calculates the secret key byHe should compute the ciphered message afterwards by

Then the ciphertext is sent to Bob. When Bob wants to get the plaintext , firstly, he computes the secret key , and then he computes by to get the plaintext [18].

Any adversary that only has and without the private keys and very difficultly breaks the MVECC to get the plaintext . What is more, if have only one big prime divisor, the EC is called a safe EC [29]; then, the MVECC can become an more efficient and secure cryptosystem.

5. Fractional 2D-TFCDM

From [1416], we notice the application of the DFC in fractional generalizations of the discrete chaotic maps. Recently [30], the following 2D-TFCDM was proposed: Now, consider the fractional generalization of ; the map was also studied in [31]:From Theorem 3, we have the following equivalent discrete numerical formula for the variable : with :

Let = 1, , , , and be fixed. In what follows, Figure 1 is the bifurcation diagram where the step size of is 0.002. Figure 2 is the same bifurcation diagram except for = 0.8.

In Figures 3 and 4, the largest Lyapunov exponent plots are drawn by use of the Jacobian matrix algorithm proposed in [32]. The largest Lyapunov exponent LE is positive somewhere; it is corresponding to the chaotic intervals in Figures 1 and 2.

By choosing 101 different initial values we can plot versus in one figure. The phase portraits of the integer map are derived from Figure 5. The cases of and are plotted in Figures 6 and 7, respectively.

6. Applications

The fractionalized chaotic map can be applied in image encryption. Exploit (16) into an algorithm, and set the initial values , , the order , and the coefficients , of chaotic system as keys. In this paper, we propose the encryption algorithm and divide it into 3 parts.

6.1. Generation of New Keys Based on Elliptic Curve in a Finite Field

Setting , , and in (7), we can get . Since is a prime number, according to [29], is a safe EC. Let , randomly select , ; then , , and . The initial key , , , and .

Calculate Then, the ciphertext is ((7495358, 7052635), 7123456, 190000), the enciphered key is , and .

Make , , and , and compute , , and ; then

Set , , , and then , , , , are taken as the keys of Section 6.2.

6.2. Permutation Procedure Based on Fractional 2D-TFCDM

Taking advantage of (16) with the initial values , , , , and generated in the last section, we can encrypt the image. The next step of encryption is permutation; it is subdivided into 4 steps:

Set as ; iterate (16) for times to generate the one-dimensional real number chaotic sequence , ; here and denote the length and width of the original image , respectively.

Reorder by the bubble sort and get , and record the change of the subscript of as .

Change original image into sequence , and rearrange according to to get the new sequence .

Reshape into image as ; is the permutated image we needed.

Reversing the above 4 steps, we can remove the effect of permutation to get the original image.

6.3. Encryption Method Based on Fractional 2D-TFCDM

In Section 6.2 we get the chaotic sequence and image . Reshape image into sequence ; that is , (, ). Another image is used as a key image (K-image). Change the K-image also into sequence .

Set .

Round as , do modulus operation to in (19), and get :

Do the following operation and get :where refers to the Xor operation, and is the encrypted pixel value.

The inverse form of (20) is

Compute the iteration times according to Then, iterate (16) for times to get , circle from step to step , until getting .

Change into image as , which is the finally encrypted figure we need.

The decryption procedure is including 2 parts:

Do all steps in encryption process except (20) which is replaced by (21).

Reverse the procedure in Section 6.2. Then the decryption procedure is done.

Figure 8 shows the encryption process described in Sections 6.2 and 6.3 in a flow chart, and Figure 9 illustrates the iteration procedure of S box.

The original, encrypted, and decrypted images are shown in Figures 1018. The proposed algorithm can encrypt any rectangular image.

The adopted cryptosystem in Section 6.1 is asymmetric; however, the ones in Sections 6.2 and 6.3 are symmetric.

7. Analysis of Results in Applications

7.1. Key Space

In the proposed algorithm, the initial values , , the order , and the coefficients , are taken as the secret keys; consequently there are 5 keys. Assume the precision of , , , , and are , and , respectively; then the key’s space is . If the size of the plaintext is , then the key space of K-image is also . The total key space of the proposed algorithm is .

7.2. Statistics Analysis

The quality against any statistical attack is important for a well-designed encryption method; it include 3 aspects as follows.

