Sign in to use this feature.

Years

Between: -

Subjects

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Journals

Article Types

Countries / Regions

remove_circle_outline
remove_circle_outline
remove_circle_outline

Search Results (507)

Search Parameters:
Keywords = chaotic encryption

Order results
Result details
Results per page
Select all
Export citation of selected articles as:
25 pages, 6358 KB  
Article
A Novel Chaotic Encryption Algorithm Based on Fuzzy Rule-Based Sugeno Inference: Theory and Application
by Aydin Muhurcu and Gulcin Muhurcu
Mathematics 2026, 14(2), 243; https://doi.org/10.3390/math14020243 - 8 Jan 2026
Viewed by 138
Abstract
This study proposes a robust chaotic encryption framework based on a Fuzzy Rule-Based Sugeno Inference (FRBSI) system, integrated with high-level security analyses. The algorithm employs a dynamic mixture of Lorenz chaotic state variables, which are numerically modeled using the Euler-Forward method to ensure [...] Read more.
This study proposes a robust chaotic encryption framework based on a Fuzzy Rule-Based Sugeno Inference (FRBSI) system, integrated with high-level security analyses. The algorithm employs a dynamic mixture of Lorenz chaotic state variables, which are numerically modeled using the Euler-Forward method to ensure computational accuracy. Unlike conventional methods, the carrier signal’s characteristics are not static; instead, its amplitude and dynamic behavior are continuously adapted through the FRBSI mechanism, driven by the instantaneous thresholds of the information signal. The security of the proposed system was rigorously evaluated through Histogram analysis, Number of Pixels Change Rate (NPCR), and Unified Average Changing Intensity (UACI) metrics, which confirmed the algorithm’s high sensitivity to plaintext variations and resistance against differential attacks. Furthermore, Key Sensitivity tests demonstrated that even a single-bit discrepancy in the receiver-side Sugeno rule base leads to a total failure in signal reconstruction, providing a formidable defense against brute-force attempts. The system’s performance was validated in the MATLAB/Simulink of R2021a version environment, where frequency and time-domain analyses were performed via oscilloscope and Fourier transforms. The results indicate that the proposed multi-layered fuzzy-chaotic structure significantly outperforms traditional encryption techniques in terms of unpredictability, structural security, and robustness. Full article
(This article belongs to the Topic A Real-World Application of Chaos Theory)
Show Figures

Figure 1

10 pages, 1503 KB  
Article
High Spectrum Efficiency and High Security Radio-Over-Fiber Systems with Compressive-Sensing-Based Chaotic Encryption
by Zhanhong Wang, Lu Zhang, Jiahao Zhang, Oskars Ozolins, Xiaodan Pang and Xianbin Yu
Micromachines 2026, 17(1), 80; https://doi.org/10.3390/mi17010080 - 7 Jan 2026
Viewed by 103
Abstract
With the increasing demand for high throughput and ultra-dense small cell deployment in the next-generation communication networks, spectrum resources are becoming increasingly strained. At the same time, the security risks posed by eavesdropping remain a significant concern, particularly due to the broadcast-access property [...] Read more.
With the increasing demand for high throughput and ultra-dense small cell deployment in the next-generation communication networks, spectrum resources are becoming increasingly strained. At the same time, the security risks posed by eavesdropping remain a significant concern, particularly due to the broadcast-access property of optical fronthaul networks. To address these challenges, we propose a high-security, high-spectrum efficiency radio-over-fiber (RoF) system in this paper, which leverages compressive sensing (CS)-based algorithms and chaotic encryption. An 8 Gbit/s RoF system is experimentally demonstrated, with 10 km optical fiber transmission and 20 GHz radio frequency (RF) transmission. In our experiment, spectrum efficiency is enhanced by compressing transmission data and reducing the quantization bit requirements, while security is maintained with minimal degradation in signal quality. The system could recover the signal correctly after dequantization with 6-bit fronthaul quantization, achieving a structural similarity index (SSIM) of 0.952 for the legitimate receiver (Bob) at a compression ratio of 0.75. In contrast, the SSIM for the unauthorized receiver (Eve) is only 0.073, highlighting the effectiveness of the proposed security approach. Full article
Show Figures

