4.6 Article

Fast Reaching Finite Time synchronization Approach for Chaotic Systems With Application in Medical Image Encryption

Journal

IEEE ACCESS
Volume 9, Issue -, Pages 25911-25925

Publisher

IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
DOI: 10.1109/ACCESS.2021.3056037

Keywords

Synchronization; Chaotic communication; Encryption; Biomedical imaging; Convergence; Trajectory; Sliding mode control; Chaos synchronization; fast reaching condition; medical image encryption; MORE method encryption

Ask authors/readers for more resources

This article proposes a fast reaching finite time synchronization approach for chaotic systems and applies it to medical image encryption. The feasibility and efficiency of the proposed synchronization method are evaluated through simulation and analytical studies, confirming its robustness and fast convergence rate. The security analysis demonstrates acceptable levels of resistance to various attacks for the proposed cryptosystem.
This article proposes a fast reaching finite time synchronization approach for chaotic systems along with its application to medical image encryption. First, an adaptive terminal sliding mode tracking approach with fast reaching condition is designed to synchronize the chaotic systems at the transmitter and receiver ends in finite time. Then, a chaotic cryptosystem, using synchronized chaotic systems as secret keys generator, is proposed to enhance the security of medical image transmission and/or storage. The applicability and efficiency of the proposed synchronization approach is assessed using a simulation as well as an analytical study. The analysis encompassed security tools such as histogram analysis, correlation test, and information entropy change the rate of the number of pixels and unified average changing intensity. The obtained results confirmed the robustness and fast convergence rate of the proposed synchronization approach. The security analysis also shows that the proposed cryptosystem displays acceptable levels of resistance to various attacks.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.6
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

No Data Available
No Data Available