Deep neural network(DNN)models have achieved remarkable performance across diverse tasks,leading to widespread commercial adoption.However,training high-accuracy models demands extensive data,substantial computational...Deep neural network(DNN)models have achieved remarkable performance across diverse tasks,leading to widespread commercial adoption.However,training high-accuracy models demands extensive data,substantial computational resources,and significant time investment,making them valuable assets vulnerable to unauthorized exploitation.To address this issue,this paper proposes an intellectual property(IP)protection framework for DNN models based on feature layer selection and hyper-chaotic mapping.Firstly,a sensitivity-based importance evaluation algorithm is used to identify the key feature layers for encryption,effectively protecting the core components of the model.Next,the L1 regularization criterion is applied to further select high-weight features that significantly impact the model’s performance,ensuring that the encryption process minimizes performance loss.Finally,a dual-layer encryption mechanism is designed,introducing perturbations into the weight values and utilizing hyperchaotic mapping to disrupt channel information,further enhancing the model’s security.Experimental results demonstrate that encrypting only a small subset of parameters effectively reduces model accuracy to random-guessing levels while ensuring full recoverability.The scheme exhibits strong robustness against model pruning and fine-tuning attacks and maintains consistent performance across multiple datasets,providing an efficient and practical solution for authorization-based DNN IP protection.展开更多
Since the method of discretizing memristors was proposed,discrete memristors(DMs)have become a very important topic in recent years.However,there has been little research on non-autonomous discrete memristors(NDMs)and...Since the method of discretizing memristors was proposed,discrete memristors(DMs)have become a very important topic in recent years.However,there has been little research on non-autonomous discrete memristors(NDMs)and their applications.Therefore,in this paper,a new NDM is constructed,and a non-autonomous hyperchaotic map is proposed by connecting this non-autonomous memristor in parallel with an autonomous memristor.This map exhibits complex dynamical behaviors,including infinitely many fixed points,initial-boosted attractors,initial-boosted bifurcations,and the size of the attractors being controlled by the initial value.In addition,a simple pseudo-random number generator(PRNG)was designed using the non-autonomous hyperchaotic map,and the pseudo-random numbers(PRNs)generated by it were tested using the National Institute of Standards and Technology(NIST)SP800-22 test suite.Finally,the non-autonomous hyperchaotic map is implemented on the STM32 hardware experimental platform.展开更多
Existing chaotic encryption schemes primarily focus on single types of images,making the design of hybrid image encryption schemes more suitable for practical applications.In this paper,a hyperchaotic map with a spher...Existing chaotic encryption schemes primarily focus on single types of images,making the design of hybrid image encryption schemes more suitable for practical applications.In this paper,a hyperchaotic map with a spherical attractor is proposed,which is constructed using spherical coordinates.Dynamical analyses reveal that the hyperchaotic map exhibits global hyperchaos and high complexity,making it capable of generating more complex chaotic sequences suitable for image encryption.A hybrid encryption scheme based on a hyperchaotic map is proposed for two-dimensional(2D)images,three-dimensional(3D)models,and 3D point clouds.Firstly,the pixels of 2D image and the coordinate data of 3D image are fused into a plaintext cube,which is combined with Hash-512 to obtain the initial value of the hyperchaotic map.Chaotic sequences are utilized for cube space internal confusion and dynamic cross-diffusion.The encrypted images demonstrate high information entropy,and the test results show that the encryption scheme effectively protects the images.The proposed hybrid image encryption scheme provides an efficient solution for securing various types of images.展开更多
We devise a color image encryption scheme via combining hyperchaotic map,cross-plane operation and gene theory.First,the hyperchaotic map used in the encryption scheme is analyzed and studied.On the basis of the dynam...We devise a color image encryption scheme via combining hyperchaotic map,cross-plane operation and gene theory.First,the hyperchaotic map used in the encryption scheme is analyzed and studied.On the basis of the dynamics of hyperchaotic map,a color image encryption scheme is designed.At the end of the encryption process,a DNA mutation operation is used to increase the encoding images’randomness and to improve the encryption algorithm’s security.Finally,simulation experiments,performance analysis,and attack tests are performed to prove the effectiveness and security of the designed algorithm.This work provides the possibility of applying chaos theory and gene theory in image encryption.展开更多
