Literature DB >> 33265386

A Novel Algorithm to Improve Digital Chaotic Sequence Complexity through CCEMD and PE.

Chunlei Fan1, Zhigang Xie2, Qun Ding1.   

Abstract

In this paper, a three-dimensional chaotic system with a hidden attractor is introduced. The complex dynamic behaviors of the system are analyzed with a Poincaré cross section, and the equilibria and initial value sensitivity are analyzed by the method of numerical simulation. Further, we designed a new algorithm based on complementary ensemble empirical mode decomposition (CEEMD) and permutation entropy (PE) that can effectively enhance digital chaotic sequence complexity. In addition, an image encryption experiment was performed with post-processing of the chaotic binary sequences by the new algorithm. The experimental results show good performance of the chaotic binary sequence.

Entities:  

Keywords:  chaotic system; empirical mode decomposition; image encryption; permutation entropy

Year:  2018        PMID: 33265386      PMCID: PMC7512813          DOI: 10.3390/e20040295

Source DB:  PubMed          Journal:  Entropy (Basel)        ISSN: 1099-4300            Impact factor:   2.524


1. Introduction

With the rapid development of computer technology and network communication technology, information has become an important asset in today’s society. Therefore, the confidentiality of personal information has become more and more essential. For example, internet data transmission and confidential phone and bank cards require adequate security and confidentiality measures. Therefore, the study of secret communication and cryptography has become an urgent issue. At present, the chaotic signal has benefits such as intrinsic stochasticity, initial value sensitivity, and synchronizing characteristics. Therefore, some traditional chaotic systems with a self-excited attractor are widely used in secret communication and have significant advantages [1,2,3,4,5]. Further, in recent years a hidden chaos attractor has been found, which makes the development of a high-dimensional nonlinear system an attractive challenge [6,7,8,9]. At present, most scholars primarily study the dynamic characteristics of hidden attractors. In this paper, we aimed to study chaos with a hidden attractor from the perspective of secure communication and cryptography. Chaos with a hidden attractor is used as a digital chaotic sequence generator with the purpose of encrypting private data. However, in the process of quantization, calculation precision is a crucial factor that degenerates the dynamic characteristics of a chaotic system so that the complexity of a digital chaotic sequence does not satisfy the requirements of information security and cryptography [10,11]. Aiming to solve this problem, Du [12] put forward an algorithm to improve the performance of chaotic binary sequences based on Karhunen–Loève (K–L) transformation. Zhou [13] proposed to scramble the chaotic binary sequence by m sequence in order to improve the complexity of the digital chaotic sequence. Cernak [14] came up with a method to improve the randomness and periodic length of the chaotic binary sequence by perturbing parameters of the chaotic system. Based on the above analysis, these algorithms improve the performance and complexity of digital chaotic sequences by reconstructing the binary sequence method. In this paper, we attempted to generate high complexity in the chaotic sequence based on digital signal processing technology. Empirical mode decomposition (EMD) in digital signal processing has been extensively applied in nonlinear signal processing [15,16,17,18]. EMD was first proposed by Huang et al. [19,20,21]. It is an effective tool for analyzing nonlinear and non-stationary signals. The EMD method is closely related to the corresponding Hilbert transform method. Through the decomposition of nonlinear and non-stationary signals, a series of intrinsic mode functions (IMFs) are obtained, which makes each IMF a stable signal for narrowband [22]. The IMFs play a crucial role in the analysis of non-stationary or nonlinear signals. However, there are some problems with the EMD method, of which the main one is mode mixing. Complementary ensemble empirical mode decomposition (CEEMD) can effectively restrain the mode mixing of EMD at a certain level [23,24,25]. Based on the above considerations, we proposed a new algorithm which combines CEEMD with permutation entropy (PE) [26] to effectively improve the complexity of the digital chaotic sequence. The rest of this paper is organized as follows: Section 2 describes a hidden chaos attractor with no equilibria. The dynamic characteristics of a complex chaotic system are studied by means of numerical simulation and theoretical analysis. Section 3 proposes a new algorithm to improve the complexity of the digital chaotic sequence. Section 4 considers image encryption with post-processing of the chaotic binary sequences by the algorithm outlined in Section 3. The security of the encrypted image is analyzed through key sensitivity, information entropy, and histogram analysis. Section 5 summarizes the discussions of this paper.