7.2.1. Correlation of the Plain- and Cipher-Images

In an ordinary image, the adjacent pixels are related; therefore the correlation coefficient of adjacent pixels is usually high. A good encryption algorithm should make the correlation coefficients of encrypted image nearly equal to zero. The closer to zero the correlation coefficients is, the better the encryption algorithm is. Formulas (23) calculate the correlation coefficient. The correlations along the direction of both original and encrypted images are displayed in Figures 1927 from Cameraman to Aerial. The correlation coefficients are displayed in Table 1.

Image Original image Encrypted image
Horizontal Diagonal Vertical Horizontal Diagonal Vertical

Cameraman 0.9276 0.9120 0.9597 0.0119 −0.0021 −0.0025
Lena 0.9722 0.9527 0.9860 −0.0140 −0.0086 −0.0034
Peppers 0.9667 0.9382 0.9694 −0.0088 0.0080 −0.0054
Lake 0.9768 0.9544 0.9748 −0.0155 0.0101 −0.0088
Dollar 0.8035 0.6952 0.6938 0.0131 −0.0183 0.0263
Columbia 0.9727 0.9403 0.9705 0.0060 −0.0104 −0.0093
Lax 0.7889 0.7151 0.8483 −0.0107 0.0147 0.0107
Boat 0.9407 0.9158 0.9545 0.0169 −0.0074 −0.0077
Aerial 0.9135 0.7952 0.8677 0.0084 −0.0123 −0.0133

With the sharp contrast of data between original image and encrypted image, Table 1 indicates that the encryption process make pixels of the encrypted image almost independent with each other. Consequently, the encryption algorithm is good at pixel value randomization.

Compared with other algorithm, we can observe that most correlation coefficients of encrypted image are nearer to 0 in Table 2. As a consequence of this, the proposed encryption algorithm is superior to others.

Algorithm Image Original image Encrypted image
Horizontal Vertical Diagonal Horizontal Vertical Diagonal

Proposed Lena 0.9722 0.9527 0.9860 −0.0140 −0.0086 −0.0034
[1]Lena 0.95030.97550.9275 −0.0226 0.0041 0.0368
[2]Lena 0.9279700.9263310.839072 −0.010889 −0.018110 −0.006104
[5] Lena 0.946 0.973 0.921 −0.0055 −0.0075 0.0026
[6] Lena 0.9569 0.9236 0.9019 0.0042 −0.0043 0.0163

7.2.2. Histogram

Histogram reflects the distribution of colors inside the image. The adversary can get some effective information from the regularity of histogram. Therefore, a well-designed image encryption method should make the pixel value of encrypted image distribute uniformly. Figure 28 shows the histogram of Cameraman. Similarly, the histograms of the other 8 cases are drawn in Figures 2936. It is illustrated that the proposed encryption method has a good effect on pixel value distribution uniformization.

7.2.3. Information Entropy

Information entropy defines the randomness and the unpredictability of information in an image. It is defined byHere is the probability of ; is the number of bits that is required to represent the symbol . For the pixels values of the image are 0~255, according to (24) the information entropy is 8 bits for an ideally random image. Therefore, the closer to 8 bits the information entropy is, the better the encryption algorithm is. The information entropy of the 9 cases is gotten in Table 3; it indicates that the encrypted images are very close to the random images.

Image Original image Encrypted image

Cameraman 7.0097 7.9974
Peppers 7.5739 7.9976
Dollar 6.9785 7.9992
Lax 6.8272 7.9993
Aerial 6.9940 7.9992
Lena 7.2185 7.9993
Lake 7.4845 7.9993
Columbia 7.2736 7.9992
Boat 6.9391 7.9972

From Table 4, we can observe that the information entropy of proposed algorithm is nearer to 8 bits than other algorithms.

Algorithm Image Original image Encrypted image

Proposed Lena 7.2185 7.9993
[1]Lena 7.2072 7.9973
[4] Lena Undefined7.9972
[19]Lena Undefined7.987918
[20] Lena 7.4471447.988847

7.3. Sensitivity Analysis

The different range between two images is measured by two criteria: number of pixels change rate (NPCR) and unified average changing intensity (UACI). They are defined as follows:Here and are the width and the height of and .

7.3.1. Key Sensitivity

We encrypt the image by the keys , , , , and . Figure 37(a) is the decrypted image with the correct keys. Figure 37(b) represents the decrypted image under adding to with other keys unchanged. Similarly, the secret keys are added as and to decrypt the images separately with other keys unchanged. The results are shown in Figures 37(c)37(f). The comparison of key space is shown in Table 5 and the NPCR and UACI between Figures 37(a) and 37(b)37(f) are calculated in Table 6.

