Skip to content
2000
Volume 18, Issue 4
  • ISSN: 2352-0965
  • E-ISSN: 2352-0973

Abstract

Background

Current work is associated with the deployment of synchronized chaotic Secure Hash Algorithm (SHA256) random number generators along with their application in image encryption.

Methods

This study aimed to design a perfect communication system to encrypt and decrypt the images image processing. We introduced a new sliding mode scheme for master-slave four-dimensional (4D) Lorenz-Stenflo systems to deal with the synchronization problem. Then, a new synchronized dynamic secure hash algorithm (SHA-256) was implemented to generate the dynamic random numbers.

Results

An image encryption and decryption mechanism was implemented by using synchronized chaotic master-slave systems corresponding to the generated hash values. Here, the master systems were used for encryption, and the slave systems were responsible for the decryption mechanism. The complete design of this paper was implemented in a Python environment.

Conclusion

The demonstration of simulation results includes the state responses, strange attractors, and synchronization error responses of master-slave chaotic systems with appropriate switching functions and control input.

Loading

Article metrics loading...

/content/journals/eeng/10.2174/0123520965269595231108065832
2025-05-01
2025-09-04
Loading full text...

Full text loading...

References

  1. The-LuL. Pei-YenW. Jun–JuhY. Design of synchronized large-scale random number generators and its application to secure communication.Appl. Sci.20199185
    [Google Scholar]
  2. LiY. ZhaoY. YaoZ. Chaotic Control and Generalized Synchronization for a Hyperchaotic Lorenz-Stenflo SystemHindawi Publishing Corporation2013201310.1155/2013/515106
    [Google Scholar]
  3. The-LuL. Box-Scan: An efficient and effective algorithm for box dimension measurement in conveyor systems using a single RGB-D camera.Proceedings of the 7th IIAE International Conference on Industrial Application Engin201910.12792/iciae2019.016
    [Google Scholar]
  4. LiuB. LiJ.P. ZhengW. Synchronization and adaptive anti‐synchronization control for L orenz systems under channel noise with applications.Asian J. Control201315391992910.1002/asjc.581
    [Google Scholar]
  5. BoccalettiS. KurthsJ. OsipovG. ValladaresD.L. ZhouC.S. The synchronization of chaotic systems.Phys. Rep.20023661-2110110.1016/S0370‑1573(02)00137‑012443117
    [Google Scholar]
  6. ParkJ.H. JiD.H. WonS.C. LeeS.M. synchronization of time-delayed chaotic systems.Appl. Math. Comput.2008204117017710.1016/j.amc.2008.06.012
    [Google Scholar]
  7. LeeS.M. JiD.H. ParkJ.H. WonS.C. synchronization of chaotic systems via dynamic feedback approach.Phys. Lett. A2008372294905491210.1016/j.physleta.2008.05.047
    [Google Scholar]
  8. KuoC.L. Design of a fuzzy sliding-mode synchronization controller for two different chaos systems.Comput. Math. Appl.20116182090209510.1016/j.camwa.2010.08.080
    [Google Scholar]
  9. KuoC.L. YanJ.J. Fuzzy sliding mode control for a class of chaos synchronization with uncertainties.Int. J. Nonlinear Sci. Numer. Simul.20067333338
    [Google Scholar]
  10. LiC. LuoG. QinK. LiC. An image encryption scheme based on chaotic tent map.Nonlinear Dyn.201787112713310.1007/s11071‑016‑3030‑8
    [Google Scholar]
  11. ShahnaK. U. A novel image encryption scheme using both pixel level and bit level permutation with chaotic map.Appl. Soft Comput.20209010616210.1016/j.asoc.2020.106162
    [Google Scholar]
  12. ZhuS. ZhuC. WangW. A new image encryption algorithm based on chaos and secure hash SHA-256.Entropy201820971610.3390/e2009071633265805