2. The Characteristic Analysis of a Chaotic System

In this section, a system can be expressed as the following set of differential equations: where are real parameters. When and the initial value is , the system displays a single-scroll chaotic system [27]. Different projections of the chaotic attractor for this system are shown in Figure 1.
Figure 1

The different projections of chaotic attractor with: (a) x-y; (b) x-z; (c) y-z.

Equilibria of the chaotic system can be obtained by solving . The equation is shown as follows: However, it is easy to see in the chaotic system that when , Equation (2) has no solution. Therefore, the chaotic system has no equilibria in this case. For the classification of chaotic attractors, if the basin of chaotic attraction intersects with any open neighborhood of an equilibrium, this attractor is called a self-excited attractor. However, if the basin of chaotic attraction is not connected with any equilibrium, this attractor is called a hidden attractor [28,29,30]. Therefore, the above chaotic system displays a hidden attractor in this case because it is a system with no equilibria. In addition, the Poincaré map of the system can be obtained in the plane. For the above three-dimensional chaotic system , all points were calculated by a MATLAB (R2012a, MathWorks, Natick, MA, USA) numerical simulation to obtain the Poincaré map. The Poincaré cross section projected in x-z is shown in Figure 2. The Poincaré cross section indicates that the system is a chaotic system through some dense points. Further, for the above chaotic system, the maximal Lyapunov exponent was calculated by a MATLAB numerical simulation. The maximal Lyapunov exponent can indicate the degree of the average divergence of the chaotic trajectory. If the exponent is more than zero, it denotes that the system has the sensitivity of the initial value. According to the result of the MATLAB calculation, this exponent is 0.081. For instance, the time series of generated from two very close initial values and are shown in Figure 3, with the purpose of verifying the initial value sensitivity for the chaotic system. Figure 3 is plotted by the MATLAB numerical simulation. According to the Differential Equation (1), the “t” presents the number of iterations. As can be seen from Figure 3, the chaotic system is sensitive dependence on initial value.
Figure 2

Poincaré map in the x-z plane.

Figure 3

Initial value sensitivity for the time series with the initial values (−1.6, 0.82, 1.9) and (−1.601, 0.82, 1.9).

3. A New Algorithm to Improve the Complexity of Digital Chaotic Sequences

In this section, we designed a novel algorithm based on CEEMD that can effectively enhance the complexity of digital chaotic sequences. CEEMD can adaptively decompose a non-stationary or non-linear signal into different IMFs. The oscillating frequency of each IMF decreases according to the decomposition order of each IMF. We present a new algorithm to enhance the complexity of chaotic discrete sequences by combining CEEMD with permutation entropy (PE). At the same time, the digital chaotic sequences are converted into chaotic binary sequences through a quantitative method with the purpose of encrypting images or private data. The essential novelty of this algorithm is to eliminate all low complexity IMF components in a chaotic time series, with the purpose of improving the randomness and complexity of the sequence.

3.1. The Basic Principles of EMD

Empirical mode decomposition (EMD) is an adaptive method to decompose non-stationary and non-linear signals into a set of IMFs (intrinsic mode functions) and a residual component. Each IMF should satisfy the following two conditions: (1) For the whole data set, the number of zero crossing and extrema must either be equal or differ at most by one. (2) For any data point, the mean value of the upper and lower envelope determined by the local maxima and minima is zero [31]. The implementation process of the EMD method is shown as follows: All the local maxima and minima of the signal are calculated to construct the upper envelopes and lower envelopes by the cubic spline interpolation. Further, represents the mean of the upper and lower envelopes and is shown as follows: where denotes a temporary signal. If satisfies the above two crucial factors, it is a first-order IMF component. Otherwise, will serve as an initial signal and the above procedures are repeated until the is an IMF and sets the as . Next, the first-order IMF has a high frequency, which can be extracted from by is processed as the new signal and the above procedures are repeated so that the other IMFs can be generated , . When the residual becomes a monotonic function or constant, EMD decomposition is terminated. The can finally be shown as follows: Thus, a non-linear signal can be decomposed into IMFs and a residual . However, there are some problems with the EMD method, and one of these is mode mixing. Generally speaking, each IMF component represents a specific physical quantity. If an IMF component contains a large number of different frequencies of signals then this phenomenon is called mode mixing, which seriously affects the performance of EMD decomposition. Aiming to resolve this issue, the complementary ensemble empirical mode decomposition (CEEMD) method can effectively restrain mode mixing of EMD at a certain level. The CEEMD method was used by adding two opposite white noise signals to an original signal , and to the adopted EMD, with the purpose of restraining mode mixing.

