A multidimensional image encryption and decryption technology DOI
Wentao Kang

Journal of the Franklin Institute, Journal Year: 2024, Volume and Issue: 361(18), P. 107315 - 107315

Published: Oct. 9, 2024

Language: Английский

Image encryption algorithm based on the dynamic RNA computing and a new chaotic map DOI
Shuang Zhou, Yi Wei, Yingqian Zhang

et al.

Integration, Journal Year: 2024, Volume and Issue: unknown, P. 102336 - 102336

Published: Dec. 1, 2024

Language: Английский

Citations

2

Symmetric Pseudo-Multi-Scroll Attractor and Its Application in Mobile Robot Path Planning DOI Open Access
Yongxin Li, Chunbiao Li,

Wanning Yu

et al.

Symmetry, Journal Year: 2024, Volume and Issue: 16(7), P. 868 - 868

Published: July 9, 2024

The symmetric multi-scroll strange attractor has shown great potential in chaos-based applications due to its high complexity phase space. Here, the approach of symmetrization is employed for doubling generate pseudo-multi-scroll attractors a discrete map, where carefully selected offset constant key organizing coexisting attractors. By choosing Hénon map and implementing digital circuit on microcontroller, this study fills significant gap research chaotic systems. performance further validated using pseudo-random number generator, demonstrating substantial academic contributions field chaos theory. Additionally, attractor-based squirrel search algorithm first developed, showcasing practical application mobile robot path planning. This work not only advances theoretical understanding systems but also provides methods implementation systems, offering valuable insights policy-making advanced robotic intelligent manufacturing.

Language: Английский

Citations

1

Improved Chua's chaotic system with a novel memristor: Generating multi-scroll hidden attractors and applications in image encryption DOI
Pengfei Ding,

Juan Zhang,

Jingge Zhu

et al.

Physica Scripta, Journal Year: 2024, Volume and Issue: 99(10), P. 105253 - 105253

Published: Sept. 3, 2024

Abstract In this paper, a new method for generating multi-scroll chaotic attractors by introducing memristor model into an improved Chua’s system is presented. The dynamic characteristics of the are analyzed, including equilibria and stability, bifurcation diagrams, Lyapunov exponents phase diagrams. Strikingly, it can exhibit three-scroll, four-scroll five-scroll hidden only changing one parameter different shapes coexist with same parameter. Furthermore, high randomness verified through 0–1 test NIST test. By using system, image encryption algorithm (IEA) designed to guarantee secure efficient transmission digital images. This IEA uses whirlpool transformation scramble pixel positions DNA computation diffuse values. simulation performance analysis results indicate that proposed has security reliable performance, which in turn confirms availability memristor-based system.

Language: Английский

Citations

1

Face privacy protection scheme by security-enhanced encryption structure and nonlinear dynamics DOI Creative Commons
Zhiyu Xie, Yiting Lin, Tengyu Liu

et al.

iScience, Journal Year: 2024, Volume and Issue: 27(9), P. 110768 - 110768

Published: Aug. 20, 2024

This article proposes a secure communication enhancement scheme based on face detection and chaotic partition permutation. The uses edge technology to detect facial information, which is then used as an encryption object. hash value of the plaintext image extracted secret key sequence generated by system. Then series operations are performed obtain final ciphertext image. In this article, two systems generate pseudo-random sequences for different steps. initial computed combining function external parameters. experimental results security analysis show that algorithm has excellent effectiveness performance against various typical attacks.

Language: Английский

Citations

1

Security of image transfer and innovative results for (<i>p,q</i>)-Bernstein-Schurer operators DOI Creative Commons
Nazmiye Gönül Bilgin,

Yusuf Kaya,

Melis EREN

et al.

