Journal of the Franklin Institute, Journal Year: 2024, Volume and Issue: 361(18), P. 107315 - 107315
Published: Oct. 9, 2024
Language: Английский
Journal of the Franklin Institute, Journal Year: 2024, Volume and Issue: 361(18), P. 107315 - 107315
Published: Oct. 9, 2024
Language: Английский
Scientific Reports, Journal Year: 2025, Volume and Issue: 15(1)
Published: Jan. 7, 2025
Abstract The motivation for this article stems from the fact that medical image security is crucial maintaining patient confidentiality and protecting against unauthorized access or manipulation. This paper presents a novel encryption technique integrates Deep Convolutional Generative Adversarial Networks (DCGAN) Virtual Planet Domain (VPD) approach to enhance protection of images. method uses Learning (DL) framework generate decoy image, which forms basis generating keys using timestamp, nonce, 1-D Exponential Chebyshev map (1-DEC). Experimental results validate efficacy in safeguarding images various threats, including access, tampering, adversarial attacks. randomness encrypted are demonstrated through National Institute Standards Technology (NIST) SP 800-22 Statistical test suite provided Tables 4 14, respectively. robustness key sensitivity, noise, cropping attacks, attacks shown Figs. 15–18, 22–23, 24. data presented 5, 6, 7 shows proposed algorithm robust efficient terms time space complexity. Security analysis (such as histogram plots 11–14 correlation 19–21). Information Entropy ( $$7.9993 \pm 0.0001$$ ), coefficient $$\pm 0.09$$ Mean Square Error (MSE) $$4166.3107 1645.2980$$ Peak Signal Noise Ratio (PSNR) $$12.2643 1.7032$$ Number Pixel Change Rate (NPCR) $$99.60\% 0.2\%$$ Unified Average Changing Intensity (UACI) $$33.47\% 0.1\%$$ ) underscore high reliability images, 8–11. Further, statistical NPCR UACI calculated 12 13, also compared with existing algorithms, values Table 15. 3–15 suggest can opt practical use.
Language: Английский
Citations
2Applied Mathematical Modelling, Journal Year: 2024, Volume and Issue: 134, P. 520 - 537
Published: June 14, 2024
Language: Английский
Citations
15Journal of the Franklin Institute, Journal Year: 2025, Volume and Issue: 362(3), P. 107503 - 107503
Published: Jan. 8, 2025
Language: Английский
Citations
1Franklin Open, Journal Year: 2024, Volume and Issue: 8, P. 100158 - 100158
Published: Sept. 1, 2024
Language: Английский
Citations
8Mathematics, Journal Year: 2025, Volume and Issue: 13(2), P. 201 - 201
Published: Jan. 9, 2025
In this paper, we first design the corresponding integration algorithm and matlab program according to Gauss–Legendre principle. Then, select Lorenz system, Duffing hidden attractor chaotic system Multi-wing for dynamics analysis. We apply integral Runge–Kutta solution of dissipative systems time analyze compare differences between two algorithms. propose a basin attraction estimation method based on Lyapunov exponent decision criterion method. This can better obtain region distinguish pseudo-attractor, which provides new way Finally, use FPGA technology realize four algorithm.
Language: Английский
Citations
0AIMS Mathematics, Journal Year: 2024, Volume and Issue: 9(8), P. 22146 - 22173
Published: Jan. 1, 2024
<p>The widespread use of computer hardware and software in society has led to the emergence a type criminal conduct known as cybercrime, which become major worldwide concern 21st century spanning multiple domains. As result, present setting, academics practitioners are showing great deal interest conducting research on cybercrime. In this work, fractional-order model was replaced by involving three sorts human populations: online users, hackers, cyber security professionals, order examine user-hacker system. The existence, uniqueness boundedness were studied. To support our theoretical conclusions, numerical analysis influence various logical parameters conducted we derived necessary conditions for different equilibrium points be locally stable. We examined effects fear level refuge factor densities prey predators explore understand dynamics system better way. Using some special circumstances, examined. Our findings validated through utilizing generalized Adams-Bashforth-Moulton technique.</p>
Language: Английский
Citations
3Integration, Journal Year: 2025, Volume and Issue: unknown, P. 102399 - 102399
Published: March 1, 2025
Language: Английский
Citations
0IEEE Internet of Things Journal, Journal Year: 2024, Volume and Issue: 11(18), P. 30368 - 30375
Published: June 10, 2024
Language: Английский
Citations
2Nonlinear Dynamics, Journal Year: 2024, Volume and Issue: 112(22), P. 20417 - 20435
Published: Aug. 7, 2024
Language: Английский
Citations
2Journal of Applied Physics, Journal Year: 2024, Volume and Issue: 136(18)
Published: Nov. 8, 2024
In view of the security problems image encryption algorithms encoded by single DNA or RNA, to increase randomness diffusion process and uncertainty coding rules, we propose a combining dynamic RNA computing based chaotic algorithm, which has more complicated for improving algorithm increases difficulty decoding. First, new three-dimensional hyperchaotic map is proposed, exhibits rich set behaviors. Second, sequences generated proposed are passed NIST test with good implemented digital signal processing hardware, shows feasibility industrial applications. K-means used split plaintext into two parts. Third, sequence displace diffuse parts plaintext, respectively. Then, were encode using these parts, compute Finally, cipher text decoded accordingly. The experimental results show that compared some related algorithms, our method higher security.
Language: Английский
Citations
2