Nothing Special   »   [go: up one dir, main page]

Next Article in Journal
Design of a SIMO Deep Learning-Based Chaos Shift Keying (DLCSK) Communication System
Next Article in Special Issue
An Industrial IoT-Based Blockchain-Enabled Secure Searchable Encryption Approach for Healthcare Systems Using Neural Network
Previous Article in Journal
Ultrasound Echogenicity as an Indicator of Muscle Fatigue during Functional Electrical Stimulation
Previous Article in Special Issue
SE-CPPA: A Secure and Efficient Conditional Privacy-Preserving Authentication Scheme in Vehicular Ad-Hoc Networks
You seem to have javascript disabled. Please note that many of the page functionalities won't work as expected without javascript enabled.
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Multimedia Cryptosystem for IoT Applications Based on a Novel Chaotic System around a Predefined Manifold

1
Shenzhen Institute of Information Technology, Shenzhen 518172, China
2
Department of Mathematics and Computer Science, Faculty of Science, Menoufia University, Shebin El-Koom 32511, Egypt
3
Department of Biomedical Engineering, Amirkabir University of Technology, 424 Hafez Ave., Tehran 15875-4413, Iran
4
Health Technology Research Institute, Amirkabir University of Technology, No. 350, Hafez Ave., Valiasr Square, Tehran 159163-4311, Iran
5
Center for Nonlinear Systems, Chennai Institute of Technology, Chennai 600069, India
6
Department of Computer Science, Faculty of Computers and Information, Luxor University, Luxor 85957, Egypt
*
Author to whom correspondence should be addressed.
Sensors 2022, 22(1), 334; https://doi.org/10.3390/s22010334
Submission received: 23 November 2021 / Revised: 21 December 2021 / Accepted: 28 December 2021 / Published: 3 January 2022
(This article belongs to the Special Issue Recent Trends in Wireless Sensor and Actuator Networks)
Figure 1
<p>Proposed framework for the secure transmission of multimedia data in IoT environment.</p> ">
Figure 2
<p>The chaotic dynamics of Equation (<a href="#FD1-sensors-22-00334" class="html-disp-formula">1</a>) with <math display="inline"><semantics> <mrow> <mi>a</mi> <mo>=</mo> <mn>0</mn> </mrow> </semantics></math> and <math display="inline"><semantics> <mrow> <mfenced separators="" open="(" close=")"> <msub> <mi>x</mi> <mn>0</mn> </msub> <mo>,</mo> <msub> <mi>y</mi> <mn>0</mn> </msub> <mo>,</mo> <msub> <mi>z</mi> <mn>0</mn> </msub> </mfenced> <mo>=</mo> <mfenced separators="" open="(" close=")"> <mn>0</mn> <mo>,</mo> <mn>0</mn> <mo>,</mo> <mn>0</mn> </mfenced> </mrow> </semantics></math> in (<b>a</b>) <math display="inline"><semantics> <mrow> <mi>X</mi> <mo>−</mo> <mi>Y</mi> </mrow> </semantics></math>; (<b>b</b>) <math display="inline"><semantics> <mrow> <mi>X</mi> <mo>−</mo> <mi>Z</mi> </mrow> </semantics></math>; (<b>c</b>) <math display="inline"><semantics> <mrow> <mi>Y</mi> <mo>−</mo> <mi>Z</mi> </mrow> </semantics></math>; (<b>d</b>) <math display="inline"><semantics> <mrow> <mi>X</mi> <mo>−</mo> <mi>Y</mi> <mo>−</mo> <mi>Z</mi> </mrow> </semantics></math>.</p> ">
Figure 3
<p>Time series of Equation (<a href="#FD1-sensors-22-00334" class="html-disp-formula">1</a>) with <math display="inline"><semantics> <mrow> <mi>a</mi> <mo>=</mo> <mn>0</mn> </mrow> </semantics></math> and <math display="inline"><semantics> <mrow> <mfenced separators="" open="(" close=")"> <msub> <mi>x</mi> <mn>0</mn> </msub> <mo>,</mo> <msub> <mi>y</mi> <mn>0</mn> </msub> <mo>,</mo> <msub> <mi>z</mi> <mn>0</mn> </msub> </mfenced> <mo>=</mo> <mfenced separators="" open="(" close=")"> <mn>0</mn> <mo>,</mo> <mn>0</mn> <mo>,</mo> <mn>0</mn> </mfenced> </mrow> </semantics></math>.</p> ">
Figure 4
<p>3D chaotic dynamics of Equation (<a href="#FD1-sensors-22-00334" class="html-disp-formula">1</a>) and the three pre-located manifolds (<b>a</b>–<b>c</b>).</p> ">
Figure 5
<p>Bifurcation diagram of Equation (<a href="#FD1-sensors-22-00334" class="html-disp-formula">1</a>) by changing parameter <span class="html-italic">a</span> and backward continuation method; maximum values of (<b>a</b>) <span class="html-italic">x</span> variable; (<b>b</b>) <span class="html-italic">y</span> variable; (<b>c</b>) <span class="html-italic">z</span> variable.</p> ">
Figure 6
<p>The diagram of LEs by changing parameter <span class="html-italic">a</span>.</p> ">
Figure 7
<p>Bifurcation diagram of the oscillator by changing parameter <span class="html-italic">a</span>; bifurcation with backward continuation method is shown in purple and with constant initial conditions is shown in blue.</p> ">
Figure 8
<p>Basin of attraction of the oscillator; green, dark blue, and cyan regions show the basin of attraction for unbounded, periodic, and chaotic solutions, respectively.</p> ">
Figure 9
<p>Description of the proposed cryptosystem for multimedia images.</p> ">
Figure 10
<p>Experimented image dataset of dimensional 768 × 512, in which the first row denotes the plain images, while the second row describes the corresponding ciphered images.</p> ">
Figure 11
<p>Plots of correlation distribution (in each direction) for Macaws image (Red channel), in which the first row denotes the plain Macaws image, while the bottom row signifies the ciphered Macaws image.</p> ">
Figure 12
<p>Plots of correlation distribution (in each direction) for Macaws image (Green channel), in which the first row denotes the plain Macaws image, while the bottom row signifies the ciphered Macaws image.</p> ">
Figure 13
<p>Plots of correlation distribution (in each direction) for Macaws image (Blue channel), in which the first row denotes the plain Macaws image, while the bottom row signifies the ciphered Macaws image.</p> ">
Figure 14
<p>Outcomes of decrypting Cipher–Macaws image using slight changes in the confidential key. (<b>a</b>) The confidential key; (<b>b</b>) The confidential key except <math display="inline"><semantics> <msub> <mi>x</mi> <mrow> <mi>i</mi> <mi>n</mi> <mi>i</mi> <mi>t</mi> <mi>i</mi> <mi>a</mi> <mi>l</mi> </mrow> </msub> </semantics></math> = 0.627500000000001; (<b>c</b>) The confidential key except <math display="inline"><semantics> <msub> <mi>y</mi> <mrow> <mi>i</mi> <mi>n</mi> <mi>i</mi> <mi>t</mi> <mi>i</mi> <mi>a</mi> <mi>l</mi> </mrow> </msub> </semantics></math> = 0.3854000000000001; (<b>d</b>) The confidential key except <math display="inline"><semantics> <msub> <mi>z</mi> <mrow> <mi>i</mi> <mi>n</mi> <mi>i</mi> <mi>t</mi> <mi>i</mi> <mi>a</mi> <mi>l</mi> </mrow> </msub> </semantics></math> = 0.7261000000000001; (<b>e</b>) The confidential key except <math display="inline"><semantics> <msub> <mi>x</mi> <mrow> <mi>i</mi> <mi>n</mi> <mi>i</mi> <mi>t</mi> <mi>i</mi> <mi>a</mi> <mi>l</mi> </mrow> </msub> </semantics></math> = 0.627499999999999; (<b>f</b>) The confidential key except <math display="inline"><semantics> <msub> <mi>y</mi> <mrow> <mi>i</mi> <mi>n</mi> <mi>i</mi> <mi>t</mi> <mi>i</mi> <mi>a</mi> <mi>l</mi> </mrow> </msub> </semantics></math> = 0.38539999999999.</p> ">
Figure 15
<p>Plots of histograms for experimented images, in which the left three columns except the first one represent the histograms of plain images, while the right three columns represent the histograms of cipher images.</p> ">
Figure 16
<p>Ciphers of all-black and all-white images, and their analog histograms.</p> ">
Figure 17
<p>Outcomes of noise attack, in which the top row refers to the defective Cipher–Macaws image by adding Salt and Pepper noise with variable densities (D) while the bottom row represents the corresponding decipher image.</p> ">
Figure 18
<p>Outcomes of data loss attack, in which the top row refers to the defective Cipher–Macaws image by performing a cutting block for data with various sizes, while the bottom row represents the corresponding decipher image.</p> ">
Versions Notes

