Multiscroll hopfield neural network with extreme multistability and its application in video encryption for IIoT

F Yu, Y Lin, W Yao, S Cai, H Lin, Y Li - Neural Networks, 2025 - Elsevier
Abstract In Industrial Internet of Things (IIoT) production and operation processes, a
substantial amount of video data is generated, often containing sensitive personal and …

Cross-channel color image encryption through 2D hyperchaotic hybrid map of optimization test functions

F Toktas, U Erkan, Z Yetgin - Expert Systems with Applications, 2024 - Elsevier
The security of chaos-based Image Encryption (IE) algorithms inherently depends on the
permutation and diffusion strategy of the algorithm and the dynamic performance of chaotic …

Highly secure non-orthogonal multiple access based on key accompanying transmission in training sequence

Y Han, J Ren, B Liu, Y Li, R Ullah, Y Mao, X Wu… - Optics …, 2024 - opg.optica.org
This paper proposes a high-security chaotic encrypted power sparse coding division (CE-
PSCD) scheme for 7-core fiber based on non-orthogonal multiple access (NOMA) …

[HTML][HTML] Cryptanalyzing a bit-level image encryption algorithm based on chaotic maps

H Wen, Y Lin, Z Feng - … Science and Technology, an International Journal, 2024 - Elsevier
Recently, a bit-level image encryption algorithm based on chaotic maps (BCIEA) has been
presented. BCIEA consists of diffusion and confusion, and its security performance mainly …

Secure image encryption algorithm using chaos-based block permutation and weighted bit planes chain diffusion

H Wen, Y Lin, S Kang, X Zhang, K Zou - IScience, 2024 - cell.com
Aiming at the problem of insufficient security of image encryption technology, a secure
image encryption algorithm using chaos-based block permutation and weighted bit planes …

[HTML][HTML] Exploring the future application of UAVs: Face image privacy protection scheme based on chaos and DNA cryptography

H Wen, Z Xie, Z Wu, Y Lin, W Feng - … of King Saud University-Computer and …, 2024 - Elsevier
In the application and promotion of UAV in the future, remote sensing image information is
transmitted frequently, and its security issues will not be ignored. Aiming at the privacy …

Mosaic tracking: Lightweight batch video frame awareness multi-target encryption scheme based on a novel discrete tabu learning neuron and yolov5

J Mou, Z Zhang, N Zhou, Y Zhang… - IEEE Internet of Things …, 2024 - ieeexplore.ieee.org
With the popularity of surveillance devices, the security of surveillance video has attracted
much attention, and three key issues need to be solved. The videos cannot be synchronized …

Optimized color image encryption using arnold transform, URUK chaotic map and GWO algorithm

QK Abed, WAM Al-Jawher - Journal Port Science Research, 2024 - jport.co
The advancement of multimedia technologies and the rise of the internet have led to a
significant increase in information transmission, particularly digital images. These images …

A hybrid approach based on deep neural network and double exponential model for remaining useful life prediction

J Liang, H Liu, NC Xiao - Expert Systems with Applications, 2024 - Elsevier
To enhance RUL prediction accuracy and uncertainty quantification, numerous methods
have been developed, including model-based, data-driven, and hybrid approaches …

Comparative analysis of the chaotic behavior of a five-dimensional fractional hyperchaotic system with constant and variable order

AM Alqahtani, A Chaudhary, RS Dubey… - Fractal and Fractional, 2024 - mdpi.com
A five-dimensional hyperchaotic system is a dynamical system with five state variables that
exhibits chaotic behavior in multiple directions. In this work, we incorporated a 5D …