In today's rapidly evolving digital landscape, secure data transmission and exchange are crucial for protecting sensitive information across personal, financial, and global infrastructures. Traditional cryptographic algorithms like RSA and AES face increasing challenges due to the rise of quantum computing and enhanced computational power, necessitating innovative approaches for data security. We explored a novel encryption scheme leveraging the quadratic chaotic map (QCM) integrated with the Fibonacci sequence, addressing key sensitivity, periodicity, and computational efficiency. By employing chaotic systems' inherent unpredictability and sensitivity to initial conditions, the proposed method generates highly secure and unpredictable ciphers suitable for text and image encryption. We incorporated a combined sequence from the Fibonacci sequence and QCM, providing enhanced complexity and security. Comprehensive experimental analyses, including noise and occlusion attack simulations, demonstrate the scheme's robustness, resilience, and practicality. The results indicated that the proposed encryption framework offers a secure, efficient, and adaptable solution for digital data protection against modern computational threats.
Citation: Majid Khan, Hafiz Muhammad Waseem. An efficient confidentiality scheme based on quadratic chaotic map and Fibonacci sequence[J]. AIMS Mathematics, 2024, 9(10): 27220-27246. doi: 10.3934/math.20241323
[1] | Hongwu Zhang, Xiaoju Zhang . Tikhonov-type regularization method for a sideways problem of the time-fractional diffusion equation. AIMS Mathematics, 2021, 6(1): 90-101. doi: 10.3934/math.2021007 |
[2] | El Mostafa Kalmoun, Fatimah Allami . On the existence and stability of minimizers for generalized Tikhonov functionals with general similarity data. AIMS Mathematics, 2021, 6(3): 2764-2777. doi: 10.3934/math.2021169 |
[3] | Mohamed Abdalla . On Hankel transforms of generalized Bessel matrix polynomials. AIMS Mathematics, 2021, 6(6): 6122-6139. doi: 10.3934/math.2021359 |
[4] | Lynda Taleb, Rabah Gherdaoui . Approximation by the heat kernel of the solution to the transport-diffusion equation with the time-dependent diffusion coefficient. AIMS Mathematics, 2025, 10(2): 2392-2412. doi: 10.3934/math.2025111 |
[5] | Xiangtuan Xiong, Wanxia Shi, Xuemin Xue . Determination of three parameters in a time-space fractional diffusion equation. AIMS Mathematics, 2021, 6(6): 5909-5923. doi: 10.3934/math.2021350 |
[6] | Zhenping Li, Xiangtuan Xiong, Jun Li, Jiaqi Hou . A quasi-boundary method for solving an inverse diffraction problem. AIMS Mathematics, 2022, 7(6): 11070-11086. doi: 10.3934/math.2022618 |
[7] | Lei Hu . A weighted online regularization for a fully nonparametric model with heteroscedasticity. AIMS Mathematics, 2023, 8(11): 26991-27008. doi: 10.3934/math.20231381 |
[8] | Zihan Yue, Wei Jiang, Boying Wu, Biao Zhang . A meshless method based on the Laplace transform for multi-term time-space fractional diffusion equation. AIMS Mathematics, 2024, 9(3): 7040-7062. doi: 10.3934/math.2024343 |
[9] | Jiajia Zhao, Zuoliang Xu . Calibration of time-dependent volatility for European options under the fractional Vasicek model. AIMS Mathematics, 2022, 7(6): 11053-11069. doi: 10.3934/math.2022617 |
[10] | F. Z. Geng . Piecewise reproducing kernel-based symmetric collocation approach for linear stationary singularly perturbed problems. AIMS Mathematics, 2020, 5(6): 6020-6029. doi: 10.3934/math.2020385 |
In today's rapidly evolving digital landscape, secure data transmission and exchange are crucial for protecting sensitive information across personal, financial, and global infrastructures. Traditional cryptographic algorithms like RSA and AES face increasing challenges due to the rise of quantum computing and enhanced computational power, necessitating innovative approaches for data security. We explored a novel encryption scheme leveraging the quadratic chaotic map (QCM) integrated with the Fibonacci sequence, addressing key sensitivity, periodicity, and computational efficiency. By employing chaotic systems' inherent unpredictability and sensitivity to initial conditions, the proposed method generates highly secure and unpredictable ciphers suitable for text and image encryption. We incorporated a combined sequence from the Fibonacci sequence and QCM, providing enhanced complexity and security. Comprehensive experimental analyses, including noise and occlusion attack simulations, demonstrate the scheme's robustness, resilience, and practicality. The results indicated that the proposed encryption framework offers a secure, efficient, and adaptable solution for digital data protection against modern computational threats.
In [1], S. Omri and L. T. Rachdi define the Gauss-Weierstrass transform Wν,t associated with the Hankel transform as follows:
Wν,t(f)(x)=122ν+1Γ(μ+1)∫∞0e−x2+y24ttν+1Jν(ixy2t)f(y)y2ν+1dy, | (1.1) |
where Jν(⋅) is the normalized Bessel function defined in (2.2). This integral transform, which generalizes the usual Weierstrass transform [2,3,4], is used to solve the heat equation problem:
{∂tu(x,t)=Bν(u)(x,t),u(x,0)=f(x), |
where the Bessel differential operator is given by
Bν:=d2dx2+2ν+1xddx,ν≥−12. | (1.2) |
The authors in [1] established practical, real inversion formulas for Hankel-type heat diffusion, building on the ideas of Saitoh, Matsuura, Fujiwara, and Yamada [2,3,4,5,6], and utilizing the theory of reproducing kernels [2,3,4].
Recently, many researchers have adapted and applied this same method to various types of Gauss-Weierstrass integral transforms associated with several kinds of differential and difference-differential operators. For instance, Soltani pioneered the exploration of Lp-Fourier multipliers for the Dunkl operator on the real line [7], extremal functions on Sobolev-Dunkl spaces [8], multiplier operators and extremal functions related to the dual Dunkl-Sonine operator [9], and extremal functions on Sturm-Liouville hypergroups [10]. More recently, the same authors examined Dunkl-Weinstein multiplier operators [11]. Additional research was conducted by Dziri and Kroumi [12], as well as by Ghobber and Mejjaoli [13]. For further work related to existing results on inverse problems, some important findings can be found in [14,15,16].
