Article
Physics, Multidisciplinary
Zhenhua Hu, Hairong Lin, Chunhua Wang
Summary: This paper presents a network model based on Hopfield neural network and memristor synapse control, which can generate novel grid multi-structure chaotic attractors with simple implementation and complex unit attractor structure. The generation mechanism and dynamical characteristics of the attractors are analyzed, and corresponding analog circuits and image encryption schemes are designed. Experimental results show that the proposed scheme has higher information entropy, key sensitivity, and good application prospect compared to existing schemes.
FRONTIERS IN PHYSICS
(2023)
Article
Mathematics
Yassine Bouteraa, Javad Mostafaee, Mourad Kchaou, Rabeh Abbassi, Houssem Jerbi, Saleh Mobayen
Summary: This research article introduces a simple four-dimensional chaotic dynamic system and demonstrates its chaotic nature using nonlinear dynamic analysis and mathematical tools. The proposed system is compared with similar systems and applied in image encryption with standard tests conducted.
Article
Computer Science, Interdisciplinary Applications
Anam Azam, Muhammad Aqeel, Danish Ali Sunny
Summary: This study presents a systematic mechanism for designing multidirectional symmetric multiscroll patterns of chaotic attractors. By modifying the coefficients of segmented disc dynamo, a chaotic system generating a chaotic attractor with symmetrical attractors is designed. The state variables are transformed and combined to generate a complete family of symmetric multiscroll chaotic attractors in multi directions.
MATHEMATICS AND COMPUTERS IN SIMULATION
(2022)
Article
Mathematics, Interdisciplinary Applications
Hairong Lin, Chunhua Wang, Sichun Du, Wei Yao, Yichuang Sun
Summary: In this paper, a simplified multi-piecewise memristor is used to design a family of memristive multibutterfly chaotic systems (MMBCSs). Three MMBCSs are constructed by coupling different numbers of the simplified multi-piecewise memristors into a modified Sprott C system. The constructed MMBCSs can generate connected and unconnected 1D, 2D, and 3D multibutterfly chaotic attractors, and the number and position of butterfly attractors can be easily controlled.
CHAOS SOLITONS & FRACTALS
(2023)
Article
Mathematics, Interdisciplinary Applications
Qiang Lai, Zhijie Chen
Summary: The paper establishes a four-dimensional multi-scroll chaotic system by adding a flux-controlled non-volatile memristor to a simple three-dimensional chaotic system. The system is extended to generate grid-scroll chaotic attractors by replacing the linear term with a triangular wave function. The evolution of chaos is studied and the existence of coexisting attractors is observed. In addition, the proposed system can be controlled by adjusting the parameters and the circuit implementation results are consistent with numerical simulations.
CHAOS SOLITONS & FRACTALS
(2023)
Article
Automation & Control Systems
Hairong Lin, Chunhua Wang, Fei Yu, Cong Xu, Qinghui Hong, Wei Yao, Yichuang Sun
Summary: The study constructed a simple multiwing chaotic system without polynomial functions, which can adjust the number of butterflies in multiple ways. By using commercially available electronic components to implement the analog circuit, the consumption of electronic components was greatly reduced. The application of MWCS to chaotic image encryption showed high security and reliable encryption performance.
IEEE TRANSACTIONS ON INDUSTRIAL ELECTRONICS
(2021)
Article
Engineering, Electrical & Electronic
Minxiu Yan, Hui Xu
Summary: The study introduces a hyper chaotic system based on the Lorenz system that can generate multi-scroll coexistence attractors. Numerical simulations show that compared to traditional chaotic attractors, this type of attractor exhibits more complex structure and dynamic behavior. The digital image encryption system designed based on this system shows feasibility and security in terms of key space, histogram, information entropy, key sensitivity, and pixel correlation.
SIGNAL PROCESSING-IMAGE COMMUNICATION
(2021)
Article
Computer Science, Artificial Intelligence
Qiang Lai, Hui Zhang, Paul Didier Kamdem Kuate, Guanghui Xu, Xiao-Wen Zhao
Summary: This paper introduces a new non-equilibrium chaotic system and proposes a chaotic magic cube transformation image encryption algorithm using it, which demonstrates high security characteristics.