Abstract

:
Multimedia data play an important role in our daily lives. The evolution of internet technologies means that multimedia data can easily participate amongst various users for specific purposes, in which multimedia data confidentiality and integrity have serious security issues. Chaos models play an important role in designing robust multimedia data cryptosystems. In this paper, a novel chaotic oscillator is presented. The oscillator has a particular property in which the chaotic dynamics are around pre-located manifolds. Various dynamics of the oscillator are studied. After analyzing the complex dynamics of the oscillator, it is applied to designing a new image cryptosystem, in which the results of the presented cryptosystem are tested from various viewpoints such as randomness, time encryption, correlation, plain image sensitivity, key-space, key sensitivity, histogram, entropy, resistance to classical types of attacks, and data loss analyses. The goal of the paper is proposing an applicable encryption method based on a novel chaotic oscillator with an attractor around a pre-located manifold. All the investigations confirm the reliability of using the presented cryptosystem for various IoT applications from image capture to use it.

1. Introduction

Developments in the Internet of Things (IoT), cloud computing, and fifth-generation network technologies make multimedia data easy to share with various users for specific purposes. In this context, the sharing of multimedia data suffers from serious security issues [1,2,3,4]. Multimedia data can be secured via executing one of the protection techniques: information hiding and data encryption mechanisms. Encryption techniques aim to transform multimedia data from an understood pattern to an incomprehensible form. Recently, chaos systems have played an important role in designing robust multimedia data encryption mechanisms and secure communication.
Chaotic oscillations are very complex dynamics, and there are many ambiguities about them. Many studies try to clarify the creation of chaotic dynamics [5]. Formerly, there was an idea that chaotic dynamics are related to saddle equilibria [6]. Then, some chaotic systems were proposed that do not have a saddle point [7]. Recently, many studies have been done on the investigation of chaotic oscillators with different properties [8]. Some examples of chaotic systems with various types of equilibria are given [5]. A chaotic oscillator with a line of equilibria was studied in [9]. In [10], hyperchaotic dynamics in a system without equilibria were discussed. The application of a chaotic oscillator with no equilibria was studied in [11]. Multistability is an exciting property of a dynamic system. The multistability of a new version of the Chua system was discussed in [12]. Furthermore, multistability as a feature of a hyperjerk was studied in [13]. Extreme multistability is a feature in which the system has a complete bifurcation diagram by changing initial conditions, not parameters [14]. Memristive neural models were studied in [15]. Chaotic flows have various engineering applications such as chaotic circuit [16].
Proposing chaotic systems with dynamics around a predefined manifold has been an exciting topic. In this paper, a novel chaotic oscillator is presented. The oscillator has a particular property in which the chaotic dynamics are around pre-located manifolds. Various dynamics of the oscillator are studied. The chaotic attractor and the predefined manifolds are discussed, and their relation with equilibrium points is investigated. Studying the bifurcation diagrams of the proposed system by different initiation methods shows the multistability of the system in some intervals of the bifurcation parameter. Lyapunov exponents of the oscillator are studied to show the interval of chaotic dynamics. In the multistability region, the exciting basin of attraction of various attractors is studied.
Digital images are widely used for representing multimedia data in numerous applications. The complexity of chaotic time series makes them a proper choice for image encryption and secure communication [17,18,19]. Nonlinear methods are useful in image encryption [20,21,22]. The application of a chaotic oscillator in fingerprint encryption was discussed in [23]. In [24], image encryption using a chaotic map was studied. Moreover, the encryption of medical images using a chaotic map was discussed in [25], and applying an exponential chaotic oscillator in secure communication was investigated in [26].
Based on the nonlinear features of the presented chaotic oscillator system, we present a novel image cryptosystem for IoT applications, in which the results of the presented cryptosystem are tested from various viewpoints. All the investigations show the reliability of the image cryptosystem for various IoT applications.
The presented contributions of this work can be outlined as follows:
  • Presenting a novel chaotic oscillator, in which the chaotic dynamics are around pre-located manifolds.
  • Designing a novel image cryptosystem for IoT applications, of which the design is based on the nonlinear features of the presented chaotic oscillator system.