In this work, we consider the space-fractional diffusion equation associated with the Bessel operator, which is given by
{∂tu(x,t)+(−Bν)α/2u(x,t)=0,x≥0,t>0,u(x,0)=ϕ(x),t>0, | (1.3) |
where the parameters ν and α are restricted by the condition ν≥−12, 1≤α≤2, and the space-fractional Bessel operator (−Bν)α/2, which is defined pointwise by the principal value integral [17],
(−Bν)α/2ϕ(x)=cα,νlimε→0+∫∞εϕ(x)−τξνϕ(ξ)ξα+1dξ, | (1.4) |
here, the normalization constant cν,α is given by
cν,α=2α+νΓ(ν+α2+1)Γ(ν+1)|Γ(−α2)|. |
In this work, we introduce the generalized Gauss-Weierstrass transform associated with the Bessel operator by
(Wα,ν,tϕ)(y)=∫∞0Sα,ν(x,y,t)ϕ(x)σν(dx), |
where Sα,ν(x,y,t) is the fractional heat kernel, which will be defined later. For α=2, this integral transform simplifies to the Gauss-Weierstrass transform defined in (1.1). Thus, it can be considered a one-parameter extension of the transform (1.1). The principal motivation for considering the generalized Gauss-Weierstrass integral transform is that for ν=n2−1, it reduces to the ordinary Gauss-Weierstrass transform for radial functions on the Euclidean space Rn. Since the Bessel operator coincides with the radial part of the Laplace operator Δ=∑mi=1∂2i, this transform provides a significant extension. For more details, the reader is referred to the paper [18]. By using the properties of the Fourier-Bessel transform Fν and its connection with the ∗-convolution product (see Section 2), we first show that the transform Wα,ν,t is a one-to-one bounded linear operator from a Sobolev space Hsν into L2ν(0,∞). By the same argument as the standard Gauss-Weierstrass transform, we can assume that the operator W−1α,ν,t is unbounded or that its range is not closed, which causes the ill-posed problem in solving the operator equation
Wα,ν,tϕ=ψ. |
Then, for stable reconstruction of ϕ, some regularization techniques are necessary. The Tikhonov regularization techniques are widely applicable (e.g., Bakushinsky and Goncharsky [19], Baumeister [20], Tikhonov and Arsenin [21], Tikhonov et al. [22]). In our case, the Tikhonov regularization can be stated as follows: For given data ψ∈L2ν(0,∞), we search for a minimizer of a functional given by
Jγ(ϕ)=12‖Wα,ν,tϕ−ψ‖2L2ν(0,∞)+γ2‖ϕ‖2Hsν,ϕ∈Hsν, |
with a parameter γ>0, which is called a regularizing parameter. We show that the above variational problem has a unique solution denoted by Rγ,ψ and called the regularized solution; it is also referred to as the extremal solution by Soltani [7]. The following theorem is the main result of the paper, which provides a real inversion of the generalized Gauss-Weierstrass transform.
Theorem 1.1. Let s>ν+1. For every ϕ∈Hsν and ψ=Wα,ν,t(ϕ), we have:
limγ→0+‖Rγ,ψ−ϕ‖H(s)ν=0. |
Moreover, the set {Rγ,ψ}γ>0 converges uniformly to ϕ as γ→0+.
Our paper is organized as follows:
● Section 2 serves as an introductory section that provides an overview of fundamental concepts. Topics covered include the Fourier-Bessel transform, generalized translation, generalized convolution, fractional Bessel operator, and the space-fractional Bessel diffusion equation, setting the stage for understanding subsequent content.
● Section 3 is devoted to introducing the generalized Gauss-Weierstrass transform and establishing its principal properties.
● Section 4 states the main results of the paper and provides their proofs.
Before revealing our main results, it is essential to establish the groundwork by introducing key notations and collecting pertinent facts about the Bessel operator. This section serves as a primer, elucidating the significance of the Fourier-Bessel transform and the Delsarte translation, which will be pivotal for the subsequent analysis.
The normalized Bessel function is defined as follows:
Jν(x):=Γ(ν+1)(2/x)νJν(x),ν>−1, | (2.1) |
where Γ(⋅) is the Gamma function [23] and Jν(⋅) is the Bessel function of the first kind, see [23, (10.16.9)]. Then
Jν(x)=∞∑k=0(−14x2)k(ν+1)kk!. | (2.2) |
The normalized Bessel function arises as the unique solution to the eigenvalue problem related to the Bessel equation. More precisely, the functions defined as x→Jν(λx) stand as the unique solution to the eigenvalue problem [23, (10.13.5)]
{Bνϕ(x)=−λ2ϕ(x),ϕ(0)=1,ϕ′(0)=0. |
The function Jν(⋅) is an entire analytic function with even symmetry. Notably, there are straightforward special cases that hold:
J−1/2(x)=cosx,J1/2(x)=sinxx. |
We introduce the following notation:
● Lpν(0,∞) (1≤p) represents the Lebesgue space associated with the measure
σν(dx)=x2ν+12νΓ(ν+1)dx. | (2.3) |
The norm ‖ϕ‖Lpν(0,∞) is the conventional norm given by
‖ϕ‖Lpν(0,∞)=(∫∞0|ϕ(x)|pσν(dx))1/p. |
● S∗(R) signifies the space of even functions on R that are infinitely differentiable and decrease rapidly, along with all their derivatives.
For ν≥−1/2, the Fourier-Bessel transform Fνϕ of ϕ∈L1ν(0,∞) is defined as:
Fνϕ(x):=∫∞0ϕ(t)Jν(tx)σν(dx),ν≥−1/2. | (2.4) |
This integral transform can be extended to establish an isometry of L2ν(0,∞). For any function ϕ belonging to L1ν(0,∞)∩L2ν(0,∞), the following relationships hold [24, Prop. 5.Ⅲ.2]
∫∞0|ϕ(x)|2σν(dx)=∫∞0|Fνϕ(t)|2σν(dt). | (2.5) |
Furthermore, its inverse is expressed as:
ϕ(x)=∫∞0Fνϕ(t)Jν(tx)σν(dt). | (2.6) |
Moving forward, our focus shifts to the exploration of the generalized translation operator linked to the Bessel operator. This operator is symbolized as τxν and operates on functions belonging to L1ν(0,∞) according to the following expression [25, §3.4.1]:
τxνϕ(y)={∫π0ϕ(√x2+y2+2xycosθ)sin2νθdθ,ifν>−1/2,12(ϕ(x+y)+ϕ(x−y)),ifν=−1/2. | (2.7) |
With the help of this translation operator, one defines the convolution of ϕ∈L1ν(0,∞) and ψ∈Lpν(0,∞) for p∈[1,∞) as the element f∗νg of Lpν(0,∞) given by
(ϕ∗νψ)(x):=∫∞0(τxνϕ)(y)ψ(y)σν(dy),ν≥−1/2. | (2.8) |
The following properties are obvious.
● Fν(τxνϕ)(t)=Jν(xt)Fνϕ(t),
● Fν(ϕ∗νψ)(x)=Fνϕ(x)Fνψ(x).