The new system exhibits specific period-doubling bifurcation and hidden chaotic attractors, with analog circuit and FPGA implementation proving the existence of the system.
The encryption algorithm incorporates a dynamic key and a hybrid permutation-diffusion structure, successfully defending against various common attacks, showing good security properties.
APPLIED INTELLIGENCE
(2022)
Article
Mathematics, Applied
Yanjie Ma, Jun Mou, Santo Banerjee, Miao Miao
Summary: In this paper, a novel model of the flux-controlled memristor is constructed and its characteristics are analyzed. Based on this memristor, a memristive chaotic system is constructed and its dynamical behavior is analyzed, with observed attractor coexistence and state transfer phenomena. Additionally, equivalent circuits of the memristor model and the system are designed, and the system is implemented on DSP platform. Finally, the memristive chaotic system is applied to chaotic image encryption. The results of this study will provide guidance for the application and instruction of memristors and memristive chaotic systems.
APPLIED AND COMPUTATIONAL MATHEMATICS
(2023)
Article
Computer Science, Information Systems
Haiying Hu, Yinghong Cao, Jin Hao, Xuejun Li, Jun Mou
Summary: This paper presents a novel fractional-order no-equilibrium chaotic system with hidden attractor. The dynamical characteristics of the system are analyzed by various methods, and an image encryption scheme is proposed based on the analysis. Experimental results show that the scheme has high compressibility and security.
MULTIMEDIA TOOLS AND APPLICATIONS
(2023)
Article
Mathematics, Interdisciplinary Applications
Hairong Lin, Chunhua Wang, Jingru Sun, Xin Zhang, Yichuang Sun, Herbert H. C. Iu
Summary: This article focuses on the bionic model and chaotic dynamics of the asymmetric neural network, as well as its engineering application. The proposed memristor-coupled asymmetric neural network (MANN) exhibits multiple complex dynamical characteristics and is observed to have phenomena such as infinitely wide hyperchaos and hyperchaotic multi-structure attractors for the first time in neural networks. Additionally, a color image encryption scheme based on the MANN is designed and shows advantages in correlation, information entropy, and key sensitivity.
CHAOS SOLITONS & FRACTALS
(2023)
Article
Engineering, Multidisciplinary
Minghong Qin, Qiang Lai
Summary: This paper studies an expanded multi-scroll chaotic system and explores its dynamic characteristics and synchronization control. It also proposes an image encryption algorithm for remote sensing images with high security.
APPLIED MATHEMATICAL MODELLING
(2024)
Article
Mathematics, Interdisciplinary Applications
Chengwei Dong
Summary: This paper reports a new autonomous chaotic system that can generate double-wing hidden chaotic attractors. The rich dynamics of the system are studied using dynamic analysis tools, and the topological classification of the periodic orbits is investigated using a variational method. Symbolic dynamics are successfully established, and the system's realizability is verified through an analog electronic circuit.
FRACTAL AND FRACTIONAL
(2022)
Article
Physics, Multidisciplinary
Ning Zhang, Jie Liu, Xiaojun Tong, Wei Jiao, Hongping Gan
Summary: This work proposes a Lorenz-Sine coupling chaotic system and a novel image encryption scheme. The smooth chaotic attractors with a unique appearance are obtained by adding a nonlinear controller containing a sinusoidal function to the Lorenz system. Based on the proposed chaotic system, a pseudorandom sequence generator is designed to generate keys with high randomness. Furthermore, an image encryption scheme using spiral-rotation and random permutation is presented, which is more capable against differential attacks and more robust against noise attacks and cropping attacks.
Article
Physics, Applied
Xiaoxia Li, Chi Zheng, Xue Wang, Yingzi Cao, Guizhi Xu
Summary: This paper introduces a new four-dimensional chaotic system with symmetric coexisting bifurcation behaviors and four coexisting attractors. By replacing the coupling resistor, a four-dimensional memristive chaotic system is constructed, showing extreme multistability phenomenon. The dynamics of the systems are fully analyzed using phase portraits, Lyapunov exponent spectra, and coexisting bifurcation diagrams.
