New Step in Lightweight Medical Image Encryption and Authenticity DOI Creative Commons

Saleem Alsaraireh,

Ashraf Ahmad, Yousef AbuHour

и другие.

Mathematics, Год журнала: 2025, Номер 13(11), С. 1799 - 1799

Опубликована: Май 28, 2025

Data security is critical, particularly in medical imaging, yet remains challenging. Many research efforts have focused on enhancing image security, during network transmission. Ensuring confidentiality and authenticity a key priority for researchers. However, traditional encryption methods are unsuitable IoT environments due to data size limitations. Lightweight algorithms that preserve confidentiality, integrity, can address these This paper proposes an efficient, lightweight method encrypt authenticate images healthcare systems. The approach splits into diagonal non-diagonal blocks, then processes them two phases: (1) blocks permuted using inter-block differences XORed with substitution; (2) encrypted via AES enhanced CBC mode tag mechanism integrity. Security tests (histograms, correlation, entropy, NPCR, UACI) verify the scheme’s robustness. results show model outperforms existing techniques efficacy attack resistance, making it viable smart surveillance.

Язык: Английский

Dynamic Analysis and Implementation of FPGA for a New 4D Fractional-Order Memristive Hopfield Neural Network DOI Creative Commons
Fei Yu,

Shankou Zhang,

Dan Su

и другие.

Fractal and Fractional, Год журнала: 2025, Номер 9(2), С. 115 - 115

Опубликована: Фев. 13, 2025

Memristor-based fractional-order chaotic systems can record information from the past, present, and future, describe real world more accurately than integer-order systems. This paper proposes a novel memristor model verifies its characteristics through pinched loop (PHL) method. Subsequently, new memristive Hopfield neural network (4D-FOMHNN) is introduced to simulate induced current, accompanied by Caputo’s definition of fractional order. An Adomian decomposition method (ADM) employed for system solution. By varying parameters order 4D-FOMHNN, rich dynamic behaviors including transient chaos, coexistence attractors are observed using methods such as bifurcation diagrams Lyapunov exponent analysis. Finally, proposed FOMHNN implemented on field-programmable gate array (FPGA), oscilloscope observation results consistent with MATLAB numerical simulation results, which further validate theoretical analysis provide basis application in field encryption.

Язык: Английский

Процитировано

4

Social Image Security with Encryption and Watermarking in Hybrid Domains DOI Creative Commons

Conghuan Ye,

Shenglong Tan, Jun Wang

и другие.

Entropy, Год журнала: 2025, Номер 27(3), С. 276 - 276

Опубликована: Март 6, 2025

In this digital era, social images are the most vital information carrier on multimedia platforms. More and more users interested in sharing with mobile terminals Social image also faces potential risks from malicious use, such as illegal sharing, piracy, misappropriation. This paper mainly concentrates secure sharing. To address how to share a safe way, security scheme is proposed. The technology addresses problem active tracing problem. First, discrete wavelet transform (DWT) performed directly JPEG image. Then, high-bit planes of LL, LH, HL permuted cellular automation (CA), bit-XOR, singular value decomposition (SVD) computing, their low-bit chosen embed watermark. end, encrypted watermarked again cosine (DCT) domain. Experimental results analysis show that method not only has good performance robustness, security, time complexity but can actively trace distribution images. proposed provide double-level for

Язык: Английский

Процитировано

3

Hyperchaotic hashing: a chaotic hash function based on 2D linear cross-coupled map with parallel feedback structure DOI Creative Commons
Hao Xing, Rui Min, Shouliang Li

и другие.

Scientific Reports, Год журнала: 2025, Номер 15(1)

Опубликована: Фев. 14, 2025

Chaotic systems have been widely employed in constructing hash functions because of their nonlinear characteristics. Nonetheless, some chaotic are intricately designed, significantly increasing computational overhead, and can only generate a single value fixed length, thus lacking flexibility. To overcome the above problems, novel function based on 2D linear cross-coupled hyperchaotic map (HF-2DLCHM) is introduced has parallel feedback structure. Compared to typical 1D maps, 2DLCHM superior dynamic complexity, allowing HF-2DLCHM resist phase space reconstruction attacks. A parallelizable structure introduced, enhancing efficiency through concurrent processing operational units. Simultaneously, mechanism incorporated augment diffusion effect, ensuring better mixing distribution information. Moreover, by controlling size input parameter T, scheme [Formula: see text] bits. The experimental results illustrate that this exhibits distribution, confusion, collision resistance characteristics approaching nearly ideal benchmarks while maintaining an acceptable speed. Therefore, holds substantial practical potential domain data security privacy protection.

