Chaos-based approaches to digital data security: Analysis of incommensurate fractional-order Arneodo chaotic system and engineering application on Nvidia Jetson AGX Orin
Integration,
Journal Year:
2025,
Volume and Issue:
unknown, P. 102355 - 102355
Published: Jan. 1, 2025
Language: Английский
A novel image gravity transform based on least significant bit in image steganography
Mathematics and Computers in Simulation,
Journal Year:
2025,
Volume and Issue:
unknown
Published: March 1, 2025
Language: Английский
RBFNN-PSO Intelligent Synchronisation Method for Sprott B Chaotic Systems with External Noise and Its Application in an Image Encryption System
Yanpeng Zhang,
No information about this author
Jian Zeng,
No information about this author
Wenhao Yan
No information about this author
et al.
Entropy,
Journal Year:
2024,
Volume and Issue:
26(10), P. 855 - 855
Published: Oct. 10, 2024
In
the
past
two
decades,
research
in
field
of
chaotic
synchronization
has
attracted
extensive
attention
from
scholars,
and
at
same
time,
more
methods,
such
as
master-slave
synchronization,
projection
sliding
film
fractional-order
so
on,
have
been
proposed
applied
to
secure
communication.
this
paper,
based
on
radial
basis
function
neural
network
theory
particle
swarm
optimisation
algorithm,
RBFNN-PSO
synchronisation
method
is
for
Sprott
B
system
with
external
noise.
The
RBFNN
controller
constructed,
its
parameters
are
used
parameters,
optimal
values
obtained
by
PSO
training
method,
which
overcomes
influence
noise
achieves
system.
Then,
it
shown
numerical
simulation
analysis
that
scheme
a
good
performance
against
Because
multiple
attractors
richer
dynamics,
chaos
image
encryption
particular,
Zigzag
disambiguation
top
corner
rotation
RGB
channel
selection
proposed,
sequences
diffused
disambiguated
data
streams,
respectively.
Therefore,
decryption
transmission
implemented
results
given,
random
distribution
characteristics
encrypted
images
analysed
using
histogram
Shannon
entropy
final
achieve
expected
results.
Language: Английский
Image Steganography Technique based on Lorenz Chaotic System and Bloom Filter
Ahmad Salim,
No information about this author
Khitam Abdulbasit Mohammed,
No information about this author
Farah Maath Jasem
No information about this author
et al.
International Journal of Computing and Digital Systems,
Journal Year:
2024,
Volume and Issue:
15(1), P. 851 - 859
Published: May 14, 2024
Steganography
is
the
study
of
invisible
communication,
which
typically
focuses
on
methods
concealing
existence
communicated
message.Steganography
now
widely
used
as
a
means
protecting
sensitive
data.The
term
"security"
in
steganography
systems
mainly
implies
to
idea
"undetectability",
that
is,
how
effective
steganographic
method
for
hiding
data
terms
its
capability
avoid
detection
through
statistical
analysis
and
remain
undiscovered
even
if
cover
media
found
by
an
unauthorized
party.There
are
many
techniques
systems,
one
most
common
Least
Significant
Bit
(LSB)
technique.In
this
approach,
some
right-most
bits
image
replaced
with
be
hidden.Due
computations
simlicity
it
extremely
susceptible
attacks
remains
challenge.The
proposed
technique
utilizes
chaotic
generate
pseudo-random
positions
within
images.By
leveraging
Lorenz's
system
Bloom
filter,
aims
enhance
information
security
preventing
repetition
loss
same
pixel.The
approach
overcomes
vulnerabilities
traditional
LSB
embedding
encrypted
arbitrary
locations,
making
more
secure
against
steganalysis.Results
demonstrate
method's
effectiveness
visual
analytical
attacks,
PSNR
48.57%
NPCR
32.35%.This
innovative
offers
robust
solution
securely
images,
contributing
advancement
digital
systems.
Language: Английский
Efficient three layer secured adaptive video steganography method using chaotic dynamic systems
Dhanesh Kumar,
No information about this author
V. K. Sudha,
No information about this author
N. Manikandan
No information about this author
et al.
Scientific Reports,
Journal Year:
2024,
Volume and Issue:
14(1)
Published: Aug. 7, 2024
In
light
of
the
unprecedented
growth
in
internet
usage,
safeguarding
data
from
unauthorized
access
has
emerged
as
a
paramount
concern.
Cryptography
and
steganography
stand
pivotal
methods
for
ensuring
security
during
transmission.
This
study
introduces
an
innovative
adaptive
video
approach
featuring
three
tiers
extracting
concealed
information,
thereby
facilitating
secure
communication.
The
embedding
process
operates
within
spatial
domain
cover
frames,
enabling
remarkable
hiding
ratio
up
to
28.125%
(equivalent
2.25
bits
per
pixel
payload)
without
compromising
quality
frames.
Users
are
afforded
flexibility
select
between
partial
or
full
capacity
C
Language: Английский