4.7 Article

A universal method for constructing non-degenerate hyperchaotic systems with any desired number of positive Lyapunov exponents

Journal

CHAOS SOLITONS & FRACTALS
Volume 161, Issue -, Pages -

Publisher

PERGAMON-ELSEVIER SCIENCE LTD
DOI: 10.1016/j.chaos.2022.112323

Keywords

Hyperchaotic system; Lyapunov exponent; PRNG; Image encryption

Funding

  1. National Natural Science Foundation of China [62101178]
  2. Fundamental Research Funds for the Higher Institutions in Heilongjiang Province [2020-KYYWF-1033]

Ask authors/readers for more resources

Due to the limited machine word length, the dynamics of digital chaotic systems degen-erate. To combat this issue, we propose a universal method based on singular value decomposition to construct non-degenerate hyperchaotic systems with desired Lyapunov exponents. We validate the method using a 6-dimensional example system and design a pseudorandom number generator based on the hyperchaotic system for image encryption. Numerical simulations evaluate the security of the encryption algorithm.
Due to the limited machine word length of hardware devices, the dynamics of digital chaotic systems will degen-erate. To combat this issue, we proposed a universal method that is based on singular value decomposition (SVD), which can reversely construct non-degenerate hyperchaotic systems with any desired number of positive Lyapunov exponents by controlling pre-specified singular values. To assess the practicability and effectiveness of the method, we construct a 6-dimensional non-degenerate hyperchaotic system as an example. Furthermore, based on the hyperchaotic system, a pseudorandom number generator (PRNG) with desirable statistical charac-teristics is designed for image encryption. Numerical simulations were performed to evaluate the security of the image encryption algorithm in terms of histogram, information entropy, differential attack test, etc. The proposed non-degenerate hyperchaotic system can be effectively applied in the field of multimedia data encryption and information security.(c) 2022 Elsevier Ltd. All rights reserved.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.7
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

No Data Available
No Data Available