2. Proposed Framework for IoT Environment

Multimedia data, such as images, audio, and video are growing rapidly as an essential avenue for the representing, sharing, and storage of data in our daily lives. The evolution of internet technologies makes multimedia data can easily stored in cloud storage and shared amongst various users for specific goals. In this context, the confidentiality and integrity of multimedia data suffer from serious security issues. Therefore, we proposed a new framework for IoT applications to store and share digital images, in which image data confidentiality and integrity are achieved. The proposed framework is presented in Figure 1.
The presented image cryptosystem can be utilized in different application fields, such as the medical sector, surveillance systems, personal data protection, etc. In the medical sector, the presented image cryptosystem can be utilized for the secure transmission of medical images from their origin to the intended stakeholders for analyzing, assessing, and treat patients. In surveillance systems, when the system detects any movement in the camera location, the video frames are captured and encrypted via the presented cryptosystem then sent the encrypted data to the intended stakeholders for analyzing and taking the appropriate decision. Moreover, the presented cryptosystem can be utilized for storing multimedia data to cloud storage then sharing/downloading it up to require.
To maintain the integrity of the transmitted data via our presented cryptosystem, we utilized a hashing algorithm like SHA-256. The hashing algorithm is employed to get the hash code for the appended secret key with the cipher multimedia (secret key + cipher data), for making SHA-256 a keyed hash algorithm, then the generated hash code is sent with the cipher data. Upon the intended user downloaded the encrypted data and receiving the hash code, the hash value is computed for the received cipher data with the secret key, and investigate if the generated hash value is the same as the received hash code or not. If the two hash values are the same, then there are no changes in the transmitted cipher data, and the integrity of transmitted data has been achieved.

3. Proposed Chaotic Oscillator System

In this paper, a chaotic oscillator with a unique feature is proposed as Equation (1).
x ˙ = z y ˙ = x 2 + y 2 1 z ˙ = 2 x y + a z + x y
The system presents a chaotic dynamic in a = 0 , and initial values x 0 , y 0 , z 0 = 0 , 0 , 0 . Its Lyapunov exponents are 0.1322 , 0 , 0.9518 . Three projections and the 3D chaotic solution of the oscillator are shown in Figure 2. Figure 3 presents signals of various variables for the chaotic dynamic. In order to have bounded solutions, the derivative of variables should be zeros. So, the system’s dynamics should be around the pre-located manifolds as z = 0 , x 2 + y 2 = 1 , and y = 2 x x 1 . The chaotic dynamic and these manifolds are plotted in Figure 4.

4. Dynamical Properties of the Oscillator

4.1. Equilibrium Points

To calculate the equilibrium points of the oscillator, all of its derivatives should be zeros simultaneously. So we can tell that the intersections of the three studied manifolds are the equilibria of the system. Equation (1) has two equilibrium points as E 1 = 0.3213 , 0.947 , 0 , E 2 = 0.6323 , 0.7747 , 0 . In parameter a = 0 , the eigenvalues of the oscillator for E 1 are 1.9582 , 0.0322 ± 1.7528 i , and for E q 2 are 1.9576 , 0.2041 ± 1.4081 i . So, the equilibrium points are saddle points. It means that the chaotic dynamics are self-excited.

4.2. Bifurcation Diagram and Lyapunov Exponents

To study different dynamics of the oscillator, the bifurcation diagram is presented in Figure 5. In these diagrams, the maximum values of the three variables are plotted by changing bifurcation parameter a. The diagram is plotted by the backward continuation method, and the first set of initial conditions are 0 , 0 , 0 . A period-doubling route to chaos can be seen in the bifurcation diagram. To confirm the existence of chaos, Lyapunov exponents (LEs) are computed with run time 20,000. Figure 6 presents the diagram of LEs by changing parameter a, corresponding to the bifurcation diagram. One positive LE shows chaotic behaviors.

4.3. Multistability Analysis

Multistability is one of the exciting features of dynamical systems. It means that two different sets of initial conditions result in two different attractors. The multistability of the oscillator is examined by plotting bifurcation diagrams using two different initiation methods, backward and constant initiation. Figure 7 shows the backward bifurcation in purple and bifurcation with constant initial conditions in blue. The results reveal the coexisting attractors in the interval a 0.0105 , 0.00975 , since the two diagrams with different initiation methods are not the same.

4.4. Basin of Attraction

After revealing the coexisting attractors, investigating the basin of attraction of each attractor is interesting. Figure 8 shows the basin of attraction of the oscillator in parameter a = 0.0099 . It can be seen in Figure 7 that two periodic and chaotic dynamics coexist in this parameter. In Figure 8, the green, dark blue, and cyan regions show the basin of attraction for unbounded, periodic, and chaotic solutions.The basin of attractions of different attractors are entangled with each other.

5. The Proposed Image Encryption Approach

The protection of data represented by images can be achieved via image data protection techniques like image encryption, image data hiding, or mixing between them [27,28]. Spring from the presented chaotic system’s benefits, we propose a new image encryption approach, which necessitates an adaptation for our chaotic map as presented in Equation (2).
x i + 1 = z i m o d 1 y i + 1 = x i 2 + y i 2 1 m o d 1 z i + 1 = 2 x i y i + a z i + x i y i m o d 1
The presented image cryptosystem employs the benefits of our chaotic system to generate three pseudo-random sequences. The first two sequences are used to permute the plain image. Then the last sequence is utilized to substitute the permuted image for constructing the cipher image. The multimedia image cryptosystem is described in Figure 9, and the encryption procedure is listed in the following steps.
(1)
Perform the hash function SHA256 on the plain image (PImg) to get the hash value (V).
(2)
Convert V into 32 integer numbers ( v 1 , v 2 , v 3 , ..., v 32 ) each of 8-bit, then obtain 3 decimal numbers from these integers as follows.
D 1 = v 1 v 2 v 11 256 D 2 = v 12 v 10 v 22 256 D 3 = v 23 v 18 v 32 256
(3)
Choose initial values for key parameters ( x i n i t i a l , y i n i t i a l , z i n i t i a l ) and update these keys using D 1 , D 2 , and D 3 .
x 0 = x initial + D 1 2 y 0 = y initial + D 2 2 z 0 = z initial + D 3 2
(4)
Iterate the chaotic system (2) for H × W × L times using the updated key parameters ( x 0 , y 0 , z 0 , a) for generating 3 sequences (X, Y, Z), in which H × W × L is the size of PImg.
(5)
Add the values of X to the values of Y as sequence W, then sort the values of W from the smallest to the largest as sequence S, and obtain the index S in W as PrVc.
(6)
Reshape the plain image (PImg) into a vector (PImgVc) and permute PImgVc using the produced vector PrVc as follows.
P e r I m g V c ( i ) = P I m g V c ( P r V c ( i ) )
f o r i = 1 , 2 , . . . , H × W × L
(7)
Construct the key sequence (K) by adapting the sequence Z into integers.
K = f i x ( Z × 10 12 ) mod 256
(8)
Perform Bitwise-Xor operation on the permuted vector PerImgVc and K to construct the cipher image CImg.
C I m g V c = P e r I m g V c K
C I m g = r e s h a p e ( C I m g V c , H , W , L )

