Next Article in Journal
Image Clustering with Optimization Algorithms and Color Space
Next Article in Special Issue
A New Two-Dimensional Map with Hidden Attractors
Previous Article in Journal
A Lenient Causal Arrow of Time?
Previous Article in Special Issue
A New Chaotic System with a Self-Excited Attractor: Entropy Measurement, Signal Encryption, and Parameter Estimation
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

A Novel Algorithm to Improve Digital Chaotic Sequence Complexity through CCEMD and PE

1
Electrical Engineering College, Heilongjiang University, Harbin 150080, China
2
Department of Electronic and Information Engineering, Polytechnic University, Hong Kong 999077, China
*
Author to whom correspondence should be addressed.
Submission received: 18 March 2018 / Revised: 10 April 2018 / Accepted: 12 April 2018 / Published: 18 April 2018

Abstract

:
In this paper, a three-dimensional chaotic system with a hidden attractor is introduced. The complex dynamic behaviors of the system are analyzed with a Poincaré cross section, and the equilibria and initial value sensitivity are analyzed by the method of numerical simulation. Further, we designed a new algorithm based on complementary ensemble empirical mode decomposition (CEEMD) and permutation entropy (PE) that can effectively enhance digital chaotic sequence complexity. In addition, an image encryption experiment was performed with post-processing of the chaotic binary sequences by the new algorithm. The experimental results show good performance of the chaotic binary sequence.

1. Introduction

With the rapid development of computer technology and network communication technology, information has become an important asset in today’s society. Therefore, the confidentiality of personal information has become more and more essential. For example, internet data transmission and confidential phone and bank cards require adequate security and confidentiality measures. Therefore, the study of secret communication and cryptography has become an urgent issue. At present, the chaotic signal has benefits such as intrinsic stochasticity, initial value sensitivity, and synchronizing characteristics. Therefore, some traditional chaotic systems with a self-excited attractor are widely used in secret communication and have significant advantages [1,2,3,4,5]. Further, in recent years a hidden chaos attractor has been found, which makes the development of a high-dimensional nonlinear system an attractive challenge [6,7,8,9]. At present, most scholars primarily study the dynamic characteristics of hidden attractors. In this paper, we aimed to study chaos with a hidden attractor from the perspective of secure communication and cryptography. Chaos with a hidden attractor is used as a digital chaotic sequence generator with the purpose of encrypting private data. However, in the process of quantization, calculation precision is a crucial factor that degenerates the dynamic characteristics of a chaotic system so that the complexity of a digital chaotic sequence does not satisfy the requirements of information security and cryptography [10,11]. Aiming to solve this problem, Du [12] put forward an algorithm to improve the performance of chaotic binary sequences based on Karhunen–Loève (K–L) transformation. Zhou [13] proposed to scramble the chaotic binary sequence by m sequence in order to improve the complexity of the digital chaotic sequence. Cernak [14] came up with a method to improve the randomness and periodic length of the chaotic binary sequence by perturbing parameters of the chaotic system. Based on the above analysis, these algorithms improve the performance and complexity of digital chaotic sequences by reconstructing the binary sequence method. In this paper, we attempted to generate high complexity in the chaotic sequence based on digital signal processing technology.
Empirical mode decomposition (EMD) in digital signal processing has been extensively applied in nonlinear signal processing [15,16,17,18]. EMD was first proposed by Huang et al. [19,20,21]. It is an effective tool for analyzing nonlinear and non-stationary signals. The EMD method is closely related to the corresponding Hilbert transform method. Through the decomposition of nonlinear and non-stationary signals, a series of intrinsic mode functions (IMFs) are obtained, which makes each IMF a stable signal for narrowband [22]. The IMFs play a crucial role in the analysis of non-stationary or nonlinear signals. However, there are some problems with the EMD method, of which the main one is mode mixing. Complementary ensemble empirical mode decomposition (CEEMD) can effectively restrain the mode mixing of EMD at a certain level [23,24,25]. Based on the above considerations, we proposed a new algorithm which combines CEEMD with permutation entropy (PE) [26] to effectively improve the complexity of the digital chaotic sequence.
The rest of this paper is organized as follows: Section 2 describes a hidden chaos attractor with no equilibria. The dynamic characteristics of a complex chaotic system are studied by means of numerical simulation and theoretical analysis. Section 3 proposes a new algorithm to improve the complexity of the digital chaotic sequence. Section 4 considers image encryption with post-processing of the chaotic binary sequences by the algorithm outlined in Section 3. The security of the encrypted image is analyzed through key sensitivity, information entropy, and histogram analysis. Section 5 summarizes the discussions of this paper.

