Sign in to use this feature.

Years

Between: -

Subjects

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Journals

Article Types

Countries / Regions

Search Results (33)

Search Parameters:
Keywords = plane permutation

Order results
Result details
Results per page
Select all
Export citation of selected articles as:
36 pages, 423 KB  
Article
Geometric Realization of Triality via Octonionic Vector Fields
by Álvaro Antón-Sancho
Symmetry 2025, 17(9), 1414; https://doi.org/10.3390/sym17091414 - 1 Sep 2025
Viewed by 174
Abstract
In this paper, we investigate the geometric realization of Spin(8) triality through vector fields on the octonionic algebra O. The triality automorphism group of Spin(8), isomorphic to S3, cyclically permutes the three inequivalent [...] Read more.
In this paper, we investigate the geometric realization of Spin(8) triality through vector fields on the octonionic algebra O. The triality automorphism group of Spin(8), isomorphic to S3, cyclically permutes the three inequivalent 8-dimensional representations: the vector representation V and the spinor representations S+ and S. While triality automorphisms are well known through representation theory, their concrete geometric realization as flows on octonionic space has remained unexplored. We construct explicit smooth vector fields Xσ and Xσ2 on OR8 whose flows generate infinitesimal triality transformations. These vector fields have a linear structure arising from skew-symmetric matrices that implement simultaneous rotations in three orthogonal coordinate planes, providing the first elementary geometric description of triality symmetry. The main results establish that these vector fields preserve the octonionic multiplication structure up to automorphisms in G2=Aut(O), demonstrating fundamental compatibility between geometric flows and octonionic algebra. We prove that the standard Euclidean metric on O is triality-invariant and classify all triality-invariant Riemannian metrics as conformal to the Euclidean metric with a conformal factor depending only on the isotonic norm. This classification employs Schur’s lemma applied to the irreducible Spin(8) action, revealing the rigidity imposed by triality symmetry. We provide a complete classification of triality-symmetric minimal surfaces, showing they are locally isometric to totally geodesic planes, surfaces of revolution about triality-fixed axes, or surfaces generated by triality orbits of geodesic curves. This trichotomy reflects the threefold triality symmetry and establishes correspondence between representation-theoretic decomposition and geometric surface types. For complete surfaces with finite total curvature, we establish global classification and develop explicit Weierstrass-type representations adapted to triality symmetry. Full article
(This article belongs to the Special Issue Symmetry and Lie Algebras)
33 pages, 11180 KB  
Article
New Permutation-Free Quantum Circuits for Implementing 3- and 4-Qubit Unitary Operations
by Artyom M. Grigoryan
Information 2025, 16(7), 621; https://doi.org/10.3390/info16070621 - 21 Jul 2025
Cited by 1 | Viewed by 529
Abstract
The article presents the quantum signal-induced heap transform (QsiHT) method of the QR-decomposition of multi-qubit operations. This transform can be generated by a given signal, by using different paths, or orders, of processing the data. We propose using the concept of the fast [...] Read more.
The article presents the quantum signal-induced heap transform (QsiHT) method of the QR-decomposition of multi-qubit operations. This transform can be generated by a given signal, by using different paths, or orders, of processing the data. We propose using the concept of the fast path of calculation of the QsiHT and applying such transforms on each stage of the matrix decomposition. This allows us to build quantum circuits for multi-qubit unitary operation without permutations. Unitary operations with real and complex matrices are considered. The cases of 3- and 4-qubit operations are described in detail with quantum circuits. These circuits use a maximum of 28 and 120 Givens rotation gates for 3- and 4-qubit real operations, respectively. All rotations are performing only on adjacent bit planes. For complex unitary operation, each of the Givens gates is used in pairs with two Z-rotation gates. These two types of rotations and the global phase gate are the universal gate set for multi-qubit operations. The presented approach can be used for implementing quantum circuits for n-qubits when n2, with a maximum of (4n/22n1) Givens rotations and no permutations. Full article
Show Figures

