A new full chaos coupled mapping lattice and its application in privacy image encryption

X Wang, P Liu - IEEE Transactions on Circuits and Systems I …, 2021 - ieeexplore.ieee.org
Since chaotic cryptography has a long-term problem of dynamic degradation, this paper
presents proof that chaotic systems resist dynamic degradation through theoretical analysis …

Secure communication based on quantized synchronization of chaotic neural networks under an event-triggered strategy

W He, T Luo, Y Tang, W Du, YC Tian… - IEEE transactions on …, 2019 - ieeexplore.ieee.org
This article presents a secure communication scheme based on the quantized
synchronization of master-slave neural networks under an event-triggered strategy. First, a …

Finite-time synchronization of memristor chaotic systems and its application in image encryption

L Wang, T Dong, MF Ge - Applied Mathematics and Computation, 2019 - Elsevier
This paper investigates the finite-time synchronization of memristor chaotic systems (MCSs).
First, an emulator circuit of memristor is designed to implement the MCSs. Then, based on …

An efficient pixel-level chaotic image encryption algorithm

G Ye, C Pan, X Huang, Q Mei - Nonlinear Dynamics, 2018 - Springer
In this paper, a new and efficient pixel-level image encryption algorithm is presented. In
contrast to the traditional permutation–diffusion architecture, the proposed method enhances …

Image encryption for Offshore wind power based on 2D-LCLM and Zhou Yi Eight Trigrams

L Kou, J Wu, F Zhang, P Ji, W Ke… - … Journal of Bio …, 2023 - inderscienceonline.com
Offshore wind power is an important part of the new power system. Due to the complex and
changing situation in the oceans, its normal operation and maintenance cannot be done …

Fixed-time synchronization of coupled neural networks with discontinuous activation and mismatched parameters

N Li, X Wu, J Feng, Y Xu, J Lü - IEEE Transactions on Neural …, 2020 - ieeexplore.ieee.org
This article is concerned with fixed-time synchronization of the nonlinearly coupled neural
networks with discontinuous activation and mismatched parameters. First, a novel lemma is …

[图书][B] Special functions and analysis of differential equations

P Agarwal, RP Agarwal, M Ruzhansky - 2020 - books.google.com
Differential Equations are very important tools in Mathematical Analysis. They are widely
found in mathematics itself and in its applications to statistics, computing, electrical circuit …

An image encryption scheme based on finite-time cluster synchronization of two-layer complex dynamic networks

X Li, L Zhou, F Tan - Soft Computing, 2022 - Springer
In order to improve the security of image information in the information age, we propose an
image encryption scheme in this paper, which is achieved by using finite-time cluster …

A chaotic image encryption algorithm based on information entropy

G Ye, C Pan, X Huang, Z Zhao, J He - International Journal of …, 2018 - World Scientific
This paper proposes an image encryption algorithm based on a chaotic map and
information entropy. Unlike Fridrich's structure, the proposed method contains permutation …

Compressive-sensing-based structure identification for multilayer networks

G Mei, X Wu, Y Wang, M Hu, JA Lu… - IEEE transactions on …, 2017 - ieeexplore.ieee.org
The coexistence of multiple types of interactions within social, technological, and biological
networks has motivated the study of the multilayer nature of real-world networks. Meanwhile …