2. The Characteristic Analysis of a Chaotic System

In this section, a system can be expressed as the following set of differential equations:
{ x ˙ = y y ˙ = c x + z z ˙ = a y 2 + x z b
where a ,   b ,   c are real parameters. When a = 2 ,   b = 0.35 ,   c = 1 and the initial value is ( 1.6 ,   0.82 ,   1.9 ) , the system displays a single-scroll chaotic system [27]. Different projections of the chaotic attractor for this system are shown in Figure 1.
Equilibria of the chaotic system can be obtained by solving x ˙ = y ˙ = z ˙ = 0 . The equation is shown as follows:
{ x ˙ = 0 y ˙ = 0 z ˙ = 0 { 0 = y 0 = c x + z 0 = a y 2 + x z b ,
However, it is easy to see in the chaotic system that when a = 2 ,   b = 0.35 ,   c = 1 , Equation (2) has no solution. Therefore, the chaotic system has no equilibria in this case. For the classification of chaotic attractors, if the basin of chaotic attraction intersects with any open neighborhood of an equilibrium, this attractor is called a self-excited attractor. However, if the basin of chaotic attraction is not connected with any equilibrium, this attractor is called a hidden attractor [28,29,30]. Therefore, the above chaotic system displays a hidden attractor in this case because it is a system with no equilibria. In addition, the Poincaré map of the system can be obtained in the P = { y = 0 | ( x , z ) R 2 } plane. For the above three-dimensional chaotic system ( x , y , z ) R 3 , all ( x , 0 , z ) points were calculated by a MATLAB (R2012a, MathWorks, Natick, MA, USA) numerical simulation to obtain the Poincaré map. The Poincaré cross section projected in x-z is shown in Figure 2. The Poincaré cross section indicates that the system is a chaotic system through some dense points. Further, for the above chaotic system, the maximal Lyapunov exponent was calculated by a MATLAB numerical simulation. The maximal Lyapunov exponent can indicate the degree of the average divergence of the chaotic trajectory. If the exponent is more than zero, it denotes that the system has the sensitivity of the initial value. According to the result of the MATLAB calculation, this exponent is 0.081. For instance, the time series of x generated from two very close initial values ( 1.6 , 0.82 , 1.9 ) and ( 1.601 , 0.82 , 1.9 ) are shown in Figure 3, with the purpose of verifying the initial value sensitivity for the chaotic system. Figure 3 is plotted by the MATLAB numerical simulation. According to the Differential Equation (1), the “t” presents the number of iterations. As can be seen from Figure 3, the chaotic system is sensitive dependence on initial value.

3. A New Algorithm to Improve the Complexity of Digital Chaotic Sequences

In this section, we designed a novel algorithm based on CEEMD that can effectively enhance the complexity of digital chaotic sequences. CEEMD can adaptively decompose a non-stationary or non-linear signal into different IMFs. The oscillating frequency of each IMF decreases according to the decomposition order of each IMF. We present a new algorithm to enhance the complexity of chaotic discrete sequences by combining CEEMD with permutation entropy (PE). At the same time, the digital chaotic sequences are converted into chaotic binary sequences through a quantitative method with the purpose of encrypting images or private data. The essential novelty of this algorithm is to eliminate all low complexity IMF components in a chaotic time series, with the purpose of improving the randomness and complexity of the sequence.

3.1. The Basic Principles of EMD

Empirical mode decomposition (EMD) is an adaptive method to decompose non-stationary and non-linear signals into a set of IMFs (intrinsic mode functions) and a residual component. Each IMF should satisfy the following two conditions: (1) For the whole data set, the number of zero crossing and extrema must either be equal or differ at most by one. (2) For any data point, the mean value of the upper and lower envelope determined by the local maxima and minima is zero [31]. The implementation process of the EMD method is shown as follows:
  • All the local maxima and minima of the signal s ( t ) are calculated to construct the upper envelopes e + ( t ) and lower envelopes e ( t ) by the cubic spline interpolation. Further, m 11 ( t ) represents the mean of the upper and lower envelopes and is shown as follows:
    m 11 ( t ) = e + ( t ) + e ( t ) 2
    s ( t ) m 11 ( t ) = h 11 ( t )
    where h 11 ( t ) denotes a temporary signal. If h 11 ( t ) satisfies the above two crucial factors, it is a first-order IMF component. Otherwise, h 11 ( t ) will serve as an initial signal and the above procedures are repeated until the h 1 k ( t ) is an IMF and sets the h 1 k ( t ) as c 1 ( t ) .
    c 1 ( t ) = h 1 k ( t )
  • Next, the first-order IMF has a high frequency, which can be extracted from s ( t ) by
    s ( t ) c 1 ( t ) = R 1 ( t )
    R 1 ( t ) is processed as the new signal and the above procedures are repeated so that the other IMFs can be generated R i ( t ) , i = 2 , , n .
  • When the residual R n ( t ) becomes a monotonic function or constant, EMD decomposition is terminated. The s ( t ) can finally be shown as follows:
    s ( t ) = i = 1 n c i ( t ) + R n ( t )
    Thus, a non-linear signal s ( t ) can be decomposed into n IMFs and a residual R n ( t ) . However, there are some problems with the EMD method, and one of these is mode mixing. Generally speaking, each IMF component represents a specific physical quantity. If an IMF component contains a large number of different frequencies of signals then this phenomenon is called mode mixing, which seriously affects the performance of EMD decomposition. Aiming to resolve this issue, the complementary ensemble empirical mode decomposition (CEEMD) method can effectively restrain mode mixing of EMD at a certain level. The CEEMD method was used by adding two opposite white noise signals to an original signal s ( t ) , and to the adopted EMD, with the purpose of restraining mode mixing.

