1
|
Fan W, Li T, Wu J, Wu J. Chaotic Color Image Encryption Based on Eight-Base DNA-Level Permutation and Diffusion. ENTROPY (BASEL, SWITZERLAND) 2023; 25:1268. [PMID: 37761567 PMCID: PMC10529059 DOI: 10.3390/e25091268] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [Grants] [Track Full Text] [Subscribe] [Scholar Register] [Received: 06/28/2023] [Revised: 08/12/2023] [Accepted: 08/17/2023] [Indexed: 09/29/2023]
Abstract
Images, as a crucial information carrier in the era of big data, are constantly generated, stored, and transmitted. Determining how to guarantee the security of images is a hot topic in the information security community. Image encryption is a simple and direct approach for this purpose. In order to cope with this issue, we propose a novel scheme based on eight-base DNA-level permutation and diffusion, termed as EDPD, for color image encryption in this paper. The proposed EDPD integrates secure hash algorithm-512 (SHA-512), a four-dimensional hyperchaotic system, and eight-base DNA-level permutation and diffusion that conducts on one-dimensional sequences and three-dimensional cubes. To be more specific, the EDPD has four main stages. First, four initial values for the proposed chaotic system are generated from plaintext color images using SHA-512, and a four-dimensional hyperchaotic system is constructed using the initial values and control parameters. Second, a hyperchaotic sequence is generated from the four-dimensional hyperchaotic system for consequent encryption operations. Third, multiple permutation and diffusion operations are conducted on different dimensions with dynamic eight-base DNA-level encoding and algebraic operation rules determined via the hyperchaotic sequence. Finally, DNA decoding is performed in order to obtain the cipher images. Experimental results from some common testing images verify that the EDPD has excellent performance in color image encryption and can resist various attacks.
Collapse
Affiliation(s)
| | - Taiyong Li
- School of Computing and Artificial Intelligence, Southwestern University of Finance and Economics, Chengdu 611130, China
| | | | | |
Collapse
|
2
|
Yang N, Zhang S, Bai M, Li S. Medical Image Encryption Based on Josephus Traversing and Hyperchaotic Lorenz System. JOURNAL OF SHANGHAI JIAOTONG UNIVERSITY (SCIENCE) 2022; 29:1-18. [PMID: 36588800 PMCID: PMC9791633 DOI: 10.1007/s12204-022-2555-x] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Subscribe] [Scholar Register] [Received: 01/28/2022] [Accepted: 05/04/2022] [Indexed: 12/27/2022]
Abstract
This study proposes a new medical image encryption scheme based on Josephus traversing and hyperchaotic Lorenz system. First, a chaotic sequence is generated through hyperchaotic system. This hyperchaotic sequence is used in the scrambling and diffusion stages of the algorithm. Second, in the scrambling process, the image is initially confused by Josephus scrambling, and then the image is further confused by Arnold map. Finally, generated hyperchaos sequence and exclusive OR operation is used for the image to carry on the positive and reverse diffusion to change the pixel value of the image and further hide the effective information of the image. In addition, the information of the plaintext image is used to generate keys used in the algorithm, which increases the ability of resisting plaintext attack. Experimental results and security analysis show that the scheme can effectively hide plaintext image information according to the characteristics of medical images, and is resistant to common types of attacks. In addition, this scheme performs well in the experiments of robustness, which shows that the scheme can solve the problem of image damage in telemedicine. It has a positive significance for the future research.
Collapse
Affiliation(s)
- Na Yang
- School of Information Engineering, Chang’an University, Xi’an, 710064 China
| | - Shuxia Zhang
- School of Information Engineering, Chang’an University, Xi’an, 710064 China
| | - Mudan Bai
- School of Information Engineering, Chang’an University, Xi’an, 710064 China
| | - Shanshan Li
- School of Information Engineering, Chang’an University, Xi’an, 710064 China
| |
Collapse
|
3
|
Zheng J, Bao T. An Image Encryption Algorithm Using Cascade Chaotic Map and S-Box. ENTROPY (BASEL, SWITZERLAND) 2022; 24:e24121827. [PMID: 36554231 PMCID: PMC9777660 DOI: 10.3390/e24121827] [Citation(s) in RCA: 2] [Impact Index Per Article: 1.0] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Subscribe] [Scholar Register] [Received: 11/08/2022] [Revised: 12/05/2022] [Accepted: 12/12/2022] [Indexed: 06/01/2023]
Abstract
This paper proposed an image algorithm based on a cascaded chaotic system to improve the performance of the encryption algorithm. Firstly, this paper proposed an improved cascaded two-dimensional map 2D-Cosine-Logistic-Sine map (2D-CLSM). Cascade chaotic system offers good advantages in terms of key space, complexity and sensitivity to initial conditions. By using the control parameters and initial values associated with the plaintext, the system generates two chaotic sequences associated with the plaintext image. Then, an S-box construction method is proposed, and an encryption method is designed based on the S-box. Encryption is divided into bit-level encryption and pixel-level encryption, and a diffusion method was devised to improve security and efficiency in bit-level encryption. Performance analysis shows that the encryption algorithm has good security and is easily resistant to various attacks.