Figure 1

26 pages, 13483 KB  
Article
Analog Circuit Simplification of a Chaotic Hopfield Neural Network Based on the Shil’nikov’s Theorem
by Diego S. de la Vega, Lizbeth Vargas-Cabrera, Olga G. Félix-Beltrán and Jesus M. Munoz-Pacheco
Dynamics 2026, 6(1), 1; https://doi.org/10.3390/dynamics6010001 - 1 Jan 2026
Viewed by 189
Abstract
Circuit implementation is a widely accepted method for validating theoretical insights observed in chaotic systems. It also serves as a basis for numerous chaos-based engineering applications, including data encryption, random number generation, secure communication, neuromorphic computing, and so forth. To get feasible, compact, [...] Read more.
Circuit implementation is a widely accepted method for validating theoretical insights observed in chaotic systems. It also serves as a basis for numerous chaos-based engineering applications, including data encryption, random number generation, secure communication, neuromorphic computing, and so forth. To get feasible, compact, and cost-effective circuit implementations of chaotic systems, the underlying mathematical model may be simplified while preserving all rich nonlinear behaviors. In this framework, this manuscript presents a simplified Hopfield Neural Network (HNN) capable of generating a broad spectrum of complex behaviors using a minimal number of electronic elements. Based on Shil’nikov’s theorem for heteroclinic orbits, the number of non-zero synaptic connections in the matrix weights is reduced, while simultaneously using only one nonlinear activation function. As a result of these simplifications, we obtain the most compact electronic implementation of a tri-neuron HNN with the lowest component count but retaining complex dynamics. Comprehensive theoretical and numerical analyses by equilibrium points, density-colored continuation diagrams, basin of attraction, and Lyapunov exponents, confirm the presence of periodic oscillations, spiking, bursting, and chaos. Such chaotic dynamics range from single-scroll chaotic attractors to double-scroll chaotic attractors, as well as coexisting attractors to transient chaos. A brief security application of an S-Box utilizing the presented HNN is also given. Finally, a physical implementation of the HNN is given to confirm the proposed approach. Experimental observations are in good agreement with numerical results, demonstrating the usefulness of the proposed approach. Full article
Show Figures

Figure 1

24 pages, 26851 KB  
Article
A Novel Dual Color Image Watermarking Algorithm Using Walsh–Hadamard Transform with Difference-Based Embedding Positions
by Yutong Jiang, Shuyuan Shen, Songsen Yu, Yining Luo, Zhaochuang Lao, Hongrui Wei, Jing Wu and Zhong Zhuang
Symmetry 2026, 18(1), 65; https://doi.org/10.3390/sym18010065 - 30 Dec 2025
Viewed by 237
Abstract
Image watermarking is an essential technique for protecting the copyright of digital images. This paper proposes a novel color image watermarking algorithm based on the Walsh–Hadamard Transform (WHT). By analyzing the differences among WHT coefficients, an asymmetric embedding position selection strategy is designed [...] Read more.
Image watermarking is an essential technique for protecting the copyright of digital images. This paper proposes a novel color image watermarking algorithm based on the Walsh–Hadamard Transform (WHT). By analyzing the differences among WHT coefficients, an asymmetric embedding position selection strategy is designed to enhance the robustness of the algorithm. Specifically, the color image is first separated into red (R), green (G), and blue (B) channels, each of which is divided into non-overlapping 4 × 4 blocks. Then, suitable embedding regions are selected based on the entropy of each block. Finally, the optimal embedding positions are determined by comparing the differences between WHT coefficient pairs. To ensure watermark security, the watermark is encrypted using Logistic chaotic map prior to embedding. During the extraction phase, the watermark is recovered using the chaotic key and the pre-stored embedding position information. Extensive simulation experiments are conducted to evaluate the effectiveness of the proposed algorithm. The comparative results demonstrate that the proposed method maintains high imperceptibility while exhibiting superior robustness against various attacks, outperforming existing state-of-the-art approaches in overall performance. Full article
(This article belongs to the Special Issue Symmetry/Asymmetry in Digital Image Processing)
Show Figures