3.2. The Implementation of the New Algorithm

First, suppose x ( t ) is a time series of chaotic systems. The white noise signal w i ( t ) and w i ( t ) with a zero mean value are added to the signal x ( t ) , and the following equation is defined:
{ x i + ( t ) = x ( t ) + a i w i ( t ) x i ( t ) = x ( t ) a i w i ( t ) 1 i N p ,
where w i ( t ) shows the added white noise signal, and a i and N p denote the amplitude and number of the noise signals, respectively. In addition, the variance of the white noise is 1. { I 1 i + ( t ) } and { I 1 i ( t ) } ( 1 i N p ) represent the first order component sequence, which can be generated by decomposing x i + ( t ) and x i ( t ) with the EMD method. The mean value of all components is defined as follows:
I 1 ( t ) = 1 2 N i = 1 N p [ I 1 i + ( t ) + I 1 i ( t ) ] .
I 1 ( t ) is sampled to generate a discrete time sequence I 1 ( n ) . Then, it is checked whether I 1 ( n ) is a low complexity discrete sequence based on the PE value. The PE is widely applied in the measurement of discrete sequence complexity because of its high robustness and rapid and simple algorithm characteristics. PE can be described as follows:
1. For a discrete time sequence X N = { X 1 , X 2 , X N } , where m and τ represent the embedding dimension and a delay factor, respectively, the sequence X N can be reconstructed as
X ( n ) , X ( n + τ ) , , X ( n + ( m 1 ) τ ) 1 n N m + 1 ,
2. Each sequence of Equation (10) is placed depending on an ascending order.
X ( n + ( k 1 1 ) τ ) X ( n + ( k 2 1 ) τ ) X ( n + ( k m 1 ) τ ) ,
3. Further, π n = { k 1 , k 2 , , k m } displays the original position index of each element, which is one of the possible order types of all m ! permutations. Suppose P g is a symbol permutation and g = 1 w P g = 1 , where g = 1 , 2 , , w ,   w m ! . Then, PE H p is defined as
H p = g = 1 w P g ln P g .
When H p = 1 / m ! , then H p obtains the maximum value ln ( m ! ) . Further, the normalized PE h p is defined as h p = H p / ln ( m ! ) .
Based on a large amount of MATLAB simulation data, when the PE value of the I 1 ( n ) is less than θ [ 0.5 , 0.6 ] , the amplitude of I 1 ( n ) changes slowly and takes on a lower frequency. After this, the above method is used to find all the low complexity signals in the IMFs. All low complexity IMF signals are separated from the target signal x ( t ) to generate the signal r ( t ) . Then, the r ( t ) can be written as
r ( t ) = x ( t ) j = 1 p I j ( t ) .
where p is the sum total of low complexity signals in the IMFs.

3.3. Experimental Results

The time series ( x ( t ) , y ( t ) , z ( t ) ) are generated from the chaotic system as experimental data. The generated x ( t ) , y ( t ) and z ( t ) time series signals are shown in Figure 4.
Next, these chaotic time series are processed by the above method. All the low complexity signals in the IMFs are shown in Figure 5a–c, where RS (Logogram of Residual R n ( t ) ) is a residual signal. As can be seen from the figure, the amplitude of these IMF signals changes slowly with time and the frequency of the signals reduces. These IMF components are sampled to generate discrete time sequences with the purpose of calculating the PE value. For the x ( t ) , y ( t ) and z ( t ) time series, the calculation results of the PE value of each IMF component are shown in Table 1. This table shows that the PE values of these IMFs are less than θ [ 0.5 , 0.6 ] . Therefore, based on the essential novelty of the above method, these IMFs will be removed from the original chaotic time series.
The time series r x ( t ) , r y ( t ) and r z ( t ) will be generated by removing the low complexity IMF components from the original signals in x ( t ) , y ( t ) and z ( t ) . The time series r x ( t ) , r y ( t ) and r z ( t ) are shown in Figure 6. Moreover, these time series are also sampled to generate discrete time sequences with the purpose of calculating the PE values, and Figure 7 denotes the comparison of the PE values to the original signals x ( t ) , y ( t ) , z ( t ) and the post-processing signals r x ( t ) , r y ( t ) , r z ( t ) . It can be seen from Figure 7 that the entropy value of the latter is significantly greater than that of the former and shows a good level of complexity. These high-complexity discrete time sequences can be quantized to generate a good performance in the chaotic binary sequences. These binary sequences will serve as useful key stream sequences of the stream cipher to encrypt private data.