Collapse
Affiliation(s)
- Jiming Zheng
- College of Computer Science and Technology, Chongqing University of Posts and Telecommunications, Chongqing 400065, China
- Key Laboratory of Intelligent Analysis and Decision on Complex Systems, Chongqing University of Posts and Telecommunications, Chongqing 400065, China
| | - Tianyu Bao
- College of Computer Science and Technology, Chongqing University of Posts and Telecommunications, Chongqing 400065, China
| |
Collapse
|
4
|
Jia J, Liu L, Liang Y, Han Z, Wang X. Chaotic Mapping-Based Anti-Sorting Radio Frequency Stealth Signals and Compressed Sensing-Based Echo Signal Processing Technology. ENTROPY (BASEL, SWITZERLAND) 2022; 24:1559. [PMID: 36359648 PMCID: PMC9689734 DOI: 10.3390/e24111559] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Figures] [Subscribe] [Scholar Register] [Received: 08/18/2022] [Revised: 09/24/2022] [Accepted: 10/26/2022] [Indexed: 06/16/2023]
Abstract
Radio frequency (RF) stealth anti-sorting technology can improve the battlefield survival rate of radar and is one of the research hotspots in the radar field. In this study, the signal design principle of anti-sequential difference histogram (SDIF) sorting was explored for the main sorting algorithm of the SDIF. Furthermore, we designed a piecewise linear chaotic system with interval number parameterization based on random disturbance and proposed a method to modulate the repetition period of widely spaced signal pulses using a chaotic system. Then, considering the difficulty of the traditional signal processing method to measure the velocity of the highly random anti-sorting signals designed in this paper, we used compressed sensing (CS) technology to process the echoes of the signals to solve the velocity and distance of the detection targets. Finally, simulation verification was performed from the correctness of the signal design principle, the performance of the chaotic system, the anti-sorting performance of the designed signals and the recovery and reconstruction performance of the signals by CS. The results show that: (a) the signal design principle presented in this paper can guide the signal design correctly; (b) the performance of the piecewise linear chaotic system with interval number parameterization is better than that of the classical one-dimensional chaotic system; (c) the anti-sorting signal modulated by the chaotic system can achieve anti-SDIF sorting, and the anti-sorting signals designed in this paper can be processed to obtain the velocity and distance of the targets.
Collapse
Affiliation(s)
- Jinwei Jia
- Shijiazhuang Campus, Army Engineering University, Shijiazhuang 050003, China
| | - Limin Liu
- Shijiazhuang Campus, Army Engineering University, Shijiazhuang 050003, China
| | - Yuying Liang
- School of Aerospace Engineering, Nanchang Institute of Technology, Nanchang 330000, China
| | - Zhuangzhi Han
- Shijiazhuang Campus, Army Engineering University, Shijiazhuang 050003, China
| | - Xuetian Wang
- School of Information and Electronics, Beijing Institute of Technology, Beijing 100081, China
| |
Collapse
|
5
|
Jia J, Han Z, Liang Y, Liu L, Wang X. Design of Multi-Parameter Compound Modulated RF Stealth Anti-Sorting Signals Based on Hyperchaotic Interleaving Feedback. ENTROPY (BASEL, SWITZERLAND) 2022; 24:1283. [PMID: 36141169 PMCID: PMC9498127 DOI: 10.3390/e24091283] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Figures] [Subscribe] [Scholar Register] [Received: 08/03/2022] [Revised: 08/28/2022] [Accepted: 09/05/2022] [Indexed: 06/16/2023]
Abstract
Radio frequency (RF) stealth anti-sorting technology is a research hotspot in the radar field. In this study, the signal design principles of anti-cluster and anti-SDIF sorting were investigated for processes of clustering pre-sorting and sequence-difference-histogram main sorting. Then, in accordance with the signal design principle, a 2D interleaving feedback hyperchaotic system based on the cosine-exponential was designed. A method to modulate the pulse repetition interval (PRI) of the signal parameters and carrier frequency with wide intervals through the hyperchaotic system was developed. Finally, we verified the correctness of the signal design principle, the performance of the hyperchaotic system, and the anti-sorting performance of the designed signal using simulations. The results showed that the signal design principle could guide the signal design. The hyperchaotic system outperformed the classical 1D and 2D chaotic systems and the classical 3D Lorenz systems in terms of randomness and complexity. Anti-cluster sorting and anti-SDIF sorting could be realized by anti-sorting signals modulated by a hyperchaotic system, with the anti-SDIF sorting performance being better than that of the PRI random jitter signal.
