DNA image encryption algorithm based on serrated spiral scrambling and cross bit plane DOI Creative Commons
Wenjing Zhang, Jiangjian Xu, Bing Zhao

и другие.

Journal of King Saud University - Computer and Information Sciences, Год журнала: 2023, Номер 35(10), С. 101858 - 101858

Опубликована: Ноя. 29, 2023

In response to the problem of uneven information distribution in DNA encoding, this article, a new chaotic image encryption algorithm combining serrated spiral scrambling and cross bit plane using lookup table diffusion is proposed. First all, four-dimensional hyperchaotic system proposed, which can produce four interrelated sequences. Next, perform index on plain change position pixels. Then encoded combination with crossed plane, then pixel size changed by look-up diffusion. Lastly, decoding performed obtain encrypted image. The test whether feasibility security have been improved be obtained analyzing experimental data degree deviation from ideal value. After comprehensive analysis, it concluded that paper has good effect basis also improved.

Язык: Английский

A Review of Chaotic Systems Based on Memristive Hopfield Neural Networks DOI Creative Commons
Hairong Lin, Chunhua Wang, Fei Yu

и другие.

Mathematics, Год журнала: 2023, Номер 11(6), С. 1369 - 1369

Опубликована: Март 11, 2023

Since the Lorenz chaotic system was discovered in 1963, construction of systems with complex dynamics has been a research hotspot field chaos. Recently, memristive Hopfield neural networks (MHNNs) offer great potential design complex, because their special network structures, hyperbolic tangent activation function, and memory property. Many based on MHNNs have proposed exhibit various dynamical behaviors, including hyperchaos, coexisting attractors, multistability, extreme multi-scroll multi-structure initial-offset behaviors. A comprehensive review MHNN-based become an urgent requirement. In this review, we first briefly introduce basic knowledge Hopfiled network, memristor, dynamics. Then, different modeling methods are analyzed discussed. Concurrently, pioneering works some recent important papers related to reviewed detail. Finally, survey progress for application scenarios. Some open problems visions future presented. We attempt provide reference resource both chaos researchers those outside who hope apply particular application.

Язык: Английский

Процитировано

83

A family of memristive multibutterfly chaotic systems with multidirectional initial-based offset boosting DOI
Hairong Lin, Chunhua Wang, Sichun Du

и другие.

Chaos Solitons & Fractals, Год журнала: 2023, Номер 172, С. 113518 - 113518

Опубликована: Май 15, 2023

Язык: Английский

Процитировано

58

A class of 2n+1 dimensional simplest Hamiltonian conservative chaotic systems and fast image encryption schemes DOI
Xinxin Kong, Fei Yu, Wei Yao

и другие.

Applied Mathematical Modelling, Год журнала: 2023, Номер 125, С. 351 - 374

Опубликована: Окт. 6, 2023

Язык: Английский

Процитировано

50

Synchronization coexistence in a Rulkov neural network based on locally active discrete memristor DOI
Minglin Ma, Xiaohua Xie, Yang Yang

и другие.

Chinese Physics B, Год журнала: 2023, Номер 32(5), С. 058701 - 058701

Опубликована: Фев. 8, 2023

At present, many neuron models have been proposed, which can be divided into discrete and continuous models. Discrete the advantage of faster simulation speed ease understanding complex dynamic phenomena. Due to properties memorability, nonvolatility, local activity, locally active memristors (LADMs) are also suitable for simulating synapses. In this paper, we use an LADM mimic synapses establish a Rulkov neural network model. It is found that change coupling strength initial state leads multiple firing patterns network. addition, considering influence parameters LADM, numerical analysis methods such as phase diagram timing used study synchronization. As system states change, coupled exhibits synchronization transition coexistence.

Язык: Английский

Процитировано

46

Image encryption scheme based on improved four-dimensional chaotic system and evolutionary operators DOI Creative Commons
Ying Niu, Hangyu Zhou, Xuncai Zhang

и другие.

Scientific Reports, Год журнала: 2024, Номер 14(1)

Опубликована: Март 25, 2024

Abstract To enhance the security of image data transmission, and address weaknesses existing encryption schemes based on chaotic systems, particularly concerning resistance to differential attacks unstable performance this article introduces an improved four-dimensional system integrates evolutionary operators propose scheme. Firstly, a method for generating pseudo-random sequences associated with plaintext is designed. The change rate ciphertext pixel value exceeds 0.9967 after slight modification value, significantly improving sensitivity scheme's ability resist selected attacks. Secondly, individual rearrangement operation introduced achieve bit-level scrambling, pixel-level scrambling achieved by selection strategy. Subsequently, crossover mutation operations are incorporated into encryption. reflect randomness pairing, we adopt sequence generated control operators, diffusion performed pairs. Finally, feedback applied. Experimental results analysis demonstrate that proposed scheme not only enhances encrypted images but also effectively resists noise cropping This meets high-security requirements in network transmission provides new ideas further research field

Язык: Английский

Процитировано

22

A Fast Hyperchaotic Image Encryption Scheme DOI

Xiaojuan Ma,

Chunhua Wang, Wenlu Qiu

и другие.

