A New Chaotic Memristor-Based Cryptosystem for Secure Bio-Signal Transmission on Low-Cost Hardware DOI Creative Commons
Achraf Daoui, Mohamed Yamni, Paweł Pławiak

et al.

IEEE Access, Journal Year: 2024, Volume and Issue: 12, P. 78939 - 78958

Published: Jan. 1, 2024

Motivated by the critical need for securing bio-signal transmissions in resource-constrained Internet of Medical Things (IoMT) devices, this paper proposes a novel lightweight cryptosystem based on newly developed chaotic map called Logistic-Coupled Memristor (LCM) map. This is designed coupling discrete memristor with well-known logistic The LCM exhibits high degree sensitivity to even slight changes its ten control parameters, crucial property secure communication. We validate behavior using various established methods (Lyapunov exponents, bifurcation diagrams, parameter analysis, and NIST randomness tests). Furthermore, we demonstrate implementation low-cost microcontroller limited resources. Building upon LCM's properties, propose wireless transmission bio-signals. also implemented embedded system, showcasing potential real-world applications. Extensive simulations comparisons confirm that retains when microcontrollers. Additionally, achieves level security lower cost comparison existing solutions.

Language: Английский

Receive-decrypt Circuit Design for Encrypted Signal Processing DOI Creative Commons
Yanlai Zhou

Theoretical and Natural Science, Journal Year: 2025, Volume and Issue: 80(1), P. 64 - 71

Published: Jan. 15, 2025

In today's society where the Internet and information networks are so developed, need for confidentiality of transmission is more important, no matter whether it in business sector, military, medical care, or individuals. this paper analyses basic working principles four different communication systems, namely, high-dimensional chaotic laser system, synchronous confidential system based on reserve pool calculation, ultra-chaotic amnesia, Duffing vibrator array, from encrypting signal sending transmitting end to receiving, demodulating converting encrypted receiving end. The differences between parts each compared. Finally, found that systems have disadvantages poor confidentiality, weak anti-jamming, high cost, low accuracy, etc., respectively, suggestions modification made. future development looked forward

Language: Английский

Citations

0

An effective encryption approach using a combination of a non-chain ring and a four-dimensional chaotic map DOI
Muhammad Umair Safdar, Tariq Shah, Asif Ali

et al.

Cognitive Neurodynamics, Journal Year: 2025, Volume and Issue: 19(1)

Published: Jan. 15, 2025

Language: Английский

Citations

0

Color image encryption scheme based on a single attractor hyperchaotic system and Go rules DOI
Xuncai Zhang, Guanhe Liu, Ying Niu

et al.

Nonlinear Dynamics, Journal Year: 2025, Volume and Issue: unknown

Published: Jan. 21, 2025

Language: Английский

Citations

0

Image Encryption Method Based on Three-Dimensional Chaotic Systems and V-Shaped Scrambling DOI Creative Commons
Lei Wang,

Wenjun Song,

Jiali Di

et al.

Entropy, Journal Year: 2025, Volume and Issue: 27(1), P. 84 - 84

Published: Jan. 17, 2025

With the increasing importance of securing images during network transmission, this paper introduces a novel image encryption algorithm that integrates 3D chaotic system with V-shaped scrambling techniques. The proposed method begins by constructing unique to generate sequences for encryption. These determine random starting point scrambling, which facilitates transformation pixels into quaternary numbers. Subsequently, four innovative bit-level strategies are employed enhance strength. To further improve randomness, DNA encoding is applied both and sequences, directing crossover operations. Ciphertext feedback then utilized propagate changes across image, ensuring increased complexity security. Extensive simulation experiments validate algorithm’s robust performance grayscale images, yielding uniformly distributed histograms, near-zero correlation values, an information entropy value 7.9975, approaching ideal threshold. also features large key space, providing protection against brute force attacks while effectively resisting statistical, differential, noise, cropping attacks. results affirm reliability security communication transmission.

Language: Английский

Citations

0

Photonics-based physical encryption and decryption for secure data transmission leveraging the Talbot effect DOI

Chulun Lin,

Taixia Shi, Yiqing Liu

et al.

