Table of Contents Author Guidelines Submit a Manuscript
Mathematical Problems in Engineering
Volume 2015, Article ID 501054, 10 pages
http://dx.doi.org/10.1155/2015/501054
Research Article

Color Image Encryption Algorithm Based on TD-ERCS System and Wavelet Neural Network

School of Mathematics and Statistics, Chuxiong Normal University, Chuxiong, Yunnan 675000, China

Received 9 August 2014; Revised 14 November 2014; Accepted 26 November 2014

Academic Editor: Vishal Bhatnaga

Copyright © 2015 Kun Zhang and Jian-bo Fang. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Linked References

  1. F. Chiaraluce, L. Ciccarelli, E. Gambi, P. Pierleoni, and M. Reginelli, “A new chaotic algorithm for video encryption,” IEEE Transactions on Consumer Electronics, vol. 48, no. 4, pp. 838–844, 2002. View at Publisher · View at Google Scholar · View at Scopus
  2. Y. Huang, R. Xu, and W. Lin, “An algorithm for JPEG compressing with chaotic encrypting,” in Proceedings of the International Conference on Computer Graphics, Imaging and Visualisation (CGIV '06), pp. 137–140, IEEE, July 2006. View at Publisher · View at Google Scholar · View at Scopus
  3. H. Bai-Lin, Starting with Parabolas: An Introduction to Chaotic Dynamics, Shanghai Scientific and Technological Education Publishing House, Shanghai, China, 1993, (Chinese).
  4. L. Kocarev, M. Sterjev, A. Fekete, and G. Vattay, “Public-key encryption with chaos,” Chaos, vol. 14, no. 4, pp. 1078–1082, 2004. View at Publisher · View at Google Scholar · View at MathSciNet · View at Scopus
  5. R. Matthews, “On the derivation of a “chaotic” encryption algorithm,” Cryptologia, vol. 13, no. 1, pp. 29–42, 1989. View at Publisher · View at Google Scholar · View at MathSciNet
  6. F. Dachselt and W. Schwarz, “Chaos and cryptography,” IEEE Transactions on Circuits and Systems. I. Fundamental Theory and Applications, vol. 48, no. 12, pp. 1498–1509, 2001. View at Publisher · View at Google Scholar · View at MathSciNet · View at Scopus
  7. G. Alvarez and S. Li, “Breaking an encryption scheme based on chaotic baker map,” Physics Letters A, vol. 352, no. 1-2, pp. 78–82, 2006. View at Publisher · View at Google Scholar · View at Scopus
  8. S. Ke-Hui, T. Guo-Qiang, and S. Li-Yua, “The complexity analysis of TD-ERCS discrete chaotic pseudo-random sequence,” Acta Physica Sinica, vol. 57, pp. 3359–3366, 2008. View at Google Scholar
  9. L.-Y. Sheng, G.-Q. Li, and Z.-W. Li, “One-way Hash function construction based on tangent-delay ellipse reflecting cavity-map system,” Acta Physica Sinica, vol. 55, no. 11, pp. 5700–5706, 2006. View at Google Scholar · View at MathSciNet
  10. N. F. Güler, E. D. Übeyli, and I. Güler, “Recurrent neural networks employing Lyapunov exponents for EEG signals classification,” Expert Systems with Applications, vol. 29, no. 3, pp. 506–514, 2005. View at Publisher · View at Google Scholar · View at Scopus
  11. L. Chen and K. Aihara, “Chaotic simulated annealing by a neural network model with transient chaos,” Neural Networks, vol. 8, no. 6, pp. 915–930, 1995. View at Publisher · View at Google Scholar · View at Scopus
  12. L. Chen and K. Aihara, “Strange attractors in chaotic neural networks,” IEEE Transactions on Circuits and Systems I: Fundamental Theory and Applications, vol. 47, no. 10, pp. 1455–1468, 2000. View at Publisher · View at Google Scholar · View at MathSciNet · View at Scopus
  13. S. Li-Yuan, S. Ke-Hui, and L. Chuan-Bing, “Study of a discrete chaotic system based on tangent-delay for elliptic reflecting cavity and its properties,” Acta Physica Sinica, vol. 53, no. 9, pp. 2871–2876, 2004. View at Google Scholar
  14. L.-Y. Sheng, L.-L. Cao, K.-H. Sun, and J. Wen, “Pseudo-random number generator based on TD-ERCS chaos and its statistic characteristics analysis,” Acta Physica Sinica, vol. 54, no. 9, pp. 4031–4037, 2005. View at Google Scholar · View at Scopus
  15. R. Q. Quiroga and H. Garcia, “Single-trial event-related potentials with wavelet denoising,” Clinical Neurophysiology, vol. 114, no. 2, pp. 376–390, 2003. View at Publisher · View at Google Scholar · View at Scopus
  16. Y. C. Pati and P. S. Krishnaprasad, “Analysis and synthesis of feedforward neural networks using discrete affine wavelet transformations,” IEEE Transactions on Neural Networks, vol. 4, no. 1, pp. 73–85, 1993. View at Publisher · View at Google Scholar · View at Scopus
