Ensuring information security in the quantum era is a growing challenge due to advancements in cryptographic attacks and the emergence of quantum computing.To address these concerns,this paper presents the mathematica...Ensuring information security in the quantum era is a growing challenge due to advancements in cryptographic attacks and the emergence of quantum computing.To address these concerns,this paper presents the mathematical and computer modeling of a novel two-dimensional(2D)chaotic system for secure key generation in quantum image encryption(QIE).The proposed map employs trigonometric perturbations in conjunction with rational-saturation functions and hence,named as Trigonometric-Rational-Saturation(TRS)map.Through rigorous mathematical analysis and computational simulations,the map is extensively evaluated for bifurcation behaviour,chaotic trajectories,and Lyapunov exponents.The security evaluation validates the map’s non-linearity,unpredictability,and sensitive dependence on initial conditions.In addition,the proposed TRS map has further been tested by integrating it in a QIE scheme.The QIE scheme first quantum-encodes the classic image using the Novel Enhanced Quantum Representation(NEQR)technique,the TRS map is used for the generation of secure diffusion key,which is XOR-ed with the quantum-ready image to obtain the encrypted images.The security evaluation of the QIE scheme demonstrates superior security of the encrypted images in terms of statistical security attacks and also against Differential attacks.The encrypted images exhibit zero correlation and maximum entropy with demonstrating strong resilience due to 99.62%and 33.47%results for Number of Pixels Change Rate(NPCR)and Unified Average Changing Intensity(UACI).The results validate the effectiveness of TRS-based quantum encryption scheme in securing digital images against emerging quantum threats,making it suitable for secure image encryption in IoT and edge-based applications.展开更多
With the rapid advancement in exploring perceptual interactions and digital twins,metaverse technology has emerged to transcend the constraints of space-time and reality,facilitating remote AI-based collaboration.In t...With the rapid advancement in exploring perceptual interactions and digital twins,metaverse technology has emerged to transcend the constraints of space-time and reality,facilitating remote AI-based collaboration.In this dynamic metasystem environment,frequent information exchanges necessitate robust security measures,with Authentication and Key Agreement(AKA)serving as the primary line of defense to ensure communication security.However,traditional AKA protocols fall short in meeting the low-latency requirements essential for synchronous interactions within the metaverse.To address this challenge and enable nearly latency-free interactions,a novel low-latency AKA protocol based on chaotic maps is proposed.This protocol not only ensures mutual authentication of entities within the metasystem but also generates secure session keys.The security of these session keys is rigorously validated through formal proofs,formal verification,and informal proofs.When confronted with the Dolev-Yao(DY)threat model,the session keys are formally demonstrated to be secure under the Real-or-Random(ROR)model.The proposed protocol is further validated through simulations conducted using VMware workstation compiled in HLPSL language and C language.The simulation results affirm the protocol’s effectiveness in resisting well-known attacks while achieving the desired low latency for optimal metaverse interactions.展开更多
Fractional discrete systems can enable the modeling and control of the complicated processes more adaptable through the concept of versatility by providing systemdynamics’descriptions withmore degrees of freedom.Nume...Fractional discrete systems can enable the modeling and control of the complicated processes more adaptable through the concept of versatility by providing systemdynamics’descriptions withmore degrees of freedom.Numerical approaches have become necessary and sufficient to be addressed and employed for benefiting from the adaptability of such systems for varied applications.A variety of fractional Layla and Majnun model(LMM)system kinds has been proposed in the current work where some of these systems’key behaviors are addressed.In addition,the necessary and sufficient conditions for the stability and asymptotic stability of the fractional dynamic systems are investigated,as a result of which,the necessary requirements of the LMM to achieve constant and asymptotically steady zero resolutions are provided.As a special case,when Layla and Majnun have equal feelings,we propose an analysis of the system in view of its equilibrium and fixed point sets.Considering that the system has marginal stability if its eigenvalues have both negative and zero real portions,it is demonstrated that the system neither converges nor diverges to a steady trajectory or equilibrium point.It,rather,continues to hover along the line separating stability and instability based on the fractional LMM system.展开更多
Ensuring the integrity and confidentiality of patient medical information is a critical priority in the healthcare sector.In the context of security,this paper proposes a novel encryption algorithm that integrates Blo...Ensuring the integrity and confidentiality of patient medical information is a critical priority in the healthcare sector.In the context of security,this paper proposes a novel encryption algorithm that integrates Blockchain technology,aiming to improve the security and privacy of transmitted data.The proposed encryption algorithm is a block-cipher image encryption scheme based on different chaotic maps:The logistic Map,the Tent Map,and the Henon Map used to generate three encryption keys.The proposed block-cipher system employs the Hilbert curve to perform permutation while a generated chaos-based S-Box is used to perform substitution.Furthermore,the integration of a Blockchain-based solution for securing data transmission and communication between nodes and authenticating the encrypted medical image’s authenticity adds a layer of security to our proposed method.Our proposed cryptosystem is divided into two principal modules presented as a pseudo-random number generator(PRNG)used for key generation and an encryption and decryption system based on the properties of confusion and diffusion.The security analysis and experimental tests for the proposed algorithm show that the average value of the information entropy of the encrypted images is 7.9993,the Number of Pixels Change Rate(NPCR)values are over 99.5%and the Unified Average Changing Intensity(UACI)values are greater than 33%.These results prove the strength of our proposed approach,demonstrating that it can significantly enhance the security of encrypted images.展开更多
