IEEE Access,
Journal Year:
2024,
Volume and Issue:
12, P. 78939 - 78958
Published: Jan. 1, 2024
Motivated
by
the
critical
need
for
securing
bio-signal
transmissions
in
resource-constrained
Internet
of
Medical
Things
(IoMT)
devices,
this
paper
proposes
a
novel
lightweight
cryptosystem
based
on
newly
developed
chaotic
map
called
Logistic-Coupled
Memristor
(LCM)
map.
This
is
designed
coupling
discrete
memristor
with
well-known
logistic
The
LCM
exhibits
high
degree
sensitivity
to
even
slight
changes
its
ten
control
parameters,
crucial
property
secure
communication.
We
validate
behavior
using
various
established
methods
(Lyapunov
exponents,
bifurcation
diagrams,
parameter
analysis,
and
NIST
randomness
tests).
Furthermore,
we
demonstrate
implementation
low-cost
microcontroller
limited
resources.
Building
upon
LCM's
properties,
propose
wireless
transmission
bio-signals.
also
implemented
embedded
system,
showcasing
potential
real-world
applications.
Extensive
simulations
comparisons
confirm
that
retains
when
microcontrollers.
Additionally,
achieves
level
security
lower
cost
comparison
existing
solutions.
Mathematics,
Journal Year:
2024,
Volume and Issue:
12(24), P. 3917 - 3917
Published: Dec. 12, 2024
Chaos-based
encryption
is
promising
for
safeguarding
digital
images.
Nonetheless,
existing
chaos-based
algorithms
still
exhibit
certain
shortcomings.
Given
this,
we
propose
a
novel
multi-channel
image
algorithm
that
leverages
pixel
reorganization
and
hyperchaotic
maps
(MIEA-PRHM).
Our
MIEA-PRHM
employs
two
to
jointly
generate
chaotic
sequences,
ensuring
larger
key
space
better
randomness.
During
the
process,
first
convert
input
images
into
fused
matrices
through
reorganization.
Then,
apply
rounds
of
scrambling
diffusion
operations,
coupled
with
one
round
substitution
high
4-bit
matrix.
For
low
matrix,
conduct
operations.
Extensive
experiments
comparisons
demonstrate
outperforms
many
recent
in
various
aspects,
especially
efficiency.
Scientific Reports,
Journal Year:
2025,
Volume and Issue:
15(1)
Published: Jan. 7, 2025
Abstract
The
motivation
for
this
article
stems
from
the
fact
that
medical
image
security
is
crucial
maintaining
patient
confidentiality
and
protecting
against
unauthorized
access
or
manipulation.
This
paper
presents
a
novel
encryption
technique
integrates
Deep
Convolutional
Generative
Adversarial
Networks
(DCGAN)
Virtual
Planet
Domain
(VPD)
approach
to
enhance
protection
of
images.
method
uses
Learning
(DL)
framework
generate
decoy
image,
which
forms
basis
generating
keys
using
timestamp,
nonce,
1-D
Exponential
Chebyshev
map
(1-DEC).
Experimental
results
validate
efficacy
in
safeguarding
images
various
threats,
including
access,
tampering,
adversarial
attacks.
randomness
encrypted
are
demonstrated
through
National
Institute
Standards
Technology
(NIST)
SP
800-22
Statistical
test
suite
provided
Tables
4
14,
respectively.
robustness
key
sensitivity,
noise,
cropping
attacks,
attacks
shown
Figs.
15–18,
22–23,
24.
data
presented
5,
6,
7
shows
proposed
algorithm
robust
efficient
terms
time
space
complexity.
Security
analysis
(such
as
histogram
plots
11–14
correlation
19–21).
Information
Entropy
(
$$7.9993
\pm
0.0001$$
),
coefficient
$$\pm
0.09$$
Mean
Square
Error
(MSE)
$$4166.3107
1645.2980$$
Peak
Signal
Noise
Ratio
(PSNR)
$$12.2643
1.7032$$
Number
Pixel
Change
Rate
(NPCR)
$$99.60\%
0.2\%$$
Unified
Average
Changing
Intensity
(UACI)
$$33.47\%
0.1\%$$
)
underscore
high
reliability
images,
8–11.
Further,
statistical
NPCR
UACI
calculated
12
13,
also
compared
with
existing
algorithms,
values
Table
15.
3–15
suggest
can
opt
practical
use.
Multimedia Tools and Applications,
Journal Year:
2024,
Volume and Issue:
83(29), P. 72789 - 72817
Published: Feb. 20, 2024
Abstract
In
the
digital
age,
where
data
is
a
valuable
commodity,
securing
sensitive
information
has
become
growing
concern.
Image
encryption
techniques
play
an
essential
role
in
protecting
visual
from
unauthorized
access
and
ensuring
privacy.
However,
with
limited
computing
capacity
Internet
of
Things
(IoT)
devices,
standard
algorithms
are
not
feasible,
rendering
lightweight
methods
mandatory.
