Mathematics,
Год журнала:
2025,
Номер
13(11), С. 1799 - 1799
Опубликована: Май 28, 2025
Data
security
is
critical,
particularly
in
medical
imaging,
yet
remains
challenging.
Many
research
efforts
have
focused
on
enhancing
image
security,
during
network
transmission.
Ensuring
confidentiality
and
authenticity
a
key
priority
for
researchers.
However,
traditional
encryption
methods
are
unsuitable
IoT
environments
due
to
data
size
limitations.
Lightweight
algorithms
that
preserve
confidentiality,
integrity,
can
address
these
This
paper
proposes
an
efficient,
lightweight
method
encrypt
authenticate
images
healthcare
systems.
The
approach
splits
into
diagonal
non-diagonal
blocks,
then
processes
them
two
phases:
(1)
blocks
permuted
using
inter-block
differences
XORed
with
substitution;
(2)
encrypted
via
AES
enhanced
CBC
mode
tag
mechanism
integrity.
Security
tests
(histograms,
correlation,
entropy,
NPCR,
UACI)
verify
the
scheme’s
robustness.
results
show
model
outperforms
existing
techniques
efficacy
attack
resistance,
making
it
viable
smart
surveillance.
Fractal and Fractional,
Год журнала:
2025,
Номер
9(2), С. 115 - 115
Опубликована: Фев. 13, 2025
Memristor-based
fractional-order
chaotic
systems
can
record
information
from
the
past,
present,
and
future,
describe
real
world
more
accurately
than
integer-order
systems.
This
paper
proposes
a
novel
memristor
model
verifies
its
characteristics
through
pinched
loop
(PHL)
method.
Subsequently,
new
memristive
Hopfield
neural
network
(4D-FOMHNN)
is
introduced
to
simulate
induced
current,
accompanied
by
Caputo’s
definition
of
fractional
order.
An
Adomian
decomposition
method
(ADM)
employed
for
system
solution.
By
varying
parameters
order
4D-FOMHNN,
rich
dynamic
behaviors
including
transient
chaos,
coexistence
attractors
are
observed
using
methods
such
as
bifurcation
diagrams
Lyapunov
exponent
analysis.
Finally,
proposed
FOMHNN
implemented
on
field-programmable
gate
array
(FPGA),
oscilloscope
observation
results
consistent
with
MATLAB
numerical
simulation
results,
which
further
validate
theoretical
analysis
provide
basis
application
in
field
encryption.
Entropy,
Год журнала:
2025,
Номер
27(3), С. 276 - 276
Опубликована: Март 6, 2025
In
this
digital
era,
social
images
are
the
most
vital
information
carrier
on
multimedia
platforms.
More
and
more
users
interested
in
sharing
with
mobile
terminals
Social
image
also
faces
potential
risks
from
malicious
use,
such
as
illegal
sharing,
piracy,
misappropriation.
This
paper
mainly
concentrates
secure
sharing.
To
address
how
to
share
a
safe
way,
security
scheme
is
proposed.
The
technology
addresses
problem
active
tracing
problem.
First,
discrete
wavelet
transform
(DWT)
performed
directly
JPEG
image.
Then,
high-bit
planes
of
LL,
LH,
HL
permuted
cellular
automation
(CA),
bit-XOR,
singular
value
decomposition
(SVD)
computing,
their
low-bit
chosen
embed
watermark.
end,
encrypted
watermarked
again
cosine
(DCT)
domain.
Experimental
results
analysis
show
that
method
not
only
has
good
performance
robustness,
security,
time
complexity
but
can
actively
trace
distribution
images.
proposed
provide
double-level
for
Scientific Reports,
Год журнала:
2025,
Номер
15(1)
Опубликована: Фев. 14, 2025
Chaotic
systems
have
been
widely
employed
in
constructing
hash
functions
because
of
their
nonlinear
characteristics.
Nonetheless,
some
chaotic
are
intricately
designed,
significantly
increasing
computational
overhead,
and
can
only
generate
a
single
value
fixed
length,
thus
lacking
flexibility.
To
overcome
the
above
problems,
novel
function
based
on
2D
linear
cross-coupled
hyperchaotic
map
(HF-2DLCHM)
is
introduced
has
parallel
feedback
structure.
Compared
to
typical
1D
maps,
2DLCHM
superior
dynamic
complexity,
allowing
HF-2DLCHM
resist
phase
space
reconstruction
attacks.
A
parallelizable
structure
introduced,
enhancing
efficiency
through
concurrent
processing
operational
units.
