Movatterモバイル変換


[0]ホーム

URL:


Skip to main page content
U.S. flag

An official website of the United States government

Dot gov

The .gov means it’s official.
Federal government websites often end in .gov or .mil. Before sharing sensitive information, make sure you’re on a federal government site.

Https

The site is secure.
Thehttps:// ensures that you are connecting to the official website and that any information you provide is encrypted and transmitted securely.

NIH NLM Logo
Log inShow account info
Access keysNCBI HomepageMyNCBI HomepageMain ContentMain Navigation
pubmed logo
Advanced Clipboard
User Guide

Full text links

MDPI full text link MDPI Free PMC article
Full text links

Actions

Share

.2024 Mar 13;26(3):254.
doi: 10.3390/e26030254.

Ann-Dimensional Chaotic Map with Application in Reversible Data Hiding for Medical Images

Affiliations

Ann-Dimensional Chaotic Map with Application in Reversible Data Hiding for Medical Images

Yuli Yang et al. Entropy (Basel)..

Abstract

The drawbacks of a one-dimensional chaotic map are its straightforward structure, abrupt intervals, and ease of signal prediction. Richer performance and a more complicated structure are required for multidimensional chaotic mapping. To address the shortcomings of current chaotic systems, ann-dimensional cosine-transform-based chaotic system (nD-CTBCS) with a chaotic coupling model is suggested in this study. To create chaotic maps of any desired dimension,nD-CTBCS can take advantage of already-existing 1D chaotic maps as seed chaotic maps. Three two-dimensional chaotic maps are provided as examples to illustrate the impact. The findings of the evaluation and experiments demonstrate that the newly created chaotic maps function better, have broader chaotic intervals, and display hyperchaotic behavior. To further demonstrate the practicability ofnD-CTBCS, a reversible data hiding scheme is proposed for the secure communication of medical images. The experimental results show that the proposed method has higher security than the existing methods.

Keywords: chaotic map; privacy protection; reversible data hiding; secure communication.

PubMed Disclaimer

Conflict of interest statement

The authors declare no conflict of interest.

Figures

Figure 1
Figure 1
Bifurcation diagrams of (a) logistic; (c) sine; (e) fraction; (g) ICMIC maps; LEs of (b) logistic; (d) sine; (f) fraction; (h) ICMIC maps.
Figure 1
Figure 1
Bifurcation diagrams of (a) logistic; (c) sine; (e) fraction; (g) ICMIC maps; LEs of (b) logistic; (d) sine; (f) fraction; (h) ICMIC maps.
Figure 2
Figure 2
2D trajectories for different 2D chaotic maps: (a) 2D-LSM; (b) 2D-SIM; (c) 2D-SFM; (d) 2D-LSCM; (e) 2D-LSMCL; (f) 2D-LACM.
Figure 2
Figure 2
2D trajectories for different 2D chaotic maps: (a) 2D-LSM; (b) 2D-SIM; (c) 2D-SFM; (d) 2D-LSCM; (e) 2D-LSMCL; (f) 2D-LACM.
Figure 3
Figure 3
Bifurcation diagram for different 2D chaotic maps: (a) 2D-LSM; (b) 2D-SIM; (c) 2D-SFM.
Figure 4
Figure 4
Two LEs for different 2D chaotic maps: (a)LE1 of 2D-LSM; (b)LE1 of 2D-SIM; (c)LE1 of 2D-SFM; (d)LE2 of 2D-LSM; (e)LE2 of 2D-SIM; (f)LE2 of 2D-SFM.
Figure 5
Figure 5
MLE of different chaotic maps.
Figure 6
Figure 6
PEs of different chaotic maps.
Figure 7
Figure 7
The flow chart of the proposed data-hiding algorithm.
Figure 8
Figure 8
Segmentation mask generation process.
Figure 9
Figure 9
Reversible data-hiding results: (a) test1 image; (b) test2 image; (c) test3 image; (d) test4 image; (e) Mask of test1; (f) Mask of test2; (g) Mask of test3; (h) Mask of test4; (i) QR of test1; (j) QR of test2; (k) QR of test3; (l) QR of test4; (m) result of test1; (n) result of test2; (o) result of test3; (p) result of test4.
Figure 10
Figure 10
Decoding result: (a) test1 image; (b) test2 image; (c) test3 image; (d) test4 image; (e) QR of test1; (f) QR of test2; (g) QR of test3; (h) QR of test4; (i) authentication image of test1; (j) authentication image of test2; (k) authentication image of test3; (l) authentication image of test4; (m) PCE of test1; (n) PCE of test2; (o) PCE of test3; (p) PCE of test4.
Figure 11
Figure 11
Histogram analysis: (a) histogram of test1; (b) histogram of encoded test1; (c) histogram of test2; (d) histogram of encoded test2; (e) histogram of test3; (f) histogram of encoded test3; (g) histogram of test4; (h) histogram of encoded test4.
Figure 11
Figure 11
Histogram analysis: (a) histogram of test1; (b) histogram of encoded test1; (c) histogram of test2; (d) histogram of encoded test2; (e) histogram of test3; (f) histogram of encoded test3; (g) histogram of test4; (h) histogram of encoded test4.
Figure 12
Figure 12
Correlation analysis: (a) test1-HVPS; (b) encoded test1-HVPS; (c) test2-HVPS; (d) encoded test2-HVPS; (e) test3-HVPS; (f) encoded test3-HVPS; (g) test4-HVPS; (h) encoded test4-HVPS.
Figure 12
Figure 12
Correlation analysis: (a) test1-HVPS; (b) encoded test1-HVPS; (c) test2-HVPS; (d) encoded test2-HVPS; (e) test3-HVPS; (f) encoded test3-HVPS; (g) test4-HVPS; (h) encoded test4-HVPS.
Figure 13
Figure 13
Encoded pixel ratio.
See this image and copyright information in PMC

Similar articles

See all similar articles

References

    1. Ding D., Wang W., Yang Z., Hu Y., Wang J., Wang M., Niu Y., Zhu H. An n-dimensional modulo chaotic system with expected Lyapunov exponents and its application in image encryption. Chaos Solitons Fractals. 2023;174:113841. doi: 10.1016/j.chaos.2023.113841. - DOI
    1. Cao W., Cai H., Hua Z. n-Dimensional Chaotic Map with application in secure communication. Chaos Solitons Fractals. 2022;163:112519. doi: 10.1016/j.chaos.2022.112519. - DOI
    1. Wu R., Gao S., Wang X., Liu S., Li Q., Erkan U., Tang X. AEA-NCS: An audio encryption algorithm based on a nested chaotic system. Chaos Solitons Fractals. 2022;165:112770. doi: 10.1016/j.chaos.2022.112770. - DOI
    1. Kumar A., Dua M. Audio encryption using two chaotic map based dynamic diffusion and double DNA encoding. Appl. Acoust. 2023;203:109196. doi: 10.1016/j.apacoust.2022.109196. - DOI
    1. Teng L., Wang X., Xian Y. Image encryption algorithm based on a 2D-CLSS hyperchaotic map using simultaneous permutation and diffusion. Inf. Sci. 2022;605:71–85. doi: 10.1016/j.ins.2022.05.032. - DOI

Related information

Grants and funding

LinkOut - more resources

Full text links
MDPI full text link MDPI Free PMC article
Cite
Send To

NCBI Literature Resources

MeSHPMCBookshelfDisclaimer

The PubMed wordmark and PubMed logo are registered trademarks of the U.S. Department of Health and Human Services (HHS). Unauthorized use of these marks is strictly prohibited.


[8]ページ先頭

©2009-2025 Movatter.jp