Entropy,
Год журнала:
2024,
Номер
26(10), С. 855 - 855
Опубликована: Окт. 10, 2024
In
the
past
two
decades,
research
in
field
of
chaotic
synchronization
has
attracted
extensive
attention
from
scholars,
and
at
same
time,
more
methods,
such
as
master-slave
synchronization,
projection
sliding
film
fractional-order
so
on,
have
been
proposed
applied
to
secure
communication.
this
paper,
based
on
radial
basis
function
neural
network
theory
particle
swarm
optimisation
algorithm,
RBFNN-PSO
synchronisation
method
is
for
Sprott
B
system
with
external
noise.
The
RBFNN
controller
constructed,
its
parameters
are
used
parameters,
optimal
values
obtained
by
PSO
training
method,
which
overcomes
influence
noise
achieves
system.
Then,
it
shown
numerical
simulation
analysis
that
scheme
a
good
performance
against
Because
multiple
attractors
richer
dynamics,
chaos
image
encryption
particular,
Zigzag
disambiguation
top
corner
rotation
RGB
channel
selection
proposed,
sequences
diffused
disambiguated
data
streams,
respectively.
Therefore,
decryption
transmission
implemented
results
given,
random
distribution
characteristics
encrypted
images
analysed
using
histogram
Shannon
entropy
final
achieve
expected
results.
Mathematics,
Год журнала:
2024,
Номер
12(24), С. 3917 - 3917
Опубликована: Дек. 12, 2024
Chaos-based
encryption
is
promising
for
safeguarding
digital
images.
Nonetheless,
existing
chaos-based
algorithms
still
exhibit
certain
shortcomings.
Given
this,
we
propose
a
novel
multi-channel
image
algorithm
that
leverages
pixel
reorganization
and
hyperchaotic
maps
(MIEA-PRHM).
Our
MIEA-PRHM
employs
two
to
jointly
generate
chaotic
sequences,
ensuring
larger
key
space
better
randomness.
During
the
process,
first
convert
input
images
into
fused
matrices
through
reorganization.
Then,
apply
rounds
of
scrambling
diffusion
operations,
coupled
with
one
round
substitution
high
4-bit
matrix.
For
low
matrix,
conduct
operations.
Extensive
experiments
comparisons
demonstrate
outperforms
many
recent
in
various
aspects,
especially
efficiency.
Chaos An Interdisciplinary Journal of Nonlinear Science,
Год журнала:
2025,
Номер
35(1)
Опубликована: Янв. 1, 2025
Memristors
are
commonly
used
to
introduce
various
chaotic
systems
and
can
be
enhance
their
characteristics.
However,
due
the
strict
construction
conditions
of
Hamiltonian
systems,
there
has
been
limited
research
on
development
memristive
conservative
(MHCCSs).
In
this
work,
a
method
for
constructing
three-terminal
memristors
is
proposed,
incorporated
into
system,
resulting
in
class
n-D
MHCCS.
Based
method,
we
model
4D
MHCCS
as
standard
detailed
dynamic
analysis.
The
analysis
reveals
that
exhibits
complex
behaviors,
including
conservativeness,
symmetry,
chaos
depending
parameters,
extreme
multistability,
under
wide
parameter
range.
shows
not
only
retains
favorable
characteristics
system
but
also
more
nonlinear
dynamics
incorporation
memristors,
thereby
further
enhancing
its
Furthermore,
pseudo-random
number
generator
based
excellent
randomness
terms
NIST
test.
Finally,
physical
realizability
verified
through
Field
Programmable
Gate
Array
experiments.
This
study
demonstrates
constructed
MHCCSs
good
entropy
source
applied
embedded
secure
communication,
cryptographic
generator.
Entropy,
Год журнала:
2025,
Номер
27(3), С. 276 - 276
Опубликована: Март 6, 2025
In
this
digital
era,
social
images
are
the
most
vital
information
carrier
on
multimedia
platforms.
More
and
more
users
interested
in
sharing
with
mobile
terminals
Social
image
also
faces
potential
risks
from
malicious
use,
such
as
illegal
sharing,
piracy,
misappropriation.
This
paper
mainly
concentrates
secure
sharing.
To
address
how
to
share
a
safe
way,
security
scheme
is
proposed.
The
technology
addresses
problem
active
tracing
problem.
First,
discrete
wavelet
transform
(DWT)
performed
directly
JPEG
image.
Then,
high-bit
planes
of
LL,
LH,
HL
permuted
cellular
automation
(CA),
bit-XOR,
singular
value
decomposition
(SVD)
computing,
their
low-bit
chosen
embed
watermark.
end,
encrypted
watermarked
again
cosine
(DCT)
domain.
Experimental
results
analysis
show
that
method
not
only
has
good
performance
robustness,
security,
time
complexity
but
can
actively
trace
distribution
images.
proposed
provide
double-level
for
International Journal of Bifurcation and Chaos,
Год журнала:
2024,
Номер
34(14)
Опубликована: Окт. 5, 2024
In
this
paper,
we
propose
a
digital
image
encryption
scheme
based
on
Tabu
Search
(TS)
algorithm
and
Chen’s
hyperchaos
system.
First,
in
order
to
enhance
the
security
of
resist
known-plaintext
attack,
key
is
associated
with
ordinary
image,
hash
value
generated
by
used
as
initial
hyperchaotic
Moreover,
TS
obtain
optimal
subsequence
scramble
sub-block
which
ensures
scrambling
effect
algorithm.
addition,
for
sake
minimizing
correlation
neighborhood
pixels
strengthening
scrambling,
divided
into
blocks
diffusion.
Through
simulation
experiments,
sensitivity,
differential
attack
pure
ciphertext
are
analyzed.
Compared
other
schemes,
results
verify
effectiveness
reliability
proposed
scheme.