A Dynamic Hill Cipher with Arnold Scrambling Technique for Medical Images Encryption DOI Creative Commons
Yue Xi, Ning Yu, Jie Jin

и другие.

Mathematics, Год журнала: 2024, Номер 12(24), С. 3948 - 3948

Опубликована: Дек. 15, 2024

Cryptography is one of the most important branches information security. ensures secure communication and data privacy, it has been increasingly applied in healthcare related areas. As a significant cryptographic method, Hill cipher attracted attention from experts scholars. To enhance security traditional (THC) expand its application medical image encryption, novel dynamic with Arnold scrambling technique (DHCAST) proposed this work. Unlike THC, DHCAST uses time-varying matrix as secret key, which greatly increases new successfully images encryption. In addition, method employs Zeroing Neural Network (ZNN) decryption to find inversion key (TVIKM). order efficiency ZNN for solving TVIKM, fuzzy zeroing neural network (NFZNN) model constructed, convergence robustness NFZNN are validated by both theoretical analysis experiment results. Simulation experiments show that time about 0.05 s, while (TZNN) 2 means speed 400 times TZNN model. Moreover, Peak Signal Noise Ratio (PSNR) Number Pixel Change Rate (NPCR) algorithm reach 9.51 99.74%, respectively, effectively validates excellent encryption quality attack prevention ability.

Язык: Английский

A Novel Multi-Channel Image Encryption Algorithm Leveraging Pixel Reorganization and Hyperchaotic Maps DOI Creative Commons
Wei Feng, Jiaxin Yang, Xiangyu Zhao

и другие.

Mathematics, Год журнала: 2024, Номер 12(24), С. 3917 - 3917

Опубликована: Дек. 12, 2024

Chaos-based encryption is promising for safeguarding digital images. Nonetheless, existing chaos-based algorithms still exhibit certain shortcomings. Given this, we propose a novel multi-channel image algorithm that leverages pixel reorganization and hyperchaotic maps (MIEA-PRHM). Our MIEA-PRHM employs two to jointly generate chaotic sequences, ensuring larger key space better randomness. During the process, first convert input images into fused matrices through reorganization. Then, apply rounds of scrambling diffusion operations, coupled with one round substitution high 4-bit matrix. For low matrix, conduct operations. Extensive experiments comparisons demonstrate outperforms many recent in various aspects, especially efficiency.

Язык: Английский

Процитировано

22

A class of n-D Hamiltonian conservative chaotic systems with three-terminal memristor: Modeling, dynamical analysis, and FPGA implementation DOI

Yuan Ye,

Fei Yu, Boon Thong Tan

и другие.

Chaos An Interdisciplinary Journal of Nonlinear Science, Год журнала: 2025, Номер 35(1)

Опубликована: Янв. 1, 2025

Memristors are commonly used to introduce various chaotic systems and can be enhance their characteristics. However, due the strict construction conditions of Hamiltonian systems, there has been limited research on development memristive conservative (MHCCSs). In this work, a method for constructing three-terminal memristors is proposed, incorporated into system, resulting in class n-D MHCCS. Based method, we model 4D MHCCS as standard detailed dynamic analysis. The analysis reveals that exhibits complex behaviors, including conservativeness, symmetry, chaos depending parameters, extreme multistability, under wide parameter range. shows not only retains favorable characteristics system but also more nonlinear dynamics incorporation memristors, thereby further enhancing its Furthermore, pseudo-random number generator based excellent randomness terms NIST test. Finally, physical realizability verified through Field Programmable Gate Array experiments. This study demonstrates constructed MHCCSs good entropy source applied embedded secure communication, cryptographic generator.

Язык: Английский

Процитировано

4

Dynamic Analysis and Implementation of FPGA for a New 4D Fractional-Order Memristive Hopfield Neural Network DOI Creative Commons
Fei Yu,

Shankou Zhang,

Dan Su

и другие.

Fractal and Fractional, Год журнала: 2025, Номер 9(2), С. 115 - 115

Опубликована: Фев. 13, 2025

Memristor-based fractional-order chaotic systems can record information from the past, present, and future, describe real world more accurately than integer-order systems. This paper proposes a novel memristor model verifies its characteristics through pinched loop (PHL) method. Subsequently, new memristive Hopfield neural network (4D-FOMHNN) is introduced to simulate induced current, accompanied by Caputo’s definition of fractional order. An Adomian decomposition method (ADM) employed for system solution. By varying parameters order 4D-FOMHNN, rich dynamic behaviors including transient chaos, coexistence attractors are observed using methods such as bifurcation diagrams Lyapunov exponent analysis. Finally, proposed FOMHNN implemented on field-programmable gate array (FPGA), oscilloscope observation results consistent with MATLAB numerical simulation results, which further validate theoretical analysis provide basis application in field encryption.

