Javascript must be enabled to continue!
6D Hyperchaotic Encryption Model for Ensuring Security to 3D Printed Models and Medical Images
View through CrossRef
In the 6G era, where ultra-fast and reliable communication is expected to be ubiquitous, encryption shall continue to play a crucial role in ensuring the security and privacy of data. Encryption and decryption of medical images and 3D printed models using 6D hyperchaotic function is proposed in this research work for ensuring security in data transfer. Here we envisage using a six-dimensional hyperchaotic system for encryption purposes which shall offer a high level of security due to its complex and unpredictable dynamics with multiple positive Lyapunov exponents. This system can potentially enhance the encryption process for 3D objects and medical images, ensuring the protection of sensitive data and preventing unauthorized access. A hyperchaotic system is a type of dynamical system characterized by exhibiting more than one positive Lyapunov exponent, which indicates strong sensitivity to initial conditions. These systems have more degrees of freedom and complex and intricate dynamics compared to standard chaotic systems. The security of the encryption scheme depends on the complexity of the hyperchaotic system and the randomness of the secret key. The parameters of a 6D hyperchaotic system shall be used as an encryption key with six dimensions, each with its range of values, and shall provide many possible keys. In this work, we implemented a 6D hyperchaotic system for the encryption of the 3D printed model and medical images. The performance evaluation was done by metrics entropy, correlation, Number of Pixels Change Rate (NPCR), and Unified Averaged Changed Intensity (UACI) which revealed the robustness of the encryption model in ensuring security. Hyperchaotic systems can be efficiently implemented in parallel computing architectures, which allow faster encryption and decryption processes.
Title: 6D Hyperchaotic Encryption Model for Ensuring Security to 3D Printed Models and Medical Images
Description:
In the 6G era, where ultra-fast and reliable communication is expected to be ubiquitous, encryption shall continue to play a crucial role in ensuring the security and privacy of data.
Encryption and decryption of medical images and 3D printed models using 6D hyperchaotic function is proposed in this research work for ensuring security in data transfer.
Here we envisage using a six-dimensional hyperchaotic system for encryption purposes which shall offer a high level of security due to its complex and unpredictable dynamics with multiple positive Lyapunov exponents.
This system can potentially enhance the encryption process for 3D objects and medical images, ensuring the protection of sensitive data and preventing unauthorized access.
A hyperchaotic system is a type of dynamical system characterized by exhibiting more than one positive Lyapunov exponent, which indicates strong sensitivity to initial conditions.
These systems have more degrees of freedom and complex and intricate dynamics compared to standard chaotic systems.
The security of the encryption scheme depends on the complexity of the hyperchaotic system and the randomness of the secret key.
The parameters of a 6D hyperchaotic system shall be used as an encryption key with six dimensions, each with its range of values, and shall provide many possible keys.
In this work, we implemented a 6D hyperchaotic system for the encryption of the 3D printed model and medical images.
The performance evaluation was done by metrics entropy, correlation, Number of Pixels Change Rate (NPCR), and Unified Averaged Changed Intensity (UACI) which revealed the robustness of the encryption model in ensuring security.
Hyperchaotic systems can be efficiently implemented in parallel computing architectures, which allow faster encryption and decryption processes.
Related Results
Optimization Research of Hyperchaotic Model-Driven Encryption Algorithm in Network Security
Optimization Research of Hyperchaotic Model-Driven Encryption Algorithm in Network Security
In the context of the rapid advancement of global informatization, network security is facing unprecedented challenges, among which encryption technology, as the core means to ensu...
Dual Chaotic Diffusion Framework for Multimodal Biometric Security Using Qi Hyperchaotic System
Dual Chaotic Diffusion Framework for Multimodal Biometric Security Using Qi Hyperchaotic System
The proliferation of biometric technology across various domains including user identification, financial services, healthcare, security, law enforcement, and border control introd...
Quantum Key Distribution-Assisted Image Encryption Using 7D and 2D Hyperchaotic Systems
Quantum Key Distribution-Assisted Image Encryption Using 7D and 2D Hyperchaotic Systems
Secure image transmission is increasingly vital in the digital era, especially against emerging quantum threats. This study proposes a hybrid image encryption scheme that integrate...
Chaotic Encryption Scheme for Double Grayscale Images using Sprott B Hyperchaotic Map
Chaotic Encryption Scheme for Double Grayscale Images using Sprott B Hyperchaotic Map
Image encryption become more significant since most of our data are communicated and stored as digital image form. To warrant high confidentiality, cipher image must be the produce...
RSA vs Quantum Encryption: Flexibility, Security, and Performance Analysis for Information Processing
RSA vs Quantum Encryption: Flexibility, Security, and Performance Analysis for Information Processing
Introduction: With the advent of quantum computing, traditional encryption methods face significant challenges in maintaining security. This study explores quantum information proc...
Segmented encryption algorithm for privacy and net neutrality in distributed cloud systems
Segmented encryption algorithm for privacy and net neutrality in distributed cloud systems
The advent of distributed cloud systems has revolutionized data storage and access, providing flexibility and scalability across various industries. However, these benefits come wi...
Automatic Selective Encryption of DICOM Images
Automatic Selective Encryption of DICOM Images
Securing DICOM images is essential to protect the privacy of patients, especially in the era of telemedicine and eHealth/mHealth. This increases the demand for rapid security. Neve...
Research on Video Encryption Technology Based on Cross Coupled Map Lattices System
Research on Video Encryption Technology Based on Cross Coupled Map Lattices System
<p>The traditional video encryption algorithm only encrypts video images, which has the problems of an extended time-consuming algorithm and poor format retention. To improve...

