Research article Special Issues

An efficient confidentiality scheme based on quadratic chaotic map and Fibonacci sequence

  • In today's rapidly evolving digital landscape, secure data transmission and exchange are crucial for protecting sensitive information across personal, financial, and global infrastructures. Traditional cryptographic algorithms like RSA and AES face increasing challenges due to the rise of quantum computing and enhanced computational power, necessitating innovative approaches for data security. We explored a novel encryption scheme leveraging the quadratic chaotic map (QCM) integrated with the Fibonacci sequence, addressing key sensitivity, periodicity, and computational efficiency. By employing chaotic systems' inherent unpredictability and sensitivity to initial conditions, the proposed method generates highly secure and unpredictable ciphers suitable for text and image encryption. We incorporated a combined sequence from the Fibonacci sequence and QCM, providing enhanced complexity and security. Comprehensive experimental analyses, including noise and occlusion attack simulations, demonstrate the scheme's robustness, resilience, and practicality. The results indicated that the proposed encryption framework offers a secure, efficient, and adaptable solution for digital data protection against modern computational threats.

    Citation: Majid Khan, Hafiz Muhammad Waseem. An efficient confidentiality scheme based on quadratic chaotic map and Fibonacci sequence[J]. AIMS Mathematics, 2024, 9(10): 27220-27246. doi: 10.3934/math.20241323

    Related Papers:

    [1] Khaled M. Saad, Manal Alqhtani . Numerical simulation of the fractal-fractional reaction diffusion equations with general nonlinear. AIMS Mathematics, 2021, 6(4): 3788-3804. doi: 10.3934/math.2021225
    [2] Abdon Atangana, Ali Akgül . Analysis of a derivative with two variable orders. AIMS Mathematics, 2022, 7(5): 7274-7293. doi: 10.3934/math.2022406
    [3] Abdon Atangana, Seda İğret Araz . Extension of Chaplygin's existence and uniqueness method for fractal-fractional nonlinear differential equations. AIMS Mathematics, 2024, 9(3): 5763-5793. doi: 10.3934/math.2024280
    [4] Manal Alqhtani, Khaled M. Saad . Numerical solutions of space-fractional diffusion equations via the exponential decay kernel. AIMS Mathematics, 2022, 7(4): 6535-6549. doi: 10.3934/math.2022364
    [5] Amir Ali, Abid Ullah Khan, Obaid Algahtani, Sayed Saifullah . Semi-analytical and numerical computation of fractal-fractional sine-Gordon equation with non-singular kernels. AIMS Mathematics, 2022, 7(8): 14975-14990. doi: 10.3934/math.2022820
    [6] Hasib Khan, Jehad Alzabut, Anwar Shah, Sina Etemad, Shahram Rezapour, Choonkil Park . A study on the fractal-fractional tobacco smoking model. AIMS Mathematics, 2022, 7(8): 13887-13909. doi: 10.3934/math.2022767
    [7] Rahat Zarin, Amir Khan, Pushpendra Kumar, Usa Wannasingha Humphries . Fractional-order dynamics of Chagas-HIV epidemic model with different fractional operators. AIMS Mathematics, 2022, 7(10): 18897-18924. doi: 10.3934/math.20221041
    [8] Muhammad Farman, Ali Akgül, Sameh Askar, Thongchai Botmart, Aqeel Ahmad, Hijaz Ahmad . Modeling and analysis of fractional order Zika model. AIMS Mathematics, 2022, 7(3): 3912-3938. doi: 10.3934/math.2022216
    [9] Muhammad Aslam, Muhammad Farman, Hijaz Ahmad, Tuan Nguyen Gia, Aqeel Ahmad, Sameh Askar . Fractal fractional derivative on chemistry kinetics hires problem. AIMS Mathematics, 2022, 7(1): 1155-1184. doi: 10.3934/math.2022068
    [10] Asif Khan, Tayyaba Akram, Arshad Khan, Shabir Ahmad, Kamsing Nonlaopon . Investigation of time fractional nonlinear KdV-Burgers equation under fractional operators with nonsingular kernels. AIMS Mathematics, 2023, 8(1): 1251-1268. doi: 10.3934/math.2023063
  • In today's rapidly evolving digital landscape, secure data transmission and exchange are crucial for protecting sensitive information across personal, financial, and global infrastructures. Traditional cryptographic algorithms like RSA and AES face increasing challenges due to the rise of quantum computing and enhanced computational power, necessitating innovative approaches for data security. We explored a novel encryption scheme leveraging the quadratic chaotic map (QCM) integrated with the Fibonacci sequence, addressing key sensitivity, periodicity, and computational efficiency. By employing chaotic systems' inherent unpredictability and sensitivity to initial conditions, the proposed method generates highly secure and unpredictable ciphers suitable for text and image encryption. We incorporated a combined sequence from the Fibonacci sequence and QCM, providing enhanced complexity and security. Comprehensive experimental analyses, including noise and occlusion attack simulations, demonstrate the scheme's robustness, resilience, and practicality. The results indicated that the proposed encryption framework offers a secure, efficient, and adaptable solution for digital data protection against modern computational threats.



    Fractional calculus has come out as one of the most applicable subjects of mathematics [1]. Its importance is evident from the fact that many real-world phenomena can be best interpreted and modeled using this theory. It is also a fact that many disciplines of engineering and science have been influenced by the tools and techniques of fractional calculus. Its emergence can easily be traced and linked with the famous correspondence between the two mathematicians, L'Hospital and Leibnitz, which was made on 30th September 1695. After that, many researchers tried to explore the concept of fractional calculus, which is based on the generalization of nth order derivatives or n-fold integration [2,3,4].