This paper proposes a universal impulse-function-based method for extending discrete chaotic maps,enabling flexible construction of multicavity chaotic attractors.The proposed method achieves one-directional(1D)/two-d...This paper proposes a universal impulse-function-based method for extending discrete chaotic maps,enabling flexible construction of multicavity chaotic attractors.The proposed method achieves one-directional(1D)/two-directional(2D)extensions without introducing additional nonlinear terms or altering system stability.Theoretically,the cavity quantity in arbitrary directions is controlled by adjusting impulse levels N,while the amplitude regulation is implemented through modifications to the proportionality parameter r.Theoretical analyses,including Lyapunov exponents(LEs)and bifurcation diagrams,are conducted,confirming that the extended maps retain the intrinsic dynamics of five rational map classes.The field-programmable gate array(FPGA)implementation results are consistent with the numerical simulation results,verifying the correctness of the theoretical analysis.The method enables the expansion of unipolar attractors and enhances entropy metrics,offering a robust framework for applications in secure communication,encryption,and chaos-based technologies.展开更多
Chaotic cryptography has been applied to image encryption;however,only the traditional low-dimensional chaotic systems has been widely analyzed or deciphered,which does not show satisfied security and efficiency.To so...Chaotic cryptography has been applied to image encryption;however,only the traditional low-dimensional chaotic systems has been widely analyzed or deciphered,which does not show satisfied security and efficiency.To solve this problem,a new algorithm based on cross-chaos map has been created in this article.The image pixels are scrambled under control of high-dimensional chaotic sequence,which is generated by cross chaotic map.The image pixels are substituted by ciphertext feedback algorithm.It can relate encryption required parameters with plaintext and can make a plaintext byte affect more ciphertext bytes.Proved by theoretical analysis and experimental results,the algorithm has higher complex degree and has passed SP800-22 pseudo-random number standard tests,and it has high encryption speed,high security,etc.It can be widely applied in the field of image encryption.展开更多
We propose a new fractional two-dimensional triangle function combination discrete chaotic map(2D-TFCDM)with the discrete fractional difference.Moreover,the chaos behaviors of the proposed map are observed and the bif...We propose a new fractional two-dimensional triangle function combination discrete chaotic map(2D-TFCDM)with the discrete fractional difference.Moreover,the chaos behaviors of the proposed map are observed and the bifurcation diagrams,the largest Lyapunov exponent plot,and the phase portraits are derived,respectively.Finally,with the secret keys generated by Menezes-Vanstone elliptic curve cryptosystem,we apply the discrete fractional map into color image encryption.After that,the image encryption algorithm is analyzed in four aspects and the result indicates that the proposed algorithm is more superior than the other algorithms.展开更多
This paper proposed a novel fragile watermarking scheme based on singular value decomposition (SVD) and 2D chaotic mapping. It obtains chaotic initial values from the image blocks singular value decomposition and the ...This paper proposed a novel fragile watermarking scheme based on singular value decomposition (SVD) and 2D chaotic mapping. It obtains chaotic initial values from the image blocks singular value decomposition and the user’s key, then uses the chaotic mapping to get the chaotic sequence and inserts the sequence into the LSBs of the image blocks to get the watermarked image blocks. The paper reconstructed the watermarked image from all the embedded blocks. The analysis and experimental results show that the scheme is pretty fragile to tampering, and it can localize the tampering position accurately, reach 3×3 blocks.展开更多
Due to uncertain push-pull action across boundaries between different attractive domains by random excitations, attractors of a dynamical system will drift in the phase space, which readily leads to colliding and mixi...Due to uncertain push-pull action across boundaries between different attractive domains by random excitations, attractors of a dynamical system will drift in the phase space, which readily leads to colliding and mixing with each other, so it is very difficult to identify irregular signals evolving from arbitrary initial states. Here, periodic attractors from the simple cell mapping method are further iterated by a specific Poincare map in order to observe more elaborate structures and drifts as well as possible dynamical bifurcations. The panorama of a chaotic attractor can also be displayed to a great extent by this newly developed procedure. From the positions and the variations of attractors in the phase space, the action mechanism of bounded noise excitation is studied in detail. Several numerical examples are employed to illustrate the present procedure. It is seen that the dynamical identification and the bifurcation analysis can be effectively performed by this procedure.展开更多
A color image encryption method combining deoxyribonucleic(DNA)encoding and hyperchaotic mapping is proposed to solve the problems of simple structure,low complexit and low security of the existing encryption system f...A color image encryption method combining deoxyribonucleic(DNA)encoding and hyperchaotic mapping is proposed to solve the problems of simple structure,low complexit and low security of the existing encryption system for low-dimensional chaotic mapping encoding system and a single DNA encoding system.Firstly,according to the information of the plaintext images,the initial values of all chaotic maps and the random matrices with the same size as the plaintext images are iteratively generated.Then,the generated initial values and random matrices are divided into the sub-blocks with the same size.The DNA encoding mode of each sub-block and the DNA operation rules between the sub-blocks are determined by the dynamic hyperchaotic sequence.Finally,the diffusion operation is adopted to achieve a better encryption effect.The simulation results indicate that the proposed encryption algorithm can resist a variety of attacks due to its high complexity,strong security and large key space.展开更多
