“…In cryptography, the attack algorithms for passwords are commonly plaintext attacks, chosen-ciphertext attacks, known plaintext attacks, and known ciphertext attacks [41,42]. e security of the encryption algorithm should depend only on the security of the key.…”
This paper proposes a block encryption algorithm based on a new chaotic system that combines generative adversarial networks (GANs) and DNA sequence coding. First, the new one-dimensional chaotic system that combines GANs with DNA sequence coding generates two more complex key stream sequences. Then, the two different random sequences are combined with an improved Feistel network by utilizing the product of the block matrix to encrypt the image to scramble and diffuse the image. Finally, the security performance of this algorithm is quantitatively analysed. The simulation results show that the proposed chaotic system has a large key space, and the new algorithm yields adequate security and can resist exhaustive attacks and chosen-plaintext attacks. Therefore, this approach provides a new algorithm for secure transmission and protection of image information.
“…In cryptography, the attack algorithms for passwords are commonly plaintext attacks, chosen-ciphertext attacks, known plaintext attacks, and known ciphertext attacks [41,42]. e security of the encryption algorithm should depend only on the security of the key.…”
This paper proposes a block encryption algorithm based on a new chaotic system that combines generative adversarial networks (GANs) and DNA sequence coding. First, the new one-dimensional chaotic system that combines GANs with DNA sequence coding generates two more complex key stream sequences. Then, the two different random sequences are combined with an improved Feistel network by utilizing the product of the block matrix to encrypt the image to scramble and diffuse the image. Finally, the security performance of this algorithm is quantitatively analysed. The simulation results show that the proposed chaotic system has a large key space, and the new algorithm yields adequate security and can resist exhaustive attacks and chosen-plaintext attacks. Therefore, this approach provides a new algorithm for secure transmission and protection of image information.
“…Application of a simple image scrambling protocol (inverting odd lines and columns followed by column permutation) and subsequent pixel-by-pixel XOR operation with the output of Chua's memristor-based oscillator yields a chaotic 'pepper-and-salt' type image. A more developed security algorithm, also based on Chua's oscillators was reported by Arpacı et al 177 Application of hyperchaotic oscillators and additionally, a complex scrambling algorithm provides even better data protection and additionally giver better error resistance. The efficiency of this encryption process can be illustrated by a comparison of two very different images encrypted using the same protocol and the same settings of the generator (Figure 21).…”
The story of information processing is a story of great success. Todays' microprocessors are devices of unprecedented complexity and MOSFET transistors are considered as the most widely produced artifact in the history of mankind. The current miniaturization of electronic circuits is pushed almost to the physical limit and begins to suffer from various parasitic effects. These facts stimulate intense research on neuromimetic devices. This feature article is devoted to various in materio implementation of neuromimetic processes, including neuronal dynamics, synaptic plasticity, and higher-level signal and information processing, along with more sophisticated implementations, including signal processing, speech recognition and data security. Due to vast number of papers in the field, only a subjective selection of topics is presented in this review.
“…The significant advantage of this approach is improving the quality of DNA masks to obtain the best mask that is compatible with plain images. Batuhan et al 27 developed a genuine encryption/decryption algorithm by using a modified Chua's circuit. The pseudorandom numbers extracted from the solutions of the modified Chua's circuit are transmitted to the newly developed algorithm for the encryption/decryption aims.…”
Section: Introductionmentioning
confidence: 99%
“…The results are effective and provide an efficient technique for the color image encryption/decryption in the theme of secure communication. In view of good standing papers described above, 25–27 we use the PRNS generated by the proposed quintic jerk system for a DNA encryption algorithm for image encryption. The main objective is to use DNA architecture to design a robust encryption algorithm resistant to classical attack of cryptanalysis since it has a high potential of designing secure encryption algorithm.…”
Summary
An electronic implementation of a novel chaotic oscillator with quintic nonlinearity is proposed herein. Dynamical behaviors of the system are investigated using well‐known numerical simulations and analyses such as phase portraits, Lyapunov exponents, bifurcation diagrams, and basins of attraction. The chaotic circuit presents an inversion‐symmetry, and we show that it can exhibit some nonlinear phenomena specific to symmetric systems, such as symmetric bifurcations, symmetric attractors, coexisting symmetric bubbles, and coexisting symmetric attractors. Since symmetry is never perfect, some symmetry imperfections must be always assumed to be present. Thus, an external Direct Current (DC) voltage is introduced in order to highlight the influence of asymmetry on the dynamics of the chaotic oscillator. It is found that more complex nonlinear behaviors occur in the presence of symmetry breaking like asymmetric coexisting bifurcations, asymmetric attractors, coexisting asymmetric bubbles, and coexisting asymmetric attractors, to name a few. The control of multistability is also performed by using the so‐called linear augmentation scheme. Probe Simulation Program with Integrated Circuits Emphasis (Pspice) circuit simulations are carried out to verify the theoretical analyses. Furthermore, a chaos‐based image encryption is investigated using pseudorandom numbers generated by the proposed chaotic circuit and deoxyribonucleic acid (DNA) encoding technique.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.