6. Experimental Outcomes

The utilized dataset of images is obtained from the Kodak database [29]. It consists of four images named Macaws, Chalet, Window, and Houses, with size 768 × 512 (see Figure 10). The utilized initial values to iterate the 3D chaotic map are x i n i t i a l = 0.6275, y i n i t i a l = 0.3854, z i n i t i a l = 0.7261, a = 0.
The effectiveness of any image cryptosystem depends essentially on performance (how fast we can encrypt an image on a defined computer) and resistance to various attacks: such as brute force, linear and differential cryptanalysis, statistical cryptanalysis, etc.). These two essential properties are discussed in the following subsections to show the effectiveness of the presented image cryptosystem.

6.1. Time Efficiency

To demonstrate the effectiveness of the presented cryptosystem in terms of time encryption, Table 1 stated a superficial comparison of time encryption for the presented cryptosystem with other related encryption algorithms, as reported in [30,31,32]. From the stated information in Table 1, we can deduce that our cryptosystem is more superb than other ones in terms of time encryption.

6.2. Randomness Analysis

For testing the randomness of the created sequence constructed the cipher image, we perform NIST SP 800-22 tests composed of fifteen tests. These tests are applied on a 2,000,000-bit of the constructed Cipher–Macaws image and its utilized key-stream. The outcomes are provided in Table 2, which declares that all NIST SP 800-22 tests are passed successfully. Consequently, the presented 3D chaotic system can be reliable in designing various modern cryptographic applications.

6.3. Correlation Analysis

To study the perception of an image, we employ the correlation coefficient ( C C ) of adjacent pixels. Ordinary images possess C C near 1 in each direction. Cipher images (constructed using a robust-designed image cryptosystem) should be approximately 0. To calculate C C for the original and encrypted images, we picked 10,000 pairs of adjacent pixels at random in every direction.
C C = x = 1 A p x p ¯ c x c ¯ x = 1 A p x p ¯ 2 x = 1 N c x c ¯ 2
where A indicates the entire number of adjacent pixel pairs and c x , p x indicate the adjacent pixels. Table 3 presents the outcomes of CC for encrypted images and plain ones, in which the C C for cipher images is approximately 0. Additionally, Figure 11, Figure 12 and Figure 13 plot the distribution of correlation per direction in Macaws image and its encrypted one. From the outcomes provided in Table 3 and shown in Figure 11, Figure 12 and Figure 13, no valuable information was gained regarding the plain image by analyzing CC values.

6.4. Differential Analysis

Plain-image sensitivity refers to any tiny modifications on the plain image, resulting in a massive difference for the cipher image. To test plain-image sensitivity for our image cryptosystem, we employ NPCR (“Number of Pixel Change Rate”) and UNCI (“Unified Average Changing Intensity”), which are represented as follows,
N P C R = i ; j D f ( i , j ) A × 100 % , D f ( i , j ) = 0 i f C 1 ( i , j ) = C 2 ( i , j ) 1 i f C 1 ( i , j ) C 2 ( i , j )
U A C I = 1 A i , j C 1 ( i , j ) C 2 ( i , j ) 255 × 100 %
where A denotes the full number of image pixels and C 1 , C 2 denote the two ciphered images for a plain image differs in one bit. The outcomes of NPCR and UNCI are stated in Table 4. It demonstrates our image cryptosystem enjoys high sensitivity to slight modifications in the original image.

6.5. Key-Space Analysis

Multifarious secret keys that can be utilized in brute force attacks are known as key-space. By the benchmark stated in [33], the key-space ought to be larger than 2 100 to demonstrate sufficient security against brute-force attacks. The presented image cryptosystem uses initial key parameters ( x i n i t i a l , y i n i t i a l , z i n i t i a l , and a) to generate the chaotic sequences utilized in encryption and decryption procedures. By assuming the precision of computation for digital devices is 10 16 , then the key-space for the presented mechanism is ≃ 2 213 , which is immense sufficiently for any cryptographic algorithm.

6.6. Key Sensitivity Analysis

It is defined as the sensitivity of the decryption to the secret key. It is a necessary measure to guarantee the reliability of any cryptosystem. For evaluating the suggested image cryptosystem’s key sensitivity, the Cipher-Macaws image is deciphered many times using slight changes in the secret key as displayed in Figure 14.

6.7. Histogram Analysis

To evaluate the pixel values’ distribution in the encrypted images, the histogram test is employed. A proper image cryptosystem has to guarantee the identical distribution for varied cipher images. Figure 15 plots the histograms of the studied images. The histograms of the plain images are not similar, while the histograms of their related ciphered ones are uniform. Additionally, we applied chi-square ( χ 2 ) analysis to guarantee the histogram results.
χ 2 = j = 0 255 f j D 2 D
where D denotes the image dimension and f j represents the frequency of the pixel value j. By considering the significant level β = 0.05, then χ β 2 ( 255 ) = 293.3 is obtained. For an image, when the χ 2 value is less than χ β 2 ( 255 ) , then the histogram of this image is uniform. Table 5 provides the outcomes of χ 2 for the studied images, in which the χ 2 outcomes for all encrypted images are less than χ β 2 ( 255 ) . So, the proposed image cryptosystem can withstand attacks of histogram analysis.