Graphical abstract

19 pages, 2729 KB  
Article
Social Image Security with Encryption and Watermarking in Hybrid Domains
by Conghuan Ye, Shenglong Tan, Jun Wang, Li Shi, Qiankun Zuo and Wei Feng
Entropy 2025, 27(3), 276; https://doi.org/10.3390/e27030276 - 6 Mar 2025
Cited by 8 | Viewed by 1100
Abstract
In this digital era, social images are the most vital information carrier on multimedia social platforms. More and more users are interested in sharing social images with mobile terminals on multimedia social platforms. Social image sharing also faces potential risks from malicious use, [...] Read more.
In this digital era, social images are the most vital information carrier on multimedia social platforms. More and more users are interested in sharing social images with mobile terminals on multimedia social platforms. Social image sharing also faces potential risks from malicious use, such as illegal sharing, piracy, and misappropriation. This paper mainly concentrates on secure social image sharing. To address how to share social images in a safe way, a social image security scheme is proposed. The technology addresses the social image security problem and the active tracing problem. First, discrete wavelet transform (DWT) is performed directly from the JPEG image. Then, the high-bit planes of the LL, LH, and HL are permuted with cellular automation (CA), bit-XOR, and singular value decomposition (SVD) computing, and their low-bit planes are chosen to embed a watermark. In the end, the encrypted and watermarked image is again permuted with cellular automation in the discrete cosine transform (DCT) domain. Experimental results and security analysis show that the social image security method not only has good performance in robustness, security, and time complexity but can also actively trace the illegal distribution of social images. The proposed social image security method can provide double-level security for multimedia social platforms. Full article
(This article belongs to the Section Multidisciplinary Applications)
Show Figures

Figure 1

14 pages, 1056 KB  
Article
Spatio-Temporal Analysis of Acute Myocardial Ischaemia Based on Entropy–Complexity Plane
by Esteban R. Valverde, Victoria Vampa, Osvaldo A. Rosso and Pedro D. Arini
Entropy 2025, 27(1), 8; https://doi.org/10.3390/e27010008 - 26 Dec 2024
Cited by 1 | Viewed by 759
Abstract
Myocardial ischaemia is a decompensation of the oxygen supply and demand ratio, often caused by coronary atherosclerosis. During the initial stage of ischaemia, the electrical activity of the heart is disrupted, increasing the risk of malignant arrhythmias. The aim of this study is [...] Read more.
Myocardial ischaemia is a decompensation of the oxygen supply and demand ratio, often caused by coronary atherosclerosis. During the initial stage of ischaemia, the electrical activity of the heart is disrupted, increasing the risk of malignant arrhythmias. The aim of this study is to understand the differential behaviour of the ECG during occlusion of both the left anterior descending (LAD) and right anterior coronary artery (RCA), respectively, using spatio-temporal quantifiers from information theory. A standard 12-lead ECG was recorded for each patient in the database. The control condition was obtained initially. Then, a percutaneous transluminal coronary angioplasty procedure (PTCA), which encompassed the occlusion/reperfusion period, was performed. To evaluate information quantifiers, the Bandt and Pompe permutation method was used to estimate the probability distribution associated with the electrocardiographic vector modulus. Subsequently, we analysed the positioning in the H×C causal plane for the control and ischaemia. In LAD occlusion, decreased entropy and increased complexity can be seen, i.e., the behaviour is more predictable with an increase in the degree of complexity of the system. RCA occlusion had the opposite effects, i.e., the phenomenon is less predictable and exhibits a lower degree of organisation. Finally, both entropy and complexity decrease during the reperfusion phase in LAD and RCA cases. Full article
Show Figures

