IEEE Access,
Journal Year:
2024,
Volume and Issue:
12, P. 78939 - 78958
Published: Jan. 1, 2024
Motivated
by
the
critical
need
for
securing
bio-signal
transmissions
in
resource-constrained
Internet
of
Medical
Things
(IoMT)
devices,
this
paper
proposes
a
novel
lightweight
cryptosystem
based
on
newly
developed
chaotic
map
called
Logistic-Coupled
Memristor
(LCM)
map.
This
is
designed
coupling
discrete
memristor
with
well-known
logistic
The
LCM
exhibits
high
degree
sensitivity
to
even
slight
changes
its
ten
control
parameters,
crucial
property
secure
communication.
We
validate
behavior
using
various
established
methods
(Lyapunov
exponents,
bifurcation
diagrams,
parameter
analysis,
and
NIST
randomness
tests).
Furthermore,
we
demonstrate
implementation
low-cost
microcontroller
limited
resources.
Building
upon
LCM's
properties,
propose
wireless
transmission
bio-signals.
also
implemented
embedded
system,
showcasing
potential
real-world
applications.
Extensive
simulations
comparisons
confirm
that
retains
when
microcontrollers.
Additionally,
achieves
level
security
lower
cost
comparison
existing
solutions.
Theoretical and Natural Science,
Journal Year:
2025,
Volume and Issue:
80(1), P. 64 - 71
Published: Jan. 15, 2025
In
today's
society
where
the
Internet
and
information
networks
are
so
developed,
need
for
confidentiality
of
transmission
is
more
important,
no
matter
whether
it
in
business
sector,
military,
medical
care,
or
individuals.
this
paper
analyses
basic
working
principles
four
different
communication
systems,
namely,
high-dimensional
chaotic
laser
system,
synchronous
confidential
system
based
on
reserve
pool
calculation,
ultra-chaotic
amnesia,
Duffing
vibrator
array,
from
encrypting
signal
sending
transmitting
end
to
receiving,
demodulating
converting
encrypted
receiving
end.
The
differences
between
parts
each
compared.
Finally,
found
that
systems
have
disadvantages
poor
confidentiality,
weak
anti-jamming,
high
cost,
low
accuracy,
etc.,
respectively,
suggestions
modification
made.
future
development
looked
forward
Entropy,
Journal Year:
2025,
Volume and Issue:
27(1), P. 84 - 84
Published: Jan. 17, 2025
With
the
increasing
importance
of
securing
images
during
network
transmission,
this
paper
introduces
a
novel
image
encryption
algorithm
that
integrates
3D
chaotic
system
with
V-shaped
scrambling
techniques.
The
proposed
method
begins
by
constructing
unique
to
generate
sequences
for
encryption.
These
determine
random
starting
point
scrambling,
which
facilitates
transformation
pixels
into
quaternary
numbers.
Subsequently,
four
innovative
bit-level
strategies
are
employed
enhance
strength.
To
further
improve
randomness,
DNA
encoding
is
applied
both
and
sequences,
directing
crossover
operations.
Ciphertext
feedback
then
utilized
propagate
changes
across
image,
ensuring
increased
complexity
security.
Extensive
simulation
experiments
validate
algorithm’s
robust
performance
grayscale
images,
yielding
uniformly
distributed
histograms,
near-zero
correlation
values,
an
information
entropy
value
7.9975,
approaching
ideal
threshold.
also
features
large
key
space,
providing
protection
against
brute
force
attacks
while
effectively
resisting
statistical,
differential,
noise,
cropping
attacks.
results
affirm
reliability
security
communication
transmission.
Physica Scripta,
Journal Year:
2025,
Volume and Issue:
100(4), P. 045208 - 045208
Published: Feb. 21, 2025
Abstract
In
this
paper,
we
propose
an
advanced
image
encryption
algorithm
that
integrates
a
novel
4D
hyperchaotic
system
and
improved
Knight’s
Tour
for
enhanced
security.
The
system,
characterized
by
its
complex
dynamics
multiple
positive
Lyapunov
exponents,
generates
pseudo-random
sequences
with
high
sensitivity
to
initial
conditions.
These
are
utilized
in
both
pixel-level
scrambling
bit-level
diffusion
processes,
ensuring
robust
encryption.
Tour,
classical
pathfinding
algorithm,
is
through
chaotic
sequence-based
randomization,
improving
path
randomness
addressing
traditional
limitations
like
deadlock
issues.
Additionally,
nonlinear
process,
inspired
the
Josephus
ring
further
strengthens
scheme
introducing
dynamic
of
pixel
values.
Security
analysis
experimental
results
demonstrate
proposed
offers
large
key
space,
excellent
resistance
cryptanalysis,
robustness
against
various
attacks
such
as
noise
cropping.
Especially
encryption,
differential
crucial
performance
metric,
typically
evaluated
using
NPCR
UACI.
expected
values
E
=
99.6094%
UACI
33.4635%.
obtained
from
images
encrypted
close
these
This
work
highlights
potential
integrating
systems
applications
requiring
levels
security,
military
communications,
cloud
storage,
digital
healthcare
systems.
Security and Privacy,
Journal Year:
2025,
Volume and Issue:
8(2)
Published: March 1, 2025
ABSTRACT
In
this
era
of
ubiquitous
computing,
there
is
an
abrupt
increase
in
the
transmission
multimedia,
including
images,
audio,
video,
and
so
forth,
through
communication
channels.
The
attackers
try
to
intercept
confidential
data
transferred
these
channels,
resulting
serious
security
breaches.
Hence,
imperative
necessity
for
efficient
reliable
image
secure
against
malicious
attacks.
To
counter
attacks,
cryptography
a
viable
solution
protecting
from
unauthorized
access.
research
work,
we
propose
lightweight
block‐cipher‐inspired
encryption
technique
by
employing
designed
substitution‐permutation
network
using
improved
S‐box.
constructed
substitution
box
evaluated
standard
criteria,
nonlinearity,
autocorrelation,
balance,
differential
uniformity,
bit
independence
approximation
probability
(DAP),
linear
(LAP).
Our
employs
elementary
operations
such
as
XOR,
shift
operations,
division
blocks,
which
makes
algorithm
less
complex.
experimental
results
show
efficacy
presented
cipher
terms
various
metrics
outperform
existing
approaches,
with
correlation
coefficient
0.01853,
structural
similarity
index
measure
(SSIM)
0.0197,
peak
signal‐to‐noise
ratio
(PSNR)
27.809
dB,
number
pixels
change
rate
(NPCR)
99.65%,
unified
average
changing
intensity
(UACI)
29.97%.
Moreover,
proposed
gate
equivalence
hardware
implementation
constraint
devices
(i.e.,
CCTV)
low
latency
or
decryption.
cryptanalysis
via
methods
demonstrates
its
resilience