A chaotic map
based authentication scheme for telecare medicine information systems.
We observe that the Lyapunov exponent obtained for the chaotic map
[theta](y) is less than ln(2) indicating that [theta](y) is less chaotic than [psi](x).
Mathematically, it is already established that when [alpha] = 4, then all the values generated by the chaotic map
will lie in the range of 0 -1 except that [cm.
The form of one-dimensional chaotic map
can be expressed as f: [phi] [right arrow] [phi], let [phi] (n[DELTA]t) be the discrete form of [phi](t), then
We assume that the chaotic map
H( ) is bounded in the interval [0, 1] (line 07); for this reason, we use the transformation [[2.
Kawamura, Chaotic maps
on a measure space and the behavior of the orbit of a state, Tokyo Jour.
2DPSM (15) is chaotic map
, and trigonometric functions are bounded function.
A Novel Image Encryption Scheme Based on Chaotic Maps
A new pseudo-random number generator based on two chaotic maps
In the proposed algorithm, when a random number is needed by the classical DE algorithm, it is generated by iterating one step of the chosen chaotic map
that has been started from a random initial condition at the first iteration.
The logistic chaotic map
is designed to initialize its parameters with secret values and then dynamically obtain the chaotic values based on the encrypted plaintext.
In , the authors proposed an encryption scheme by using the affine transform, the fractional wavelet packet transform (FrWPT), chaotic map
, and the Hessenberg decomposition.