Collapse
Affiliation(s)
- Jinwei Jia
- Shijiazhuang Campus, Army Engineering University, Shijiazhuang 050003, China
| | - Zhuangzhi Han
- Shijiazhuang Campus, Army Engineering University, Shijiazhuang 050003, China
| | - Yuying Liang
- School of Aerospace Engineering, Nanchang Institute of Technology, Nanchang 330000, China
| | - Limin Liu
- Shijiazhuang Campus, Army Engineering University, Shijiazhuang 050003, China
| | - Xuetian Wang
- School of Information and Electronics, Beijing Institute of Technology, Beijing 100081, China
| |
Collapse
|
6
|
Mohamed NAES, Youssif A, El-Sayed HAG. Fast and Robust Image Encryption Scheme Based on Quantum Logistic Map and Hyperchaotic System. COMPLEXITY 2022; 2022:1-20. [DOI: 10.1155/2022/3676265] [Citation(s) in RCA: 1] [Impact Index Per Article: 0.5] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 09/01/2023]
Abstract
Topic of quantum chaos has begun to draw increasing attention in recent years. So, to ensure the security of digital image, an image encryption algorithm based on combining a hyperchaotic system and quantum 3D logistic map is proposed. This algorithm is applied in four stages. Initially, the key generator builds upon the foundation of mean for any row or column of the edges of the plain image. Its output value is used to yield initial conditions and parameters of the proposed image encryption scheme. Next, it diffuses the plain image by the random sequences generated by 3D hyperchaotic system, and the diffusion process is realized by implementing XOR operation. Then, the diffused image and chaotic sequences are produced by the 3D quantum chaotic logistic map, expressed as a quantum superposition state using density matrix which is a representation of the state of a quantum system, and finally the resulting quantum image is then confused and diffused simultaneously by a unitary matrix generated by logistic chaos using XNOR operation to obtain the final cipher image. Because of the dependence on the plain image, the algorithm can frustrate the chosen-plaintext and known-plaintext attacks. Simulation results and theoretical analysis verify that the presented scheme has high safety performance, a good encryption effect, and a large key space. The method can effectively resist exhaustive, statistical, and differential attacks. Moreover, the encryption time of the proposed method is satisfactory, and the method can be efficiently used in practice for the secure transmission of image information.
