A New Chaotic Memristor-Based Cryptosystem for Secure Bio-Signal Transmission on Low-Cost Hardware DOI Creative Commons
Achraf Daoui, Mohamed Yamni, Paweł Pławiak

et al.

IEEE Access, Journal Year: 2024, Volume and Issue: 12, P. 78939 - 78958

Published: Jan. 1, 2024

Motivated by the critical need for securing bio-signal transmissions in resource-constrained Internet of Medical Things (IoMT) devices, this paper proposes a novel lightweight cryptosystem based on newly developed chaotic map called Logistic-Coupled Memristor (LCM) map. This is designed coupling discrete memristor with well-known logistic The LCM exhibits high degree sensitivity to even slight changes its ten control parameters, crucial property secure communication. We validate behavior using various established methods (Lyapunov exponents, bifurcation diagrams, parameter analysis, and NIST randomness tests). Furthermore, we demonstrate implementation low-cost microcontroller limited resources. Building upon LCM's properties, propose wireless transmission bio-signals. also implemented embedded system, showcasing potential real-world applications. Extensive simulations comparisons confirm that retains when microcontrollers. Additionally, achieves level security lower cost comparison existing solutions.

Language: Английский

Image privacy protection scheme based on high-quality reconstruction DCT compression and nonlinear dynamics DOI
Yiting Lin, Zhiyu Xie, Tingting Chen

et al.

Expert Systems with Applications, Journal Year: 2024, Volume and Issue: 257, P. 124891 - 124891

Published: July 27, 2024

Language: Английский

Citations

26

A Novel Multi-Channel Image Encryption Algorithm Leveraging Pixel Reorganization and Hyperchaotic Maps DOI Creative Commons
Wei Feng, Jiaxin Yang, Xiangyu Zhao

et al.

Mathematics, Journal Year: 2024, Volume and Issue: 12(24), P. 3917 - 3917

Published: Dec. 12, 2024

Chaos-based encryption is promising for safeguarding digital images. Nonetheless, existing chaos-based algorithms still exhibit certain shortcomings. Given this, we propose a novel multi-channel image algorithm that leverages pixel reorganization and hyperchaotic maps (MIEA-PRHM). Our MIEA-PRHM employs two to jointly generate chaotic sequences, ensuring larger key space better randomness. During the process, first convert input images into fused matrices through reorganization. Then, apply rounds of scrambling diffusion operations, coupled with one round substitution high 4-bit matrix. For low matrix, conduct operations. Extensive experiments comparisons demonstrate outperforms many recent in various aspects, especially efficiency.

Language: Английский

Citations

23

Deep learning-based encryption scheme for medical images using DCGAN and virtual planet domain DOI Creative Commons
Mahesh Kumar, Aneesh Sreevallabh Chivukula,

Gunjan Barua

et al.

Scientific Reports, Journal Year: 2025, Volume and Issue: 15(1)

Published: Jan. 7, 2025

Abstract The motivation for this article stems from the fact that medical image security is crucial maintaining patient confidentiality and protecting against unauthorized access or manipulation. This paper presents a novel encryption technique integrates Deep Convolutional Generative Adversarial Networks (DCGAN) Virtual Planet Domain (VPD) approach to enhance protection of images. method uses Learning (DL) framework generate decoy image, which forms basis generating keys using timestamp, nonce, 1-D Exponential Chebyshev map (1-DEC). Experimental results validate efficacy in safeguarding images various threats, including access, tampering, adversarial attacks. randomness encrypted are demonstrated through National Institute Standards Technology (NIST) SP 800-22 Statistical test suite provided Tables 4 14, respectively. robustness key sensitivity, noise, cropping attacks, attacks shown Figs. 15–18, 22–23, 24. data presented 5, 6, 7 shows proposed algorithm robust efficient terms time space complexity. Security analysis (such as histogram plots 11–14 correlation 19–21). Information Entropy ( $$7.9993 \pm 0.0001$$ ), coefficient $$\pm 0.09$$ Mean Square Error (MSE) $$4166.3107 1645.2980$$ Peak Signal Noise Ratio (PSNR) $$12.2643 1.7032$$ Number Pixel Change Rate (NPCR) $$99.60\% 0.2\%$$ Unified Average Changing Intensity (UACI) $$33.47\% 0.1\%$$ ) underscore high reliability images, 8–11. Further, statistical NPCR UACI calculated 12 13, also compared with existing algorithms, values Table 15. 3–15 suggest can opt practical use.

Language: Английский

Citations

2

Novel image pixel scrambling technique for efficient color image encryption in resource-constrained IoT devices DOI Creative Commons
Cemile İnce, Kenan İNCE, Davut Hanbay

et al.

Multimedia Tools and Applications, Journal Year: 2024, Volume and Issue: 83(29), P. 72789 - 72817

Published: Feb. 20, 2024

Abstract In the digital age, where data is a valuable commodity, securing sensitive information has become growing concern. Image encryption techniques play an essential role in protecting visual from unauthorized access and ensuring privacy. However, with limited computing capacity Internet of Things (IoT) devices, standard algorithms are not feasible, rendering lightweight methods mandatory. This study proposes novel Corner Traversal algorithm, alternative to existing pixel scrambling techniques. The proposed algorithm demonstrably outperforms its counterparts both higher confusion lower time complexity, making it remarkably efficient. Integrated chaos-based diffusion methods, this forms comprehensive scheme. image scheme utilizing successfully passed rigorous statistical differential security analysis. Compared similar schemes, employing phase distinguishes itself through exceptional NPCR (99.6093 for Lenna) UACI (33.4648 values. Combined other evaluation criteria, method meets stringent requirements IoT systems.