Язык: Английский

Процитировано

2

A New Chaotic Color Image Encryption Algorithm Based on Memristor Model and Random Hybrid Transforms DOI Creative Commons

Yexia Yao,

Xuemei Xu, Zhaohui Jiang

и другие.

Applied Sciences, Год журнала: 2025, Номер 15(2), С. 913 - 913

Опубликована: Янв. 17, 2025

This paper skillfully incorporates the memristor model into a chaotic system, creating two-dimensional (2D) hyperchaotic map. The system’s exceptional performance is verified through methods such as phase diagrams, bifurcation and Lyapunov exponential spectrum. Additionally, universal framework corresponding to system proposed. To enhance encryption security, pixel values of image are preprocessed, hash function used generate value, which then incorporated secret keys generation process. Existing algorithms typically encrypt three channels color separately or perform only at level, resulting in certain limitations effectiveness. address this, this proposes novel algorithm based on 2D maps that extends from single-channel multi-channel (SEME-TDHM). SEME-TDHM combines random scrambling, followed by local cross-diffusion across different planes. By integrating both pixel-level bit-level diffusion, randomness information distribution significantly increased. Finally, diffusion matrix decomposed restored encrypted image. Simulation results comparative analyses demonstrate outperforms existing terms maintains stable entropy around 7.999, with average NPCR UACI close ideal benchmarks 99.6169% 33.4623%, respectively, further affirming its outstanding histogram shows uniform distribution, correlation coefficient nearly zero. These findings indicate successfully encrypts images, providing strong security practical utility.

Язык: Английский

Процитировано

1

Design of new chaotic system with multi-scroll attractor by using variable transformation and its application DOI

Shiya Wang,

Jianbin He

Physica Scripta, Год журнала: 2025, Номер 100(2), С. 025230 - 025230

Опубликована: Янв. 27, 2025

Abstract Multi-scroll chaos exhibits complex dynamic behavior, the method of designing chaotic systems with multi-scroll attractor is an important research topic. Without any theoretical guidance, it very difficult to obtain a new system, especially system. In this paper, class n -scroll investigated by using variable transformation based on th order polynomial number. The Lyapunov exponent, bifurcation diagram, and topological horseshoe in Poincar é cross-section are presented rigorously prove existence system assistance computer simulation. Based proposed encryption algorithm for image information, simulation experiments verify feasibility effectiveness algorithm.

Язык: Английский

Процитировано

1

Hybrid Dynamic Galois Field with Quantum Resilience for Secure IoT Data Management and Transmission in Smart Cities Using Reed–Solomon (RS) Code DOI Open Access

Abdullah Aljuhni,

Amer Aljaedi, Adel R. Alharbi

и другие.

Symmetry, Год журнала: 2025, Номер 17(2), С. 259 - 259

Опубликована: Фев. 8, 2025

The Internet of Things (IoT), which is characteristic the current industrial revolutions, connection physical devices through different protocols and sensors to share information. Even though IoT provides revolutionary opportunities, its for smart cities brings new opportunities security threats, especially with appearance threats like quantum computing. Current approaches protect data are not immune attacks designed offer best management city applications. Thus, post-quantum cryptography (PQC), still in research stage, aims solve these problems. To this end, introduces Dynamic Galois Reed–Solomon Quantum Resilience (DGRS-QR) system improve secure communication cities. preprocessing includes K-Nearest Neighbors (KNN) min–max normalization then applying Field Adaptive Expansion (GFAE). Optimization quantum-resistant keys accomplished by Artificial Bee Colony (ABC) Moth Flame (MFO) algorithms. Also, role-based access control strong cloud security, resistance maintained refreshing every five minutes active session. For error correction, (RS) codes used provide reliability. Data performed using an attention-based Bidirectional Long Short-Term Memory (Att-Bi-LSTM) model skip connections optimized management. proposed approach was evaluated key performance metrics: a generation time 2.34 s, encryption 4.56 decryption 3.56 PSNR 33 dB, SSIM 0.99. results show that capable protecting from while also ensuring optimal processing.

