Image encryption algorithm based on COA and hyperchaotic Lorenz system DOI

Xiaofu Qin,

Yong Zhang

Nonlinear Dynamics, Год журнала: 2024, Номер 112(12), С. 10611 - 10632

Опубликована: Май 4, 2024

Язык: Английский

A new image encryption method based on memristive hyperchaos DOI
Qiang Lai,

Hui Zhang

Optics & Laser Technology, Год журнала: 2023, Номер 166, С. 109626 - 109626

Опубликована: Июнь 7, 2023

Язык: Английский

Процитировано

21

Dynamics of a novel chaotic map DOI

Gokulakrishnan Sriram,

Ahmed M. Ali Ali, Hayder Natiq

и другие.

Journal of Computational and Applied Mathematics, Год журнала: 2023, Номер 436, С. 115453 - 115453

Опубликована: Июль 7, 2023

Язык: Английский

Процитировано

21

A Novel Chaotic Image Encryption Scheme Armed with Global Dynamic Selection DOI Creative Commons
Xin Chen, Qianxue Wang,

Linfeng Fan

и другие.

Entropy, Год журнала: 2023, Номер 25(3), С. 476 - 476

Опубликована: Март 9, 2023

Due to the equivalent keys revealed by a chosen-plaintext attack or chosen-ciphertext attack, most of existing chaotic image encryption schemes are demonstrated be insecure. In order improve security performance, some scholars have recently proposed plaintext-related scheme. Although effect one-time pad is achieved, an additional secure channel required transmit hash values other parameters related plaintext before ciphertext can decrypted at receiving end. Its main drawback that absolutely needed information plaintext, which not feasible in practical applications. To further solve this problem, paper proposes scheme based on global dynamic selection multi-parallel structure. First, sequence employed dynamically select DNA encoding rules. Secondly, permutation with structure performed DNA-encoded matrix, and decoding rules selected according another sequence. Finally, diffusion obtained feedback mechanism introduced determine diffusion. Compared local schemes, advantage it realize selection, so as ensure there no key, resist does need practical. A theoretical analysis numerical experiments demonstrate feasibility method.

Язык: Английский

Процитировано

19

Dynamic analysis of HR-FN-HR neural network coupled by locally active hyperbolic memristors and encryption application based on knuth-Durstenfeld algorithm DOI
Junwei Sun, Chuang‐Chuang Li, Zicheng Wang

и другие.

Applied Mathematical Modelling, Год журнала: 2023, Номер 121, С. 463 - 483

Опубликована: Май 8, 2023

Язык: Английский

Процитировано

18

Chaotic image encryption algorithm with improved bonobo optimizer and DNA coding for enhanced security DOI Creative Commons
Ahmed S. Almasoud,

Bayan Alabduallah,

Hamed Alqahtani

и другие.

Heliyon, Год журнала: 2024, Номер 10(3), С. e25257 - e25257

Опубликована: Фев. 1, 2024

Image encryption involves applying cryptographic approaches to convert the content of an image into illegible or encrypted format, reassuring that illegal users cannot simply interpret access actual visual details. Commonly employed models comprise symmetric key algorithms for data, necessitating a secret decryption. This study introduces new Chaotic Encryption Algorithm with Improved Bonobo Optimizer and DNA Coding (CIEAIBO-DNAC) enhanced security. The presented CIEAIBO-DNAC technique different processes such as initial value generation, substitution, diffusion, Primarily, is related input pixel values by MD5 hash function, produced can be utilized primary chaotic model boost sensitivity. Besides, uses (IBO) algorithm scrambling position in block process among blocks takes place. Moreover, diffusion stage, encoding, obfuscation, decoding were carried out attain images. Extensive experimental evaluations security analyses are conducted assess outcome technique. simulation demonstrates excellent properties, including resistance against several attacks, ensuring it applied real-time scenarios.