Being as unique nonlinear components of block ciphers,substitution boxes(S-boxes) directly affect the security of the cryptographic systems.It is important and difficult to design cryptographically strong S-boxes th...Being as unique nonlinear components of block ciphers,substitution boxes(S-boxes) directly affect the security of the cryptographic systems.It is important and difficult to design cryptographically strong S-boxes that simultaneously meet with multiple cryptographic criteria such as bijection,non-linearity,strict avalanche criterion(SAC),bits independence criterion(BIC),differential probability(DP) and linear probability(LP).To deal with this problem,a chaotic S-box based on the artificial bee colony algorithm(CSABC) is designed.It uses the S-boxes generated by the six-dimensional compound hyperchaotic map as the initial individuals and employs ABC to improve their performance.In addition,it considers the nonlinearity and differential uniformity as the fitness functions.A series of experiments have been conducted to compare multiple cryptographic criteria of this algorithm with other algorithms.Simulation results show that the new algorithm has cryptographically strong S-box while meeting multiple cryptographic criteria.展开更多
Discrete memristor has become a hotspot since it was proposed recently.However,the design of chaotic maps based on discrete memristor is in its early research stage.In this paper,a memristive seed chaotic map is propo...Discrete memristor has become a hotspot since it was proposed recently.However,the design of chaotic maps based on discrete memristor is in its early research stage.In this paper,a memristive seed chaotic map is proposed by combining a quadratic discrete memristor with the sine function.Furthermore,by applying the chaotification method,we obtain a high-dimensional chaotic map.Numerical analysis shows that it can generate hyperchaos.With the increase of cascade times,the generated map has more positive Lyapunov exponents and larger hyperchaotic range.The National Institute of Standards and Technology(NIST)test results show that the chaotic pseudo-random sequence generated by cascading two seed maps has good unpredictability,and it indicates the potential in practical application.展开更多
Chaos-based cryptosystems are considered a secure mode of communication due to their reliability.Chaotic maps are associated with the other domains to construct robust encryption algorithms.There exist numerous encryp...Chaos-based cryptosystems are considered a secure mode of communication due to their reliability.Chaotic maps are associated with the other domains to construct robust encryption algorithms.There exist numerous encryption schemes in the literature based on chaotic maps.This work aims to propose an attack on a recently proposed hyper-chaotic map-based cryptosystem.The core notion of the original algorithm was based on permutation and diffusion.A bitlevel permutation approach was used to do the permutation row-and column-wise.The diffusion was executed in the forward and backward directions.The statistical strength of the cryptosystem has been demonstrated by extensive testing conducted by the author of the cryptosystem.This cryptanalysis article investigates the robustness of this cryptosystem against a chosen-plaintext attack.The secret keys of the cryptosystem were retrieved by the proposed attack with 258 chosen-plain images.The results in this manuscript suggest that,in addition to standard statistical evaluations,thorough cryptanalysis of each newly suggested cryptosystem is necessary before it can be used in practical application.Moreover,the data retrieved is also passed through some statistical analysis to compare the quality of the original and retrieved data.The results of the performance analysis indicate the exact recovery of the original data.To make the cryptosystem useful for applications requiring secure data exchange,a few further improvement recommendations are also suggested.展开更多
The two-dimensional Logistic memristive hyperchaotic map(2D-LMHM)and the secure hash SHA-512 are the foundations of the unique remote sensing image encryption algorithm(RS-IEA)suggested in this research.The proposed m...The two-dimensional Logistic memristive hyperchaotic map(2D-LMHM)and the secure hash SHA-512 are the foundations of the unique remote sensing image encryption algorithm(RS-IEA)suggested in this research.The proposed map is formed from the improved Logistic map and the memristor,which has wide phase space and hyperchaotic range and is exceptionally excellent to be utilized in specific applications.The proposed image algorithm uses the permutation-assignment-diffusion structure.Permutation generates two position matrices in a progressive manner to achieve an efficient random exchange of pixel positions,assignment is carried through on the image pixels of the permutated image to entirely remove the original image information,strengthening the relationship between permutation and diffusion,and loop diffusion in two different directions can use subtle changes of pixels to affect the whole plane.The random key and plain-image SHA-512 hash values are used to produce an additional key,which is then utilized to figure out the permutation parameters and the initial value of a chaotic map.The experimental results with the average NPCR=99.6094%(NPCR:number of pixels change rate),average UACI=33.4638%(UACI:unified average changing intensity),100%pass rate of the targets in the test set,the average correlation coefficient is 0.00075,and the local information entropy is 7.9025,which shows that the algorithm is able to defend against a variety of illegal attacks and provide more trustworthy protection than some of the existing state-of-the-art algorithms.展开更多