    Recently, Khan and Khan [5] have discovered novel definitions of fractional integral and derivative operators. These operators enjoy interesting properties such as continuity, boundedeness, linearity etc. The integral operators, they presented, are stated as under:

    Definition 1 ([5]). Let hLθ[s,t](conformable integrable on [s,t][0,)). The left-sided and right-sided generalized conformable fractional integrals τθKνs+ and τθKνt of order ν>0 with θ(0,1], τR, θ+τ0 are defined by:

    τθKνs+h(r)=1Γ(ν)rs(rτ+θwτ+θτ+θ)ν1h(w)wτdθw,r>s, (1.1)

    and

    τθKνth(r)=1Γ(ν)tr(wτ+θrτ+θτ+θ)ν1h(w)wτdθw,t>r, (1.2)

    respectively, and τθK0s+h(r)=τθK0th(r)=h(r). Here Γ denotes the well-known Gamma function.

    Here the integral tsdθw represents the conformable integration, defined as:

    tsh(w)dθw=tsh(w)wθ1dw. (1.3)

    The operators defined in Definition 1 are in generalized form and contain few important operators in themselves. Here, only the left-sided operators are presented, the corresponding right-sided operators may be deduced in the similar way. Moreover, to understand the theory of conformable fractional calculus, one can see [5,6,7]. Also, the basic theory of fractional calculus can be found in the books [1,8,9] and for the latest research in this field one can see [3,4,10,11,12] and the references there in.

    Remark 1. 1) For θ=1 in the Definition 1, the following Katugampula fractional integral operator is obtained [13]:

    τ1Kνs+h(r)=1Γ(ν)rs(rτ+1wτ+1τ+1)ν1h(w)dw,r>s. (1.4)

    2) For τ=0 in the Definition 1, the New Riemann Liouville type conformable fractional integral operator is obtained as given below:

    0θKνs+h(r)=1Γ(ν)rs(rθwθθ)ν1h(w)dθw,r>s. (1.5)

    3) Using the definition of conformable integral given in (1.3) and L'Hospital rule, it is straightforward that when θ0 in (1.5), we get the Hadamard fractional integral operator as follows:

    00+Kνs+h(r)=1Γ(ν)rs(logrw)ν1h(w)dww,r>s. (1.6)

    4) For θ=1 in (1.5), the well-known Riemann-Liouville fractional integral operator is obtained as follows:

    01Kνs+h(r)=1Γ(ν)rs(rw)ν1h(w)dw,r>s. (1.7)

    5) For the case ν=1,τ=0 in Definition 1, we get the conformable fractional integrals. And when θ=ν=1, τ=0, we get the classical Riemann integrals.

    This subsection is devoted to start with the definition of convex function, which plays a very important role in establishment of various kinds of inequalities [14]. This definition is given as follows [15]:

    Definition 2. A function h:IRR is said to be convex on I if the inequality

    h(ηs+(1η)t)ηh(s)+(1η)h(t) (1.8)

    holds for all s,tI and 0η1. The function h is said to be concave on I if the inequality given in (1.8) holds in the reverse direction.

    Associated with the Definition 2 of convex functions the following double inequality is well-known and it has been playing a key role in various fields of science and engineering [15].

    Theorem 1. Let h:IRR be a convex function and s,tI with s<t. Then we have the following Hermite-Hadamard inequality:

    h(s+t2)1tstsh(τ)dτh(s)+h(t)2. (1.9)

    This inequality (1.9) appears in a reversed order if the function h is supposed to be concave. Also, the relation (1.9) provides upper and lower estimates for the integral mean of the convex function h. The inequality (1.9) has various versions (extensions or generalizations) corresponding to different integral operators [16,17,18,19,20,21,22,23,24,25] each version has further forms with respect to various kinds of convexities [26,27,28,29,30,31,32] or with respect to different bounds obtained for the absolute difference of the two leftmost or rightmost terms in the Hermite-Hadamard inequality.

    By using the Riemann-Liouville fractional integral operators, Sirikaye et al. have proved the following Hermite-Hadamard inequality [33].

    Theorem 2. ([33]). Let h:[s,t]R be a function such that 0s<t and hL[s,t]. If h is convex on [s,t], then the following double inequality holds:

    h(s+t2)Γ(ν+1)2(ts)ν[01Kνs+h(t)+01Kνth(s)]h(s)+h(t)2. (1.10)

    For more recent research related to generalized Hermite-Hadamard inequality one can see [34,35,36,37,38,39,40,41,42] and the references therein.

    Motivated from the Riemann-Liouville version of Hermite-Hadamard inequality (given above in (1.10)), we prove the same inequality for newly introduced generalized conformable fractional operators. As a result we get a more generalized inequality, containing different versions of Hermite-Hadamard inequality in single form. We also prove an identity for generalized conformable fractional operators and establish a bound for the absolute difference of two rightmost terms in the newly obtained Hermite-Hadamard inequality. We point out some relations of our results with those of other results from the past. At the end we present conclusion, where directions for future research are also mentioned.

    In the following theorem the well-known Hermite-Hadamard inequality for the newly defined integral operators is proved.

