Dynamical analysis, multi-cavity control and DSP implementation of a novel memristive autapse neuron model emulating brain behaviors
Chaos Solitons & Fractals,
Journal Year:
2024,
Volume and Issue:
191, P. 115857 - 115857
Published: Dec. 4, 2024
Language: Английский
Dynamic behavior of multi-dimensional chaotic systems based on state variables and unknown parameters with applications in image encryption
Jingfeng Jie,
No information about this author
Ping Zhang,
No information about this author
Yang Yang
No information about this author
et al.
Physica Scripta,
Journal Year:
2025,
Volume and Issue:
100(2), P. 025222 - 025222
Published: Jan. 14, 2025
Abstract
To
explore
the
impact
of
unknown
terms
and
parameters
on
chaotic
characteristics
in
systems,
this
paper
examines
effects
state
variables
parameters.
The
study
focuses
different
combinations
linear,
nonlinear,
constant
It
primarily
investigates
role
multi-order
their
application
to
system
models
varying
dimensions.
Firstly,
by
simulating
a
three-dimensional
system,
analyzes
how
nonlinear
initial
conditions
affect
system's
behavior.
Secondly,
it
evaluates
four-dimensional
combining
with
parameters,
using
tools
such
as
Lyapunov
index
diagrams,
sample
entropy,
dynamic
trajectory
plots.
Finally,
integrates
constructed
mapping
develop
two-level
key
image
encryption
thoroughly
assessing
its
security
resistance
interference.
Language: Английский
A bistable locally active memristor multisynaptically coupled to Rulkov neurons
Jinyue Zhu,
No information about this author
Yinghong Cao,
No information about this author
Xianying Xu
No information about this author
et al.
The European Physical Journal Plus,
Journal Year:
2025,
Volume and Issue:
140(3)
Published: March 7, 2025
Language: Английский
A novel 3-D image encryption algorithm based on SHA-256 and chaos theory
Alexandria Engineering Journal,
Journal Year:
2025,
Volume and Issue:
122, P. 564 - 577
Published: March 20, 2025
Language: Английский
A Mixed Chaotic Image Encryption Method Based on Parallel Rotation Scrambling in Rubik’s Cube Space
Lu Xu,
No information about this author
Yun Chen,
No information about this author
Yanlin Qin
No information about this author
et al.
Entropy,
Journal Year:
2025,
Volume and Issue:
27(6), P. 574 - 574
Published: May 28, 2025
Most
image
encryption
methods
based
on
Rubik’s
cube
scrambling
adopt
the
idea
of
cyclic
shift
or
map
pixels
to
surface,
not
fully
considering
cube’s
three-dimensional
(3D)
properties.
In
response
this
defect,
we
propose
a
mixed
chaotic
color
method
parallel
rotation
in
3D
space.
First,
seven-dimensional
hyperchaotic
system
is
introduced
generate
pseudo-random
integer
sequences.
Then,
proven
lemma
applied
preprocess
red
(R),
green
(G),
and
blue
(B)
channels
plain
realize
first
diffusion.
Next,
sequence
employed
control
Arnold
transformation,
scrambled
two-dimensional
(2D)
pixel
matrix
converted
into
matrix.
by
dynamically
selecting
rotating
axis,
layer
number,
angle
through
sequence.
The
2D
matrix,
realizing
second
diffusion
via
exclusive
OR
with
generated
logistic
mapping.
Finally,
matrices
R,
G,
B
are
combined
an
encrypted
image.
By
performing
algorithm
reverse,
can
be
decrypted
A
simulation
analysis
shows
that
proposed
has
larger
key
space
exhibits
stronger
sensitivity
than
some
existing
methods.
Language: Английский
An image encryption scheme based on new hyperchaos and encrypted kinoform
Journal of the Franklin Institute,
Journal Year:
2025,
Volume and Issue:
unknown, P. 107794 - 107794
Published: June 1, 2025
Language: Английский
Optimization of Image Encryption Algorithm Based on Henon Mapping and Arnold Transformation of Chaotic Systems
Yuebo Wu,
No information about this author
Shiwei Chu,
No information about this author
Huifang Bao
No information about this author
et al.
IEEE Access,
Journal Year:
2024,
Volume and Issue:
12, P. 116905 - 116916
Published: Jan. 1, 2024
Language: Английский
Cross-Channel Color Image Encryption Scheme Based on Discrete Memristive Coupled Neurons and DWT Compression
Electronics,
Journal Year:
2024,
Volume and Issue:
13(13), P. 2647 - 2647
Published: July 5, 2024
To
address
the
consumption
and
security
of
color
images
for
transmission
storage,
a
cross-channel
image
encryption
scheme
based
on
discrete
memristive
coupled
neuron
model
DWT
compression
is
designed
in
this
article.
Firstly,
dynamics
system
are
analyzed
found
to
possess
hyperchaotic
phenomenon,
which
provides
sufficient
scheme.
Secondly,
processed
by
wavelet
transform
(DWT)
has
quarter
previous
capacity.
Then,
combined
with
Hash
function,
resulting
sequence
given
initial
value
system.
Next,
particle
swarm
foraging
algorithm
(PSFA)
better
disrupt
correlation
RGB
channel.
Finally,
complementary
DNA
coding
rule
implemented
further
images.
Simulation
results
show
that
even
lossy
compression,
recovered
can
be
clearly
seen.
The
performance
analysis
illustrates
under
system,
proposed
brings
higher
Language: Английский
An image encryption approach combining cross-interaction region scrambling and plainimage-related diffusion using a dynamic external key
Alexandria Engineering Journal,
Journal Year:
2024,
Volume and Issue:
114, P. 198 - 230
Published: Nov. 30, 2024
Language: Английский
An image encryption algorithm for colour images based on a cellular neural network and the Chua's chaotic system
Chao Huang,
No information about this author
Tao Ye,
No information about this author
J. Y. Zhao
No information about this author
et al.
Journal of Modern Optics,
Journal Year:
2024,
Volume and Issue:
unknown, P. 1 - 16
Published: Oct. 23, 2024
In
the
internet
era,
image
encryption
technology
plays
a
crucial
role
in
ensuring
security
of
information.
Aiming
at
problem
that
low-dimensional
chaotic
has
relatively
small
key
space
and
is
vulnerable
to
chosen-plain
attacks,
this
paper
proposed
novel
colour
block
algorithm
based
on
cellular
neural
network
Chua's
system.
Firstly,
plain
separated
into
three
primary
colours.
And
Fourier
transform
applied
achieve
optical
transformation,
generating
six
sequences
iteratively.
Secondly,
were
combined
pairs.
then
with
form
sequences,
which
used
diffusion
process.
Finally,
improved
system
scramble
image.
Both
scrambling
are
performed
synchronously
during
encryption.
Through
above
operation,
we
get
final
encrypted
picture.
The
experimental
results
show
excellent
effect
can
resist
common
attacks.
Language: Английский