2019
DOI: 10.1016/j.cjph.2019.09.031
|View full text |Cite
|
Sign up to set email alerts
|

Synchronization of memristor-based chaotic systems by a simplified control and its application to image en-/decryption using DNA encoding

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3

Citation Types

0
3
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
6
1
1

Relationship

0
8

Authors

Journals

citations
Cited by 21 publications
(3 citation statements)
references
References 35 publications
0
3
0
Order By: Relevance
“…10 One of the demanding features of chaos synchronization is utilizing the systems' chaotic behavior to encrypt and decrypt the data in secure communication systems. 11 As mentioned above, the applications encourage researchers in different fields that developed several feedback control strategies to realize chaos synchronization. These include linear feedback controller, 12 adaptive control strategy, 13 linear separation method, 14 sliding mode control technique, 13 activation feedback controller, 15 and backstepping control approach, 16 among others.…”
Section: Introductionmentioning
confidence: 99%
“…10 One of the demanding features of chaos synchronization is utilizing the systems' chaotic behavior to encrypt and decrypt the data in secure communication systems. 11 As mentioned above, the applications encourage researchers in different fields that developed several feedback control strategies to realize chaos synchronization. These include linear feedback controller, 12 adaptive control strategy, 13 linear separation method, 14 sliding mode control technique, 13 activation feedback controller, 15 and backstepping control approach, 16 among others.…”
Section: Introductionmentioning
confidence: 99%
“…Later, increasing research results prove that the chaotic system based on memristor behaves more complex dynamic behaviors and initial condition sensitivity [35,36]. In the consequence, combining memristor chaotic system (MCS) with cryptography, high security image encryption algorithms are designed, showing its great application value in image encryption, secure communication and other fields [37,38].…”
Section: Introductionmentioning
confidence: 99%
“…In general, the appearance of coexisting attractors is associated with systems symmetry and depends closely on system initial conditions. Chaotic system with multiple attractors is able to deliver more complexity in chaos-based engineering applications such as neural networks [22], image encryption [23], control system [24] and random number generator [25]. Therefore, chaotic system with coexisting attractors has become a considerable interest at present.…”
Section: Introductionmentioning
confidence: 99%