
Extension professionals are expected to help disseminate agricultural technologies, information, knowledge and skills to farmers. In order to develop valuable and long-lasting extension services, it is essential to understand the methods of extension that farmers find most beneficial. This understanding helps adopt improved practices, overcome barriers, provide targeted interventions and continuously improve agricultural extension programs. Thus, assessing factors affecting farmers' choice of agricultural extension methods is essential for developing extension methods that comply with farmers' needs and socio-economic conditions. Therefore, we analyzed the factors affecting farmers' preferences in extension methods, using cross-sectional data collected from 300 households in two sample districts and 16 Kebelles in Ethiopia between September 2019 and March 2020. Four extension methods, including training, demonstration, office visits and phone calls were considered as outcome variables. We fitted a multivariate probit model to estimate the factors that influence farmers' choice of extension methods. The results of the study showed that the number of dependents in the household head, formal education and membership of Idir (an informal insurance program a community or group runs to meet emergencies) were negatively associated with farmers' choices to participate in different extension methods compared to no extension. On the other hand, the sex of the household head, farm experience, participation in non-farm activities, monetary loan access, owning a mobile phone, radio access and membership of cooperatives were found to have a statistically significant positive impact on farmers' choices of extension methods. Based on these findings, the government and the concerned stakeholders should take farmers' socio-economic and institutional traits into account when selecting and commissioning agricultural extension methods. This could help to develop contextually relevant extension strategies that are more likely to be chosen and appreciated by farmers. Furthermore, such strategies can aid policymakers in designing extension programs that cater to farmers' needs and concerns. In conclusion, farmers' socio-economic and institutional affiliation should be taken into consideration when selecting agricultural extension methods.
Citation: Yemane Asmelash Gebremariam, Joost Dessein, Beneberu Assefa Wondimagegnhu, Mark Breusers, Lutgart Lenaerts, Enyew Adgo, Steven Van Passel, Amare Sewnet Minale, Amaury Frankl. Listen to the radio and go on field trips: A study on farmers' attributes to opt for extension methods in Northwest Ethiopia[J]. AIMS Agriculture and Food, 2024, 9(1): 3-29. doi: 10.3934/agrfood.2024002
[1] | Min Liu, Guodong Ye . A new DNA coding and hyperchaotic system based asymmetric image encryption algorithm. Mathematical Biosciences and Engineering, 2021, 18(4): 3887-3906. doi: 10.3934/mbe.2021194 |
[2] | Qing Ye, Qiaojia Zhang, Sijie Liu, Kaiqiang Chen . A novel chaotic system based on coupled map lattice and its application in HEVC encryption. Mathematical Biosciences and Engineering, 2021, 18(6): 9410-9429. doi: 10.3934/mbe.2021463 |
[3] | Zilong Liu, Jingbing Li, Jing Liu . Encrypted face recognition algorithm based on Ridgelet-DCT transform and THM chaos. Mathematical Biosciences and Engineering, 2022, 19(2): 1373-1387. doi: 10.3934/mbe.2022063 |
[4] | Kaimeng Chen, Chin-Chen Chang . High-capacity reversible data hiding in encrypted images based on two-phase histogram shifting. Mathematical Biosciences and Engineering, 2019, 16(5): 3947-3964. doi: 10.3934/mbe.2019195 |
[5] | Xianyi Chen, Mengling Zou, Bin Yang, Zhenli Wang, Nannan Wu, Lili Qi . A visually secure image encryption method based on integer wavelet transform and rhombus prediction. Mathematical Biosciences and Engineering, 2021, 18(2): 1722-1739. doi: 10.3934/mbe.2021089 |
[6] | Zhenjun Tang, Yongzheng Yu, Hanyun Zhang, Mengzhu Yu, Chunqiang Yu, Xianquan Zhang . Robust image hashing via visual attention model and ring partition. Mathematical Biosciences and Engineering, 2019, 16(5): 6103-6120. doi: 10.3934/mbe.2019305 |
[7] | Guodong Ye, Huishan Wu, Kaixin Jiao, Duan Mei . Asymmetric image encryption scheme based on the Quantum logistic map and cyclic modulo diffusion. Mathematical Biosciences and Engineering, 2021, 18(5): 5427-5448. doi: 10.3934/mbe.2021275 |
[8] | Shunyi Li . Hopf bifurcation, stability switches and chaos in a prey-predator system with three stage structure and two time delays. Mathematical Biosciences and Engineering, 2019, 16(6): 6934-6961. doi: 10.3934/mbe.2019348 |
[9] | S. Nakaoka, Y. Saito, Y. Takeuchi . Stability, delay, and chaotic behavior in a Lotka-Volterra predator-prey system. Mathematical Biosciences and Engineering, 2006, 3(1): 173-187. doi: 10.3934/mbe.2006.3.173 |
[10] | Honghua Bin, Daifeng Duan, Junjie Wei . Bifurcation analysis of a reaction-diffusion-advection predator-prey system with delay. Mathematical Biosciences and Engineering, 2023, 20(7): 12194-12210. doi: 10.3934/mbe.2023543 |
Extension professionals are expected to help disseminate agricultural technologies, information, knowledge and skills to farmers. In order to develop valuable and long-lasting extension services, it is essential to understand the methods of extension that farmers find most beneficial. This understanding helps adopt improved practices, overcome barriers, provide targeted interventions and continuously improve agricultural extension programs. Thus, assessing factors affecting farmers' choice of agricultural extension methods is essential for developing extension methods that comply with farmers' needs and socio-economic conditions. Therefore, we analyzed the factors affecting farmers' preferences in extension methods, using cross-sectional data collected from 300 households in two sample districts and 16 Kebelles in Ethiopia between September 2019 and March 2020. Four extension methods, including training, demonstration, office visits and phone calls were considered as outcome variables. We fitted a multivariate probit model to estimate the factors that influence farmers' choice of extension methods. The results of the study showed that the number of dependents in the household head, formal education and membership of Idir (an informal insurance program a community or group runs to meet emergencies) were negatively associated with farmers' choices to participate in different extension methods compared to no extension. On the other hand, the sex of the household head, farm experience, participation in non-farm activities, monetary loan access, owning a mobile phone, radio access and membership of cooperatives were found to have a statistically significant positive impact on farmers' choices of extension methods. Based on these findings, the government and the concerned stakeholders should take farmers' socio-economic and institutional traits into account when selecting and commissioning agricultural extension methods. This could help to develop contextually relevant extension strategies that are more likely to be chosen and appreciated by farmers. Furthermore, such strategies can aid policymakers in designing extension programs that cater to farmers' needs and concerns. In conclusion, farmers' socio-economic and institutional affiliation should be taken into consideration when selecting agricultural extension methods.
Images provide an important means of transferring statistical information is online. When plain images are transmitted directly online, they will be vulnerable to various cyber-attacks such as stealing and tampering, which may cause huge losses to the owner of the images. Therefore, image encryption plays an important effect in ensuring the security of information [1,2,3,4], which also progresses the study of cryptography. At present, there have been a wide range of secure and effective data encryption technologies proposed by cryptographic experts [5,6,7], such as DES [8], AES [9], RSA, and RC6. However, most of the existing algorithms are designed for textual information, which is compounded by some inherent disadvantages in the encryption of images, such as time lag and low efficiency. Besides, these algorithms ignore the relationship between the adjacent image's pixels. Consequently, it is easy for the image information to be leaked in case of pixel statistics attack. Moreover, it is practically difficult for traditional encryption algorithms to meet the requirements on security and speed simultaneously. Therefore, it is necessary to develop a secure, efficient and fast encryption algorithm suitable for multimedia information, so as to achieve the real-time encryption of files, sounds, images and other sorts of multimedia information, which has attracted widespread attention for research at present.
Since the discovery of the correlation between chaos theory and cryptography, chaos theory has been attracting increased attention from many cryptographic researchers [10,11]. There are many chaos' properties that meet the requirements of cryptography technology, such as random-like, deterministic, non-periodic, non-convergent and initial value sensitivity [12,13,14]. Apart from that, the desirable cryptographic characteristics of chaos can be taken advantage of to construct an excellent image encryption system. Chaotic encryption technology relies on the chaotic sequences generated by chaotic systems to encrypt information, which brings about such advantages as the ease of implementation, the robustness to attack, and the high level of applicability. Up to now, there have been many articles published on chaotic cryptography and its applications, exploring how chaotic systems can be applied to generate the chaotic sequences that meet various requirements, which is a problem that the cryptographers of all countries aim to resolve. In 1989, Matthews proposed a stream cipher encryption scheme based on Anamorphic Logistic mapping, as described in [15], with the concept of "chaotic cryptography'' first proposed to attract widespread attention. According to the exact developmental process of encryption technology, the schemes of image encryption using chaotic systems can be classified into three categories. The first one is the scheme of image encryption using low-dimensional simple chaotic system. The second is the scheme of image encryption using high-dimensional complex chaotic system. The last one is the scheme of image encryption combining chaotic system with other methods.
Matthews designed an encryption algorithm that can make use of the chaotic sequences derived by \label{OLE_LINK2}Logistic mapping, the security of which is completely reliant on the generated chaotic sequences, including the parameters, the number of iterations, and the initial conditions of Logistic mapping. Subsequently, two-dimensional Baker mapping was performed in [16] to construct Bernoulli permutation, and to develop the symmetric product cryptography algorithm and pseudo random number generator for image encryption. However, it is difficult to ensure its operating efficiency due to a terrific amount of visual data referred. In this respect, block-oriented symmetric cryptography is considered an effective solution [17]. It relies on Kolmogoroff flows and shift registers to scramble the small blocks of data after image segmentation. Then, with parameters introduced into the chaotic system, the encrypted blocks can be expanded, and substitution operations are performed. This scheme proves advantageous over other encryption systems in security and efficiency. To sum up, above is the representative scheme of image encryption using a low-dimensional simplified chaotic system.
Compared with those chaotic systems which is low-dimensional, high-dimensional, and the positive Lyapunov exponents of which exceed 1, is more complex in structure, involving multiple system variables and multiple system parameters. Besides, the high-dimensional attractors generated exhibit more complex dynamic behaviors [18]. In other words, the time series produced by high-dimensional chaotic systems are more irregular and unpredictable, while the algorithm's key space designed according to them is much larger than the key space of the encryption algorithm developed on the basis of low-dimensional chaotic mapping [19,20], which makes it more suitable for image encryption. With the attempt made by many scholars to combine multiple chaotic maps, high-dimensional chaotic systems, and hyperchaotic systems, the focus of study has shifted to the second type of image encryption technologies. In [21], the chaotic sequences were generated by Cat mapping to scramble the pixels of the image at the bit level. Then, Logistic mapping was performed to change the positions and gray values of scrambled pixels through bitwise diffusion. To improve the operating efficiency of the encryption algorithm, a method of changing the position and distribution of image pixels was proposed on the basis of chaotic Henon mapping and Lorenz mapping in [22]. However, it involves only the scrambling process while ignoring the substitution or diffusion process, which exposes the geometric features of plaintext images. To solve this problem, a color image encryption scheme was designed in [23], with the Logistic mapping sequence used to disrupt the pixel position of the image, and to replace the gray value of the image with the Henon mapping sequence. In [24], the popularized 3D Cat map was used to scramble the position of image pixels, while another sequence obtained from the map was adopted to build a real-time secure symmetric encryption scheme by confusing the relationship between the encrypted image and the plaintext image for multiple times. These algorithms are common in creating a sufficiently large key space to counter brute force attacks. With the advancement of computer technology and cryptanalysis technology, there are various image encryption algorithms deciphered in succession on the basis of low and high-dimensional chaotic systems and hyperchaotic systems, which meet challenges to the existing methods of encryption. For example, the improved CKBA algorithm of image encryption proposed in [25] was deciphered by C. Li et al. through attack [26] known and selected plaintext. They adopted the same scheme to decipher the image encryption algorithm using the hyperchaotic system proposed in [27].