Figure 1

16 pages, 9884 KB  
Article
In-Plane Compression Properties of Continuous Carbon-Fiber-Reinforced Composite Hybrid Lattice Structures by Additive Manufacturing
by Lingqi Jin, Jun Shi, Zhixin Chen, Zhiyang Wang, Yangfan Zhi, Lei Yang and Xinyi Xiao
Polymers 2024, 16(13), 1882; https://doi.org/10.3390/polym16131882 - 1 Jul 2024
Cited by 6 | Viewed by 2200
Abstract
Continuous-fiber-reinforced composite lattice structures (CFRCLSs) have garnered attention due to their lightweight and high-strength characteristics. Over the past two decades, many different topological structures including triangular, square, hexagonal, and circular units were investigated, and the basic mechanical responses of honeycomb structures under various [...] Read more.
Continuous-fiber-reinforced composite lattice structures (CFRCLSs) have garnered attention due to their lightweight and high-strength characteristics. Over the past two decades, many different topological structures including triangular, square, hexagonal, and circular units were investigated, and the basic mechanical responses of honeycomb structures under various load conditions, including tension, compression, buckling, shear, and fatigue were studied. To further improve the performance of the honeycombs, appropriate optimizations were also carried out. However, the mechanical properties of a single lattice often struggle to exceed the upper limit of its structure. This paper investigates the effect of permutation and hybrid mode on the mechanical properties of CFRCLSs by comparing five structures: rhomboid (R-type), octagon orthogonal array (OOA-type), octagon hypotenuse array (OHA-type), octagon nested array (ONA-type), and rhomboid circle (RC-type), with the conventional hexagonal structure (H-type). CFRCLS samples are fabricated using fused filament fabrication (FFF), with carbon-fiber-reinforced polylactic acid (PLA) as the matrix. The in-plane compression properties, energy absorption characteristics, and deformation behaviors of the hybrid structures were studied by experimental tests. The results demonstrate that different permutation and hybrid modes alter the deformation behaviors and mechanical properties of the structures. Taking elastic modulus as an example, the values of H-type, R-type, OOA-type, OHA-type, ONA-type, and RC-type are, respectively, 6.08 MPa, 5.76 MPa, 19.0 MPa, 10.3 MPa, 31.7 MPa, and 73.2 MPa, while the ratio of their masses is 1:1:1.10:1.52:1.66. Furthermore, hybrid lattice structures exhibit significantly improved mechanical properties compared to single lattice structures. Compared to the single structure R-type, the RC-type increases elastic modulus, yield strength, and energy absorption, respectively, by 12.7 times, 5.4 times, and 4.4 times. Full article
Show Figures

Figure 1

15 pages, 3678 KB  
Article
Tsallis Entropy-Based Complexity-IPE Casualty Plane: A Novel Method for Complex Time Series Analysis
by Zhe Chen, Changling Wu, Junyi Wang and Hongbing Qiu
Entropy 2024, 26(6), 521; https://doi.org/10.3390/e26060521 - 17 Jun 2024
Cited by 2 | Viewed by 1827
Abstract
Due to its capacity to unveil the dynamic characteristics of time series data, entropy has attracted growing interest. However, traditional entropy feature extraction methods, such as permutation entropy, fall short in concurrently considering both the absolute amplitude information of signals and the temporal [...] Read more.
Due to its capacity to unveil the dynamic characteristics of time series data, entropy has attracted growing interest. However, traditional entropy feature extraction methods, such as permutation entropy, fall short in concurrently considering both the absolute amplitude information of signals and the temporal correlation between sample points. Consequently, this limitation leads to inadequate differentiation among different time series and susceptibility to noise interference. In order to augment the discriminative power and noise robustness of entropy features in time series analysis, this paper introduces a novel method called Tsallis entropy-based complexity-improved permutation entropy casualty plane (TC-IPE-CP). TC-IPE-CP adopts a novel symbolization approach that preserves both absolute amplitude information and inter-point correlations within sequences, thereby enhancing feature separability and noise resilience. Additionally, by incorporating Tsallis entropy and weighting the probability distribution with parameter q, it integrates with statistical complexity to establish a feature plane of complexity and entropy, further enriching signal features. Through the integration of multiscale algorithms, a multiscale Tsallis-improved permutation entropy algorithm is also developed. The simulation results indicate that TC-IPE-CP requires a small amount of data, exhibits strong noise resistance, and possesses high separability for signals. When applied to the analysis of heart rate signals, fault diagnosis, and underwater acoustic signal recognition, experimental findings demonstrate that TC-IPE-CP can accurately differentiate between electrocardiographic signals of elderly and young subjects, achieve precise bearing fault diagnosis, and identify four types of underwater targets. Particularly in underwater acoustic signal recognition experiments, TC-IPE-CP achieves a recognition rate of 96.67%, surpassing the well-known multi-scale dispersion entropy and multi-scale permutation entropy by 7.34% and 19.17%, respectively. This suggests that TC-IPE-CP is highly suitable for the analysis of complex time series. Full article
(This article belongs to the Special Issue Ordinal Pattern-Based Entropies: New Ideas and Challenges)
Show Figures

