Document Type : Research Paper


College Of Computer Science, and Information Technology, University of Anbar, Ramadi 31001, Iraq


Multimedia data encryption is so crucial because the multimedia encryption algorithm needs more time and memory, and it is difficult to implement. Because of this, the hyperchaotic image encryption technique is becoming more and more popular, which uses little memory, time, or energy and offers the highest level of security for low-powered devices. This study offers a comprehensive overview of modern hyperchaotic systems. By focusing on these complex systems' uniqueness and fundamental features, a study of their dynamic behavior is offered. Such systems are now being used more and more in a variety of industries, including finance, secure communication, and encryption, for example. In reality, every field calls for particular performances of unusual complexity. This research then suggests a specific classification based on the crucial hyperchaotic characteristic, Lyapunov exponent, the equilibrium points, dynamical behavior, NPCR, and UACI..


Main Subjects

[1] J. Jin, “An image encryption based on elementary cellular automata,” Opt. Lasers Eng., vol. 50, no. 12, pp. 1836–1843, 2012, doi: 10.1016/j.optlaseng.2012.06.002.
[2] UU. nomor 43 tahun 2007, “On the design of perceptual MPEGVideo encryption algorithms.,”, 2007.
[3]  M. Kaur, S. Singh, and M. Kaur, “Computational Image Encryption Techniques: A Comprehensive Review,” Math. Probl. Eng., vol. 2021, no. i, 2021, doi: 10.1155/2021/5012496.
[4]   Z. N. Abdulhameed, “Transmission of an encryption audio message using chaotic map in a noisy channel,” J. Commun., vol. 14, no. 2, pp. 142–147, 2019, doi: 10.12720/jcm.14.2.142-147.
[5]   A. Kanso, M. Ghebleh, and M. B. Khuzam, “A Probabilistic Chaotic Image Encryption Scheme,” Mathematics, vol. 10, no. 11, Jun. 2022, doi: 10.3390/math10111910.
[6]  A. H. Khaleel and I. Q. Abduljaleel, “Chaotic Image Cryptography Systems: A Review,” Samarra J. Pure Appl. Sci., vol. 3, no. 2, pp. 129–143, 2021, doi: 10.54153/sjpas.2021.v3i2.244.
[7]      Q. Zhang, Y. Yan, Y. Lin, and Y. Li, “Image Security Retrieval Based on Chaotic Algorithm and Deep Learning,” IEEE Access, vol. 10, no. June, pp. 67210–67218, 2022, doi: 10.1109/ACCESS.2022.3185421.
[8]  N. Chaudhary, T. B. Shahi, and A. Neupane, “Secure Image Encryption Using Chaotic, Hybrid Chaotic and Block Cipher Approach,” J. Imaging, vol. 8, no. 6, Jun. 2022, doi: 10.3390/jimaging8060167.
[9]      S. Ahadpour and Y. Sadra, “A Chaos-based Image Encryption Scheme using Chaotic Coupled Map Lattices.”
[10]  H. Liang, G. Zhang, W. Hou, P. Huang, B. Liu, and S. Li, “A novel asymmetric hyperchaotic image encryption scheme based on elliptic curve cryptography,” Appl. Sci., vol. 11, no. 12, 2021, doi: 10.3390/app11125691.
[11]  N. M. Turab, M. Abu-alhaija, H. A. Owida, and J. I. Al-nabulsi, “A Survey On Dna Cryptographic Techniques , Challenges And Future Trends,” vol. 19, no. 2, pp. 7178–7194, 2022.
[12]  A. Abooee and M. R. Jahed-Motlagh, “Identical and nonidentical synchronization of hyperchaotic systems by active backstepping method,” Iran. J. Electr. Electron. Eng., vol. 8, no. 3, pp. 217–226, 2012.
[13]  G. Grass and S. Mascolo, “Synchronizing hyperchaotic systems by observer design,” IEEE Trans. Circuits Syst. II Analog Digit. Signal Process., vol. 46, no. 4, pp. 478–483, 1999, doi: 10.1109/82.755422.
[14]  T. Haibutsu, Y. Nishio, I. Sasase, and S. Mori, “A secret key cryptosystem by iterating a chaotic map,” in Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 1991, vol. 547 LNCS, pp. 127–140. doi: 10.1007/3-540-46416-6_11.