    Theorem 3. Let ν>0 and τR,θ(0,1] such that τ+θ>0. Let h:[s,t][0,)R be a function such that hLθ[s,t](conformal integrable on [s, t]). If h is also a convex function on [s,t], then the following Hermite-Hadamard inequality for generalized conformable fractional Integrals τθKνs+ and τθKνt holds:

    h(s+t2)(τ+θ)νΓ(ν+1)4(tτ+θsτ+θ)ν[τθKνs+H(t)+τθKνtH(s)]h(s)+h(t)2, (2.1)

    where H(x)=h(x)+˜h(x), ˜h(x)=h(s+tx).

    Proof. Let η[0,1]. Consider x,y[s,t], defined by x=ηs+(1η)t,y=(1η)s+ηt. Since h is a convex function on [s,t], we have

    h(s+t2)=h(x+y2)h(x)+h(y)2=h(ηs+(1η)t)+h((1η)s+ηt)2. (2.2)

    Multiplying both sides of (2.2) by

    (ts)(τ+θ)1ν((1η)s+ηt)τ+θ1Γ(ν)[tτ+θ((1η)s+ηt)τ+θ]1ν,

    and integrating with respect to η, we get

    (ts)(τ+θ)1νΓ(ν)h(s+t2)10((1η)s+ηt)τ+θ1[tτ+θ((1η)s+ηt)τ+θ]1νdη(ts)(τ+θ)1νΓ(ν)12{10((1η)s+ηt)τ+θ1[tτ+θ((1η)s+ηt)τ+θ]1νh(ηs+(1η)t)dη+10(1η)s+ηt)τ+θ1[tτ+θ((1η)s+ηt)τ+θ]1νh((1η)s+ηt)dη}. (2.3)

    Note that we have

    10((1η)s+ηt)τ+θ1[tτ+θ((1η)s+ηt)τ+θ]1νdη=1ν(τ+θ)(ts)(tτ+θsτ+θ)ν.

    Also, by using the identity ˜h((1η)s+ηt)=h(ηs+(1η)t), and making substitution (1η)s+ηt=w, we get

    (ts)(τ+θ)1νΓ(ν)10((1η)s+ηt)τ+θ1[tτ+θ((1η)s+ηt)τ+θ]1νh(ηs+(1η)t)dη=(τ+θ)1νΓ(ν)tswτ+θ1[tτ+θwτ+θ]1ν˜h(w)dw=(τ+θ)1νΓ(ν)tswτ[tτ+θwτ+θ]1ν˜h(w)dθw=τθKνs+˜h(t). (2.4)

    Similarly

    (ts)(τ+θ)1νΓ(ν)10((1η)s+ηt)τ+θ1[tτ+θ((1η)s+ηt)τ+θ]1νh(ηt+(1η)s)dη=τθKνs+h(t). (2.5)

    By substituting these values in (2.3), we get

    (tτ+θsτ+θ)νΓ(ν+1)(τ+θ)νh(s+t2)τθKνs+H(t)2. (2.6)

    Again, by multiplying both sides of (2.2) by

    (ts)(τ+θ)1ν((1η)s+ηt)τ+θ1Γ(ν)[((1η)s+ηt)τ+θsτ+θ]1ν,

    and then integrating with respect to η and by using the same techniques used above, we can obtain:

    (tτ+θsτ+θ)νΓ(ν+1)(τ+θ)νh(s+t2)τθKνtH(s)2. (2.7)

    Adding (2.7) and (2.6), we get:

    h(s+t2)Γ(ν+1)(τ+θ)ν4(tτ+θsτ+θ)ν[τθKνs+H(t)+τθKνtH(s)]. (2.8)

    Hence the left-hand side of the inequality (2.1) is established.

    Also since h is convex, we have:

    h(ηs+(1η)t)+h((1η)s+ηt)h(s)+h(t). (2.9)

    Multiplying both sides

    (ts)(τ+θ)1ν((1η)s+ηt)τ+θ1Γ(ν)[tτ+θ((1η)s+ηt)τ+θ]1ν,

    and integrating with respect to η we get

    (ts)(τ+θ)1νΓ(ν)10((1η)s+ηt)τ+θ1[tτ+θ((1η)s+ηt)τ+θ]1νh(ηs+(1η)t)dη+(ts)(τ+θ)1νΓ(ν)10((1η)s+ηt)τ+θ1[tτ+θ((1η)s+ηt)τ+θ]1νh(ηt+(1η)s)dη(ts)(τ+θ)1νΓ(ν)[h(s)+h(t)]10(1η)s+ηt)τ+θ1[tτ+θ((1η)s+ηt)τ+θ]1νdη, (2.10)

    that is,

    τθKνs+H(t)(tτ+θsτ+θ)νΓ(ν+1)(τ+θ)ν[h(s)+h(t)]. (2.11)

    Similarly multiplying both sides of (2.9) by

    (ts)(τ+θ)1ν((1η)s+ηt)τ+θ1Γ(ν)[((1η)s+ηt)τ+θsτ+θ]1ν,

    and integrating with respect to η, we can obtain

    τθKνtH(s)(tτ+θsτ+θ)νΓ(ν+1)(τ+θ)ν[h(s)+h(t)]. (2.12)

    Adding the inequalities (2.11) and (2.12), we get:

    Γ(ν+1)(τ+θ)ν4(tτ+θsτ+θ)ν[τθKνtH(s)+τθKνs+H(t)]h(s)+h(t)2. (2.13)

    Combining (2.8) and (2.13), we get the required result.

