4.5 Article

Circuit implementation of 3D chaotic self-exciting single-disk homopolar dynamo and its application in digital image confidentiality

Journal

WIRELESS NETWORKS
Volume -, Issue -, Pages -

Publisher

SPRINGER
DOI: 10.1007/s11276-020-02361-9

Keywords

Disc dynamo; Chaotic attractor; Circuit application; Image confidentiality

Funding

  1. National Natural Science Foundation of China [11772306]
  2. High Level Innovation Team Program from Guangxi Higher Education Institutions of China [[2018] 35]
  3. Fundamental Research Funds for the central Universities, China University of Geosciences (Wuhan) [CUGGC05]
  4. Graduates Education Teaching Research and Reform Project of China University of Geosciences [YJS2018311]

Ask authors/readers for more resources

Confidentiality of secret information is one of the mandatory issue of digitally modernized era of science and technology. Due to availability of several online web applications and social media usages nowadays, information is transmitted with ease. The privacy of these digital information can be addressed by using different encryption mechanisms. We have proposed digital information privacy preserving scheme based on three-dimensional chaotic self-exciting single disk homopolar system. Moreover, we have designed a circuit implementations of three-dimensional chaotic self-exciting single disk homopolar dynamical system. The suggested encryption scheme is tested against different security performance analyses which clearly reflects the affectedness of our encryption scheme.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.5
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

Article Computer Science, Information Systems

Image encryption scheme for multi-focus images for visual sensors network

Majid Khan, Lalsaid Khan, Mohammad Mazyad Hazzazi, Sajjad Shaukat Jamal, Iqtadar Hussain

Summary: This article presents an image encryption structure for secure transmission of fused images obtained from multi-focus sensors. The proposed scheme undergoes various security analyses and proves its effectiveness against differential attacks. The real-time implementation time analysis shows that the algorithm is suitable for real-time applications.

MULTIMEDIA TOOLS AND APPLICATIONS (2022)

Article Optics

Differential cryptanalysis of diffusion and confusion based information confidentiality mechanism

Noor Munir, Majid Khan, Iqtadar Hussain, Muhammad Amin

Summary: Wireless multimedia communications have made significant progress in recent years, leading to an increasing demand for more secure media transmission to protect multimedia information. Image encryption systems based on chaotic maps are considered the most secure and trustworthy, due to the inherent properties in such types of multimedia contents. This research performed differential cryptanalysis on a cryptosystem based on a 3D logistic map and 3D Cat map, and successfully proposed a cryptanalysis attack by exploiting vulnerabilities in the studied cryptosystem.

OPTIK (2022)

Article Computer Science, Information Systems

A novel dual-layer security scheme based on 3-cell cellular neural network encryption and data hiding scheme for color images

Lal Said, Ammar S. Alanazi, Majid Khan

Summary: The security of digital information is a significant problem in the world today. This paper proposes a dual-layer information hiding mechanism using a 3-Cell Cellular Neural Network system to generate pseudorandom numbers for encryption and highly non-linear S-boxes for confusion. The proposed scheme is tested using various performance indicators and shows high efficiency and effectiveness.

MULTIMEDIA TOOLS AND APPLICATIONS (2023)

Article Computer Science, Artificial Intelligence

Construction of multivalued cryptographic boolean function using recurrent neural network and its application in image encryption scheme

Nabilah Abughazalah, Asim Latif, Muhammad Waseem Hafiz, Majid Khan, Ammar S. Alanazi, Iqtadar Hussain

Summary: The construction and development of nonlinear multivalued Boolean functions are crucial in modern cryptography. This paper presents an innovative system for constructing the confusion component of block ciphers using recurrent neural networks. Through evaluations of randomness and cryptanalysis measures, the effectiveness of this method in block ciphers and its superior cryptographic strength in image encryption are demonstrated.

ARTIFICIAL INTELLIGENCE REVIEW (2023)

Article Computer Science, Hardware & Architecture

Electronic Circuit Implementations of a Fractional-Order Chaotic System and Observing the Escape from Chaos

Akif Akgul, Yusuf Adiyaman, Abdullah Gokyildirim, Burak Aricioglu, Muhammed Ali Pala, Murat Erhan Cimen

Summary: This paper presents the dynamical analysis and fractional-order circuit implementation of the Rucklidge chaotic system. The component values required for the fractional-order system are calculated, and the feasibility of the attractor is examined using an electronic circuit with a fractional-order module. The experimental results show that the chaotic state of the system disappears as the fractional degree decreases.

JOURNAL OF CIRCUITS SYSTEMS AND COMPUTERS (2023)

Article Computer Science, Artificial Intelligence

A new authentication scheme based on monogenic semigroup

Nabilah Abughazalah, Majid Khan, Naveed Yaqoob, Noor Munir, Iqtadar Hussain

Summary: This paper proposes a new algebraic structure, monogenic semigroup, to construct a digital information authentication scheme, addressing a crucial problem in multimedia security.

JOURNAL OF INTELLIGENT & FUZZY SYSTEMS (2023)

Article Engineering, Multidisciplinary

Mechanism Analysis of Hidden Chaos in a Generalized Vijayakumar System

Xingrong Chen, Min Zou, Akif Akgul

Summary: In this study, a generalized system is proposed to investigate the hidden chaotic attractors and their generating mechanism in the Vijayakumar system. Hopf bifurcations are considered using the first and second Lyapunov coefficients, and the existence of periodic orbits is theoretically proven. The findings of this study provide valuable insights into the relationship between the global complex dynamical behaviors of chaotic systems and the local stability of equilibria.