3.4. The Generation and Performance Test of the Chaotic Binary Sequence

The three outputs r x ( t ) , r y ( t ) , and r z ( t ) are quantized by the interval quantization method, and its mathematical equation is shown below.
Q 0 1 ( t ) = { 1 , x ( t ) k = 0 2 m 1 D 2 k m 0 , x ( t ) k = 0 2 m 1 D 2 k + 1 m ; k = 0 , 1 , 2 , ,
where Q 0 1 ( t ) and m are a quantized chaotic binary sequence and arbitrary integer, and D 0 m , D 1 m , D 2 m are 2 m consecutive equal intervals on the range of the real value of x ( t ) . If the real value falls on the odd range the result of quantization is 0 , otherwise it is 1 . r x ( t ) , r y ( t ) , and r z ( t ) are quantized as Q x ( t ) , Q y ( t ) , and Q z ( t ) through the interval quantization method. Then, the NIST-800-22 test suite is performed to evaluate the performance of the random binary sequences Q x ( t ) , Q y ( t ) , and Q z ( t ) . The NIST-800-22 is composed of 16 different tests, including approximate entropy, linear complexity, and the discrete Fourier transform tests [32,33]. If the p-value of the test is greater than 0.01, the test is successful. The NIST-800-22 test results are shown in Table 2. As can be seen from the table, the chaotic random sequences Q x ( t ) , Q y ( t ) , and Q z ( t ) passed all the tests. These chaotic sequences can be used in high security fields such as network security and multimedia encryption.

4. Image Encryption with a Chaotic Binary Sequence

This subsection describes the experiments used to demonstrate the performance of the chaotic binary sequence by encrypting images. The Lena and Baboon images, with a size of 256 × 256 , are encrypted by the above chaotic random sequences— Q x ( t ) , Q y ( t ) , and Q z ( t ) . Then, Q x ( t ) , Q y ( t ) , and Q z ( t ) serve as the key stream sequences of the stream cipher with the purpose of encrypting the R, G, and B components of the color images.

4.1. Key Sensitivity

The sensitivity of chaos to the initial value can support the effective avoidance of tentative attacks. Using the Lena and Baboon images with a size of 256 × 256 as examples, Figure 8a,d shows the plain-images, while the cipher-images are given in Figure 9b,e. However, a 10−5 change of the initial value will lead to incorrect decryption results, as shown in Figure 9c,f. The experimental results show that the chaotic binary sequence shows high key sensitivity.

4.2. Histogram Analysis

The image histogram can be approximated as the density function of the gray value, which is an important indicator in the analysis of an image’s statistical properties [34]. The histogram test is shown in Figure 9, and the horizontal and vertical coordinates of the histogram represent the pixel values and number of pixel values, respectively. Figure 9 show that the gray histogram of the encrypted image is relatively uniform, which indicates that the security performance of this key sequence is relatively high, and the image is not easily able to be tampered with and decrypted during transmission.

4.3. Correlation Analysis of Adjacent Pixels

Generally speaking, the smaller the adjacent pixel correlation of the cipher-image, the more obvious the effect of resisting statistical attack [35]. The mathematical equation can be shown as follows:
ρ x y = cov ( x , y ) D ( x ) D ( y ) .
where cov ( x , y ) = 1 N i = 1 N ( x i E ( x ) ) ( y i E ( y ) ) , D ( x ) = 1 N i = 1 N ( x i E ( x ) ) 2 , E ( x ) = 1 N i = 1 N x i , xi and yi represent the different gray values of two adjacent pixels and N denotes the number of randomly selected adjacent pixels.
The above equation was used and some pairs of adjacent pixels in different directions were randomly chosen, and the test results are listed in Table 3. It can be seen from the experimental data that the correlation of adjacent pixels of a cipher-image tends to be zero.