[15] Physical Review Letters, “C O N T R O L OF T H E L O R E N Z C H A O S BY T H E EXACT L I N E A R I Z A T I O N *,” 1990, [Online]. Available: Physical Review Letters
[16]  A. Sabaghian, S. Balochian, and M. Yaghoobi, “Synchronisation of 6D hyper-chaotic system with unknown parameters in the presence of disturbance and parametric uncertainty with unknown bounds,” Conn. Sci., vol. 32, no. 4, pp. 362–383, 2020, doi: 10.1080/09540091.2020.1723491.
[17] H. Chen, EBay, X. Jiang, and Y. Wu, “A Fast Image Encryption Algorithm Based on Improved 6-D Hyper-Chaotic System,” IEEE Access, vol. 10, pp. 116031–116044, 2022, doi: 10.1109/access.2022.3218668.
[18] J. Li and X. Di, “A New Hyperchaotic 4D-FDHN System with Four Positive Lyapunov Exponents and Its Application in Image Encryption,” Entropy, vol. 24, no. 7, pp. 1–28, 2022, doi: 10.3390/e24070900.
[19]  G. A. Gottwald and I. Melbourne, “The 0-1 test for chaos: A review,” Lect. Notes Phys., vol. 915, pp. 221–247, 2016, doi: 10.1007/978-3-662-48410-4_7.
[20] M. M. Maqableh, “Analysis and Design Security Primitives Based on Chaotic Systems for eCommerce,” p. 240, 2001.
[21]  P. K. Rajan and H. C. Reddy, “On the Necessary Conditions for the BIBO Stability of n-D Filters,” IEEE Trans. Circuits Syst., vol. 33, no. 11, p. 1143, 1986, doi: 10.1109/TCS.1986.1085861.
[22]  Zhouyi Hu; Chun-Kit Chan, “A 7-D Hyperchaotic System-Based Encryption Scheme for Secure Fast-OFDM-PON,” Light. Technol., 2018.
[23] X. Gao, J. Mou, S. Banerjee, Y. Cao, L. Xiong, and X. Chen, “An effective multiple-image encryption algorithm based on 3D cube and hyperchaotic map,” J. King Saud Univ. - Comput. Inf. Sci., vol. 34, no. 4, pp. 1535–1551, 2022, doi: 10.1016/j.jksuci.2022.01.017.
[24] F. Masood et al., “A Lightweight Chaos-Based Medical Image Encryption Scheme Using Random Shuffling and XOR Operations,” Wirel. Pers. Commun., no. 0123456789, 2021, doi: 10.1007/s11277-021-08584-z.
[25] S. A. A. Mehdi and A. A. Kadhim, “Design and analysis of a novel five-dimensional hyper-chaotic system,” ICIC Express Letter. Part B Appl., vol. 11, no. 1, pp. 103–110, 2020, doi: 10.24507/icicelb.11.01.103.
[26] T. Nestor et al., “A New 4D Hyperchaotic System with Dynamics Analysis, Synchronization, and Application to Image Encryption,” Symmetry (Basel)., vol. 14, no. 2, pp. 1–23, 2022, doi: 10.3390/sym14020424.
[27] T. Gopalakrishnan and S. Ramakrishnan, “Image Encryption Using Hyper-chaotic Map for Permutation and Diffusion by Multiple Hyper-chaotic Maps,” Wirel. Pers. Commun., vol. 109, no. 1, pp. 437–454, 2019, doi: 10.1007/s11277-019-06573-x.
[28] A. Arab, M. J. Rostami, and B. Ghavami, “An image encryption method based on chaos system and AES algorithm,” J. Supercomput., vol. 75, no. 10, pp. 6663–6682, Oct. 2019, doi: 10.1007/s11227-019-02878-7.
[29] L. Teng, X. Wang, F. Yang, and Y. Xian, “Color image encryption based on cross 2D hyperchaotic map using combined cycle shift scrambling and selecting diffusion,” Nonlinear Dyn., vol. 105, no. 2, pp. 1859–1876, 2021, doi: 10.1007/s11071-021-06663-1.
[30]  J. Ferdush, M. Begum, and M. S. Uddin, “Chaotic Lightweight Cryptosystem for Image Encryption,” Adv. Multimed., vol. 2021, 2021, doi: 10.1155/2021/5527295.