MATHEMATICAL PROBLEMS IN ENGINEERING (2022)

Article Computer Science, Information Systems

An efficient hybrid encryption model based on deep convolutional neural networks, deoxyribonucleic acid computing and chaotic system

Nazish Iqbal, Majid Khan, Khurram Khurshid, Iqtadar Hussain

Summary: In this research, a powerful image encryption system is proposed, which is constructed on deep convolutional neural networks and utilizes a creative method of DNA sequence operations and scrambling to encrypt digital images. The experimental results demonstrate that the suggested method is both secure and efficient.

MULTIMEDIA TOOLS AND APPLICATIONS (2023)

Article Optics

A novel security and authentication method for infrared medical image with discrete time chaotic systems

Omer Faruk Boyraz, Emre Guleryuz, Akif Akgul, Mustafa Zahid Yildiz, Harun Emre Kiran, Jawad Ahmad

Summary: Hand vein images are important for identification systems, especially dorsal hand vein images due to their reliability and contactless procedure. A new identification application is proposed in this article, using chaos-based security mechanism and improved SURF method, which selects vein segments as features and eliminates mismatching points to increase accuracy.

OPTIK (2022)

Article Computer Science, Information Systems

New image confidentiality mechanism based on Arneodos chaotic dynamical system and quadratic congruential generator

Amna Zafar, Ammar S. Alanazi, Majid Khan, Iqtadar Hussain

Summary: A new encryption scheme is developed using congruential generators and Arneodos chaotic dynamical system. The scheme combines chaotic shuffling and substitution boxes to offer a robust image encryption technique that is difficult to cryptanalyze.

MULTIMEDIA TOOLS AND APPLICATIONS (2023)

Article Computer Science, Information Systems

A novel design of audio signals encryption with substitution permutation network based on the Genesio-Tesi chaotic system

Ammar S. Alanazi, Noor Munir, Majid Khan, Iqtadar Hussain

Summary: The concept of encryption has existed as long as confidential information has been exchanged. Cryptography is the art of transferring secret information securely between two or more parties. Nowadays, with information in digital form, cryptographic algorithms are necessary for secure data transmission. This study presents a new approach for encrypting audio signals using the Gensio-Tesi chaotic map. The suggested encryption algorithm generates substitution and permutation networks through the Gensio-Tesi chaotic system. Extensive audio analysis confirms the high security level of the proposed scheme.

MULTIMEDIA TOOLS AND APPLICATIONS (2023)

Article Physics, Multidisciplinary

Mechanical arm(s) driven by Josephson junction circuit(s), mimicking the movement pattern of myriapods

Isidore Komofor Ngongiah, Ramakrishnan Balamurali, Gaetan Fautso Kuiate, Akif Akgul, Bonaventure Nana

Summary: The article investigates single and array of mechanical arms driven by Josephson junction (JJ) circuits and their applications in mimicking the locomotion of myriapods. The stability analysis of a single mechanical arm driven by a JJ circuit reveals two equilibrium points and a switch of their stability for specific values of the stimulation current. Numerical simulations confirm the proposed electromechanical system's ability to mimic the motion of myriapods and overcome the difficulties of coupling many JJ circuits or other neuron circuit models. The progressive excitation of the array of mechanical arms in the electromechanical system, as demonstrated by numerical simulations, resembles the straightforward motion of myriapods.

PHYSICA SCRIPTA (2023)

Article Mathematics, Applied

Memristive field effect in a single and multilayer neural network with different connection topologies

Sridevi Sriram, Karthikeyan Rajagopal, Anitha Karthikeyan, Akif Akgul

Summary: The network connectivities are crucial for exhibiting diverse collective dynamics in complex systems. Hindmarsh-Rose neurons connected by electromagnetic interactions are used to demonstrate different dynamical states and transitions. Specifically, the dynamical behaviors of the system are explored under regular, small-world, and random network connectivities. The results show that increasing coupling intensity leads to a transition from desynchronization to traveling wave state for all considered network interactions. Furthermore, the investigation is extended to a three-layer multiplex network where synchronization is achieved in all layers with increasing coupling intensity, eventually reaching a rest state at high coupling strength.

APPLIED MATHEMATICS AND COMPUTATION (2023)

Article Computer Science, Information Systems

An intelligent selection of lightweight multivalued cryptographic boolean function based on Multi-criteria decision making

Nabilah Abughazalah, Mian Muhammad Akhtar Hayat, Majid Khan

Summary: This article investigates an intelligent mechanism for selecting a nonlinear confusion component and evaluates substitution boxes using the multi-criteria decision making technique. The study suggests an efficient mechanism for selecting the best nonlinear confusion component for SP-network based S-boxes.

MULTIMEDIA TOOLS AND APPLICATIONS (2023)

Article Computer Science, Information Systems

Novel Scheme for Robust Confusion Component Selection Based on Pythagorean Fuzzy Set

Nabilah Abughazalah, Mohsin Iqbal, Majid Khan, Iqtadar Hussain

Summary: This study evaluates and ranks the optimal substitution box (S-box) using the Pythagorean fuzzy set theory and the TOPSIS method for encryption applications. By assessing and ranking various characteristics of S-boxes, the most suitable S-box for encryption purposes is determined.

CMC-COMPUTERS MATERIALS & CONTINUA (2023)

No Data Available