RBFNN-PSO Intelligent Synchronisation Method for Sprott B Chaotic Systems with External Noise and Its Application in an Image Encryption System DOI Creative Commons
Yanpeng Zhang,

Jian Zeng,

Wenhao Yan

и другие.

Entropy, Год журнала: 2024, Номер 26(10), С. 855 - 855

Опубликована: Окт. 10, 2024

In the past two decades, research in field of chaotic synchronization has attracted extensive attention from scholars, and at same time, more methods, such as master-slave synchronization, projection sliding film fractional-order so on, have been proposed applied to secure communication. this paper, based on radial basis function neural network theory particle swarm optimisation algorithm, RBFNN-PSO synchronisation method is for Sprott B system with external noise. The RBFNN controller constructed, its parameters are used parameters, optimal values obtained by PSO training method, which overcomes influence noise achieves system. Then, it shown numerical simulation analysis that scheme a good performance against Because multiple attractors richer dynamics, chaos image encryption particular, Zigzag disambiguation top corner rotation RGB channel selection proposed, sequences diffused disambiguated data streams, respectively. Therefore, decryption transmission implemented results given, random distribution characteristics encrypted images analysed using histogram Shannon entropy final achieve expected results.

Язык: Английский

A Novel Multi-Channel Image Encryption Algorithm Leveraging Pixel Reorganization and Hyperchaotic Maps DOI Creative Commons
Wei Feng, Jiaxin Yang, Xiangyu Zhao

и другие.

Mathematics, Год журнала: 2024, Номер 12(24), С. 3917 - 3917

Опубликована: Дек. 12, 2024

Chaos-based encryption is promising for safeguarding digital images. Nonetheless, existing chaos-based algorithms still exhibit certain shortcomings. Given this, we propose a novel multi-channel image algorithm that leverages pixel reorganization and hyperchaotic maps (MIEA-PRHM). Our MIEA-PRHM employs two to jointly generate chaotic sequences, ensuring larger key space better randomness. During the process, first convert input images into fused matrices through reorganization. Then, apply rounds of scrambling diffusion operations, coupled with one round substitution high 4-bit matrix. For low matrix, conduct operations. Extensive experiments comparisons demonstrate outperforms many recent in various aspects, especially efficiency.

Язык: Английский

Процитировано

26

Multiscroll hopfield neural network with extreme multistability and its application in video encryption for IIoT DOI
Fei Yu, Yue Lin, Wei Yao

и другие.

Neural Networks, Год журнала: 2024, Номер 182, С. 106904 - 106904

Опубликована: Ноя. 17, 2024

Язык: Английский

Процитировано

24

A class of n-D Hamiltonian conservative chaotic systems with three-terminal memristor: Modeling, dynamical analysis, and FPGA implementation DOI

Ye Yuan,

Fei Yu, Boon Thong Tan

и другие.

Chaos An Interdisciplinary Journal of Nonlinear Science, Год журнала: 2025, Номер 35(1)

Опубликована: Янв. 1, 2025

Memristors are commonly used to introduce various chaotic systems and can be enhance their characteristics. However, due the strict construction conditions of Hamiltonian systems, there has been limited research on development memristive conservative (MHCCSs). In this work, a method for constructing three-terminal memristors is proposed, incorporated into system, resulting in class n-D MHCCS. Based method, we model 4D MHCCS as standard detailed dynamic analysis. The analysis reveals that exhibits complex behaviors, including conservativeness, symmetry, chaos depending parameters, extreme multistability, under wide parameter range. shows not only retains favorable characteristics system but also more nonlinear dynamics incorporation memristors, thereby further enhancing its Furthermore, pseudo-random number generator based excellent randomness terms NIST test. Finally, physical realizability verified through Field Programmable Gate Array experiments. This study demonstrates constructed MHCCSs good entropy source applied embedded secure communication, cryptographic generator.

Язык: Английский

Процитировано

4

Dynamical Behavior of SW-SW Neural Networks DOI
Zhiyi Yuan,

YaLian Wu,

C. J. Ou

и другие.

Chinese Journal of Physics, Год журнала: 2025, Номер unknown

Опубликована: Янв. 1, 2025

Язык: Английский

Процитировано

3

Social Image Security with Encryption and Watermarking in Hybrid Domains DOI Creative Commons

Conghuan Ye,

Shenglong Tan, Jun Wang

и другие.

Entropy, Год журнала: 2025, Номер 27(3), С. 276 - 276

Опубликована: Март 6, 2025

In this digital era, social images are the most vital information carrier on multimedia platforms. More and more users interested in sharing with mobile terminals Social image also faces potential risks from malicious use, such as illegal sharing, piracy, misappropriation. This paper mainly concentrates secure sharing. To address how to share a safe way, security scheme is proposed. The technology addresses problem active tracing problem. First, discrete wavelet transform (DWT) performed directly JPEG image. Then, high-bit planes of LL, LH, HL permuted cellular automation (CA), bit-XOR, singular value decomposition (SVD) computing, their low-bit chosen embed watermark. end, encrypted watermarked again cosine (DCT) domain. Experimental results analysis show that method not only has good performance robustness, security, time complexity but can actively trace distribution images. proposed provide double-level for

Язык: Английский

Процитировано

3

An Image Encryption Algorithm Based on Tabu Search and Hyperchaos DOI

Xiaojuan Ma,

Zhifei Wang,

Chunhua Wang

и другие.

International Journal of Bifurcation and Chaos, Год журнала: 2024, Номер 34(14)

Опубликована: Окт. 5, 2024

In this paper, we propose a digital image encryption scheme based on Tabu Search (TS) algorithm and Chen’s hyperchaos system. First, in order to enhance the security of resist known-plaintext attack, key is associated with ordinary image, hash value generated by used as initial hyperchaotic Moreover, TS obtain optimal subsequence scramble sub-block which ensures scrambling effect algorithm. addition, for sake minimizing correlation neighborhood pixels strengthening scrambling, divided into blocks diffusion. Through simulation experiments, sensitivity, differential attack pure ciphertext are analyzed. Compared other schemes, results verify effectiveness reliability proposed scheme.

Язык: Английский

Процитировано

15

Dynamics in a memristive neural network with three discrete heterogeneous neurons and its application DOI

Dingwei Luo,

Chunhua Wang, Quanli Deng

и другие.

Nonlinear Dynamics, Год журнала: 2024, Номер unknown

Опубликована: Ноя. 4, 2024

Язык: Английский

Процитировано

11

Real-time dynamic medical image encryption based on extended multi-scroll memristive Hopfield neural network DOI
Xiangxin Leng, Xiaoping Wang, Baoxiang Du

и другие.

Nonlinear Dynamics, Год журнала: 2025, Номер unknown

Опубликована: Янв. 23, 2025

Язык: Английский

Процитировано

1

Memristive multi-wing chaotic hopfield neural network for LiDAR data security DOI
Quanli Deng, Chunhua Wang, Yichuang Sun

и другие.

Nonlinear Dynamics, Год журнала: 2025, Номер unknown

Опубликована: Фев. 20, 2025

Язык: Английский

Процитировано

1

A hidden multiwing memristive neural network and its application in remote sensing data security DOI

Sirui Ding,

Hairong Lin, Xiaoheng Deng

и другие.

Expert Systems with Applications, Год журнала: 2025, Номер unknown, С. 127168 - 127168

Опубликована: Март 1, 2025

Язык: Английский

Процитировано

1