Language: Английский

Citations

9

Random Strip Peeling: A novel lightweight image encryption for IoT devices based on colour planes permutation DOI Creative Commons
Davut Hanbay, Kenan İNCE, Cemile İnce

et al.

CAAI Transactions on Intelligence Technology, Journal Year: 2025, Volume and Issue: unknown

Published: Jan. 5, 2025

Abstract This paper introduces a novel lightweight colour image encryption algorithm, specifically designed for resource‐constrained environments such as Internet of Things (IoT) devices. As IoT systems become increasingly prevalent, secure and efficient data transmission becomes crucial. The proposed algorithm addresses this need by offering robust yet resource‐efficient solution encryption. Traditional relies on confusion diffusion steps. These stages are generally implemented linearly, but work new RSP (Random Strip Peeling) the step, which disrupts linearity in category using two different sequences generated 1D Tent Map with varying initial conditions. stage then employs an XOR matrix Logistic Map. Different evaluation metrics, entropy analysis, key sensitivity, statistical differential attacks resistance, robustness analysis demonstrate algorithm's lightweight, robust, efficient. scheme achieved average metric values 99.6056 NPCR, 33.4397 UACI, 7.9914 information SIPI dataset. It also exhibits time complexity size .

Language: Английский

Citations

1

Triple Layer RGB Image Encryption Algorithm Utilizing Three Hyperchaotic Systems and Its FPGA Implementation DOI Creative Commons
Wassim Alexan,

Noor Elabyad,

Maya Khaled

et al.

IEEE Access, Journal Year: 2024, Volume and Issue: 12, P. 118339 - 118361

Published: Jan. 1, 2024

Language: Английский

Citations

7

A robust audio steganography technique based on image encryption using different chaotic maps DOI Creative Commons
Marwa A. Nasr, Walid El‐Shafai, El‐Sayed M. El‐Rabaie

et al.

Scientific Reports, Journal Year: 2024, Volume and Issue: 14(1)

Published: Sept. 27, 2024

Language: Английский

Citations

5

Tech Business Analytics in Quaternary Industry Sector DOI Open Access
Sachin Kumar,

Krishna Prasad K,

P. S. Aithal

et al.

International Journal of Case Studies in Business IT and Education, Journal Year: 2024, Volume and Issue: unknown, P. 69 - 159

Published: April 19, 2024

Purpose: The knowledge-based segment of the economy is referred to as "quaternary sector," which comprises businesses like information technology, telecommunications, research and development, other professional services. Businesses in this industry may find that technology-driven business analytics greatly aids helping them make data-driven decisions, optimize workflows, enhance overall performance. Utilizing technology analyse can significantly improve market trends, consumer behaviour, an organization's operational Through analysis data, companies more informed decisions support expansion competitiveness. Analytics tools assist identifying inefficiencies their processes operations so they changes reduce expenses, boost output, ultimately revenue. Customer loyalty satisfaction rise a result this. Information regarding emerging technologies integration with data science prediction trends could present chances for growth innovation. Methodology: There are particular potential challenges Quaternary sector because its emphasis on activities, innovation, cutting-edge technology. Here, we methodical strategy using industry, allowing obtain useful long-term planning calculations. This approach gives framework utilizing analytics. helps competitive advantages increasingly environment by access important insights spur Findings/Result: study looks at how digital have been used control from birth present. Originality/Value: An explanation tech differs traditional within industry. It also includes general design be technical purposes, it examines thirty recently submitted recommendations related Tech Business industries. Paper Type: Exploratory research.

Language: Английский

Citations

4

Enhanced selective hyper chaotic encryption using deep neural network for hyperspectral images DOI Creative Commons

Minal Bodke,

Sangita Chaudhari

Earth Science Informatics, Journal Year: 2025, Volume and Issue: 18(1)

Published: Jan. 1, 2025

Language: Английский

Citations

0

Geothermal Reservoir Engineering: Optimizing Heat Extraction Techniques DOI

A.S. Vickram,

S Manikandan,

A. Saravanan

et al.

Published: Jan. 1, 2025

Geothermal reservoir engineering is pivotal to sustainable energy, focusing on optimizing heat extraction for enhanced geothermal production. This discipline integrates geological and geophysical studies characterize reservoirs, considering permeability, porosity, temperature distribution. Enhanced Systems (EGS) improve subsurface permeability exchange through hydraulic, thermal, chemical stimulation. Advanced numerical modeling predicts behavior, fluid flow, transfer, sustainability under diverse conditions. Cutting-edge techniques such as directional drilling downhole sensors minimize environmental impact while providing real-time data effective management. Reservoir optimization combines characterization, modeling, innovative technologies. Insights from global projects demonstrate how optimized strategies boost energy output sustainability. These advancements highlight engineering's role in meeting demands with minimal impact, ensuring a cleaner, greener future.

Language: Английский

Citations

0