[HTML][HTML] Chaos in the real world: Recent applications to communications, computing, distributed sensing, robotic motion, bio-impedance modelling and encryption …

G Grassi - Symmetry, 2021 - mdpi.com
Most of the papers published so far in literature have focused on the theoretical phenomena
underlying the formation of chaos, rather than on the investigation of potential applications of …

Multi-scroll hidden attractor in memristive HR neuron model under electromagnetic radiation and its applications

S Zhang, J Zheng, X Wang, Z Zeng - Chaos: An Interdisciplinary …, 2021 - pubs.aip.org
This paper aims to propose a novel no-equilibrium Hindmarsh–Rose (HR) neuron model
with memristive electromagnetic radiation effect. Compared with other memristor-based HR …

Design of pseudo-random number generator from turbulence padded chaotic map

S Krishnamoorthi, P Jayapaul, RK Dhanaraj… - Nonlinear …, 2021 - Springer
Transmission of the information in any form requires security. Security protocols used for
communication rely on the use of random numbers. Pseudo-random numbers are required …

A simple chaotic model with complex chaotic behaviors and its hardware implementation

J Tang, Z Zhang, P Chen, Z Huang… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
Recently, due to the initial sensitivity, ergodicity, boundedness, and unpredictability of
chaos, it has been widely used in the fields of secure communication, signal processing …

A novel image encryption scheme using chaotic maps and fuzzy numbers for secure transmission of information

DE Mfungo, X Fu, Y **an, X Wang - Applied Sciences, 2023 - mdpi.com
The complexity of chaotic systems, if used in information encryption, can determine the
status of security. The paper proposes a novel image encryption scheme that uses chaotic …

An image encryption scheme proposed by modifying chaotic tent map using fuzzy numbers

M Akraam, T Rashid, S Zafar - Multimedia Tools and Applications, 2023 - Springer
Digital images play a crucial role in data communication through the internet or any mode,
but their security is a formidable task. Multiple image encryption approaches were …

Investigation of strength and security of pseudo random number generators

K Sathya, J Premalatha… - IOP Conference Series …, 2021 - iopscience.iop.org
Security is a key factor in today's fast communicating world. Many cryptographic algorithms
are tested and put into use efficiently. Random numbers are used in diverse forms like …

A Chaos‐Based Image Encryption Scheme Is Proposed Using Multiple Chaotic Maps

M Akraam, T Rashid, S Zafar - Mathematical Problems in …, 2023 - Wiley Online Library
Everybody wants to maintain solitariness to some extent or entirely in his dealings with other
people during different modes of communication. To retain privacy, researchers materialized …

[HTML][HTML] Hybrid chaotic-based PRNG for secure cryptography applications

AM Alnajim, E Abou-Bakr, SS Alruwisan, S Khan… - Applied Sciences, 2023 - mdpi.com
This paper suggests a novel one-dimensional (1D) map to address the limitations of
traditional chaotic 1D maps. In contrast to traditional 1D maps, the proposed map has three …

A noise-tolerant cryptosystem based on the decomposition of bit-planes and the analysis of chaotic gauss iterated map

A Shafique - Neural Computing and Applications, 2022 - Springer
Secure communication has become a challenging task for researchers. In these
circumstances, several encryption techniques for digital images have been proposed. In this …