MODERN PHYSICS LETTERS B
(2021)
Article
Computer Science, Information Systems
Majid Khan, Lalsaid Khan, Mohammad Mazyad Hazzazi, Sajjad Shaukat Jamal, Iqtadar Hussain
Summary: This article presents an image encryption structure for secure transmission of fused images obtained from multi-focus sensors. The proposed scheme undergoes various security analyses and proves its effectiveness against differential attacks. The real-time implementation time analysis shows that the algorithm is suitable for real-time applications.
MULTIMEDIA TOOLS AND APPLICATIONS
(2022)
Article
Optics
Noor Munir, Majid Khan, Iqtadar Hussain, Muhammad Amin
Summary: Wireless multimedia communications have made significant progress in recent years, leading to an increasing demand for more secure media transmission to protect multimedia information. Image encryption systems based on chaotic maps are considered the most secure and trustworthy, due to the inherent properties in such types of multimedia contents. This research performed differential cryptanalysis on a cryptosystem based on a 3D logistic map and 3D Cat map, and successfully proposed a cryptanalysis attack by exploiting vulnerabilities in the studied cryptosystem.
Article
Computer Science, Information Systems
Lal Said, Ammar S. Alanazi, Majid Khan
Summary: The security of digital information is a significant problem in the world today. This paper proposes a dual-layer information hiding mechanism using a 3-Cell Cellular Neural Network system to generate pseudorandom numbers for encryption and highly non-linear S-boxes for confusion. The proposed scheme is tested using various performance indicators and shows high efficiency and effectiveness.
MULTIMEDIA TOOLS AND APPLICATIONS
(2023)
Article
Computer Science, Artificial Intelligence
Nabilah Abughazalah, Asim Latif, Muhammad Waseem Hafiz, Majid Khan, Ammar S. Alanazi, Iqtadar Hussain
Summary: The construction and development of nonlinear multivalued Boolean functions are crucial in modern cryptography. This paper presents an innovative system for constructing the confusion component of block ciphers using recurrent neural networks. Through evaluations of randomness and cryptanalysis measures, the effectiveness of this method in block ciphers and its superior cryptographic strength in image encryption are demonstrated.
ARTIFICIAL INTELLIGENCE REVIEW
(2023)
Article
Computer Science, Hardware & Architecture
Akif Akgul, Yusuf Adiyaman, Abdullah Gokyildirim, Burak Aricioglu, Muhammed Ali Pala, Murat Erhan Cimen
Summary: This paper presents the dynamical analysis and fractional-order circuit implementation of the Rucklidge chaotic system. The component values required for the fractional-order system are calculated, and the feasibility of the attractor is examined using an electronic circuit with a fractional-order module. The experimental results show that the chaotic state of the system disappears as the fractional degree decreases.
JOURNAL OF CIRCUITS SYSTEMS AND COMPUTERS
(2023)
Article
Computer Science, Artificial Intelligence
Nabilah Abughazalah, Majid Khan, Naveed Yaqoob, Noor Munir, Iqtadar Hussain
Summary: This paper proposes a new algebraic structure, monogenic semigroup, to construct a digital information authentication scheme, addressing a crucial problem in multimedia security.
JOURNAL OF INTELLIGENT & FUZZY SYSTEMS
(2023)
Article
Engineering, Multidisciplinary
Xingrong Chen, Min Zou, Akif Akgul
Summary: In this study, a generalized system is proposed to investigate the hidden chaotic attractors and their generating mechanism in the Vijayakumar system. Hopf bifurcations are considered using the first and second Lyapunov coefficients, and the existence of periodic orbits is theoretically proven. The findings of this study provide valuable insights into the relationship between the global complex dynamical behaviors of chaotic systems and the local stability of equilibria.
MATHEMATICAL PROBLEMS IN ENGINEERING
(2022)
Article
Computer Science, Information Systems
Nazish Iqbal, Majid Khan, Khurram Khurshid, Iqtadar Hussain
Summary: In this research, a powerful image encryption system is proposed, which is constructed on deep convolutional neural networks and utilizes a creative method of DNA sequence operations and scrambling to encrypt digital images. The experimental results demonstrate that the suggested method is both secure and efficient.
