Severity: Warning
Message: file_get_contents(https://...@pubfacts.com&api_key=b8daa3ad693db53b1410957c26c9a51b4908&a=1): Failed to open stream: HTTP request failed! HTTP/1.1 429 Too Many Requests
Filename: helpers/my_audit_helper.php
Line Number: 176
Backtrace:
File: /var/www/html/application/helpers/my_audit_helper.php
Line: 176
Function: file_get_contents
File: /var/www/html/application/helpers/my_audit_helper.php
Line: 250
Function: simplexml_load_file_from_url
File: /var/www/html/application/helpers/my_audit_helper.php
Line: 1034
Function: getPubMedXML
File: /var/www/html/application/helpers/my_audit_helper.php
Line: 3152
Function: GetPubMedArticleOutput_2016
File: /var/www/html/application/controllers/Detail.php
Line: 575
Function: pubMedSearch_Global
File: /var/www/html/application/controllers/Detail.php
Line: 489
Function: pubMedGetRelatedKeyword
File: /var/www/html/index.php
Line: 316
Function: require_once
Classical one-dimensional chaotic map has many ideal characteristics which is quite suitable for many different kinds of scientific fields, especially cryptography. In this paper, we propose an idea of constructing high-dimensional (HD) cyclic symmetric chaotic maps by using one-dimensional (1D) chaotic map. Two constructed 3D cyclic symmetric chaotic maps are taken as the examples, named three-dimensional cyclic symmetric logistic map (3D-CSLM) and three-dimensional cyclic symmetric Chebyshev map (3D-CSCM), respectively. Numerical experiments show that the new maps possesses better dynamical performances, and their parameters have a wider range, compared with the original map. Furthermore, to verify its effect in image encryption, a novel image encryption algorithm based on 3D-CSLM and DNA coding is proposed. DNA method for image encryption can improve the efficiency of permutation and diffusion. Firstly, the algorithm uses 3D-CSLM to generate chaotic sequences for DNA operation rule selection and pixel permutation. Then through the DNA XOR operation to achieve diffusion, and finally form an encrypted image. Several simulation tests results indicate that the proposal has a promising security performance and strong anti-attack ability.
Download full-text PDF |
Source |
---|---|
http://www.ncbi.nlm.nih.gov/pmc/articles/PMC9554847 | PMC |
http://dx.doi.org/10.1007/s11042-022-14044-y | DOI Listing |
Enter search terms and have AI summaries delivered each week - change queries or unsubscribe any time!