Algorithm Proposed [2] [4] [6]

Key spaces ≈2273

Image NPCR and UACI
NPCR (%)UACI (%)

Figure 37(b)99.6131.26
Figure 37(c)97.0230.23
Figure 37(d)99.6031.03
Figure 37(e)99.6131.01
Figure 37(f)99.6231.27

In contrast with other algorithm, the key space of proposed algorithm is larger than others.

Most NPCR are near to 99.61% and most of UACI are higher than 30% in Table 6. We cannot recognize the man inside from Figures 37(b)37(f); therefore the encryption method is sensitive to the keys.

7.3.2. Plaintext Sensitivity

By encrypting two same images with only one pixel difference, the attackers can obtain effective information by comparing the two encrypted images. Therefore an encryption method designed against differential attack should ensure that the two encrypted images are completely different even if there is only a pixel difference in the original image.

In Table 7, Figure 10(a) is the same as Figure 10(a) except for a pixel locating . After that, the 2 images are encrypted with the same keys and the NPCR and UACI between the 2 ciphertext images are calculated. Similarly, the data of other 8 cases are obtained in Tables 815.

Image NPCR and UACI of Cameraman
NPCR (1-round %) UACI (1-round %) NPCR (2-round %) UACI (2-round %)

Figure 10(a)(30, 30) 4.84 1.64 99.57 33.61
Figure 10(a)(50, 50) 81.43 27.39 99.62 33.56
Figure 10(a)(80, 80) 80.87 27.19 99.59 33.51
Figure 10(a)(100, 100) 6.82 2.28 99.59 33.46

Image NPCR and UACI of Lena
NPCR (1-round %) UACI (1-round %) NPCR (2-round %) UACI (2-round %)

Figure 11(a)(30, 30) 1.21 0.41 99.59 33.39
Figure 11(a)(50, 50) 95.06 31.93 99.59 33.53
Figure 11(a)(80, 80) 94.90 31.93 99.60 33.48
Figure 11(a)(100, 100) 1.71 0.58 99.63 33.40

Image NPCR and UACI of Peppers
NPCR (1-round %)UACI (1-round %)NPCR (2-round %)UACI (2-round %)

Figure 12(a)(30, 30)4.831.6499.5633.44
Figure 12(a)(50, 50)81.4427.3599.6233.50
Figure 12(a)(80, 80)6.122.0399.5733.42
Figure 12(a)(100, 100)6.832.3299.6033.50

Image NPCR and UACI of Lake
NPCR (1-round %)UACI (1-round %)NPCR (2-round %)UACI (2-round %)

Figure 13(a)(30, 30)1.210.4199.6133.46
Figure 13(a)(50, 50)95.0931.8899.6133.42
Figure 13(a)(80, 80)94.9231.8999.6033.46
Figure 13(a)(100, 100)1.710.5899.5933.47

Image NPCR and UACI of Dollar
NPCR (1-round %)UACI (1-round %)NPCR (2-round %)UACI (2-round %)

Figure 14(a)(30, 30)1.210.4199.6433.42
Figure 14(a)(50, 50)95.0832.0099.6033.49
Figure 14(a)(80, 80)94.9031.9399.6133.48
Figure 14(a)(100, 100)1.710.5799.6133.41

Image NPCR and UACI of Columbia
NPCR (1-round %)UACI (1-round %)NPCR (2-round %)UACI (2-round %)

Figure 15(a)(30, 30)94.8331.9699.6133.47
Figure 15(a)(50, 50)93.4831.4099.4833.36
Figure 15(a)(80, 80)0.960.3299.6033.45
Figure 15(a)(100, 100)1.110.3899.6133.51

Image NPCR and UACI of Lax
NPCR (1-round %)UACI (1-round %)NPCR (2-round %)UACI (2-round %)

Figure 16(a)(30, 30)1.210.4099.6233.39
Figure 16(a)(50, 50)95.0631.9999.6133.49
Figure 16(a)(80, 80)94.9231.8799.5833.41
Figure 16(a)(100, 100)1.700.5899.6233.48

Image NPCR and UACI of Boat
NPCR (1-round %)UACI (1-round %)NPCR (2-round %)UACI (2-round %)

Figure 17(a)(30, 30)4.831.6099.5933.47
Figure 17(a)(50, 50)81.4627.4599.6233.59
Figure 17(a)(80, 80)80.8227.2499.5833.48
Figure 17(a)(100, 100)6.822.3299.6233.61