The third category is the image encryption scheme combining chaotic systems with other methods, the representative of which is the image encryption technology that integrates the chaotic system with DNA coding technology. In [28], such operations as elongation, truncation, deletion, insertion and sequence transformation in the DNA sequence processing method were performed to encode the pixel position of plaintext image, while two-dimensional Logistic chaos mapping was carried out to scramble and replace the pixel position and gray value of the encoded image. This algorithm is not only sensitive to key and easy to implement, but also robust to statistical attacks. In [29], the plaintext image was first encoded into a DNA sequence. Then, the chaotic mapping sequence was used to replace the encoded image data, thus obtaining the encrypted image.
Despite plenty of chaotic cryptographic schemes proposed by experts and scholars to date, the theory of chaotic cryptography is still immature. For example, these schemes prove secure only through experiments, with no rigorous mathematical proof available. Therefore, it remains challenging but worthwhile to conduct study on chaotic cryptography. The listed references are all based on finite-dimensional chaotic systems to implement encryption algorithms. However, due to the development of AI, the parameters of finite-dimensional chaotic systems can be simulated through intercepted chaotic sequences. Therefore, the implementation of encryption by finite-dimensional chaotic systems no longer has good security. We present an algorithm of image encryption using the double delay Lorenz system, which provides a safe, reliable and efficient feasible scheme for image encryption. The advantages of the encryption algorithm are as follows: First, because of the infinite dimension of the delay chaotic system, the randomness is stronger and it is more difficult to be simulated by AI technology, so the security efficiency of the encryption algorithm is guaranteed. Second, the time-delay and the location of time-delay make the key space expand further. Finally, the simple implementation of the algorithm makes the image encryption more efficient.
The structure of this article is as follows. The first part briefly introduces the research status of image encryption technology. The second part discusses the Hopf bifurcation and stability of Lorenz system with double delay. The third part adapts the double time-delay Lorenz system to encrypt the digital image. The fourth part verifies the encryption effect by mathematical software. Finally, the conclusion is drawn.
In respect of secret communication, the value of a chaotic system is directly proportional to its behavioral complexity. Therefore, the Lorenz-like systems [30,31,32,33,34,35] are unable to meet the requirements, which prompts scholars to create the new chaotic systems whose dynamic behaviors are difficult to predict, such as hyper chaos system, multiple-wing chaotic system and Lorenz system, etc. These chaotic systems demonstrate more desirable chaos characteristics and higher complexity, many of which are applied in the chaos encryption technology to produce satisfactory outcomes of encryption, while ensuring security. A typical example of them is the time-delay Lorenz system developed on the basis of Lorenz system. However short its time-delay is, the state space of the system is infinitely dimensional, as is the solution space of it. That is to say, there are an infinite number of roots for the characteristic equation of the corresponding linearized system. Being fundamentally different from ordinary Lorenz systems in various respects, the time-delay Lorenz system shows completely different dynamic behaviors, thus leading to high complexity. At present, there are some scholars who have also developed time-delay Lorenz systems for application in encryption algorithms. Their system equations are similar to Eq (2.1) below:
{˙x=ay−ax(t−τ)˙y=bx(t−τ)−xz˙z=−cz+xy | (2.1) |
where x, y, and z represent the variables of state, a, b, c denote the parameters of system, and τ(>0) refers to a time-delay constant. It is always assumed that the impact of time-delay in the system is always unchanged, which means the τ(>0) value is a constant. In fact, the understanding of time-delay chaotic systems must be improved. As the basic characteristic of dynamic behaviors of time-delay chaotic systems, the evolution of the system over time depends not only on the current state but also on the status in the past or the future. Besides, the previous or future impact of the system in other dimensions is not necessarily the same. Therefore, in this paper, our consideration is given to the dynamic behaviors of time-delay chaotic systems when the time-delay varies, for their application in encryption.
The state equation of double time-delay Lorenz system is expressed as follows:
{˙x=−ax(t−τ1)+ay˙y=bx(t−τ2)−xz˙z=−cz+xy | (2.2) |
where τ1(>0) and τ2(>0) represent constant time-delay. The system(2.2) consists of 6 terms in total, including 4 linear terms and 2 nonlinear terms. Compared with other chaotic or hyperchaotic systems, this system is simpler in structure and easier to achieve by circuit, which makes it applicable in the practice of secure communication. Known as the double time-delay Lorenz system, a functional differential dynamical system is constructed by applying double time-delay to the state variables. There are different choices available over time-delay applying positions, and 8 positions with P28 different forms of combination. Therefore, this structure is effectively a secure means of encrypting communication. In this paper, one of these structures is adopted as the method of encryption, as shown in the Eq (2.2). Our main contribution of this paper is to linearize the double time-delay Lorenz system and analyze the distribution of the characteristic equation's roots after linearization. Besides, the system's stability at the zero equilibrium point and Hopf bifurcation conditions are determined. Finally, it is used to the technology of image encryption, thus making the outcomes of encryption satisfactory.
The parameters of system are set as
a>0, b<0, c>0 |
The equilibrium points meets the conditions as follows:
{−ax(t−τ1)+ay=0bx(t−τ2)−xz=0−cz+xy=0 | (2.3) |
According to Eq (2.3), system (2.2) has three equilibrium points, i.e.
(0,0,0), (√bc,√bc,b), (−√bc,−√bc,b) |
The system's stability at the equilibrium point is discussed and the following theorems are proposed.
Theorem 1. Assume τ1=τ2=0, then system (2.2) is unstable at the point (√bc,√bc,b).
Proof. At the point (√bc,√bc,b), the system's Jacobian matrix is expressed as:
M=[−ae−λτ1a0be−λτ2−b0−√bc√bc√bc−c] | (2.4) |
The characteristic equation is presented as:
|−ae−λτ1−λa0be−λτ2−b−λ−√bc√bc√bc−c−λ|=0 | (2.5) |
Equation (2.5) can be converted into:
λ3+p1λ2+p2λ+p3=0 | (2.6) |
where p1=ae−λτ1+c, p2=ace−λτ1−abe−λτ2+ab+bc, p3=abc(e−λτ1−e−λτ2+2).
When τ1=τ2=0, Eq (2.6) can be transformed into:
λ3+(a+c)λ2+(a+b)cλ+2abc=0 | (2.7) |
As for the conditions a>0, b<0, c>0, 2abc<0. Therefore, by the Routh-Hurwitz criterion, a positive real part will be appeared in the eigenvalue of Eq (6). When τ1=τ2=0, system (2.2) is unstable at the point (√bc,√bc,b).
Given the invariance under the transformation of S:(x,y,z)→(−x,−y,z), which means there is symmetry for z, system (2.2) is unstable at the point (−√bc,−√bc,b).
Next, the system's stability at point (0,0,0) will be discussed. It is easy to identify the linearized system (2.2) at the point (0,0,0).
{˙x=−ax(t−τ1)+ay˙y=bx(t−τ2)˙z=−cz | (2.8) |
Based on system (2.8), the Jacobian matrix is expressed as:
M=[−ae−λτ1a0be−λτ20000−c] | (2.9) |
According to the Jacobian matrix, the characteristic equation can be presented as:
|−ae−λτ1−λa0be−λτ2−λ000−c−λ|=0 | (2.10) |
Equation (2.10) can be converted into:
λ3+p1λ2+p2λ+p3=0 | (2.11) |
where p1=ae−λτ1+c, p2=ace−λτ1−abe−λτ2, p3=−abce−λτ2.
When τ1=τ2=0, Eq (2.11) can be transformed into:
λ3+(a+c)λ2+(ac−ab)λ−abc=0 | (2.12) |
As for the conditions, a>0, b<0, c>0, therefore, −abc>0, ac−ab>0 and a+c>0. By Routh-Hurwitz criterion, negative real part will appeared in all characteristic roots of the above equation. When τ1=τ2=0, system (2.2) is asymptotically and locally stable at the point (0,0,0).
A discussion followed will be conducted about the preconditions for the Hopf bifurcation's existence at the equilibrium point. It is assumed that the root of the characteristic Eq (2.11) is λ=ρ+iω, ρ∈R, ω∈R. To satisfy the conditions of Hopf bifurcation, there must be conjugated pure imaginary roots in Eq (2.11). Let ρ=0, so that the Equation below can be obtained as:
e−λτ=e−(ρ+ωi)τ=e−ωτi=cos(ωτ)−isin(ωτ) | (3.1) |
By substituting Eq (3.1) into Eq (9), and separating the imaginary and real parts, the stability change of the static solution will occur, i.e.,
{aω2cos(ωτ1)−acωsin(ωτ1)+abccos(ωτ2)+abωsin(ωτ2)=−cω2acωcos(ωτ1)+aω2sin(ωτ1)−abωcos(ωτ2)+abcsin(ωτ2)=ω3 | (3.2) |
The impact caused by time-delay variation on the system bifurcation will be discussed below.
As τ1=τ2=τ, Eq (3.2) can be converted into:
{(aω2+q)cos(ωτ)−pωsin(ωτ)=−cω2pωcos(ωτ)+(aω2+q)sin(ωτ)=ω3 | (3.3) |
where p=ac−ab, q=abc.
The following steps will be done on the Eq (3.3). After squaring both sides and adding them, Eq (3.4) can be obtained.
ω6+(c2−a2)ω4−(p2+2aq)ω2−q2=0 | (3.4) |
The following conclusions can be obtained for Eq (3.4).
Lemma 1. If a>0, b<0, c>0, one or more positive real root appears in the set of roots of the Eq (3.4).
Proof. Let u=ω2, so that Eq (3.4) can be transformed into:
u3+(c2−a2)u2−(p2+2aq)u−q2=0 | (3.5) |
It is assumed that
g(u)=u3+(c2−a2)u2−(p2+2aq)u−q2 | (3.6) |
Equation (3.6) can be transformed into:
g(u)=1+(c2−a2)1u−(p2+2aq)1u2−q21u31u3 | (3.7) |
Therefore,
g(0)=−q2<0, limu→+∞g(u)=+∞
According to the function zero existence theorem, at least one real number u0∈(0,+∞) appears that makes g(u0)=0. Therefore, Eq (3.5) has one or more positive real root. As u=ω2, Eq (3.4) has one or more positive real root.