Язык: Английский

Процитировано

9

Comparative analysis of image encryption based on 1D maps and their integrated chaotic maps DOI
Samuel Amde Gebereselassie, Binoy Krishna Roy

Multimedia Tools and Applications, Год журнала: 2024, Номер 83(27), С. 69511 - 69533

Опубликована: Янв. 31, 2024

Язык: Английский

Процитировано

8

Genetic Crossover at the RNA Level for Secure Medical Image Encryption DOI Creative Commons
Hassan Tabti, Hamid El Bourakkadi, Abdelhakim Chemlal

и другие.

International Journal of Safety and Security Engineering, Год журнала: 2024, Номер 14(1), С. 201 - 216

Опубликована: Фев. 29, 2024

In this study, we will describe a novel cryptographic system leveraging genetic crossover process based on scheme specifically tailored for encrypting medical images, operating at the level of ribonucleic acid (RNA) sequences.Initially, an extraction three-color channels and their conversion into vectors involving confusion diffusion is conducted, followed by pseudo-random transformation RNA notation.A with vector generated from chaotic maps controlled table applied to generate new gene significantly enhanced performance, inheriting properties both crossed genes address unforeseen attacks.A sample diverse images randomly selected several databases tested our system, yielding highly promising results.

Язык: Английский

Процитировано

8

A new three-dimensional memristor chaotic circuit design and its application in image encryption DOI
Jie Zhang, Enze Liu, Yan Guo

и другие.

The Journal of Supercomputing, Год журнала: 2024, Номер 80(10), С. 14694 - 14724

Опубликована: Март 25, 2024

Язык: Английский

Процитировано

7

Novel grayscale image encryption based on 4D fractional-order hyperchaotic system, 2D Henon map and knight tour algorithm DOI
Saeed Ullah, Xinge Liu, Adil Waheed

и другие.

Physica Scripta, Год журнала: 2024, Номер 99(9), С. 095248 - 095248

Опубликована: Авг. 8, 2024

Abstract With the increasing frequency of data exchange, security transmitted information, especially images, has become paramount. This paper proposes a novel algorithm for encrypting grayscale images any dimension by using proposed fractional-order (FO) 4D hyperchaotic system, 2D Henon chaotic map permutation, and knight tour algorithm. Initially, sequences are generated utilizing FO which later employed to rearrange shuffle entire image pixels bolster efficacy encryption. To introduce an additional layer diffusion, permutation is used. Furthermore, applied starting from chosen point executing specified rounds on scrambled increase encryption’s robustness. The resultant encryption undergoes thorough testing evaluation. It exhibits high sensitivity key boasts larger space, rendering it more resistant brute-force attacks. demonstrates approximate correlation 0 between adjacent pixels. Further, size 256 × takes approximately 0.4 seconds, suitable cryptographic purposes.

Язык: Английский

Процитировано

7

A New Image Encryption Method Using an Optimized Smart Codebook DOI Creative Commons
Rami Sihwail, Dyala R. Ibrahim

Human Behavior and Emerging Technologies, Год журнала: 2025, Номер 2025(1)

Опубликована: Янв. 1, 2025

Information attacks have increased worldwide as more information is available in digital form. Image encryption essential to prevent attackers from unauthorized access confidential images. In this paper, we introduce a novel image method called the smart codebook, which combines an intelligent codebook technique with RSA (Rivest–Shamir–Adleman) algorithm. The proposed designed be dynamic it selects most effective codebooks encrypting each increase its ambiguity. divides into several segments based on dimensions, and multiple random are generated for segment. Moreover, images go through processing stages before they converted cipher images, including noise, segmentation, encryption. best selected create encrypted next stage. Finally, algorithm sends recipient code books image. evaluation of depends factors, entropy, unified averaged changed intensity (UACI), number changing pixel rate (NPCR), correlation coefficient analysis. assessment demonstrates resilience against cryptographic attacks, affirming security precision. results show impressive improvement securing compared previous related efforts.

Язык: Английский

Процитировано

1