In this section, we consider the space-fractional Bessel diffusion equation [17,18]
{∂tu(x,t)+(−Bν)α/2u(x,t)=0,x≥0,t>0,u(x,0)=ϕ(x),u(∞,t)=0,t>0, | (2.9) |
where the parameters ν and α are restricted by the condition ν≥−12, 1≤α≤2, and the space-fractional Bessel operator (−Bν)α/2, which is defined pointwise by the principal value integral [17],
(−Bν)α/2ϕ(x)=cα,νlimε→0+∫∞εϕ(x)−τξνϕ(ξ)ξα+1dξ, | (2.10) |
here, the normalization constant cν,α is given by
cν,α=2α+νΓ(ν+α2+1)Γ(ν+1)|Γ(−α2)|. |
Moreover, the Fourier-Bessel transform of the fractional Bessel operator is given by [17]
Fν((−Bν)α/2ϕ)(ξ)=ξαFνϕ(ξ). | (2.11) |
Let us denote the Fourier-Bessel transform of a function u(x,t) with respect to x as ˆu(ξ,t), where ξ≥0. Applying the Fourier-Bessel transform to both sides of the equation in (1.3), we obtain:
{∂tˆu(ξ,t)=−ξαˆu(ξ,t),ˆu(ξ,t)=ˆϕ(ξ). |
Then
ˆu(ξ,t)=ˆϕ(ξ)e−ξαt. |
Therefore,
u(x,t)=(Gα,νt∗ϕ)(x), |
where
Gα,νt(x)=Gα,ν(x,t)=∫∞0e−ξαtJν(ξx)σν(dξ). | (2.12) |
Using the following scaling rules for the Fourier-Bessel transform:
∫∞0f(ax)Jν(λx)σν(dx)=1a2ν+2∫∞0f(x)Jν(λx/a)σν(dx),a>0, |
we obtain the following scaling property of the kernel Gα,ν(x,t)
Gα,ν(x,t)=t−2(ν+1)/αGα,ν(xt−1/α,1),t>0,x≥0. |
Consequently by introducing the similarity variable x/tα, we can write
Gα,ν(x,t)=t−2(ν+1)/αKα,ν(xt−1/α), |
where
Kα,ν(x)=∫∞0e−ξαJν(ξx)σν(dξ). | (2.13) |
Particular cases of the density Kα,ν are the following [26]:
● The density K2,ν(x), where ν≥−12, corresponds to the Gaussian density kernel:
K2,ν(x)=e−x242ν+1. | (2.14) |
● The density K1,ν, where ν≥−12, corresponds to the Poisson density:
K1,ν(x)=2ν+1Γ(ν+32)√π1(1+x2)ν+32. | (2.15) |
More generally, for 1<α<2, we have [17, Proposition 4.1]:
Kα,ν(x)=1α2ν∞∑n=0(−1)nn!Γ(2α(n+ν+1))Γ(ν+1+n)(x24)n. | (2.16) |
Definition 2.1. For ν≥−12 and 0<α<2, the generalized heat kernel is defined as:
Gα,ν(x,y,t)=∫∞0e−tξαJν(xξ)Jν(yξ)σν(dξ),x,y∈[0,∞). | (2.17) |
Lemma 2.1. The heat kernel Gα,ν(x,y,t) possesses the following properties:
i) Gα,ν(x,y,t)=τyνGα,ν(x,t).
ii) Gα,ν(x,y,t)=Gα,ν(y,x,t).
iii) Gα,ν(x,y,t)>0.
iv) ‖Gα,ν(x,y,t)‖L1ν(0,∞)=1.
v) Gα,ν(x,y,t)=t−2(ν+1)/αGα,ν(xt−1/α,yt−1/α,1).
vi) Fν(Gα,ν(⋅,y,t))(ξ)=e−tξαJν(yξ).
Proof. The proofs for properties i), ii), v), and vi) are straightforward. Property iii) follows from [18, Theorem 7] and the positivity of the generalized translation operator τyν. The proof for property iv) is derived by setting ξ=0 in the formula from property vi.
Definition 3.1. The generalized Weierstrass transform associated with the fractional Bessel operator, denoted as Wα,ν,t, is defined on L2(dσν) by the following expression:
(Wα,ν,tϕ)(y)=(Sα,νt∗νϕ)(y)=∫∞0Sα,ν(x,y,t)ϕ(x)σν(dx), |
where Ss,ν(x,y,t) is the generalized heat defined in (2.17).
Let s>ν+1. We define the space H(s)ν as follows [1]:
H(s)ν:={ϕ∈L2ν(0,∞):(1+ξ2)s/2Fν(ϕ)(ξ)∈L2ν(0,∞)}. | (3.1) |
This space is equipped with an inner product defined by:
⟨ϕ,ψ⟩H(s)ν=∫∞0(1+ξ2)sFν(ϕ)(ξ)Fν(ψ)(ξ)σν(dξ), |
and a norm:
‖ϕ‖H(s)ν=√⟨ϕ,ϕ⟩H(s)ν. |
The space H(s)ν features a reproducing kernel, which is defined by:
Ks(x,y)=∫∞0Jν(ξx)Jν(ξy)(1+ξ2)sσν(dξ),for (x,y)∈[0,∞)×[0,∞). | (3.2) |
Additionally, this space satisfies the following inclusions:
H(s)ν⊂L2ν(0,∞),Fν(H(s)ν)⊂L1ν(0,∞)∩L2ν(0,∞). |
For further details concerning the space H(s)ν, readers are referred to the paper [1].
Theorem 3.1. i) Let ϕ∈C0(R)∩L2ν(0,∞). For t>0 and x∈[0,∞), the function Wα,μ,tϕ(x) solves the following heat equation.
∂tu(x,t)=−(−Δν)γ/2u(x,t), |
with the initial condition
limt→0+Wα,ν,tϕ=ϕinL2ν(0,∞). |
ii) The integral transform Wα,ν,t, for t>0, is a one-to-one bounded linear operator from H(s)ν into L2ν(0,∞), and we have:
‖Wα,ν,tϕ‖L2ν(0,∞)≤‖ϕ‖H(s)ν,ϕ∈H(s)ν. |
Proof. The claim i) follows from [17, Theorem 4.5]. From Lemma 2.1, for all ϕ∈L2ν(0,∞), we have:
‖Wα,ν,tϕ‖L2ν(0,∞)=‖(Sα,νt∗νϕ)‖L2ν(0,∞)≤‖Sα,νt‖L1ν(0,∞)‖ϕ‖L2ν(0,∞)=‖ϕ‖L2ν(0,∞)=‖Fνϕ‖L2ν(0,∞)≤‖ϕ‖H(s)ν. |
This inequality shows that the transform Wα,ν,t is indeed bounded. To complete the proof of ii), it remains to show that this transform is one-to-one. Let ϕ∈H(s)ν such that Wα,ν,tϕ=0. Then
Fν(Wα,ν,tϕ)(ξ)=e−tξαFνϕ(ξ)=0, |
from the injectivity of the Fourier-Bessel transform, we get ϕ=0. This shows that Wα,ν,t is one-to-one.