International Journal of Bifurcation and Chaos, Год журнала: 2023, Номер 33(05)

Опубликована: Апрель 1, 2023

In this paper, we propose a fast hyperchaotic image encryption scheme based on RSVM and step-by-step scrambling-diffusion. scheme, firstly new algorithm named ring shrinkage with variable modulo (RSVM), which can randomly scramble the elements in one-dimensional array, are composed of row numbers or column pixel matrix to be encrypted. Before encryption, use generate two random arrays (i.e. array [Formula: see text] text]), each element represents row/column number matrix. Then rows/columns scrambled-diffused according text]. The initial control parameters controlled by SHA-256 plaintext pixels, controls scrambling-diffusion process matrix, rows columns, so small changes pixels will lead great differences ciphertext images. addition, overall time complexity is only text], greatly reduce cost. Finally, experimental results extensive security analysis prove efficiency feasibility method.

Язык: Английский

Процитировано

36

Hopfield neural network with multi-scroll attractors and application in image encryption DOI

Zhenhua Hu,

Chunhua Wang

Multimedia Tools and Applications, Год журнала: 2023, Номер 83(1), С. 97 - 117

Опубликована: Май 10, 2023

Язык: Английский

Процитировано

31

A Chaos-Enhanced Fractional-Order Chaotic System with Self-Reproduction Based on a Memcapacitor and Meminductor DOI Creative Commons
Xuan Wang, Yinghong Cao, Hongjie Li

и другие.

Fractal and Fractional, Год журнала: 2023, Номер 7(8), С. 582 - 582

Опубликована: Июль 28, 2023

Chaotic signals generated by chaotic oscillators based on memory elements are suitable for use in the field of confidential communications because their very good randomness. But often maximum Lyapunov exponent is not high enough, so degree randomness enough. It can be chaos enhanced transforming it to fractional order using Caputo differential definition. In this paper, proposed hyperchaotic oscillator, extended a fractional-order form obtain chaos-enhanced memcapacitor meminductor system, which several different styles and attractors found. The dynamical behaviour system studied bifurcation diagrams, spectrums dimensions. multistability explored initial orbits, spectral entropy complexity examined. Finally, hardware implementation given, demonstrates effectiveness system. This study provides reference chaos-enhanced.

Язык: Английский

Процитировано

25

Chaotic image encryption algorithm with improved bonobo optimizer and DNA coding for enhanced security DOI Creative Commons
Ahmed S. Almasoud,

Bayan Alabduallah,

Hamed Alqahtani

и другие.

Heliyon, Год журнала: 2024, Номер 10(3), С. e25257 - e25257

Опубликована: Фев. 1, 2024

Image encryption involves applying cryptographic approaches to convert the content of an image into illegible or encrypted format, reassuring that illegal users cannot simply interpret access actual visual details. Commonly employed models comprise symmetric key algorithms for data, necessitating a secret decryption. This study introduces new Chaotic Encryption Algorithm with Improved Bonobo Optimizer and DNA Coding (CIEAIBO-DNAC) enhanced security. The presented CIEAIBO-DNAC technique different processes such as initial value generation, substitution, diffusion, Primarily, is related input pixel values by MD5 hash function, produced can be utilized primary chaotic model boost sensitivity. Besides, uses (IBO) algorithm scrambling position in block process among blocks takes place. Moreover, diffusion stage, encoding, obfuscation, decoding were carried out attain images. Extensive experimental evaluations security analyses are conducted assess outcome technique. simulation demonstrates excellent properties, including resistance against several attacks, ensuring it applied real-time scenarios.

Язык: Английский

Процитировано

9

Random Strip Peeling: A novel lightweight image encryption for IoT devices based on colour planes permutation DOI Creative Commons
Davut Hanbay, Kenan İNCE, Cemile İnce

и другие.

CAAI Transactions on Intelligence Technology, Год журнала: 2025, Номер unknown

Опубликована: Янв. 5, 2025

Abstract This paper introduces a novel lightweight colour image encryption algorithm, specifically designed for resource‐constrained environments such as Internet of Things (IoT) devices. As IoT systems become increasingly prevalent, secure and efficient data transmission becomes crucial. The proposed algorithm addresses this need by offering robust yet resource‐efficient solution encryption. Traditional relies on confusion diffusion steps. These stages are generally implemented linearly, but work new RSP (Random Strip Peeling) the step, which disrupts linearity in category using two different sequences generated 1D Tent Map with varying initial conditions. stage then employs an XOR matrix Logistic Map. Different evaluation metrics, entropy analysis, key sensitivity, statistical differential attacks resistance, robustness analysis demonstrate algorithm's lightweight, robust, efficient. scheme achieved average metric values 99.6056 NPCR, 33.4397 UACI, 7.9914 information SIPI dataset. It also exhibits time complexity size .

Язык: Английский

Процитировано

1