This research study aims to enhance the optimization performance of a newly emerged Aquila Optimization algorithm by incorporating chaotic sequences rather than using uniformly generated Gaussian random numbers.This w...This research study aims to enhance the optimization performance of a newly emerged Aquila Optimization algorithm by incorporating chaotic sequences rather than using uniformly generated Gaussian random numbers.This work employs 25 different chaotic maps under the framework of Aquila Optimizer.It considers the ten best chaotic variants for performance evaluation on multidimensional test functions composed of unimodal and multimodal problems,which have yet to be studied in past literature works.It was found that Ikeda chaotic map enhanced Aquila Optimization algorithm yields the best predictions and becomes the leading method in most of the cases.To test the effectivity of this chaotic variant on real-world optimization problems,it is employed on two constrained engineering design problems,and its effectiveness has been verified.Finally,phase equilibrium and semi-empirical parameter estimation problems have been solved by the proposed method,and respective solutions have been compared with those obtained from state-of-art optimizers.It is observed that CH01 can successfully cope with the restrictive nonlinearities and nonconvexities of parameter estimation and phase equilibrium problems,showing the capabilities of yielding minimum prediction error values of no more than 0.05 compared to the remaining algorithms utilized in the performance benchmarking process.展开更多
In this paper, a function projective synchronization scheme is developed to investigate the function projective synchronization between the discrete-time driven chaotic system and the discrete-time response chaotic sy...In this paper, a function projective synchronization scheme is developed to investigate the function projective synchronization between the discrete-time driven chaotic system and the discrete-time response chaotic system. With the aid of symbolic-numeric computation, we use the scheme to study the function projective synchronization between 2D Lorenz discrete-time system and Hdnon discrete-time system, as well as that between 3D discrete-time hyperchaotic system and Henon-like map via three scalar controllers, respectively. Moreover numerical simulations are used to verify the effectiveness of the proposed scheme.展开更多
A well known chaotic mapping in symbol space is a shift mapping.However,other chaotic mappings in symbol space exist too.The basic change is to consider the process not only at a set of times which are equally spaced,...A well known chaotic mapping in symbol space is a shift mapping.However,other chaotic mappings in symbol space exist too.The basic change is to consider the process not only at a set of times which are equally spaced,say at unit time apart(a shift mapping),but at a set of times which are not equally spaced,say if the unit time can not be fixed.The increasing mapping as a generalization of the shift mapping and the k-switch mapping are introduced.The increasing and k-switch mappings are chaotic.展开更多
This letter presents a new type of chaotic encryption system based on combined chaotic mapping pseudo-random number generator, Hash table, and elliptic curve. In this program, the elliptic curve algorithm is used for ...This letter presents a new type of chaotic encryption system based on combined chaotic mapping pseudo-random number generator, Hash table, and elliptic curve. In this program, the elliptic curve algorithm is used for the key distribution. After the linear transformation, the original chaotic sequence generated by drive system will be combined to chaotic mapping, converted to an encryption key sequence and constructed as Hash table for message authentication. The communication experiment used in the letter proves that the combination of combined chaotic encryption and conventional encryption is safe, feasible, and easy to implement by software.展开更多
Bit-plane decomposition makes images obtain a number of layers. According to the amount of data information, images are encrypted, and the paper proposes image encryption method with Chaotic Mapping based on multi-lay...Bit-plane decomposition makes images obtain a number of layers. According to the amount of data information, images are encrypted, and the paper proposes image encryption method with Chaotic Mapping based on multi-layer parameter disturbance. The advantage of multi-layer parameter disturbance is that it not only scrambles pixel location of images, but also changes pixel values of images. Bit-plane decomposition can increase the space of key. And using chaotic sequence generated by chaotic system with different complexities to encrypt layers with different information content can save operation time. The simulation experiments show that using chaotic mapping in image encryption method based on multi-layer parameter disturbance can cover plaintext effectively and safely, which makes it achieve ideal encryption effect.展开更多
Wireless Network security management is difficult because of the ever-increasing number of wireless network malfunctions,vulnerabilities,and assaults.Complex security systems,such as Intrusion Detection Systems(IDS),a...Wireless Network security management is difficult because of the ever-increasing number of wireless network malfunctions,vulnerabilities,and assaults.Complex security systems,such as Intrusion Detection Systems(IDS),are essential due to the limitations of simpler security measures,such as cryptography and firewalls.Due to their compact nature and low energy reserves,wireless networks present a significant challenge for security procedures.The features of small cells can cause threats to the network.Network Coding(NC)enabled small cells are vulnerable to various types of attacks.Avoiding attacks and performing secure“peer”to“peer”data transmission is a challenging task in small cells.Due to the low power and memory requirements of the proposed model,it is well suited to use with constrained small cells.An attacker cannot change the contents of data and generate a new Hashed Homomorphic Message Authentication Code(HHMAC)hash between transmissions since the HMAC function is generated using the shared secret.In this research,a chaotic sequence mapping based low overhead 1D Improved Logistic Map is used to secure“peer”to“peer”data transmission model using lightweight H-MAC(1D-LM-P2P-LHHMAC)is proposed with accurate intrusion detection.The proposed model is evaluated with the traditional models by considering various evaluation metrics like Vector Set Generation Accuracy Levels,Key Pair Generation Time Levels,Chaotic Map Accuracy Levels,Intrusion Detection Accuracy Levels,and the results represent that the proposed model performance in chaotic map accuracy level is 98%and intrusion detection is 98.2%.The proposed model is compared with the traditional models and the results represent that the proposed model secure data transmission levels are high.展开更多