Image NPCR and UACI of Aerial
NPCR (1-round %)UACI (1-round %)NPCR (2-round %)UACI (2-round %)

Figure 18(a)(30, 30)1.210.4199.6133.49
Figure 18(a)(50, 50)95.0631.9399.6233.43
Figure 18(a)(80, 80)94.9131.8899.6133.53
Figure 18(a)(100, 100)1.710.5799.6133.52

From Table 16, the NPCR and UACI of proposed algorithm after 2-round encryption are nearer to the ideal values 99.61% and 33.46% [33] than others. Therefore the proposed method is better.

Algorithm Image NPCR (%) UACI (%)

Proposed Lena 99.60 33.48
[1]Lena 99.6133.53
[2]Lena99.6429 33.3935
[3]Lena99.6304 33.5989
[5] Lena 99.932 39.520
[20]Lena99.6091 33.5038
[21]Lena 99.633034.1319

7.4. Resistance to Known-Plaintext and Chosen-Plaintext Attacks

In Section 6.3, the iteration times of the next round are decided by the encrypted pixel value of present round. In (20), , generated from the fractional 2D-TFCDM, is dependent on and determines . Therefore, the corresponding keystream is different when different plaintext is encrypted. For the resultant information is related to the chosen-images, the attacker cannot get useful information after encrypting some special images. As a result, the attacks proposed in [3441] become ineffective for our scheme. In a word, the proposed scheme can primely resist the known-plaintext and the chosen-plaintext attacks.

8. Conclusions

Fractional 2D-TFCDM is obtained from the 2D-TFCDM. After that, we found new chaotic dynamics behaviors from the fractionalized map. Moreover, the map can be converted into image encryption algorithm as an application. Finally, the encryption effect is analysed in 4 main aspects; we find the proposed scheme is superior to others almost anywhere in comparison. As far as we know, the proposed image encryption algorithm has never been reported before.

Conflicts of Interest

The authors declare that they have no conflicts of interest.


The project was supported by the National Natural Science Foundation of China (Grant nos. 61072147, 11271008).