MULTIMEDIA TOOLS AND APPLICATIONS
(2023)
Article
Optics
Omer Faruk Boyraz, Emre Guleryuz, Akif Akgul, Mustafa Zahid Yildiz, Harun Emre Kiran, Jawad Ahmad
Summary: Hand vein images are important for identification systems, especially dorsal hand vein images due to their reliability and contactless procedure. A new identification application is proposed in this article, using chaos-based security mechanism and improved SURF method, which selects vein segments as features and eliminates mismatching points to increase accuracy.
Article
Computer Science, Information Systems
Amna Zafar, Ammar S. Alanazi, Majid Khan, Iqtadar Hussain
Summary: A new encryption scheme is developed using congruential generators and Arneodos chaotic dynamical system. The scheme combines chaotic shuffling and substitution boxes to offer a robust image encryption technique that is difficult to cryptanalyze.
MULTIMEDIA TOOLS AND APPLICATIONS
(2023)
Article
Computer Science, Information Systems
Ammar S. Alanazi, Noor Munir, Majid Khan, Iqtadar Hussain
Summary: The concept of encryption has existed as long as confidential information has been exchanged. Cryptography is the art of transferring secret information securely between two or more parties. Nowadays, with information in digital form, cryptographic algorithms are necessary for secure data transmission. This study presents a new approach for encrypting audio signals using the Gensio-Tesi chaotic map. The suggested encryption algorithm generates substitution and permutation networks through the Gensio-Tesi chaotic system. Extensive audio analysis confirms the high security level of the proposed scheme.
MULTIMEDIA TOOLS AND APPLICATIONS
(2023)
Article
Physics, Multidisciplinary
Isidore Komofor Ngongiah, Ramakrishnan Balamurali, Gaetan Fautso Kuiate, Akif Akgul, Bonaventure Nana
Summary: The article investigates single and array of mechanical arms driven by Josephson junction (JJ) circuits and their applications in mimicking the locomotion of myriapods. The stability analysis of a single mechanical arm driven by a JJ circuit reveals two equilibrium points and a switch of their stability for specific values of the stimulation current. Numerical simulations confirm the proposed electromechanical system's ability to mimic the motion of myriapods and overcome the difficulties of coupling many JJ circuits or other neuron circuit models. The progressive excitation of the array of mechanical arms in the electromechanical system, as demonstrated by numerical simulations, resembles the straightforward motion of myriapods.
Article
Mathematics, Applied
Sridevi Sriram, Karthikeyan Rajagopal, Anitha Karthikeyan, Akif Akgul
Summary: The network connectivities are crucial for exhibiting diverse collective dynamics in complex systems. Hindmarsh-Rose neurons connected by electromagnetic interactions are used to demonstrate different dynamical states and transitions. Specifically, the dynamical behaviors of the system are explored under regular, small-world, and random network connectivities. The results show that increasing coupling intensity leads to a transition from desynchronization to traveling wave state for all considered network interactions. Furthermore, the investigation is extended to a three-layer multiplex network where synchronization is achieved in all layers with increasing coupling intensity, eventually reaching a rest state at high coupling strength.
APPLIED MATHEMATICS AND COMPUTATION
(2023)
Article
Computer Science, Information Systems
Nabilah Abughazalah, Mian Muhammad Akhtar Hayat, Majid Khan
Summary: This article investigates an intelligent mechanism for selecting a nonlinear confusion component and evaluates substitution boxes using the multi-criteria decision making technique. The study suggests an efficient mechanism for selecting the best nonlinear confusion component for SP-network based S-boxes.
MULTIMEDIA TOOLS AND APPLICATIONS
(2023)
Article
Computer Science, Information Systems
Nabilah Abughazalah, Mohsin Iqbal, Majid Khan, Iqtadar Hussain
Summary: This study evaluates and ranks the optimal substitution box (S-box) using the Pythagorean fuzzy set theory and the TOPSIS method for encryption applications. By assessing and ranking various characteristics of S-boxes, the most suitable S-box for encryption purposes is determined.
CMC-COMPUTERS MATERIALS & CONTINUA
(2023)