To enable optimal navigation for unmanned surface vehicle(USV),we proposed an adaptive hybrid strategy-based sparrow search algorithm(SSA)for efficient and reliable path planning.The proposed method began by enhancing...To enable optimal navigation for unmanned surface vehicle(USV),we proposed an adaptive hybrid strategy-based sparrow search algorithm(SSA)for efficient and reliable path planning.The proposed method began by enhancing the fitness function to comprehensively account for critical path planning metrics,including path length,turning angle,and navigation safety.To improve search diversity and effectively avoid premature convergence to local optima,chaotic mapping was employed during the population initialization stage,allowing the algorithm to explore a wider solution space from the outset.A reverse inertia weight mechanism was introduced to dynamically balance exploration and exploitation across different iterations.The adaptive adjustment of the inertia weight further improved convergence efficiency and enhanced global optimization performance.In addition,a Cauchy-Gaussian hybrid update strategy was incorporated to inject randomness and variation into the search process,which helped the algorithm escape local minima and maintain a high level of solution diversity.This approach significantly enhanced the robustness and adaptability of the optimization process.Simulation experiments confirmed that the improved SSA consistently outperformed benchmark algorithms such as the original SSA,PSO,and WMR-SSA.Compared with the three algorithms,in the simulated sea area,the path lengths of the proposed algorithm are reduced by 21%,21%,and 16%,respectively,and under the actual sea simulation conditions,the path lengths are reduced by 13%,15%,and 11%,respectively.The results highlighted the effectiveness and practicality of the proposed method,providing an effective solution for intelligent and autonomous USV navigation in complex ocean environments.展开更多
Aiming to address the limitations of the standard Chimp Optimization Algorithm(ChOA),such as inadequate search ability and susceptibility to local optima in Unmanned Aerial Vehicle(UAV)path planning,this paper propose...Aiming to address the limitations of the standard Chimp Optimization Algorithm(ChOA),such as inadequate search ability and susceptibility to local optima in Unmanned Aerial Vehicle(UAV)path planning,this paper proposes a three-dimensional path planning method for UAVs based on the Improved Chimp Optimization Algorithm(IChOA).First,this paper models the terrain and obstacle environments spatially and formulates the total UAV flight cost function according to the constraints,transforming the path planning problem into an optimization problem with multiple constraints.Second,this paper enhances the diversity of the chimpanzee population by applying the Sine chaos mapping strategy and introduces a nonlinear convergence factor to improve the algorithm’s search accuracy and convergence speed.Finally,this paper proposes a dynamic adjustment strategy for the number of chimpanzee advance echelons,which effectively balances global exploration and local exploitation,significantly optimizing the algorithm’s search performance.To validate the effectiveness of the IChOA algorithm,this paper conducts experimental comparisons with eight different intelligent algorithms.The experimental results demonstrate that the IChOA outperforms the selected comparison algorithms in terms of practicality and robustness in UAV 3D path planning.It effectively solves the issues of efficiency in finding the shortest path and ensures high stability during execution.展开更多
Data compression plays a vital role in datamanagement and information theory by reducing redundancy.However,it lacks built-in security features such as secret keys or password-based access control,leaving sensitive da...Data compression plays a vital role in datamanagement and information theory by reducing redundancy.However,it lacks built-in security features such as secret keys or password-based access control,leaving sensitive data vulnerable to unauthorized access and misuse.With the exponential growth of digital data,robust security measures are essential.Data encryption,a widely used approach,ensures data confidentiality by making it unreadable and unalterable through secret key control.Despite their individual benefits,both require significant computational resources.Additionally,performing them separately for the same data increases complexity and processing time.Recognizing the need for integrated approaches that balance compression ratios and security levels,this research proposes an integrated data compression and encryption algorithm,named IDCE,for enhanced security and efficiency.Thealgorithmoperates on 128-bit block sizes and a 256-bit secret key length.It combines Huffman coding for compression and a Tent map for encryption.Additionally,an iterative Arnold cat map further enhances cryptographic confusion properties.Experimental analysis validates the effectiveness of the proposed algorithm,showcasing competitive performance in terms of compression ratio,security,and overall efficiency when compared to prior algorithms in the field.展开更多
Due to the intense data flow in expanding Internet of Things(IoT)applications,a heavy processing cost and workload on the fog-cloud side become inevitable.One of the most critical challenges is optimal task scheduling...Due to the intense data flow in expanding Internet of Things(IoT)applications,a heavy processing cost and workload on the fog-cloud side become inevitable.One of the most critical challenges is optimal task scheduling.Since this is an NP-hard problem type,a metaheuristic approach can be a good option.This study introduces a novel enhancement to the Artificial Rabbits Optimization(ARO)algorithm by integrating Chaotic maps and Levy flight strategies(CLARO).This dual approach addresses the limitations of standard ARO in terms of population diversity and convergence speed.It is designed for task scheduling in fog-cloud environments,optimizing energy consumption,makespan,and execution time simultaneously three critical parameters often treated individually in prior works.Unlike conventional single-objective methods,the proposed approach incorporates a multi-objective fitness function that dynamically adjusts the weight of each parameter,resulting in better resource allocation and load balancing.In analysis,a real-world dataset,the Open-source Google Cloud Jobs Dataset(GoCJ_Dataset),is used for performance measurement,and analyses are performed on three considered parameters.Comparisons are applied with well-known algorithms:GWO,SCSO,PSO,WOA,and ARO to indicate the reliability of the proposed method.In this regard,performance evaluation is performed by assigning these tasks to Virtual Machines(VMs)in the resource pool.Simulations are performed on 90 base cases and 30 scenarios for each evaluation parameter.The results indicated that the proposed algorithm achieved the best makespan performance in 80% of cases,ranked first in execution time in 61%of cases,and performed best in the final parameter in 69% of cases.In addition,according to the obtained results based on the defined fitness function,the proposed method(CLARO)is 2.52%better than ARO,3.95%better than SCSO,5.06%better than GWO,8.15%better than PSO,and 9.41%better than WOA.展开更多
基金funded by Deanship of Research and Graduate Studies at King Khalid University.The authors extend their appreciation to the Deanship of Research and Graduate Studies at King Khalid University for funding this work through Large Group Project under grant number(RGP.2/556/45).
