Analysis of Multistability of Financial Risk Chaos Systems and Its Application to Voice Cryptography

SIti Hadiaty Yuningsih, Rizki Apriva Hidayana, Nenden Siti Nurkholipah

Abstract


In the chaos literature, the application of modeling and control of dynamic systems in chaos theory arising in several fields is investigated. In this article we analyze complex financial chaos systems with countries as interest rates, investment demand, and price indices. The proposed chaotic flow's dynamic behavior is examined using phase portraits, eigenvalues, bifurcation diagrams, and Lyapunov exponent spectra. A significant quantity of research on secure communication systems has been published in recent years as a result of the major advancements in communications equipment and encryption techniques. A new voice encryption algorithm design is given using a financial chaos model. An application for voice encryption is conducted using the suggested algorithm, and the outcomes are described.

Keywords


Chaos, voice encryption, finance risk, dynamic system.

Full Text:

PDF

References


Blahut, R. E. (2014). Cryptography and secure communication. Cambridge University Press.

Curry, D. M. (2012). Practical application of chaos theory to systems engineering. Procedia Computer Science, 8, 39-44.

El Assad, S., & Farajallah, M. (2016). A new chaos-based image encryption system. Signal Processing: Image Communication, 41, 144-157.

Gharaibeh, A., Salahuddin, M. A., Hussini, S. J., Khreishah, A., Khalil, I., Guizani, M., & Al-Fuqaha, A. (2017). Smart cities: A survey on data management, security, and enabling technologies. IEEE Communications Surveys & Tutorials, 19(4), 2456-2501.

Li-Jiang, Y., & Tian-Lun, C. (2002). Application of chaos in genetic algorithms. Communications in Theoretical Physics, 38(2), 168.

Massoudi, A., Lefebvre, F., De Vleeschouwer, C., Macq, B., & Quisquater, J. J. (2008). Overview on selective encryption of image and video: challenges and perspectives. Eurasip Journal on information security, 2008(1), 179290.

Mobayen, S., Vaidyanathan, S., Sambas, A., Kaçar, S., & Çavuşoğlu, Ü. (2019). A novel chaotic system with boomerang-shaped equilibrium, its circuit implementation and application to sound encryption. Iranian Journal of Science and Technology, Transactions of Electrical Engineering, 43, 1-12.

Pisarchik, A. N., & Zanin, M. (2010). Chaotic map cryptography and security. Encryption: Methods, Software and Security, 1-28.

Skinner, J. E., Molnar, M., Vybiral, T., & Mitra, M. (1992). Application of chaos theory to biology and medicine. Integrative Physiological and Behavioral Science, 27, 39-53.

van Den Bleek, C. M., Coppens, M. O., & Schouten, J. C. (2002). Application of chaos analysis to multiphase reactors. Chemical Engineering Science, 57(22-23), 4763-4778.

Zaher, A. A., & Abu-Rezq, A. (2011). On the design of chaos-based secure communication systems. Communications in Nonlinear Science and Numerical Simulation, 16(9), 3721-3737.




DOI: https://doi.org/10.46336/ijrcs.v5i3.699

Refbacks

  • There are currently no refbacks.


Copyright (c) 2024 International Journal of Research in Community Services

Creative Commons License
This work is licensed under a Creative Commons Attribution 4.0 International License.

Published By: 

IJRCS: Jalan Riung Ampuh No. 3, Riung Bandung, Kota Bandung 40295, Jawa Barat, Indonesia

Indexed By: 

width= width=width=  width=  width= 

Creative Commons License
This work is licensed under a Creative Commons Attribution 4.0 International License.

 

View My Stats