4.4. Information Entropy Analysis

Information entropy can reflect the randomness of the information in images, namely the uncertainty of the distribution of pixel values in a cipher-image. Its mathematical equation is shown below [36].
H ( ϕ ) = i = 0 2 L 1 p ( ϕ i ) log 2 1 p ( ϕ i ) .
where L is the number of bits required to store each pixel value, and p(ϕi) presents the probability of the symbol ϕi. When the probability of each symbol ϕi is equal, the information entropy (H(ϕ) = 8) is at its largest. When the information entropy is closer to 8, the gray value tends to be distributed randomly. Table 4 provides a comparison of this data with other experiments. This comparison shows that the information entropy of our method is closer to 8. Therefore, it can effectively resist information entropy attacks.

5. Discussion

Some traditional chaotic systems with a self-excited attractor have been widely used in secret communication. However, for chaotic systems with hidden attractors, most of the current research has focused on studying the dynamic characteristics of the system rather than its application in the field of information security. Therefore, in this paper, we aimed to study chaos with a hidden attractor from the perspective of secure communication and data encryption. First, we introduced the dynamic characteristics of a chaotic system with hidden attractors by means of a numerical simulation and theoretical analysis, including equilibria, a Poincaré cross section, and initial value sensitivity. After that, a new algorithm was designed to enhance the complexity of digital chaotic sequences with the purpose of satisfying the requirements of data encryption. The essential novelty of the algorithm is to eliminate all low complexity IMF components of a chaotic time series by using digital signal processing technology. PE value comparisons between the original signal and post-processing signal show the performance of the algorithm is good. In addition, the NIST-800-22 test was performed to demonstrate the randomness and complexity of the chaotic binary sequence. The chaotic binary sequence can serve as a good key stream sequence of a stream cipher to encrypt private data. Furthermore, an image encryption experiment was undertaken to show the security of the above method. However, some weaknesses in this technique remain, and we believe that the new algorithm should be optimized in operation efficiency.

Acknowledgments

This work was supported by the Natural Science Foundation of China (No. 61471158) and the “modern sensing technology” innovation team project of Heilongjiang province (No. 2012TD007).

