A Novel Parallel Computing Confidentiality Scheme Based on Hindmarsh-Rose Model

被引:0
|
作者
Ahmad, Jawad [1 ]
Al Qathrady, Mimonah [2 ]
Alshehri, Mohammed S. [3 ]
Ghadi, Yazeed Yasin [4 ]
Rehman, Mujeeb Ur [5 ]
Shah, Syed Aziz [6 ]
机构
[1] Edinburgh Napier Univ, Sch Comp Engn & Built Environm, Edinburgh EH10 5DT, Scotland
[2] Najran Univ, Dept Informat Syst, Coll Comp Sci & Informat Syst, Najran 61441, Saudi Arabia
[3] Najran Univ, Dept Comp Sci, Coll Comp Sci & Informat Syst, Najran 61441, Saudi Arabia
[4] Al Ain Univ, Dept Comp Sci, Abu Dhabi 112612, U Arab Emirates
[5] York St John Univ, Sch Sci Technol & Hlth, York YO31 7EX, England
[6] Coventry Univ, Res Ctr Intelligent Healthcare, Coventry CV1 5FB, England
来源
CMC-COMPUTERS MATERIALS & CONTINUA | 2023年 / 76卷 / 02期
关键词
Hindmarsh-rose model; image encryption; SHA-256; parallel computing; CHAOTIC SYSTEM; IMAGE; MAP;
D O I
10.32604/cmc.2023.040858
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Due to the inherent insecure nature of the Internet, it is crucial to ensure the secure transmission of image data over this network. Additionally, given the limitations of computers, it becomes even more important to employ efficient and fast image encryption techniques. While 1D chaotic maps offer a practical approach to real-time image encryption, their limited flexibility and increased vulnerability restrict their practical application. In this research, we have utilized a 3D Hindmarsh-Rose model to construct a secure cryptosystem. The randomness of the chaotic map is assessed through standard analysis. The proposed system enhances security by incorporating an increased number of system parameters and a wide range of chaotic parameters, as well as ensuring a uniform distribution of chaotic signals across the entire value space. Additionally, a fast image encryption technique utilizing the new chaotic system is proposed. The novelty of the approach is confirmed through time complexity analysis. To further strengthen the resistance against cryptanalysis attacks and differential attacks, the SHA-256 algorithm is employed for secure key generation. Experimental results through a number of parameters demonstrate the strong cryptographic performance of the proposed image encryption approach, highlighting its exceptional suitability for secure communication. Moreover, the security of the proposed scheme has been compared with state-of-the-art image encryption schemes, and all comparison metrics indicate the superior performance of the proposed scheme.
引用
收藏
页码:1325 / 1341
页数:17
相关论文
共 50 条
  • [21] Global exponentially synchronization of Hindmarsh-Rose neuron model
    Jia, Qiu-Ju
    Chen, Zeng-Qiang
    Jilin Daxue Xuebao (Gongxueban)/Journal of Jilin University (Engineering and Technology Edition), 2011, 41 (SUPPL. 1): : 235 - 239
  • [22] Spatiotemporal Patterns in a General Networked Hindmarsh-Rose Model
    Zheng, Qianqian
    Shen, Jianwei
    Zhang, Rui
    Guan, Linan
    Xu, Yong
    FRONTIERS IN PHYSIOLOGY, 2022, 13
  • [23] Resonances and noise in a stochastic Hindmarsh-Rose model of thalamic neurons
    Reinker, S
    Puil, E
    Miura, RM
    BULLETIN OF MATHEMATICAL BIOLOGY, 2003, 65 (04) : 641 - 663
  • [24] Observation of a continuous interior crisis in the Hindmarsh-Rose neuron model
    González-Miranda, JM
    CHAOS, 2003, 13 (03) : 845 - 852
  • [25] Global dynamics analysis of a Filippov Hindmarsh-Rose neuron model
    Liu, Wenyan
    Qiao, Shuai
    Gao, Chenghua
    INTERNATIONAL JOURNAL OF MODERN PHYSICS B, 2022, 36 (27):
  • [26] BIFURCATION AND COMPARISON OF A DISCRETE-TIME HINDMARSH-ROSE MODEL
    Li, Yue
    Cao, Hongjun
    JOURNAL OF APPLIED ANALYSIS AND COMPUTATION, 2023, 13 (01): : 34 - 56
  • [27] Discrete Multiplierless Implementation of Fractional Order Hindmarsh-Rose Model
    Malik, S. A.
    Mir, A. H.
    IEEE TRANSACTIONS ON EMERGING TOPICS IN COMPUTATIONAL INTELLIGENCE, 2021, 5 (05): : 792 - 802
  • [28] Homoclinic organization in the Hindmarsh-Rose model: A three parameter study
    Barrio, Roberto
    Ibanez, Santiago
    Perez, Lucia
    CHAOS, 2020, 30 (05)
  • [29] Complex Data Analysis of the Hindmarsh-Rose Model at Specific Parameters
    Jia, Qiuju
    Chen, Zengqiang
    2010 8TH WORLD CONGRESS ON INTELLIGENT CONTROL AND AUTOMATION (WCICA), 2010, : 1963 - 1967
  • [30] Piecewise-linear approximation of the Hindmarsh-Rose neuron model
    Linaro, D.
    Bizzarri, F.
    Storace, M.
    INTERNATIONAL WORKSHOP ON MULTI-RATE PROCESSES AND HYSTERESIS, 2008, 138