    [Google Scholar]
  13. RehmanA. LiaoX. AshrafR. UllahS. WangH. A color image encryption technique using exclusive-OR with DNA complementary rules based on chaos theory and SHA-2.Optik201815934836710.1016/j.ijleo.2018.01.064
    [Google Scholar]
  14. ZhouW. WangX. WangM. LiD. A new combination chaotic system and its application in a new Bit-level image encryption scheme.Opt. Lasers Eng.202214910678210.1016/j.optlaseng.2021.106782
    [Google Scholar]
  15. GuesmiR. FarahM.A.B. KachouriA. SametM. A novel chaos-based image encryption using DNA sequence operation and Secure Hash Algorithm SHA-2.Nonlinear Dyn.20168331123113610.1007/s11071‑015‑2392‑7
    [Google Scholar]
  16. YeG. HuangX. A secure image encryption algorithm based on chaotic maps and SHA‐3.Secur. Commun. Netw.20169132015202310.1002/sec.1458
    [Google Scholar]
  17. AlmazroiA.A. AldhahriE.A. Al-ShareedaM.A. ManickamS. ECA-VFog: An efficient certificateless authentication scheme for 5G-assisted vehicular fog computing.PLoS One2023186e028729110.1371/journal.pone.028729137352258
    [Google Scholar]
  18. MohammedB.A. Al-ShareedaM.A. ManickamS. Al-MekhlafiZ.G. AlaybaA.M. SallamA.A. ANAA-Fog: A novel anonymous authentication scheme for 5g-enabled vehicular fog computing.Mathematics2023116144610.3390/math11061446
    [Google Scholar]
  19. Al-MekhlafiZ.G. Al-ShareedaM.A. ManickamS. MohammedB.A. AlreshidiA. AlazmiM. AlshudukhiJ.S. AlsaffarM. AlsewariA. Chebyshev polynomial-based fog computing scheme supporting pseudonym revocation for 5G-enabled vehicular networks.Electronics202312487210.3390/electronics12040872
    [Google Scholar]
  20. Al-MekhlafiZ.G. Al-ShareedaM.A. ManickamS. MohammedB.A. AlreshidiA. AlazmiM. AlshudukhiJ.S. AlsaffarM. RassemT.H. Efficient authentication scheme for 5G-enabled vehicular networks using fog computing.Sensors2023237354310.3390/s2307354337050601
    [Google Scholar]
  21. MohammedB.A. Al-ShareedaM.A. ManickamS. Al-MekhlafiZ.G. AlreshidiA. AlazmiM. AlshudukhiJ.S. AlsaffarM. FC-PA: Fog computing-based pseudonym authentication scheme in 5G-enabled vehicular networks.IEEE Access202311185711858110.1109/ACCESS.2023.3247222
    [Google Scholar]
  22. ZhuC. SunK. Cryptanalyzing and improving a novel color image encryption algorithm using rt-enhanced chaotic tent maps.IEEE Access20186187591877010.1109/ACCESS.2018.2817600
    [Google Scholar]
  23. ZhouQ. LiaoX. WongK.W. YueH.U. XiaoD. True random number generator based on mouse movement and chaotic hash function.Inf. Sci.200917934423450.1010.1016/j.ins.2009.06.005
    [Google Scholar]
  24. LinJ.S. HuangC.F. LiaoT.L. YanJ.J. Design and implementation of digital secure communication based on synchronized chaotic systems.Digit. Signal Process.201020229237.1110.1016/j.dsp.2009.04.006
    [Google Scholar]
  25. HoM-C. HungY-C. ChouC-H. Phase and anti-phase synchronization of two chaotic systems by using active control.Phys. Lett. A20022961434810.1016/S0375‑9601(02)00074‑9
    [Google Scholar]
  26. SchimmackM. MercorelliP. Anatomy of Chua's system - nonlinear dynamic electronics for chaos in the lab.IFAC-Pap.2022551730230710.1016/j.ifacol.2022.09.296
    [Google Scholar]
/content/journals/eeng/10.2174/0123520965269595231108065832
Loading
/content/journals/eeng/10.2174/0123520965269595231108065832
Loading

Data & Media loading...

This is a required field
Please enter a valid email address
Approval was a Success
Invalid data
An Error Occurred
Approval was partially successful, following selected items could not be processed due to error
Please enter a valid_number test