文摘Ensuring information security in the quantum era is a growing challenge due to advancements in cryptographic attacks and the emergence of quantum computing.To address these concerns,this paper presents the mathematical and computer modeling of a novel two-dimensional(2D)chaotic system for secure key generation in quantum image encryption(QIE).The proposed map employs trigonometric perturbations in conjunction with rational-saturation functions and hence,named as Trigonometric-Rational-Saturation(TRS)map.Through rigorous mathematical analysis and computational simulations,the map is extensively evaluated for bifurcation behaviour,chaotic trajectories,and Lyapunov exponents.The security evaluation validates the map’s non-linearity,unpredictability,and sensitive dependence on initial conditions.In addition,the proposed TRS map has further been tested by integrating it in a QIE scheme.The QIE scheme first quantum-encodes the classic image using the Novel Enhanced Quantum Representation(NEQR)technique,the TRS map is used for the generation of secure diffusion key,which is XOR-ed with the quantum-ready image to obtain the encrypted images.The security evaluation of the QIE scheme demonstrates superior security of the encrypted images in terms of statistical security attacks and also against Differential attacks.The encrypted images exhibit zero correlation and maximum entropy with demonstrating strong resilience due to 99.62%and 33.47%results for Number of Pixels Change Rate(NPCR)and Unified Average Changing Intensity(UACI).The results validate the effectiveness of TRS-based quantum encryption scheme in securing digital images against emerging quantum threats,making it suitable for secure image encryption in IoT and edge-based applications.
基金This work has received funding from National Natural Science Foundation of China(No.42275157).
文摘With the rapid advancement in exploring perceptual interactions and digital twins,metaverse technology has emerged to transcend the constraints of space-time and reality,facilitating remote AI-based collaboration.In this dynamic metasystem environment,frequent information exchanges necessitate robust security measures,with Authentication and Key Agreement(AKA)serving as the primary line of defense to ensure communication security.However,traditional AKA protocols fall short in meeting the low-latency requirements essential for synchronous interactions within the metaverse.To address this challenge and enable nearly latency-free interactions,a novel low-latency AKA protocol based on chaotic maps is proposed.This protocol not only ensures mutual authentication of entities within the metasystem but also generates secure session keys.The security of these session keys is rigorously validated through formal proofs,formal verification,and informal proofs.When confronted with the Dolev-Yao(DY)threat model,the session keys are formally demonstrated to be secure under the Real-or-Random(ROR)model.The proposed protocol is further validated through simulations conducted using VMware workstation compiled in HLPSL language and C language.The simulation results affirm the protocol’s effectiveness in resisting well-known attacks while achieving the desired low latency for optimal metaverse interactions.
基金supported by Ajman University Internal Research Grant No.(DRGS Ref.2024-IRGHBS-3).
文摘Fractional discrete systems can enable the modeling and control of the complicated processes more adaptable through the concept of versatility by providing systemdynamics’descriptions withmore degrees of freedom.Numerical approaches have become necessary and sufficient to be addressed and employed for benefiting from the adaptability of such systems for varied applications.A variety of fractional Layla and Majnun model(LMM)system kinds has been proposed in the current work where some of these systems’key behaviors are addressed.In addition,the necessary and sufficient conditions for the stability and asymptotic stability of the fractional dynamic systems are investigated,as a result of which,the necessary requirements of the LMM to achieve constant and asymptotically steady zero resolutions are provided.As a special case,when Layla and Majnun have equal feelings,we propose an analysis of the system in view of its equilibrium and fixed point sets.Considering that the system has marginal stability if its eigenvalues have both negative and zero real portions,it is demonstrated that the system neither converges nor diverges to a steady trajectory or equilibrium point.It,rather,continues to hover along the line separating stability and instability based on the fractional LMM system.
基金supported by the Large Group Project under grant number(RGP2/473/46).
文摘Ensuring the integrity and confidentiality of patient medical information is a critical priority in the healthcare sector.In the context of security,this paper proposes a novel encryption algorithm that integrates Blockchain technology,aiming to improve the security and privacy of transmitted data.The proposed encryption algorithm is a block-cipher image encryption scheme based on different chaotic maps:The logistic Map,the Tent Map,and the Henon Map used to generate three encryption keys.The proposed block-cipher system employs the Hilbert curve to perform permutation while a generated chaos-based S-Box is used to perform substitution.Furthermore,the integration of a Blockchain-based solution for securing data transmission and communication between nodes and authenticating the encrypted medical image’s authenticity adds a layer of security to our proposed method.Our proposed cryptosystem is divided into two principal modules presented as a pseudo-random number generator(PRNG)used for key generation and an encryption and decryption system based on the properties of confusion and diffusion.The security analysis and experimental tests for the proposed algorithm show that the average value of the information entropy of the encrypted images is 7.9993,the Number of Pixels Change Rate(NPCR)values are over 99.5%and the Unified Average Changing Intensity(UACI)values are greater than 33%.These results prove the strength of our proposed approach,demonstrating that it can significantly enhance the security of encrypted images.