    The inequality in (2.1) is in compact form containing few inequalities for different integrals in it. The following remark tells us about that fact.

    Remark 2. 1) For θ=1 in (2.1), we get Hermite-Hadamard inequality for Katugampola fractional integral operators, as follows [38]:

    h(s+t2)(τ+1)νΓ(ν+1)4(tτ+1sτ+1)ν[τ1Kνs+H(t)+τ1KνtH(s)]h(s)+h(t)2, (2.14)

    where H(x)=h(x)+˜h(x), ˜h(x)=h(s+tx).

    2) For τ=0 in (2.1), we get Hermite-Hadamard inequality for newly obtained Riemann Liouville type conformable fractional integral operators, as follows:

    h(s+t2)θνΓ(ν+1)4(tθsθ)ν[0θKνs+H(t)+0θKνtH(s)]h(s)+h(t)2, (2.15)

    where H(x)=h(x)+˜h(x), ˜h(x)=h(s+tx).

    3) For τ+θ0, in (2.1), applying L'Hospital rule and the relation (1.3), we get Hermite-Hadamard inequality for Hadamard fractional integral operators, as follows:

    h(s+t2)Γ(ν+1)2(lnts)ν[00+Kνs+h(t)+00+Kνth(s)]h(s)+h(t)2. (2.16)

    4) For τ+θ=1 in (2.1), the Hermite-Hadamard inequality is obtained for Riemann-Liouville fractional integrals [33]:

    h(s+t2)Γ(ν+1)2(ts)ν[01Kνs+h(t)+01Kνth(s)]h(s)+h(t)2. (2.17)

    5) For the case ν=1,τ=0 in (2.1), the Hermite-Hadamard inequality is obtained for the conformable fractional integrals as follows:

    h(s+t2)θ2(tθsθ)tsH(w)dθwh(s)+h(t)2. (2.18)

    6) When θ=ν=1, τ=0 the Hermite-Hadamard inequality is obtained for classical Riemann integrals [15]:

    h(s+t2)1tstsh(w)dwh(s)+h(t)2. (2.19)

    To bound the difference of two rightmost terms in the main inequality (2.1), we need to establish the following Lemma.

    Lemma 1. Let τ+θ>0 and ν>0. If hLθ[s,t], then

    h(s)+h(t)2(τ+θ)νΓ(ν+1)4(tτ+θsτ+θ)ν[τθKνs+H(t)+τθKνtH(s)]=ts4(tτ+θsτ+θ)ν10Δντ+θ(η)h(ηs+(1η)t)dη, (2.20)

    where

    Δντ+θ(η)=[(ηs+(1η)t)τ+θsτ+θ]ν[(ηt+(1η)s)τ+θsτ+θ]ν+[tτ+θ((1η)s+ηt)τ+θ]ν[tτ+θ((1η)t+ηs)τ+θ]ν.

    Proof. With the help of integration by parts, we have

    τθKνs+H(t)=(tτ+θsτ+θ)ν(τ+θ)νΓ(ν+1)H(s)+(ts)ν(τ+θ)νΓ(ν+1)10[tτ+θ((1η)s+ηt)τ+θ]νH(ηt+(1η)s)dη. (2.21)

    Similarly, we have

    τθKνtH(s)=(tτ+θsτ+θ)ν(τ+θ)νΓ(ν+1)H(t)(ts)ν(τ+θ)νΓ(ν+1)10[((1η)s+ηt)τ+θsτ+θ]νH(ηt+(1η)s)dη. (2.22)

    Using (2.21) and (2.22) we have

    4(tτ+θsτ+θ)νts(h(s)+h(t)2(τ+θ)νΓ(ν+1)4(tτ+θsτ+θ)ν[τθKνtH(s)+τθKνs+H(t)])=10([((1η)s+ηt)τ+θsτ+θ]ν[(tτ+θ((1η)s+ηt)τ+θ]ν)H(ηt+(1η)s)dη. (2.23)

    Also, we have

    H(ηt+(1η)s)=h(ηt+(1η)s)h(ηs+(1η)t),η[0,1]. (2.24)

    And

    10[((1η)s+ηt)τ+θsτ+θ]νH(ηt+(1η)s)dη=10[((1η)t+ηs)τ+θsτ+θ]νh(ηs+(1η)t)dη10[((1η)s+ηt)τ+θsτ+θ]νh(ηs+(1η)t)dη. (2.25)

    Also, we have

    10[tτ+θ((1η)s+ηt)τ+θ]νH(ηt+(1η)s)dη=10[tτ+θ((1η)t+ηs)τ+θ]νh(ηs+(1η)t)dη10[tτ+θ((1η)s+ηt)τ+θ]νh(ηs+(1η)t)dη. (2.26)

    Using (2.23), (2.25) and (2.26) we get the required result.

    Remark 3. When τ+θ=1 in Lemma 1, we get the Lemma 2 in [33].

    Definition 3. For ν>0, we define the operators

    Ων1(x,y,τ+θ)=s+t2s|xw||yτ+θwτ+θ|νdwts+t2|xw||yτ+θwτ+θ|νdw, (2.27)

    and

    Ων2(x,y,τ+θ)=s+t2s|xw||wτ+θyτ+θ|νdwts+t2|xw||wτ+θyτ+θ|νdw, (2.28)

    where x,y[s,t][0,) and τ+θ>0.

