Exploiting one-dimensional exponential Chebyshev chaotic map and matching embedding for visually meaningful image encryption

G Long, X Chai, Z Gan, D Jiang, X He, M Sun - Chaos, Solitons & Fractals, 2023 - Elsevier
As a result of their prominent initial value sensitivity, pseudo-randomness, and
unpredictability nature, chaotic maps are widely used in multimedia security. However, the …

Fixed-time synchronization of Inertial Cohen-Grossberg Neural Networks with state dependent delayed impulse control and its application to multi-image encryption

P Kowsalya, SS Mohanrasu, A Kashkynbayev… - Chaos, Solitons & …, 2024 - Elsevier
In this paper, we discussed about fixed-time synchronization (FXTS) of Inertial Cohen-
Grossberg Neural Networks (ICGNNs) with state-dependent delayed impulses. The …

Image encryption algorithm based on improved iterative chaotic map with infinite collapses and Gray code

Q Wang, X Zhang, X Zhao - Physica Scripta, 2024 - iopscience.iop.org
The quick advancement of multimedia technology has led to the widespread utilization of
digital images across various industries. Meanwhile, image security has become an urgent …

Exploiting 2D-SDMCHM and matching embedding driven by flag-shaped hexagon prediction for visually meaningful medical image cryptosystem

X Chai, G Shang, B Wang, Z Gan, W Zhang - Chaos, Solitons & Fractals, 2024 - Elsevier
With the proliferation of advanced medical technologies and smart wearable devices, a
considerable volume of patient data and medical images is being generated and stored …

Multiple-Image Encryption Scheme Based on an N-Dimensional Chaotic Modular Model and Overlapping Block Permutation–Diffusion Using Newly Defined …

Z Zhou, X Xu, Z Jiang, K Sun - Mathematics, 2023 - mdpi.com
Some existing chaotic maps have the drawbacks of a narrow range of chaotic parameters
and discontinuities, which may be inherited by new chaotic systems generated from them as …

An image encryption scheme without additional key transmission based on an N-dimensional closed-loop coupled triangular wave model

S Tang, X Xu, Z Jiang, D Meng, K Sun - Chaos, Solitons & Fractals, 2024 - Elsevier
Currently, many image encryption schemes either require additional secure channels for key
transmission or employ a key that exhibits a lack of correlation with the plaintext, thereby …

Novel asymmetrical color image encryption using 2D sine-power coupling map

J Tang, M Lu, Z Zhang, X Huang, T Huang, J Wang - Nonlinear Dynamics, 2024 - Springer
Recently, many existing image encryption schemes suffer from security vulnerabilities due to
system key leakage. In response to this issue, this paper proposes a novel asymmetric …

Multiple remote sensing image encryption scheme based on saliency extraction and magic cube circular motion

C Cai, Y Wang, Y Cao, B Sun, J Mou - Applied Intelligence, 2024 - Springer
To improve the salient region security and transmission efficiency of remote sensing images,
a multiple remote sensing image (MRSIs) encryption scheme based on saliency extraction …

A visually meaningful secure image encryption algorithm based on conservative hyperchaotic system and optimized compressed sensing

X Tong, X Liu, T Pan, M Zhang, Z Wang - Multimedia Systems, 2024 - Springer
Aiming at the traditional schemes for encrypting and transmitting images can be subject to
arbitrary destruction by attackers, making it difficult for algorithms with poor robustness to …

Finite-Time Synchronization of Fractional-Order Nonlinear Systems with State-Dependent Delayed Impulse Control

P Gokul, SS Mohanrasu, A Kashkynbayev… - … Journal of Bifurcation …, 2024 - World Scientific
This paper delves into the topics of Finite-Time Stabilization (FTS) and Finite-Time
Contractive Stabilization (FTCS) for Fractional-Order Nonlinear Systems (FONSs). To …