Mathematics,
Год журнала:
2024,
Номер
12(24), С. 3948 - 3948
Опубликована: Дек. 15, 2024
Cryptography
is
one
of
the
most
important
branches
information
security.
ensures
secure
communication
and
data
privacy,
it
has
been
increasingly
applied
in
healthcare
related
areas.
As
a
significant
cryptographic
method,
Hill
cipher
attracted
attention
from
experts
scholars.
To
enhance
security
traditional
(THC)
expand
its
application
medical
image
encryption,
novel
dynamic
with
Arnold
scrambling
technique
(DHCAST)
proposed
this
work.
Unlike
THC,
DHCAST
uses
time-varying
matrix
as
secret
key,
which
greatly
increases
new
successfully
images
encryption.
In
addition,
method
employs
Zeroing
Neural
Network
(ZNN)
decryption
to
find
inversion
key
(TVIKM).
order
efficiency
ZNN
for
solving
TVIKM,
fuzzy
zeroing
neural
network
(NFZNN)
model
constructed,
convergence
robustness
NFZNN
are
validated
by
both
theoretical
analysis
experiment
results.
Simulation
experiments
show
that
time
about
0.05
s,
while
(TZNN)
2
means
speed
400
times
TZNN
model.
Moreover,
Peak
Signal
Noise
Ratio
(PSNR)
Number
Pixel
Change
Rate
(NPCR)
algorithm
reach
9.51
99.74%,
respectively,
effectively
validates
excellent
encryption
quality
attack
prevention
ability.
Mathematics,
Год журнала:
2024,
Номер
12(24), С. 3917 - 3917
Опубликована: Дек. 12, 2024
Chaos-based
encryption
is
promising
for
safeguarding
digital
images.
Nonetheless,
existing
chaos-based
algorithms
still
exhibit
certain
shortcomings.
Given
this,
we
propose
a
novel
multi-channel
image
algorithm
that
leverages
pixel
reorganization
and
hyperchaotic
maps
(MIEA-PRHM).
Our
MIEA-PRHM
employs
two
to
jointly
generate
chaotic
sequences,
ensuring
larger
key
space
better
randomness.
During
the
process,
first
convert
input
images
into
fused
matrices
through
reorganization.
Then,
apply
rounds
of
scrambling
diffusion
operations,
coupled
with
one
round
substitution
high
4-bit
matrix.
For
low
matrix,
conduct
operations.
Extensive
experiments
comparisons
demonstrate
outperforms
many
recent
in
various
aspects,
especially
efficiency.
Chaos An Interdisciplinary Journal of Nonlinear Science,
Год журнала:
2025,
Номер
35(1)
Опубликована: Янв. 1, 2025
Memristors
are
commonly
used
to
introduce
various
chaotic
systems
and
can
be
enhance
their
characteristics.
However,
due
the
strict
construction
conditions
of
Hamiltonian
systems,
there
has
been
limited
research
on
development
memristive
conservative
(MHCCSs).
In
this
work,
a
method
for
constructing
three-terminal
memristors
is
proposed,
incorporated
into
system,
resulting
in
class
n-D
MHCCS.
Based
method,
we
model
4D
MHCCS
as
standard
detailed
dynamic
analysis.
The
analysis
reveals
that
exhibits
complex
behaviors,
including
conservativeness,
symmetry,
chaos
depending
parameters,
extreme
multistability,
under
wide
parameter
range.
shows
not
only
retains
favorable
characteristics
system
but
also
more
nonlinear
dynamics
incorporation
memristors,
thereby
further
enhancing
its
Furthermore,
pseudo-random
number
generator
based
excellent
randomness
terms
NIST
test.
Finally,
physical
realizability
verified
through
Field
Programmable
Gate
Array
experiments.
This
study
demonstrates
constructed
MHCCSs
good
entropy
source
applied
embedded
secure
communication,
cryptographic
generator.
Fractal and Fractional,
Год журнала:
2025,
Номер
9(2), С. 115 - 115
Опубликована: Фев. 13, 2025
Memristor-based
fractional-order
chaotic
systems
can
record
information
from
the
past,
present,
and
future,
describe
real
world
more
accurately
than
integer-order
systems.
This
paper
proposes
a
novel
memristor
model
verifies
its
characteristics
through
pinched
loop
(PHL)
method.
Subsequently,
new
memristive
Hopfield
neural
network
(4D-FOMHNN)
is
introduced
to
simulate
induced
current,
accompanied
by
Caputo’s
definition
of
fractional
order.
An
Adomian
decomposition
method
(ADM)
employed
for
system
solution.
By
varying
parameters
order
4D-FOMHNN,
rich
dynamic
behaviors
including
transient
chaos,
coexistence
attractors
are
observed
using
methods
such
as
bifurcation
diagrams
Lyapunov
exponent
analysis.
Finally,
proposed
FOMHNN
implemented
on
field-programmable
gate
array
(FPGA),
oscilloscope
observation
results
consistent
with
MATLAB
numerical
simulation
results,
which
further
validate
theoretical
analysis
provide
basis
application
in
field
encryption.
Mathematics,
Год журнала:
2025,
Номер
13(2), С. 201 - 201
Опубликована: Янв. 9, 2025
In
this
paper,
we
first
design
the
corresponding
integration
algorithm
and
matlab
program
according
to
Gauss–Legendre
principle.
Then,
select
Lorenz
system,
Duffing
hidden
attractor
chaotic
system
Multi-wing
for
dynamics
analysis.
We
apply
integral
Runge–Kutta
solution
of
dissipative
systems
time
analyze
compare
differences
between
two
algorithms.
propose
a
basin
attraction
estimation
method
based
on
Lyapunov
exponent
decision
criterion
method.
This
can
better
obtain
region
distinguish
pseudo-attractor,
which
provides
new
way
Finally,
use
FPGA
technology
realize
four
algorithm.
Symmetry,
Год журнала:
2025,
Номер
17(2), С. 259 - 259
Опубликована: Фев. 8, 2025
The
Internet
of
Things
(IoT),
which
is
characteristic
the
current
industrial
revolutions,
connection
physical
devices
through
different
protocols
and
sensors
to
share
information.
Even
though
IoT
provides
revolutionary
opportunities,
its
for
smart
cities
brings
new
opportunities
security
threats,
especially
with
appearance
threats
like
quantum
computing.
Current
approaches
protect
data
are
not
immune
attacks
designed
offer
best
management
city
applications.
Thus,
post-quantum
cryptography
(PQC),
still
in
research
stage,
aims
solve
these
problems.
To
this
end,
introduces
Dynamic
Galois
Reed–Solomon
Quantum
Resilience
(DGRS-QR)
system
improve
secure
communication
cities.
preprocessing
includes
K-Nearest
Neighbors
(KNN)
min–max
normalization
then
applying
Field
Adaptive
Expansion
(GFAE).
Optimization
quantum-resistant
keys
accomplished
by
Artificial
Bee
Colony
(ABC)
Moth
Flame
(MFO)
algorithms.
Also,
role-based
access
control
strong
cloud
security,
resistance
maintained
refreshing
every
five
minutes
active
session.
For
error
correction,
(RS)
codes
used
provide
reliability.
Data
performed
using
an
attention-based
Bidirectional
Long
Short-Term
Memory
(Att-Bi-LSTM)
model
skip
connections
optimized
management.
proposed
approach
was
evaluated
key
performance
metrics:
a
generation
time
2.34
s,
encryption
4.56
decryption
3.56
PSNR
33
dB,
SSIM
0.99.
results
show
that
capable
protecting
from
while
also
ensuring
optimal
processing.