    Theorem 4. Let h be a conformable integrable function over [s,t] such that |h| is convex function. Then for ν>0 and τ+θ>0 we have:

    |h(s)+h(t)2(τ+θ)νΓ(ν+1)4(tτ+θsτ+θ)ν[τθKνs+H(t)+τθKνtH(s)]|Kντ+θ(s,t)4(ts)(tτ+θsτ+θ)ν(|h(s)|+|h(t)|), (2.29)

    where Kντ+θ(s,t)=Ων1(t,t,τ+θ)+Ων2(s,s,τ+θ)Ων2(t,s,τ+θ)Ων1(s,t,τ+θ).

    Proof. Using Lemma 1 and convexity of |h|, we have:

    |h(s)+h(t)2(τ+θ)νΓ(ν+1)4(tτ+θsτ+θ)ν[τθKνs+H(t)+τθKνtH(s)]|ts4(tτ+θsτ+θ)ν10|Δντ+θ(η)||h(ηs+(1η)t)|dηts4(tτ+θsτ+θ)ν(|h(s)|10η|Δντ+θ(η)|dη+|h(t)|10(1η)|Δντ+θ(η)|dη). (2.30)

    Here 10η|Δντ+θ(η)|dη=1(ts)2ts|ψ(u)|(tu)du,

    and ψ(u)=(uτ+θsτ+θ)ν((t+su)τ+θsτ+θ)ν+(tτ+θ(s+tu)τ+θ)ν(tτ+θuτ+θ)ν.

    We observe that ψ is a nondecreasing function on [s,t]. Moreover, we have:

    ψ(s)=2(tτ+θsτ+θ)ν<0,

    and also ψ(s+t2)=0. As a consequence, we have

    {ψ(u)0,if sus+t2,ψ(u)>0,if s+t2<ut.

    Thus we get

    10η|Δντ+θ(η)|dη=1(ts)2ts|ψ(u)|(tu)du=1(ts)2[s+t2sψ(u)(tu)du+ts+t2ψ(u)(tu)du]=1(ts)2[K1+K2+K3+K4], (2.31)

    where

    K1=s+t2s(tu)(uτ+θsτ+θ)νdu+ts+t2(tu)(uτ+θsτ+θ)νdu, (2.32)
    K2=s+t2s(tu)((t+su)τ+θsτ+θ)νduts+t2(tu)((t+su)τ+θsτ+θ)νdu, (2.33)
    K3=s+t2s(tu)(tτ+θ(s+tu)τ+θ)νdu+ts+t2(tu)(tτ+θ(s+tu)τ+θ)νdu, (2.34)

    and

    K4=s+t2s(tu)(tτ+θuτ+θ)νduts+t2(tu)(tτ+θuτ+θ)νdu. (2.35)

    We can see here that K1=Ων2(t,s,τ+θ), K4=Ων1(t,t,τ+θ).

    Also, by using of change of the variables v=s+tu, we get

    K2=Ων2(s,s,τ+θ),K3=Ων1(s,t,τ+θ). (2.36)

    By substituting these values in (2.31), we get

    10ηΔντ+θ(η)dη=Ων2(t,s,τ+θ)+Ων1(t,t,τ+θ)+Ων2(s,s,τ+θ)Ων1(s,t,τ+θ)(ts)2. (2.37)

    Similarly, we can find

    10(1η)Δντ+θ(η)dη=Ων2(s,s,τ+θ)Ων2(t,s,τ+θ)+Ων1(t,t,τ+θ)Ων1(s,t,τ+θ)(ts)2. (2.38)

    Finally, by using (2.30), (2.37) and (2.38) we get the required result.

    Remark 4. when τ+θ=1 in (2.29), we obtain

    |h(s)+h(t)2Γ(ν+1)2(ts)ν[01Kνth(s)+01Kνs+h(t)]|(ts)2(ν+1)(112ν)[h(s)+h(t)],

    which is Theorem 3 in [33].

    A generalized version of Hermite-Hadamard inequality via newly introduced GC fractional operators has been acquired successfully. This result combines several versions (new and old) of the Hermite-Hadamard inequality into a single form, each one has been discussed by fixing parameters in the newly established version of the Hermite-Hadamard inequality. Moreover, an identity containing the GC fractional integral operators has been proved. By using this identity, a bound for the absolute of the difference between the two rightmost terms in the newly established Hermite-Hadamard inequality has been presented. Also, some relations of our results with those of already existing results have been pointed out. Since this is a fact that there exist more than one definitions for fractional derivatives [2] which makes it difficult to choose a convenient operator for solving a given problem. Thus, in the present paper, the GC fractional operators (containing various previously defined fractional operators into a single form) have been used in order to overcome the problem of choosing a suitable fractional operator and to provide a unique platform for researchers working with different operators in this field. Also, by making use of GC fractional operators one can follow the research work which has been performed for the two versions (1.9) and (1.10) of Hermite-Hadamard inequality.

    This work was supported by the Natural Science Foundation of China (Grant Nos. 61673169, 11301127, 11701176, 11626101, 11601485).

    The authors declare that there are no conflicts of interest regarding the publication of this paper.