Collapse
Affiliation(s)
- Nehal Abd El-Salam Mohamed
- College of Information Technology, Misr University for Science & Technology (MUST), 6th of October City 77, Egypt
| | - Aliaa Youssif
- College of Computing and Information Technology, Arab Academy for Science, Technology and Maritime Transport, Smart Village 12577, Egypt
| | - Hala Abdel-Galil El-Sayed
- College of Computers and Artificial Intelligence, Helwan University, Ain Helwan (Helwan University Building), Helwan 11795, Egypt
| |
Collapse
|
7
|
Kaur M, Singh D, Kumar V. Improved seven-dimensional (i7D) hyperchaotic map-based image encryption technique. Soft comput 2022. [DOI: 10.1007/s00500-022-06841-2] [Citation(s) in RCA: 1] [Impact Index Per Article: 0.5] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 10/19/2022]
|
8
|
Kaur M, Singh D, Kumar V. Improved seven-dimensional (i7D) hyperchaotic map-based image encryption technique. Soft comput 2022. [DOI: 10.1007/s00500-021-06423-8] [Citation(s) in RCA: 1] [Impact Index Per Article: 0.5] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 10/19/2022]
|
9
|
Wu J, Zheng Y, Wang B, Zhang Q. Enhancing Physical and Thermodynamic Properties of DNA Storage Sets with End-constraint. IEEE Trans Nanobioscience 2021; 21:184-193. [PMID: 34662278 DOI: 10.1109/tnb.2021.3121278] [Citation(s) in RCA: 10] [Impact Index Per Article: 3.3] [Reference Citation Analysis] [Abstract] [MESH Headings] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/09/2022]
Abstract
With the explosion of data, DNA is considered as an ideal carrier for storage due to its high storage density. However, low-quality DNA sets hamper the widespread use of DNA storage. This work proposes a new method to design high-quality DNA storage sets. Firstly, random switch and double-weight offspring strategies are introduced in Double-strategy Black Widow Optimization Algorithm (DBWO). Experimental results of 26 benchmark functions show that the exploration and exploitation abilities of DBWO are greatly improved from previous work. Secondly, DBWO is applied in designing DNA storage sets, and compared with previous work, the lower bounds of storage sets are boosted by 9%-37%. Finally, to improve the poor stabilities of sequences, the End-constraint is proposed in designing DNA storage sets. By measuring the number of hairpin structures, melting temperature, and minimum free energy, it is evaluated that with our innovative constraint, DBWO can construct not only a larger number of storage sets, but also enhance physical and thermodynamic properties of DNA storage sets.
Collapse
|
10
|
Olvera-Martinez L, Jimenez-Borgonio T, Frias-Carmona T, Abarca-Rodriguez M, Diaz-Rodriguez C, Cedillo-Hernandez M, Nakano-Miyatake M, Perez-Meana H. First SN P visual cryptographic circuit with astrocyte control of structural plasticity for security applications. Neurocomputing 2021. [DOI: 10.1016/j.neucom.2021.05.057] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 10/21/2022]
|
11
|
Shi Y, Hu Y, Wang B. Image Encryption Scheme Based on Multiscale Block Compressed Sensing and Markov Model. ENTROPY (BASEL, SWITZERLAND) 2021; 23:1297. [PMID: 34682021 PMCID: PMC8534541 DOI: 10.3390/e23101297] [Citation(s) in RCA: 5] [Impact Index Per Article: 1.7] [Reference Citation Analysis] [Abstract] [Key Words] [Grants] [Track Full Text] [Download PDF] [Figures] [Subscribe] [Scholar Register] [Received: 09/01/2021] [Revised: 09/23/2021] [Accepted: 09/26/2021] [Indexed: 11/25/2022]
Abstract
Many image encryption schemes based on compressed sensing have the problem of poor quality of decrypted images. To deal with this problem, this paper develops an image encryption scheme by multiscale block compressed sensing. The image is decomposed by a three-level wavelet transform, and the sampling rates of coefficient matrices at all levels are calculated according to multiscale block compressed sensing theory and the given compression ratio. The first round of permutation is performed on the internal elements of the coefficient matrices at all levels. Then the coefficient matrix is compressed and combined. The second round of permutation is performed on the combined matrix based on the state transition matrix. Independent diffusion and forward-backward diffusion between pixels are used to obtain the final cipher image. Different sampling rates are set by considering the difference of information between an image's low- and high-frequency parts. Therefore, the reconstruction quality of the decrypted image is better than that of other schemes, which set one sampling rate on an entire image. The proposed scheme takes full advantage of the randomness of the Markov model and shows an excellent encryption effect to resist various attacks.
Collapse
Affiliation(s)
| | | | - Bin Wang
- The Key Laboratory of Advanced Design and Intelligent Computing, Ministry of Education, School of Software Engineering, Dalian University, Dalian 116622, China; (Y.S.); (Y.H.)