Figure 1

26 pages, 1023 KB  
Article
Secure Signal Encryption in IoT and 5G/6G Networks via Bio-Inspired Optimization of Sprott Chaotic Oscillator Synchronization
by Fouzia Maamri, Hanane Djellab, Sofiane Bououden, Farouk Boumehrez, Abdelhakim Sahour, Mohamad A. Alawad, Ilyes Boulkaibet and Yazeed Alkhrijah
Entropy 2026, 28(1), 30; https://doi.org/10.3390/e28010030 - 26 Dec 2025
Viewed by 259
Abstract
The rapid growth of Internet of Things (IoT) devices and the emergence of 5G/6G networks have created major challenges in secure and reliable data transmission. Traditional cryptographic algorithms, while robust, often suffer from high computational complexity and latency, making them less suitable for [...] Read more.
The rapid growth of Internet of Things (IoT) devices and the emergence of 5G/6G networks have created major challenges in secure and reliable data transmission. Traditional cryptographic algorithms, while robust, often suffer from high computational complexity and latency, making them less suitable for large-scale, real-time applications. This paper proposes a chaos-based encryption framework that uses the Sprott chaotic oscillator to generate secure and unpredictable signals for encryption. To achieve accurate synchronization between the transmitter and the receiver, two bio-inspired metaheuristic algorithms—the Pachycondyla Apicalis Algorithm (API) and the Penguin Search Optimization Algorithm (PeSOA)—are employed to identify the optimal control parameters of the Sprott system. This optimization improves synchronization accuracy and reduces computational overhead. Simulation results show that PeSOA-based synchronization outperforms API in convergence speed and Root Mean Square Error (RMSE). The proposed framework provides robust, scalable, and low-latency encryption for IoT and 5G/6G networks, where massive connectivity and real-time data protection are essential. Full article
(This article belongs to the Section Complexity)
Show Figures

Figure 1

32 pages, 11476 KB  
Article
Secure and Reversible Thumbnail-Preserving Encryption for Point Clouds via Spatial Subdivision and Chaotic Perturbation
by Tz-Yi You, Yu-Ting Huang, Ting-Yu Hsiao, Yung-Wen Cheng, Yuan-Yu Tsai and Ching-Ta Lu
Mathematics 2026, 14(1), 80; https://doi.org/10.3390/math14010080 - 25 Dec 2025
Viewed by 238
Abstract
Thumbnail-preserving encryption (TPE) aims to balance data security and usability by allowing encrypted content to retain a coarse visual preview while protecting sensitive details. While existing TPE techniques primarily target 2D images, effective and reversible TPE for 3D point clouds remains underexplored. This [...] Read more.
Thumbnail-preserving encryption (TPE) aims to balance data security and usability by allowing encrypted content to retain a coarse visual preview while protecting sensitive details. While existing TPE techniques primarily target 2D images, effective and reversible TPE for 3D point clouds remains underexplored. This paper proposes a thumbnail-preserving encryption framework specifically designed for point clouds, addressing the challenges arising from irregular spatial structure and viewpoint-dependent visualization. The proposed method integrates perception-guided spatial subdivision with key-dependent chaotic perturbation to obfuscate fine-grained geometric details while intentionally preserving coarse structural information under the TPE threat model. A reversible integer-domain design is further incorporated to enable exact recovery of the original point cloud and support reversible data hiding by exploiting coordinate-level redundancy. Extensive experiments conducted on diverse point clouds demonstrate that the proposed framework maintains stable thumbnail fidelity across different viewing conditions, achieving high structural similarity, while guaranteeing perfect reversibility with zero reconstruction error. In contrast to existing image-based TPE frameworks, the proposed method extends the TPE paradigm to 3D point clouds by providing full reversibility, auxiliary message embedding support, and stable thumbnail fidelity under varying viewing conditions. Quantitative results demonstrate that thumbnail-level structural similarity is well preserved, while the original point clouds are exactly recovered after decryption. Full article
(This article belongs to the Special Issue Information Security and Image Processing)
Show Figures