Author Contributions

Chunlei Fan conceived and wrote the paper. Zhigang Xie gave some theoretical guidance. Chunlei Fan and Qun Ding contributed to the MATLAB numerical simulation. All authors have read and approved the final manuscript.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Xu, H.; Tong, X.J.; Meng, X.W. An efficient chaos pseudo-random number generator applied to video encryption. Optik 2016, 127, 9305–9319. [Google Scholar] [CrossRef]
  2. Wang, Q.X.; Yu, S.M.; Li, C.Q.; Lu, J.H.; Fang, X.L.; Guyeux, C.; Bahi, J.M. Theoretical Design and FPGA-Based Implementation of Higher-Dimensional Digital Chaotic Systems. IEEE Trans. Circuits Syst. I 2016, 63, 401–412. [Google Scholar] [CrossRef]
  3. Valli, D.; Ganesan, K. Chaos based video encryption using maps and Ikeda time delay system. Eur. Phys. J. Plus 2017, 132, 542. [Google Scholar] [CrossRef]
  4. Vaidyanathan, S.; Akgul, A.; Kacar, S.; Cavusoglu, U. A new 4-D chaotic hyperjerk system, its synchronization, circuit design and applications in RNG, image encryption and chaos-based steganography. Eur. Phys. J. Plus 2018, 133, 46. [Google Scholar] [CrossRef]
  5. Pan, J.; Ding, Q.; Du, B.X. A New Improved Scheme of Chaotic Masking Secure Communication Based on Lorenz System. Int. J. Bifurc. Chaos 2012, 22, 1250125. [Google Scholar] [CrossRef]
  6. Ren, S.L.; Panahi, S.; Rajagopal, K.; Akgul, A.; Pham, V.T.; Jafari, S. A New Chaotic Flow with Hidden Attractor: The First Hyperjerk System with No Equilibrium. Z. Naturforsch. A 2018, 73, 239–249. [Google Scholar] [CrossRef]
  7. Kamal, N.K.; Varshney, V.; Shrimali, M.D.; Prasad, A.; Kuznetsov, N.V.; Leonov, G.A. Shadowing in hidden attractors. Nonlinear Dyn. 2018, 91, 2429–2434. [Google Scholar] [CrossRef]
  8. Jafari, S.; Pham, V.T.; Golpayegani, S.M.R.H.; Moghtadaei, M.; Kingni, S.T. The Relationship Between Chaotic Maps and Some Chaotic Systems with Hidden Attractors. Int. J. Bifurc. Chaos 2016, 26, 1650211. [Google Scholar] [CrossRef]
  9. Dudkowski, D.; Jafari, S.; Kapitaniak, T.; Kuznetsov, N.V.; Leonov, G.A.; Prasad, A. Hidden attractors in dynamical systems. Phys. Rep. 2016, 637, 1–50. [Google Scholar] [CrossRef]
  10. Zhang, H.; Xiang, S.Y.; Zhang, Y.H.; Guo, X.X. Complexity-enhanced polarization-resolved chaos in a ring network of mutually coupled vertical-cavity surface-emitting lasers with multiple delays. Appl. Opt. 2017, 56, 6728–6734. [Google Scholar] [CrossRef] [PubMed]
  11. Rontani, D.; Mercier, E.; Wolfersberger, D.; Sciamanna, M. Enhanced complexity of optical chaos in a laser diode with phase-conjugate feedback. Opt. Lett. 2016, 41, 4637–4640. [Google Scholar] [CrossRef] [PubMed]
  12. Du, B.X.; Geng, X.L.; Chen, F.Y.; Pan, J.; Ding, Q. Generation and Realization of Digital Chaotic Key Sequence Based on Double K-L Transform. Chin. J. Electron. 2013, 22, 131–134. [Google Scholar]
  13. Zhou, H.; Ling, X.T. Realizing Finite Precision Chaotic Systems via Perturbation of m-Sequences. Acta Electron. Sin. 1997, 25, 95–97. [Google Scholar]
  14. Cernak, J. Digital generators of chaos. Phys. Lett. A 1996, 214, 151–160. [Google Scholar] [CrossRef]
  15. Liu, D.; Zeng, H.T.; Xiao, Z.H.; Peng, L.H.; Malik, O.P. Fault diagnosis of rotor using EMD thresholding-based de-noising combined with probabilistic neural network. J. Vibroeng. 2017, 19, 5920–5931. [Google Scholar]
  16. Li, J.L.; Lindemann, J.; Egelhaaf, M. Local motion adaptation enhances the representation of spatial structure at EMD arrays. PLoS Comput. Biol. 2017, 13, e1005919. [Google Scholar] [CrossRef] [PubMed]
  17. Su, J.S.; Wang, Y.Q.; Yang, X.Y.; Wang, X.F. Enhancement of Weak Lidar Signal Based on Variable Frequency Resolution EMD. IEEE Photonic Technol. Lett. 2016, 28, 2882–2885. [Google Scholar] [CrossRef]
  18. Singh, D.S.; Zhao, Q. Pseudo-fault signal assisted EMD for fault detection and isolation in rotating machines. Mech. Syst. Signal Process. 2016, 81, 202–218. [Google Scholar] [CrossRef]
  19. Huang, N.E.; Wu, Z.H. A review on Hilbert-Huang transform: Method and its applications to geophysical studies. Rev. Geophys. 2008, 46, 1–23. [Google Scholar] [CrossRef]
  20. Mandic, D.P.; Rehman, N.U.; Wu, Z.H.; Huang, N.E. Empirical Mode Decomposition-Based Time-Frequency Analysis of Multivariate Signals. IEEE Signal Process. Mag. 2013, 30, 74–86. [Google Scholar] [CrossRef]
  21. Tsai, P.H.; Lin, C.; Tsao, J.; Lin, P.F.; Wang, P.C.; Huang, N.E.; Lo, M.T. Empirical mode decomposition based detrended sample entropy in electroencephalography for Alzheimer’s disease. J. Neurosci. Methods 2012, 210, 230–237. [Google Scholar] [CrossRef] [PubMed]