6.8. Entropy Analysis

To evaluate the bit distribution for each level of the pixel values of the encrypted image, the global entropy is employed as follows:
E ( X ) = j = 0 255 r ( x j ) log 2 r ( x j )
where r ( x j ) is the probability of x j . The possible values of a grayscale image are 2 8 , so the optimal entropy is 8-bit. Subsequently, to assess the efficacy of the suggested cryptosystem, the entropy of the ciphered images should be near to 8. The global entropy neglects the assessment of real randomness for cipher images. Therefore, we employ local entropy to assess the actual randomness for cipher images which can be computed via the average global entropies for no overlapping blocks (the size of each block is 44 × 44). Table 6 shows the results of local and global entropies for the experimented images, in which all outcomes of information entropy for cipher images are approximately 8-bit. Consequently, the proposed cryptosystem is robust against entropy attacks.

6.9. Classical Types of Attack

In general, the cryptanalysis of a cryptosystem assumes that cryptanalysts fully understand the structure of the cryptosystem and know all things about the encryption and decryption algorithms except the secret key utilized in encryption and decryption procedures. There are four kinds of attacks: ciphertext-only, chosen-ciphertext, chosen-plaintext, and known-plaintext [30]. The chosen-plaintext attack is considered to be the most effective attack in which the cyberpunk has temporary access to the cryptosystem and can create the ciphertext associated with the selected plaintext. If an encryption algorithm is able to resist the chosen-plaintext attack, it has the capability to resist other kinds of attacks. In the proposed encryption algorithm, if any of the initial keys ( x i n i t i a l , y i n i t i a l , z i n i t i a l , and a) have a slight modification, the outcome will change vastly. Furthermore, our encryption approach applies SHA256 to the plain image for updating the initial parameters, so that our cryptosystem not only depends on the secret key but also on the plain image. The cryptanalyst attempts to acquire useful information about the secret key utilizing all-white and all-black images, as they can disable the task of permutation/substitution procedures. The affiliated cipher images for the all-white and all-black images and their related histograms are provided in Figure 16, in which no visual information can be acquired from these cipher images, while Table 7 supplies some statistical analyses for these images. As a result, our cryptosystem has the capability to resist linear cryptanalysis.

6.10. Occlusion Analysis

It is significant that most of the data transmission networks are noisy channels. Once data are transmitted over noisy networks, it is probably distorted by noise or data loss attacks. So, a well-designed cryptosystem should withstand data loss and noise attacks. For investigating the proposed image cryptosystem for facing data loss and noise attacks, we defect the Cipher–Macaws image via performing a cutting block for data with various sizes or applying Salt and Pepper noise with variable densities. Then we decipher the defective image. The outcomes of noise and data loss attacks are displayed in Figure 17 and Figure 18, respectively. The deciphered images have a well-visual quality with no lack of visual details inside the area of the cutting portion.

7. Conclusions

A novel chaotic flow was proposed in this paper in which its attractor was around some predefined manifolds. The bifurcation diagram of the system has exhibited a period-doubling route to chaos by modifying parameter a. Lyapunov exponents of the system were presented to determine the chaotic interval of the parameter. The multistability of the system was revealed by plotting bifurcation diagrams using different initiation methods. The basin of attraction of the attractors was studied. The proposed system was used in a multimedia image cryptosystem. The results were examined using different analyses such as randomness, correlation, plain image sensitivity, key sensitivity, histogram, entropy, and data damage analyses. The results of these tests confirm the reliability of using the presented cryptosystem for various IoT applications from image capture to use it.

Author Contributions

Conceptualization, A.A.A.E.-L.; methodology, F.N., B.A.-E.-A.; software, F.N., B.A.-E.-A.; formal analysis, A.A.A.E.-L., S.J., B.A.-E.-A.; investigation, A.A.A.E.-L.; resources, L.L., F.N.; data curation, S.J.; writing—original draft preparation, A.A.A.E.-L., B.A.-E.-A.; writing—review and editing, S.J., K.R.; supervision, K.R.; project administration, L.L.; funding acquisition, L.L. All authors have read and agreed to the published version of the manuscript.

Funding

The paper is supported by Shenzhen Institute of Information Technology, funding number: SZIIT2021KJ040.

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

The datasets generated and analysed during the current study are available from the corresponding author upon reasonable request.