In this paper,we propose a novel secure image communication system that integrates quantum key distribution and hyperchaotic encryption techniques to ensure enhanced security for both key distribution and plaintext en...In this paper,we propose a novel secure image communication system that integrates quantum key distribution and hyperchaotic encryption techniques to ensure enhanced security for both key distribution and plaintext encryption.Specifically,we leverage the B92 Quantum Key Distribution(QKD)protocol to secure the distribution of encryption keys,which are further processed through Galois Field(GF(28))operations for increased security.The encrypted plaintext is secured using a newly developed Hyper 3D Logistic Map(H3LM),a chaotic system that generates complex and unpredictable sequences,thereby ensuring strong confusion and diffusion in the encryption process.This hybrid approach offers a robust defense against quantum and classical cryptographic attacks,combining the advantages of quantum-level key distribution with the unpredictability of hyperchaos-based encryption.The proposed method demonstrates high sensitivity to key changes and resilience to noise,compression,and cropping attacks,ensuring both secure key transmission and robust image encryption.展开更多
With the development of the Internet,image encryption technology has become critical for network security.Traditional methods often suffer from issues such as insufficient chaos,low randomness in key generation,and po...With the development of the Internet,image encryption technology has become critical for network security.Traditional methods often suffer from issues such as insufficient chaos,low randomness in key generation,and poor encryption efficiency.To enhance performance,this paper proposes a new encryption algorithm designed to optimize parallel processing and adapt to images of varying sizes and colors.The method begins by using SHA-384 to extract the hash value of the plaintext image,which is then processed to determine the chaotic system’s initial value and block size.The image is padded and divided into blocks for further processing.A novel two-dimensional infinite collapses hyperchaotic map(2DICHM)is employed to generate the intra-block scrambling sequence,while an improved variable Joseph traversal sequence is used for inter-block scrambling.After removing the padding,3D forward and backward shift diffusions,controlled by the 2D-ICHM sequences,are applied to the scrambled image,producing the ciphertext.Simulation results demonstrate that the proposed algorithm outperforms others in terms of entropy,anti-noise resilience,correlation coefficient,robustness,and encryption efficiency.展开更多
The Control of a hyperchaotic discrete system is investigated, A time-varying feedback control law is established on the base of local linearization. The Liapunov direct method is applied to estimate the neighborhood ...The Control of a hyperchaotic discrete system is investigated, A time-varying feedback control law is established on the base of local linearization. The Liapunov direct method is applied to estimate the neighborhood in which the control law can be effectively used. Numerical examples are presented to demonstrate the applications of the control law to solve the problem of stabilizing unstable periodic orbits and the problem of tracking an arbitrarily given periodic orbit.展开更多
This study introduces an effective framework for image encryption,leveraging the principles of chaos theory through the use of cellular automata neighborhood(CAN)and a novel two-dimensional hyperchaotic map(2D-SGHM)de...This study introduces an effective framework for image encryption,leveraging the principles of chaos theory through the use of cellular automata neighborhood(CAN)and a novel two-dimensional hyperchaotic map(2D-SGHM)derived from the classic sine and Gauss maps.The core of our investigation delved into the basic performance and dynamical behaviors of this map.The findings reveal a wide hyperchaotic range characterized by large positive Lyapunov exponents,establishing map superiority in image encryption.By integrating different cellular automata neighborhoods,we can generate diverse image encryption schemes.Specifically,this study highlights three distinct image encryption algorithms constructed from one-dimensional,von Neumann and Moore neighborhoods,named OIEA,NIEA,and MIEA.Each scheme is uniquely designed to harness the benefits of CAN for encryption,thereby enhancing the overall effectiveness and security level of the image encryption process.In the experiment,the number of pixels change rates for OIEA,NIEA,and MIEA are 99.6097%,99.6092%,and 99.6098%,and the unified average changing intensities are 33.4603%,33.4626%,and 33.4628%,respectively.The correlation coefficients of the neighboring pixels are notably low,recorded at 0.00065,0.00064,and 0.00031 for each scheme,while the information entropies are nearly identical,with scores of 7.9977,7.9975,and 7.9976,showing that our encryption schemes have high security performance and can provide reliable security for different types of data information.展开更多
基金supported in part by the National Natural Science Foundation of China under Grant No.62172280in part by the Key Scientific Research Projects of Colleges and Universities in Henan Province,China under Grant No.23A520006in part by Henan Provincial Science and Technology Research Project under Grant No.222102210199.