Simultaneously,
mechanism
incorporated
augment
diffusion
effect,
ensuring
better
mixing
distribution
information.
Moreover,
by
controlling
size
input
parameter
T,
scheme
[Formula:
see
text]
bits.
The
experimental
results
illustrate
that
this
exhibits
distribution,
confusion,
collision
resistance
characteristics
approaching
nearly
ideal
benchmarks
while
maintaining
an
acceptable
speed.
Therefore,
holds
substantial
practical
potential
domain
data
security
privacy
protection.
Applied Sciences,
Год журнала:
2025,
Номер
15(2), С. 913 - 913
Опубликована: Янв. 17, 2025
This
paper
skillfully
incorporates
the
memristor
model
into
a
chaotic
system,
creating
two-dimensional
(2D)
hyperchaotic
map.
The
system’s
exceptional
performance
is
verified
through
methods
such
as
phase
diagrams,
bifurcation
and
Lyapunov
exponential
spectrum.
Additionally,
universal
framework
corresponding
to
system
proposed.
To
enhance
encryption
security,
pixel
values
of
image
are
preprocessed,
hash
function
used
generate
value,
which
then
incorporated
secret
keys
generation
process.
Existing
algorithms
typically
encrypt
three
channels
color
separately
or
perform
only
at
level,
resulting
in
certain
limitations
effectiveness.
address
this,
this
proposes
novel
algorithm
based
on
2D
maps
that
extends
from
single-channel
multi-channel
(SEME-TDHM).
SEME-TDHM
combines
random
scrambling,
followed
by
local
cross-diffusion
across
different
planes.
By
integrating
both
pixel-level
bit-level
diffusion,
randomness
information
distribution
significantly
increased.
Finally,
diffusion
matrix
decomposed
restored
encrypted
image.
Simulation
results
comparative
analyses
demonstrate
outperforms
existing
terms
maintains
stable
entropy
around
7.999,
with
average
NPCR
UACI
close
ideal
benchmarks
99.6169%
33.4623%,
respectively,
further
affirming
its
outstanding
histogram
shows
uniform
distribution,
correlation
coefficient
nearly
zero.
These
findings
indicate
successfully
encrypts
images,
providing
strong
security
practical
utility.
Physica Scripta,
Год журнала:
2025,
Номер
100(2), С. 025230 - 025230
Опубликована: Янв. 27, 2025
Abstract
Multi-scroll
chaos
exhibits
complex
dynamic
behavior,
the
method
of
designing
chaotic
systems
with
multi-scroll
attractor
is
an
important
research
topic.
Without
any
theoretical
guidance,
it
very
difficult
to
obtain
a
new
system,
especially
system.
In
this
paper,
class
n
-scroll
investigated
by
using
variable
transformation
based
on
th
order
polynomial
number.
The
Lyapunov
exponent,
bifurcation
diagram,
and
topological
horseshoe
in
Poincar
é
cross-section
are
presented
rigorously
prove
existence
system
assistance
computer
simulation.
Based
proposed
encryption
algorithm
for
image
information,
simulation
experiments
verify
feasibility
effectiveness
algorithm.
Symmetry,
Год журнала:
2025,
Номер
17(2), С. 259 - 259
Опубликована: Фев. 8, 2025
The
Internet
of
Things
(IoT),
which
is
characteristic
the
current
industrial
revolutions,
connection
physical
devices
through
different
protocols
and
sensors
to
share
information.
Even
though
IoT
provides
revolutionary
opportunities,
its
for
smart
cities
brings
new
opportunities
security
threats,
especially
with
appearance
threats
like
quantum
computing.
Current
approaches
protect
data
are
not
immune
attacks
designed
offer
best
management
city
applications.
Thus,
post-quantum
cryptography
(PQC),
still
in
research
stage,
aims
solve
these
problems.
To
this
end,
introduces
Dynamic
Galois
Reed–Solomon
Quantum
Resilience
(DGRS-QR)
system
improve
secure
communication
cities.
preprocessing
includes
K-Nearest
Neighbors
(KNN)
min–max
normalization
then
applying
Field
Adaptive
Expansion
(GFAE).
Optimization
quantum-resistant
keys
accomplished
by
Artificial
Bee
Colony
(ABC)
Moth
Flame
(MFO)
algorithms.
Also,
role-based
access
control
strong
cloud
security,
resistance
maintained
refreshing
every
five
minutes
active
session.
For
error
correction,
(RS)
codes
used
provide
reliability.