Acknowledgments

Bassem Abd-El-Atty acknowledges support from Luxor University, Egypt. Ahmed A. Abd EL-Latif acknowledges support from Menoufia University, Egypt.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. El-Latif, A.A.A.; Abd-El-Atty, B.; Mazurczyk, W.; Fung, C.; Venegas-Andraca, S.E. Secure Data Encryption Based on Quantum Walks for 5G Internet of Things Scenario. IEEE Trans. Netw. Serv. Manag. 2020, 17, 118–131. [Google Scholar] [CrossRef]
  2. Bubukayr, M.A.S.; Almaiah, M.A. Cybersecurity concerns in smart-phones and applications: A survey. In Proceedings of the 2021 International Conference on Information Technology (ICIT), Amman, Jordan, 14–15 July 2021; pp. 725–731. [Google Scholar]
  3. Almaiah, M.A. Almaiah, M.A. A New Scheme for Detecting Malicious Attacks in Wireless Sensor Networks Based on Blockchain Technology. In Artificial Intelligence and Blockchain for Future Cybersecurity Applications; Springer: Cham, Switzerland, 2021; pp. 217–234. [Google Scholar]
  4. AlMedires, M.; AlMaiah, M. Cybersecurity in Industrial Control System (ICS). In Proceedings of the 2021 International Conference on Information Technology (ICIT), Amman, Jordan, 14–15 July 2021; pp. 640–647. [Google Scholar]
  5. Zhang, S.; Wang, X.; Zeng, Z. A simple no-equilibrium chaotic system with only one signum function for generating multidirectional variable hidden attractors and its hardware implementation. Chaos Interdiscip. J. Nonlinear Sci. 2020, 30, 053129. [Google Scholar] [CrossRef] [PubMed]
  6. Rössler, O.E. An equation for continuous chaos. Phys. Lett. A 1976, 57, 397–398. [Google Scholar] [CrossRef]
  7. Wang, X.; Chen, G. A chaotic system with only one stable equilibrium. Commun. Nonlinear Sci. Numer. Simul. 2012, 17, 1264–1272. [Google Scholar] [CrossRef] [Green Version]
  8. Petrzela, J. Strange Attractors Generated by Multiple-Valued Static Memory Cell with Polynomial Approximation of Resonant Tunneling Diodes. Entropy 2018, 20, 697. [Google Scholar] [CrossRef] [Green Version]
  9. Moysis, L.; Volos, C.; Stouboulos, I.; Goudos, S.; Çiçek, S.; Pham, V.T.; Mishra, V.K. A Novel Chaotic System with a Line Equilibrium: Analysis and Its Applications to Secure Communication and Random Bit Generation. Telecom 2020, 1, 283–296. [Google Scholar] [CrossRef]
  10. Escalante-González, R.J.; Campos, E. Hyperchaotic attractors through coupling of systems without equilibria. Eur. Phys. J. Spec. Top. 2020, 229, 1309–1318. [Google Scholar] [CrossRef]
  11. Wang, X.; Çavuşoğlu, Ü.; Kacar, S.; Akgul, A.; Pham, V.T.; Jafari, S.; Alsaadi, F.E.; Nguyen, X.Q. S-box based image encryption application using a chaotic system without equilibrium. Appl. Sci. 2019, 9, 781. [Google Scholar] [CrossRef] [Green Version]
  12. Wang, N.; Zhang, G.; Kuznetsov, N.V.; Bao, H. Hidden attractors and multistability in a modified Chua’s circuit. Commun. Nonlinear Sci. Numer. Simul. 2021, 92, 105494. [Google Scholar] [CrossRef]
  13. Leutcho, G.D.; Kengne, J.; Kengne, L.K.; Akgul, A.; Pham, V.T.; Jafari, S. A novel chaotic hyperjerk circuit with bubbles of bifurcation: Mixed-mode bursting oscillations, multistability, and circuit realization. Phys. Scr. 2020, 95, 075216. [Google Scholar] [CrossRef]
  14. Zhang, Y.; Liu, Z.; Wu, H.; Chen, S.; Bao, B. Extreme multistability in memristive hyper-jerk system and stability mechanism analysis using dimensionality reduction model. Eur. Phys. J. Spec. Top. 2019, 228, 1995–2009. [Google Scholar] [CrossRef]
  15. Bao, H.; Liu, W.; Ma, J.; Wu, H. Memristor initial-offset boosting in memristive HR neuron model with hidden firing patterns. Int. J. Bifurc. Chaos 2020, 30, 2030029. [Google Scholar] [CrossRef]
  16. Gong, L.; Wu, R.; Zhou, N. A New 4D Chaotic System with Coexisting Hidden Chaotic Attractors. Int. J. Bifurc. Chaos 2020, 30, 2050142. [Google Scholar] [CrossRef]
  17. Hua, Z.; Zhu, Z.; Yi, S.; Zhang, Z.; Huang, H. Cross-plane colour image encryption using a two-dimensional logistic tent modular map. Inf. Sci. 2021, 546, 1063–1083. [Google Scholar] [CrossRef]
  18. Ravichandran, D.; Murthy, B.; Balasubramanian, V.; Fathima, S.; Amirtharajan, R. An efficient medical image encryption using hybrid DNA computing and chaos in transform domain. Med. Biol. Eng. Comput. 2021, 59, 589–605. [Google Scholar] [CrossRef] [PubMed]
  19. Dai, J.Y.; Ma, Y.; Zhou, N.R. Quantum multi-image compression-encryption scheme based on quantum discrete cosine transform and 4D hyper-chaotic Henon map. Quantum Inf. Process. 2021, 20, 1–24. [Google Scholar] [CrossRef]
  20. Duan, C.F.; Zhou, J.; Gong, L.H.; Wu, J.Y.; Zhou, N.R. New color image encryption scheme based on multi-parameter fractional discrete Tchebyshev moments and nonlinear fractal permutation method. Opt. Lasers Eng. 2022, 150, 106881. [Google Scholar] [CrossRef]
  21. Tong, L.J.; Zhou, N.R.; Huang, Z.J.; Xie, X.W.; Liang, Y.R. Nonlinear Multi-Image Encryption Scheme with the Reality-Preserving Discrete Fractional Angular Transform and DNA Sequences. Secur. Commun. Netw. 2021, 2021. [Google Scholar] [CrossRef]
  22. Almaiah, M.A.; Dawahdeh, Z.; Almomani, O.; Alsaaidah, A.; Al-khasawneh, A.; Khawatreh, S. A new hybrid text encryption approach over mobile ad hoc network. Int. J. Electr. Comput. Eng. 2020, 10, 6461–6471. [Google Scholar] [CrossRef]
  23. Lai, Q.; Wan, Z.; Akgul, A.; Boyraz, O.F.; Yildiz, M.Z. Design and implementation of a new memristive chaotic system with application in touchless fingerprint encryption. Chin. J. Phys. 2020, 67, 615–630. [Google Scholar] [CrossRef]
  24. García-Guerrero, E.; Inzunza-González, E.; López-Bonilla, O.; Cárdenas-Valdez, J.; Tlelo-Cuautle, E. Randomness improvement of chaotic maps for image encryption in a wireless communication scheme using PIC-microcontroller via Zigbee channels. Chaos Solitons Fractals 2020, 133, 109646. [Google Scholar] [CrossRef]
  25. Chirakkarottu, S.; Mathew, S. A novel encryption method for medical images using 2D Zaslavski map and DNA cryptography. SN Appl. Sci. 2020, 2, 1–10. [Google Scholar] [CrossRef] [Green Version]
  26. Khan, A.; Jahanzaib, L.S.; Trikha, P. Changing dynamics of the first, second and third approximations of the exponential chaotic system and their application in secure communication using synchronization. Int. J. Appl. Comput. Math. 2021, 7, 1–26. [Google Scholar] [CrossRef]
  27. El-Latif, A.A.A.; Abd-El-Atty, B.; Belazi, A.; Iliyasu, A.M. Efficient Chaos-Based Substitution-Box and Its Application to Image Encryption. Electronics 2021, 10, 1392. [Google Scholar] [CrossRef]
  28. Abd-El-Atty, B.; Iliyasu, A.M.; Alaskar, H.; El-Latif, A.; Ahmed, A. A robust quasi-quantum walks-based steganography protocol for secure transmission of images on cloud-based E-healthcare platforms. Sensors 2020, 20, 3108. [Google Scholar] [CrossRef]
  29. True Color Kodak Images. Available online: http://r0k.us/graphics/kodak/ (accessed on 3 September 2021).
  30. Alanezi, A.; Abd-El-Atty, B.; Kolivand, H.; El-Latif, A.; Ahmed, A.; El-Rahiem, A.; Sankar, S.; S Khalifa, H. Securing digital images through simple permutation-substitution mechanism in cloud-based smart city environment. Secur. Commun. Netw. 2021, 2021. [Google Scholar] [CrossRef]
  31. Xian, Y.; Wang, X. Fractal sorting matrix and its application on chaotic image encryption. Inf. Sci. 2021, 547, 1154–1169. [Google Scholar] [CrossRef]
  32. Hua, Z.; Zhou, Y.; Huang, H. Cosine-transform-based chaotic system for image encryption. Inf. Sci. 2019, 480, 403–419. [Google Scholar] [CrossRef]
  33. Abd el Latif, A.A.; Abd-el Atty, B.; Amin, M.; Iliyasu, A.M. Quantum-inspired cascaded discrete-time quantum walks with induced chaotic dynamics and cryptographic applications. Sci. Rep. 2020, 10, 1–16. [Google Scholar]
Figure 1. Proposed framework for the secure transmission of multimedia data in IoT environment.
Figure 1. Proposed framework for the secure transmission of multimedia data in IoT environment.
Sensors 22 00334 g001
Figure 2. The chaotic dynamics of Equation (1) with a = 0 and x 0 , y 0 , z 0 = 0 , 0 , 0 in (a) X Y ; (b) X Z ; (c) Y Z ; (d) X Y Z .
Figure 2. The chaotic dynamics of Equation (1) with a = 0 and x 0 , y 0 , z 0 = 0 , 0 , 0 in (a) X Y ; (b) X Z ; (c) Y Z ; (d) X Y Z .
Sensors 22 00334 g002
Figure 3. Time series of Equation (1) with a = 0 and x 0 , y 0 , z 0 = 0 , 0 , 0 .
Figure 3. Time series of Equation (1) with a = 0 and x 0 , y 0 , z 0 = 0 , 0 , 0 .
Sensors 22 00334 g003
Figure 4. 3D chaotic dynamics of Equation (1) and the three pre-located manifolds (ac).
Figure 4. 3D chaotic dynamics of Equation (1) and the three pre-located manifolds (ac).
Sensors 22 00334 g004
Figure 5. Bifurcation diagram of Equation (1) by changing parameter a and backward continuation method; maximum values of (a) x variable; (b) y variable; (c) z variable.
