1. A new chaotic system with hidden attractor and its engineering applications: analog circuit realization and image encryption
- Author
-
KaçarSezgin, AkgülAkif, JafariSajad, PanahiShirin, ÇavuşoğluÜnal, Sakarya Üniversitesi/Bilgisayar Ve Bilişim Bilimleri Fakültesi/Bilgisayar Mühendisliği Bölümü, Çavuşoğlu, Ünal, and Akgül, Akif
- Subjects
Chaotic flow ,business.industry ,Computer science ,020208 electrical & electronic engineering ,Chaotic ,020206 networking & telecommunications ,02 engineering and technology ,Encryption ,Topology ,Surfaces, Coatings and Films ,Image (mathematics) ,Nonlinear Sciences::Chaotic Dynamics ,Engineering ,Hardware and Architecture ,Simple (abstract algebra) ,Signal Processing ,Attractor ,0202 electrical engineering, electronic engineering, information engineering ,business ,Realization (systems) ,Computer Science::Databases ,Bifurcation ,Computer Science::Cryptography and Security - Abstract
In this article a simple chaotic flow with hidden attractor is proposed. Various dynamics of this new system such as periodic and chaotic oscillations can be achieved by setting bifurcation parameters in a proper value. Nowadays chaos based engineering applications like encryption and hiding data face some significant problems. Chaotic systems with hidden attractors, which our system belongs to them, may unfold some primary steps to solve these problems. As the first step, chaotic behavior of our proposed system has been realised in physical existence by using the Orcard-PSpise software. We have found a proper qualitative likeness between experimental and simulation result. Then, chaos-based random number generator design is carried out using the proposed chaotic system. The numbers obtained from the random number generator are applied to the NIST 800-22 tests, and all of the random numbers are passed through the all tests. A chaos-based encryption algorithm with a random number generator is developed and image encryption application is implemented. Encryption results are compared with the AES algorithm, and performance and security evaluation of the developed encryption algorithm is performed.
- Published
- 2019