Adding time delay to nonlinear systems can significantly improve their performance, making it possible to construct image-encryption algorithms with higher security. In this paper, we propose a time-delayed nonlinear combinatorial hyperchaotic map (TD-NCHM) with a wide hyperchaotic interval. Based on TD-NCHM, we develop a fast and secure image-encryption algorithm that includes a plaintext-sensitive key-generation method and a simultaneous row-column shuffling-diffusion encryption process. Plenty of experiments and simulations demonstrate the superiority of the algorithm in terms of efficiency, security, and practical value in secure communications.
Download full-text PDF |
Source |
---|---|
http://www.ncbi.nlm.nih.gov/pmc/articles/PMC10217226 | PMC |
http://dx.doi.org/10.3390/e25050753 | DOI Listing |
Images are important information carriers in our lives, and images should be secure when transmitted and stored. Image encryption algorithms based on chaos theory emerge in endlessly. Based on previous various chaotic image fast encryption algorithms, this paper proposes a color image sector fast encryption algorithm based on one-dimensional composite sinusoidal chaotic mapping.
View Article and Find Full Text PDFLab Chip
January 2025
Mitos Diagnostics, Inc., California, USA.
Zoonotic outbreaks present with unpredictable threats to human health, food production, biodiversity, national security and disrupt the global economy. The COVID-19 pandemic-caused by zoonotic coronavirus, SARS-CoV2- is the most recent upsurge of an increasing trend in outbreaks for the past 100 years. This year, emergence of avian influenza (H5N1) is a stark reminder of the need for national and international pandemic preparedness.
View Article and Find Full Text PDFSci Rep
January 2025
Department of Mathematics, King's College London, Strand, London, WC2R 2LS, UK.
Ranking sectors and countries within global value chains is of paramount importance to estimate risks and forecast growth in large economies. However, this task is often non-trivial due to the lack of complete and accurate information on the flows of money and goods between sectors and countries, which are encoded in input-output (I-O) tables. In this work, we show that an accurate estimation of the role played by sectors and countries in supply chain networks can be achieved without full knowledge of the I-O tables, but only relying on local and aggregate information, e.
View Article and Find Full Text PDFPlast Reconstr Surg Glob Open
January 2025
From the Department of Urology, Showa University School of Medicine; Tokyo, Japan.
Background: Chemotherapy-induced peripheral neuropathy (CIPN) affects 29%-68% of patients undergoing anticancer treatments within the first month. Traditional cryotherapy methods, such as frozen gloves, can pose risks. This study evaluates the cool-water electric circulation seat (CECS), which maintains a constant 15°C, as a safer alternative.
View Article and Find Full Text PDFSci Rep
January 2025
Department of Instrumentation Engineering, Madras Institute of Technology Campus, Anna University, Chromepet, Chennai 44, India.
Cloud Computing (CC) is a fast emerging field that enables consumers to access network resources on-demand. However, ensuring a high level of security in CC environments remains a significant challenge. Traditional encryption algorithms are often inadequate in protecting confidential data, especially digital images, from complex cyberattacks.
View Article and Find Full Text PDFEnter search terms and have AI summaries delivered each week - change queries or unsubscribe any time!