基金supported by the National Natural Science Foundation of China(Grant No.62001391)the Guangdong Basic and Applied Basic Research Foundation(Grant No.2024A1515010308)+1 种基金the Natural Science Basic Research Program of Shaanxi(Grant No.2024JC-YBQN-0464)the Scientific Research Program Funded by Education Department of Shaanxi Provincial Government(Grant No.24JK0559).
文摘This paper proposes a universal impulse-function-based method for extending discrete chaotic maps,enabling flexible construction of multicavity chaotic attractors.The proposed method achieves one-directional(1D)/two-directional(2D)extensions without introducing additional nonlinear terms or altering system stability.Theoretically,the cavity quantity in arbitrary directions is controlled by adjusting impulse levels N,while the amplitude regulation is implemented through modifications to the proportionality parameter r.Theoretical analyses,including Lyapunov exponents(LEs)and bifurcation diagrams,are conducted,confirming that the extended maps retain the intrinsic dynamics of five rational map classes.The field-programmable gate array(FPGA)implementation results are consistent with the numerical simulation results,verifying the correctness of the theoretical analysis.The method enables the expansion of unipolar attractors and enhances entropy metrics,offering a robust framework for applications in secure communication,encryption,and chaos-based technologies.
基金Supported by the National Natural Science Foundation of China (60973162)the Natural Science Foundation of Shandong Province of China (ZR2009GM037)+2 种基金the Science and Technology Project of Shandong Province,China (2010GGX10132,2012GGX10110)the Key Natural Science Foundation of Shan-dong Province of China (Z2006G01)the Soft Science Project of Shangdong Province of China (2012RKA10009)
文摘Chaotic cryptography has been applied to image encryption;however,only the traditional low-dimensional chaotic systems has been widely analyzed or deciphered,which does not show satisfied security and efficiency.To solve this problem,a new algorithm based on cross-chaos map has been created in this article.The image pixels are scrambled under control of high-dimensional chaotic sequence,which is generated by cross chaotic map.The image pixels are substituted by ciphertext feedback algorithm.It can relate encryption required parameters with plaintext and can make a plaintext byte affect more ciphertext bytes.Proved by theoretical analysis and experimental results,the algorithm has higher complex degree and has passed SP800-22 pseudo-random number standard tests,and it has high encryption speed,high security,etc.It can be widely applied in the field of image encryption.
基金Project supported by the National Natural Science Foundation of China(Grant Nos.61072147 and 11271008)
文摘We propose a new fractional two-dimensional triangle function combination discrete chaotic map(2D-TFCDM)with the discrete fractional difference.Moreover,the chaos behaviors of the proposed map are observed and the bifurcation diagrams,the largest Lyapunov exponent plot,and the phase portraits are derived,respectively.Finally,with the secret keys generated by Menezes-Vanstone elliptic curve cryptosystem,we apply the discrete fractional map into color image encryption.After that,the image encryption algorithm is analyzed in four aspects and the result indicates that the proposed algorithm is more superior than the other algorithms.
文摘This paper proposed a novel fragile watermarking scheme based on singular value decomposition (SVD) and 2D chaotic mapping. It obtains chaotic initial values from the image blocks singular value decomposition and the user’s key, then uses the chaotic mapping to get the chaotic sequence and inserts the sequence into the LSBs of the image blocks to get the watermarked image blocks. The paper reconstructed the watermarked image from all the embedded blocks. The analysis and experimental results show that the scheme is pretty fragile to tampering, and it can localize the tampering position accurately, reach 3×3 blocks.
基金supported by the National Natural Science Foundation of China (10672140,11072213)
文摘Due to uncertain push-pull action across boundaries between different attractive domains by random excitations, attractors of a dynamical system will drift in the phase space, which readily leads to colliding and mixing with each other, so it is very difficult to identify irregular signals evolving from arbitrary initial states. Here, periodic attractors from the simple cell mapping method are further iterated by a specific Poincare map in order to observe more elaborate structures and drifts as well as possible dynamical bifurcations. The panorama of a chaotic attractor can also be displayed to a great extent by this newly developed procedure. From the positions and the variations of attractors in the phase space, the action mechanism of bounded noise excitation is studied in detail. Several numerical examples are employed to illustrate the present procedure. It is seen that the dynamical identification and the bifurcation analysis can be effectively performed by this procedure.
基金Research and Practice Project of“Double Innovation”Education and Teaching Model of Mechatronics Engineering Specialty。
文摘A color image encryption method combining deoxyribonucleic(DNA)encoding and hyperchaotic mapping is proposed to solve the problems of simple structure,low complexit and low security of the existing encryption system for low-dimensional chaotic mapping encoding system and a single DNA encoding system.Firstly,according to the information of the plaintext images,the initial values of all chaotic maps and the random matrices with the same size as the plaintext images are iteratively generated.Then,the generated initial values and random matrices are divided into the sub-blocks with the same size.The DNA encoding mode of each sub-block and the DNA operation rules between the sub-blocks are determined by the dynamic hyperchaotic sequence.Finally,the diffusion operation is adopted to achieve a better encryption effect.The simulation results indicate that the proposed encryption algorithm can resist a variety of attacks due to its high complexity,strong security and large key space.