    [1] B. S. Kumar, R. Revathi, An efficient image encryption algorithm using a discrete memory-based logistic map with deep neural network, J. Eng. Appl. Sci., 71 (2024), 41. https://doi.org/10.1186/s44147-023-00349-8 doi: 10.1186/s44147-023-00349-8
    [2] C. Wang, Y. Zhang, A novel image encryption algorithm with deep neural network, Signal Process., 196 (2022), 108536. https://doi.org/10.1016/j.sigpro.2022.108536 doi: 10.1016/j.sigpro.2022.108536
    [3] A. Ampavathi, G. Pradeepini, T. V. Saradhi, Optimized deep learning-enabled hybrid logistic piece-wise chaotic map for secured medical data storage system, Int. J. Inf. Technol. Decis. Mak., 22 (2023), 1743–1775. https://doi.org/10.1142/S0219622022500869 doi: 10.1142/S0219622022500869
    [4] H. Lee, Y. Lee, Optimizations of privacy-preserving DNN for low-latency inference on encrypted data, IEEE Access, 11 (2023), 104775–104788. https://doi.org/10.1109/ACCESS.2023.3318433 doi: 10.1109/ACCESS.2023.3318433
    [5] U. Sirisha, B. S. Chandana, Privacy preserving image encryption with optimal deep transfer learning-based accident severity classification model, Sensors, 23 (2023), 519. https://doi.org/10.3390/s23010519 doi: 10.3390/s23010519
    [6] W. S. Admass, Y. Y. Munaye, A. Diro, Cyber security: State of the art, challenges and future directions, Cyber Security Appl., 2 (2023), 100031. https://doi.org/10.1016/j.csa.2023.100031 doi: 10.1016/j.csa.2023.100031
    [7] P. Singh, S. Dutta, P. Pranav, Optimizing GANs for cryptography: The role and impact of activation functions in neural layers assessing the cryptographic strength, Appl. Sci., 14 (2024), 2379. https://doi.org/10.3390/app14062379 doi: 10.3390/app14062379
    [8] Y. Chen, S. Xie, J. Zhang, A hybrid domain image encryption algorithm based on improved henon map, Entropy, 24 (2022), 287. https://doi.org/10.3390/e24020287 doi: 10.3390/e24020287
    [9] M. Devipriya, M. Sreenivasan, M. Brindha, Reconfigurable architecture for image encryption using a three-layer artificial neural network, IETE J. Res., 70 (2024), 473–86. https://doi.org/10.1080/03772063.2022.2127940 doi: 10.1080/03772063.2022.2127940
    [10] R. B. Naik, U. Singh, A review on applications of chaotic maps in pseudo-random number generators and encryption, Ann. Data Sci., 11 (2024), 25–50. https://doi.org/10.1007/s40745-021-00364-7 doi: 10.1007/s40745-021-00364-7
    [11] A. Chattopadhyay, P. Hassanzadeh, D. Subramanian, Data-driven predictions of a multiscale Lorenz 96 chaotic system using machine-learning methods: reservoir computing, artificial neural network, and long short-term memory network, Nonlinear Process. Geophys., 27 (2020), 373–389. https://doi.org/10.5194/npg-27-373-2020 doi: 10.5194/npg-27-373-2020
    [12] K. Yang, Q. Duan, Y. Wang, T. Zhang, Y. Yang, R. Huang, Transiently chaotic simulated annealing based on intrinsic nonlinearity of memristors for efficient solution of optimization problems, Sci. Adv., 6 (2020), eaba9901. https://doi.org/10.1126/sciadv.aba9901 doi: 10.1126/sciadv.aba9901
    [13] F. Masood, W. Boulila, A. Alsaeedi, J. S. Khan, J. Ahmad, M. A. Khan, et al., A novel image encryption scheme based on Arnold cat map, Newton-Leipnik system and Logistic Gaussian map, Multimedia Tools Appl., 81 (2022), 30931–30959. https://doi.org/10.1007/s11042-022-12844-w doi: 10.1007/s11042-022-12844-w
    [14] S. I. Batool, H. M. Waseem, A novel image encryption scheme based on Arnold scrambling and Lucas series, Multimedia Tools Appl., 78 (2019), 27611–27637. https://doi.org/10.1007/s11042-019-07881-x doi: 10.1007/s11042-019-07881-x
    [15] J. Ye, X. Deng, A. Zhang, H. Yu, A novel image encryption algorithm based on improved Arnold transform and chaotic pulse-coupled neural network, Entropy., 24 (2022), 1103. https://doi.org/10.3390/e24081103 doi: 10.3390/e24081103
    [16] B. Zhang, L. Liu, Chaos-based image encryption: Review, application, and challenges, Mathematics., 11 (2023), 2585. https://doi.org/10.3390/math11112585 doi: 10.3390/math11112585
    [17] C. Qin, J. Hu, F. Li, Z. Qian, X. Zhang, JPEG image encryption with adaptive DC coefficient prediction and RS pair permutation, IEEE Trans. Multimedia, 25 (2022), 2528–2542. https://doi.org/10.1109/TMM.2022.3148591 doi: 10.1109/TMM.2022.3148591
    [18] Y. Peng, C. Fu, G. Cao, W. Song, J. Chen, C. W. Sham, JPEG-compatible joint image compression and encryption algorithm with file size preservation, ACM T. Multim. Comput., 20 (2024), 1–20. https://doi.org/10.1145/363345 doi: 10.1145/363345