Supposed that a real root of Eq (3.4) is ω0, then Eq (3.4) has a pure imaginary root iω0. Also, the following equation can be obtained.
cosωτ=pω4−cω2(aω2+q)(aω2+q)2+p2ω2 | (3.8) |
By substituting ω=ω0 into Eq (3.8), the τ value is obtained as:
τk=1ω0arccos(pω40−cω20(aω20+q)(aω20+q)2+p2ω20)+2kπω0,k=0,1,2,⋯ | (3.9) |
Therefore, Eq (3.3) has a solution (ω0,τk), which means that a pair of conjugate pure imaginary roots λ=±iω0 appear on the Eq (3.3) when τ=τk.
Suppose τ0=min{τk}, then τ=τ0 is the minimum value according to the pure imaginary root λ=±iω0 of Eq (2.12). Following that, the lemma can be obtained.
Lemma 2. If a>0, b<0, c>0, τ=τ0, then a dual pure imaginary roots λ=±iω0 appears in the set of roots of Eq (3.1).
Suppose the eigen roots of Eq (2.4) λ(τ)=α(τ)+iω(τ) satisfy the condition that α(τk)=0 and ω(τk)=ω0, then the transversal conditions are determined as follows.
Lemma 3. If a>0, b<0, c>0, and g′(ω20)>0, then dReλ(τ)dτ|τ=τk>0.
Proof. when τ1=τ2=τ, Eq (2.11) can be converted into:
λ3+cλ2+(aλ2+pλ−q)e−λτ=0 | (3.10) |
Taking the both sides' derivative of Eq (3.10) using τ, the following equation can be obtained.
[3λ2+2cλ+(2aλ+p)e−λτ−τ(aλ2+pλ−q)e−λτ]dλdτ=λ(aλ2+pλ−q)e−λτ | (3.11) |
According to Eq (3.10), Eq (3.12) can be obtained as follows:
(aλ2+pλ−q)e−λτ=−λ(λ2+cλ) | (3.12) |
By introducing Eq (3.12) into Eq (3.11), Eq (3.13) can be obtained.
(dλdτ)−1=−3λ2+2cλλ2(λ2+cλ)+2aλ+pλ(aλ2+pλ−q)−τλ | (3.13) |
As τk=iω0, so that
Re[(dλdτ)−1|τ=τk]=−Re[3λ2+2cλλ2(λ2+cλ)|τ=τk]+Re[2aλ+pλ(aλ2+pλ−q)|τ=τk]=Re[−3ω20+2cω0iω20(−ω20+cω0i)]+Re(p+2aω0iiω0(aω20+q−pω0i))=3ω40+2c2ω60+c2ω40−p2+2a(aω20+q)p2ω20+(aω20+q)2 | (3.14) |
When τ=τ0, Eq (3.10) has a pure imaginary root iω0. By substituting it into Eq (3.10), the following equation can be obtained.
−ω30i−cω20+(−aω20+pω0i−q)e−iω0τ0=0 | (3.15) |
As e−iω0τ0=cosω0τ0−isinω0τ0, so |e−iω0τ0|=1. Then,
|−ω30i−cω20|=|−aω20+pω0i−q| | (3.16) |
That is to say,
ω60+c2ω40=p2ω20+(aω20+q)2 | (3.17) |
By combining Eq (3.15) and (3.17), the following equation can be obtained.
Re[(dλdτ1)−1|τ=τk]=g′(ω20)p2ω20+(aω20+q)2>0 | (3.18) |
As Sign[Re(dλdτ|τ=τk)]=Sign{Re[(dλdτ)−1|τ=τk]}, the lemma is proved.
Therefore, according to Lemma 3.3, the following conclusions can be reached.
Theorem 2. If a>0, b<0, c>0, and g′(ω20)>0, then
1. When τ∈[0,τ0), system (2.2) is asymptotically stable at the point O(0,0,0);
2. When τ>τ0, system (2.2) is unstable at the point O(0,0,0);
3. When τ=τk(k=0,1,2,⋯) Hopf bifurcation occurs at the point O(0,0,0) in the system (2.2), and τ=τk(k=0,1,2,⋯) is the Hopf bifurcation value.
For the sake of ensuring the Hopf bifurcation with two different delays and the stability of system (2.2), there are two extremes of Eq (2.11) considered, respectively. Since both τ1 and τ2 are greater than 0, the delay boundary case is considered, i.e., τ1=0 or τ2=0. With one of the time-delays fixed, an analysis is conducted as to the other time-delays' impact on the stability and the Hopf bifurcation using Rouche theorem. The advantage of this method is that, the impact of the two time-delays on Hopf bifurcation and its stability can be analyzed according to the assumption that τ1 is fixed and τ2 is regarded as a variable dependent on τ1. Then, the following process is conducted. First of all, it is set that τ2=0, the system (2.2) with a time-delay τ1 is analyzed, and the stability interval of τ1 is obtained using Rouche theorem, with τ1as the bifurcation parameter. On this basis, negative real part appears in all the roots of Eq (2.11). Second, system (2.2) is analyzed at the stability interval of τ1, and the Rouche theorem is applied to analyze the stability and Hopf bifurcationof the system, with τ2 as the bifurcation parameter. Notably, the stability interval of τ2 is determined by τ1, so that the area encircled by τ1 and τ2 represents the stability interval of system (2.2).
When τ1=0, Eq (2.11) can be transformed into:
λ3+p1λ2+p2λ+p3=0 | (3.19) |
where p1=a+c, p2=ac−abe−λτ2, p3=−abce−λτ2. Equation (3.19) is converted into:
{q3cos(ωτ2)+q2ωsin(ωτ2)=−q4ω2−q2ωcos(ωτ1)+q3sin(ωτ1)=ω3−q1ω | (3.20) |
where q1=ac, q2=ab, q3=abc, q4=a+c. After squaring both sides and summing them, Eq (3.19) can be obtained as follows:
ω6+(q24−2q1)ω4+(q21−q22)ω2−q23=0 | (3.21) |
By Eq (3.21), the following conclusions can be obtained.
Lemma 4. If a>0, b<0, c>0, one or more positive real root appears in the set of roots of Eq (3.21).
Proof. Let u=ω2, then Eq (3.21) can be converted into
u3+(q24−2q1)u2+(q21−q22)u−q23=0 | (3.22) |
Assume,
h(u)=u3+(q24−2q1)u2+(q21−q22)u−q23 | (3.23) |
Then, Eq (3.23) can be converted into:
h(u)=1+(q24−2q1)1u+(q21−q22)1u2−q231u31u3 | (3.24) |
Therefore,
h(0)=−q23<0, limu→+∞h(u)=+∞
According to the function zero existence theorem, there is one or more real number u0∈(0,+∞) that makes g(u0)=0. Therefore, Eq (3.23) has one or more positive real root. Since u=ω2, Eq (3.21) has one or more positive real root.
Assume Eq (3.21) has a real root ω0, so that iω0 is a pure imaginary root of Eq (3.10). Also, Eq (3.25) can be obtained.
cosωτ2=q2(q1ω2−ω4)−q3q4ω2q23+q22ω2 | (3.25) |
By substituting ω=ω0 into Eq (3.25), τ is obtained as:
τ2k=1ω0arccos(q2(q1ω20−ω40)−q3q4ω20q23+q22ω20)+2kπω0,k=0,1,2,⋯ | (3.26) |
Therefore, (ω0,τ2k) is the solution to Eq (3.25), which means that Eq (3.19) has a couple of conjugate pure imaginary roots λ=±iω0 when the time-delay is τ=τ2k.
Suppose τ20=min{τ2k}, then the τ=τ20 is the minimum value when Eq (3.19) has pure imaginary root λ=±iω0. The following lemma can be obtained.
Lemma 5. If a>0, b<0, c>0, τ2=τ20, τ1=0, then a couple of pure imaginary roots λ=±iω0 appears in the set of roots of Eq (3.19).
Suppose that the eigen roots λ(τ)=α(τ1k)+iω(τ1k) of Eq (3.19) satisfy the condition that α(τ1k)=0 and ω(τ1k)=ω0, the following transversal conditions are presented.
Lemma 6. If a>0, b<0, c>0, τ2=τ20, τ1=0 and h′(ω20)>0, then dReλ(τ2)dτ2|τ=τ2k>0.
Proof. When τ2=τ20, τ1=0, Eq (3.19) can be transformed into:
λ3+q4λ2+q1λ−(q2λ+q3)e−λτ2=0 | (3.27) |
The derivative of both sides of Eq (3.27) with respect to τ2 is taken to obtain Eq (3.28).
[3λ2+2q4λ+q1−q2e−λτ2+τ2(q2λ+q3)e−λτ2]dλdτ2=−λ(q2λ+q3)e−λτ2 | (3.28) |
According to Eq (3.27), Eq (3.29) can be obtained.
λ3+q4λ2+q1λ=(q2λ+q3)e−λτ2 | (3.29) |
By substituting Eq (3.29) into Eq (3.28), Eq (3.30) can be obtained.
(dλdτ2)−1=−3λ2+2q4λ+q1λ(λ3+q4λ2+q1λ)+q2λ(q2λ+q3)−τ2λ | (3.30) |
Since τ2k=iω0, so that
Re[(dλdτ2)−1|τ=τ2k]=−Re[3λ2+2q4λ+q1λ(λ3+q4λ2+q1λ)|τ=τ2k]+Re[q2λ(q2λ+q3)|τ=τ2k]=−Re[−3ω20+q1+2q4ω0iω40−q1ω20−q4ω30i]−Re(q2q2ω20−q3ω0i)=(3ω20−q1)(ω40−q1ω20)+2q24ω40(ω40−q1ω20)2+q24ω60−q22ω20q22ω40+q23ω20 | (3.31) |
When τ1=τ20, Eq (3.27) has pure imaginary roots iω0, which can be substituted into Eq (3.27) to obtain Eq (3.32).
−ω30i−q4ω20+q1ω0i−(q2ω0i+q3)e−iω0τ20=0 | (3.32) |
As e−iω0τ10=cosω0τ10−isinω0τ10, so that |e−iω0τ10|=1. Then,
|−ω30i−q4ω20+q1ω0i|=|q2ω0i+q3| | (3.33) |
That is to say,
(ω30−q1ω0)2+q24ω40=(q2ω0)2+q23 | (3.34) |
By combining Eq (3.32) and (3.34), the following equation can be obtained.
Re[(dλdτ2)−1|τ=τk]=h′(ω20)(aq1ω0)2+(aω20+q4)2>0 | (3.35) |
Since Sign[Re(dλdτ1|τ=τ1k)]=Sign{Re[(dλdτ1)−1|τ=τ1k]}, so that it is proved validly.
Similarly, let τ2=0, with τ1 as the running parameter, then Re[(dλdτ2)−1|τ=τ2k]>0 can also be proved validly.
