Journal of the Franklin Institute, Journal Year: 2024, Volume and Issue: 361(18), P. 107315 - 107315
Published: Oct. 9, 2024
Language: Английский
Journal of the Franklin Institute, Journal Year: 2024, Volume and Issue: 361(18), P. 107315 - 107315
Published: Oct. 9, 2024
Language: Английский
Integration, Journal Year: 2024, Volume and Issue: unknown, P. 102336 - 102336
Published: Dec. 1, 2024
Language: Английский
Citations
2Symmetry, Journal Year: 2024, Volume and Issue: 16(7), P. 868 - 868
Published: July 9, 2024
The symmetric multi-scroll strange attractor has shown great potential in chaos-based applications due to its high complexity phase space. Here, the approach of symmetrization is employed for doubling generate pseudo-multi-scroll attractors a discrete map, where carefully selected offset constant key organizing coexisting attractors. By choosing Hénon map and implementing digital circuit on microcontroller, this study fills significant gap research chaotic systems. performance further validated using pseudo-random number generator, demonstrating substantial academic contributions field chaos theory. Additionally, attractor-based squirrel search algorithm first developed, showcasing practical application mobile robot path planning. This work not only advances theoretical understanding systems but also provides methods implementation systems, offering valuable insights policy-making advanced robotic intelligent manufacturing.
Language: Английский
Citations
1Physica Scripta, Journal Year: 2024, Volume and Issue: 99(10), P. 105253 - 105253
Published: Sept. 3, 2024
Abstract In this paper, a new method for generating multi-scroll chaotic attractors by introducing memristor model into an improved Chua’s system is presented. The dynamic characteristics of the are analyzed, including equilibria and stability, bifurcation diagrams, Lyapunov exponents phase diagrams. Strikingly, it can exhibit three-scroll, four-scroll five-scroll hidden only changing one parameter different shapes coexist with same parameter. Furthermore, high randomness verified through 0–1 test NIST test. By using system, image encryption algorithm (IEA) designed to guarantee secure efficient transmission digital images. This IEA uses whirlpool transformation scramble pixel positions DNA computation diffuse values. simulation performance analysis results indicate that proposed has security reliable performance, which in turn confirms availability memristor-based system.
Language: Английский
Citations
1iScience, Journal Year: 2024, Volume and Issue: 27(9), P. 110768 - 110768
Published: Aug. 20, 2024
This article proposes a secure communication enhancement scheme based on face detection and chaotic partition permutation. The uses edge technology to detect facial information, which is then used as an encryption object. hash value of the plaintext image extracted secret key sequence generated by system. Then series operations are performed obtain final ciphertext image. In this article, two systems generate pseudo-random sequences for different steps. initial computed combining function external parameters. experimental results security analysis show that algorithm has excellent effectiveness performance against various typical attacks.
Language: Английский
Citations
1AIMS Mathematics, Journal Year: 2024, Volume and Issue: 9(9), P. 23812 - 23836
Published: Jan. 1, 2024
<p>With the advent of quantum computing, traditional cryptography algorithms are at risk being broken. Post-quantum encryption algorithms, developed to include mathematical challenges make it impossible for computers solve problems, constantly updated ensure that sensitive information is protected from potential threats. In this study, a hybrid examination (<italic>p,q</italic>)-Bernstein-type polynomial, which an argument can be used with post-quantum approach, was made and perspective. addition, we have aimed present new useful operator approximates functions in cases where not possible work fields technology, medicine, engineering. Based on idea, version (<italic>p,q</italic>)-Bernstein-Schurer introduced our study variable interval convergence rate calculated two different methods. At same time, applications theoretical situation were presented help visual illustrations tables related approach. Additionally, satisfied statistical-type Korovkin theorem suitable approximation. This first paper statistical properties operators defined bounded interval, obtain special matrices (<italic>p,q</italic>)-basis functions, give application (<italic>p,q</italic>)-type encrypted image transmission.</p>
Language: Английский
Citations
0International Journal of Modern Physics C, Journal Year: 2024, Volume and Issue: unknown
Published: Nov. 8, 2024
In this paper, we develop a novel n-dimensional discrete chaotic map. First, the behaviors of proposed map are studied. Next, to illustrate effectiveness our map, 4D hyperchaotic as an example is analyzed using phase diagram, Lyapunov exponents, bifurcation diagrams and different types entropy, etc. Moreover, signals generated by passed NIST test were implemented on hardware DSP. Finally, apply in image encryption true numbers extended XOR. The experimental results express that presented algorithm has higher level security than same other sophisticated methods.
Language: Английский
Citations
0Physica Scripta, Journal Year: 2024, Volume and Issue: 100(1), P. 015229 - 015229
Published: Dec. 6, 2024
Abstract The bipolar pulse current can effectively mimic the external time-varying stimulus of neurons, and its effect neuronal dynamics has rarely been reported. To this end, paper reports effects pulses on a two-dimensional single inertial neuron model, showcasing chaotic hidden attractors coexisting symmetric attractors, which is significant importance for understanding complex behaviors under stimuli application. Firstly, mathematical model intertial with forced presented, then equilibrium states behaving as unstable saddle point (USP), stable node-focus (SNF), node (SNP) are analyzed. Additionally, by using multiple dynamical methods including bifurcation plots, basins attraction, phase interesting revealed, induced well initial values, both. In addition, such effets valideted via simple multiplerless electronic circuit. implementation circuit presented constructed analog level executed PSIM platform. measurement results verified double-scroll period/chaos behaviors. Finally, sequences applied to color image encryption benefit requirements modern security field. effectiveness demonstrated through various evaluation indexes, histogram analysis, information entropy, correlation coefficient, plaintext sensitivity, resistance noise attacks.
Language: Английский
Citations
0AIMS Mathematics, Journal Year: 2024, Volume and Issue: 9(12), P. 35377 - 35400
Published: Jan. 1, 2024
<p>Block ciphers are essential for the secure exchange of data and communication, as they one primary components network security systems. Modern-day block most significantly reliant on substitution-boxes (S-boxes). In essence, these cryptosystems is contingent upon quality S-box that implemented. Robustness assurance competency necessary to provided by cryptographically strong S-boxes. A novel coset graph-based algebraic method was proposed evolve a robust efficient in order address challenges generation. To begin, vertices graphs two Galois fields bijective function were employed generate an initial sufficient cryptographic strength. Afterwards, permutation group large enhances robustness S-box, ensuring its resistance against various cryptanalytic attacks. The method's efficacy verified comparing attributes our with those S-boxes have been recently investigated. Furthermore, used image encryption. outcome majority logic criterion (MLC) criteria, differential analysis, histogram test demonstrates suitability multimedia applications results.</p>
Language: Английский
Citations
0Journal of the Franklin Institute, Journal Year: 2024, Volume and Issue: 361(18), P. 107315 - 107315
Published: Oct. 9, 2024
Language: Английский
Citations
0