  1. L. Xu, X. Gou, Z. Li, and J. Li, “A novel chaotic image encryption algorithm using block scrambling and dynamic index based diffusion,” Optics and Lasers in Engineering, vol. 91, pp. 41–52, 2017. View at: Publisher Site | Google Scholar
  2. L. Teng, X. Wang, and J. Meng, “A chaotic color image encryption using integrated bit-level permutation,” Multimedia Tools and Applications, pp. 1–14, 2017. View at: Publisher Site | Google Scholar
  3. R. Enayatifar, A. H. Abdullah, I. F. Isnin, A. Altameem, and M. Lee, “Image encryption using a synchronous permutation-diffusion technique,” Optics and Lasers in Engineering, vol. 90, pp. 146–154, 2017. View at: Publisher Site | Google Scholar
  4. Y. Li, C. Wang, and H. Chen, “A hyper-chaos-based image encryption algorithm using pixel-level permutation and bit-level permutation,” Optics and Lasers in Engineering, vol. 90, pp. 238–246, 2017. View at: Publisher Site | Google Scholar
  5. S. Chakraborty, A. Seal, M. Roy, and K. Mali, “A novel lossless image encryption method using DNA substitution and chaotic logistic map,” International Journal of Security and Its Applications, vol. 10, no. 2, pp. 205–216, 2016. View at: Publisher Site | Google Scholar
  6. N. Zhou, S. Pan, S. Cheng, and Z. Zhou, “Image compression�Cencryption scheme based on hyper-chaotic system and 2D compressive sensing,” Optics & Laser Technology, vol. 82, pp. 121–133, 2016. View at: Publisher Site | Google Scholar
  7. K. S. Miller and B. Ross, “Fractional difference calculus,” in Univalent functions, fractional calculus, and their applications (K\=oriyama, 1988), Ellis Horwood Ser. Math. Appl., pp. 139–152, Horwood, Chichester, 1989. View at: Google Scholar | MathSciNet
  8. M. Bohner and A. Peterson, Dynamic Equations on Time Scales: An Introduction with Applications, Birkhauser, Boston, Mass, USA, 2001. View at: Publisher Site | MathSciNet
  9. F. M. Atıcı and P. W. Eloe, “Initial value problems in discrete fractional calculus,” Proceedings of the American Mathematical Society, vol. 137, no. 3, pp. 981–989, 2009. View at: Publisher Site | Google Scholar | MathSciNet
  10. F. M. Atici and S. Sengul, “Modeling with fractional difference equations,” Journal of Mathematical Analysis and Applications, vol. 369, no. 1, pp. 1–9, 2010. View at: Publisher Site | Google Scholar | MathSciNet
  11. M. T. Holm, “The Laplace transform in discrete fractional calculus,” Computers & Mathematics with Applications, vol. 62, no. 3, pp. 1591–1601, 2011. View at: Publisher Site | Google Scholar | MathSciNet
  12. M. D. Ortigueira, “Introduction to fractional linear systems. Part 2: discrete-time case,” IEE Proceedings Vision, Image and Signal Processing, vol. 147, no. 1, pp. 71–78, 2000. View at: Publisher Site | Google Scholar
  13. M. D. Ortigueira, F. J. V. Coito, and J. J. Trujillo, “A new look into the discrete-time fractional calculus: Derivatives and exponentials,” in Proceedings of the 6th Workshop on Fractional Differentiation and Its Applications, FDA 2013, pp. 629–634, France, February 2013. View at: Publisher Site | Google Scholar
  14. G.-C. Wu and D. Baleanu, “Discrete chaos in fractional delayed logistic maps,” Nonlinear Dynamics, vol. 80, no. 4, pp. 1697–1703, 2015. View at: Publisher Site | Google Scholar
  15. G.-C. Wu and D. Baleanu, “Discrete fractional logistic map and its chaos,” Nonlinear Dynamics, vol. 75, no. 1-2, pp. 283–287, 2014. View at: Publisher Site | Google Scholar
  16. G.-C. Wu, D. Baleanu, and S.-D. Zeng, “Discrete chaos in fractional sine and standard maps,” Physics Letters A, vol. 378, no. 5-6, pp. 484–487, 2014. View at: Publisher Site | Google Scholar | MathSciNet
  17. K. Araki, T. Satoh, and S. Miura, “Overview of elliptic curve cryptography,” Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics): Preface, vol. 1431, pp. 29–49, 1998. View at: Publisher Site | Google Scholar
  18. C. Ma, Modern Cryptography, National Defense Industry Press, 2014.
  19. S. M. Ismail, L. A. Said, A. A. Rezk et al., “Biomedical image encryption based on double-humped and fractional logistic maps,” in Proceedings of the 6th International Conference on Modern Circuits and Systems Technologies, MOCAST 2017, Greece, May 2017. View at: Publisher Site | Google Scholar
  20. J.-F. Zhao, S.-Y. Wang, L.-T. Zhang, and X.-Y. Wang, “Image encryption algorithm based on a novel improper fractional-order attractor and a wavelet function map,” Journal of Electrical and Computer Engineering, vol. 2017, Article ID 8672716, 2017. View at: Publisher Site | Google Scholar
  21. P. Muthukumar, P. Balasubramaniam, and K. Ratnavelu, “A novel cascade encryption algorithm for digital images based on anti-synchronized fractional order dynamical systems,” Multimedia Tools and Applications, pp. 1–22, 2016. View at: Publisher Site | Google Scholar