We denote by H(s)ν,α,γ, the space H(s)ν equipped with the inner product
⟨ϕ|ψ⟩H(s)ν,α,γ=γ⟨ϕ|ψ⟩H(s)ν+⟨Wα,ν,tϕ|Wα,ν,tψ⟩L2ν(0,∞), |
and the norm
‖ϕ‖H(s)ν,α,γ=(γ‖ϕ‖2H(s)ν+‖Wνs,tϕ‖2L2ν(0,∞))1/2. |
Then, we have the following main result:
Theorem 3.2. Let ξ, t>0 and s>ν+1. Then the Hilbert space H(s)ν,α,γ admits the following reproducing kernel:
Kν,s,α,γ(x,y)=∫∞0Jν(xξ)Jν(yξ)γ(1+ξ2)s+e−2tξασν(dξ), |
that is
(i)For all x∈[0,∞), the function y↦Kν,s,α,γ(x,y) belongs to H(s)ν,α,γ.
(ii) For all ϕ∈H(s)ν,α,γ and any y∈[0,∞).
⟨ϕ,Kν,s,α,γ(⋅,y)⟩H(s)ν,α,γ=ϕ(y). |
Proof. For all x∈[0,∞), consider the function
ξ↦Jν(ξx)γ(1+ξ2)s+e−2tξα, |
which belongs to both L1ν(0,∞) and L2ν(0,∞). Then, by the Plancherel theorem for the Fourier-Bessel transform, the function
Kν,s,α,γ(x,y)=Fν(Jν(ξx)γ(1+ξ2)s+e−2tξα)(y), | (3.3) |
is well-defined. Following this,
ξ↦(1+ξ2)s/2Fν(Kν,s,α,γ(⋅,y))(ξ), |
is a member of L2ν(0,∞). This demonstrates that for all y≥0, the function Kν,s,α,γ(⋅,y) belongs to H(s)ν. This establishes part (ⅰ) of the theorem.
Let ϕ∈H(s)ν and y∈[0,∞). By Eq (3.3), we have
⟨ϕ,Kν,s,α,γ(⋅,y)⟩H(s)ν=∫∞0(1+ξ2)sJν(ξy)γ(1+ξ2)s+e−2tξαFνϕ(ξ)σν(dξ). | (3.4) |
From the relation
Wα,ν,tϕ=F−1ν(e−tξαFν(ϕ)), |
the action of Wα,ν,t on the kernel Kν,s,α,γ(⋅,y) is then:
Wα,ν,t(Kν,s,α,γ(⋅,y))=Sνs,t∗Kν,s,α,γ(⋅,y)=F−1ν(Fν(Sνs,t)⋅Fν(Kν,s,α,γ(⋅,y)))=F−1ν(e−tξαJν(ξy)γ(1+ξ2)s+e−2tξα). |
Therefore
⟨Wα,ν,tϕ,Wα,ν,tKν,s,α,γ(⋅,y)⟩L2ν(0,∞)=∫∞0e−2tξαJν(ξy)γ(1+ξ2)s+e−2tξασν(dξ). | (3.5) |
Combining Eqs (3.4) and (3.5), we get
⟨ϕ,Kν,s,α,γ(⋅,y)⟩H(s)ν,α,γ=γ∫∞0(1+ξ2)sJν(ξy)γ(1+ξ2)s+e−2tξαFνϕ(ξ)σν(dξ)+∫∞0e−2tξαJν(ξy)γ(1+ξ2)s+e−2tξαFνϕ(ξ)σν(dξ)=∫∞0Jν(ξy)Fνϕ(ξ)σν(dξ)=ϕ(y). |
This confirms the reproducing property (ⅱ).
We now consider the variational functional associated with the generalized Weierstrass integral transform Wα,ν,t, defined as
Jγ(ϕ)=12‖Wα,ν,tϕ−ψ‖2L2ν(0,∞)+γ2‖ϕ‖2H(s)ν,ϕ∈H(s)ν. | (4.1) |
For γ>0, the functional Jγ is strictly convex and Jγ(ϕ)≥γ2‖ϕ‖ν. Hence, Jγ has a unique minimizer, which can be characterized by the first-order condition
⟨J′γ(ϕ),φ⟩=0,for allφ∈H(s)ν, | (4.2) |
where J′γ(ϕ) is the Fréchet differential of Jγ. We denote by Rγ,ψ the regularized solution of the Eq (4.2), that is,
Rγ,ψ=minϕ∈HsνJγ(ϕ). | (4.3) |
The following theorem is our second main result.
Theorem 4.1. For ν≥−1/2, γ>0, and ψ∈L2ν(0,∞). Then there is a unique function Rγ,ψ∈H(s)ν, where the infimum of the functional Jγ, defined by
Jγ(ϕ)=12‖Wα,ν,tϕ−ψ‖2L2ν(0,∞)+γ2‖ϕ‖2H(s)ν,ϕ∈Hsν, | (4.4) |
is attained. Furthermore, the regularized function Rγ,ψ is given by
Rγ,ψ(x)=∫∞0Nν,s,α,γ(x,y)ψ(y)σν(dy), | (4.5) |
where
Nν,s,α,γ(x,y)=∫∞0e−tξαJν(xξ)Jν(yξ)γ(1+ξ2)s+e−2tξασν(dξ). |
Proof. Observe that
Jγ(ϕ+εΔϕ)−Jγ(ϕ)=12{‖Wα,ν,t(ϕ+εΔϕ)−ψ‖2L2ν(0,∞)−‖Wα,ν,tϕ−ψ‖2L2ν(0,∞)}+γ2{‖ϕ+εΔϕ‖2H(s)ν−‖ϕ‖2H(s)ν}, |
where Δϕ denotes the increment.