Язык: Английский

Процитировано

3

Color video encryption transmission in IoT based on memristive hopfield neural network DOI
Fei Yu,

Chaoran Wu,

Si Xu

и другие.

Signal Image and Video Processing, Год журнала: 2024, Номер 19(1)

Опубликована: Дек. 6, 2024

Язык: Английский

Процитировано

4

Chaotic Dynamics Analysis and FPGA Implementation Based on Gauss Legendre Integral DOI Creative Commons
Wen Li, Li Cui, Hairong Lin

и другие.

Mathematics, Год журнала: 2025, Номер 13(2), С. 201 - 201

Опубликована: Янв. 9, 2025

In this paper, we first design the corresponding integration algorithm and matlab program according to Gauss–Legendre principle. Then, select Lorenz system, Duffing hidden attractor chaotic system Multi-wing for dynamics analysis. We apply integral Runge–Kutta solution of dissipative systems time analyze compare differences between two algorithms. propose a basin attraction estimation method based on Lyapunov exponent decision criterion method. This can better obtain region distinguish pseudo-attractor, which provides new way Finally, use FPGA technology realize four algorithm.

Язык: Английский

Процитировано

0

An effective encryption approach using a combination of a non-chain ring and a four-dimensional chaotic map DOI
Muhammad Umair Safdar, Tariq Shah, Asif Ali

и другие.

Cognitive Neurodynamics, Год журнала: 2025, Номер 19(1)

Опубликована: Янв. 15, 2025

Язык: Английский

Процитировано

0

Hybrid Dynamic Galois Field with Quantum Resilience for Secure IoT Data Management and Transmission in Smart Cities Using Reed–Solomon (RS) Code DOI Open Access

Abdullah Aljuhni,

Amer Aljaedi, Adel R. Alharbi

и другие.

Symmetry, Год журнала: 2025, Номер 17(2), С. 259 - 259

Опубликована: Фев. 8, 2025

The Internet of Things (IoT), which is characteristic the current industrial revolutions, connection physical devices through different protocols and sensors to share information. Even though IoT provides revolutionary opportunities, its for smart cities brings new opportunities security threats, especially with appearance threats like quantum computing. Current approaches protect data are not immune attacks designed offer best management city applications. Thus, post-quantum cryptography (PQC), still in research stage, aims solve these problems. To this end, introduces Dynamic Galois Reed–Solomon Quantum Resilience (DGRS-QR) system improve secure communication cities. preprocessing includes K-Nearest Neighbors (KNN) min–max normalization then applying Field Adaptive Expansion (GFAE). Optimization quantum-resistant keys accomplished by Artificial Bee Colony (ABC) Moth Flame (MFO) algorithms. Also, role-based access control strong cloud security, resistance maintained refreshing every five minutes active session. For error correction, (RS) codes used provide reliability. Data performed using an attention-based Bidirectional Long Short-Term Memory (Att-Bi-LSTM) model skip connections optimized management. proposed approach was evaluated key performance metrics: a generation time 2.34 s, encryption 4.56 decryption 3.56 PSNR 33 dB, SSIM 0.99. results show that capable protecting from while also ensuring optimal processing.

Язык: Английский

Процитировано

0

An efficient image encryption algorithm based on a time-delay predator–prey model DOI
Jian Wang, Haixiao Wang, Jialin Chen

и другие.

Applied Physics B, Год журнала: 2025, Номер 131(3)

Опубликована: Фев. 19, 2025

Язык: Английский

Процитировано

0

Synchronization in Scale-Free Neural Networks with Heterogeneous Time Delay DOI
Jian Tang,

YaLian Wu,

C. J. Ou

и другие.

Integration, Год журнала: 2025, Номер unknown, С. 102387 - 102387

Опубликована: Фев. 1, 2025

Язык: Английский

Процитировано

0

A secure image encryption mechanism using biased Fourier quantum walk and addition-crossover structure in the Internet of Things DOI
Hesheng Huang,

Zhenhao Liu,

Zhiyuan Wang

и другие.

Internet of Things, Год журнала: 2025, Номер unknown, С. 101559 - 101559

Опубликована: Март 1, 2025

Язык: Английский

Процитировано

0