Therefore, according to Lemma 3.6, the following conclusions can be reached.
Theorem 3. The conclusions can be drawn for Eq (3.19) as follows.
1. If a>0, b<0, c>0 and h′(ω20)>0, then negative real part appears in all characteristic roots of Eq (3.19), when τ1∈τ10. Besides, when τ1>τ10, Eq (3.19) has one or more root with positive real parts.
2. If a>0, b<0, c>0 and h′(ω20)>0, with system from stable to unstable there are k transitions.
Next, considering that Eq (2.11) has τ2 in its stability interval and τ1 is deemed as the parameter, the following lemma is proposed.
Lemma 7. If negative real part appears in the eigenroots of Eq (3.19), then there is τ1(τ2)>0 thus making negative real part appear in all the eigenroots of Eq (3.19) when τ1∈[0,τ1(τ2)).
Proof. Notably, Eq (3.19) has no roots with a non-negative real part, nor does Eq (2.11) has any roots with a non-negative real part when τ1=0. Given that τ1 is the parameter, it is apparent that the left-hand side of Eq (2.11) is analytic with respect to τ1 and λ.
Similar to the proof of lemma in Literature [36], it is supposed that
f(λ,τ1,τ2)=λ3+cλ2+(aλ2+acλ)e−λτ1−(abλ+abc)e−λτ2=0 |
where a, b, c, d, τ1, τ2 represent the real numbers, τ1≥0 and τ2≥0. Thus, when τ1 varies, there may be change in the sum of the multiplicity in the right half plane zeros only if one of its zero points appears or crosses the imaginary axis.
With this conclusion applied, it is worth noting that no non-negative real part appears in the roots of Eq (2.11) when τ1=0. Therefore, it can be concluded that there is τ10 that makes negative real part appears in all the characteristic roots of Eq (2.11) when τ1∈[0,τ10).
Based on a summary of the aforementioned lemma, it can be known that the following theorem is the sufficient condition for the characteristic Eq (2.11) to have negative real parts.
Theorem 4. For τ2∈[0,τ20), there is τ1(τ2)>0 that makes negative real part appear in all the characteristic roots of Eq (2.11) when τ1∈[0,τ1(τ2)).
When τ1=0, it is obtained that τ2=τ20 and ω=ω0. Therefore, the solution to Eq (3.2) is τ1(τ20)=0. According to this relation, τ1(τ2) can be deduced. Then, Eq (3.2) can be converted into:
{u1cos(ω0τ1)−u2sin(ω0τ1)+u3cos(ω0τ2)+u4sin(ω0τ2)=u5u2cos(ω0τ1)+u1sin(ω0τ1)−u4cos(ω0τ2)+u3sin(ω0τ2)=u6 | (3.36) |
where u1=aω20, u2=acω0, u3=abc, u4=abω0, u5=−cω20, u6=ω30. Thus, τ1(τ2) can be obtained.
cos(ω0τ1)=u1u5+u2u6−(u1u3−u2u4)cos(ω0τ2)−(u2u3+u1u4)sin(ω0τ2)u21+u22 | (3.37) |
Then, τ1k can be obtained.
τ1k=1ω0arccos(u1u5+u2u6−(u1u3−u2u4)cos(ω0τ2)−(u2u3+u1u4)sin(ω0τ2)u21+u22)+2kπω0,k=0,1,2,⋯ | (3.38) |
Based on Eq (3.38) as mentioned above, the relationship of τ1(τ2) can be obtained. Figure 1 shows the distribution of τ1 and τ2 for the double time-delay Lorenz system.
In Figure 1, τ20=1ω0arccos(q2(q1ω20−ω40)−q3q4ω20q23+q22ω20), τ10=1ω0arccos(u1u5+u2u6−(u1u3−u2u4)cos(ω0τ20)−(u2u3+u1u4)sin(ω0τ20)u21+u22). Since dReλ(τ1)dτ1|τ=τ1k>0 and Re[(dλdτ2)−1|τ=τ2k]>0, they have the same bifurcation direction, the following theorem is deduced.
Theorem 5. The distribution of τ1 and τ2 of the system (2.2) are obtained from Eqs (3.28) and (3.38), forming k=0,1,2,⋯transition regions that range from stable to unstable regions. The stable and unstable regions are segmented by a curve, which is determined by Eq (3.38). It can be drawn the conclusions as follows:
1. The stable region of the system (2.2) is the region below the curve, which represents the value of the gradually stable parameters τ1 and τ2;
2. The unstable region of the system (2.2) is the region above the curve, which represents the value of the unstable parameters τ1 and τ2, as well as the conditions for the system (2.2) to enter chaos.
3. The region above the curve is the Hopf bifurcation value of the system, at which the Hopf bifurcation of the system (2.2) occurs.
The experimental simulation falls into the case of same delay and the case of different delay, respectively demonstrating the bifurcation of double time-delay chaotic systems.
Since the system's parameters a>0, b<0, c>0, we might as well to take a=10, b=−4, c=2.5 to carry out the numerical simulation of dual time-delays chaotic system. Subsequently, the dual time-delays system can be transformed as:
{˙x=10y−10x(t−τ)˙y=−4x(t−τ)−xz˙z=−2.5z+xy | (4.1) |
A mathematical software is used to achieve the results: Eq (3.4)'s positive real root ω0=10.6785, so it is easy to obtain g′(ω20)=1.5403×104>0, and in Eq (3.9), τ0=0.1120. Accordingly, Theorem 3.1 can be concretized into the corollary below.
Corollary 1. If a>0, b<0, c>0, and g′(ω20)>0, then
1. When τ∈[0,0.1120), the system (4.1) is asymptotically stable at the point O(0,0,0);
2. When τ>0.1120, the system (4.1) is unstable at the point O(0,0,0);
3. When τ=0.1120+0.1873kπ(k=0,1,2,3,⋯) i.e., the Hopf bifurcation value of the system(4.1), the Hopf bifurcation occurs at the point O(0,0,0), thus creating the limit cycle.
Next, the mathematical software is used to draw the system's phase diagram and the system's trajectory diagram when time-delays τ are different (Figures 2–4), which indicates the correctness of the results.
According to Figure 2, when τ=0.11, the x, y, z value tends to approach the point O(0,0,0) with the passage of time t, so the system (4.1) is asymptotically stable at the point O(0,0,0).
According to Figure 3, when τ=0.1120, the x, y, z value of the system (4.1) keep a periodic oscillation forever with the increase of t, and the limit cycles appeared in O−xyz space, which indicates that the Hopf bifurcation occurs at the point O(0,0,0).
According to Figure 4, the x, y, z value is gradually away from the point over t, which means that the system (4.1) is unstable at the point O(0,0,0) when τ=0.1125.
The bifurcation diagram of system can be drawn as the τ affecting the bifurcation of system, as shown in Figure 5. It can be seen that the system bifurcates at τ=0.1120 from Figure 5, by which our conclusion also can be verified.
Since the conditions a>0, b<0, c>0, we might as well to take a=10, b=−4, c=2.5 to carry out the numerical simulation of the double time-delays chaotic system.
{˙x=10y−10x(t−τ1)˙y=−4x(t−τ2)−xz˙z=−2.5z+xy | (4.2) |
To determine the value of bifurcation parameters of the system (4.2), the bifurcation conditions of the system (4.2) should be calculated first with single time-delay. Thus, τ1=0, τ2≠0,
{˙x=10y−10x˙y=−4x(t−τ2)−xz˙z=−2.5z+xy | (4.3) |
The software of mathematics is used to obtain the following results, i.e., Eq (3.21)'s positive real root ω0=3.7458, so it is easy to obtain h′(ω20)=2.5972×103>0, and in Eq (3.20), τ20=0.4703. Accordingly, Theorem 3.4 can be concretized into the corollary as follows.
Corollary 2. If a>0, b<0, c>0 and h′(ω20)>0, then
1. When τ20∈[0,0.4703), the system (4.3) is asymptotically stable at the point O(0,0,0);
2. When τ20>0.4703, the system (4.3) is unstable at the point O(0,0,0);
3. When τ2k=0.4703+0.5339kπ(k=0,1,2,3,⋯), i.e., the Hopf bifurcation value, i.e., the system (4.3) creates the limit cycle at the point O(0,0,0).
When the intervals of ω0 and τ2 are obtained, for any one τ20∈[0,0.4703), the value τ1 can be calculated by Eq (3.21), because it depends on τ2. It is shown in Figure 6 that the value distribution of τ1 and τ2 of the system (4.3)is displayed. According to Theorem 3.4, the system (4.3) is asymptotically stable at the area below the curve, the system (4.3) is unstable at the area above the curve, and the system is in a chaos state on the value of curve, namely, the system (4.3) enters the Hopf bifurcation.
Next, the software of mathematics is used to draw the dual time-delays Lorenz system's trajectory diagram and the dual time-delays Lorenz system's phase diagram over t when the values of τ1 and τ2 are different (Figures 7–9), which proves the correctness of the results.
According to Figure 7, when τ1=0.1, τ2=0.2, the x, y and z values of the system (4.3) get close to the point O(0,0,0) over t, so the system (4.3) is asymptotically stable at the equilibrium point O(0,0,0).
According to Figure 8, when τ2=0.2190 and τ1=0.1801, the x, y and z value of the system (4.3) always keep periodic oscillations with the increase of time, and limit cycles appear in O−xyz space, which indicates that the system (4.3) bifurcates at the point O(0,0,0).
According to Figure 9, the x, y and z values of the system are gradually away from the equilibrium point over t, that is to say, when τ1=0.1521 and τ2=0.29, the system (4.3) is unstable at the point O(0,0,0).
With double time-delays, the system has more complex chaotic phenomena. When τ1 is within the interval [0.05, 0.25] and τ2 is within the interval [0.05, 0.65], the bifurcation diagram of the system can be drawn with the changes of τ1 and τ2. Figure 10 shows that the system is in a stable state in the enclosed region of τ1 and τ2, the system is in the state of Hopf bifurcation on the boundary of the enclosed region, and the system is in the chaotic states in other regions.
At present, scrambling and diffusion are the basic operations of image encryption. Scrambling aims to change the position of pixelof original image using a certain mathematical formula, reduce the correlation between adjacent pixels and generate meaningless ciphertext images, which scrambles and encrypts the original image. However, this operation does not change the value of pixel of original image. The original image still has different statistical characteristics, which is vulnerable to attack and has low security. The scrambling methods mainly include affine transform, Arnold transform, Rubik's Cube transform, Knight-tour, etc. Diffusion aims to modify the pixels of the original image in a way that can be reversed and then reduce the characteristics of statistics of the original image. Thus, the encryption method combining scrambling and diffusion can more effectively encrypt the image.