Since,
(FνWα,ν,tϕ)(ξ)=e−tξα(Fνϕ)(ξ). | (4.6) |
Taking into account Eq (4.6) and using the Plancheral formula for the Fourier-Bessel transform to get
Jγ(ϕ+εΔϕ)−Jγ(ϕ)=12{‖e−tξαFν(ϕ+εΔϕ)(ξ)−Fνψ(ξ)‖2L2ν(0,∞)−‖e−tξαFνϕ(ξ)−Fνψ(ξ)‖2L2ν(0,∞)}+γ2{‖(ϕ+εΔϕ‖2Hs,γν,α−‖ϕ‖2H(s)ν}=ε{Re⟨e−tξαFνϕ(ξ)−Fνψ(ξ),e−tξαFνΔϕ(ξ)⟩L2ν(0,∞)+γRe⟨(1+ξ2)sFνϕ(ξ),FνΔϕ⟩L2ν(0,∞)}+ε22{‖e−tξαFνΔϕ(ξ)‖2L2ν(0,∞)+γ‖(1+ξ2)sFνΔϕ(ξ)‖2H(s)ν}. |
Hence, the Fréchet differential of Jγ can be written as
⟨J′γ(ϕ),Δϕ⟩L2ν(0,∞)=⟨e−2tξαFνϕ(ξ)−e−tξαFνψ(ξ)+γ(1+ξ2)sFνϕ,FνΔϕ⟩L2ν(0,∞). |
By the Perseval formula for the Fourier-Bessel transform, it follows that the regularized solution Rγ,ψ(ξ) is given by
e−2tξαFνRγ,ψ(ξ)−e−tξαFνψ(ξ)+γ(1+ξ2)sFνRγ,ψ(ξ)=0. |
Therefore
FνRγ,ψ(ξ)=e−tξαγ(1+ξ2)s+e−2tξαFνψ(ξ). |
It is easy to see that
ξ→e−tξαγ(1+ξ2)s+e−2tξαFνψ(ξ)∈L1ν(0,∞)∩L2ν(0,∞). |
By the inversion formula for the Fourier-Bessel transform, we have
Rγ,ψ(x)=F−1ν(e−tξαFνψ(ξ)γ(1+ξ2)s+e−2tξα)(x). |
We have
Rγ,ψ(x)=F−1ν(e−tξαFνψ(ξ)γ(1+ξ2)s+e−2tξα)(x)=∫∞0e−tξαFνψ(ξ)γ(1+ξ2)s+e−2tξαJν(xξ)σν(dξ)=∫∞0∫∞0e−tξαψ(y)γ(1+ξ2)s+e−2tξαJν(xξ)Jν(yξ)σν(dy)σν(dξ)=∫∞0(∫∞0e−tξαJν(xξ)Jν(yξ)γ(1+ξ2)s+e−2tξασν(dξ))ψ(y)σν(dy)=∫∞0Nν,s,α,γ(x,y)ψ(y)σν(dy), |
where
Nν,s,α,γ(x,y)=∫∞0e−tξαJν(xξ)Jν(yξ)γ(1+ξ2)s+e−2tξασν(dξ)=Fν(e−tξαJν(xξ)γ(1+ξ2)s+e−2tξα)(y). |
Theorem 4.2. Let s>ν+1. For all ψ1,ψ2∈L2ν(0,∞), the following inequality holds:
‖Rγ,ψ1−Rγ,ψ2‖H(s)ν≤14γ1/2‖ψ1−ψ2‖L2ν(0,∞). |
Proof. Consider any ψ1,ψ2∈L2ν(0,∞). The squared norm of the difference between the operators Rγ,ψ1 and Rγ,ψ2 in the space H(s)ν are given by:
‖Rγ,ψ1−Rγ,ψ2‖2H(s)ν=∫∞0(1+ξ2)s|Fν(Rγ,ψ1)(ξ)−Fν(Rγ,ψ2)(ξ)|2σν(dξ). |
Using the formula for the Fourier-Bessel transform of the extremal function Rγ,ψi:
Fν(Rγ,ψi)(ξ)=e−tξαγ(1+ξ2)s+e−2tξαFν(ψi)(ξ)for i=1,2, |
we can express the integral as:
‖Rγ,ψ1−Rγ,ψ2‖2H(s)ν=∫∞0(1+ξ2)se−2tξα(γ(1+ξ2)s+e−2tξα)2|Fν(ψ1)(ξ)−Fν(ψ2)(ξ)|2σν(dξ). |
By using the inequality
(1+ξ2)se−2tξα(γ(1+ξ2)s+e−2tξα)2≤14γ, |
we can further estimate:
‖Rγ,ψ1−Rγ,ψ2‖2H(s)ν≤14γ∫∞0|Fν(ψ1)(ξ)−Fν(ψ2)(ξ)|2σν(dξ)=14γ‖ψ1−ψ2‖2L2ν(0,∞). |
This completes the proof.
Proposition 4.1. Let s>ν+1, γ>0, and ψ∈L2ν(0,∞). We have the following estimate:
∫∞0|Rγ,ψ(ξ)|2σν(dξ)≤aν,αγ∫∞0eξα|ψ(ξ)|2σν(dξ). |
where
aν,α=Γ(2(ν+1)α)Γ(s−ν−1)α22ν+3Γ(s)Γ(ν+1). |
Proof. From (4.5) and applying the Cauchy-Schwarz inequality, we have:
|Rγ,ψ(ξ)|2≤(∫∞0|Nν,s,α,γ(x,y)ψ(y)|σν(dy))2≤∫∞0e−yα/2σν(dy)∫∞0eyα|Nν,s,α,γ(x,y)|2|ψ(y)|2σν(dy). |
Integrating over [0,∞) with respect to the measure σν(dx), we obtain:
‖Rγ,ψ(ξ)‖2L2ν(0,∞)≤(∫∞0|Nν,s,α,γ(x,y)ψ(y)|σν(dy))2≤∫∞0e−yα/2σν(dy)∫∞0eyα‖Nν,s,α,γ(x,y)‖2L2ν(0,∞)|ψ(y)|2σν(dy). |
However,
Nν,s,α,γ(x,y)=Fν(e−tξαJν(xξ)γ(1+ξ2)s+e−2tξα)(y), |
it follows that
‖Nν,s,α,γ(x,y)‖2L2ν(0,∞)=∫∞0e−2tξα|Jν(xξ)|2(γ(1+ξ2)s+e−2tξα)2σν(dξ)≤14γ∫∞01(1+ξ2)sσν(dξ). |
Therefore,
‖Rγ,ψ(ξ)‖2L2ν(0,∞)≤∫∞0e−yα/2σν(dy)14γ∫∞01(1+ξ2)sσν(dξ)∫∞0eyα|ψ(y)|2σν(dy). | (4.7) |
We complete the proof by using the relation (3.2) and the fact that:
∫∞0e−yασν(dy)=Γ(2(ν+1)α)α2νΓ(ν+1), |
and
∫∞0σν(dξ)(1+ξ2)s=Γ(s−ν−1)2ν+1Γ(s). |
Theorem 4.3. Let s>ν+1. For every ϕ∈H(s)ν and ψ=Wα,ν,t(ϕ), we have:
limγ→0+‖Rγ,ψ−ϕ‖H(s)ν=0. | (4.8) |
Moreover, the set {Rγ,ψ}γ>0 converges uniformly to ϕ as γ→0+.