Optical Fiber Technology, Journal Year: 2025, Volume and Issue: 90, P. 104140 - 104140

Published: Jan. 22, 2025

Language: Английский

Citations

0

Secure Color Image Encryption Algorithm for Face Recognition Using Zaslavsky and Arnold Cat Maps with Binary Bit-Plane Decomposition DOI
Wenli Shang, Zhenyu Liu, Lei Ding

et al.

Published: Jan. 1, 2025

Language: Английский

Citations

0

An image encryption algorithm based on a novel 4D hyperchaotic system and improved Knight’s Tour scrambling algorithm DOI

X. Deng,

Zhong Chen, Bofeng Long

et al.

Physica Scripta, Journal Year: 2025, Volume and Issue: 100(4), P. 045208 - 045208

Published: Feb. 21, 2025

Abstract In this paper, we propose an advanced image encryption algorithm that integrates a novel 4D hyperchaotic system and improved Knight’s Tour for enhanced security. The system, characterized by its complex dynamics multiple positive Lyapunov exponents, generates pseudo-random sequences with high sensitivity to initial conditions. These are utilized in both pixel-level scrambling bit-level diffusion processes, ensuring robust encryption. Tour, classical pathfinding algorithm, is through chaotic sequence-based randomization, improving path randomness addressing traditional limitations like deadlock issues. Additionally, nonlinear process, inspired the Josephus ring further strengthens scheme introducing dynamic of pixel values. Security analysis experimental results demonstrate proposed offers large key space, excellent resistance cryptanalysis, robustness against various attacks such as noise cropping. Especially encryption, differential crucial performance metric, typically evaluated using NPCR UACI. expected values E = 99.6094% UACI 33.4635%. obtained from images encrypted close these This work highlights potential integrating systems applications requiring levels security, military communications, cloud storage, digital healthcare systems.

Language: Английский

Citations

0

Color image-digital/optical encryption system assisted by high-dimensional memristive chaos, compressive sensing, and DNA coding DOI
S. Hassan, R.S. Fyath

AIP conference proceedings, Journal Year: 2025, Volume and Issue: 3264, P. 030017 - 030017

Published: Jan. 1, 2025

Language: Английский

Citations

0

A Novel Lightweight Image Cryptographic Algorithm via Substitution‐Permutation Methods DOI

T. C. S. M. Gupta,

Arvind Selwal, Ajay Kumar Sharma

et al.

Security and Privacy, Journal Year: 2025, Volume and Issue: 8(2)

Published: March 1, 2025

ABSTRACT In this era of ubiquitous computing, there is an abrupt increase in the transmission multimedia, including images, audio, video, and so forth, through communication channels. The attackers try to intercept confidential data transferred these channels, resulting serious security breaches. Hence, imperative necessity for efficient reliable image secure against malicious attacks. To counter attacks, cryptography a viable solution protecting from unauthorized access. research work, we propose lightweight block‐cipher‐inspired encryption technique by employing designed substitution‐permutation network using improved S‐box. constructed substitution box evaluated standard criteria, nonlinearity, autocorrelation, balance, differential uniformity, bit independence approximation probability (DAP), linear (LAP). Our employs elementary operations such as XOR, shift operations, division blocks, which makes algorithm less complex. experimental results show efficacy presented cipher terms various metrics outperform existing approaches, with correlation coefficient 0.01853, structural similarity index measure (SSIM) 0.0197, peak signal‐to‐noise ratio (PSNR) 27.809 dB, number pixels change rate (NPCR) 99.65%, unified average changing intensity (UACI) 29.97%. Moreover, proposed gate equivalence hardware implementation constraint devices (i.e., CCTV) low latency or decryption. cryptanalysis via methods demonstrates its resilience

Language: Английский

Citations

0

Three-phased multi-scale residual-dense modified-U-Net architecture for deep image steganography DOI
Suyash Sachdeva, Ujjwal Sharma,

P. K. Rajput

et al.

Computers & Electrical Engineering, Journal Year: 2025, Volume and Issue: 123, P. 110299 - 110299

Published: April 1, 2025

Language: Английский

Citations

0