[31]  B. H. Jasim, K. H. Hassan, and K. M. Omran, “A new 4-D hyperchaotic hidden attractor system: Its dynamics, coexisting attractors, synchronization and microcontroller implementation,” Int. J. Electr. Comput. Eng., vol. 11, no. 3, pp. 2068–2078, 2021, doi: 10.11591/ijece.v11i3.pp2068-2078.
[32] D. Baleanu, S. S. Sajjadi, J. H. Asad, A. Jajarmi, and E. Estiri, “Hyperchaotic behaviors, optimal control, and synchronization of a nonautonomous cardiac conduction system,” Adv. Differ. Equations, vol. 2021, no. 1, 2021, doi: 10.1186/s13662-021-03320-0.
[33] X. Gao, “Image encryption algorithm based on 2D hyperchaotic map,” Opt. Laser Technol., vol. 142, no. March, p. 107252, 2021, doi: 10.1016/j.optlastec.2021.107252.
[34] E. Al Solami, M. Ahmad, C. Volos, M. N. Doja, and M. M. Sufyan Beg, “A new hyperchaotic system-based design for efficient bijective substitution-boxes,” Entropy, vol. 20, no. 7, pp. 1–17, 2018, doi: 10.3390/e20070525.
[35]  H. Saeed, H. E. Ahmed, T. O. Diab, H. L. Zayed, H. N. Zaky, and W. I. Elsobky, “Evaluation of the Most Suitable Hyperchaotic Map in S-Box Design Used in Image Encryption,” no. October, 2022.
[36]A. Alhudhaif, M. Ahmad, A. Alkhayyat, N. Tsafack, A. K. Farhan, and R. Ahmed, “Block Cipher Nonlinear Confusion Components Based on New 5-D Hyperchaotic System,” IEEE Access, vol. 9, pp. 87686–87696, 2021, doi: 10.1109/ACCESS.2021.3090163.
[37] N. Chaudhary, T. B. Shahi, and A. Neupane, “Secure Image Encryption Using Chaotic, Hybrid Chaotic and Block Cipher Approach,” J. Imaging, vol. 8, no. 6, 2022, doi: 10.3390/jimaging8060167.
 [39] G. Chen and T. Ueta, “‘Yet another chaotic attractor,’” 1999, [Online]. Available: G. Chen and T. Ueta, “Yet another chaotic attractor,” Int. J. Bifurcation%0AChaos, vol. 9, no. 7, pp. 1465–1466, Jul. 1999
[40] Y. Hui and H. Liu, “A DNA image encryption based on a new hyperchaotic system,” 2021.
[41] B. Ge, G. Chen, X. Chen, and Z. Shen, “Efficient Hyperchaotic Image Encryption Algorithm Based on a Fast Key Generation Method and Simultaneous Permutation-Diffusion Structure,” Secur. Commun. Networks, vol. 2022, 2022, doi: 10.1155/2022/2237525.
[42] K. M. Hosny, S. T. Kamal, M. M. Darwish, and G. A. Papakostas, “New image encryption algorithm using hyperchaotic system and fibonacci q-matrix,” Electron., vol. 10, no. 9, 2021, doi: 10.3390/electronics10091066.
[43] J. Wang and L. Liu, “A Novel Chaos-Based Image Encryption Using Magic Square Scrambling and Octree Diffusing,” Mathematics, vol. 10, no. 3, 2022, doi: 10.3390/math10030457.
[44] C. Zhao, T. Wang, H. Wang, Q. Du, and C. Yin, “A Novel Image Encryption Algorithm by Delay Induced Hyper-chaotic Chen System,” J. Imaging Sci. Technol., vol. 0, no. 0, pp. 010501-1-010501-15, 2023, doi: 10.2352/j.imaging sci.technol.2023.67.1.010501.
[45] Y. Wu, J. P. Noonan, and S. Again, “NPCR and UACI Randomness Tests for Image Encryption,” Cyberjournals. Com, no. April 2011, 2011, [Online]. Available: http://www.cyberjournals. com/Papers/Apr2011/05.pd f
[46] Y. Hui, H. Liu, and P. Fang, “A DNA image encryption based on a new hyperchaotic system,” Multimed. Tools Appl., 2021, doi: 10.1007/s11042-021-10526-7.
[47] A. M. Awad, “Hybrid Image Encryption Algorithms based on Chaotic Theory,” 2016.