  22. Zhang, X.; Liu, Z.W.; Miao, Q.; Wang, L. An optimized time varying filtering based empirical mode decomposition method with grey wolf optimizer for machinery fault diagnosis. J. Sound Vib. 2018, 418, 55–78. [Google Scholar] [CrossRef]
  23. Xu, Y.; Zhang, M.; Zhu, Q.; He, Y. An improved multi-kernel RVM integrated with CEEMD for high-quality intervals prediction construction and its intelligent modeling application. Chemom. Intell. Lab. Syst. 2017, 171, 151–160. [Google Scholar] [CrossRef]
  24. Vrochidou, E.; Alvanitopoulos, P.; Andreadis, I.; Elenas, A. Artificial accelerograms composition based on the CEEMD. Trans. Inst. Meas. Control 2016, 40, 239–250. [Google Scholar] [CrossRef]
  25. Jia, J.; Goparaju, B.; Song, J.L.; Zhang, R.; Westover, M.B. Automated identification of epileptic seizures in EEG signals based on phase space representation and statistical features in the CEEMD domain. Biomed. Signal Process. Control 2017, 38, 148–157. [Google Scholar] [CrossRef]
  26. Bandt, C.; Pompe, B. Permutation Entropy: A Natural Complexity Measure for Time Series. Phys. Rev. Lett. 2002, 88, 174102. [Google Scholar] [CrossRef] [PubMed]
  27. Yuan, F.; Wang, G.Y.; Wang, X.W. Extreme multistability in a memristor-based multi-scroll hyper-chaotic system. Chaos 2016, 26, 507–519. [Google Scholar] [CrossRef] [PubMed]
  28. Leonov, G.A.; Kuznetsov, N.V.; Mokaev, T.N. Homoclinic orbits, and self-excited and hidden attractors in a Lorenz-like system describing convective fluid motion. Eur. Phys. J. Spec. Top. 2015, 224, 1421–1458. [Google Scholar] [CrossRef]
  29. Kuznetsov, N.V.; Leonov, G.A.; Mokaev, T.N.; Prasad, A.; Shrimali, M.D. Finite-time Lyapunov dimension and hidden attractor of the Rabinovich system. Nonlinear Dyn. 2017, 92, 267–285. [Google Scholar] [CrossRef]
  30. Leonov, G.A.; Kuznetsov, N.V. Hidden Attractors in Dynamical Systems from Hidden Oscillations in Hilbert–Kolmogorov, Aizerman, and Kalman Problems to Hidden Chaotic Attractor in Chua Circuits. Int. J. Bifurc. Chaos 2014, 23, 1330002. [Google Scholar] [CrossRef]
  31. Li, Y.; Xu, M.; Wei, Y.; Huang, W. An improvement EMD method based on the optimized rational Hermite interpolation approach and its application to gear fault diagnosis. Measurement 2015, 63, 330–345. [Google Scholar] [CrossRef]
  32. Liu, L.F.; Miao, S.X. The complexity of binary sequences using logistic chaotic maps. Complexity 2016, 21, 121–129. [Google Scholar] [CrossRef]
  33. Nian-Sheng, L. Pseudo-randomness and complexity of binary sequences generated by the chaotic system. Commun. Nonlinear Sci. 2011, 16, 761–768. [Google Scholar] [CrossRef]
  34. Murillo-Escobar, M.A.; Cruz-Hernandez, C.; Abundiz-Perez, F.; Lopez-Gutierrez, R.M.; Del Campo, O.R.A. A RGB image encryption algorithm based on total plain image characteristics and chaos. Signal Process. 2015, 109, 119–131. [Google Scholar] [CrossRef]
  35. Wang, Y.; Lei, P.; Yang, H.Q.; Cao, H.Y. Security analysis on a color image encryption based on DNA encoding and chaos map. Comput. Electr. Eng. 2015, 46, 433–446. [Google Scholar] [CrossRef]
  36. Ye, G.; Pan, C.; Huang, X.; Zhao, Z.; He, J. A Chaotic Image Encryption Algorithm Based on Information Entropy. Int. J. Bifurc. Chaos 2018, 28, 1850010. [Google Scholar] [CrossRef]
  37. Liu, H.J.; Kadir, A.; Sun, X.B. Chaos-based fast colour image encryption scheme with true random number keys from environmental noise. IET Image Process. 2017, 11, 324–332. [Google Scholar] [CrossRef]
  38. Liu, H.J.; Wang, X.Y. Color image encryption based on one-time keys and robust chaotic maps. Comput. Math. Appl. 2010, 59, 3320–3327. [Google Scholar] [CrossRef]
Figure 1. The different projections of chaotic attractor with: (a) x-y; (b) x-z; (c) y-z.
Figure 1. The different projections of chaotic attractor with: (a) x-y; (b) x-z; (c) y-z.
Entropy 20 00295 g001aEntropy 20 00295 g001b
Figure 2. Poincaré map in the x-z plane.
Figure 2. Poincaré map in the x-z plane.
Entropy 20 00295 g002
Figure 3. Initial value sensitivity for the time series x with the initial values (−1.6, 0.82, 1.9) and (−1.601, 0.82, 1.9).
Figure 3. Initial value sensitivity for the time series x with the initial values (−1.6, 0.82, 1.9) and (−1.601, 0.82, 1.9).
Entropy 20 00295 g003
Figure 4. Chaotic time series with x ( t ) (blue color), y ( t ) (green color), and z ( t ) (red color).
Figure 4. Chaotic time series with x ( t ) (blue color), y ( t ) (green color), and z ( t ) (red color).