This
study
proposes
novel
Corner
Traversal
algorithm,
alternative
to
existing
pixel
scrambling
techniques.
The
proposed
algorithm
demonstrably
outperforms
its
counterparts
both
higher
confusion
lower
time
complexity,
making
it
remarkably
efficient.
Integrated
chaos-based
diffusion
methods,
this
forms
comprehensive
scheme.
image
scheme
utilizing
successfully
passed
rigorous
statistical
differential
security
analysis.
Compared
similar
schemes,
employing
phase
distinguishes
itself
through
exceptional
NPCR
(99.6093
for
Lenna)
UACI
(33.4648
values.
Combined
other
evaluation
criteria,
method
meets
stringent
requirements
IoT
systems.
CAAI Transactions on Intelligence Technology,
Journal Year:
2025,
Volume and Issue:
unknown
Published: Jan. 5, 2025
Abstract
This
paper
introduces
a
novel
lightweight
colour
image
encryption
algorithm,
specifically
designed
for
resource‐constrained
environments
such
as
Internet
of
Things
(IoT)
devices.
As
IoT
systems
become
increasingly
prevalent,
secure
and
efficient
data
transmission
becomes
crucial.
The
proposed
algorithm
addresses
this
need
by
offering
robust
yet
resource‐efficient
solution
encryption.
Traditional
relies
on
confusion
diffusion
steps.
These
stages
are
generally
implemented
linearly,
but
work
new
RSP
(Random
Strip
Peeling)
the
step,
which
disrupts
linearity
in
category
using
two
different
sequences
generated
1D
Tent
Map
with
varying
initial
conditions.
stage
then
employs
an
XOR
matrix
Logistic
Map.
Different
evaluation
metrics,
entropy
analysis,
key
sensitivity,
statistical
differential
attacks
resistance,
robustness
analysis
demonstrate
algorithm's
lightweight,
robust,
efficient.
scheme
achieved
average
metric
values
99.6056
NPCR,
33.4397
UACI,
7.9914
information
SIPI
dataset.
It
also
exhibits
time
complexity
size
.
International Journal of Case Studies in Business IT and Education,
Journal Year:
2024,
Volume and Issue:
unknown, P. 69 - 159
Published: April 19, 2024
Purpose:
The
knowledge-based
segment
of
the
economy
is
referred
to
as
"quaternary
sector,"
which
comprises
businesses
like
information
technology,
telecommunications,
research
and
development,
other
professional
services.
Businesses
in
this
industry
may
find
that
technology-driven
business
analytics
greatly
aids
helping
them
make
data-driven
decisions,
optimize
workflows,
enhance
overall
performance.
Utilizing
technology
analyse
can
significantly
improve
market
trends,
consumer
behaviour,
an
organization's
operational
Through
analysis
data,
companies
more
informed
decisions
support
expansion
competitiveness.
Analytics
tools
assist
identifying
inefficiencies
their
processes
operations
so
they
changes
reduce
expenses,
boost
output,
ultimately
revenue.
Customer
loyalty
satisfaction
rise
a
result
this.
Information
regarding
emerging
technologies
integration
with
data
science
prediction
trends
could
present
chances
for
growth
innovation.
Methodology:
There
are
particular
potential
challenges
Quaternary
sector
because
its
emphasis
on
activities,
innovation,
cutting-edge
technology.
Here,
we
methodical
strategy
using
industry,
allowing
obtain
useful
long-term
planning
calculations.
This
approach
gives
framework
utilizing
analytics.
helps
competitive
advantages
increasingly
environment
by
access
important
insights
spur
Findings/Result:
study
looks
at
how
digital
have
been
used
control
from
birth
present.
Originality/Value:
An
explanation
tech
differs
traditional
within
industry.
It
also
includes
general
design
be
technical
purposes,
it
examines
thirty
recently
submitted
recommendations
related
Tech
Business
industries.
Paper
Type:
Exploratory
research.
Geothermal
reservoir
engineering
is
pivotal
to
sustainable
energy,
focusing
on
optimizing
heat
extraction
for
enhanced
geothermal
production.
This
discipline
integrates
geological
and
geophysical
studies
characterize
reservoirs,
considering
permeability,
porosity,
temperature
distribution.
Enhanced
Systems
(EGS)
improve
subsurface
permeability
exchange
through
hydraulic,
thermal,
chemical
stimulation.
Advanced
numerical
modeling
predicts
behavior,
fluid
flow,
transfer,
sustainability
under
diverse
conditions.
Cutting-edge
techniques
such
as
directional
drilling
downhole
sensors
minimize
environmental
impact
while
providing
real-time
data
effective
management.
Reservoir
optimization
combines
characterization,
modeling,
innovative
technologies.
Insights
from
global
projects
demonstrate
how
optimized
strategies
boost
energy
output
sustainability.
These
advancements
highlight
engineering's
role
in
meeting
demands
with
minimal
impact,
ensuring
a
cleaner,
greener
future.