Journal of King Saud University - Computer and Information Sciences,
Год журнала:
2023,
Номер
35(10), С. 101858 - 101858
Опубликована: Ноя. 29, 2023
In
response
to
the
problem
of
uneven
information
distribution
in
DNA
encoding,
this
article,
a
new
chaotic
image
encryption
algorithm
combining
serrated
spiral
scrambling
and
cross
bit
plane
using
lookup
table
diffusion
is
proposed.
First
all,
four-dimensional
hyperchaotic
system
proposed,
which
can
produce
four
interrelated
sequences.
Next,
perform
index
on
plain
change
position
pixels.
Then
encoded
combination
with
crossed
plane,
then
pixel
size
changed
by
look-up
diffusion.
Lastly,
decoding
performed
obtain
encrypted
image.
The
test
whether
feasibility
security
have
been
improved
be
obtained
analyzing
experimental
data
degree
deviation
from
ideal
value.
After
comprehensive
analysis,
it
concluded
that
paper
has
good
effect
basis
also
improved.
Mathematics,
Год журнала:
2023,
Номер
11(6), С. 1369 - 1369
Опубликована: Март 11, 2023
Since
the
Lorenz
chaotic
system
was
discovered
in
1963,
construction
of
systems
with
complex
dynamics
has
been
a
research
hotspot
field
chaos.
Recently,
memristive
Hopfield
neural
networks
(MHNNs)
offer
great
potential
design
complex,
because
their
special
network
structures,
hyperbolic
tangent
activation
function,
and
memory
property.
Many
based
on
MHNNs
have
proposed
exhibit
various
dynamical
behaviors,
including
hyperchaos,
coexisting
attractors,
multistability,
extreme
multi-scroll
multi-structure
initial-offset
behaviors.
A
comprehensive
review
MHNN-based
become
an
urgent
requirement.
In
this
review,
we
first
briefly
introduce
basic
knowledge
Hopfiled
network,
memristor,
dynamics.
Then,
different
modeling
methods
are
analyzed
discussed.
Concurrently,
pioneering
works
some
recent
important
papers
related
to
reviewed
detail.
Finally,
survey
progress
for
application
scenarios.
Some
open
problems
visions
future
presented.
We
attempt
provide
reference
resource
both
chaos
researchers
those
outside
who
hope
apply
particular
application.
Chinese Physics B,
Год журнала:
2023,
Номер
32(5), С. 058701 - 058701
Опубликована: Фев. 8, 2023
At
present,
many
neuron
models
have
been
proposed,
which
can
be
divided
into
discrete
and
continuous
models.
Discrete
the
advantage
of
faster
simulation
speed
ease
understanding
complex
dynamic
phenomena.
Due
to
properties
memorability,
nonvolatility,
local
activity,
locally
active
memristors
(LADMs)
are
also
suitable
for
simulating
synapses.
In
this
paper,
we
use
an
LADM
mimic
synapses
establish
a
Rulkov
neural
network
model.
It
is
found
that
change
coupling
strength
initial
state
leads
multiple
firing
patterns
network.
addition,
considering
influence
parameters
LADM,
numerical
analysis
methods
such
as
phase
diagram
timing
used
study
synchronization.
As
system
states
change,
coupled
exhibits
synchronization
transition
coexistence.
Scientific Reports,
Год журнала:
2024,
Номер
14(1)
Опубликована: Март 25, 2024
Abstract
To
enhance
the
security
of
image
data
transmission,
and
address
weaknesses
existing
encryption
schemes
based
on
chaotic
systems,
particularly
concerning
resistance
to
differential
attacks
unstable
performance
this
article
introduces
an
improved
four-dimensional
system
integrates
evolutionary
operators
propose
scheme.
Firstly,
a
method
for
generating
pseudo-random
sequences
associated
with
plaintext
is
designed.
The
change
rate
ciphertext
pixel
value
exceeds
0.9967
after
slight
modification
value,
significantly
improving
sensitivity
scheme's
ability
resist
selected
attacks.
Secondly,
individual
rearrangement
operation
introduced
achieve
bit-level
scrambling,
pixel-level
scrambling
achieved
by
selection
strategy.
Subsequently,
crossover
mutation
operations
are
incorporated
into
encryption.
reflect
randomness
pairing,
we
adopt
sequence
generated
control
operators,
diffusion
performed
pairs.
Finally,
feedback
applied.
Experimental
results
analysis
demonstrate
that
proposed
scheme
not
only
enhances
encrypted
images
but
also
effectively
resists
noise
cropping
This
meets
high-security
requirements
in
network
transmission
provides
new
ideas
further
research
field
International Journal of Bifurcation and Chaos,
Год журнала:
2023,
Номер
33(05)
Опубликована: Апрель 1, 2023
In
this
paper,
we
propose
a
fast
hyperchaotic
image
encryption
scheme
based
on
RSVM
and
step-by-step
scrambling-diffusion.
scheme,
firstly
new
algorithm
named
ring
shrinkage
with
variable
modulo
(RSVM),
which
can
randomly
scramble
the
elements
in
one-dimensional
array,
are
composed
of
row
numbers
or
column
pixel
matrix
to
be
encrypted.