Figure 1

24 pages, 10448 KB  
Article
Optical Color Image Encryption Algorithm Based on Two-Dimensional Quantum Walking
by Guohao Cui, Xiaoyi Zhou, Hao Wang, Wentao Hao, Anshun Zhou and Jianqiang Ma
Electronics 2024, 13(11), 2026; https://doi.org/10.3390/electronics13112026 - 22 May 2024
Cited by 3 | Viewed by 1607
Abstract
The double random phase encoding (DRPE) image encryption method has garnered significant attention in color image processing and optical encryption thanks to its R, G, and B parallel encryption. However, DRPE-based color image encryption faces two challenges. Firstly, it disregards the correlation of [...] Read more.
The double random phase encoding (DRPE) image encryption method has garnered significant attention in color image processing and optical encryption thanks to its R, G, and B parallel encryption. However, DRPE-based color image encryption faces two challenges. Firstly, it disregards the correlation of R, G, and B, compromising the encrypted image’s robustness. Secondly, DRPE schemes relying on Discrete Fourier Transform (DFT) and Discrete Fractional Fourier Transform (DFRFT) are vulnerable to linear attacks, such as Known Plaintext Attack (KPA) and Chosen Plaintext Attack (CPA). Quantum walk is a powerful tool for modern cryptography, offering robust resistance to classical and quantum attacks. Therefore, this study presents an optical color image encryption algorithm that combines two-dimensional quantum walking (TDQW) with 24-bit plane permutation, dubbed OCT. This approach employs pseudo-random numbers generated by TDQW for phase modulation in DRPE and scrambles the encrypted image’s real and imaginary parts using the generalized Arnold transform. The 24-bit plane permutation helps reduce the R, G, and B correlation, while the generalized Arnold transform bolsters DRPE’s resistance to linear attacks. By incorporating TDQW, the key space is significantly expanded. The experimental results validate the effectiveness and security of the proposed method. Full article
(This article belongs to the Section Computer Science & Engineering)
Show Figures

Figure 1

21 pages, 7107 KB  
Article
Data Hiding and Authentication Scheme for Medical Images Using Double POB
by Fang Ren, Xuan Shi, Enya Tang and Mengmeng Zeng
Appl. Sci. 2024, 14(6), 2664; https://doi.org/10.3390/app14062664 - 21 Mar 2024
Cited by 4 | Viewed by 1708
Abstract
To protect the security of medical images and to improve the embedding ability of data in encrypted medical images, this paper proposes a permutation ordered binary (POB) number system-based hiding and authentication scheme for medical images, which includes three parts: image preprocessing, double [...] Read more.
To protect the security of medical images and to improve the embedding ability of data in encrypted medical images, this paper proposes a permutation ordered binary (POB) number system-based hiding and authentication scheme for medical images, which includes three parts: image preprocessing, double hiding, and information extraction and lossless recovery. In the image preprocessing and double hiding phase, firstly, the region of significance (ROS) of the original medical image is segmented into a region of interest (ROI) and a region of non-interest (RONI). Then, the bit plane of the ROI and RONI are separated and cross-reorganization to obtain two new Share images. After the two new Share images are compressed, the images are encrypted to generate two encrypted shares. Finally, the embedding of secret data and attaching of authentication bits in each of these two encrypted shares was performed using the POB algorithm. In the information extraction and lossless recovery phase, the POBN algorithm is first used to extract the authentication bits to realize image tamper detection; then, the embedded secret message is extracted, and the original medical image is recovered. The method proposed in this research performs better in data embedding and lossless recovery, as demonstrated by experiments. Full article
Show Figures

Figure 1

22 pages, 10690 KB  
Article
Daily Streamflow of Argentine Rivers Analysis Using Information Theory Quantifiers
by Micaela Suriano, Leonidas Facundo Caram and Osvaldo Anibal Rosso
Entropy 2024, 26(1), 56; https://doi.org/10.3390/e26010056 - 9 Jan 2024
Cited by 3 | Viewed by 1986
Abstract
This paper analyzes the temporal evolution of streamflow for different rivers in Argentina based on information quantifiers such as statistical complexity and permutation entropy. The main objective is to identify key details of the dynamics of the analyzed time series to differentiate the [...] Read more.
This paper analyzes the temporal evolution of streamflow for different rivers in Argentina based on information quantifiers such as statistical complexity and permutation entropy. The main objective is to identify key details of the dynamics of the analyzed time series to differentiate the degrees of randomness and chaos. The permutation entropy is used with the probability distribution of ordinal patterns and the Jensen–Shannon divergence to calculate the disequilibrium and the statistical complexity. Daily streamflow series at different river stations were analyzed to classify the different hydrological systems. The complexity-entropy causality plane (CECP) and the representation of the Shannon entropy and Fisher information measure (FIM) show that the daily discharge series could be approximately represented with Gaussian noise, but the variances highlight the difficulty of modeling a series of natural phenomena. An analysis of stations downstream from the Yacyretá dam shows that the operation affects the randomness of the daily discharge series at hydrometric stations near the dam. When the station is further downstream, however, this effect is attenuated. Furthermore, the size of the basin plays a relevant role in modulating the process. Large catchments have smaller values for entropy, and the signal is less noisy due to integration over larger time scales. In contrast, small and mountainous basins present a rapid response that influences the behavior of daily discharge while presenting a higher entropy and lower complexity. The results obtained in the present study characterize the behavior of the daily discharge series in Argentine rivers and provide key information for hydrological modeling. Full article
(This article belongs to the Special Issue Selected Featured Papers from Entropy Editorial Board Members)
Show Figures