Proof. Let ϕ∈H(s)ν and ψ=Wα,ν,t(ϕ). Utilizing the formula given in Eq (4.6), the Fourier-Bessel transform of the extremal function Rγ,ψ takes the form:
Fν(Rγ,ψ)(ξ)=e−tξαγ(1+ξ2)s+e−2tξαFν(ψ)(ξ)=e−2tξαγ(1+ξ2)s+e−2tξαFν(ϕ)(ξ). |
We can express the norm of the difference between Rγ,ψ and ϕ in H(s)ν as:
‖Rγ,ψ−ϕ‖2H(s)ν=∫∞0(1+ξ2)s|e−2tξαγ(1+ξ2)s+e−2tξα−1|2|Fν(ϕ)(ξ)|2σν(dξ)=∫∞0γ2(1+ξ2)3s(γ(1+ξ2)s+e−2tξα)2|Fν(ϕ)(ξ)|2σν(dξ). |
Using the dominated convergence theorem and observing that
γ2(1+ξ2)3s(γ(1+ξ2)s+e−2tξα)2|Fν(ϕ)(ξ)|2≤(1+ξ2)s|Fν(ϕ)(ξ)|2, |
and given that ϕ∈H(s)ν, we deduce that
limγ→0+‖Rγ,ψ−ϕ‖H(s)ν=0. |
The function Fν(ϕ) belongs to both L1ν(0,∞) and L2ν(0,∞). Applying the inversion formula for the Fourier-Bessel transform, we compute the deviation of the function ϕ under the operator Rγ,ψ as follows:
(Rγ,ψ−ϕ)(ξ)=−∫∞0γ(1+ξ2)sγ(1+ξ2)s+e−2tξαFν(ϕ)(ξ)σν(ξ)dξ. |
Thus, for all ξ∈[0,+∞[, the magnitude of the deviation is bounded by:
|(Rγ,ψ−ϕ)(ξ)|≤∫∞0γ(1+ξ2)sγ(1+ξ2)s+e−2tξα|Fν(ϕ)(ξ)|σν(ξ)dξ. |
Employing the dominated convergence theorem and noting that:
γ(1+ξ2)sγ(1+ξ2)s+e−2tξα|Fν(ϕ)(ξ)|≤|Fν(ϕ)(ξ)|, |
we deduce that the supremum over all ξ≥0 of the deviation approaches zero as γ tends towards zero
supξ∈[0,+∞[|(Rγ,ψ−ϕ)(ξ)|→0, as γ→0. |
This completes the proof of convergence in the H(s)ν norm and uniform convergence as γ→0+.
Example 4.1. As an illustrative example, consider the fractional heat equation on (0,∞)×(0,∞)
∂tu(x,t)=−(−∂xx)1/2u(x,t), |
with the initial condition
limt↘0‖u(⋅,t)−ϕ‖2,ν=0. |
To apply the Tikhonov regularization method to this fractional heat equation, we consider the integral operator W1,−1/2,t:H(1)−1/2→L2(0,∞) defined by
(W1,−1/2,tϕ)(y)=1√8π∫∞0ϕ(x+y)+ϕ(x−y)x2+t2xdx, |
where the Sobolev space H(1)−1/2 is realized by the reproducing kernel Hilbert space K1(x,y) given by
K1(x,y)=1√2π∫∞0cos(xu)cos(yu)u2+1du=√π32(exp(−|x−y|)+exp(−x−y)), |
where x,y≥0.
We now consider the following best approximation problem, that is, the Tikhonov functional. For any ψ∈L2(0,∞) and γ>0, we aim to solve
infϕ∈H(1)−1/2{γ2‖ϕ‖2H(1)−1/2+12‖W1,−1/2,tϕ−ψ‖2L2(0,∞)}. |
Then for the RKHS H(s)−1/2,1,γ consisting of all the members of H(1)−1/2 with the norm
‖ϕ‖H(1)−1/2=√γ‖ϕ‖2H(1)−1/2+‖W1,−1/2,tϕ‖2L2(0,∞), |
the reproducing kernel N−1/2,1,1,γ(x,y) can be calculated directly using the Fourier integrals as follows:
N−1/2,1,1,γ(x,y)=1√2π∫∞0exp(−tu)cos(xu)cos(yu)γ(1+u2)+exp(−2tu)du. |
Hence, the unique member of H(1)−1/2 with the minimum H(1)−1/2 norm—the function Rγ,ψ which attains the infimum—is given by
Rγ,ψ(x)=1√2π∫∞0N−1/2,1,1,γ(x,y)ψ(y)dy. | (4.9) |
For ϕ∈H(1)−1/2 and for ψ=W1,−1/2,tϕ, we have the formula
limγ→0Rγ,ψ(x)=ϕ(x), |
uniformly on (0,∞).
In this paper, we have explored the generalized Gauss-Weierstrass integral transform associated with the Bessel operator, emphasizing its application to space-fractional diffusion equations. This extension is significant because the Bessel operator coincides with the radial part of the Laplace operator, thereby broadening the scope of the classical transform.
We utilized the properties of the Fourier-Bessel transform and its connection with the ∗-convolution product to demonstrate that the transform Wα,ν,t is a one-to-one bounded linear operator from the Sobolev space Hsν into L2ν(0,∞). Given the ill-posed nature of the inverse problem, we applied Tikhonov regularization techniques to achieve stable reconstruction of functions. Our main theorem established the convergence of the regularized solution Rγ,ψ to the original function ϕ as the regularization parameter γ approaches zero.
The implications of our findings extend beyond theoretical interest, offering potential applications in solving inverse problems associated with fractional diffusion equations. Future research could further investigate the numerical implementation of the regularized inversion process and explore other types of fractional differential operators within this framework.
Overall, our work provides a robust foundation for the generalized Gauss-Weierstrass transform's utility in fractional calculus and opens avenues for further investigation into its applications in various mathematical contexts.
The author declares he/she has not used Artificial Intelligence (AI) tools in the creation of this article.
The author would like to extend their sincere appreciation to the Researchers Supporting Project number (RSPD2024R974), King Saud University, Riyadh, Saudi Arabia.
The author declares that there is no conflict of interest regarding the publication of this paper.