Before
encryption,
use
generate
two
random
arrays
(i.e.
array
[Formula:
see
text]
text]),
each
element
represents
row/column
number
matrix.
Then
rows/columns
scrambled-diffused
according
text].
The
initial
control
parameters
controlled
by
SHA-256
plaintext
pixels,
controls
scrambling-diffusion
process
matrix,
rows
columns,
so
small
changes
pixels
will
lead
great
differences
ciphertext
images.
addition,
overall
time
complexity
is
only
text],
greatly
reduce
cost.
Finally,
experimental
results
extensive
security
analysis
prove
efficiency
feasibility
method.
Fractal and Fractional,
Год журнала:
2023,
Номер
7(8), С. 582 - 582
Опубликована: Июль 28, 2023
Chaotic
signals
generated
by
chaotic
oscillators
based
on
memory
elements
are
suitable
for
use
in
the
field
of
confidential
communications
because
their
very
good
randomness.
But
often
maximum
Lyapunov
exponent
is
not
high
enough,
so
degree
randomness
enough.
It
can
be
chaos
enhanced
transforming
it
to
fractional
order
using
Caputo
differential
definition.
In
this
paper,
proposed
hyperchaotic
oscillator,
extended
a
fractional-order
form
obtain
chaos-enhanced
memcapacitor
meminductor
system,
which
several
different
styles
and
attractors
found.
The
dynamical
behaviour
system
studied
bifurcation
diagrams,
spectrums
dimensions.
multistability
explored
initial
orbits,
spectral
entropy
complexity
examined.
Finally,
hardware
implementation
given,
demonstrates
effectiveness
system.
This
study
provides
reference
chaos-enhanced.
Heliyon,
Год журнала:
2024,
Номер
10(3), С. e25257 - e25257
Опубликована: Фев. 1, 2024
Image
encryption
involves
applying
cryptographic
approaches
to
convert
the
content
of
an
image
into
illegible
or
encrypted
format,
reassuring
that
illegal
users
cannot
simply
interpret
access
actual
visual
details.
Commonly
employed
models
comprise
symmetric
key
algorithms
for
data,
necessitating
a
secret
decryption.
This
study
introduces
new
Chaotic
Encryption
Algorithm
with
Improved
Bonobo
Optimizer
and
DNA
Coding
(CIEAIBO-DNAC)
enhanced
security.
The
presented
CIEAIBO-DNAC
technique
different
processes
such
as
initial
value
generation,
substitution,
diffusion,
Primarily,
is
related
input
pixel
values
by
MD5
hash
function,
produced
can
be
utilized
primary
chaotic
model
boost
sensitivity.
Besides,
uses
(IBO)
algorithm
scrambling
position
in
block
process
among
blocks
takes
place.
Moreover,
diffusion
stage,
encoding,
obfuscation,
decoding
were
carried
out
attain
images.
Extensive
experimental
evaluations
security
analyses
are
conducted
assess
outcome
technique.
simulation
demonstrates
excellent
properties,
including
resistance
against
several
attacks,
ensuring
it
applied
real-time
scenarios.
CAAI Transactions on Intelligence Technology,
Год журнала:
2025,
Номер
unknown
Опубликована: Янв. 5, 2025
Abstract
This
paper
introduces
a
novel
lightweight
colour
image
encryption
algorithm,
specifically
designed
for
resource‐constrained
environments
such
as
Internet
of
Things
(IoT)
devices.
As
IoT
systems
become
increasingly
prevalent,
secure
and
efficient
data
transmission
becomes
crucial.
The
proposed
algorithm
addresses
this
need
by
offering
robust
yet
resource‐efficient
solution
encryption.
Traditional
relies
on
confusion
diffusion
steps.
These
stages
are
generally
implemented
linearly,
but
work
new
RSP
(Random
Strip
Peeling)
the
step,
which
disrupts
linearity
in
category
using
two
different
sequences
generated
1D
Tent
Map
with
varying
initial
conditions.
stage
then
employs
an
XOR
matrix
Logistic
Map.
Different
evaluation
metrics,
entropy
analysis,
key
sensitivity,
statistical
differential
attacks
resistance,
robustness
analysis
demonstrate
algorithm's
lightweight,
robust,
efficient.
scheme
achieved
average
metric
values
99.6056
NPCR,
33.4397
UACI,
7.9914
information
SIPI
dataset.
It
also
exhibits
time
complexity
size
.