Figure 1

25 pages, 6529 KB  
Article
Image Encryption Using Quantum 3D Mobius Scrambling and 3D Hyper-Chaotic Henon Map
by Ling Wang, Qiwen Ran and Junrong Ding
Entropy 2023, 25(12), 1629; https://doi.org/10.3390/e25121629 - 6 Dec 2023
Cited by 4 | Viewed by 1779
Abstract
In encryption technology, image scrambling is a common processing operation. This paper proposes a quantum version of the 3D Mobius scrambling transform based on the QRCI model, which changes not only the position of pixels but also the gray values. The corresponding quantum [...] Read more.
In encryption technology, image scrambling is a common processing operation. This paper proposes a quantum version of the 3D Mobius scrambling transform based on the QRCI model, which changes not only the position of pixels but also the gray values. The corresponding quantum circuits are devised. Furthermore, an encryption scheme combining the quantum 3D Mobius transform with the 3D hyper-chaotic Henon map is suggested to protect the security of image information. To facilitate subsequent processing, the RGB color image is first represented with QRCI. Then, to achieve the pixel-level permutation effect, the quantum 3D Mobius transform is applied to scramble bit-planes and pixel positions. Ultimately, to increase the diffusion effect, the scrambled image is XORed with a key image created by the 3D hyper-chaotic Henon map to produce the encrypted image. Numerical simulations and result analyses indicate that our designed encryption scheme is secure and reliable. It offers better performance in the aspect of key space, histogram variance, and correlation coefficient than some of the latest algorithms. Full article
(This article belongs to the Special Issue Advanced Technology in Quantum Cryptography)
Show Figures

Figure 1

10 pages, 1573 KB  
Article
Parapharyngeal Fat Tissue Accumulation and Its Association with Carotid Intima-Media Thickness in Discordant Twin Pairs
by Zsofia Jokkel, Marcell Szily, Marton Piroska, Helga Szabó, Anita Hernyes, Gergely Szabó, Ildikó Kalina, Pál Maurovich-Horvat, David Laszlo Tarnoki and Adam Domonkos Tarnoki
Appl. Sci. 2023, 13(17), 9953; https://doi.org/10.3390/app13179953 - 3 Sep 2023
Viewed by 1688
Abstract
Background: Recurrent upper airway obstruction during sleep is a common feature of obstructive sleep apnea (OSA). Risk factors for the development of OSA include obesity, male gender and smoking. In addition, anatomical factors contribute to the development of the disease; however, the heritability [...] Read more.
Background: Recurrent upper airway obstruction during sleep is a common feature of obstructive sleep apnea (OSA). Risk factors for the development of OSA include obesity, male gender and smoking. In addition, anatomical factors contribute to the development of the disease; however, the heritability of the anatomical structures that determine upper airway narrowing is poorly understood. In this study, we aimed to investigate the background of anatomical structures associated with upper airway narrowing in discordant monozygotic (MZ) twin pairs. Methods: 33 adult MZ twin pairs (median age and Q1-Q3: 50 (42–56) years) from the Hungarian Twin Registry underwent head and neck MR (Philips Ingenia 1.5 T). T1- and T2-weighted images in sagittal, coronal and axial planes were used to measure cephalometric, soft tissue and adipose tissue structures. In addition, the twin pairs underwent carotid and femoral ultrasound scans (Samsung RS85) and full-body composition measurements (OMRON BF500). The analysis of discordant MZ twins for anatomical markers in relation to clinical background, blood test, vascular ultrasound and body composition results was performed using a paired permutation test. Results: We found a significant association between parapharyngeal adipose tissue area and body weight, waist circumference and metabolism (p < 0.05). Submental adipose tissue thickness showed an association with lower body muscle percentage (<0.05). Carotid intima-media thickness showed a negative association with parapharyngeal adipose tissue, tongue volume and submental adipose tissue thickness (<0.05). Conclusions: Our study found a significant association between anatomical structures potentially involved in upper airway narrowing and obesity-related markers such as weight, BMI, hip and waist circumference, and whole body composition analysis results (body fat percentage, visceral fat percentage, muscle percentage). This study may help to better understand the background of anatomical structures potentially involved in upper airway narrowing and the possible development of obstructive sleep apnea. Full article
(This article belongs to the Section Applied Biosciences and Bioengineering)
Show Figures

