International Journal of Bifurcation and Chaos,
Journal Year:
2024,
Volume and Issue:
34(05)
Published: April 1, 2024
As
digital
communication
and
storage
continue
to
expand,
the
protection
of
image
privacy
information
becomes
increasingly
critical.
To
safeguard
sensitive
visual
from
unauthorized
access,
this
paper
proposes
a
novel
encryption
scheme
that
integrates
multiobjective
Artificial
Bee
Colony
(ABC)
optimization
algorithm
DNA
coding.
Multiple
evaluation
metrics
including
correlation
relationship,
Number
Pixel
Change
Rate
(NPCR),
Unified
Average
Changing
Intensity
(UACI),
entropy
are
collaboratively
optimized
by
ABC
algorithm.
The
proposed
method
begins
with
application
SHA-256
generate
keys
random
sequences
using
chaotic
systems.
These
then
employed
for
shuffling,
coding,
decoding,
diffusion,
generating
initial
encrypted
images.
Subsequently,
images
serve
as
individuals
within
determine
optimal
parameters
systems
best
ciphertext
image.
Simulation
experiments
demonstrate
achieved
excellent
results
in
entropy,
pixel
coefficient,
NPCR,
UACI.
integration
coding
our
heightened
security,
evidenced
superior
performance
various
metrics.
International Journal of Bifurcation and Chaos,
Journal Year:
2024,
Volume and Issue:
34(06)
Published: May 1, 2024
This
paper
presents
a
novel
discrete
memristor
model
that
incorporates
exponential
and
absolute
value
functions.
A
coupled
neural
network
is
constructed
based
on
this
design.
The
periodic
chaotic
regions
of
the
are
determined
using
bifurcation
Lyapunov
exponent
spectrum.
Furthermore,
by
varying
initial
values
memristive
network,
we
observe
coexistence
chaos
attractors,
as
well
attractors.
Additionally,
an
application
to
color
image
encryption
system
given.
Security
analysis
conducted
in
aspects
key
space,
histogram
analysis,
correlation
sensitivity
Peak
Signal-to-Noise
Ratio
(PSNR),
information
entropy
analysis.
results
show
algorithm
has
space
size
[Formula:
see
text],
baboon
graph
7.9993,
which
very
close
ideal
8.
It
shows
feasible
effective.
Finally,
implementation
realized
Field
Programmable
Gate
Array
(FPGA).
experimental
Verilog
language
Vivado
2018.3
platform,
obtained
align
with
numerical
simulation
through
MATLAB.
Mathematical Modeling and Computing,
Journal Year:
2025,
Volume and Issue:
12(1), P. 116 - 131
Published: Jan. 1, 2025
The
paper
introduces
a
new
seven-dimensional
(7D)
chaotic
system
based
on
memristor
emulator
created
using
hyperbolic
tangent
function.
This
is
derived
from
six-dimensional
(6D)
dynamic
of
equations
that
describes
the
process
magnetic
field
generation,
serving
as
an
alternative
to
Rikitake
dynamo,
which
explains
inversion
Earth
and
other
celestial
bodies.
study
analyzes
stability
equilibrium
points
in
dynamical
system.
Lyapunov
exponents
spectrum
Kaplan–Yorke
dimension
are
calculated
for
fixed
parameters
7D
presence
positive
exponent
demonstrates
behavior
system,
while
fractional
indicates
fractal
structure
strange
attractors.
Based
results
Matlab–Simulink
LabVIEW
models,
signal
generator
memristive
implemented
Multisim
environment.
simulation
environment
exhibits
similar
simulations
models.
Physica Scripta,
Journal Year:
2024,
Volume and Issue:
99(8), P. 085226 - 085226
Published: July 4, 2024
Abstract
The
study
of
neuron
model
under
electromagnetic
radiation
is
significant
for
learning
brain
principles
and
treating
mental
diseases.
In
this
paper,
a
novel
discrete
locally
active
memristor(DLAM)
designed
its
characteristics
are
investigated
thoroughly.
Then,
the
DLAM
used
to
imitate
stimulate
Aihara
neuron,
called
EMR-Aihara
model.
equilibrium
point
analyzed.
Dynamical
studied
by
means
phase
diagram,
iteration
sequence,
bifurcation
Lyapunov
Exponent
spectrum(LEs),
Kolmogorow
entropy(KE)
Spectral
Entropy(SE)
complexity.
With
these
analysis
methods,
rich
dynamical
behaviors
firing
patterns
discovered
from
map,
including
hyperchaos,
chaos
period.
addition,
complex
multistability
state
transition
phenomena
concerning
various
attractors
modes
observed.
This
map
implemented
in
digital
circuit
DSP
platform
as
well,
confirming
physical
availability
can
simulate
biological
apply
image
encryption.