A 3D discrete memristive chaotic map and its application in image encryption
Abstract
References
Index Terms
- A 3D discrete memristive chaotic map and its application in image encryption
Recommendations
Construction and implementation of discrete memristive hyperchaotic map with hidden attractors and self-excited attractors
AbstractThe investigation of discrete memristor and its application in the discrete map is valuable and meaningful. This paper proposes a new one-dimensional map and couples it with a discrete memristor to construct a memristive hyperchaotic map. The ...
Highlights- A new 2D hyperchaotic map with cosine memristor is presented.
- The proposed map coexists infinite chaotic and point attractors.
- Dynamical analysis and circuit realization of the map are studied.
Study of the dynamical behavior of an Ikeda-based map with a discrete memristor
AbstractIn 1971, Chua suggested that there should be a fourth electrical component in addition to resistor, capacitor and inductor. This new component was proposed to be called “memristor”. Due to lack of commercially available memristors many ...
Highlights- Ikeda map presented chaos through the period doubling and crisis phenomena.
- The ...
Image encryption using 2D Logistic-adjusted-Sine map
With complex properties of ergodicity, unpredictability and sensitivity to initial states, chaotic systems are widely used in cryptography. This paper proposes a two-dimensional Logistic-adjusted-Sine map (2D-LASM). Performance evaluations show that it ...
Comments
Information & Contributors
Information
Published In
Publisher
Association for Computing Machinery
New York, NY, United States
Publication History
Check for updates
Author Tags
Qualifiers
- Research-article
- Research
- Refereed limited
Conference
Acceptance Rates
Contributors
Other Metrics
Bibliometrics & Citations
Bibliometrics
Article Metrics
- 0Total Citations
- 38Total Downloads
- Downloads (Last 12 months)30
- Downloads (Last 6 weeks)4
Other Metrics
Citations
View Options
Get Access
Login options
Check if you have access through your login credentials or your institution to get full access on this article.
Sign inFull Access
View options
View or Download as a PDF file.
PDFeReader
View online with eReader.
eReaderHTML Format
View this article in HTML Format.
HTML Format