3.2. The Implementation of the New Algorithm

First, suppose is a time series of chaotic systems. The white noise signal and with a zero mean value are added to the signal , and the following equation is defined: where shows the added white noise signal, and and denote the amplitude and number of the noise signals, respectively. In addition, the variance of the white noise is 1. and represent the first order component sequence, which can be generated by decomposing and with the EMD method. The mean value of all components is defined as follows: is sampled to generate a discrete time sequence . Then, it is checked whether is a low complexity discrete sequence based on the PE value. The PE is widely applied in the measurement of discrete sequence complexity because of its high robustness and rapid and simple algorithm characteristics. PE can be described as follows: 1. For a discrete time sequence , where and represent the embedding dimension and a delay factor, respectively, the sequence can be reconstructed as 2. Each sequence of Equation (10) is placed depending on an ascending order. 3. Further, displays the original position index of each element, which is one of the possible order types of all permutations. Suppose is a symbol permutation and , where . Then, PE is defined as When , then obtains the maximum value . Further, the normalized PE is defined as . Based on a large amount of MATLAB simulation data, when the PE value of the is less than , the amplitude of changes slowly and takes on a lower frequency. After this, the above method is used to find all the low complexity signals in the IMFs. All low complexity IMF signals are separated from the target signal to generate the signal . Then, the can be written as where is the sum total of low complexity signals in the IMFs.

3.3. Experimental Results

The time series are generated from the chaotic system as experimental data. The generated , and time series signals are shown in Figure 4.
Figure 4

Chaotic time series with (blue color), (green color), and (red color).

Next, these chaotic time series are processed by the above method. All the low complexity signals in the IMFs are shown in Figure 5a–c, where RS (Logogram of Residual ) is a residual signal. As can be seen from the figure, the amplitude of these IMF signals changes slowly with time and the frequency of the signals reduces. These IMF components are sampled to generate discrete time sequences with the purpose of calculating the PE value. For the , and time series, the calculation results of the PE value of each IMF component are shown in Table 1. This table shows that the PE values of these IMFs are less than . Therefore, based on the essential novelty of the above method, these IMFs will be removed from the original chaotic time series.
Figure 5

All the low complexity signals in the intrinsic mode functions (IMFs) with: (a) ; (b) ; (c) .

Table 1

The permutation entropy (PE) value of each intrinsic mode function (IMF) with , , and .

IMF Component x(t) y(t) z(t)
IMF10.11810.19590.1658
IMF20.11160.11530.1198
IMF30.10960.11130.1102
IMF40.10690.10760.1072
RS50.05420.09970.1066
The time series , and will be generated by removing the low complexity IMF components from the original signals in , and . The time series , and are shown in Figure 6. Moreover, these time series are also sampled to generate discrete time sequences with the purpose of calculating the PE values, and Figure 7 denotes the comparison of the PE values to the original signals , , and the post-processing signals , , . It can be seen from Figure 7 that the entropy value of the latter is significantly greater than that of the former and shows a good level of complexity. These high-complexity discrete time sequences can be quantized to generate a good performance in the chaotic binary sequences. These binary sequences will serve as useful key stream sequences of the stream cipher to encrypt private data.
Figure 6

Time series after algorithm processing with: (a) ; (b) ; (c) .

Figure 7

Permutation entropy (PE) value comparisons between the original signal and post-processing signal.

