2023
DOI: 10.1088/1402-4896/acbb38
|View full text |Cite
|
Sign up to set email alerts
|

A memristive autapse-synapse neural network: application to image encryption

Abstract: With the advent of the physical memristor, various memristive neural network models have been designed and analyzed to mimic some human brain functions. However, there is a realistic issue because many works reported the coupling of neuron models using either memristive synapse or memristive autapse, whereas in the real brain, a neuron can interact with both another neuron (memristive synapse) and with itself (memristive autapse). Two main ideas are developed in this work. First, we investigate the dynamics of… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
6
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
8
1

Relationship

1
8

Authors

Journals

citations
Cited by 18 publications
(6 citation statements)
references
References 35 publications
0
6
0
Order By: Relevance
“…Generally, the histogram of a natural image is unevenly distributed which makes it easily detected by attackers during transmission. In contrast, the histogram of any secured image is uniformly distributed which makes it hard to detect by attackers during transmission [28,29]. Our simulations were conducted for three images and figure 11 shows that the histograms of the output images by the proposed compression-encryption method are uniform.…”
Section: Histogram and χ 2 Tests Resultsmentioning
confidence: 99%
“…Generally, the histogram of a natural image is unevenly distributed which makes it easily detected by attackers during transmission. In contrast, the histogram of any secured image is uniformly distributed which makes it hard to detect by attackers during transmission [28,29]. Our simulations were conducted for three images and figure 11 shows that the histograms of the output images by the proposed compression-encryption method are uniform.…”
Section: Histogram and χ 2 Tests Resultsmentioning
confidence: 99%
“…The x − w planar phase diagrams generated by the system are drawn. In order to show clearly, c is set to 5 different values (5,15,25,35,45) at intervals of 10. Undoubtedly, with the increase of c, the phase trajectory amplitude of the system expands from the inside out (color from green to blue).…”
Section: Narrowing and Expanding Behaviorsmentioning
confidence: 99%
“…Memristor, as a unique nanoelectronic device, has extremely potential applications in materials [12,13], neural networks [14,15], and the Internet of Things [16,17] due to their unique non-volatility as well as low power consumption characteristics. According to relevant research, the fractional-order model can more precisely match the true characteristics of memristors, capacitance, and inductance of dynamic circuit components.…”
Section: Introductionmentioning
confidence: 99%
“…Over the recent years, as a nonlinear two-terminal component with the intrinsic memory effort that connects electric charge with magnetic flux [1], the memristor has aroused considerable interest in various applications such as logic gates [2,3], reservoir computing [4,5], neuromorphic computing [6,7]. In particular, the particular advantages of this device offer additional flexibility for generating chaos [8,9], hyperchaos [10,11] and complex dynamics [12,13]. Many chaotic or hyperchaotic oscillators have been constructed based on the existing chaotic system or circuit topology and then replaced some existing linear or nonlinear components with a memristor.…”
Section: Introductionmentioning
confidence: 99%