Figure 5. Bifurcation diagram of Equation (1) by changing parameter a and backward continuation method; maximum values of (a) x variable; (b) y variable; (c) z variable.
Sensors 22 00334 g005
Figure 6. The diagram of LEs by changing parameter a.
Figure 6. The diagram of LEs by changing parameter a.
Sensors 22 00334 g006
Figure 7. Bifurcation diagram of the oscillator by changing parameter a; bifurcation with backward continuation method is shown in purple and with constant initial conditions is shown in blue.
Figure 7. Bifurcation diagram of the oscillator by changing parameter a; bifurcation with backward continuation method is shown in purple and with constant initial conditions is shown in blue.
Sensors 22 00334 g007
Figure 8. Basin of attraction of the oscillator; green, dark blue, and cyan regions show the basin of attraction for unbounded, periodic, and chaotic solutions, respectively.
Figure 8. Basin of attraction of the oscillator; green, dark blue, and cyan regions show the basin of attraction for unbounded, periodic, and chaotic solutions, respectively.
Sensors 22 00334 g008
Figure 9. Description of the proposed cryptosystem for multimedia images.
Figure 9. Description of the proposed cryptosystem for multimedia images.
Sensors 22 00334 g009
Figure 10. Experimented image dataset of dimensional 768 × 512, in which the first row denotes the plain images, while the second row describes the corresponding ciphered images.
Figure 10. Experimented image dataset of dimensional 768 × 512, in which the first row denotes the plain images, while the second row describes the corresponding ciphered images.
Sensors 22 00334 g010
Figure 11. Plots of correlation distribution (in each direction) for Macaws image (Red channel), in which the first row denotes the plain Macaws image, while the bottom row signifies the ciphered Macaws image.
Figure 11. Plots of correlation distribution (in each direction) for Macaws image (Red channel), in which the first row denotes the plain Macaws image, while the bottom row signifies the ciphered Macaws image.
Sensors 22 00334 g011
Figure 12. Plots of correlation distribution (in each direction) for Macaws image (Green channel), in which the first row denotes the plain Macaws image, while the bottom row signifies the ciphered Macaws image.
Figure 12. Plots of correlation distribution (in each direction) for Macaws image (Green channel), in which the first row denotes the plain Macaws image, while the bottom row signifies the ciphered Macaws image.
Sensors 22 00334 g012
Figure 13. Plots of correlation distribution (in each direction) for Macaws image (Blue channel), in which the first row denotes the plain Macaws image, while the bottom row signifies the ciphered Macaws image.
Figure 13. Plots of correlation distribution (in each direction) for Macaws image (Blue channel), in which the first row denotes the plain Macaws image, while the bottom row signifies the ciphered Macaws image.
Sensors 22 00334 g013
Figure 14. Outcomes of decrypting Cipher–Macaws image using slight changes in the confidential key. (a) The confidential key; (b) The confidential key except x i n i t i a l = 0.627500000000001; (c) The confidential key except y i n i t i a l = 0.3854000000000001; (d) The confidential key except z i n i t i a l = 0.7261000000000001; (e) The confidential key except x i n i t i a l = 0.627499999999999; (f) The confidential key except y i n i t i a l = 0.38539999999999.
Figure 14. Outcomes of decrypting Cipher–Macaws image using slight changes in the confidential key. (a) The confidential key; (b) The confidential key except x i n i t i a l = 0.627500000000001; (c) The confidential key except y i n i t i a l = 0.3854000000000001; (d) The confidential key except z i n i t i a l = 0.7261000000000001; (e) The confidential key except x i n i t i a l = 0.627499999999999; (f) The confidential key except y i n i t i a l = 0.38539999999999.
Sensors 22 00334 g014
Figure 15. Plots of histograms for experimented images, in which the left three columns except the first one represent the histograms of plain images, while the right three columns represent the histograms of cipher images.
Figure 15. Plots of histograms for experimented images, in which the left three columns except the first one represent the histograms of plain images, while the right three columns represent the histograms of cipher images.
Sensors 22 00334 g015
Figure 16. Ciphers of all-black and all-white images, and their analog histograms.
Figure 16. Ciphers of all-black and all-white images, and their analog histograms.
Sensors 22 00334 g016
Figure 17. Outcomes of noise attack, in which the top row refers to the defective Cipher–Macaws image by adding Salt and Pepper noise with variable densities (D) while the bottom row represents the corresponding decipher image.
Figure 17. Outcomes of noise attack, in which the top row refers to the defective Cipher–Macaws image by adding Salt and Pepper noise with variable densities (D) while the bottom row represents the corresponding decipher image.
Sensors 22 00334 g017
Figure 18. Outcomes of data loss attack, in which the top row refers to the defective Cipher–Macaws image by performing a cutting block for data with various sizes, while the bottom row represents the corresponding decipher image.
Figure 18. Outcomes of data loss attack, in which the top row refers to the defective Cipher–Macaws image by performing a cutting block for data with various sizes, while the bottom row represents the corresponding decipher image.
Sensors 22 00334 g018
Table 1. Comparison of time encryption for the presented cryptosystem with other related cryptosystems, as reported in [30,31,32].
Table 1. Comparison of time encryption for the presented cryptosystem with other related cryptosystems, as reported in [30,31,32].
Image CryptosystemNumber of Encrypted Bits Per Second
Proposed9,713,394
Ref. [30]8,025,072
Ref. [31]6,381,110
Ref. [32]4,224,509
Table 2. Outcomes of randomness test.
Table 2. Outcomes of randomness test.
Test-Namep-ValuePassed
Key StreamCipher-Macaws
Runs0.79131890.5294244
DFT0.65434730.6036850
Linear complexity0.70246040.1581112
Block-frequency0.56865300.3487918
Frequency0.65597490.4300353
Universal0.34571040.9949709
Serial test 10.39208070.3989737
Serial test 20.59676910.5770354
Overlapping templates0.78270320.4365690
No overlapping templates0.96361270.5941496
Long runs of ones0.39696730.7129090
Approximate entropy0.27726070.1420810
Rank0.09962060.5740640
Random excursions variant x = 10.09636090.6213966
Random excursions x = 10.35708320.8722024
Cumulative sums (reverse)0.06206190.5399098
Cumulative sums (forward)0.17408840.7368549
Table 3. Correlation coefficient of neighboring pixels for the experimented images.
Table 3. Correlation coefficient of neighboring pixels for the experimented images.
ImageDirection
Hor.Ver.Dia.
RGBRGBRGB
Macaws0.986850.980740.985620.988740.984600.985500.980240.973490.97804
Cipher-Macaws−0.00001−0.000050.000730.000260.00051−0.00078−0.000100.00056−0.00125
Chalet0.936980.920770.918620.941790.938440.922900.911950.900440.89372
Cipher-Chalet0.00083−0.000020.000060.00044−0.000440.00114−0.00017−0.000180.00058
Window0.957720.942350.955320.971140.962850.966580.936160.921070.93504
Cipher-Window0.00087−0.00088−0.000660.000120.000620.001440.000070.00033−0.00008
Houses0.923730.922240.907930.888700.889940.861350.820850.819760.77976
Cipher-Houses0.00085−0.00004−0.000660.000590.000720.00061−0.000400.00128−0.00075
Table 4. Outcomes of NPCR and UNCI.
Table 4. Outcomes of NPCR and UNCI.
ImageNPCRUNCI
Macaws99.60556%33.49106%
Chalet99.61565%33.45562%
Window99.60988%33.47213%
Houses99.60751%33.44994%
Table 5. χ 2 outcomes for the investigated images.
Table 5. χ 2 outcomes for the investigated images.
Image χ 2 ValueOutcome
RedGreenBlue
Macaws303,687.9661254,324.4518603,349.4934Irregular
Chalet817,766.5013677,362.4271616,936.1705Irregular
Window515,942.4335551,843.4661728,008.0781Irregular
Houses285,277.4635219,680.6289221,228.6081Irregular
Cipher-Macaws244.5221251.6953233.6315Regular
Cipher-Chalet258.3451215.8021243.8919Regular
Cipher-Window209.8372277.1874254.2682Regular
Cipher-Houses226.9335248.9882241.1497Regular
Table 6. Local and global information entropies.
Table 6. Local and global information entropies.
ImageGlobal EntropyLocal Entropy
PlainCipherPlainCipher
Macaws7.6019417.9998375.3969787.902671
Chalet7.1366537.9998345.6733457.903744
Window7.3098587.9998555.4411437.902341
Houses7.6737957.9998746.5520627.902232
Table 7. Statistical analyses of the cipher all-black and all-white images.
Table 7. Statistical analyses of the cipher all-black and all-white images.
ImageCorrelation χ 2 ValueEntropy
Hor.Ver.Dia.GlobalLocal
All-black−0.0002−0.00040.0001267.76567.999267.90340
All-white0.00060.00010.0004226.80087.999377.90343
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Share and Cite

