2023
DOI: 10.3390/mi14112090
|View full text |Cite
|
Sign up to set email alerts
|

A Robust Memristor-Enhanced Polynomial Hyper-Chaotic Map and Its Multi-Channel Image Encryption Application

Kun Qian,
Yang Xiao,
Yinjie Wei
et al.

Abstract: Nowadays, the utilization of memristors to enhance the dynamical properties of chaotic systems has become a popular research topic. In this paper, we present the design of a novel 2D memristor-enhanced polynomial hyper-chaotic map (2D-MPHM) by utilizing the cross-coupling of two TiO2 memristors. The dynamical properties of the 2D-MPHM were investigated using Lyapunov exponents, bifurcation diagrams, and trajectory diagrams. Additionally, Kolmogorov entropy and sample entropy were also employed to evaluate the … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
7

Relationship

1
6

Authors

Journals

citations
Cited by 9 publications
(4 citation statements)
references
References 58 publications
0
4
0
Order By: Relevance
“…In the proposed cryptosystem, the encrypted ciphertext comes from the output of the attention module. The key space [41,42,45] can be infinite because either the two sequences of single-pixel measurements or the input cryptographic key sequence are random with unlimited dynamic range.…”
Section: Optical Experiments Resultsmentioning
confidence: 99%
See 1 more Smart Citation
“…In the proposed cryptosystem, the encrypted ciphertext comes from the output of the attention module. The key space [41,42,45] can be infinite because either the two sequences of single-pixel measurements or the input cryptographic key sequence are random with unlimited dynamic range.…”
Section: Optical Experiments Resultsmentioning
confidence: 99%
“…Therefore, the forward propagation process of this module can also be regarded as the encryption of these three input vectors. Based on this concept, this paper proposes a physically driven neural network SPI encryption scheme using the above attention module to deal with multi-image encryption tasks [39][40][41][42]. We let the two vectors of the attention module be taken from single-pixel measurements that correspond to two different object images and set the sequence of cryptographic keys as the third vector.…”
Section: Introductionmentioning
confidence: 99%
“…Due to its extreme sensitivity to input, SHA-256 has been widely employed in image encryption to enhance the plaintext sensitivity of an image encryption algorithm [16]. In MIEA-FCSM, we first use SHA-256 to obtain the 32-byte hash value h of C (2) .…”
Section: Generation Of Plaintext-related Parametersmentioning
confidence: 99%
“…Notably, chaotic systems possess multiple unique properties that are suitable for constructing cryptographic systems, including unpredictability and randomness. Therefore, a majority of the existing image encryption algorithms are built upon various chaotic systems [16]. Here, we can provide several examples of recent advancements.…”
Section: Introductionmentioning
confidence: 99%