Design and DSP implementation of a fractional-order detuned laser hyperchaotic circuit with applications in image encryption
X Li, J Mou, S Banerjee, Z Wang, Y Cao - Chaos, Solitons & Fractals, 2022 - Elsevier
In this paper, a fractional-order hyperchaotic detuned laser system (FHDLS) is proposed,
and a novel image cryptosystem with high-security performance is designed by combining …
and a novel image cryptosystem with high-security performance is designed by combining …
A privacy image encryption algorithm based on piecewise coupled map lattice with multi dynamic coupling coefficient
X Wang, J Yang - Information Sciences, 2021 - Elsevier
This paper proposes a new tent-multi dynamic piecewise coupled mapping lattice
(TMDPCML). Through the comprehensive analysis of the performance test results …
(TMDPCML). Through the comprehensive analysis of the performance test results …
Quantum Walk Computing: Theory, Implementation, and Application
X Qiang, S Ma, H Song - Intelligent Computing, 2024 - spj.science.org
The classical random walk formalism plays an important role in a wide range of applications.
Its quantum counterpart, the quantum walk, is proposed as an important theoretical model …
Its quantum counterpart, the quantum walk, is proposed as an important theoretical model …
Artificial intelligence based quality of transmission predictive model for cognitive optical networks
Due to the advancements in 5 G technologies, high-definition, and the internet of things
(IoT), the capacity demand of optical networks has been exponentially increased. Optical …
(IoT), the capacity demand of optical networks has been exponentially increased. Optical …
Robust image encryption and zero-watermarking scheme using SCA and modified logistic map
In this work, we first present a modified version of the traditional logistic chaotic map. The
proposed version contains an additional parameter that is used to increase the security level …
proposed version contains an additional parameter that is used to increase the security level …
A hybrid NEQR image encryption cryptosystem using two-dimensional quantum walks and quantum coding
W Hao, T Zhang, X Chen, X Zhou - Signal Processing, 2023 - Elsevier
Quantum mechanisms can provide strong security in image processing against the
disadvantages of pseudorandom and periodic of traditional chaotic systems. Based on its …
disadvantages of pseudorandom and periodic of traditional chaotic systems. Based on its …
The effects of symmetry breaking on the dynamics of an inertial neural system with a non-monotonic activation function: Theoretical study, asymmetric multistability …
Multistability and symmetry breaking have been significantly investigated recently. In this
paper, we study the effects of symmetry breaking on the behavior of a particular class of …
paper, we study the effects of symmetry breaking on the behavior of a particular class of …
Cryptographic system based on double parameters fractal sorting vector and new spatiotemporal chaotic system
Y Xian, X Wang, L Teng, X Yan, Q Li, X Wang - Information Sciences, 2022 - Elsevier
Abstract Information security and image encryption have rapidly developed in recent years.
This study presents an iterative method for vectors with fractal characteristics. Based on the …
This study presents an iterative method for vectors with fractal characteristics. Based on the …
Efficient image encryption scheme using novel 1D multiparametric dynamical tent map and parallel computing
In order to ensure reliable and secure image exchange, chaotic systems are often
considered for their good performance in information security. In this work, we first propose …
considered for their good performance in information security. In this work, we first propose …
Image encryption algorithm based on plane-level image filtering and discrete logarithmic transform
W Feng, X Zhao, J Zhang, Z Qin, J Zhang, Y He - Mathematics, 2022 - mdpi.com
Image encryption is an effective way to protect image data. However, existing image
encryption algorithms are still unable to strike a good balance between security and …
encryption algorithms are still unable to strike a good balance between security and …