  17. A. Subasi, M. Yilmaz, and H. R. Ozcalik, “Classification of EMG signals using wavelet neural network,” Journal of Neuroscience Methods, vol. 156, no. 1-2, pp. 360–367, 2006. View at Publisher · View at Google Scholar · View at Scopus
  18. N. Chauhan, V. Ravi, and D. Karthik Chandra, “Differential evolution trained wavelet neural networks: application to bankruptcy prediction in banks,” Expert Systems with Applications, vol. 36, no. 4, pp. 7659–7665, 2009. View at Publisher · View at Google Scholar · View at Scopus
  19. A. Grossmann and J. Morlet, “Decomposition of Hardy functions into square integrable wavelets of constant shape,” SIAM Journal on Mathematical Analysis, vol. 15, no. 4, pp. 723–736, 1984. View at Publisher · View at Google Scholar · View at MathSciNet
  20. Q. Zhao, Z. Sun, F. Sun, and J. Zhu, “Appearance-based robot visual servo via a wavelet neural network,” International Journal of Control, Automation and Systems, vol. 6, no. 4, pp. 607–612, 2008. View at Google Scholar · View at Scopus
  21. A. Mitra, Y. V. S. Rao, and S. R. M. Prasanna, “A new image encryption approach using combinational permutation techniques,” World Academy of Science, Engineering and Technology, vol. 2, pp. 831–835, 2008. View at Google Scholar
  22. H. Gao, Y. Zhang, S. Liang, and D. Li, “A new chaotic algorithm for image encryption,” Chaos, Solitons and Fractals, vol. 29, no. 2, pp. 393–399, 2006. View at Publisher · View at Google Scholar · View at Scopus
  23. K. Zhang and X.-A. Fu, “Color image encryption algorithm based on tangent-delay ellipse reflecting cavity map system,” in Proceedings of the International Conference on Image Analysis and Signal Processing, pp. 25–27, 2012.
  24. C. Dellago and H. A. Posch, “Lyapunov exponents of systems with elastic hard collisions,” Physical Review E, vol. 52, no. 3, pp. 2402–2406, 1995. View at Publisher · View at Google Scholar · View at MathSciNet · View at Scopus
  25. A. Wolf, J. B. Swift, H. L. Swinney, and J. A. Vastano, “Determining Lyapunov exponents from a time series,” Physica D: Nonlinear Phenomena, vol. 16, no. 3, pp. 285–317, 1985. View at Publisher · View at Google Scholar · View at MathSciNet
  26. T. Gao and Z. Chen, “A new image encryption algorithm based on hyper-chaos,” Physics Letters A, vol. 372, no. 4, pp. 394–400, 2008. View at Publisher · View at Google Scholar · View at Scopus
  27. Y. Mao, G. Chen, and S. Lian, “A novel fast image encryption scheme based on 3D chaotic Baker maps,” International Journal of Bifurcation and Chaos in Applied Sciences and Engineering, vol. 14, no. 10, pp. 3613–3624, 2004. View at Publisher · View at Google Scholar · View at MathSciNet · View at Scopus
  28. A. N. Pisarchik and M. Zanin, “Image encryption with chaotically coupled chaotic maps,” Physica D: Nonlinear Phenomena, vol. 237, no. 20, pp. 2638–2648, 2008. View at Publisher · View at Google Scholar · View at MathSciNet · View at Scopus
  29. G. Chen, Y. Mao, and C. K. Chui, “A symmetric image encryption scheme based on 3D chaotic cat maps,” Chaos, Solitons & Fractals, vol. 21, no. 3, pp. 749–761, 2004. View at Publisher · View at Google Scholar · View at Scopus
  30. S. Behnia, A. Akhshani, S. Ahadpour, H. Mahmodi, and A. Akhavan, “A fast chaotic encryption scheme based on piecewise nonlinear chaotic maps,” Physics Letters ِA, vol. 366, no. 4-5, pp. 391–396, 2007. View at Publisher · View at Google Scholar · View at Scopus
  31. S. Behnia, A. Akhshani, H. Mahmodi, and A. Akhavan, “A novel algorithm for image encryption based on mixture of chaotic maps,” Chaos, Solitons & Fractals, vol. 35, no. 2, pp. 408–419, 2008. View at Publisher · View at Google Scholar · View at MathSciNet · View at Scopus
  32. Y. Wu, J. P. Noonan, and S. Agaian, “NPCR and UACI randomness tests for image encryption,” Cyber Journals, pp. 31–38, 2011. View at Google Scholar
  33. G. Chen, Y. Mao, and C. K. Chui, “A symmetric image encryption scheme based on 3D chaotic cat maps,” Chaos, Solitons & Fractals, vol. 21, no. 3, pp. 749–761, 2004. View at Publisher · View at Google Scholar · View at MathSciNet · View at Scopus