A multidimensional image encryption and decryption technology DOI
Wentao Kang

Journal of the Franklin Institute, Journal Year: 2024, Volume and Issue: 361(18), P. 107315 - 107315

Published: Oct. 9, 2024

Language: Английский

Deep learning-based encryption scheme for medical images using DCGAN and virtual planet domain DOI Creative Commons
Mahesh Kumar, Aneesh Sreevallabh Chivukula,

Gunjan Barua

et al.

Scientific Reports, Journal Year: 2025, Volume and Issue: 15(1)

Published: Jan. 7, 2025

Abstract The motivation for this article stems from the fact that medical image security is crucial maintaining patient confidentiality and protecting against unauthorized access or manipulation. This paper presents a novel encryption technique integrates Deep Convolutional Generative Adversarial Networks (DCGAN) Virtual Planet Domain (VPD) approach to enhance protection of images. method uses Learning (DL) framework generate decoy image, which forms basis generating keys using timestamp, nonce, 1-D Exponential Chebyshev map (1-DEC). Experimental results validate efficacy in safeguarding images various threats, including access, tampering, adversarial attacks. randomness encrypted are demonstrated through National Institute Standards Technology (NIST) SP 800-22 Statistical test suite provided Tables 4 14, respectively. robustness key sensitivity, noise, cropping attacks, attacks shown Figs. 15–18, 22–23, 24. data presented 5, 6, 7 shows proposed algorithm robust efficient terms time space complexity. Security analysis (such as histogram plots 11–14 correlation 19–21). Information Entropy ( $$7.9993 \pm 0.0001$$ ), coefficient $$\pm 0.09$$ Mean Square Error (MSE) $$4166.3107 1645.2980$$ Peak Signal Noise Ratio (PSNR) $$12.2643 1.7032$$ Number Pixel Change Rate (NPCR) $$99.60\% 0.2\%$$ Unified Average Changing Intensity (UACI) $$33.47\% 0.1\%$$ ) underscore high reliability images, 8–11. Further, statistical NPCR UACI calculated 12 13, also compared with existing algorithms, values Table 15. 3–15 suggest can opt practical use.

Language: Английский

Citations

2

Development of a video encryption algorithm for critical areas using 2D extended Schaffer function map and neural networks DOI
Suo Gao, Jiafeng Liu, Herbert Ho‐Ching Iu

et al.

Applied Mathematical Modelling, Journal Year: 2024, Volume and Issue: 134, P. 520 - 537

Published: June 14, 2024

Language: Английский

Citations

15

Controlling memory chaos and synchronization in real order nonlinear systems DOI
Bichitra Kumar Lenka, Ranjit Kumar Upadhyay

Journal of the Franklin Institute, Journal Year: 2025, Volume and Issue: 362(3), P. 107503 - 107503

Published: Jan. 8, 2025

Language: Английский

Citations

1

Chaos-based audio encryption: Efficacy of 2D and 3D hyperchaotic systems DOI Creative Commons

T.P. Mithun Haridas,

Upasana S.D.,

G. Vyshnavi

et al.

Franklin Open, Journal Year: 2024, Volume and Issue: 8, P. 100158 - 100158

Published: Sept. 1, 2024

Language: Английский

Citations

8

Chaotic Dynamics Analysis and FPGA Implementation Based on Gauss Legendre Integral DOI Creative Commons
Wen Li, Li Cui, Hairong Lin

et al.

Mathematics, Journal Year: 2025, Volume and Issue: 13(2), P. 201 - 201

Published: Jan. 9, 2025

In this paper, we first design the corresponding integration algorithm and matlab program according to Gauss–Legendre principle. Then, select Lorenz system, Duffing hidden attractor chaotic system Multi-wing for dynamics analysis. We apply integral Runge–Kutta solution of dissipative systems time analyze compare differences between two algorithms. propose a basin attraction estimation method based on Lyapunov exponent decision criterion method. This can better obtain region distinguish pseudo-attractor, which provides new way Finally, use FPGA technology realize four algorithm.

Language: Английский

Citations

0

Chaos and stability of a fractional model of the cyber ecosystem DOI Creative Commons
J.F. Gómez‐Aguilar, Manisha Krishna Naik, Reny George

et al.

AIMS Mathematics, Journal Year: 2024, Volume and Issue: 9(8), P. 22146 - 22173

Published: Jan. 1, 2024

<p>The widespread use of computer hardware and software in society has led to the emergence a type criminal conduct known as cybercrime, which become major worldwide concern 21st century spanning multiple domains. As result, present setting, academics practitioners are showing great deal interest conducting research on cybercrime. In this work, fractional-order model was replaced by involving three sorts human populations: online users, hackers, cyber security professionals, order examine user-hacker system. The existence, uniqueness boundedness were studied. To support our theoretical conclusions, numerical analysis influence various logical parameters conducted we derived necessary conditions for different equilibrium points be locally stable. We examined effects fear level refuge factor densities prey predators explore understand dynamics system better way. Using some special circumstances, examined. Our findings validated through utilizing generalized Adams-Bashforth-Moulton technique.</p>

Language: Английский

Citations

3

Design and Practical Implementation of a Novel Hyperchaotic System Generator Based on Apéry's Constant DOI
Ömer Koçak, Uğur Erkan,

İsmail Babaoglu

et al.

Integration, Journal Year: 2025, Volume and Issue: unknown, P. 102399 - 102399

Published: March 1, 2025

Language: Английский

Citations

0

Design, Dynamical Analysis, and Hardware Implementation of a Novel Memcapacitive Hyperchaotic Logistic Map DOI
Suo Gao, Herbert Ho‐Ching Iu, Uğur Erkan

et al.

IEEE Internet of Things Journal, Journal Year: 2024, Volume and Issue: 11(18), P. 30368 - 30375

Published: June 10, 2024

Language: Английский

Citations

2

A new image encryption algorithm with feedback key mechanism using two-dimensional dual discrete quadratic chaotic map DOI

Fang Chen Yin,

Ao Li,

Chunyan Lv

et al.

Nonlinear Dynamics, Journal Year: 2024, Volume and Issue: 112(22), P. 20417 - 20435

Published: Aug. 7, 2024

Language: Английский

Citations

2

Novel chaotic image cryptosystem based on dynamic RNA and DNA computing DOI
Shuang Zhou, Yi Wei, Shiyu Wang

et al.

Journal of Applied Physics, Journal Year: 2024, Volume and Issue: 136(18)

Published: Nov. 8, 2024

In view of the security problems image encryption algorithms encoded by single DNA or RNA, to increase randomness diffusion process and uncertainty coding rules, we propose a combining dynamic RNA computing based chaotic algorithm, which has more complicated for improving algorithm increases difficulty decoding. First, new three-dimensional hyperchaotic map is proposed, exhibits rich set behaviors. Second, sequences generated proposed are passed NIST test with good implemented digital signal processing hardware, shows feasibility industrial applications. K-means used split plaintext into two parts. Third, sequence displace diffuse parts plaintext, respectively. Then, were encode using these parts, compute Finally, cipher text decoded accordingly. The experimental results show that compared some related algorithms, our method higher security.

Language: Английский

Citations

2