| |
Collapse
|
12
|
Xiaoru L, Ling G. Combinatorial constraint coding based on the EORS algorithm in DNA storage. PLoS One 2021; 16:e0255376. [PMID: 34324571 PMCID: PMC8320985 DOI: 10.1371/journal.pone.0255376] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [MESH Headings] [Grants] [Track Full Text] [Download PDF] [Figures] [Journal Information] [Subscribe] [Scholar Register] [Received: 03/10/2021] [Accepted: 07/15/2021] [Indexed: 11/19/2022] Open
Abstract
The development of information technology has produced massive amounts of data, which has brought severe challenges to information storage. Traditional electronic storage media cannot keep up with the ever-increasing demand for data storage, but in its place DNA has emerged as a feasible storage medium with high density, large storage capacity and strong durability. In DNA data storage, many different approaches can be used to encode data into codewords. DNA coding is a key step in DNA storage and can directly affect storage performance and data integrity. However, since errors are prone to occur in DNA synthesis and sequencing, and non-specific hybridization is prone to occur in the solution, how to effectively encode DNA has become an urgent problem to be solved. In this article, we propose a DNA storage coding method based on the equilibrium optimization random search (EORS) algorithm, which meets the Hamming distance, GC content and no-runlength constraints and can reduce the error rate in storage. Simulation experiments have shown that the size of the DNA storage code set constructed by the EORS algorithm that meets the combination constraints has increased by an average of 11% compared with previous work. The increase in the code set means that shorter DNA chains can be used to store more data.
Collapse
Affiliation(s)
- Li Xiaoru
- Hulunbeier Vocational and Technical College, Hulunbeier, Inner Mongolia, China
| | - Guo Ling
- Baidu Co., Ltd., Shanghai, China
| |
Collapse
|
13
|
Li X, Wei Z, Wang B, Song T. Stable DNA Sequence Over Close-Ending and Pairing Sequences Constraint. Front Genet 2021; 12:644484. [PMID: 34079580 PMCID: PMC8165483 DOI: 10.3389/fgene.2021.644484] [Citation(s) in RCA: 2] [Impact Index Per Article: 0.7] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Download PDF] [Figures] [Journal Information] [Subscribe] [Scholar Register] [Received: 12/21/2020] [Accepted: 04/12/2021] [Indexed: 11/15/2022] Open
Abstract
DNA computing is a new method based on molecular biotechnology to solve complex problems. The design of DNA sequences is a multi-objective optimization problem in DNA computing, whose objective is to obtain optimized sequences that satisfy multiple constraints to improve the quality of the sequences. However, the previous optimized DNA sequences reacted with each other, which reduced the number of DNA sequences that could be used for molecular hybridization in the solution and thus reduced the accuracy of DNA computing. In addition, a DNA sequence and its complement follow the principle of complementary pairing, and the sequence of base GC at both ends is more stable. To optimize the above problems, the constraints of Pairing Sequences Constraint (PSC) and Close-ending along with the Improved Chaos Whale (ICW) optimization algorithm were proposed to construct a DNA sequence set that satisfies the combination of constraints. The ICW optimization algorithm is added to a new predator–prey strategy and sine and cosine functions under the action of chaos. Compared with other algorithms, among the 23 benchmark functions, the new algorithm obtained the minimum value for one-third of the functions and two-thirds of the current minimum value. The DNA sequences satisfying the constraint combination obtained the minimum of fitness values and had stable and usable structures.
Collapse
Affiliation(s)
- Xue Li
- The Key Laboratory of Advanced Design and Intelligent Computing, Ministry of Education, School of Software Engineering, Dalian University, Dalian, China
| | - Ziqi Wei
- School of Software, Tsinghua University, Beijing, China
| | - Bin Wang
- The Key Laboratory of Advanced Design and Intelligent Computing, Ministry of Education, School of Software Engineering, Dalian University, Dalian, China
| | - Tao Song
- College of Computer and Communication Engineering, China University of Petroleum, Qingdao, China
| |
Collapse
|
14
|
Zheng Y, Wu J, Wang B. CLGBO: An Algorithm for Constructing Highly Robust Coding Sets for DNA Storage. Front Genet 2021; 12:644945. [PMID: 34017354 PMCID: PMC8129200 DOI: 10.3389/fgene.2021.644945] [Citation(s) in RCA: 4] [Impact Index Per Article: 1.3] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Download PDF] [Figures] [Journal Information] [Subscribe] [Scholar Register] [Received: 12/22/2020] [Accepted: 04/08/2021] [Indexed: 11/22/2022] Open
Abstract
In the era of big data, new storage media are urgently needed because the storage capacity for global data cannot meet the exponential growth of information. Deoxyribonucleic acid (DNA) storage, where primer and address sequences play a crucial role, is one of the most promising storage media because of its high density, large capacity and durability. In this study, we describe an enhanced gradient-based optimizer that includes the Cauchy and Levy mutation strategy (CLGBO) to construct DNA coding sets, which are used as primer and address libraries. Our experimental results show that the lower bounds of DNA storage coding sets obtained using the CLGBO algorithm are increased by 4.3–13.5% compared with previous work. The non-adjacent subsequence constraint was introduced to reduce the error rate in the storage process. This helps to resolve the problem that arises when consecutive repetitive subsequences in the sequence cause errors in DNA storage. We made use of the CLGBO algorithm and the non-adjacent subsequence constraint to construct larger and more highly robust coding sets.
