DYNAMICS ANALYSIS OF 2D CHAOTIC CAT MAP OVER FINITE-STATE SPACE

Zhongwei Hou∗ and Dengyuan Xu∗∗

References

  1. [1] L. Kocarev, Chaos-based cryptography: a brief overview, IEEE Circuits and Systems Magazine, 1, 2001, 6–21.
  2. [2] J.J. Ni and S.X. Yang, A fuzzy-logic based chaos GA for cooperative foraging of multi-robots in unknown environments, International Journal of Robotics and Automation, 27, 2012, 15–30.
  3. [3] S. Nasr, H. Mekki, and K. Bouallegue, A fast path planning method of robot for surveillance missions based on chaos, International Journal of Robotics and Automation, 34, 2019, 468–476.
  4. [4] A. Kannammal and S.S. Rani, Authentication and encryption for medical image security system, International Journal of Robotics and Automation, 29, 2014, 448–455.
  5. [5] A.U. Rehman, X.F. Liao, and H.W. Wang, An innovative technique for image encryption using tripartite graph and chaotic maps, Multimedia Tools and Applications, 80, 2021, 21979–22005.
  6. [6] Y.L. Ma, C.Q. Li, and B. Ou, Cryptanalysis of an image block encryption algorithm based on chaotic maps, Journal of Information Security and Applications, 54, 2020, 102566.
  7. [7] H. Tourajizadeh, M. H. Korayem, and S.R. Nekoo, Sensitivity analysis of dynamic load carrying capacity of a cable-suspended robot, International Journal of Robotics and Automation, 34, 2019, 1–11.
  8. [8] C.Q. Li, B.B. Feng, S.J. Li, J. Kurths, and G.R. Chen, Dynamic analysis of digital chaotic maps via state-mapping networks, IEEE Transactions on Circuits and Systems I:, 66, 2019, 2322–2335.
  9. [9] D. Xiao, M. Li, M.D. Wang, J. Liang, and R. Liu, Low-cost and high-efficiency privacy protection scheme for distributed compressive video sensing in wireless multimedia sensor networks, Journal of Network and Computer Applications, 161, 2020, 102654.
  10. [10] J.Z. Xin, H. Zhang, J.T. Zhou, X.G. Li, and H. Ma, Damage identification of bridge system based on a hybrid algorithm, International Journal of Robotics and Automation, 34(2), 2019, 104–111.
  11. [11] H. Wang, D. Xiao, M. Li, Y.P. Xiang, and X.Y. Li, A visually secure image encryption scheme based on parallel compressive sensing, Signal Processing, 155, 2019, 218–232.
  12. [12] V. Arnold and A. Avez, Ergodic problems of classical mechanics (New York: Benjamin, USA, 1968).
  13. [13] G.R. Chen, Y.B. Mao, and C.K. Chui, A symmetric image encryption scheme based on 3D chaotic cat maps, Chaos, Solitons & Fractals, 21, 2004, 749–761.
  14. [14] F. Chen, K.W. Wong, X.F. Liao, and T. Xiang, Period distribution of chaotic cat map for N = pe, IEEE Transactions on Information Theory, 58, 2012, 445–452.
  15. [15] F. Chen, X.F. Liao, K.W. Wong, Q. Han, and Y. Li, Period distribution of some linear maps, Communications in Nonlinear Science and Numerical Simulation, 17, 2012, 3848–3856.
  16. [16] F. Chen, K.W. Wong, X.F. Liao, and T. Xiang, Period distribution of chaotic cat map for N = 2e, IEEE Transactions on Information Theory, 59, 2013, 3249–3255.
  17. [17] R. Lidl and H. Niederreiter, Finite Fields, vol. 20, encyclopedia of mathematics and its applications (Amsterdam: AddisonWesley, The Netherlands, 1983).
  18. [18] Z.X. Wan, Lectures on finite fields and galois rings (Singapore: World Scientific, 2003).
  19. [19] F. Chen, K.W. Wong, X.F. Liao, and T. Xiang, Period distribution of chaotic cat map,” Theoretical Computer Science, 552, 2014, 13–25.
  20. [20] R.A. Rueppel, Analysis and design of stream ciphers (New York, USA: Springer-Verlag, 1986).
  21. [21] X.F Liao, F. Chen, and K.W. Wong, On the security of publickey algorithms based on chebyshev polynomials over the finite field, IEEE Transactions on Computers, 59, 2010, 1392–1401. 171
  22. [22] S. Golomb and L. Welch, Shift register sequences (Laguna Hills, CA: Aegean Park, 1982).
  23. [23] S. Golomb and G. Gong, Signal design for good correlation: for wireless communication, cryptography, and radar (Cambridge, UK: Cambridge Univ. Press, 2005).
  24. [24] F. Chen, X.F. Liao, T. Xiang, and H.Y. Zheng, Security analysis of the public key algorithm based on Chebyshev polynomials over the integer ring, Information Sciences, 181, 2011, 5110–5118.
  25. [25] T. Kruger and S. Troubetzkoy, Complexity, randomness, discretization: Some remarks on a program of J. Ford, Physica D, 105, 2011, 97–104.
  26. [26] P.W. Shor, Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer, SIAM Journal on Computing, 26, 1997, 1484–1509.

Important Links:

Go Back