Entropy 20 00295 g004
Figure 5. All the low complexity signals in the intrinsic mode functions (IMFs) with: (a) x ( t ) ; (b) y ( t ) ; (c) z ( t ) .
Figure 5. All the low complexity signals in the intrinsic mode functions (IMFs) with: (a) x ( t ) ; (b) y ( t ) ; (c) z ( t ) .
Entropy 20 00295 g005
Figure 6. Time series after algorithm processing with: (a) x ( t ) ; (b) y ( t ) ; (c) z ( t ) .
Figure 6. Time series after algorithm processing with: (a) x ( t ) ; (b) y ( t ) ; (c) z ( t ) .
Entropy 20 00295 g006
Figure 7. Permutation entropy (PE) value comparisons between the original signal and post-processing signal.
Figure 7. Permutation entropy (PE) value comparisons between the original signal and post-processing signal.
Entropy 20 00295 g007
Figure 8. Key sensitivity test with: (a) plain-image for Lena; (b) cipher-image for Lena; (c) incorrect decryption using a 10−5 change of the initial value for Lena; (d) plain-image for Baboon; (e) cipher-image for Baboon; (f) incorrect decryption using a 10−5 change of the initial value for Baboon.
Figure 8. Key sensitivity test with: (a) plain-image for Lena; (b) cipher-image for Lena; (c) incorrect decryption using a 10−5 change of the initial value for Lena; (d) plain-image for Baboon; (e) cipher-image for Baboon; (f) incorrect decryption using a 10−5 change of the initial value for Baboon.
Entropy 20 00295 g008
Figure 9. Histogram test with: (a) R component of the plain-image; (b) R component of the cipher-image; (c) B component of the plain-image; (d) B component of the cipher-image; (e) G component of the plain-image; (f) G component of the cipher-image.
Figure 9. Histogram test with: (a) R component of the plain-image; (b) R component of the cipher-image; (c) B component of the plain-image; (d) B component of the cipher-image; (e) G component of the plain-image; (f) G component of the cipher-image.
Entropy 20 00295 g009
Table 1. The permutation entropy (PE) value of each intrinsic mode function (IMF) with x ( t ) , y ( t ) , and z ( t ) .
Table 1. The permutation entropy (PE) value of each intrinsic mode function (IMF) with x ( t ) , y ( t ) , and z ( t ) .
IMF Component x ( t ) y ( t ) z ( t )
IMF10.11810.19590.1658
IMF20.11160.11530.1198
IMF30.10960.11130.1102
IMF40.10690.10760.1072
RS50.05420.09970.1066
Table 2. NIST-800-22 tests.
Table 2. NIST-800-22 tests.
Test Item Q x ( t ) p-Value Q y ( t ) p-Value Q z ( t ) p-ValueResult
Approximate Entropy0.287110.010630.41042Success
Block Frequency0.025010.439240.64085Success
Cumulative Sums0.143720.566580.64761Success
FFT0.520630.372210.11875Success
Frequency0.280140.483920.87461Success
Linear Complexity0.223740.469320.78321Success
Longest Run0.706650.510780.26541Success
Non-Overlapping Template0.329740.753310.11253Success
Overlapping Template0.240880.703990.32227Success
Random Excursions0.437470.517910.82733Success
Random Excursions Variant0.645780.112530.66691Success
Binary Matrix Rank0.153190.587000.44130Success
Runs0.882060.845300.71884Success
Serial Test-10.100560.178260.81473Success
Serial Test-20.155380.155380.69926Success
Maurer’s Universal0.753310.142680.56553Success
Table 3. Correlation analysis of adjacent pixels for the Lena and Baboon images.
Table 3. Correlation analysis of adjacent pixels for the Lena and Baboon images.
DirectionPlain-Image for LenaCipher-Image for LenaPlain-Image for BaboonCipher-Image for Baboon
Horizontal0.97120.03920.92870.0133
Vertical0.96550.00910.90040.0522
Diagonal0.94010.02150.87110.0093
Table 4. Information entropy analysis for the Lena and Baboon images.
Table 4. Information entropy analysis for the Lena and Baboon images.
MethodsR ComponentG ComponentB Component
The paper for Lena7.99727.99717.9972
The paper for Baboon7.99707.99687.9971
Reference [37]7.99147.99147.9915
Reference [38]7.98517.98527.9832

Share and Cite

MDPI and ACS Style

Fan, C.; Xie, Z.; Ding, Q. A Novel Algorithm to Improve Digital Chaotic Sequence Complexity through CCEMD and PE. Entropy 2018, 20, 295. https://0-doi-org.brum.beds.ac.uk/10.3390/e20040295

AMA Style

Fan C, Xie Z, Ding Q. A Novel Algorithm to Improve Digital Chaotic Sequence Complexity through CCEMD and PE. Entropy. 2018; 20(4):295. https://0-doi-org.brum.beds.ac.uk/10.3390/e20040295

Chicago/Turabian Style

Fan, Chunlei, Zhigang Xie, and Qun Ding. 2018. "A Novel Algorithm to Improve Digital Chaotic Sequence Complexity through CCEMD and PE" Entropy 20, no. 4: 295. https://0-doi-org.brum.beds.ac.uk/10.3390/e20040295

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop