In this paper, we report an effective cryptosystem aimed at securing the transmission of medical images in an Internet of Healthcare Things (IoHT) environment. This contribution investigates the dynamics of a 2-D trigonometric map designed using some well-known maps: Logistic-sine-cosine maps. Stability analysis reveals that the map has an infinite number of solutions. Lyapunov exponent, bifurcation diagram, and phase portrait are used to demonstrate the complex dynamic of the map. The sequences of the map are utilized to construct a robust cryptosystem. First, three sets of key streams are generated from the newly designed trigonometric map and are used jointly with the image components (R, G, B) for hamming distance calculation. The output distance-vector, corresponding to each component, is then Bit-XORed with each of the key streams. The output is saved for further processing. The decomposed components are again Bit-XORed with key streams to produce an output, which is then fed into the conditional shift algorithm. The Mandelbrot Set is used as the input to the conditional shift algorithm so that the algorithm efficiently applies confusion operation (complete shuffling of pixels). The resultant shuffled vectors are then Bit-XORed (Diffusion) with the saved outputs from the early stage, and eventually, the image vectors are combined to produce the encrypted image. Performance analyses of the proposed cryptosystem indicate high security and can be effectively incorporated in an IoHT framework for secure medical image transmission.
In this contribution, the problem of multistability control in a simple model of 3D HNNs as well as its application to biomedical image encryption is addressed. The space magnetization is justified by the coexistence of up to six disconnected attractors including both chaotic and periodic.
The linear augmentation method is successfully applied to control the multistable HNNs into a monostable network. The control of the coexisting four attractors including a pair of chaotic attractors and a pair of periodic attractors is made through three crises that enable the chaotic attractors to be metamorphosed in a monostable periodic attractor. Also, the control of six coexisting attractors (with two pairs of chaotic attractors and a pair of periodic one) is made through five crises enabling all the chaotic attractors to be metamorphosed in a monostable periodic attractor. Note that this controlled HNN is obtained for higher values of the coupling strength. These interesting results are obtained using nonlinear analysis tools such as the phase portraits, bifurcations diagrams, graph of maximum Lyapunov exponent, and basins of attraction. The obtained results have been perfectly supported using the PSPICE simulation environment. Finally, a simple encryption scheme is designed jointly using the sequences of the proposed HNNs and the sequences of real/imaginary values of the Julia fractals set. The obtained cryptosystem is validated using some well-known metrics. The proposed method achieved entropy of 7.9992, NPCR of 99.6299, and encryption time of 0.21 for the 256*256 sample 1 image.
A lightweight image encryption algorithm is presented based on chaos induction via a 5-dimensional hyperjerk oscillator (5DHO) network. First, the dynamics of our 5DHO network is investigated and shown to exhibit up to five coexisting hidden attractors in the state space that depend exclusively on the system's initial values. Further, a simple implementation of the circuit was used to validate its ability to exhibit chaotic dynamical properties. Second, an Arduino UNO platform is used to confirm the usability of our oscillator in embedded system implementation. Finally, an efficient image encryption application is executed using the proposed chaotic networks based on the use of permutation-substitution sequences. The superior qualities of the proposed strategy are traced to the dynamic set of keys used in the substitution process which heralds the generation of the final ciphered image. Based on the average results obtained from the entropy analysis (7.9976), NPCR values (99.62), UACI tests (33.69) and encryption execution time for 512 × 512 images (0.1141 s), the proposed algorithm is adjudged to be fast and robust to differential and statistical attacks relative to similar approaches.
The nonlinear ion-acoustic waves (IAWs) in a space plasma are capable of exhibiting chaotic dynamics which can be applied to cryptography. Dynamical properties of IAWs are examined using the direct method in plasmas composed of positive and negative ions and nonextensive distributed electrons. Applying the wave transformation, the governing equations are deduced into a dynamical system (DS). Supernonlinear and nonlinear periodic IAWs are presented through phase plane analysis. The analytical periodic wave solution for IAW is obtained. Under the influence of an external periodic force, the DS is transformed to a perturbed system. The perturbed DS describes multistability property of IAWs with change of initial conditions. The multistability behavior features coexisting trajectories such as, quasiperiodic, multiperiodic and chaotic trajectories of the perturbed DS. The chaotic feature in the perturbed DS is supported by Lyapunov exponents. This interesting behavior in the windows of chaotic dynamics is exploited to design efficient encryption algorithm. First SHA-512 is used to compute the hash digest of the plain image which is then used to update the initial seed of the chaotic IAWs system. Note that SHA-512 uses one-way function to map input data to the output, consequently it is quite impossible to break the proposed encryption technique. Second DNA coding is used to confuse and diffuse the DNA version of the plain image. The diffused image follows DNA decoding process leading to the cipher image. The security performance is evaluated using some well-known metrics and results indicate that the proposed cryptosystem can resist most of existing cryptanalysis techniques. In addition complexity analysis shows the possibility of practical implementation of the proposed algorithm.
In this paper, bidirectional-coupled neurons through an asymmetric electrical synapse are investigated. These coupled neurons involve 2D Hindmarsh–Rose (HR) and 2D FitzHugh–Nagumo (FN) neurons. The equilibria of the coupled neurons model are investigated, and their stabilities have revealed that, for some values of the electrical synaptic weight, the model under consideration can display either self-excited or hidden firing patterns. In addition, the hidden coexistence of chaotic bursting with periodic spiking, chaotic spiking with period spiking, chaotic bursting with a resting pattern, and the coexistence of chaotic spiking with a resting pattern are also found for some sets of electrical synaptic coupling. For all the investigated phenomena, the Hamiltonian energy of the model is computed. It enables the estimation of the amount of energy released during the transition between the various electrical activities. Pspice simulations are carried out based on the analog circuit of the coupled neurons to support our numerical results. Finally, an STM32F407ZE microcontroller development board is exploited for the digital implementation of the proposed coupled neurons model.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.