Figure 1

25 pages, 1828 KB  
Article
A Novel Butterfly-Attractor Dynamical System Without Equilibrium: Theory, Synchronization, and Application in Secure Communication
by Viet-Thanh Pham, Victor Kamdoum Tamba, Fernando E. Serrano, Giuseppe Grassi and Shaher Momani
Algorithms 2026, 19(1), 18; https://doi.org/10.3390/a19010018 - 24 Dec 2025
Viewed by 423
Abstract
The theory underlying non-linear dynamical systems remains essential for understanding complex behaviors in science and engineering. In this study, we propose a new chaotic dynamical system that exhibits a butterfly-shaped attractor without any equilibrium point. Despite its compact structure comprising only five terms, [...] Read more.
The theory underlying non-linear dynamical systems remains essential for understanding complex behaviors in science and engineering. In this study, we propose a new chaotic dynamical system that exhibits a butterfly-shaped attractor without any equilibrium point. Despite its compact structure comprising only five terms, the system demonstrates rich chaotic behavior distinct from conventional oscillator models. Detailed modeling and dynamical analyses are conducted to confirm the presence of chaos and to characterize the system’s sensitivity to initial conditions. Furthermore, synchronization of the proposed dynamical system is investigated using both identical and non-identical control algorithms. In the identical case, the activation function of the neural network is governed by the butterfly oscillator dynamics, whereas in the non-identical case, a sigmoidal activation function is employed. The proposed synchronization algorithms enable faster convergence by pinning a subset of nodes in the network. Finally, a practical implementation of the conceived dynamical system in an encryption framework is presented, with the aim to demonstrate its feasibility and potential application in secure communication systems. The results highlight the effectiveness of the proposed approach for both theoretical exploration and engineering applications involving chaotic dynamical systems. Full article
Show Figures

Figure 1

29 pages, 4563 KB  
Article
Performance Enhancement of Secure Image Transmission over ACO-OFDM VLC Systems Through Chaos Encryption and PAPR Reduction
by Elhadi Mehallel, Abdelhalim Rabehi, Ghadjati Mohamed, Abdelaziz Rabehi, Imad Eddine Tibermacine and Mustapha Habib
Electronics 2026, 15(1), 43; https://doi.org/10.3390/electronics15010043 - 22 Dec 2025
Viewed by 235
Abstract
Visible Light Communication (VLC) systems commonly employ optical orthogonal frequency division multiplexing (O-OFDM) to achieve high data rates, benefiting from its robustness against multipath effects and intersymbol interference (ISI). However, a key limitation of asymmetrically clipped direct current biased optical–OFDM (ACO-OFDM) systems lies [...] Read more.
Visible Light Communication (VLC) systems commonly employ optical orthogonal frequency division multiplexing (O-OFDM) to achieve high data rates, benefiting from its robustness against multipath effects and intersymbol interference (ISI). However, a key limitation of asymmetrically clipped direct current biased optical–OFDM (ACO-OFDM) systems lies in their inherently high peak-to-average power ratio (PAPR), which significantly affects signal quality and system performance. This paper proposes a joint chaotic encryption and modified μ-non-linear logarithmic companding (μ-MLCT) scheme for ACO-OFDM–based VLC systems to simultaneously enhance security and reduce PAPR. First, image data is encrypted at the upper layer using a hybrid chaotic system (HCS) combined with Arnold’s cat map (ACM), mapped to quadrature amplitude modulation (QAM) symbols and further encrypted through chaos-based symbol scrambling to strengthen security. A μ-MLCT transformation is then applied to mitigate PAPR and enhance both peak signal-to-noise ratio (PSNR) and bit-error-ratio (BER) performance. A mathematical model of the proposed secured ACO-OFDM system is developed, and the corresponding BER expression is derived and validated through simulation. Simulation results and security analyses confirm the effectiveness of the proposed solution, showing gains of approximately 13 dB improvement in PSNR, 2 dB in BER performance, and a PAPR reduction of about 9.2 dB. The secured μ-MLCT-ACO-OFDM not only enhances transmission security but also effectively reduces PAPR without degrading PSNR and BER. As a result, it offers a robust and efficient solution for secure image transmission with low PAPR, making it well-suitable for emerging wireless networks such as cognitive and 5G/6G systems. Full article
(This article belongs to the Section Microwave and Wireless Communications)
Show Figures

Figure 1

30 pages, 6264 KB  
Article
An Efficient Image Encryption Scheme Based on DNA Mutations and Compression Sensing
by Jianhua Qiu, Shenli Zhu, Yu Liu, Xize Luo, Dongxin Liu, Hui Zhou, Congxu Zhu and Zheng Qin
Mathematics 2026, 14(1), 5; https://doi.org/10.3390/math14010005 - 19 Dec 2025
Viewed by 229
Abstract
In communication environments with limited computing resources, securely and efficiently transmitting image data has become a challenging problem. However, most existing image data protection schemes are based on high-dimensional chaotic systems as key generators, which suffer from issues such as high algorithmic complexity [...] Read more.
In communication environments with limited computing resources, securely and efficiently transmitting image data has become a challenging problem. However, most existing image data protection schemes are based on high-dimensional chaotic systems as key generators, which suffer from issues such as high algorithmic complexity and large computational overhead. To address this, this paper presents new designs for a 1D Sine Fractional Chaotic Map (1D-SFCM) as a random sequence generator and provides mathematical proofs related to the boundedness and fixed points of this model. Furthermore, this paper improves the traditional 2D compressive sensing (2DCS) algorithm by using the newly designed 1D-SFCM map to generate a chaotic measurement matrix, which can effectively enhance the quality of image recovery and reconstruction. Moreover, referring to the principle of gene mutation in biogenetics, this paper designs an image encryption algorithm based on DNA base substitution. Finally, the security of the proposed encryption scheme and the quality of image compression and reconstruction are verified through indicators such as key space, information entropy, and Number of Pixel Change Rate (NPCR). Full article
(This article belongs to the Special Issue Chaotic Systems and Their Applications, 2nd Edition)
Show Figures

Figure 1

24 pages, 7742 KB  
Article
Memristive Hopfield Neural Network with Hidden Multiple Attractors and Its Application in Color Image Encryption
by Zhenhua Hu and Zhuanzheng Zhao
Mathematics 2025, 13(24), 3972; https://doi.org/10.3390/math13243972 - 12 Dec 2025
Viewed by 293
Abstract
Memristor is widely used to construct various memristive neural networks with complex dynamical behaviors. However, hidden multiple attractors have never been realized in memristive neural networks. This paper proposes a novel chaotic system based on a memristive Hopfield neural network (HNN) capable of [...] Read more.
Memristor is widely used to construct various memristive neural networks with complex dynamical behaviors. However, hidden multiple attractors have never been realized in memristive neural networks. This paper proposes a novel chaotic system based on a memristive Hopfield neural network (HNN) capable of generating hidden multiple attractors. A multi-segment memristor model with multistability is designed and serves as the core component in constructing the memristive Hopfield neural network. Dynamical analysis reveals that the proposed network exhibits various complex behaviors, including hidden multiple attractors and a super multi-stable phenomenon characterized by the coexistence of infinitely many double-chaotic attractors—these dynamical features are reported for the first time in the literature. This encryption process consists of three key steps. Firstly, the original chaotic sequence undergoes transformation to generate a pseudo-random keystream immediately. Subsequently, based on this keystream, a global permutation operation is performed on the image pixels. Then, their positions are disrupted through a permutation process. Finally, bit-level diffusion is applied using an Exclusive OR(XOR) operation. Relevant research shows that these phenomena indicate a high sensitivity to key changes and a high entropy level in the information system. The strong resistance to various attacks further proves the effectiveness of this design. Full article
Show Figures

Figure 1

33 pages, 11429 KB  
Article
Two-Dimensional Coupling-Enhanced Cubic Hyperchaotic Map with Exponential Parameters: Construction, Analysis, and Application in Hierarchical Significance-Aware Multi-Image Encryption
by Wei Feng, Zixian Tang, Xiangyu Zhao, Zhentao Qin, Yao Chen, Bo Cai, Zhengguo Zhu, Kun Qian and Heping Wen
Axioms 2025, 14(12), 901; https://doi.org/10.3390/axioms14120901 - 6 Dec 2025
Cited by 2 | Viewed by 297
Abstract
As digital images proliferate across open networks, securing them against unauthorized access has become imperative. However, many recent image encryption algorithms are limited by weak chaotic dynamics and inadequate cryptographic design. To overcome these, we propose a new 2D coupling-enhanced cubic hyperchaotic map [...] Read more.
As digital images proliferate across open networks, securing them against unauthorized access has become imperative. However, many recent image encryption algorithms are limited by weak chaotic dynamics and inadequate cryptographic design. To overcome these, we propose a new 2D coupling-enhanced cubic hyperchaotic map with exponential parameters (2D-CCHM-EP). By incorporating exponential terms and strengthening interdependence among state variables, the 2D-CCHM-EP exhibits strict local expansiveness, effectively suppresses periodic windows, and achieves robust hyperchaotic behavior, validated both theoretically and numerically. It outperforms several recent chaotic maps in key metrics, yielding significantly higher Lyapunov exponents and Kolmogorov–Sinai entropy, and passes all NIST SP 800-22 randomness tests. Leveraging the 2D-CCHM-EP, we further develop a hierarchical significance-aware multi-image encryption algorithm (MIEA-CPHS). The core of MIEA-CPHS is a hierarchical significance-aware encryption strategy that decomposes input images into high-, medium-, and low-significance layers, which undergo three, two, and one round of vector-level adaptive encryption operations. An SHA-384-based hash of the fused data dynamically generates a 48-bit adaptive control parameter, enhancing plaintext sensitivity and enabling integrity verification. Comprehensive security analyses confirm the exceptional performance of MIEA-CPHS: near-zero inter-pixel correlation (<0.0016), near-ideal Shannon entropy (>7.999), and superior plaintext sensitivity (NPCR 99.61%, UACI 33.46%). Remarkably, the hierarchical design and vectorized operations achieve an average encryption throughput of 87.6152 Mbps, striking an outstanding balance between high security and computational efficiency. This makes MIEA-CPHS highly suitable for modern high-throughput applications such as secure cloud storage and real-time media transmission. Full article
(This article belongs to the Special Issue Nonlinear Dynamical System and Its Applications)
Show Figures

Figure 1

30 pages, 8767 KB  
Article
State-Dependent Variable Fractional-Order Hyperchaotic Dynamics in a Coupled Quadratic Map: A Novel System for High-Performance Image Protection
by Wei Feng, Zixian Tang, Xiangyu Zhao, Zhentao Qin, Yao Chen, Bo Cai, Zhengguo Zhu, Heping Wen and Conghuan Ye
Fractal Fract. 2025, 9(12), 792; https://doi.org/10.3390/fractalfract9120792 - 2 Dec 2025
Cited by 2 | Viewed by 525
Abstract
Amid growing threats of image data leakage and misuse, image encryption has become a critical safeguard for protecting visual information. However, many recent image encryption algorithms remain constrained by trade-offs between security, efficiency, and practicability. To address these challenges, this paper first proposes [...] Read more.
Amid growing threats of image data leakage and misuse, image encryption has become a critical safeguard for protecting visual information. However, many recent image encryption algorithms remain constrained by trade-offs between security, efficiency, and practicability. To address these challenges, this paper first proposes a novel two-dimensional variable fractional-order coupled quadratic hyperchaotic map (2D-VFCQHM), which incorporates a state-dependent dynamic memory effect, wherein the fractional-order is adaptively determined at each iteration by the mean of the system’s current state. This mechanism substantially enhances the complexity and unpredictability of the underlying chaotic dynamics. Building upon the superior hyperchaotic properties of the 2D-VFCQHM, we further develop a high-performance image encryption algorithm that integrates a novel fusion strategy within a dynamic vector-level diffusion-scrambling framework (IEA-VMFD). Comprehensive security analyses and experimental results demonstrate that the proposed algorithm achieves robust cryptographic performance, including a key space of 2298, inter-pixel correlation coefficients below 0.0018, ciphertext entropy greater than 7.999, and near-ideal plaintext sensitivity. Crucially, the algorithm attains an encryption speed of up to 126.2963 Mbps. The exceptional balance between security strength and computational efficiency underscores the practical viability of our algorithm, rendering it well-suited for modern applications such as telemedicine, instant messaging, and cloud computing. Full article
(This article belongs to the Special Issue Advances in Fractional-Order Chaotic and Complex Systems)
Show Figures

Figure 1

23 pages, 2079 KB  
Article
Enhanced Image Security via Dynamic Chaotic Fuzzy Cellular Neural Networks and Voice Authentication
by Maha Ayad Alenizi, Kalpana Muthusamy and Seng Huat Ong
Symmetry 2025, 17(12), 2056; https://doi.org/10.3390/sym17122056 - 2 Dec 2025
Viewed by 304
Abstract
The vulnerability of transmitted digital images has become a pressing concern due to recent advancements in multimedia technology. Conventional encryption methods often fail to meet the requirements of large-scale real-time multimedia security. In order to strengthen color image encryption, in this paper, we [...] Read more.
The vulnerability of transmitted digital images has become a pressing concern due to recent advancements in multimedia technology. Conventional encryption methods often fail to meet the requirements of large-scale real-time multimedia security. In order to strengthen color image encryption, in this paper, we propose a novel encryption method that combines fuzzy cellular neural networks with dynamic audio-based biometric data, which aligns with the principle of symmetric encryption. To make the encryption process specific to each user and hard to replicate, the method uses speech characteristics—the peak frequency and zero-crossing rate—extracted from the user’s voice. By integrating these voice features into the fuzzy cellular neural network structure, the method expands the set of potential keys and enhances protection against brute-force, statistical, and chosen-plaintext attacks. Compared to conventional methods that rely solely on chaotic maps or neural networks, this approach provides a larger key space, higher entropy, and better disruption of pixel correlation. The encryption quality is validated through experimental results using the NPCR, UACI, PSNR, and SSIM metrics. Securing multimedia transmissions contributes to the broader vision of a protected society, where technological progress promotes safety, trust, and fair access to knowledge. Full article
Show Figures

