Control of multistability with selection of chaotic attractor: application to image encryption
Autor: | Gervais Dolvis Leutcho, Nestor Tsafack, Thophile Fonzin Fozin, Zeric Tabekoueng Njitacke, Michael Ekonde Sone, Christian Tchito Tchapga |
---|---|
Rok vydání: | 2021 |
Předmět: |
Equilibrium point
business.industry Computer science General Physics and Astronomy Encryption Dynamical system Topology 01 natural sciences 010305 fluids & plasmas Nonlinear Sciences::Chaotic Dynamics Piecewise linear function Nonlinear system Control theory 0103 physical sciences Attractor General Materials Science Physical and Theoretical Chemistry business 010301 acoustics Multistability Computer Science::Cryptography and Security |
Zdroj: | The European Physical Journal Special Topics. 230:1839-1854 |
ISSN: | 1951-6401 1951-6355 |
DOI: | 10.1140/epjs/s11734-021-00137-6 |
Popis: | Dynamic systems exhibiting chaos with periodic windows and multistability are not recommended for cryptography due to the lack of security in these regimes. In this work, we use a linear augmentation control scheme to control a periodic attractor in the windows of multistability to a final chaotic attractor which survives to the variation of initial seed useful for image encryption. The empirical Chua’s system with piecewise linear nonlinearity is used as a sample dynamical system but the idea can be applied using any other dynamical system. First, this system is analyzed to reveal multistability dynamics. Second, the technique of linear augmentation combined with the nonlinear system invariant sets like equilibrium points is used to choose a desired survive attractor among the coexisting ones. It is found that annihilation of multistability in the Chua’s system when varying the coupling strength is obtained through several crises among which interior crisis and border collision. Finally, a survived chaotic attractor is jointly used with SHA-512 for image encryption algorithm using a simple diffusion-confusion structure. Security analysis shows that the encryption process based on control theory can resist various forms of attack. |
Databáze: | OpenAIRE |
Externí odkaz: |