IEEE Access,
Journal Year:
2024,
Volume and Issue:
12, P. 102718 - 102744
Published: Jan. 1, 2024
This
work
introduces
a
novel
image
encryption
algorithm
specifically
designed
for
the
protection
of
color
medical
images,
particularly
crucial
in
era
cloud
storage,
where
security
and
privacy
are
paramount.
The
initial
phase
process
leverages
substantial
array
Fibonacci
Q-matrices
to
manipulate
data
intricately.
Following
this,
unique
Substitution
box
(S-box)
transformation,
developed
Galois
field
(28),
is
applied
each
RGB
channels,
further
enhancing
layers.
final
employs
an
key
generated
from
hyperchaotic
system
differential
equations
that
models
memristive
coupled
neural
network,
offering
high
degree
unpredictability
resistance
attacks.
Performance
metrics
show
[Peak
Signal-to-Noise
Ratio
(PSNR)
8.21
dB,
Mean
Absolute
Error
(MAE)
81.72,
≈
0
Pixel
Cross-Correlation
(PCC)],
resistivity
occlusion
noise
attacks,
enormous
space
26112,
with
savvy
parallel
processing
techniques,
rate
16.65
Mbps.
integration
this
into
storage
systems
significant
importance,
as
it
ensures
secure
confidential
handling
sensitive
addressing
growing
concerns
about
breaches
unauthorized
access
healthcare
sector.
Compared
previous
provides
large
26112
small
time
per
around
0.1
second
encrypting
16
images
at
once.
Thus,
approach
suitable
imaging
such
Computed
Tomography
(CT)
scans
generate
multiple
tissues
diagnosis
patient.
Scientific Reports,
Journal Year:
2024,
Volume and Issue:
14(1)
Published: June 6, 2024
Abstract
This
paper
describes
a
novel
4-D
hyperchaotic
system
with
high
level
of
complexity.
It
can
produce
chaotic,
hyperchaotic,
periodic,
and
quasi-periodic
behaviors
by
adjusting
its
parameters.
The
study
showed
that
the
new
experienced
famous
dynamical
property
multistability.
exhibit
different
coexisting
attractors
for
same
parameter
values.
Furthermore,
using
Lyapunov
exponents,
bifurcation
diagram,
equilibrium
points’
stability,
dissipativity,
phase
plots,
was
able
to
investigate
features
proposed
system.
mathematical
model’s
feasibility
is
proved
applying
corresponding
electronic
circuit
Multisim
software.
also
reveals
an
interesting
special
feature
system’s
offset
boosting
control.
Therefore,
4D
very
desirable
use
in
Chaos-based
applications
due
behavior,
multistability,
property,
easily
implementable
circuit.
Then,
presents
voice
encryption
scheme
employs
characteristics
encrypt
signal.
implemented
on
MATLAB
(R2023)
simulate
research
findings.
Numerous
tests
are
used
measure
efficiency
developed
against
attacks,
such
as
histogram
analysis,
percent
residual
deviation
(PRD),
signal-to-noise
ratio
(SNR),
correlation
coefficient
(cc),
key
sensitivity,
NIST
randomness
test.
simulation
findings
show
how
effective
our
resilient
it
cryptographic
assaults.
International Journal of Bifurcation and Chaos,
Journal Year:
2024,
Volume and Issue:
34(06)
Published: May 1, 2024
This
paper
presents
a
novel
discrete
memristor
model
that
incorporates
exponential
and
absolute
value
functions.
A
coupled
neural
network
is
constructed
based
on
this
design.
The
periodic
chaotic
regions
of
the
are
determined
using
bifurcation
Lyapunov
exponent
spectrum.
Furthermore,
by
varying
initial
values
memristive
network,
we
observe
coexistence
chaos
attractors,
as
well
attractors.
Additionally,
an
application
to
color
image
encryption
system
given.
Security
analysis
conducted
in
aspects
key
space,
histogram
analysis,
correlation
sensitivity
Peak
Signal-to-Noise
Ratio
(PSNR),
information
entropy
analysis.
results
show
algorithm
has
space
size
[Formula:
see
text],
baboon
graph
7.9993,
which
very
close
ideal
8.
It
shows
feasible
effective.
Finally,
implementation
realized
Field
Programmable
Gate
Array
(FPGA).
experimental
Verilog
language
Vivado
2018.3
platform,
obtained
align
with
numerical
simulation
through
MATLAB.
Mathematics,
Journal Year:
2024,
Volume and Issue:
12(14), P. 2227 - 2227
Published: July 17, 2024
The
design
of
chaotic
systems
with
complex
dynamic
behaviors
has
always
been
a
key
aspect
chaos
theory
in
engineering
applications.
This
study
introduces
novel
fractional-order
system
characterized
by
hidden
dynamics,
hyperchaotic
behavior,
and
multi-scroll
attractors.
By
employing
fractional
calculus,
the
system’s
order
is
extended
beyond
integer
values,
providing
richer
behavior.
dynamics
are
revealed
through
detailed
numerical
simulations
theoretical
analysis,
demonstrating
attractors
bifurcations.
nature
verified
Lyapunov
exponents
phase
portraits,
showing
multiple
positive
that
indicate
higher
degree
unpredictability
complexity.
Additionally,
analyzed,
showcasing
their
potential
for
secure
communication
encryption
approach
enhances
flexibility
adaptability,
making
it
suitable
wide
range
practical
uses,
including
data
transmission,
image
encryption,
signal
processing.
Finally,
based
on
proposed
system,
we
designed
simple
efficient
medical
scheme
analyzed
its
security
performance.
Experimental
results
validate
findings,
confirming
robustness
effectiveness
generating
behaviors.
IEEE Access,
Journal Year:
2024,
Volume and Issue:
12, P. 102718 - 102744
Published: Jan. 1, 2024
This
work
introduces
a
novel
image
encryption
algorithm
specifically
designed
for
the
protection
of
color
medical
images,
particularly
crucial
in
era
cloud
storage,
where
security
and
privacy
are
paramount.
The
initial
phase
process
leverages
substantial
array
Fibonacci
Q-matrices
to
manipulate
data
intricately.
Following
this,
unique
Substitution
box
(S-box)
transformation,
developed
Galois
field
(28),
is
applied
each
RGB
channels,
further
enhancing
layers.
final
employs
an
key
generated
from
hyperchaotic
system
differential
equations
that
models
memristive
coupled
neural
network,
offering
high
degree
unpredictability
resistance
attacks.
Performance
metrics
show
[Peak
Signal-to-Noise
Ratio
(PSNR)
8.21
dB,
Mean
Absolute
Error
(MAE)
81.72,
≈
0
Pixel
Cross-Correlation
(PCC)],
resistivity
occlusion
noise
attacks,
enormous
space
26112,
with
savvy
parallel
processing
techniques,
rate
16.65
Mbps.
integration
this
into
storage
systems
significant
importance,
as
it
ensures
secure
confidential
handling
sensitive
addressing
growing
concerns
about
breaches
unauthorized
access
healthcare
sector.
Compared
previous
provides
large
26112
small
time
per
around
0.1
second
encrypting
16
images
at
once.
Thus,
approach
suitable
imaging
such
Computed
Tomography
(CT)
scans
generate
multiple
tissues
diagnosis
patient.