Figure 1

17 pages, 18744 KB  
Article
High-Capacity Reversible Data Hiding in Encrypted Images Based on 2D-HS Chaotic System and Full Bit-Plane Searching
by Bin Ge, Guoqing Ge, Chenxing Xia and Xiuzhen Duan
Symmetry 2023, 15(7), 1423; https://doi.org/10.3390/sym15071423 - 15 Jul 2023
Cited by 5 | Viewed by 1725
Abstract
Using the local correlation of carrier images to embed secret data in MSBs is a popular scheme for reversible data hiding in encrypted images (RDHEI). However, most existing methods based on this scheme face challenges in achieving complete compression while ensuring security. In [...] Read more.
Using the local correlation of carrier images to embed secret data in MSBs is a popular scheme for reversible data hiding in encrypted images (RDHEI). However, most existing methods based on this scheme face challenges in achieving complete compression while ensuring security. In this study, an RDHEI method that uses a two-dimensional chaotic system and full bit-plane search (FBPS) is proposed. Specifically, the content owner provides cover images and employs a chaotic system to generate chaotic sequences for inter-block non-symmetrical permutation and intra-block diffusion. The special encryption method, combined with chaos, not only preserves the correlation of pixels within a block but also ensures an extremely high level of security. The FBPS technique is applied to detect all smooth bit planes, not limited to continuous MSBs. For data embedding, ‘0’ and ‘1’ are used to record all smooth and rough bit planes to achieve thorough compression. The results of the experiment show that our proposed method provides a high level of security and achieves 2.142 bit/pixel and 2.339 bit/pixel on the typical datasets BOSSbase (Break Our Steganographic System) and BOWS-2 (Break Our Watermarking System 2nd). Compared with the state-of-the-art methods, the embedding capacity has also been significantly improved. Full article
(This article belongs to the Section Computer)
Show Figures

Figure 1

20 pages, 7163 KB  
Article
Acoustic Wave Reflection in Water Affects Underwater Wireless Sensor Networks
by Kaveripakam Sathish, Monia Hamdi, Ravikumar Chinthaginjala Venkata, Mohammad Alibakhshikenari, Manel Ayadi, Giovanni Pau, Mohamed Abbas and Neeraj Kumar Shukla
Sensors 2023, 23(11), 5108; https://doi.org/10.3390/s23115108 - 26 May 2023
Cited by 25 | Viewed by 3738
Abstract
The phenomenon of acoustic wave reflection off fluid–solid surfaces is the focus of this research. This research aims to measure the effect of material physical qualities on oblique incidence acoustic attenuation across a large frequency range. To construct the extensive comparison shown in [...] Read more.
The phenomenon of acoustic wave reflection off fluid–solid surfaces is the focus of this research. This research aims to measure the effect of material physical qualities on oblique incidence acoustic attenuation across a large frequency range. To construct the extensive comparison shown in the supporting documentation, reflection coefficient curves were generated by carefully adjusting the porousness and permeability of the poroelastic solid. The next stage in determining its acoustic response is to determine the pseudo-Brewster angle shift and the reflection coefficient minimum dip for the previously indicated attenuation permutations. This circumstance is made possible by modeling and studying the reflection and absorption of acoustic plane waves encountering half-space and two-layer surfaces. For this purpose, both viscous and thermal losses are taken into account. According to the research findings, the propagation medium has a significant impact on the form of the curve that represents the reflection coefficient, whereas the effects of permeability, porosity, and driving frequency are relatively less significant to the pseudo-Brewster angle and curve minima, respectively. This research additionally found that as permeability and porosity increase, the pseudo-Brewster angle shifts to the left (proportionally to porosity increase) until it reaches a limiting value of 73.4 degrees, and that the reflection coefficient curves for each level of porosity exhibit a greater angular dependence, with an overall decrease in magnitude at all incident angles. These findings are given within the framework of the investigation (in proportion to the increase in porosity). The study concluded that when permeability declined, the angular dependence of frequency-dependent attenuation reduced, resulting in iso-porous curves. The study also discovered that the matrix porosity largely affected the angular dependency of the viscous losses in the range of 1.4 × 10−14 m2 permeability. Full article
Show Figures