    [19] M. A. Cardona-López, R. O. Flores-Carapia, V. M. Silva-García, E. D. Vega-Alvarado, M. D. González-Ramírez, A comparison between EtC and SPN systems: The security cost of compatibility in JPEG images, IEEE Access., 36 (2024), 1–14. https://doi.org/10.1109/ACCESS.2024.3458808 doi: 10.1109/ACCESS.2024.3458808
    [20] Q. Wang, X. Zhang, X. Zhao, Image encryption algorithm based on improved Zigzag transformation and quaternary DNA coding, J. Inf. Secur. Appl., 70 (2022), 103340. https://doi.org/10.1016/j.jisa.2022.103340 doi: 10.1016/j.jisa.2022.103340
    [21] Z. Guo, P. Sun, Improved reverse zigzag transform and DNA diffusion chaotic image encryption method, Multimedia Tools Appl., 81 (2022), 11301–11323. https://doi.org/10.1007/s11042-022-12269-5 doi: 10.1007/s11042-022-12269-5
    [22] H. Wen, Z. Xie, Z. Wu, Y. Lin, W. Feng, Exploring the future application of UAVs: Face image privacy protection scheme based on chaos and DNA cryptography, J. King Saud Univ. Comput. Inf. Sci., 36 (2024), 101871. https://doi.org/10.1016/j.jksuci.2023.101871 doi: 10.1016/j.jksuci.2023.101871
    [23] Y. Yang, L. Huang, N. V. Kuznetsov, B. Chai, Q. Guo, Generating multiwing hidden chaotic attractors with only stable node-foci: Analysis, implementation, and application, IEEE Trans. Ind. Electron., 71 (2023), 3986–3995. https://doi.org/10.1109/TIE.2023.3273242 doi: 10.1109/TIE.2023.3273242
    [24] L. Xu, J. Zhang, A novel four-wing chaotic system with multiple attractors based on hyperbolic sine: Application to image encryption, Integration., 87 (2022), 313–331. https://doi.org/10.1016/j.vlsi.2022.07.012 doi: 10.1016/j.vlsi.2022.07.012
    [25] J. Zhang, J. Yang, L. Xu, X. Zhu, The circuit realization of a fifth-order multi-wing chaotic system and its application in image encryption, Int. J. Circ. Theory Appl., 51 (2023), 1168–1186. https://doi.org/10.1002/cta.3490 doi: 10.1002/cta.3490
    [26] M. W. Hafiz, S. O. Hwang, A probabilistic model of quantum states for classical data security, Front. Phys., 18 (2023), 51304. https://doi.org/10.1007/s11467-023-1293-3 doi: 10.1007/s11467-023-1293-3
    [27] A. G. Weber, The USC-SIPI image database: Version 5, 2006. http://sipi.usc.edu/database/
    [28] S. I. Batool, M. Amin, H. M. Waseem, Public key digital contents confidentiality scheme based on quantum spin and finite state automation, Phys. A Stat. Mech. Appl., 537 (2020), 122677. https://doi.org/10.1016/j.physa.2019.122677 doi: 10.1016/j.physa.2019.122677
    [29] S. Patel, A. Vaish, Block based visually secure image encryption algorithm using 2D-compressive sensing and nonlinearity, Optik., 272 (2023), 170341. https://doi.org/10.1016/j.ijleo.2022.170341 doi: 10.1016/j.ijleo.2022.170341
    [30] Y. Peng, Z. Lan, K. Sun, W. Xu, A simple color image encryption algorithm based on a discrete memristive hyperchaotic map and time-controllable operation, Opt. Laser Technol., 165 (2023), 109543. https://doi.org/10.1016/j.optlastec.2023.109543 doi: 10.1016/j.optlastec.2023.109543
    [31] H. M. Waseem, A. Alghafis, M. Khan, An efficient public key cryptosystem based on dihedral group and quantum spin states, IEEE Access, 8 (2020), 71821–71832. https://doi.org/10.1109/ACCESS.2020.2987097 doi: 10.1109/ACCESS.2020.2987097
    [32] A. Nabilah, L. Said, M. Khan, Construction of optimum multivalued cryptographic Boolean function using artificial bee colony optimization and multi-criterion decision-making, Soft Comput., 28 (2024), 5213–5223. https://doi.org/10.1007/s00500-023-09267-6 doi: 10.1007/s00500-023-09267-6
    [33] N. Rani, S. R. Sharma, V. Mishra, Grayscale and colored image encryption model using a novel fused magic cube, Nonlinear Dyn., 108 (2022), 1773–1796. https://doi.org/10.1007/s11071-022-07276-y doi: 10.1007/s11071-022-07276-y
    [34] Q. Lai, G. Hu, U. Erkan, A. Toktas, A novel pixel-split image encryption scheme based on 2D Salomon map, Expert Syst. Appl., 213 (2023), 118845. https://doi.org/10.1016/j.eswa.2022.118845 doi: 10.1016/j.eswa.2022.118845
    [35] H. M. Waseem, S. S. Jamal, I. Hussain, M. Khan, A novel hybrid secure confidentiality mechanism for medical environment based on Kramer's spin principle, Int. J. Theor. Phys., 60 (2021), 314–330. https://doi.org/10.1007/s10773-020-04694-9 doi: 10.1007/s10773-020-04694-9