文摘This research study aims to enhance the optimization performance of a newly emerged Aquila Optimization algorithm by incorporating chaotic sequences rather than using uniformly generated Gaussian random numbers.This work employs 25 different chaotic maps under the framework of Aquila Optimizer.It considers the ten best chaotic variants for performance evaluation on multidimensional test functions composed of unimodal and multimodal problems,which have yet to be studied in past literature works.It was found that Ikeda chaotic map enhanced Aquila Optimization algorithm yields the best predictions and becomes the leading method in most of the cases.To test the effectivity of this chaotic variant on real-world optimization problems,it is employed on two constrained engineering design problems,and its effectiveness has been verified.Finally,phase equilibrium and semi-empirical parameter estimation problems have been solved by the proposed method,and respective solutions have been compared with those obtained from state-of-art optimizers.It is observed that CH01 can successfully cope with the restrictive nonlinearities and nonconvexities of parameter estimation and phase equilibrium problems,showing the capabilities of yielding minimum prediction error values of no more than 0.05 compared to the remaining algorithms utilized in the performance benchmarking process.
基金National Natural Science Foundation of China under Grant No.10735030Shanghai Leading Academic Discipline Project under Grant No.B412+3 种基金Natural Science Foundation of Zhejiang Province of China under Grant No.Y604056the Doctoral Foundation of Ningbo City under Grant No.2005A61030the Program for Changjiang Scholars and Innovative Research Team in Universities under Grant No.IRT0734K.C.Wong Magna Fund in Ningbo University
文摘In this paper, a function projective synchronization scheme is developed to investigate the function projective synchronization between the discrete-time driven chaotic system and the discrete-time response chaotic system. With the aid of symbolic-numeric computation, we use the scheme to study the function projective synchronization between 2D Lorenz discrete-time system and Hdnon discrete-time system, as well as that between 3D discrete-time hyperchaotic system and Henon-like map via three scalar controllers, respectively. Moreover numerical simulations are used to verify the effectiveness of the proposed scheme.
基金supported by Latvian Scientific(09.1220)ESF Project(2009/0223/1DP/1.1.1.2.0/09APIA/VIAA/008)
文摘A well known chaotic mapping in symbol space is a shift mapping.However,other chaotic mappings in symbol space exist too.The basic change is to consider the process not only at a set of times which are equally spaced,say at unit time apart(a shift mapping),but at a set of times which are not equally spaced,say if the unit time can not be fixed.The increasing mapping as a generalization of the shift mapping and the k-switch mapping are introduced.The increasing and k-switch mappings are chaotic.
文摘This letter presents a new type of chaotic encryption system based on combined chaotic mapping pseudo-random number generator, Hash table, and elliptic curve. In this program, the elliptic curve algorithm is used for the key distribution. After the linear transformation, the original chaotic sequence generated by drive system will be combined to chaotic mapping, converted to an encryption key sequence and constructed as Hash table for message authentication. The communication experiment used in the letter proves that the combination of combined chaotic encryption and conventional encryption is safe, feasible, and easy to implement by software.
文摘Bit-plane decomposition makes images obtain a number of layers. According to the amount of data information, images are encrypted, and the paper proposes image encryption method with Chaotic Mapping based on multi-layer parameter disturbance. The advantage of multi-layer parameter disturbance is that it not only scrambles pixel location of images, but also changes pixel values of images. Bit-plane decomposition can increase the space of key. And using chaotic sequence generated by chaotic system with different complexities to encrypt layers with different information content can save operation time. The simulation experiments show that using chaotic mapping in image encryption method based on multi-layer parameter disturbance can cover plaintext effectively and safely, which makes it achieve ideal encryption effect.
文摘Wireless Network security management is difficult because of the ever-increasing number of wireless network malfunctions,vulnerabilities,and assaults.Complex security systems,such as Intrusion Detection Systems(IDS),are essential due to the limitations of simpler security measures,such as cryptography and firewalls.Due to their compact nature and low energy reserves,wireless networks present a significant challenge for security procedures.The features of small cells can cause threats to the network.Network Coding(NC)enabled small cells are vulnerable to various types of attacks.Avoiding attacks and performing secure“peer”to“peer”data transmission is a challenging task in small cells.Due to the low power and memory requirements of the proposed model,it is well suited to use with constrained small cells.An attacker cannot change the contents of data and generate a new Hashed Homomorphic Message Authentication Code(HHMAC)hash between transmissions since the HMAC function is generated using the shared secret.In this research,a chaotic sequence mapping based low overhead 1D Improved Logistic Map is used to secure“peer”to“peer”data transmission model using lightweight H-MAC(1D-LM-P2P-LHHMAC)is proposed with accurate intrusion detection.The proposed model is evaluated with the traditional models by considering various evaluation metrics like Vector Set Generation Accuracy Levels,Key Pair Generation Time Levels,Chaotic Map Accuracy Levels,Intrusion Detection Accuracy Levels,and the results represent that the proposed model performance in chaotic map accuracy level is 98%and intrusion detection is 98.2%.The proposed model is compared with the traditional models and the results represent that the proposed model secure data transmission levels are high.
基金supported by Shandong Provincial Department of Science and Technology Project(No.2022C01246)National Undergraduate Innovation Training Project(Nos.202410390028,202310390026)+1 种基金Fujian Provincial Undergraduate Innovation Training Project(No.202410390093)Jimei University Innovation Training Project(Nos.2024xj224,2023xj179).