AIMS Mathematics, Journal Year: 2024, Volume and Issue: 9(9), P. 23812 - 23836

Published: Jan. 1, 2024

<p>With the advent of quantum computing, traditional cryptography algorithms are at risk being broken. Post-quantum encryption algorithms, developed to include mathematical challenges make it impossible for computers solve problems, constantly updated ensure that sensitive information is protected from potential threats. In this study, a hybrid examination (<italic>p,q</italic>)-Bernstein-type polynomial, which an argument can be used with post-quantum approach, was made and perspective. addition, we have aimed present new useful operator approximates functions in cases where not possible work fields technology, medicine, engineering. Based on idea, version (<italic>p,q</italic>)-Bernstein-Schurer introduced our study variable interval convergence rate calculated two different methods. At same time, applications theoretical situation were presented help visual illustrations tables related approach. Additionally, satisfied statistical-type Korovkin theorem suitable approximation. This first paper statistical properties operators defined bounded interval, obtain special matrices (<italic>p,q</italic>)-basis functions, give application (<italic>p,q</italic>)-type encrypted image transmission.</p>

Language: Английский

Citations

0

Constructing a novel n-dimensional chaotic map with application to image encryption DOI
Shuang Zhou,

Hongling Zhang,

Yingqian Zhang

et al.

International Journal of Modern Physics C, Journal Year: 2024, Volume and Issue: unknown

Published: Nov. 8, 2024

In this paper, we develop a novel n-dimensional discrete chaotic map. First, the behaviors of proposed map are studied. Next, to illustrate effectiveness our map, 4D hyperchaotic as an example is analyzed using phase diagram, Lyapunov exponents, bifurcation diagrams and different types entropy, etc. Moreover, signals generated by passed NIST test were implemented on hardware DSP. Finally, apply in image encryption true numbers extended XOR. The experimental results express that presented algorithm has higher level security than same other sophisticated methods.

Language: Английский

Citations

0

Single inertial neuron with forced bipolar pulse: chaotic dynamics, circuit implementation, and color image encryption DOI Creative Commons

Shuang Zhao,

Joon Huang Chuah, Anis Salwa Mohd Khairuddin

et al.

Physica Scripta, Journal Year: 2024, Volume and Issue: 100(1), P. 015229 - 015229

Published: Dec. 6, 2024

Abstract The bipolar pulse current can effectively mimic the external time-varying stimulus of neurons, and its effect neuronal dynamics has rarely been reported. To this end, paper reports effects pulses on a two-dimensional single inertial neuron model, showcasing chaotic hidden attractors coexisting symmetric attractors, which is significant importance for understanding complex behaviors under stimuli application. Firstly, mathematical model intertial with forced presented, then equilibrium states behaving as unstable saddle point (USP), stable node-focus (SNF), node (SNP) are analyzed. Additionally, by using multiple dynamical methods including bifurcation plots, basins attraction, phase interesting revealed, induced well initial values, both. In addition, such effets valideted via simple multiplerless electronic circuit. implementation circuit presented constructed analog level executed PSIM platform. measurement results verified double-scroll period/chaos behaviors. Finally, sequences applied to color image encryption benefit requirements modern security field. effectiveness demonstrated through various evaluation indexes, histogram analysis, information entropy, correlation coefficient, plaintext sensitivity, resistance noise attacks.

Language: Английский

Citations

0

Enhancing the robustness of block ciphers through a graphical S-box evolution scheme for secure multimedia applications DOI Creative Commons

Abdul Razaq,

Muhammad Ahsan, Hanan Alolaiyan

et al.

AIMS Mathematics, Journal Year: 2024, Volume and Issue: 9(12), P. 35377 - 35400

Published: Jan. 1, 2024

<p>Block ciphers are essential for the secure exchange of data and communication, as they one primary components network security systems. Modern-day block most significantly reliant on substitution-boxes (S-boxes). In essence, these cryptosystems is contingent upon quality S-box that implemented. Robustness assurance competency necessary to provided by cryptographically strong S-boxes. A novel coset graph-based algebraic method was proposed evolve a robust efficient in order address challenges generation. To begin, vertices graphs two Galois fields bijective function were employed generate an initial sufficient cryptographic strength. Afterwards, permutation group large enhances robustness S-box, ensuring its resistance against various cryptanalytic attacks. The method's efficacy verified comparing attributes our with those S-boxes have been recently investigated. Furthermore, used image encryption. outcome majority logic criterion (MLC) criteria, differential analysis, histogram test demonstrates suitability multimedia applications results.</p>

Language: Английский

Citations

0

A multidimensional image encryption and decryption technology DOI
Wentao Kang

Journal of the Franklin Institute, Journal Year: 2024, Volume and Issue: 361(18), P. 107315 - 107315

Published: Oct. 9, 2024

Language: Английский

Citations

0