[1] |
B. S. Kumar, R. Revathi, An efficient image encryption algorithm using a discrete memory-based logistic map with deep neural network, J. Eng. Appl. Sci., 71 (2024), 41. https://doi.org/10.1186/s44147-023-00349-8 doi: 10.1186/s44147-023-00349-8
![]() |
[2] |
C. Wang, Y. Zhang, A novel image encryption algorithm with deep neural network, Signal Process., 196 (2022), 108536. https://doi.org/10.1016/j.sigpro.2022.108536 doi: 10.1016/j.sigpro.2022.108536
![]() |
[3] |
A. Ampavathi, G. Pradeepini, T. V. Saradhi, Optimized deep learning-enabled hybrid logistic piece-wise chaotic map for secured medical data storage system, Int. J. Inf. Technol. Decis. Mak., 22 (2023), 1743–1775. https://doi.org/10.1142/S0219622022500869 doi: 10.1142/S0219622022500869
![]() |
[4] |
H. Lee, Y. Lee, Optimizations of privacy-preserving DNN for low-latency inference on encrypted data, IEEE Access, 11 (2023), 104775–104788. https://doi.org/10.1109/ACCESS.2023.3318433 doi: 10.1109/ACCESS.2023.3318433
![]() |
[5] |
U. Sirisha, B. S. Chandana, Privacy preserving image encryption with optimal deep transfer learning-based accident severity classification model, Sensors, 23 (2023), 519. https://doi.org/10.3390/s23010519 doi: 10.3390/s23010519
![]() |
[6] |
W. S. Admass, Y. Y. Munaye, A. Diro, Cyber security: State of the art, challenges and future directions, Cyber Security Appl., 2 (2023), 100031. https://doi.org/10.1016/j.csa.2023.100031 doi: 10.1016/j.csa.2023.100031
![]() |
[7] |
P. Singh, S. Dutta, P. Pranav, Optimizing GANs for cryptography: The role and impact of activation functions in neural layers assessing the cryptographic strength, Appl. Sci., 14 (2024), 2379. https://doi.org/10.3390/app14062379 doi: 10.3390/app14062379
![]() |
[8] |
Y. Chen, S. Xie, J. Zhang, A hybrid domain image encryption algorithm based on improved henon map, Entropy, 24 (2022), 287. https://doi.org/10.3390/e24020287 doi: 10.3390/e24020287
![]() |
[9] |
M. Devipriya, M. Sreenivasan, M. Brindha, Reconfigurable architecture for image encryption using a three-layer artificial neural network, IETE J. Res., 70 (2024), 473–86. https://doi.org/10.1080/03772063.2022.2127940 doi: 10.1080/03772063.2022.2127940
![]() |
[10] |
R. B. Naik, U. Singh, A review on applications of chaotic maps in pseudo-random number generators and encryption, Ann. Data Sci., 11 (2024), 25–50. https://doi.org/10.1007/s40745-021-00364-7 doi: 10.1007/s40745-021-00364-7
![]() |
[11] |
A. Chattopadhyay, P. Hassanzadeh, D. Subramanian, Data-driven predictions of a multiscale Lorenz 96 chaotic system using machine-learning methods: reservoir computing, artificial neural network, and long short-term memory network, Nonlinear Process. Geophys., 27 (2020), 373–389. https://doi.org/10.5194/npg-27-373-2020 doi: 10.5194/npg-27-373-2020
![]() |
[12] |
K. Yang, Q. Duan, Y. Wang, T. Zhang, Y. Yang, R. Huang, Transiently chaotic simulated annealing based on intrinsic nonlinearity of memristors for efficient solution of optimization problems, Sci. Adv., 6 (2020), eaba9901. https://doi.org/10.1126/sciadv.aba9901 doi: 10.1126/sciadv.aba9901
![]() |
[13] |
F. Masood, W. Boulila, A. Alsaeedi, J. S. Khan, J. Ahmad, M. A. Khan, et al., A novel image encryption scheme based on Arnold cat map, Newton-Leipnik system and Logistic Gaussian map, Multimedia Tools Appl., 81 (2022), 30931–30959. https://doi.org/10.1007/s11042-022-12844-w doi: 10.1007/s11042-022-12844-w
![]() |
[14] |
S. I. Batool, H. M. Waseem, A novel image encryption scheme based on Arnold scrambling and Lucas series, Multimedia Tools Appl., 78 (2019), 27611–27637. https://doi.org/10.1007/s11042-019-07881-x doi: 10.1007/s11042-019-07881-x
![]() |
[15] |
J. Ye, X. Deng, A. Zhang, H. Yu, A novel image encryption algorithm based on improved Arnold transform and chaotic pulse-coupled neural network, Entropy., 24 (2022), 1103. https://doi.org/10.3390/e24081103 doi: 10.3390/e24081103
![]() |
[16] |
B. Zhang, L. Liu, Chaos-based image encryption: Review, application, and challenges, Mathematics., 11 (2023), 2585. https://doi.org/10.3390/math11112585 doi: 10.3390/math11112585
![]() |
[17] |
C. Qin, J. Hu, F. Li, Z. Qian, X. Zhang, JPEG image encryption with adaptive DC coefficient prediction and RS pair permutation, IEEE Trans. Multimedia, 25 (2022), 2528–2542. https://doi.org/10.1109/TMM.2022.3148591 doi: 10.1109/TMM.2022.3148591
![]() |
[18] |
Y. Peng, C. Fu, G. Cao, W. Song, J. Chen, C. W. Sham, JPEG-compatible joint image compression and encryption algorithm with file size preservation, ACM T. Multim. Comput., 20 (2024), 1–20. https://doi.org/10.1145/363345 doi: 10.1145/363345
![]() |
[19] |
M. A. Cardona-López, R. O. Flores-Carapia, V. M. Silva-García, E. D. Vega-Alvarado, M. D. González-Ramírez, A comparison between EtC and SPN systems: The security cost of compatibility in JPEG images, IEEE Access., 36 (2024), 1–14. https://doi.org/10.1109/ACCESS.2024.3458808 doi: 10.1109/ACCESS.2024.3458808
![]() |
[20] |
Q. Wang, X. Zhang, X. Zhao, Image encryption algorithm based on improved Zigzag transformation and quaternary DNA coding, J. Inf. Secur. Appl., 70 (2022), 103340. https://doi.org/10.1016/j.jisa.2022.103340 doi: 10.1016/j.jisa.2022.103340
![]() |
[21] |
Z. Guo, P. Sun, Improved reverse zigzag transform and DNA diffusion chaotic image encryption method, Multimedia Tools Appl., 81 (2022), 11301–11323. https://doi.org/10.1007/s11042-022-12269-5 doi: 10.1007/s11042-022-12269-5
![]() |
[22] |
H. Wen, Z. Xie, Z. Wu, Y. Lin, W. Feng, Exploring the future application of UAVs: Face image privacy protection scheme based on chaos and DNA cryptography, J. King Saud Univ. Comput. Inf. Sci., 36 (2024), 101871. https://doi.org/10.1016/j.jksuci.2023.101871 doi: 10.1016/j.jksuci.2023.101871
![]() |
[23] |
Y. Yang, L. Huang, N. V. Kuznetsov, B. Chai, Q. Guo, Generating multiwing hidden chaotic attractors with only stable node-foci: Analysis, implementation, and application, IEEE Trans. Ind. Electron., 71 (2023), 3986–3995. https://doi.org/10.1109/TIE.2023.3273242 doi: 10.1109/TIE.2023.3273242
![]() |
[24] |
L. Xu, J. Zhang, A novel four-wing chaotic system with multiple attractors based on hyperbolic sine: Application to image encryption, Integration., 87 (2022), 313–331. https://doi.org/10.1016/j.vlsi.2022.07.012 doi: 10.1016/j.vlsi.2022.07.012