Chaotic systems are favored by cryptographers for scrambling and diffusion in image encryption because of their pseudo-random and initial value sensitivity. The common chaotic systems were consisted of Logistic mapping, Tent mapping, Henon mapping, Lorenz and Lorenz-like mapping. The chaotic systems produce large keyspace and have strongly adaptive key flows and high security. However, as indicated by the deep research on chaos theories, some low-dimensional chaotic systems have some problems (e.g., simple structure and periodic window), which indicates that the pseudo-random sequences came from the mentioned chaotic systems have weak anti-attack ability and are easy to be cracked. Thus, these chaotic systems cannot ensure the security of the encryption of image. To solve this problem, we produce a double-time-delay chaotic system, which produces pseudo-random sequences with good randomness, wide ranges and no window. Since a double-time-delay chaotic system can replace Logistic mapping chaotic systems with weak dynamic characteristics and narrow chaos range, it can ensure the security of the encryption algorithm.
According to Figure 11, the dual time-delay Lorenz system generates the pseudo-random sequence (X,Y,Z) and then the sequence for scrambling and diffusion is used to the image encryption and decryption process.
Time-delay chaotic systems have essential differences with non-time-delay chaotic systems in numerous aspects, and their dynamic behaviors are completely different and show significantly complex phenomena. The basic characteristic of the time-delay chaotic systems is that the evolution of the systems over time is dependent of their current and past states, which is usually referred to as the lag-type time-delay dynamics system. This type of dynamic system is the infinite-dimensional dynamical system usually described by delay-delay differential equations. No matter how small the delay is, the state space of the system is infinite-dimensional, and the solution space is infinite-dimensional, i.e., the characteristic equation of the corresponding linearized system has an infinite number of roots. Before encryption and decryption, a dual time-delay chaotic system is adopted to produce three pseudo-random sequences (X,Y,Z) simultaneously, corresponding to encryption and decryption operations after the color image separation channel. Thud, the keyspace will be larger than that of the previous chaotic systems. The keyspace will comprise three chaotic system parameters, two time-delay values and interception positions of three pseudo-random sequences. If the image size is M×N×3, the number of pseudo-random sequences produced by the chaotic system with time-delay will be far higher than M×N. To be specific, M and N denote the horizontal and vertical pixel values of the image, respectively.
Overall, an encryption algorithm consists of diffusion and scrambling. At the scrambling stage, the pseudo-random sequence is ranked in an order of ascending, and the position of pixel of the plaintext image is transformed in accordance with the sorted sequence to confuse the pixel position of the plaintext image. At the diffusion stage, the matrix is built using the intercepted sequence and multiplied by the scrambled pixel matrix to obtain the pixel matrix of encrypted image.
For a color plaintext image P, with a size of M×N×3, 3 represents the channels' number of the color image, and P will fall into three layers (PR, PG and PB) according to the channels. Scrambling and diffusion operations are conducted to the respective layer. With PR as an example, the image matrix PR is expanded into a vector according to rows or columns, which is denoted as A. Using the sequence X generated by the dual time-delay chaotic system, the following operations are conducted:
1. Intercept M×N numbers at the given position parameter d, X, and form {xi,i=1,2,⋯,MN}; the respective element of {xi} is rounded by Eq (5.1).
xi=(xi∗104)modMN+1 | (5.1) |
2. Arrange {xi}according to an ascending order and remove the repetitions, substract the set {1,2,3,⋯,MN}, and arrange the achieved results in an ascending order and add to the end of {xi}.
3. Exchange the positions of A(xi) and A(xMN−i+1). After the scrambling operation, the vector after scrambling is expressed as PSR.
Next, the pseudo-random sequence X is used to diffuse the image matrix which is scrambled from original image. The diffusion operation of the scrambled image matrix is carried out using Eq (5.2), and the inverse operation is Eq (5.3). In this way, the scrambling and diffusion operations are completed.
Ci=Ci−1×xi×PSRi | (5.2) |
PSRi=Ci÷Ci−1÷xi | (5.3) |
In general, the encryption algorithm can be summarized below:
Algorithm: An image encryption algorithm based on a double-time-delay chaotic system |
Input: Plaintext image |
Encryption key: Chaotic system parameters, delay position, delay value and intercept sequence position parameters. |
Step1: Read the plaintext image, construct the matrixes PR, PG and PB, and form the column matrixes AR, AG and AB, respectively. |
Step2: Generate sequence (X,Y,Z) in accordance with the key information, and intercept the sequence according to the position parameters. |
Step3: Perform scrambling operation on PR, PG and PB, and round, sort and append the intercepted sequence {xi} using Eq (48) to form a new sequence {xi}. Subsequently, the positions of pixels in AR, AG and AB are exchanged to form the scrambling matrixes PSR, PSG and PSB, respectively. |
Step4: Perform diffusion operation on PSR, PSG and PSB, and adopt the interception sequence {xi} for operation according to Eq (49), and then form the matrixes PDR, PDG and PDB, respectively. |
Step5: Merge PDR, PDG and PDB and output the cipher image. |
For the decryption process, it can be regarded as the inverse process of encryption, as presented below:
Algorithm: An image decryption algorithm based on double-time-delay chaotic system |
Input: Ciphertext image |
Encryption key: Chaotic system parameters, delay position, delay value and interception sequence position parameters |
Step1: Read the ciphertext image, construct the matrixes CR, CG and CB, and form the column matrixes WR, WG and WB, respectively. |
Step2: Generate the pseudo-random sequence (X,Y,Z) according to the key information, and intercept pseudo-random sequence {xi}based on the position parameters. |
Step3: Perform the diffusion inverse operation on CR, CG and CB, use the intercept sequence {xi} for operation in accordance with Eq (50), and then form the matrixes CDR, CDG and CDB, respectively. |
Step4: Perform the inverse scrambling operation on CDR, CDG and CDB, and round, sort and append the intercepted sequence {xi} using Eq (48) to form a new sequence {xi}. Subsequently, the positions of pixels in CDR, CDG and CDB are exchanged to build the matrixes CSR, CSG and CSB. |
Step5: Merge CSR, CSG and CSB and output the decrypted image. |
The Lena color image with a size of 512×512×3 serves as a test object to validate the algorithm. The dual time-delay Lorenz system above is used to produce pseudo-random sequences to encrypt and decrypt the image. The number of sequence elements produced by the dual time-delay chaotic system is significantly higher than the size number of the color image, and these elements are used for fixed storage. A certain number of elements is intercepted according to the positional parameters in the sequence and participated in the scrambling and diffusion operations. The parameters and initial values of the dual time-delay Lorenz system are a=10, b=−4, c=2.5, τ1=0.1521, τ2=0.29, x(t)=1, y(t)=2, z(t)=3, respectively. At this time, the dynamic behavior of the double delays chaotic system is highly complex, and it is in a chaotic state. After 300 points of the generated sequence, a random sequence is taken, so the position parameter d≥300. The encryption algorithm's performance is evaluated using histogram analysis, correlation coefficient analysis of adjacent pixels, keyspace analysis, key sensitivity analysis, NPCR and UACI analysis.
Figure 12 shows the R, G and B pixel histogram of the plaintext image; Figure 13 shows the R, G and B pixel histogram of the encrypted image; Figure 14 illustrates the R, G and B pixel histogram of the decrypted image.
According to Figure 11, the distributions of R, G and B channels' pixel values of the plaintext image show obvious rules of statistics, and the pixel values of the original image have a significant change curve. After scrambling and expansion, the pixel values of ciphertext images are evenly distributed within each grayscale interval (Figure 13), i.e., the frequency of each pixel in the encrypted image is significantly close. Besides, the information of three channels is basically the same, so the attack cannot be carried out with the use of statistical means. According to Figure 14, the distributions of R, G, and B channels' pixel values of the plaintext image are basically the same as those of the image after decryption, which indicates that the decryption effect is high, and the plaintext image can be recovered without being affected by the decryption algorithm. As indicated by the results above, the information of the plaintext image is effectively diffused, and the encryption algorithm can effectively resist statistical attacks.
Pearson correlation coefficient is capable of effectively measuring the dependence of two adjacent sequences in a certain direction. Next, the correlation coefficient of the image before and after encryption will be determined by Eq (5.4):
r=n(n∑i=1xiyi)−(n∑i=1xi)(n∑i=1yi)√[n(n∑i=1x2i)−(n∑i=1xi)2][n(n∑i=1y2i)−(n∑i=1yi)2] | (5.4) |
Where n(n∑i=1xiyi)−(n∑i=1xi)(n∑i=1yi) denotes the sample variance, n(n∑i=1x2i)−(n∑i=1xi)2 and n(n∑i=1y2i)−(n∑i=1yi)2 represent the sample standard deviation of the sequences Xj and Yj, (j=1,2,⋯,m−1), respectively. Correlation coefficient r is a critical indicator that reflects the performance of an encryption algorithm. In general, the correlation coefficients between adjacent pixels can be calculated from the horizontal, vertical and diagonal directions using Eq (5.4). When the coefficients are calculated from the horizontal direction, m is the number of rows of the encrypted image; when the coefficients are calculated from the vertical direction, m is the number of columns of the encrypted image; when the coefficients are calculated from the diagonal direction, m is the number of diagonals of the encrypted image. Table 1 lists the calculation results.
Image | Horizontal direction | Vertical direction | Diagonal direction | ||||||
R | G | B | R | G | B | R | G | B | |
Original image | 0.9002 | 0.9016 | 0.9675 | 0.9412 | 0.9522 | 0.9213 | 0.9423 | 0.9702 | 0.9772 |
Encrypted image | 0.0122 | 0.0023 | 0.0206 | 0.0012 | 0.0056 | 0.0165 | 0.0025 | 0.0021 | 0.0024 |
According to Table 1, the correlation coefficients of the encrypted image on vertical, horizontal and diagonal lines approach zero in the implementation of encryption under the mapping of the double time-delays Lorenz system, whereas these results are general. In order to analyze the correlation between any two adjacent pixels more specifically, the correlation between plaintext images and encrypted images in different directions is described using scatter plots. Figure 15 shows the correlation coefficient results of Lena images in the horizontal, vertical and diagonal directions. Figure 14 shows the correlation coefficient results of encrypted images in the horizontal, vertical and diagonal directions.
According to Figure 15, in plaintext images, there is a significant correlation between any two adjacent pixels in different directions. However, according to Figure 16, the correlation between adjacent pixels corresponded by the encrypted image approaches 0. To be specific, the correlation coefficients change from 0.9002, 0.9412 and 0.9423 to 0.0122, 0.0012 and 0.0025, respectively. Thus, the encryption algorithm eliminates the correlation between the adjacent pixels of the plaintext image, so an attacker cannot obtain any information of the plaintext image through correlation analysis.
The keyspace elements of the encryption and decryption algorithm consist of the parameters of time-delay Lorenz system a, b, c, initial conditions x(t), y(t), z(t), double time-delays τ1, τ2, double time-delays position parameters, as well as position parameters of intercepting sequences. Using MATLAB, 96-bits storage system parameters, initial values and dual time-delays are required, and the rest of keyspace can be stored with 64- bit integer. The position of parameters is the position relation of double time-delays τ1, τ2 in the Lorenz system, and different position relations express a double time-delay chaotic system. As indicated by Eq (4.2), the time-delay parameters can be placed on 8 position vectors, so the position parameter will be P28. Moreover, the pseudo-random sequence interception positions are three random values, respectively, representing the positions' value on different vectors. Accordingly, the number of all the combinations of this cryptosystem is significantly higher than 2256. This form of encryption algorithm has sufficient keyspace to resist brute force attacks.