文摘To enable optimal navigation for unmanned surface vehicle(USV),we proposed an adaptive hybrid strategy-based sparrow search algorithm(SSA)for efficient and reliable path planning.The proposed method began by enhancing the fitness function to comprehensively account for critical path planning metrics,including path length,turning angle,and navigation safety.To improve search diversity and effectively avoid premature convergence to local optima,chaotic mapping was employed during the population initialization stage,allowing the algorithm to explore a wider solution space from the outset.A reverse inertia weight mechanism was introduced to dynamically balance exploration and exploitation across different iterations.The adaptive adjustment of the inertia weight further improved convergence efficiency and enhanced global optimization performance.In addition,a Cauchy-Gaussian hybrid update strategy was incorporated to inject randomness and variation into the search process,which helped the algorithm escape local minima and maintain a high level of solution diversity.This approach significantly enhanced the robustness and adaptability of the optimization process.Simulation experiments confirmed that the improved SSA consistently outperformed benchmark algorithms such as the original SSA,PSO,and WMR-SSA.Compared with the three algorithms,in the simulated sea area,the path lengths of the proposed algorithm are reduced by 21%,21%,and 16%,respectively,and under the actual sea simulation conditions,the path lengths are reduced by 13%,15%,and 11%,respectively.The results highlighted the effectiveness and practicality of the proposed method,providing an effective solution for intelligent and autonomous USV navigation in complex ocean environments.
基金supported by the Shaanxi Province Natural Science Basic Research Program Project(2024JC-YBMS-572)partially funded by Yan’an University Graduate Education Innovation Program Project(YCX2023032,YCX2023033,YCX2024094,YCX2024097)the“14th Five Year Plan Medium and Long Term Major Scientific Research Project”(2021ZCQ015)of Yan’an University.
文摘Aiming to address the limitations of the standard Chimp Optimization Algorithm(ChOA),such as inadequate search ability and susceptibility to local optima in Unmanned Aerial Vehicle(UAV)path planning,this paper proposes a three-dimensional path planning method for UAVs based on the Improved Chimp Optimization Algorithm(IChOA).First,this paper models the terrain and obstacle environments spatially and formulates the total UAV flight cost function according to the constraints,transforming the path planning problem into an optimization problem with multiple constraints.Second,this paper enhances the diversity of the chimpanzee population by applying the Sine chaos mapping strategy and introduces a nonlinear convergence factor to improve the algorithm’s search accuracy and convergence speed.Finally,this paper proposes a dynamic adjustment strategy for the number of chimpanzee advance echelons,which effectively balances global exploration and local exploitation,significantly optimizing the algorithm’s search performance.To validate the effectiveness of the IChOA algorithm,this paper conducts experimental comparisons with eight different intelligent algorithms.The experimental results demonstrate that the IChOA outperforms the selected comparison algorithms in terms of practicality and robustness in UAV 3D path planning.It effectively solves the issues of efficiency in finding the shortest path and ensures high stability during execution.
基金the Deanship of Graduate Studies and Scientific Research at Qassim University for financial support(QU-APC-2025).
文摘Data compression plays a vital role in datamanagement and information theory by reducing redundancy.However,it lacks built-in security features such as secret keys or password-based access control,leaving sensitive data vulnerable to unauthorized access and misuse.With the exponential growth of digital data,robust security measures are essential.Data encryption,a widely used approach,ensures data confidentiality by making it unreadable and unalterable through secret key control.Despite their individual benefits,both require significant computational resources.Additionally,performing them separately for the same data increases complexity and processing time.Recognizing the need for integrated approaches that balance compression ratios and security levels,this research proposes an integrated data compression and encryption algorithm,named IDCE,for enhanced security and efficiency.Thealgorithmoperates on 128-bit block sizes and a 256-bit secret key length.It combines Huffman coding for compression and a Tent map for encryption.Additionally,an iterative Arnold cat map further enhances cryptographic confusion properties.Experimental analysis validates the effectiveness of the proposed algorithm,showcasing competitive performance in terms of compression ratio,security,and overall efficiency when compared to prior algorithms in the field.
基金the Deanship of Postgraduate Studies and Scientific Research at Majmaah University for funding this research work through the project number(R-2025-1567).
文摘Due to the intense data flow in expanding Internet of Things(IoT)applications,a heavy processing cost and workload on the fog-cloud side become inevitable.One of the most critical challenges is optimal task scheduling.Since this is an NP-hard problem type,a metaheuristic approach can be a good option.This study introduces a novel enhancement to the Artificial Rabbits Optimization(ARO)algorithm by integrating Chaotic maps and Levy flight strategies(CLARO).This dual approach addresses the limitations of standard ARO in terms of population diversity and convergence speed.It is designed for task scheduling in fog-cloud environments,optimizing energy consumption,makespan,and execution time simultaneously three critical parameters often treated individually in prior works.Unlike conventional single-objective methods,the proposed approach incorporates a multi-objective fitness function that dynamically adjusts the weight of each parameter,resulting in better resource allocation and load balancing.In analysis,a real-world dataset,the Open-source Google Cloud Jobs Dataset(GoCJ_Dataset),is used for performance measurement,and analyses are performed on three considered parameters.Comparisons are applied with well-known algorithms:GWO,SCSO,PSO,WOA,and ARO to indicate the reliability of the proposed method.In this regard,performance evaluation is performed by assigning these tasks to Virtual Machines(VMs)in the resource pool.Simulations are performed on 90 base cases and 30 scenarios for each evaluation parameter.The results indicated that the proposed algorithm achieved the best makespan performance in 80% of cases,ranked first in execution time in 61%of cases,and performed best in the final parameter in 69% of cases.In addition,according to the obtained results based on the defined fitness function,the proposed method(CLARO)is 2.52%better than ARO,3.95%better than SCSO,5.06%better than GWO,8.15%better than PSO,and 9.41%better than WOA.