Objective In order to avoid the unauthorized access to private images and make a secure communication, an asymmetric image encryption algorithm based on SHA-3 and …
This paper presents a new chaotic system that has four attractors including two fixed point attractors and two symmetrical chaotic strange attractors. Dynamical properties of the …
This book presents essential principles, technical information, and expert insights on multimedia security technology. Illustrating the need for improved content security as the …
This work presents a new four-dimensional autonomous hyperchaotic system based on Méndez-Arellano-Cruz-Martínez (MACM) 3D chaotic system. Analytical and numerical …
Mechanical jerk systems have applications in several areas, such as oscillators, microcontrollers, circuits, memristors, encryption, etc. This research manuscript reports a …
R Balamurali, J Kengne, R Goune Chengui… - The European Physical …, 2022 - Springer
Due to its fundamental and technological relevance, the system formed by a van der Pol oscillator coupled to a Duffing oscillator is the subject of increasing research interest. In this …
In recent years, chaotic synchronization has received a lot of interest in applications in different fields, including in the design of private and secure communication systems. The …
In this work, the problem of master–slave outer synchronization in different inner–outer network topologies is presented. Specifically, the studied inner–outer network topologies are …
The Lorenz system has attracted increasing attention on the issue of its simplification in order to produce the simplest three-dimensional chaotic systems suitable for secure …