Key sensitivity is recognized as another significant indicator to measure the image encryption algorithm's performance. Encryption algorithms with prominent performance should generally be sensitive to keys, so cryptanalysts cannot crack them by repeated trials. The sensitivity here reveals that the decryption algorithm cannot recover the plaintext image or acquire the relevant information of the plaintext image even after a small modification of any element in the keyspace. In other words, only when a completely correct key is employed can the plaintext image be recovered by a decryption algorithm. Figure 17 presents the image (17(b)) obtained by decryption with a correct key, the image (17(c)) obtained by decryption with a wrong time-delay parameter τ1 and the image (17(d)) obtained by intercepting position parameters in the direction of wrong pseudo-random sequencex under the double time-delays τ1=0.1521, τ2=0.29.
According to Figures 17(c) and 17(b), when the parameters of the double-time-delay Lorenz system change slightly and other keys are adopted correctly, the decryption algorithm can neither recover and obtain the plaintext image nor acquire any information of the plaintext image. According to Figures 17(d) and 17(c), the decryption algorithm cannot acquire any information of the plaintext image when the position parameters intercepted by the pseudo-random sequence are changed, or other keys remain unchanged. This is because the small changes of system parameters and the changes of sequence interception positions generally cause a completely different chaotic matrix B, so the matrix A determined by A=CB is overall inconsistent with the correct scrambling matrix. Thus, the decryption algorithm cannot recover the plaintext image.
The unified averaged changed intensity (UACI) and The number of changing pixel rate (NPCR) are two indicators applied for measuring the diffusion effect of encryption algorithms. NPCR compares the number of the changed elements in the pixel matrix corresponding to the original image and the encrypted image to ensure that sufficient elements in the pixel matrix are changed, while UACI reflects the average change in the value of pixel of the corresponding position of the plaintext image and the encrypted image. They are defined below respectively:
NPCR=M−1∑i=0N−1∑j=0D(i,j)M×N×100% | (5.5) |
UACI=1M×NM−1∑i=0N−1∑j=0|A(i,j)−ASD(i,j)|255 | (5.6) |
where,
D(i,j)={0,A(i,j)=ASD(i,j)1,A(i,j)≠ASD(i,j) |
A denotes the pixel matrix of the plaintext image, with M and N as its number of rows and columns, respectively, and ASD represents the pixel matrix of the encrypted image. For two random images, the expected values of NPCR and UACI are 96.6094% and 33.4635%, respectively [37]. The NPCR and UACI values of the encrypted image approach their respective expected values, which indicates that the information of the plaintext image is well diffused into the encrypted image. Accordingly, it would be futile for an attacker to attempt to acquire information about the plaintext image through a differential attack.
The NPCR and UACI values of the encrypted image can be calculated according to Eqs (5.5) and (5.6). The calculation results are shown in Table 2.
Image | NPCR(%) | UACI(%) | ||||
R | G | B | R | G | B | |
Encrypted image | 99.6011 | 99.6066 | 99.6200 | 33.1101 | 33.2622 | 33.3230 |
Average | 99.6092 | 33.2384 |
According to Table 2, the mean NPCR and UACI values of the encrypted image are 99.5905% and 33.0183%, respectively, both of which are significantly close to the expected value. To gain better NPCR and UACI values, we need to only increase the number of columns in the substitution matrix A. At this point, the size of the required chaotic matrix B will increase, so the information of the plaintext image will be better diffused into the encrypted image. Accordingly, the algorithm can resist differential attacks effectively.
The degree of reduction in the correlation coefficient between adjacent pixels in encrypted images is an important indicator to measure the security of encryption algorithms. We attempt to demonstrate the security of the proposed algorithm by comparing it with other encryption algorithms. The image encryption schemes involved in the comparison include image encryption schemes [37] using multi chaotic systems, image encryption schemes [25,38] using bit level scrambling and diffusion, image encryption schemes [17] using generalized Arnold mapping, image encryption schemes [28] using DNA sequence operation, and image encryption schemes [39] using cyclic shift and XOR operation. The correlation coefficients between adjacent pixels in encrypted images under different schemes are shown in Table 3. Specifically, by averaging the correlation coefficients of the pixel matrices in the R, G, and B channels, the correlation coefficient results in each direction can be obtained.
Encryption algorithm | Ours | Huang's | Lin's | Ye's | Zhang's | Zahra's |
Horizontal direction | 0.0021 | -0.0752 | 0.0315 | 0.0464 | 0.0713 | 0.0048 |
Vertical direction | 0.0122 | -0.0744 | 0.2642 | 0.0553 | -0.3246 | 0.0212 |
Diagonal direction | 0.0361 | 0.0457 | 0.0446 | 0.0388 | -0.0414 | 0.0271 |
Average | 0.0169 | 0.0661 | 0.2119 | 0.0478 | 0.1467 | 0.0190 |
According to Table 3, in the comparison of the correlation coefficients of adjacent pixels, the proposed algorithm has the smallest correlation coefficient in vertical and horizontal directions. In the diagonal direction, besides Zahra's results, the proposed encryption method is capable of reducing the correlation between encrypted image's adjacent pixels. In the three directions, after the average absolute value of the results of all the algorithms is taken, it can be found that the proposed algorithm is the optimal.
The Stanford Cars dataset are used as a test object to verify the encryption efficiency of the algorithm. The Cars dataset contains 16, 185 images of 196 types of vehicles. The specific encryption time is shown in Table 4. According to Table 4, the proposed algorithm has good encryption efficiency in processing large data sets.
Encryption algorithm | Ours | Huang's | Lin's | Ye's | Zhang's | Zahra's |
Encryption time(s) | 55 | 124 | 86 | 92 | 183 | 78 |
In this paper, a safe, reliable and efficient image encryption algorithm is provided using the Lorenz system with double time-delays, since chaotic systems with time delay are infinite dimensional and have more complex dynamic behavior, which is difficult to be simulated by AI technology. The bifurcation condition of the system is analyzed by means of bifurcation study, and the critical value of the bifurcation parameter with time delay is given. When the system enters the chaotic state, the pseudo-random sequence of the system is intercepted, and the color image is encrypted by means of scrambling and diffusion. Through the index analysis, the algorithm has good qualities: simple scheme structure, large key space, low computational complexity, strong resistance to statistical attacks and differential attacks, high key sensitivity, and easy implementation. Although the double time-delays Lorenz system has complex dynamic behavior and can ensure the security of the algorithm by generating chaotic sequences with strong randomness, the generation and calculation of the sequence takes a long time, so the generated sequences of the double time-delays Lorenz system can be stored in advance and then randomly intercepted to achieve real-time encryption.
The authors declare they have not used Artificial Intelligence (AI) tools in the creation of this article.
Some of the authors of this publication are also working on these related projects: Jiangsu Science and Technology Think Tank Youth Talent Program under grant no.2023(JSKJZK2023068).
The authors declare there is no conflict of interest.
[1] | Albore A (2018) Review on role and challenges of agricultural extension service on farm productivity in Ethiopia. Int J Agric Educ Ext 4: 93–100. |
[2] | Elias A, Nohmi M, Yasunobu K, et al. (2016) Farmers' satisfaction with agricultural extension service and its influencing factors: a case study in North West Ethiopia. J Agric Sci Technol 18: 39–53. |
[3] |
Mutengwa CS, Mnkeni P, Kondwakwenda A (2023) Climate-smart agriculture and food security in Southern Africa: A review of the vulnerability of smallholder agriculture and food security to climate change. Sustainability 15: 2882. https://doi.org/10.3390/su15042882 doi: 10.3390/su15042882
![]() |
[4] | Swanson BE, Rajalahti R (2010) Strengthening agricultural extension and advisory systems: Procedures for assessing, transforming, and evaluating extension systems. Agriculture and Rural Development Discussion Paper, No. 45. World Bank, Washington, DC. |
[5] |
Takahashi K, Muraoka R, Otsuka K (2020) Technology adoption, impact, and extension in developing countries' agriculture: A review of the recent literature. Agric Econ 51: 31–45. https://doi.org/10.1111/agec.12539 doi: 10.1111/agec.12539
![]() |
[6] |
Mapiye O, Makombe G, Molotsi A, et al. (2021) Towards a revolutionized agricultural extension system for the sustainability of smallholder livestock production in developing countries: The potential role of icts. Sustainability 13: 5868. https://doi.org/10.3390/su13115868 doi: 10.3390/su13115868
![]() |
[7] |
Norton GW, Alwang J (2020) Changes in agricultural extension and implications for farmer adoption of new practices. Appl Econ Perspect Policy 42: 8–20. https://doi.org/10.1002/aepp.13008 doi: 10.1002/aepp.13008
![]() |
[8] |
Faure G, Desjeux Y, Gasselin P (2012) New challenges in agricultural advisory services from a research perspective: A literature review, synthesis and research agenda. J Agric Educ Ext 18: 461–492. https://doi.org/10.1080/1389224X.2012.707063 doi: 10.1080/1389224X.2012.707063
![]() |