文摘Deep neural network(DNN)models have achieved remarkable performance across diverse tasks,leading to widespread commercial adoption.However,training high-accuracy models demands extensive data,substantial computational resources,and significant time investment,making them valuable assets vulnerable to unauthorized exploitation.To address this issue,this paper proposes an intellectual property(IP)protection framework for DNN models based on feature layer selection and hyper-chaotic mapping.Firstly,a sensitivity-based importance evaluation algorithm is used to identify the key feature layers for encryption,effectively protecting the core components of the model.Next,the L1 regularization criterion is applied to further select high-weight features that significantly impact the model’s performance,ensuring that the encryption process minimizes performance loss.Finally,a dual-layer encryption mechanism is designed,introducing perturbations into the weight values and utilizing hyperchaotic mapping to disrupt channel information,further enhancing the model’s security.Experimental results demonstrate that encrypting only a small subset of parameters effectively reduces model accuracy to random-guessing levels while ensuring full recoverability.The scheme exhibits strong robustness against model pruning and fine-tuning attacks and maintains consistent performance across multiple datasets,providing an efficient and practical solution for authorization-based DNN IP protection.
基金supported by the National Natural Science Foundation of China(Grant No.62071411).
文摘Since the method of discretizing memristors was proposed,discrete memristors(DMs)have become a very important topic in recent years.However,there has been little research on non-autonomous discrete memristors(NDMs)and their applications.Therefore,in this paper,a new NDM is constructed,and a non-autonomous hyperchaotic map is proposed by connecting this non-autonomous memristor in parallel with an autonomous memristor.This map exhibits complex dynamical behaviors,including infinitely many fixed points,initial-boosted attractors,initial-boosted bifurcations,and the size of the attractors being controlled by the initial value.In addition,a simple pseudo-random number generator(PRNG)was designed using the non-autonomous hyperchaotic map,and the pseudo-random numbers(PRNs)generated by it were tested using the National Institute of Standards and Technology(NIST)SP800-22 test suite.Finally,the non-autonomous hyperchaotic map is implemented on the STM32 hardware experimental platform.
基金Project supported by the Basic Scientific Research Projects of Department of Education of Liaoning Province,China(Grant No.LJ212410152049)the Technological Innovation Projects in the field of artificial intelligence of Liaoning Province,China(Grant No.2023JH26/10300011)。
文摘Existing chaotic encryption schemes primarily focus on single types of images,making the design of hybrid image encryption schemes more suitable for practical applications.In this paper,a hyperchaotic map with a spherical attractor is proposed,which is constructed using spherical coordinates.Dynamical analyses reveal that the hyperchaotic map exhibits global hyperchaos and high complexity,making it capable of generating more complex chaotic sequences suitable for image encryption.A hybrid encryption scheme based on a hyperchaotic map is proposed for two-dimensional(2D)images,three-dimensional(3D)models,and 3D point clouds.Firstly,the pixels of 2D image and the coordinate data of 3D image are fused into a plaintext cube,which is combined with Hash-512 to obtain the initial value of the hyperchaotic map.Chaotic sequences are utilized for cube space internal confusion and dynamic cross-diffusion.The encrypted images demonstrate high information entropy,and the test results show that the encryption scheme effectively protects the images.The proposed hybrid image encryption scheme provides an efficient solution for securing various types of images.
基金the National Natural Science Foundation of China(Grant No.62061014)the Provincial Natural Science Foundation of Liaoning(Grant No.2020-MS-274)the Basic Scientific Research Projects of Colleges and Universities of Liaoning Province,China(Grant No.LJKZ0545).
文摘We devise a color image encryption scheme via combining hyperchaotic map,cross-plane operation and gene theory.First,the hyperchaotic map used in the encryption scheme is analyzed and studied.On the basis of the dynamics of hyperchaotic map,a color image encryption scheme is designed.At the end of the encryption process,a DNA mutation operation is used to increase the encoding images’randomness and to improve the encryption algorithm’s security.Finally,simulation experiments,performance analysis,and attack tests are performed to prove the effectiveness and security of the designed algorithm.This work provides the possibility of applying chaos theory and gene theory in image encryption.