    [36] X. Liu, X. Tong, Z. Wang, M. Zhang, Uniform non-degeneracy discrete chaotic system and its application in image encryption, Nonlinear Dyn., 108 (2022), 653–682. https://doi.org/10.1007/s11071-021-07198-1 doi: 10.1007/s11071-021-07198-1
    [37] N. R. Zhou, L. J. Tong, W. P. Zou, Multi-image encryption scheme with quaternion discrete fractional Tchebyshev moment transform and cross-coupling operation, Signal Process., 211 (2023), 109107. https://doi.org/10.1016/j.sigpro.2023.109107 doi: 10.1016/j.sigpro.2023.109107
    [38] A. Alghafis, H. M. Waseem, M. Khan, S. S. Jamal, A hybrid cryptosystem for digital contents confidentiality based on rotation of quantum spin states, Phys. A Stat. Mech. Appl., 554 (2020), 123908. https://doi.org/10.1016/j.physa.2019.123908 doi: 10.1016/j.physa.2019.123908
    [39] M. W. Hafiz, W. K. Lee, S. O. Hwang, M. Khan, A. Latif, Discrete logarithmic factorial problem and Einstein crystal model based public-key cryptosystem for digital content confidentiality, IEEE Access., 10 (2022), 102119–102134. https://doi.org/10.1109/ACCESS.2022.3207781 doi: 10.1109/ACCESS.2022.3207781
    [40] N. Abughazalah, A. Latif, M. W. Hafiz, M. Khan, A. S. Alanazi, I. Hussain, Construction of multivalued cryptographic Boolean function using recurrent neural network and its application in image encryption scheme, Artif. Intell. Rev., 56 (2023), 5403–5443. https://doi.org/10.1007/s10462-022-10295-1 doi: 10.1007/s10462-022-10295-1
    [41] K. S. Krishnan, B. Jaison, S. P. Raja, Secured color image compression based on compressive sampling and Lü system, Inf. Technol. Control., 49 (2020), 346–369. https://doi.org/10.5755/j01.itc.49.3.25901 doi: 10.5755/j01.itc.49.3.25901
    [42] S. O. Hwang, H. M. Waseem, N. Munir, Billiard quantum chaos: A pioneering image encryption scheme in the post-quantum era, IEEE Access., 12 (2024), 39840–39853. https://doi.org/10.1109/ACCESS.2024.3415083 doi: 10.1109/ACCESS.2024.3415083
    [43] M. Ahmad, S. Agarwal, A. Alkhayyat, A. Alhudhaif, F. Alenezi, A. H. Zahid, et al., An image encryption algorithm based on new generalized fusion fractal structure, Inf. Sci., 592 (2022), 1–20. https://doi.org/10.1016/j.ins.2022.01.042 doi: 10.1016/j.ins.2022.01.042
    [44] W. Alexan, Y. L. Chen, L. Y. Por, M. Gabr, Hyperchaotic maps and the single neuron model: A novel framework for chaos-based image encryption, Symmetry., 15 (2023), 1081. https://doi.org/10.3390/sym15051081 doi: 10.3390/sym15051081
    [45] M. Khan, H. M. Waseem, A novel digital contents privacy scheme based on Kramer's arbitrary spin, Int. J. Theor. Phys., 58 (2019), 2720–2743 https://doi.org/10.1007/s10773-019-04162-z doi: 10.1007/s10773-019-04162-z
    [46] A. H. Ismail, H. M. Waseem, M. Ishtiaq, S. S. Jamal, M. Khan, Quantum spin half algebra and generalized Megrelishvili protocol for confidentiality of digital images, Int. J. Theor. Phys., 60 (2021), 1720–1741. https://doi.org/10.1007/s10773-021-04794-0 doi: 10.1007/s10773-021-04794-0
    [47] Y. Wang, Y. Shang, Z. Shao, Y. Zhang, G. Coatrieux, H. Ding, et al., Multiple color image encryption based on cascaded quaternion gyrator transforms, Signal Process. Image Commun., 107 (2022), 116793. https://doi.org/10.1016/j.image.2022.116793 doi: 10.1016/j.image.2022.116793
    [48] H. M. Waseem, S. O. Hwang, Design of highly nonlinear confusion component based on entangled points of quantum spin states, Sci. Rep., 13 (2023), 1099. https://doi.org/10.1038/s41598-023-28002-7 doi: 10.1038/s41598-023-28002-7
  • This article has been cited by:

    1. Rania Saadeh, Laith Hamdi, Ahmad Qazza, 2024, Chapter 18, 978-981-97-4875-4, 259, 10.1007/978-981-97-4876-1_18
    2. Saad Ihsan Butt, Ahmad Khan, Sanja Tipurić-Spužević, New fractal–fractional Simpson estimates for twice differentiable functions with applications, 2024, 51, 23074108, 100205, 10.1016/j.kjs.2024.100205
    3. Rania Saadeh, Motasem Mustafa, Aliaa Burqan, 2024, Chapter 17, 978-981-97-4875-4, 239, 10.1007/978-981-97-4876-1_17
  • Reader Comments
  • © 2024 the Author(s), licensee AIMS Press. This is an open access article distributed under the terms of the Creative Commons Attribution License (http://creativecommons.org/licenses/by/4.0)
通讯作者: 陈斌, bchen63@163.com
  • 1. 

    沈阳化工大学材料科学与工程学院 沈阳 110142

  1. 本站搜索
  2. 百度学术搜索
  3. 万方数据库搜索
  4. CNKI搜索

Metrics

Article views(1027) PDF downloads(52) Cited by(1)

Other Articles By Authors

/

DownLoad:  Full-Size Img  PowerPoint
Return
Return

Catalog