[9] | Ali-Olub AM, Kathuri N, Wesonga TE (2011) Effective extension methods for increased food production in Kakamega District. J Agric Ext Rural Dev 3: 95–101. |
[10] | Anandajayasekeram P (2008) Concepts and Practices in Agricultural Extension in Developing Countries: A Source Book. ILRI (aka ILCA and ILRAD). |
[11] |
Belay K (2003) Agricultural extension in Ethiopia: The case of participatory demonstration and training extension system. J Soc Dev Afr 18: 49–84. https://doi.org/10.4314/jsda.v18i1.23819 doi: 10.4314/jsda.v18i1.23819
![]() |
[12] | Koehnen TL (2011) ICTs for Agricultural Extension. Global Experiments, Innovations and Experiences. Taylor & Francis. https://doi.org/10.1080/1389224X.2011.624714 |
[13] |
Mhlanga B (2006) Information and Communication Technologies (ICTs) policy for change and the mask for development: A critical analysis of Zimbabwe's e‐readiness survey report. Electron J Inf Syst Dev Countries 28: 1–16. https://doi.org/10.1002/j.1681-4835.2006.tb00185.x doi: 10.1002/j.1681-4835.2006.tb00185.x
![]() |
[14] |
Poulton C, Dorward A, Kydd J (2010) The future of small farms: New directions for services, institutions, and intermediation. World Dev 38: 1413–1428. https://doi.org/10.1016/j.worlddev.2009.06.009 doi: 10.1016/j.worlddev.2009.06.009
![]() |
[15] | Snapp S, Pound B (2017) Agricultural systems: Agroecology and rural innovation for development: Agroecology and rural innovation for development. Academic Press. https://doi.org/10.1016/B978-0-12-802070-8.00002-5 |
[16] | Famuyiwa B, Olaniyi O, Adesoji S (2017) Appropriate extension methodologies for agricultural development in emerging economies. In: Agricultural Development and Food Security in Developing Nations, IGI Global, 82–105. https://doi.org/10.4018/978-1-5225-0942-4.ch004 |
[17] | Bukenya M, Bbale W, Buyinza M (2008) Assessment of the effectiveness of individual and group extension methods: A case study of Vi-Agroforestry Project in Uganda. Fertil Steril 82: S122. |
[18] | Allahyari MS, Chizari M, Mirdamadi SM (2009) Extension-education methods to facilitate learning in sustainable agriculture. J Agric Soc Sci 5: 27–30. |
[19] |
Chikaire J, Nnadi F, Ejiogu-Okereke N (2011) The importance of improve extension linkages in sustainable livestock production in Sub-Saharan Africa. Cont J Anim Vet Res 3: 7–15. https://doi.org/10.5707/cjsd.2012.3.1.1.18 doi: 10.5707/cjsd.2012.3.1.1.18
![]() |
[20] | Davis KE, Addom BK (2000) Sub-Saharan Africa. In: ICTs for Agricultural Extension: Global Experiments, Innovations and Experiences 407: 80–93. |
[21] | Omar JA, Bakar AHA, Jais HM, et al. (2011) A reviewed study of the impact of agricultural extension methods and organizational characteristics on sustainable agricultural development. Int J Eng Sci Technol 3: 5160–5168. |
[22] | Davis KE (2008) Extension in Sub-Saharan Africa: Overview and assessment of past and current models, and future prospects. J Int Agric Ext Educ 15: 15–28. |
[23] |
Ricker‐Gilbert J, Norton GW, Alwang J, et al. (2008) Cost‐effectiveness of alternative integrated pest management extension methods: An example from Bangladesh. Appl Econ Perspect Policy 30: 252–269. https://doi.org/10.1111/j.1467-9353.2008.00403.x doi: 10.1111/j.1467-9353.2008.00403.x
![]() |
[24] |
Eberle WM, Shroyer JP (2000) Are traditional extension methodologies extinct or just endangered? J Nat Resour Life Sci Educ 29: 135–140. https://doi.org/10.2134/jnrlse.2000.0135 doi: 10.2134/jnrlse.2000.0135
![]() |
[25] |
Adamsone-Fiskovica A, Grivins M, Burton RJ, et al. (2021) Disentangling critical success factors and principles of on-farm agricultural demonstration events. J Agric Educ Ext 27: 639–656. https://doi.org/10.1080/1389224X.2020.1844768 doi: 10.1080/1389224X.2020.1844768
![]() |
[26] |
Prokopy LS, Floress K, Klotthor-Weinkauf D, et al. (2008) Determinants of agricultural best management practice adoption: Evidence from the literature. J Soil Water Conserv 63: 300–311. https://doi.org/10.2489/jswc.63.5.300 doi: 10.2489/jswc.63.5.300
![]() |
[27] |
Ibrahim H, Zhou J, Li M, et al. (2014) Perception of farmers on extension services in North Western Part of Nigeria: The case of farming households in Kano State. J Serv Sci Manag 7: 44959. https://doi.org/10.4236/jssm.2014.72006 doi: 10.4236/jssm.2014.72006
![]() |
[28] |
Mairura FS, Musafiri CM, Kiboi MN, et al. (2021) Determinants of farmers' perceptions of climate variability, mitigation, and adaptation strategies in the central highlands of Kenya. Weather Clim Extremes 34: 100374. https://doi.org/10.1016/j.wace.2021.100374 doi: 10.1016/j.wace.2021.100374
![]() |
[29] |
Berhanu K, Poulton C (2014) The political economy of agricultural extension policy in Ethiopia: Economic growth and political control. Dev Policy Rev 32: s197–s213. https://doi.org/10.1111/dpr.12082 doi: 10.1111/dpr.12082
![]() |
[30] | Haile M, Abebaw D (2012) What factors determine the time allocation of agricultural extension agents on farmers' agricultural fields? Evidence form rural Ethiopia. J Agric Ext Rural Dev 4: 318–329. |
[31] |
Swanson BE, Samy MM (2002) Developing an extension partnership among public, private, and nongovernmental organizations. J Int Agric Ext Educ 9: 5–10. https://doi.org/10.5191/jiaee.2002.09101 doi: 10.5191/jiaee.2002.09101
![]() |
[32] |
Krishnan P, Patnam M (2014) Neighbors and extension agents in Ethiopia: Who matters more for technology adoption? Am J Agric Econ 96: 308–327. https://doi.org/10.1093/ajae/aat017 doi: 10.1093/ajae/aat017
![]() |
[33] |
Baloch MA, Thapa GB (2019) Review of the agricultural extension modes and services with the focus to Balochistan, Pakistan. J Saudi Soc Agric Sci 18: 188–194. https://doi.org/10.1016/j.jssas.2017.05.001 doi: 10.1016/j.jssas.2017.05.001
![]() |
[34] |
Okello DM, Akite I, Atube F, et al. (2023) Examining the relationship between farmers' characteristics and access to agricultural extension: Empirical evidence from northern Uganda. J Agric Educ Ext 29: 439–461. https://doi.org/10.1080/1389224X.2022.2082500 doi: 10.1080/1389224X.2022.2082500
![]() |
[35] |
Tamako N, Chitja J, Mudhara M (2022) The influence of farmers' socio-economic characteristics on their choice of opinion leaders: Social knowledge systems. Systems 10: 8. https://doi.org/10.3390/systems10010008 doi: 10.3390/systems10010008
![]() |
[36] |
Mittal S, Mehar M (2016) Socio-economic factors affecting adoption of modern information and communication technology by farmers in India: Analysis using multivariate probit model. J Agric Educ Ext 22: 199–212. https://doi.org/10.1080/1389224X.2014.997255 doi: 10.1080/1389224X.2014.997255
![]() |
[37] |
Antwi-Agyei P, Stringer LC (2021) Improving the effectiveness of agricultural extension services in supporting farmers to adapt to climate change: Insights from northeastern Ghana. Clim Risk Manag 32: 100304. https://doi.org/10.1016/j.crm.2021.100304 doi: 10.1016/j.crm.2021.100304
![]() |
[38] |
Gebremariam YA, Dessein J, Wondimagegnhu BA, et al. (2021) Determinants of farmers' level of interaction with agricultural extension agencies in northwest Ethiopia. Sustainability 13: 3447. https://doi.org/10.3390/su13063447 doi: 10.3390/su13063447
![]() |
[39] |
Admasu WF, Van Passel S, Nyssen J, et al. (2021) Eliciting farmers' preferences and willingness to pay for land use attributes in Northwest Ethiopia: A discrete choice experiment study. Land Use Policy 109: 105634. https://doi.org/10.1016/j.landusepol.2021.105634 doi: 10.1016/j.landusepol.2021.105634
![]() |
[40] |
Usman MA, Gerber N (2021) Assessing the effect of irrigation on household water quality and health: a case study in rural Ethiopia. Int J Environ Health Res 31: 433–452. https://doi.org/10.1080/09603123.2019.1668544 doi: 10.1080/09603123.2019.1668544
![]() |
[41] |
Zewdie MC, Van Passel S, Moretti M, et al. (2020) Pathways how irrigation water affects crop revenue of smallholder farmers in northwest Ethiopia: A mixed approach. Agric Water Manag 233: 106101. https://doi.org/10.1016/j.agwat.2020.106101 doi: 10.1016/j.agwat.2020.106101
![]() |
[42] |
Arun G, Yeo J-H, Ghimire K (2019) Determinants of farm mechanization in Nepal. Turk J Agric-Food Sci Technol 7: 87–91. https://doi.org/10.24925/turjaf.v7i1.87-91.2131 doi: 10.24925/turjaf.v7i1.87-91.2131
![]() |
[43] |
Mohammed Kassaw H, Birhane Z, Alemayehu G (2019) Determinants of market outlet choice decision of tomato producers in Fogera woreda, South Gonder zone, Ethiopia. Cogent Food Agric 5: 1709394. https://doi.org/10.1080/23311932.2019.1709394 doi: 10.1080/23311932.2019.1709394
![]() |
[44] |
Tobin J (1958) Estimation of relationships for limited dependent variables. Econometrica: J Econ Soc: 1958: 24–36. https://doi.org/10.2307/1907382 doi: 10.2307/1907382
![]() |
[45] | Tahirou A, Bamire A, Oparinde A, et al. (2015) Determinants of adoption of improved cassava varieties among farming households in Oyo, Benue, and Akwa Ibom states of Nigeria. |
[46] | Tahirou A, Bamire A, Oparinde A, et al. (2019) Determinants of adoption of improved cassava varieties among farming households in Oyo, Benue, and Akwa Ibom States of Nigeria. Gates Open Res 3: 1343. |
[47] | Das P (2019) Introduction to econometrics and statistical software. In: Econometrics in Theory and Practice, Springer, 15.1: 3–35. https://doi.org/10.1007/978-981-32-9019-8_1 |
[48] | Dougherty C (2011) Introduction to econometrics: Oxford university press, USA. |
[49] | Wooldridge JM (2015) Introductory econometrics: A modern approach: Cengage learning. |
[50] |
Chib S, Greenberg E (1998) Analysis of multivariate probit models. Biometrika 85: 347–361. https://doi.org/10.1093/biomet/85.2.347 doi: 10.1093/biomet/85.2.347
![]() |
[51] |
Suvedi M, Ghimire R, Kaplowitz M (2017) Farmers' participation in extension programs and technology adoption in rural Nepal: A logistic regression analysis. J Agric Educ Ext 23: 351–371. https://doi.org/10.1080/1389224X.2017.1323653 doi: 10.1080/1389224X.2017.1323653