MDPI and ACS Style

Li, L.; Abd El-Latif, A.A.; Jafari, S.; Rajagopal, K.; Nazarimehr, F.; Abd-El-Atty, B. Multimedia Cryptosystem for IoT Applications Based on a Novel Chaotic System around a Predefined Manifold. Sensors 2022, 22, 334. https://doi.org/10.3390/s22010334

AMA Style

Li L, Abd El-Latif AA, Jafari S, Rajagopal K, Nazarimehr F, Abd-El-Atty B. Multimedia Cryptosystem for IoT Applications Based on a Novel Chaotic System around a Predefined Manifold. Sensors. 2022; 22(1):334. https://doi.org/10.3390/s22010334

Chicago/Turabian Style

Li, Li, Ahmed A. Abd El-Latif, Sajad Jafari, Karthikeyan Rajagopal, Fahimeh Nazarimehr, and Bassem Abd-El-Atty. 2022. "Multimedia Cryptosystem for IoT Applications Based on a Novel Chaotic System around a Predefined Manifold" Sensors 22, no. 1: 334. https://doi.org/10.3390/s22010334

APA Style

Li, L., Abd El-Latif, A. A., Jafari, S., Rajagopal, K., Nazarimehr, F., & Abd-El-Atty, B. (2022). Multimedia Cryptosystem for IoT Applications Based on a Novel Chaotic System around a Predefined Manifold. Sensors, 22(1), 334. https://doi.org/10.3390/s22010334

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop