Search engine for discovering works of Art, research articles, and books related to Art and Culture
ShareThis
Javascript must be enabled to continue!

Image encryption using a novel quintic jerk circuit with adjustable symmetry

View through CrossRef
SummaryAn electronic implementation of a novel chaotic oscillator with quintic nonlinearity is proposed herein. Dynamical behaviors of the system are investigated using well‐known numerical simulations and analyses such as phase portraits, Lyapunov exponents, bifurcation diagrams, and basins of attraction. The chaotic circuit presents an inversion‐symmetry, and we show that it can exhibit some nonlinear phenomena specific to symmetric systems, such as symmetric bifurcations, symmetric attractors, coexisting symmetric bubbles, and coexisting symmetric attractors. Since symmetry is never perfect, some symmetry imperfections must be always assumed to be present. Thus, an external Direct Current (DC) voltage is introduced in order to highlight the influence of asymmetry on the dynamics of the chaotic oscillator. It is found that more complex nonlinear behaviors occur in the presence of symmetry breaking like asymmetric coexisting bifurcations, asymmetric attractors, coexisting asymmetric bubbles, and coexisting asymmetric attractors, to name a few. The control of multistability is also performed by using the so‐called linear augmentation scheme. Probe Simulation Program with Integrated Circuits Emphasis (Pspice) circuit simulations are carried out to verify the theoretical analyses. Furthermore, a chaos‐based image encryption is investigated using pseudorandom numbers generated by the proposed chaotic circuit and deoxyribonucleic acid (DNA) encoding technique.
Title: Image encryption using a novel quintic jerk circuit with adjustable symmetry
Description:
SummaryAn electronic implementation of a novel chaotic oscillator with quintic nonlinearity is proposed herein.
Dynamical behaviors of the system are investigated using well‐known numerical simulations and analyses such as phase portraits, Lyapunov exponents, bifurcation diagrams, and basins of attraction.
The chaotic circuit presents an inversion‐symmetry, and we show that it can exhibit some nonlinear phenomena specific to symmetric systems, such as symmetric bifurcations, symmetric attractors, coexisting symmetric bubbles, and coexisting symmetric attractors.
Since symmetry is never perfect, some symmetry imperfections must be always assumed to be present.
Thus, an external Direct Current (DC) voltage is introduced in order to highlight the influence of asymmetry on the dynamics of the chaotic oscillator.
It is found that more complex nonlinear behaviors occur in the presence of symmetry breaking like asymmetric coexisting bifurcations, asymmetric attractors, coexisting asymmetric bubbles, and coexisting asymmetric attractors, to name a few.
The control of multistability is also performed by using the so‐called linear augmentation scheme.
Probe Simulation Program with Integrated Circuits Emphasis (Pspice) circuit simulations are carried out to verify the theoretical analyses.
Furthermore, a chaos‐based image encryption is investigated using pseudorandom numbers generated by the proposed chaotic circuit and deoxyribonucleic acid (DNA) encoding technique.

Related Results

Sagittal and Frontal Plane Knee Angular Jerk Effects During Prolonged Load Carriage
Sagittal and Frontal Plane Knee Angular Jerk Effects During Prolonged Load Carriage
Introduction: Musculoskeletal injuries are a costly military problem that routinely occur during training. Quantifying smoothness of knee motion, or angular knee jerk, m...
Completely Solving the Quintic by Iteration
Completely Solving the Quintic by Iteration
AbstractIn the late nineteenth century, Felix Klein revived the problem of solving the quintic equation from the moribund state into which Galois had placed it. Klein’s approach wa...
Digital Image Encryption Using Logistic Map
Digital Image Encryption Using Logistic Map
This study focuses on the application of the logistic map algorithm in the Python programming language for digital image encryption and decryption. It investigates the impact of im...
An Authorized Scheme Service Privately Shared Data
An Authorized Scheme Service Privately Shared Data
In the modern digital landscape, the secure sharing of data across distributed systems remains a critical challenge. This paper proposes a blockchain-based architecture that levera...
Segmented encryption algorithm for privacy and net neutrality in distributed cloud systems
Segmented encryption algorithm for privacy and net neutrality in distributed cloud systems
The advent of distributed cloud systems has revolutionized data storage and access, providing flexibility and scalability across various industries. However, these benefits come wi...
Investigating data encryption technologies in securing business information systems
Investigating data encryption technologies in securing business information systems
In today’s increasingly interconnected digital landscape, businesses are confronted with the pressing need to secure sensitive information from a growing range of cyber threats. As...
Investigating data encryption technologies in securing business information systems
Investigating data encryption technologies in securing business information systems
In today’s increasingly interconnected digital landscape, businesses are confronted with the pressing need to secure sensitive information from a growing range of cyber threats. As...
Simulation modeling study on short circuit ability of distribution transformer
Simulation modeling study on short circuit ability of distribution transformer
Abstract Under short circuit condition, the oil immersed distribution transformer will endure combined electro-thermal stress, eventually lead to the mechanical dama...

Back to Top