Figure 1

19 pages, 4702 KB  
Article
How Far Can We Trust Chaos? Extending the Horizon of Predictability
by Alexandros K. Angelidis, Georgios C. Makris, Evangelos Ioannidis, Ioannis E. Antoniou and Charalampos Bratsas
Mathematics 2025, 13(23), 3851; https://doi.org/10.3390/math13233851 - 1 Dec 2025
Viewed by 643
Abstract
Chaos reveals a fundamental paradox in the scientific understanding of Complex Systems. Although chaotic models may be mathematically deterministic, they are practically non-determinable due to the finite precision that is inherent in all computational machines. Beyond the horizon of predictability, numerical computations accumulate [...] Read more.
Chaos reveals a fundamental paradox in the scientific understanding of Complex Systems. Although chaotic models may be mathematically deterministic, they are practically non-determinable due to the finite precision that is inherent in all computational machines. Beyond the horizon of predictability, numerical computations accumulate errors, often undetectable. We investigate the possibility of reliable (error-free) time series of chaos. We prove that this is feasible for two well-studied isomorphic chaotic maps, namely the Tent map and the Logistic map. The generated chaotic time series have an unlimited horizon of predictability. A new linear formula for the horizon of predictability of the Analytic Computation of the Logistic map, for any given precision and acceptable error, is obtained. Reliable (error-free) time series of chaos serve as the “gold standard” for chaos applications. The practical significance of our findings include: (i) the ability to compare the performance of neural networks that predict chaotic time series; (ii) the reliability and numerical accuracy of chaotic orbit computations in encryption, maintaining high cryptographic strength; and (iii) the reliable forecasting of future prices in chaotic economic and financial models. Full article
Show Figures

Figure 1

26 pages, 5058 KB  
Article
Pixel-Level and DNA-Level Image Encryption Method Based on Five-Dimensional Hyperchaotic System
by Min Zhou, Xin Li, Wenqi Du, Jianming Li and Zhe Wei
Entropy 2025, 27(12), 1221; https://doi.org/10.3390/e27121221 - 1 Dec 2025
Viewed by 403
Abstract
Images, as carriers of rich information, are generated, stored, and transmitted in various forms across diverse scenarios. It has become an important issue in the field of information security today to encrypt images to ensure information security. To address this issue, this paper [...] Read more.
Images, as carriers of rich information, are generated, stored, and transmitted in various forms across diverse scenarios. It has become an important issue in the field of information security today to encrypt images to ensure information security. To address this issue, this paper proposes a Pixel-Level and DNA-Level Image Encryption Method Based on a Five-Dimensional Hyperchaotic System, named PD5H. The proposed method combines a five-dimensional chaotic system, a novel pixel-block internal diffusion method, and a new flow diffusion method integrating Pixel-Level and DNA-Level encryption, hereinafter referred to as ‘joint diffusion’. The improved 5D chaotic system can generate highly complex and unpredictable chaotic sequences. The intra-block diffusion process utilizes the internal information of the image to perform preliminary diffusion and reduce pixel correlation. The joint diffusion process can effectively employ various encryption methods to encrypt images with different step sizes at the bit level. PD5H has a large key space, extremely low image correlation, a uniform ciphertext pixel distribution, an excellent ciphertext entropy value (>7.999), and strong resistance to differential attacks. It also demonstrates strong resistance to data loss. The security analysis confirms that PD5H demonstrates excellent performance in color image encryption and can effectively resist various common attacks. Full article
(This article belongs to the Topic Recent Trends in Nonlinear, Chaotic and Complex Systems)
Show Figures

Figure 1

Back to TopTop