3.4. The Generation and Performance Test of the Chaotic Binary Sequence

The three outputs , , and are quantized by the interval quantization method, and its mathematical equation is shown below. where and are a quantized chaotic binary sequence and arbitrary integer, and are consecutive equal intervals on the range of the real value of . If the real value falls on the odd range the result of quantization is , otherwise it is . , , and are quantized as , , and through the interval quantization method. Then, the NIST-800-22 test suite is performed to evaluate the performance of the random binary sequences , , and . The NIST-800-22 is composed of 16 different tests, including approximate entropy, linear complexity, and the discrete Fourier transform tests [32,33]. If the p-value of the test is greater than 0.01, the test is successful. The NIST-800-22 test results are shown in Table 2. As can be seen from the table, the chaotic random sequences , , and passed all the tests. These chaotic sequences can be used in high security fields such as network security and multimedia encryption.
Table 2

NIST-800-22 tests.

Test ItemQx(t)p-ValueQy(t)p-ValueQz(t)p-ValueResult
Approximate Entropy0.287110.010630.41042Success
Block Frequency0.025010.439240.64085Success
Cumulative Sums0.143720.566580.64761Success
FFT0.520630.372210.11875Success
Frequency0.280140.483920.87461Success
Linear Complexity0.223740.469320.78321Success
Longest Run0.706650.510780.26541Success
Non-Overlapping Template0.329740.753310.11253Success
Overlapping Template0.240880.703990.32227Success
Random Excursions0.437470.517910.82733Success
Random Excursions Variant0.645780.112530.66691Success
Binary Matrix Rank0.153190.587000.44130Success
Runs0.882060.845300.71884Success
Serial Test-10.100560.178260.81473Success
Serial Test-20.155380.155380.69926Success
Maurer’s Universal0.753310.142680.56553Success

4. Image Encryption with a Chaotic Binary Sequence

This subsection describes the experiments used to demonstrate the performance of the chaotic binary sequence by encrypting images. The Lena and Baboon images, with a size of , are encrypted by the above chaotic random sequences—, , and . Then, , , and serve as the key stream sequences of the stream cipher with the purpose of encrypting the R, G, and B components of the color images.

4.1. Key Sensitivity

The sensitivity of chaos to the initial value can support the effective avoidance of tentative attacks. Using the Lena and Baboon images with a size of as examples, Figure 8a,d shows the plain-images, while the cipher-images are given in Figure 9b,e. However, a 10−5 change of the initial value will lead to incorrect decryption results, as shown in Figure 9c,f. The experimental results show that the chaotic binary sequence shows high key sensitivity.
Figure 8

Key sensitivity test with: (a) plain-image for Lena; (b) cipher-image for Lena; (c) incorrect decryption using a 10−5 change of the initial value for Lena; (d) plain-image for Baboon; (e) cipher-image for Baboon; (f) incorrect decryption using a 10−5 change of the initial value for Baboon.

Figure 9

Histogram test with: (a) R component of the plain-image; (b) R component of the cipher-image; (c) B component of the plain-image; (d) B component of the cipher-image; (e) G component of the plain-image; (f) G component of the cipher-image.

4.2. Histogram Analysis

The image histogram can be approximated as the density function of the gray value, which is an important indicator in the analysis of an image’s statistical properties [34]. The histogram test is shown in Figure 9, and the horizontal and vertical coordinates of the histogram represent the pixel values and number of pixel values, respectively. Figure 9 show that the gray histogram of the encrypted image is relatively uniform, which indicates that the security performance of this key sequence is relatively high, and the image is not easily able to be tampered with and decrypted during transmission.

4.3. Correlation Analysis of Adjacent Pixels

Generally speaking, the smaller the adjacent pixel correlation of the cipher-image, the more obvious the effect of resisting statistical attack [35]. The mathematical equation can be shown as follows: where , , , x and y represent the different gray values of two adjacent pixels and N denotes the number of randomly selected adjacent pixels. The above equation was used and some pairs of adjacent pixels in different directions were randomly chosen, and the test results are listed in Table 3. It can be seen from the experimental data that the correlation of adjacent pixels of a cipher-image tends to be zero.
Table 3

Correlation analysis of adjacent pixels for the Lena and Baboon images.