Collapse
Affiliation(s)
- Yanfen Zheng
- The Key Laboratory of Advanced Design and Intelligent Computing, Ministry of Education, School of Software Engineering, Dalian University, Dalian, China
| | - Jieqiong Wu
- The Key Laboratory of Advanced Design and Intelligent Computing, Ministry of Education, School of Software Engineering, Dalian University, Dalian, China
| | - Bin Wang
- The Key Laboratory of Advanced Design and Intelligent Computing, Ministry of Education, School of Software Engineering, Dalian University, Dalian, China
| |
Collapse
|
15
|
Chen C, Wu R, Wang B. Development of a neuron model based on DNAzyme regulation. RSC Adv 2021; 11:9985-9994. [PMID: 35423534 PMCID: PMC8695483 DOI: 10.1039/d0ra10515e] [Citation(s) in RCA: 2] [Impact Index Per Article: 0.7] [Reference Citation Analysis] [Abstract] [Grants] [Track Full Text] [Download PDF] [Figures] [Journal Information] [Subscribe] [Scholar Register] [Received: 12/14/2020] [Accepted: 03/02/2021] [Indexed: 12/25/2022] Open
Abstract
Neural networks based on DNA molecular circuits play an important role in molecular information processing and artificial intelligence systems. In fact, some DNA molecular systems can become dynamic units with the assistance of DNAzymes. The complex DNA circuits can spontaneously induce corresponding feedback behaviors when their inputs changed. However, most of the reported DNA neural networks have been implemented by the toehold-mediated strand displacement (TMSD) method. Therefore, it was important to develop a method to build a neural network utilizing the TMSD mechanism and adding a mechanism to account for modulation by DNAzymes. In this study, we designed a model of a DNA neuron controlled by DNAzymes. We proposed an approach based on the DNAzyme modulation of neuronal function, combing two reaction mechanisms: DNAzyme digestion and TMSD. Using the DNAzyme adjustment, each component simulating the characteristics of neurons was constructed. By altering the input and weight of the neuron model, we verified the correctness of the computational function of the neurons. Furthermore, in order to verify the application potential of the neurons in specific functions, a voting machine was successfully implemented. The proposed neuron model regulated by DNAzymes was simple to construct and possesses strong scalability, having great potential for use in the construction of large neural networks.
Collapse
Affiliation(s)
- Cong Chen
- Key Laboratory of Advanced Design and Intelligent Computing, Ministry of Education, School of Software Engineering, Dalian University Dalian 116622 China
| | - Ranfeng Wu
- School of Computer Science and Technology, Dalian University of Technology Dalian 116024 China
| | - Bin Wang
- Key Laboratory of Advanced Design and Intelligent Computing, Ministry of Education, School of Software Engineering, Dalian University Dalian 116622 China
| |
Collapse
|
16
|
Implementing a Symmetric Lightweight Cryptosystem in Highly Constrained IoT Devices by Using a Chaotic S-Box. Symmetry (Basel) 2021. [DOI: 10.3390/sym13010129] [Citation(s) in RCA: 25] [Impact Index Per Article: 8.3] [Reference Citation Analysis] [Abstract] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/16/2022] Open
Abstract
In the Internet of Things (IoT), a lot of constrained devices are interconnected. The data collected from those devices can be the target of cyberattacks. In this paper, a lightweight cryptosystem that can be efficiently implemented in highly constrained IOT devices is proposed. The algorithm is mainly based on Advanced Encryption Standard (AES) and a new chaotic S-box. Since its adoption by the IEEE 802.15.4 protocol, AES in embedded platforms have been increasingly used. The main cryptographic properties of the generated S-box have been validated. The randomness of the generated S-box has been confirmed by the NIST tests. Experimental results and security analysis demonstrated that the cryptosystem can, on the one hand, reach good encryption results and respects the limitation of the sensor’s resources, on the other hand. So the proposed solution could be reliably applied in image encryption and secure communication between networked smart objects.
Collapse
|