Electronics,
Journal Year:
2024,
Volume and Issue:
13(13), P. 2647 - 2647
Published: July 5, 2024
To
address
the
consumption
and
security
of
color
images
for
transmission
storage,
a
cross-channel
image
encryption
scheme
based
on
discrete
memristive
coupled
neuron
model
DWT
compression
is
designed
in
this
article.
Firstly,
dynamics
system
are
analyzed
found
to
possess
hyperchaotic
phenomenon,
which
provides
sufficient
scheme.
Secondly,
processed
by
wavelet
transform
(DWT)
has
quarter
previous
capacity.
Then,
combined
with
Hash
function,
resulting
sequence
given
initial
value
system.
Next,
particle
swarm
foraging
algorithm
(PSFA)
better
disrupt
correlation
RGB
channel.
Finally,
complementary
DNA
coding
rule
implemented
further
images.
Simulation
results
show
that
even
lossy
compression,
recovered
can
be
clearly
seen.
The
performance
analysis
illustrates
under
system,
proposed
brings
higher
Mathematics,
Journal Year:
2024,
Volume and Issue:
12(24), P. 3917 - 3917
Published: Dec. 12, 2024
Chaos-based
encryption
is
promising
for
safeguarding
digital
images.
Nonetheless,
existing
chaos-based
algorithms
still
exhibit
certain
shortcomings.
Given
this,
we
propose
a
novel
multi-channel
image
algorithm
that
leverages
pixel
reorganization
and
hyperchaotic
maps
(MIEA-PRHM).
Our
MIEA-PRHM
employs
two
to
jointly
generate
chaotic
sequences,
ensuring
larger
key
space
better
randomness.
During
the
process,
first
convert
input
images
into
fused
matrices
through
reorganization.
Then,
apply
rounds
of
scrambling
diffusion
operations,
coupled
with
one
round
substitution
high
4-bit
matrix.
For
low
matrix,
conduct
operations.
Extensive
experiments
comparisons
demonstrate
outperforms
many
recent
in
various
aspects,
especially
efficiency.
Chaos An Interdisciplinary Journal of Nonlinear Science,
Journal Year:
2025,
Volume and Issue:
35(1)
Published: Jan. 1, 2025
Memristors
are
commonly
used
to
introduce
various
chaotic
systems
and
can
be
enhance
their
characteristics.
However,
due
the
strict
construction
conditions
of
Hamiltonian
systems,
there
has
been
limited
research
on
development
memristive
conservative
(MHCCSs).
In
this
work,
a
method
for
constructing
three-terminal
memristors
is
proposed,
incorporated
into
system,
resulting
in
class
n-D
MHCCS.
Based
method,
we
model
4D
MHCCS
as
standard
detailed
dynamic
analysis.
The
analysis
reveals
that
exhibits
complex
behaviors,
including
conservativeness,
symmetry,
chaos
depending
parameters,
extreme
multistability,
under
wide
parameter
range.
shows
not
only
retains
favorable
characteristics
system
but
also
more
nonlinear
dynamics
incorporation
memristors,
thereby
further
enhancing
its
Furthermore,
pseudo-random
number
generator
based
excellent
randomness
terms
NIST
test.
Finally,
physical
realizability
verified
through
Field
Programmable
Gate
Array
experiments.
This
study
demonstrates
constructed
MHCCSs
good
entropy
source
applied
embedded
secure
communication,
cryptographic
generator.
Entropy,
Journal Year:
2025,
Volume and Issue:
27(3), P. 276 - 276
Published: March 6, 2025
In
this
digital
era,
social
images
are
the
most
vital
information
carrier
on
multimedia
platforms.
More
and
more
users
interested
in
sharing
with
mobile
terminals
Social
image
also
faces
potential
risks
from
malicious
use,
such
as
illegal
sharing,
piracy,
misappropriation.
This
paper
mainly
concentrates
secure
sharing.
To
address
how
to
share
a
safe
way,
security
scheme
is
proposed.
The
technology
addresses
problem
active
tracing
problem.
First,
discrete
wavelet
transform
(DWT)
performed
directly
JPEG
image.
Then,
high-bit
planes
of
LL,
LH,
HL
permuted
cellular
automation
(CA),
bit-XOR,
singular
value
decomposition
(SVD)
computing,
their
low-bit
chosen
embed
watermark.
end,
encrypted
watermarked
again
cosine
(DCT)
domain.
Experimental
results
analysis
show
that
method
not
only
has
good
performance
robustness,
security,
time
complexity
but
can
actively
trace
distribution
images.
proposed
provide
double-level
for
International Journal of Bifurcation and Chaos,
Journal Year:
2024,
Volume and Issue:
34(14)
Published: Oct. 5, 2024
In
this
paper,
we
propose
a
digital
image
encryption
scheme
based
on
Tabu
Search
(TS)
algorithm
and
Chen’s
hyperchaos
system.
First,
in
order
to
enhance
the
security
of
resist
known-plaintext
attack,
key
is
associated
with
ordinary
image,
hash
value
generated
by
used
as
initial
hyperchaotic
Moreover,
TS
obtain
optimal
subsequence
scramble
sub-block
which
ensures
scrambling
effect
algorithm.
addition,
for
sake
minimizing
correlation
neighborhood
pixels
strengthening
scrambling,
divided
into
blocks
diffusion.
Through
simulation
experiments,
sensitivity,
differential
attack
pure
ciphertext
are
analyzed.
Compared
other
schemes,
results
verify
effectiveness
reliability
proposed
scheme.
Symmetry,
Journal Year:
2025,
Volume and Issue:
17(1), P. 143 - 143
Published: Jan. 18, 2025
Memristives
provide
a
high
degree
of
non-linearity
to
the
model.
This
property
has
led
many
studies
focusing
on
developing
memristive
models
more
non-linearity.
article
novel
fractional
discrete
system
with
incommensurate
orders
using
ϑi-th
Caputo-like
operator.
Bifurcation,
phase
portraits
and
computation
maximum
Lyapunov
Exponent
(LEmax)
are
used
demonstrate
their
impact
system’s
dynamics.
Furthermore,
we
employ
sample
entropy
approach
(SampEn),
C0
complexity
0-1
test
quantify
validate
chaos
in
system.
Studies
indicate
that
manifests
diverse
dynamical
behaviors,
including
hidden
chaos,
symmetry,
asymmetry
attractors,
which
influenced
by
derivative
values.
Moreover,
2D
non-linear
controller
is
presented
stabilize
synchronize
The
work
results
provided
numerical
simulation
obtained
MATLAB
R2024a
codes.