  22. G.-C. Wu, D. Baleanu, and Z.-X. Lin, “Image encryption technique based on fractional chaotic time series,” Journal of Vibration and Control, vol. 22, no. 8, pp. 2092–2099, 2016. View at: Publisher Site | Google Scholar | MathSciNet
  23. Z. Liu and T. Xia, “Novel two dimensional fractional-order discrete chaotic map and its application to image encryption,” Applied Computing and Informatics, 2017. View at: Publisher Site | Google Scholar
  24. Z. Liu, T. Xia, and J. Wang, “Fractional two-dimensional discrete chaotic map and its applications to the information security with elliptic-curve public key cryptography,” Journal of Vibration and Control, p. 107754631773471, 2017. View at: Publisher Site | Google Scholar
  25. F. M. Atici and P. W. Eloe, “A transform method in discrete fractional calculus,” International Journal of Difference Equations, vol. 2, no. 2, pp. 165–176, 2007. View at: Google Scholar | MathSciNet
  26. T. Abdeljawad and D. Baleanu, “Fractional differences and integration by parts,” Journal of Computational Analysis and Applications, vol. 13, no. 3, pp. 574–582, 2011. View at: Google Scholar | MathSciNet
  27. Y. Zhou, F. Chen, and X. Luo, “Existence results for nonlinear fractional difference equation,” Advances in Difference Equations, vol. 2011, Article ID 713201, 2011. View at: Publisher Site | Google Scholar
  28. N. Koblitz, “Elliptic curve cryptosystems,” Mathematics of Computation, vol. 48, no. 177, pp. 203–209, 1987. View at: Publisher Site | Google Scholar | MathSciNet
  29. Y. Xiao, Research on Elliptic Curve Cryptography, Huazhong University of Science and Technology Press, 2006.
  30. P. Li, L. Min, Y. Hu, G. Zhao, and X. Li, “Novel two dimensional discrete chaotic maps and simulations,” in Proceedings of the 2012 IEEE 6th International Conference on Information and Automation for Sustainability, ICIAFS 2012, pp. 159–162, China, September 2012. View at: Publisher Site | Google Scholar
  31. M. M. Liu, T. C. Xia, and J. B. Wang, “A two dimensional fractional discrete chaos combined with triangle function,” Journal of Shanghai University (Natural Science Edition), 2017, preprinted. View at: Google Scholar
  32. G.-C. Wu and D. Baleanu, “Jacobian matrix algorithm for Lyapunov exponents of the discrete fractional maps,” Communications in Nonlinear Science and Numerical Simulation, vol. 22, no. 1-3, pp. 95–100, 2015. View at: Publisher Site | Google Scholar | MathSciNet
  33. F. M. Guo and L. Tu, The Application of Chaotic Theory in Cryptography, Beijing Institute of Technology Press, Beijing, China, 2015.
  34. D. Xiao, X. Liao, and P. Wei, “Analysis and improvement of a chaos-based image encryption algorithm,” Chaos, Solitons & Fractals, vol. 40, no. 5, pp. 2191–2199, 2009. View at: Publisher Site | Google Scholar
  35. C. Li, S. Li, G. Chen, and W. A. Halang, “Cryptanalysis of an image encryption scheme based on a compound chaotic sequence,” Image and Vision Computing, vol. 27, no. 8, pp. 1035–1039, 2009. View at: Publisher Site | Google Scholar
  36. R. Rhouma, E. Solak, and S. Belghith, “Cryptanalysis of a new substitution-diffusion based image cipher,” Communications in Nonlinear Science and Numerical Simulation, vol. 15, no. 7, pp. 1887–1892, 2010. View at: Publisher Site | Google Scholar | MathSciNet
  37. Y. Zhang, D. Xiao, W. Wen, and M. Li, “Cryptanalyzing a novel image cipher based on mixed transformed logistic maps,” Multimedia Tools and Applications, vol. 73, no. 3, pp. 1885–1896, 2014. View at: Publisher Site | Google Scholar
  38. C. Li, L. Y. Zhang, R. Ou, K.-W. Wong, and S. Shu, “Breaking a novel colour image encryption algorithm based on chaos,” Nonlinear Dynamics, vol. 70, no. 4, pp. 2383–2388, 2012. View at: Publisher Site | Google Scholar
  39. Y. Zhang, D. Xiao, W. Wen, and H. Nan, “Cryptanalysis of image scrambling based on chaotic sequences and Vigenère cipher,” Nonlinear Dynamics, vol. 78, no. 1, pp. 235–240, 2014. View at: Publisher Site | Google Scholar
  40. Y. Zhang, D. Xiao, W. Wen, and M. Li, “Breaking an image encryption algorithm based on hyper-chaotic system with only one round diffusion process,” Nonlinear Dynamics, vol. 76, no. 3, pp. 1645–1650, 2014. View at: Publisher Site | Google Scholar
  41. L. Y. Zhang, C. Li, K.-W. Wong, S. Shu, and G. Chen, “Cryptanalyzing a chaos-based image encryption algorithm using alternate structure,” The Journal of Systems and Software, vol. 85, no. 9, pp. 2077–2085, 2012. View at: Publisher Site | Google Scholar

Copyright © 2018 Zeyu Liu et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

More related articles

 PDF Download Citation Citation
 Download other formatsMore
 Order printed copiesOrder

Related articles

We are committed to sharing findings related to COVID-19 as quickly as possible. We will be providing unlimited waivers of publication charges for accepted research articles as well as case reports and case series related to COVID-19. Review articles are excluded from this waiver policy. Sign up here as a reviewer to help fast-track new submissions.