DirectionPlain-Image for LenaCipher-Image for LenaPlain-Image for BaboonCipher-Image for Baboon
Horizontal0.97120.03920.92870.0133
Vertical0.96550.00910.90040.0522
Diagonal0.94010.02150.87110.0093

4.4. Information Entropy Analysis

Information entropy can reflect the randomness of the information in images, namely the uncertainty of the distribution of pixel values in a cipher-image. Its mathematical equation is shown below [36]. where L is the number of bits required to store each pixel value, and p(ϕ) presents the probability of the symbol ϕ. When the probability of each symbol ϕ is equal, the information entropy (H(ϕ) = 8) is at its largest. When the information entropy is closer to 8, the gray value tends to be distributed randomly. Table 4 provides a comparison of this data with other experiments. This comparison shows that the information entropy of our method is closer to 8. Therefore, it can effectively resist information entropy attacks.
Table 4

Information entropy analysis for the Lena and Baboon images.

MethodsR ComponentG ComponentB Component
The paper for Lena7.99727.99717.9972
The paper for Baboon7.99707.99687.9971
Reference [37]7.99147.99147.9915
Reference [38]7.98517.98527.9832

5. Discussion

Some traditional chaotic systems with a self-excited attractor have been widely used in secret communication. However, for chaotic systems with hidden attractors, most of the current research has focused on studying the dynamic characteristics of the system rather than its application in the field of information security. Therefore, in this paper, we aimed to study chaos with a hidden attractor from the perspective of secure communication and data encryption. First, we introduced the dynamic characteristics of a chaotic system with hidden attractors by means of a numerical simulation and theoretical analysis, including equilibria, a Poincaré cross section, and initial value sensitivity. After that, a new algorithm was designed to enhance the complexity of digital chaotic sequences with the purpose of satisfying the requirements of data encryption. The essential novelty of the algorithm is to eliminate all low complexity IMF components of a chaotic time series by using digital signal processing technology. PE value comparisons between the original signal and post-processing signal show the performance of the algorithm is good. In addition, the NIST-800-22 test was performed to demonstrate the randomness and complexity of the chaotic binary sequence. The chaotic binary sequence can serve as a good key stream sequence of a stream cipher to encrypt private data. Furthermore, an image encryption experiment was undertaken to show the security of the above method. However, some weaknesses in this technique remain, and we believe that the new algorithm should be optimized in operation efficiency.
  6 in total

1.  Permutation entropy: a natural complexity measure for time series.

Authors:  Christoph Bandt; Bernd Pompe
Journal:  Phys Rev Lett       Date:  2002-04-11       Impact factor: 9.161

2.  Enhanced complexity of optical chaos in a laser diode with phase-conjugate feedback.

Authors:  D Rontani; E Mercier; D Wolfersberger; M Sciamanna
Journal:  Opt Lett       Date:  2016-10-15       Impact factor: 3.776

3.  Empirical mode decomposition based detrended sample entropy in electroencephalography for Alzheimer's disease.

Authors:  Ping-Huang Tsai; Chen Lin; Jenho Tsao; Pei-Feng Lin; Pa-Chun Wang; Norden E Huang; Men-Tzung Lo
Journal:  J Neurosci Methods       Date:  2012-07-31       Impact factor: 2.390

4.  Extreme multistability in a memristor-based multi-scroll hyper-chaotic system.

Authors:  Fang Yuan; Guangyi Wang; Xiaowei Wang
Journal:  Chaos       Date:  2016-07       Impact factor: 3.642

5.  Complexity-enhanced polarization-resolved chaos in a ring network of mutually coupled vertical-cavity surface-emitting lasers with multiple delays.

Authors:  Hao Zhang; Shuiying Xiang; Yahui Zhang; Xingxing Guo
Journal:  Appl Opt       Date:  2017-08-20       Impact factor: 1.980

6.  Local motion adaptation enhances the representation of spatial structure at EMD arrays.

Authors:  Jinglin Li; Jens P Lindemann; Martin Egelhaaf
Journal:  PLoS Comput Biol       Date:  2017-12-27       Impact factor: 4.475

  6 in total

北京卡尤迪生物科技股份有限公司 © 2022-2023.