基金supported by the National Natural Science Foundation of China(6060309260975042)
文摘Being as unique nonlinear components of block ciphers,substitution boxes(S-boxes) directly affect the security of the cryptographic systems.It is important and difficult to design cryptographically strong S-boxes that simultaneously meet with multiple cryptographic criteria such as bijection,non-linearity,strict avalanche criterion(SAC),bits independence criterion(BIC),differential probability(DP) and linear probability(LP).To deal with this problem,a chaotic S-box based on the artificial bee colony algorithm(CSABC) is designed.It uses the S-boxes generated by the six-dimensional compound hyperchaotic map as the initial individuals and employs ABC to improve their performance.In addition,it considers the nonlinearity and differential uniformity as the fitness functions.A series of experiments have been conducted to compare multiple cryptographic criteria of this algorithm with other algorithms.Simulation results show that the new algorithm has cryptographically strong S-box while meeting multiple cryptographic criteria.
基金Project supported by the National Natural Science Foundation of China(Grant Nos.61901530,62071496,and 62061008)
文摘Discrete memristor has become a hotspot since it was proposed recently.However,the design of chaotic maps based on discrete memristor is in its early research stage.In this paper,a memristive seed chaotic map is proposed by combining a quadratic discrete memristor with the sine function.Furthermore,by applying the chaotification method,we obtain a high-dimensional chaotic map.Numerical analysis shows that it can generate hyperchaos.With the increase of cascade times,the generated map has more positive Lyapunov exponents and larger hyperchaotic range.The National Institute of Standards and Technology(NIST)test results show that the chaotic pseudo-random sequence generated by cascading two seed maps has good unpredictability,and it indicates the potential in practical application.
基金The authors are thankful to the Deanship of Scientific Research at Najran University for funding this work under the Research Groups Funding program grant code(NU/RG/SERC/11/4).
文摘Chaos-based cryptosystems are considered a secure mode of communication due to their reliability.Chaotic maps are associated with the other domains to construct robust encryption algorithms.There exist numerous encryption schemes in the literature based on chaotic maps.This work aims to propose an attack on a recently proposed hyper-chaotic map-based cryptosystem.The core notion of the original algorithm was based on permutation and diffusion.A bitlevel permutation approach was used to do the permutation row-and column-wise.The diffusion was executed in the forward and backward directions.The statistical strength of the cryptosystem has been demonstrated by extensive testing conducted by the author of the cryptosystem.This cryptanalysis article investigates the robustness of this cryptosystem against a chosen-plaintext attack.The secret keys of the cryptosystem were retrieved by the proposed attack with 258 chosen-plain images.The results in this manuscript suggest that,in addition to standard statistical evaluations,thorough cryptanalysis of each newly suggested cryptosystem is necessary before it can be used in practical application.Moreover,the data retrieved is also passed through some statistical analysis to compare the quality of the original and retrieved data.The results of the performance analysis indicate the exact recovery of the original data.To make the cryptosystem useful for applications requiring secure data exchange,a few further improvement recommendations are also suggested.
基金supported by the National Natural Science Foundation of China(Grant Nos.62366014 and 61961019)Jiangxi Provincial Natural Science Foundation(Grant No.20232BAB202008)。
文摘The two-dimensional Logistic memristive hyperchaotic map(2D-LMHM)and the secure hash SHA-512 are the foundations of the unique remote sensing image encryption algorithm(RS-IEA)suggested in this research.The proposed map is formed from the improved Logistic map and the memristor,which has wide phase space and hyperchaotic range and is exceptionally excellent to be utilized in specific applications.The proposed image algorithm uses the permutation-assignment-diffusion structure.Permutation generates two position matrices in a progressive manner to achieve an efficient random exchange of pixel positions,assignment is carried through on the image pixels of the permutated image to entirely remove the original image information,strengthening the relationship between permutation and diffusion,and loop diffusion in two different directions can use subtle changes of pixels to affect the whole plane.The random key and plain-image SHA-512 hash values are used to produce an additional key,which is then utilized to figure out the permutation parameters and the initial value of a chaotic map.The experimental results with the average NPCR=99.6094%(NPCR:number of pixels change rate),average UACI=33.4638%(UACI:unified average changing intensity),100%pass rate of the targets in the test set,the average correlation coefficient is 0.00075,and the local information entropy is 7.9025,which shows that the algorithm is able to defend against a variety of illegal attacks and provide more trustworthy protection than some of the existing state-of-the-art algorithms.