Data
performed
using
an
attention-based
Bidirectional
Long
Short-Term
Memory
(Att-Bi-LSTM)
model
skip
connections
optimized
management.
proposed
approach
was
evaluated
key
performance
metrics:
a
generation
time
2.34
s,
encryption
4.56
decryption
3.56
PSNR
33
dB,
SSIM
0.99.
results
show
that
capable
protecting
from
while
also
ensuring
optimal
processing.
Mathematics,
Год журнала:
2025,
Номер
13(5), С. 726 - 726
Опубликована: Фев. 24, 2025
In
comparison
with
dissipative
chaos,
conservative
chaos
is
better
equipped
to
handle
the
risks
associated
reconstruction
of
phase
space
due
absence
attractors.
This
paper
proposes
a
novel
five-dimensional
(5D)
memristive
hyperchaotic
system
(CMHS),
by
incorporating
memristors
into
four-dimensional
(4D)
chaotic
(CCS).
We
conducted
comprehensive
analysis,
using
Lyapunov
exponent
diagrams,
bifurcation
portraits,
equilibrium
points,
and
spectral
entropy
maps
thoroughly
verify
system’s
properties.
The
exhibited
characteristics
such
as
hyperchaos
multi-stability
over
an
ultra-wide
range
parameters
initial
values,
accompanied
transient
quasi-periodic
phenomena.
Subsequently,
pseudorandom
sequences
generated
new
were
tested
demonstrated
excellent
performance,
passing
all
tests
set
National
Institute
Standards
Technology
(NIST).
final
stage
research,
image-encryption
application
based
on
5D
CMHS
was
proposed.
Through
security
feasibility
algorithm
confirmed.
Scientific Reports,
Год журнала:
2025,
Номер
15(1)
Опубликована: Март 14, 2025
In
the
constantly
changing
digital
age
where
instant
information
sharing
is
shared
globally,
content's
safe
delivery
and
privacy
management
have
become
necessary.
Mainly,
in
multimedia
data
becomes
massive
networks,
such
vital
vulnerable.
To
mitigate
vulnerability
over
public
it
crucial
to
develop
privacy-preserving
algorithms
system
security
schemes
that
ensure
safety,
ownership
integrity
of
travels
through
network.
The
confusion
diffusion
strategies
are
significant
enhancing
robustness
encryption
algorithms.
This
paper
deals
with
ensuring
image's
Confidentiality–Integrity–Authenticity
(CIA
triad)
aspects
using
image
encryption,
authentication
strategies.
proposed
algorithm
generates
a
one-way
hash
value
based
on
pixel
intensity,
which
acts
as
fingerprint
for
validate
failures.
used
key
image-specific
algorithm.
Lorentz
attractor
random
index
CIA
triad
involves
deployment
"Authentication
token"
(Authtoken)
generator
produces
an
token.
suggested
was
examined
several
CIA-related
metrics,
yielding
average
entropy
7.97871
correlation
0.00337.
Other
metrics
further
demonstrate
applicability
framework.
Hence,
solution
offers
absolute
while
they
being
transmitted.
Scientific Reports,
Год журнала:
2025,
Номер
15(1)
Опубликована: Март 21, 2025
Abstract
Secure
image
encryption
is
critical
for
protecting
sensitive
data
such
as
satellite
imagery,
which
pivotal
national
security
and
environmental
monitoring.
However,
existing
methods
often
face
challenges
vulnerability
to
traffic
analysis,
limited
randomness,
insufficient
resistance
attacks.
To
address
these
gaps,
this
article
proposes
a
novel
multiple
(MIE)
algorithm
that
integrates
hyperchaotic
systems,
Singular
Value
Decomposition
(SVD),
counter
mode
RC5,
chaos-based
Hill
cipher,
custom
S-box
generated
via
modified
Blum
Shub
(BBS)
algorithm.
The
proposed
MIE
begins
by
merging
images
into
an
augmented
image,
enhancing
against
analysis.
process
splits
the
colored
RGB
channels,
with
each
channel
undergoing
four
stages:
additive
confusion
using
memristor
key
transformed
SVD,
RC5
in
XOR
operations,
cipher
6D
invertible
matrices
mod
256,
substitution
BBS.
Experimental
results
demonstrate
algorithm’s
superior
efficiency,
enhanced
strong
cryptanalytic,
differential,
brute-force
These
findings
highlight
potential
securing
imagery
real-time
applications,
ensuring
confidentiality
robustness
modern
threats.