scispace - formally typeset
Journal ArticleDOI

Impulsive synchronization of coupled delayed neural networks with actuator saturation and its application to image encryption

TLDR
In this paper, impulsive synchronization of coupled delayed neural networks with actuator saturation is presented and the proposed image encryption system has high security properties.
About
This article is published in Neural Networks.The article was published on 2020-08-01. It has received 69 citations till now. The article focuses on the topics: Actuator & Control theory.

read more

Citations
More filters
Journal ArticleDOI

Fractional-order double-ring erbium-doped fiber laser chaotic system and its application on image encryption

TL;DR: A fractional-order double-ring erbium-doped fiber laser chaotic system applied to the image encryption algorithm with the improved gravitation model has a good encryption effect and good security performance.
Journal ArticleDOI

A Novel Chaos-Based Color Image Encryption Scheme Using Bit-Level Permutation

TL;DR: This work proposes a novel bit-level permutation algorithm that contains a plain-image related rows and columns substitution, a pixel-level roll shift part, and a bit- level cyclic shift part that has good security performance and a speed advantage compared to other works.
Journal ArticleDOI

An Effective Chaos-Based Image Encryption Scheme Using Imitating Jigsaw Method

TL;DR: In this article, an efficient chaos-based image encryption scheme is proposed, which uses the imitating jigsaw method containing revolving and shifting operations, and there are three processes in encryption: preprocessing, encryption process, and postprocessing.
Journal ArticleDOI

An Efficient Plaintext-Related Chaotic Image Encryption Scheme Based on Compressive Sensing.

TL;DR: In this paper, a plaintext-related chaotic image encryption scheme is proposed based on compressive sensing for achieving the compression and encryption simultaneously, in which the internal keys for controlling the whole process of encryption and compression are first generated by plain image and initial key.
References
More filters
Journal ArticleDOI

Some basic cryptographic requirements for chaos-based cryptosystems

TL;DR: The suggested guidelines address three main issues: implementation, key management and security analysis, aiming at assisting designers of new cryptosystems to present their work in a more systematic and rigorous way to fulfill some basic cryptographic requirements.
Book

Control Systems with Actuator Saturation: Analysis and Design

Tingshu Hu, +1 more
TL;DR: In this article, a control system with actuator saturation analysis and design is presented, in which a control law is designed a priori to meet either the performance or stability requirement.
Journal ArticleDOI

Cryptographic requirements for chaotic secure communications

TL;DR: In this paper, the authors provide a set of guidelines that new cryptosystems would benefit from adhering to, such as correct key management and security analysis, and some practical aspects of communications such as channel noise, limited bandwith, and attenuation.
Journal ArticleDOI

Trunk-Branch Ensemble Convolutional Neural Networks for Video-Based Face Recognition

TL;DR: A Trunk-Branch Ensemble CNN model (TBE-CNN), which extracts complementary information from holistic face images and patches cropped around facial components, achieves state-of-the-art performance on three popular video face databases: PaSC, COX Face, and YouTube Faces.
Journal ArticleDOI

Dynamic Surface Control Using Neural Networks for a Class of Uncertain Nonlinear Systems With Input Saturation

TL;DR: The problem of explosion of complexity inherent in the conventional backstepping method is avoided and the ultimately bounded convergence of all closed-loop signals is guaranteed via Lyapunov analysis.
Related Papers (5)