Nonlinear Dynamics, Год журнала: 2024, Номер 112(12), С. 10611 - 10632
Опубликована: Май 4, 2024
Язык: Английский
Nonlinear Dynamics, Год журнала: 2024, Номер 112(12), С. 10611 - 10632
Опубликована: Май 4, 2024
Язык: Английский
Optics & Laser Technology, Год журнала: 2023, Номер 166, С. 109626 - 109626
Опубликована: Июнь 7, 2023
Язык: Английский
Процитировано
21Journal of Computational and Applied Mathematics, Год журнала: 2023, Номер 436, С. 115453 - 115453
Опубликована: Июль 7, 2023
Язык: Английский
Процитировано
21Entropy, Год журнала: 2023, Номер 25(3), С. 476 - 476
Опубликована: Март 9, 2023
Due to the equivalent keys revealed by a chosen-plaintext attack or chosen-ciphertext attack, most of existing chaotic image encryption schemes are demonstrated be insecure. In order improve security performance, some scholars have recently proposed plaintext-related scheme. Although effect one-time pad is achieved, an additional secure channel required transmit hash values other parameters related plaintext before ciphertext can decrypted at receiving end. Its main drawback that absolutely needed information plaintext, which not feasible in practical applications. To further solve this problem, paper proposes scheme based on global dynamic selection multi-parallel structure. First, sequence employed dynamically select DNA encoding rules. Secondly, permutation with structure performed DNA-encoded matrix, and decoding rules selected according another sequence. Finally, diffusion obtained feedback mechanism introduced determine diffusion. Compared local schemes, advantage it realize selection, so as ensure there no key, resist does need practical. A theoretical analysis numerical experiments demonstrate feasibility method.
Язык: Английский
Процитировано
19Applied Mathematical Modelling, Год журнала: 2023, Номер 121, С. 463 - 483
Опубликована: Май 8, 2023
Язык: Английский
Процитировано
18Heliyon, Год журнала: 2024, Номер 10(3), С. e25257 - e25257
Опубликована: Фев. 1, 2024
Image encryption involves applying cryptographic approaches to convert the content of an image into illegible or encrypted format, reassuring that illegal users cannot simply interpret access actual visual details. Commonly employed models comprise symmetric key algorithms for data, necessitating a secret decryption. This study introduces new Chaotic Encryption Algorithm with Improved Bonobo Optimizer and DNA Coding (CIEAIBO-DNAC) enhanced security. The presented CIEAIBO-DNAC technique different processes such as initial value generation, substitution, diffusion, Primarily, is related input pixel values by MD5 hash function, produced can be utilized primary chaotic model boost sensitivity. Besides, uses (IBO) algorithm scrambling position in block process among blocks takes place. Moreover, diffusion stage, encoding, obfuscation, decoding were carried out attain images. Extensive experimental evaluations security analyses are conducted assess outcome technique. simulation demonstrates excellent properties, including resistance against several attacks, ensuring it applied real-time scenarios.
Язык: Английский
Процитировано
9Multimedia Tools and Applications, Год журнала: 2024, Номер 83(27), С. 69511 - 69533
Опубликована: Янв. 31, 2024
Язык: Английский
Процитировано
8International Journal of Safety and Security Engineering, Год журнала: 2024, Номер 14(1), С. 201 - 216
Опубликована: Фев. 29, 2024
In this study, we will describe a novel cryptographic system leveraging genetic crossover process based on scheme specifically tailored for encrypting medical images, operating at the level of ribonucleic acid (RNA) sequences.Initially, an extraction three-color channels and their conversion into vectors involving confusion diffusion is conducted, followed by pseudo-random transformation RNA notation.A with vector generated from chaotic maps controlled table applied to generate new gene significantly enhanced performance, inheriting properties both crossed genes address unforeseen attacks.A sample diverse images randomly selected several databases tested our system, yielding highly promising results.
Язык: Английский
Процитировано
8The Journal of Supercomputing, Год журнала: 2024, Номер 80(10), С. 14694 - 14724
Опубликована: Март 25, 2024
Язык: Английский
Процитировано
7Physica Scripta, Год журнала: 2024, Номер 99(9), С. 095248 - 095248
Опубликована: Авг. 8, 2024
Abstract With the increasing frequency of data exchange, security transmitted information, especially images, has become paramount. This paper proposes a novel algorithm for encrypting grayscale images any dimension by using proposed fractional-order (FO) 4D hyperchaotic system, 2D Henon chaotic map permutation, and knight tour algorithm. Initially, sequences are generated utilizing FO which later employed to rearrange shuffle entire image pixels bolster efficacy encryption. To introduce an additional layer diffusion, permutation is used. Furthermore, applied starting from chosen point executing specified rounds on scrambled increase encryption’s robustness. The resultant encryption undergoes thorough testing evaluation. It exhibits high sensitivity key boasts larger space, rendering it more resistant brute-force attacks. demonstrates approximate correlation 0 between adjacent pixels. Further, size 256 × takes approximately 0.4 seconds, suitable cryptographic purposes.
Язык: Английский
Процитировано
7Human Behavior and Emerging Technologies, Год журнала: 2025, Номер 2025(1)
Опубликована: Янв. 1, 2025
Information attacks have increased worldwide as more information is available in digital form. Image encryption essential to prevent attackers from unauthorized access confidential images. In this paper, we introduce a novel image method called the smart codebook, which combines an intelligent codebook technique with RSA (Rivest–Shamir–Adleman) algorithm. The proposed designed be dynamic it selects most effective codebooks encrypting each increase its ambiguity. divides into several segments based on dimensions, and multiple random are generated for segment. Moreover, images go through processing stages before they converted cipher images, including noise, segmentation, encryption. best selected create encrypted next stage. Finally, algorithm sends recipient code books image. evaluation of depends factors, entropy, unified averaged changed intensity (UACI), number changing pixel rate (NPCR), correlation coefficient analysis. assessment demonstrates resilience against cryptographic attacks, affirming security precision. results show impressive improvement securing compared previous related efforts.
Язык: Английский
Процитировано
1