文摘In this paper,we propose a novel secure image communication system that integrates quantum key distribution and hyperchaotic encryption techniques to ensure enhanced security for both key distribution and plaintext encryption.Specifically,we leverage the B92 Quantum Key Distribution(QKD)protocol to secure the distribution of encryption keys,which are further processed through Galois Field(GF(28))operations for increased security.The encrypted plaintext is secured using a newly developed Hyper 3D Logistic Map(H3LM),a chaotic system that generates complex and unpredictable sequences,thereby ensuring strong confusion and diffusion in the encryption process.This hybrid approach offers a robust defense against quantum and classical cryptographic attacks,combining the advantages of quantum-level key distribution with the unpredictability of hyperchaos-based encryption.The proposed method demonstrates high sensitivity to key changes and resilience to noise,compression,and cropping attacks,ensuring both secure key transmission and robust image encryption.
基金Project supported by the National Natural Science Foundation of China(Grant Nos.62105004 and 52174141)the College Student Innovation and Entrepreneurship Fund Project(Grant No.202210361053)+4 种基金Anhui Mining Machinery and Electrical Equipment Coordination Innovation Center,Anhui University of Science&Technology(Grant No.KSJD202304)the Anhui Province Digital Agricultural Engineering Technology Research Center Open Project(Grant No.AHSZNYGC-ZXKF021)the Talent Recruitment Special Fund of Anhui University of Science and Technology(Grant No.2024yjrc175)the Graduate Innovation Fund Project of Anhui University of Science and Technology(Grant Nos.2024cx2067,2024cx2107,and 2024cx2064)Seed Support Project for Postgraduate Innovation,Entrepreneurship and Practice at Anhui University of Science and Technology(Grant No.2024cxcysj084).
文摘With the development of the Internet,image encryption technology has become critical for network security.Traditional methods often suffer from issues such as insufficient chaos,low randomness in key generation,and poor encryption efficiency.To enhance performance,this paper proposes a new encryption algorithm designed to optimize parallel processing and adapt to images of varying sizes and colors.The method begins by using SHA-384 to extract the hash value of the plaintext image,which is then processed to determine the chaotic system’s initial value and block size.The image is padded and divided into blocks for further processing.A novel two-dimensional infinite collapses hyperchaotic map(2DICHM)is employed to generate the intra-block scrambling sequence,while an improved variable Joseph traversal sequence is used for inter-block scrambling.After removing the padding,3D forward and backward shift diffusions,controlled by the 2D-ICHM sequences,are applied to the scrambled image,producing the ciphertext.Simulation results demonstrate that the proposed algorithm outperforms others in terms of entropy,anti-noise resilience,correlation coefficient,robustness,and encryption efficiency.
文摘The Control of a hyperchaotic discrete system is investigated, A time-varying feedback control law is established on the base of local linearization. The Liapunov direct method is applied to estimate the neighborhood in which the control law can be effectively used. Numerical examples are presented to demonstrate the applications of the control law to solve the problem of stabilizing unstable periodic orbits and the problem of tracking an arbitrarily given periodic orbit.
基金supported by the National Natural Science Foundation of China(Grant Nos.62366014,61961019)the Jiangxi Provincial Natural Science Foundation(Grant No.20232BAB202008)。
文摘This study introduces an effective framework for image encryption,leveraging the principles of chaos theory through the use of cellular automata neighborhood(CAN)and a novel two-dimensional hyperchaotic map(2D-SGHM)derived from the classic sine and Gauss maps.The core of our investigation delved into the basic performance and dynamical behaviors of this map.The findings reveal a wide hyperchaotic range characterized by large positive Lyapunov exponents,establishing map superiority in image encryption.By integrating different cellular automata neighborhoods,we can generate diverse image encryption schemes.Specifically,this study highlights three distinct image encryption algorithms constructed from one-dimensional,von Neumann and Moore neighborhoods,named OIEA,NIEA,and MIEA.Each scheme is uniquely designed to harness the benefits of CAN for encryption,thereby enhancing the overall effectiveness and security level of the image encryption process.In the experiment,the number of pixels change rates for OIEA,NIEA,and MIEA are 99.6097%,99.6092%,and 99.6098%,and the unified average changing intensities are 33.4603%,33.4626%,and 33.4628%,respectively.The correlation coefficients of the neighboring pixels are notably low,recorded at 0.00065,0.00064,and 0.00031 for each scheme,while the information entropies are nearly identical,with scores of 7.9977,7.9975,and 7.9976,showing that our encryption schemes have high security performance and can provide reliable security for different types of data information.