![]() |
[52] |
Gebre GG, Isoda H, Amekawa Y, et al. (2019) Gender differences in the adoption of agricultural technology: The case of improved maize varieties in southern Ethiopia. Women's Stud Int Forum 76: 102264. https://doi.org/10.1016/j.wsif.2019.102264 doi: 10.1016/j.wsif.2019.102264
![]() |
[53] |
Tsige M, Synnevåg G, Aune JB (2020) Gendered constraints for adopting climate-smart agriculture amongst smallholder Ethiopian women farmers. Sci Afr 7: e00250. https://doi.org/10.1016/j.sciaf.2019.e00250 doi: 10.1016/j.sciaf.2019.e00250
![]() |
[54] |
Glazebrook T, Noll S, Opoku E (2020) Gender matters: Climate change, gender bias, and women's farming in the global South and North. Agriculture 10: 267. https://doi.org/10.3390/agriculture10070267 doi: 10.3390/agriculture10070267
![]() |
[55] |
Mwololo H, Nzuma J, Ritho C (2019) Do farmers' socio-economic characteristics influence their preference for agricultural extension methods? Dev Pract 29: 844–853. https://doi.org/10.1080/09614524.2019.1638344 doi: 10.1080/09614524.2019.1638344
![]() |
[56] |
Tran NLD, Rañola Jr RF, Ole Sander B, et al. (2020) Determinants of adoption of climate-smart agriculture technologies in rice production in Vietnam. Int J Clim Change Strategies Manag 12: 238–256. https://doi.org/10.1108/IJCCSM-01-2019-0003 doi: 10.1108/IJCCSM-01-2019-0003
![]() |
[57] |
Asfaw S, Shiferaw B, Simtowe F, et al. (2012) Impact of modern agricultural technologies on smallholder welfare: Evidence from Tanzania and Ethiopia. Food Policy 37: 283–295. https://doi.org/10.1016/j.foodpol.2012.02.013 doi: 10.1016/j.foodpol.2012.02.013
![]() |
[58] |
Teklewold H, Mekonnen A, Kohlin G, et al. (2017) Does adoption of multiple climate-smart practices improve farmers' climate resilience? Empirical evidence from the Nile Basin of Ethiopia. Clim Change Econ 8: 1750001. https://doi.org/10.1142/S2010007817500014 doi: 10.1142/S2010007817500014
![]() |
[59] | FOARD (2017) Planning document for agriculture sectors. Woreta, Ethiopia: District office of Agriculture. |
[60] | MOARD (2017) Planning Document for Agriculture Sectors. Merawi, Ethiopia. |
[61] |
Lwoga ET (2010) Bridging the agricultural knowledge and information divide: The case of selected telecenters and rural radio in Tanzania. Electron J Inf Syst Dev Countries 43: 1–14. https://doi.org/10.1002/j.1681-4835.2010.tb00310.x doi: 10.1002/j.1681-4835.2010.tb00310.x
![]() |
[62] | Usman S (2016) Analysis of wheat value chain: the case of Sinana District, Bale Zone, Oromia region, Ethiopia: Haramaya University. |
[63] |
Balasubramanya S (2019) Effects of training duration and the role of gender on farm participation in water user associations in Southern Tajikistan: Implications for irrigation management. Agric Water Manag 216: 1–11. https://doi.org/10.1016/j.agwat.2019.01.019 doi: 10.1016/j.agwat.2019.01.019
![]() |
[64] | Nyairo NM (2020) Attitudes and Perceptions of Smallholder Farmers Towards Agricultural Technologies in Western Kenya: Purdue University Graduate School. |
[65] |
Aker JC (2011) Dial "A" for agriculture: a review of information and communication technologies for agricultural extension in developing countries. Agric Econ 42: 631–647. https://doi.org/10.1111/j.1574-0862.2011.00545.x doi: 10.1111/j.1574-0862.2011.00545.x
![]() |
[66] |
Haruna S, Abdullahi Y (2013) Training of public extension agents in Nigeria and the implications for government's agricultural transformation agenda. J Agric Ext 17: 98–104. https://doi.org/10.4314/jae.v17i2.13 doi: 10.4314/jae.v17i2.13
![]() |
[67] |
Abrha T, Emanna B, Gebre GG (2020) Factors affecting onion market supply in Medebay Zana district, Tigray regional state, Northern Ethiopia. Cogent Food Agric 6: 1712144. https://doi.org/10.1080/23311932.2020.1712144 doi: 10.1080/23311932.2020.1712144
![]() |
[68] |
Stringer LC, Fraser ED, Harris D, et al. (2020) Adaptation and development pathways for different types of farmers. Environ Sci Policy 104: 174–189. https://doi.org/10.1016/j.envsci.2019.10.007 doi: 10.1016/j.envsci.2019.10.007
![]() |
[69] |
Sumo TV, Ritho C, Irungu P (2022) Effect of farmer socio-economic characteristics on extension services demand and its intensity of use in post-conflict Liberia. Heliyon 8: e12268. https://doi.org/10.1016/j.heliyon.2022.e12268 doi: 10.1016/j.heliyon.2022.e12268
![]() |
[70] |
Hailemichael S, Haug R (2020) The use and abuse of the 'model farmer'approach in agricultural extension in Ethiopia. J Agric Educ Ext 26: 465–484. https://doi.org/10.1080/1389224X.2020.1757475 doi: 10.1080/1389224X.2020.1757475
![]() |
[71] | Fitch JB, Soliman IA (2019) Livestock and small farmer labor supply. Migration, Mechanization, and Agricultural Labor Markets in Egypt. Routledge, 45–78. https://doi.org/10.4324/9780429047107-3 |
[72] | Pappa E, Koutsouris A, Ingram J, et al. (2018) Structural aspects of on-farm demonstrations: Key considerations in the planning and design process. Int J Agric Ext 6: 79–90. |
[73] |
Dapilah F, Nielsen JØ, Friis C (2020) The role of social networks in building adaptive capacity and resilience to climate change: A case study from northern Ghana. Clim Dev 12: 42–56. https://doi.org/10.1080/17565529.2019.1596063 doi: 10.1080/17565529.2019.1596063
![]() |
[74] |
Ochieng W, Silvert CJ, Diaz J (2022) Exploring the impacts of lead farmer selection on community social learning: The case of farmer-to-farmer model: A review of literature. J Int Agric Ext Educ 29: 7–31. https://doi.org/10.4148/2831-5960.1022 doi: 10.4148/2831-5960.1022
![]() |
[75] |
Skaalsveen K, Ingram J, Urquhart J (2020) The role of farmers' social networks in the implementation of no-till farming practices. Agric Syst 181: 102824. https://doi.org/10.1016/j.agsy.2020.102824 doi: 10.1016/j.agsy.2020.102824
![]() |
[76] | Goodier R, Gebeyehu T (2017) Ethiopia's hotline aids farmers through text and voice messages. Appropriate Technol 44: 52. |
[77] |
Birke FM, Knierim A (2020) ICT for agriculture extension: Actor network theory for understanding the establishment of agricultural knowledge centers in South Wollo, Ethiopia. Inf Technol Dev 26: 591–606. https://doi.org/10.1080/02681102.2020.1727826 doi: 10.1080/02681102.2020.1727826
![]() |
[78] |
Khanal S (2013) Role of radio on agricultural development: A review. Bodhi: Interdiscip J 5: 201–206. https://doi.org/10.3126/bodhi.v5i1.8054 doi: 10.3126/bodhi.v5i1.8054
![]() |
[79] |
Hudson HE, Leclair M, Pelletier B, et al. (2017) Using radio and interactive ICTs to improve food security among smallholder farmers in Sub-Saharan Africa. Telecommun Policy 41: 670–684. https://doi.org/10.1016/j.telpol.2017.05.010 doi: 10.1016/j.telpol.2017.05.010
![]() |
[80] | Mhlaba P, Yusuf S (2020) Prospects of community radio broadcast as agricultural extension service delivery tool to smallholder farmers in South Africa. J New Gener Sci 18: 31–44. |
[81] |
Moussa B, Otoo M, Fulton J, et al. (2011) Effectiveness of alternative extension methods through radio broadcasting in West Africa. J Agric Educ Ext 17: 355–369. https://doi.org/10.1080/1389224X.2011.576826 doi: 10.1080/1389224X.2011.576826
![]() |
[82] | Wordofa MG, Sassi M (2018) Smallholder farmers' participation in agricultural training and demonstration in Ethiopia: Implications for inclusive targeting by agricultural extension services. Int J Agric Sci, Res Technol Ext Educ Syst 8: 139–146. |
[83] |
Ofori E, Sampson GS, Vipham J. (2019) The effects of agricultural cooperatives on smallholder livelihoods and agricultural performance in Cambodia. Nat Resour Forum 43: 218–229. https://doi.org/10.1111/1477-8947.12180 doi: 10.1111/1477-8947.12180
![]() |
1. | Chenchen He, Zhong Chen, Lujie Wang, Ximei Wu, Tongzhe Liu, Bofeng Long, An algorithm based on 6D fractional order hyperchaotic system and knight tour algorithm to encrypt image, 2024, 99, 0031-8949, 055205, 10.1088/1402-4896/ad3409 |
Image | Horizontal direction | Vertical direction | Diagonal direction | ||||||
R | G | B | R | G | B | R | G | B | |
Original image | 0.9002 | 0.9016 | 0.9675 | 0.9412 | 0.9522 | 0.9213 | 0.9423 | 0.9702 | 0.9772 |
Encrypted image | 0.0122 | 0.0023 | 0.0206 | 0.0012 | 0.0056 | 0.0165 | 0.0025 | 0.0021 | 0.0024 |
Image | NPCR(%) | UACI(%) | ||||
R | G | B | R | G | B | |
Encrypted image | 99.6011 | 99.6066 | 99.6200 | 33.1101 | 33.2622 | 33.3230 |
Average | 99.6092 | 33.2384 |
Encryption algorithm | Ours | Huang's | Lin's | Ye's | Zhang's | Zahra's |
Horizontal direction | 0.0021 | -0.0752 | 0.0315 | 0.0464 | 0.0713 | 0.0048 |
Vertical direction | 0.0122 | -0.0744 | 0.2642 | 0.0553 | -0.3246 | 0.0212 |
Diagonal direction | 0.0361 | 0.0457 | 0.0446 | 0.0388 | -0.0414 | 0.0271 |
Average | 0.0169 | 0.0661 | 0.2119 | 0.0478 | 0.1467 | 0.0190 |
Encryption algorithm | Ours | Huang's | Lin's | Ye's | Zhang's | Zahra's |
Encryption time(s) | 55 | 124 | 86 | 92 | 183 | 78 |
Image | Horizontal direction | Vertical direction | Diagonal direction | ||||||
R | G | B | R | G | B | R | G | B | |
Original image | 0.9002 | 0.9016 | 0.9675 | 0.9412 | 0.9522 | 0.9213 | 0.9423 | 0.9702 | 0.9772 |
Encrypted image | 0.0122 | 0.0023 | 0.0206 | 0.0012 | 0.0056 | 0.0165 | 0.0025 | 0.0021 | 0.0024 |
Image | NPCR(%) | UACI(%) | ||||
R | G | B | R | G | B | |
Encrypted image | 99.6011 | 99.6066 | 99.6200 | 33.1101 | 33.2622 | 33.3230 |
Average | 99.6092 | 33.2384 |
Encryption algorithm | Ours | Huang's | Lin's | Ye's | Zhang's | Zahra's |
Horizontal direction | 0.0021 | -0.0752 | 0.0315 | 0.0464 | 0.0713 | 0.0048 |
Vertical direction | 0.0122 | -0.0744 | 0.2642 | 0.0553 | -0.3246 | 0.0212 |
Diagonal direction | 0.0361 | 0.0457 | 0.0446 | 0.0388 | -0.0414 | 0.0271 |
Average | 0.0169 | 0.0661 | 0.2119 | 0.0478 | 0.1467 | 0.0190 |
Encryption algorithm | Ours | Huang's | Lin's | Ye's | Zhang's | Zahra's |
Encryption time(s) | 55 | 124 | 86 | 92 | 183 | 78 |