Figure 1

18 pages, 5888 KB  
Article
Secure DNA-Coding Image Optical Communication Using Non-Degenerate Hyperchaos and Dynamic Secret-Key
by Heping Wen, Zhen Liu, Haowen Lai, Chongfu Zhang, Linhao Liu, Jieyi Yang, Yiting Lin, Yunqi Li, Yunlong Liao, Linchao Ma, Zefeng Chen and Rui Li
Mathematics 2022, 10(17), 3180; https://doi.org/10.3390/math10173180 - 3 Sep 2022
Cited by 35 | Viewed by 2836
Abstract
With the aim of tackling insufficient security in the chaotic encryption algorithm for digital images in the Optical Access Network, a color image encryption scheme combining non-degenerate discrete hyperchaotic system and deoxyribonucleic acid (DNA) dynamic encoding is proposed. First, a new non-degenerate hyperchaotic [...] Read more.
With the aim of tackling insufficient security in the chaotic encryption algorithm for digital images in the Optical Access Network, a color image encryption scheme combining non-degenerate discrete hyperchaotic system and deoxyribonucleic acid (DNA) dynamic encoding is proposed. First, a new non-degenerate hyperchaotic system is constructed with all positive Lyapunov and more complex dynamic characteristics. Furthermore, the key sequence based on non-degenerate hyperchaotic system is generated using plaintext correlation to achieve the effect of a dynamic secret key. Next, a binary bit-planes permutation is performed on the image using one of the key sequences. Then, the chaotic key sequence is used to sequentially perform DNA encoding, obfuscation, and decoding. Finally, a binary bit-planes obfuscation is performed to obtain the final ciphertext. The research results show that the non-degenerate chaotic sequence can pass the NIST 800-22 test, and the corresponding encryption algorithm can resist various common attacks and has a strong anti-interference ability. In addition, the algorithm is verified on ARM-Embedded, which proves that the encryption system proposed in this paper is a feasible secure communication technology scheme. Therefore, the scheme proposed in this paper is helpful to provide new ideas for the design and application of high-security cryptosystem in optical access network. Full article
(This article belongs to the Special Issue Advances in Algebraic Coding Theory and Cryptography)
Show Figures

Figure 1

23 pages, 7743 KB  
Article
Quantum Color Image Encryption Scheme Based on Geometric Transformation and Intensity Channel Diffusion
by Xianhua Song, Guanglong Chen and Ahmed A. Abd El-Latif
Mathematics 2022, 10(17), 3038; https://doi.org/10.3390/math10173038 - 23 Aug 2022
Cited by 23 | Viewed by 2530
Abstract
A quantum color image encryption algorithm based on geometric transformation and intensity channel diffusion was designed. Firstly, a plaintext image was transformed into a quantum state form using the quantum image representation based on HSI color space (QIRHSI) representation as a carrier. Next, [...] Read more.
A quantum color image encryption algorithm based on geometric transformation and intensity channel diffusion was designed. Firstly, a plaintext image was transformed into a quantum state form using the quantum image representation based on HSI color space (QIRHSI) representation as a carrier. Next, a pseudo-random sequence was generated using the generalized logistic map, and the pixel positions permuted multiple two-point swap operations. Immediately afterward, the intensity values were changed by an intensity bit-plane cross-swap and XOR, XNOR operations. Finally, the intensity channel of the above image was diffused in combination with the pseudo-confusion sequence as produced by the quantum logistic map to perform a diffusion operation on the intensity bit-plane to obtain the ciphertext image. Numerical simulations and analyses show that the designed algorithm is implementable and robust, especially in terms of outstanding performance and less computational complexity than classical algorithms in terms of security perspective. Full article
(This article belongs to the Special Issue Chaos-Based Secure Communication and Cryptography)
Show Figures

Figure 1

Back to TopTop