![]() |
[25] |
J. Zhang, J. Yang, L. Xu, X. Zhu, The circuit realization of a fifth-order multi-wing chaotic system and its application in image encryption, Int. J. Circ. Theory Appl., 51 (2023), 1168–1186. https://doi.org/10.1002/cta.3490 doi: 10.1002/cta.3490
![]() |
[26] |
M. W. Hafiz, S. O. Hwang, A probabilistic model of quantum states for classical data security, Front. Phys., 18 (2023), 51304. https://doi.org/10.1007/s11467-023-1293-3 doi: 10.1007/s11467-023-1293-3
![]() |
[27] | A. G. Weber, The USC-SIPI image database: Version 5, 2006. http://sipi.usc.edu/database/ |
[28] |
S. I. Batool, M. Amin, H. M. Waseem, Public key digital contents confidentiality scheme based on quantum spin and finite state automation, Phys. A Stat. Mech. Appl., 537 (2020), 122677. https://doi.org/10.1016/j.physa.2019.122677 doi: 10.1016/j.physa.2019.122677
![]() |
[29] |
S. Patel, A. Vaish, Block based visually secure image encryption algorithm using 2D-compressive sensing and nonlinearity, Optik., 272 (2023), 170341. https://doi.org/10.1016/j.ijleo.2022.170341 doi: 10.1016/j.ijleo.2022.170341
![]() |
[30] |
Y. Peng, Z. Lan, K. Sun, W. Xu, A simple color image encryption algorithm based on a discrete memristive hyperchaotic map and time-controllable operation, Opt. Laser Technol., 165 (2023), 109543. https://doi.org/10.1016/j.optlastec.2023.109543 doi: 10.1016/j.optlastec.2023.109543
![]() |
[31] |
H. M. Waseem, A. Alghafis, M. Khan, An efficient public key cryptosystem based on dihedral group and quantum spin states, IEEE Access, 8 (2020), 71821–71832. https://doi.org/10.1109/ACCESS.2020.2987097 doi: 10.1109/ACCESS.2020.2987097
![]() |
[32] |
A. Nabilah, L. Said, M. Khan, Construction of optimum multivalued cryptographic Boolean function using artificial bee colony optimization and multi-criterion decision-making, Soft Comput., 28 (2024), 5213–5223. https://doi.org/10.1007/s00500-023-09267-6 doi: 10.1007/s00500-023-09267-6
![]() |
[33] |
N. Rani, S. R. Sharma, V. Mishra, Grayscale and colored image encryption model using a novel fused magic cube, Nonlinear Dyn., 108 (2022), 1773–1796. https://doi.org/10.1007/s11071-022-07276-y doi: 10.1007/s11071-022-07276-y
![]() |
[34] |
Q. Lai, G. Hu, U. Erkan, A. Toktas, A novel pixel-split image encryption scheme based on 2D Salomon map, Expert Syst. Appl., 213 (2023), 118845. https://doi.org/10.1016/j.eswa.2022.118845 doi: 10.1016/j.eswa.2022.118845
![]() |
[35] |
H. M. Waseem, S. S. Jamal, I. Hussain, M. Khan, A novel hybrid secure confidentiality mechanism for medical environment based on Kramer's spin principle, Int. J. Theor. Phys., 60 (2021), 314–330. https://doi.org/10.1007/s10773-020-04694-9 doi: 10.1007/s10773-020-04694-9
![]() |
[36] |
X. Liu, X. Tong, Z. Wang, M. Zhang, Uniform non-degeneracy discrete chaotic system and its application in image encryption, Nonlinear Dyn., 108 (2022), 653–682. https://doi.org/10.1007/s11071-021-07198-1 doi: 10.1007/s11071-021-07198-1
![]() |
[37] |
N. R. Zhou, L. J. Tong, W. P. Zou, Multi-image encryption scheme with quaternion discrete fractional Tchebyshev moment transform and cross-coupling operation, Signal Process., 211 (2023), 109107. https://doi.org/10.1016/j.sigpro.2023.109107 doi: 10.1016/j.sigpro.2023.109107
![]() |
[38] |
A. Alghafis, H. M. Waseem, M. Khan, S. S. Jamal, A hybrid cryptosystem for digital contents confidentiality based on rotation of quantum spin states, Phys. A Stat. Mech. Appl., 554 (2020), 123908. https://doi.org/10.1016/j.physa.2019.123908 doi: 10.1016/j.physa.2019.123908
![]() |
[39] |
M. W. Hafiz, W. K. Lee, S. O. Hwang, M. Khan, A. Latif, Discrete logarithmic factorial problem and Einstein crystal model based public-key cryptosystem for digital content confidentiality, IEEE Access., 10 (2022), 102119–102134. https://doi.org/10.1109/ACCESS.2022.3207781 doi: 10.1109/ACCESS.2022.3207781
![]() |
[40] |
N. Abughazalah, A. Latif, M. W. Hafiz, M. Khan, A. S. Alanazi, I. Hussain, Construction of multivalued cryptographic Boolean function using recurrent neural network and its application in image encryption scheme, Artif. Intell. Rev., 56 (2023), 5403–5443. https://doi.org/10.1007/s10462-022-10295-1 doi: 10.1007/s10462-022-10295-1
![]() |
[41] |
K. S. Krishnan, B. Jaison, S. P. Raja, Secured color image compression based on compressive sampling and Lü system, Inf. Technol. Control., 49 (2020), 346–369. https://doi.org/10.5755/j01.itc.49.3.25901 doi: 10.5755/j01.itc.49.3.25901
![]() |
[42] |
S. O. Hwang, H. M. Waseem, N. Munir, Billiard quantum chaos: A pioneering image encryption scheme in the post-quantum era, IEEE Access., 12 (2024), 39840–39853. https://doi.org/10.1109/ACCESS.2024.3415083 doi: 10.1109/ACCESS.2024.3415083
![]() |
[43] |
M. Ahmad, S. Agarwal, A. Alkhayyat, A. Alhudhaif, F. Alenezi, A. H. Zahid, et al., An image encryption algorithm based on new generalized fusion fractal structure, Inf. Sci., 592 (2022), 1–20. https://doi.org/10.1016/j.ins.2022.01.042 doi: 10.1016/j.ins.2022.01.042
![]() |
[44] |
W. Alexan, Y. L. Chen, L. Y. Por, M. Gabr, Hyperchaotic maps and the single neuron model: A novel framework for chaos-based image encryption, Symmetry., 15 (2023), 1081. https://doi.org/10.3390/sym15051081 doi: 10.3390/sym15051081
![]() |
[45] |
M. Khan, H. M. Waseem, A novel digital contents privacy scheme based on Kramer's arbitrary spin, Int. J. Theor. Phys., 58 (2019), 2720–2743 https://doi.org/10.1007/s10773-019-04162-z doi: 10.1007/s10773-019-04162-z
![]() |
[46] |
A. H. Ismail, H. M. Waseem, M. Ishtiaq, S. S. Jamal, M. Khan, Quantum spin half algebra and generalized Megrelishvili protocol for confidentiality of digital images, Int. J. Theor. Phys., 60 (2021), 1720–1741. https://doi.org/10.1007/s10773-021-04794-0 doi: 10.1007/s10773-021-04794-0
![]() |
[47] |
Y. Wang, Y. Shang, Z. Shao, Y. Zhang, G. Coatrieux, H. Ding, et al., Multiple color image encryption based on cascaded quaternion gyrator transforms, Signal Process. Image Commun., 107 (2022), 116793. https://doi.org/10.1016/j.image.2022.116793 doi: 10.1016/j.image.2022.116793
![]() |
[48] |
H. M. Waseem, S. O. Hwang, Design of highly nonlinear confusion component based on entangled points of quantum spin states, Sci. Rep., 13 (2023), 1099. https://doi.org/10.1038/s41598-023-28002-7 doi: 10.1038/s41598-023-28002-7
![]() |