"Big data is presenting challenges to cybersecurity. For an example, the Internet of Things (IoT) will reportedly soon generate a staggering 400 zettabytes (ZB) of data a year. Self-driving cars are predicted to churn out 4000 GB of data per hour of driving. Big data analytics, as an emerging analyt
Cybersecurity: A New Approach Using Chaotic Systems (Studies in Big Data, 102)
✍ Scribed by Ahmed A. Abd El-Latif (editor), Christos Volos (editor)
- Publisher
- Springer
- Year
- 2022
- Tongue
- English
- Leaves
- 244
- Category
- Library
No coin nor oath required. For personal study only.
✦ Synopsis
This book presents techniques and security challenges of chaotic systems and their use in cybersecurity. It presents the state-of-the-art and the latest discoveries in the field of chaotic systems and methods and proposes new models, practical solutions, and technological advances related to new chaotic dynamical systems. The book can be used as part of the bibliography of the following courses:
- Cybersecurity
- Cryptography
- Networks and Communications Security
- Nonlinear Circuits
- Nonlinear Systems and Applications
✦ Table of Contents
Preface
Acknowledgements
Contents
Editors and Contributors
A Novel Approach for Robust S-Box Construction Using a 5-D Chaotic Map and Its Application to Image Cryptosystem
1 Introduction
2 Proposed Chaos-Based S-Box Mechanism
2.1 The Proposed S-Box
2.2 Performance Analysis
3 Proposed Chaos-Based Image Cryptosystem
4 Performance Analyses of the Presented Image Cryptosystem
4.1 Correlation Analysis
4.2 Pristine Image Sensitivity
4.3 Histogram Analysis
4.4 Entropy Analysis
4.5 Occlusion Analysis
4.6 Key Sensitivity
5 Conclusion
References
An Image Compression-Encryption Algorithm Based on Compressed Sensing and Chaotic Oscillator
1 Introduction
2 Sparse Representation
3 The Proposed Chaotic Oscillator
4 The Proposed Encryption Method
4.1 Chaotic Scrambling
4.2 Chaotic Measurement Matrix Generation Based on Hadamard Transform
4.3 Image Compression-Encryption Method
4.4 The Decryption Process
4.5 Sparse Recovery Based on Smoothed ℓ0 Norm and Wiener Filter
5 Experimental Results
5.1 Compression Performance
5.2 Security Performance
5.3 Statistical Study
5.4 Robustness Analysis
6 Conclusion
References
Backstepping and Sliding Mode Control of a Fractional-Order Chaotic System
1 Introduction
2 The Used Fractional-Order Chaotic System
2.1 Bifurcation Diagrams
2.2 Phase Portraits
2.3 Lyapunov Exponents
3 The Controller Design for Fractional-Order Chaotic System
3.1 Backstepping Control Design
3.2 Sliding Mode Control Design
4 Discussion
5 Conclusion
References
Quantum Oscillations: A Promising Field for Secure Communication
1 Introduction
2 Classical van der Pol oscillator
3 Quantum van der Pol Oscillator
3.1 Correspondence Between Master Equation and Amplitude Equation
3.2 Visualising Quantum Limit Cycle
4 Quantum Synchronization
5 Discussion: Applications in Secure Communication Systems
References
Synchronization of Chaotic Electroencephalography (EEG) Signals
1 Introduction
2 Fuzzy Models of Chaotic Systems
2.1 Chua System
2.2 Rossler System
3 Fuzzy Complete Synchronization
4 Fuzzy Projective Synchronization
5 Methodology
5.1 EEG Datasets
5.2 Processing
6 Synchronizations with data01
6.1 Chua Complete Synchronization
6.2 Rossler Complete Synchronization
6.3 Chua Projective Synchronization
6.4 Rossler Projective Synchronization
7 Synchronizations with data02
7.1 Chua Complete Synchronization
7.2 Rossler Complete Synchronization
7.3 Chua Projective Synchronization
7.4 Rossler Projective Synchronization
8 Discussion
9 Conclusions
References
Secure Communication Scheme Based on Projective Synchronization of Hyperchaotic Systems
1 Introduction
2 Background
2.1 Cryptography
2.2 Chaotic Systems
2.3 Chaotic Synchronization
2.4 Secure Communication Applications
3 Methodology
3.1 Chaotic Sequences
3.2 Synchronization Strategy
3.3 Encryption/Decryption Process
4 Results and Discussion
4.1 Dynamical Analysis
4.2 Statistical Analysis
4.3 Security Analysis
5 Conclusions
6 Future Work
References
Chaos-Based Image Encryption Based on Bit Level Cubic Shuffling
1 Introduction
2 The Proposed Chaotic Map
3 Construction of Pseudo-Random Bit Generator
4 The Proposed Shuffling and Encryption Technique
4.1 Image Bit Levels
4.2 Encryption Algorithm
5 Encryption Performance
5.1 Histogram
5.2 Correlation
5.3 Information Entropy
5.4 Differential Attack Analysis
5.5 Cropping and Noise Attacks
5.6 Key Space
5.7 Key Sensitivity
5.8 Execution Time
5.9 Overall Evaluation
6 Graphical User Interface
7 Conclusions
References
Adaptive Chaotic Maps in Cryptography Applications
1 Introduction
2 Chaos-Based Cryptosystem Problems
2.1 Implementation issues
2.2 Keyspace definition problems
3 Adaptive Symmetry Concept
4 Improving Chaos-Based Cryptographic Algorithms Through the Maps With Adaptive Symmetry
5 Conclusion and Discussion
References
Efficient Secure Medical Image Transmission Based on Brownian System
1 Introduction
2 ROI Detection Method
2.1 Morphological Reconstruction
2.2 Arnold Map
2.3 Brownian Motion (BM)
3 Proposed ROI Part Encryption System
4 Performance Analysis of Proposed Scheme
4.1 Results and Discussion
5 Conclusion
References
Multistability Analysis and MultiSim Simulation of A 12-Term Double-Scroll Hyperchaos System with Three Nonlinear Terms, Bursting Oscillations and Its Cryptographic Applications
1 Introduction
2 A Novel Double-Scroll Hyperchaos Dynamical System with Five Balance Points
3 Multistability Property and Bifurcation Plots for the Double-Scroll Hyperchaos System
3.1 Bifurcation Analysis
3.2 Multistability
3.3 Bursting Oscillations
4 Electronic Circuit by MultiSIM Software
5 PRNG Algorithm
6 S-Box Scheme
7 Conclusions
References
📜 SIMILAR VOLUMES
<p><span>This book presents applications and solutions of Big Data in the GovTech system and recommendations for regulating the institutions of the digital economy and information society for the wide application of Big Data with the use of the institutional approach. In this book, a systematic scie
<span>This book focuses on contemporary technologies and research in computational intelligence that has reached the practical level and is now accessible in preclinical and clinical settings. This book's principal objective is to thoroughly understand significant technological breakthroughs and res
<p>This book presents state-of-the-art research on artificial intelligence and blockchain for future cybersecurity applications. The accepted book chapters covered many themes, including artificial intelligence and blockchain challenges, models and applications, cyber threats and intrusions analysis
Big data analytics provide more accurate, timely, and actionable decisions for both cybersecurity and IT management. This book gives a comprehensive coverage of state-of-the-art big data analytics in cybersecurity and IT management. The topics include threat analysis, vulnerability identification, m