Язык: Английский

Процитировано

1

An efficient image encryption algorithm based on a time-delay predator–prey model DOI
Jian Wang, Haixiao Wang, Jialin Chen

и другие.

Applied Physics B, Год журнала: 2025, Номер 131(3)

Опубликована: Фев. 19, 2025

Язык: Английский

Процитировано

1

A Wide-Range Adjustable Conservative Memristive Hyperchaotic System with Transient Quasi-Periodic Characteristics and Encryption Application DOI Creative Commons
Fei Yu, Boon Thong Tan, Ting He

и другие.

Mathematics, Год журнала: 2025, Номер 13(5), С. 726 - 726

Опубликована: Фев. 24, 2025

In comparison with dissipative chaos, conservative chaos is better equipped to handle the risks associated reconstruction of phase space due absence attractors. This paper proposes a novel five-dimensional (5D) memristive hyperchaotic system (CMHS), by incorporating memristors into four-dimensional (4D) chaotic (CCS). We conducted comprehensive analysis, using Lyapunov exponent diagrams, bifurcation portraits, equilibrium points, and spectral entropy maps thoroughly verify system’s properties. The exhibited characteristics such as hyperchaos multi-stability over an ultra-wide range parameters initial values, accompanied transient quasi-periodic phenomena. Subsequently, pseudorandom sequences generated new were tested demonstrated excellent performance, passing all tests set National Institute Standards Technology (NIST). final stage research, image-encryption application based on 5D CMHS was proposed. Through security feasibility algorithm confirmed.

Язык: Английский

Процитировано

1

Secure gray image sharing framework with adaptive key generation using image digest DOI Creative Commons

C. Nithya,

C. Vasantha Lakshmi,

K. Thenmozhi

и другие.

Scientific Reports, Год журнала: 2025, Номер 15(1)

Опубликована: Март 14, 2025

In the constantly changing digital age where instant information sharing is shared globally, content's safe delivery and privacy management have become necessary. Mainly, in multimedia data becomes massive networks, such vital vulnerable. To mitigate vulnerability over public it crucial to develop privacy-preserving algorithms system security schemes that ensure safety, ownership integrity of travels through network. The confusion diffusion strategies are significant enhancing robustness encryption algorithms. This paper deals with ensuring image's Confidentiality–Integrity–Authenticity (CIA triad) aspects using image encryption, authentication strategies. proposed algorithm generates a one-way hash value based on pixel intensity, which acts as fingerprint for validate failures. used key image-specific algorithm. Lorentz attractor random index CIA triad involves deployment "Authentication token" (Authtoken) generator produces an token. suggested was examined several CIA-related metrics, yielding average entropy 7.97871 correlation 0.00337. Other metrics further demonstrate applicability framework. Hence, solution offers absolute while they being transmitted.

Язык: Английский

Процитировано

1

A new multiple image encryption algorithm using hyperchaotic systems, SVD, and modified RC5 DOI Creative Commons
Wassim Alexan,

Mohamed Youssef,

Hisham H. Hussein

и другие.

Scientific Reports, Год журнала: 2025, Номер 15(1)

Опубликована: Март 21, 2025

Abstract Secure image encryption is critical for protecting sensitive data such as satellite imagery, which pivotal national security and environmental monitoring. However, existing methods often face challenges vulnerability to traffic analysis, limited randomness, insufficient resistance attacks. To address these gaps, this article proposes a novel multiple (MIE) algorithm that integrates hyperchaotic systems, Singular Value Decomposition (SVD), counter mode RC5, chaos-based Hill cipher, custom S-box generated via modified Blum Shub (BBS) algorithm. The proposed MIE begins by merging images into an augmented image, enhancing against analysis. process splits the colored RGB channels, with each channel undergoing four stages: additive confusion using memristor key transformed SVD, RC5 in XOR operations, cipher 6D invertible matrices mod 256, substitution BBS. Experimental results demonstrate algorithm’s superior efficiency, enhanced strong cryptanalytic, differential, brute-force These findings highlight potential securing imagery real-time applications, ensuring confidentiality robustness modern threats.

Язык: Английский

Процитировано

1