{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,25]],"date-time":"2026-03-25T16:03:22Z","timestamp":1774454602183,"version":"3.50.1"},"reference-count":52,"publisher":"Springer Science and Business Media LLC","issue":"24","license":[{"start":{"date-parts":[[2024,1,16]],"date-time":"2024-01-16T00:00:00Z","timestamp":1705363200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2024,1,16]],"date-time":"2024-01-16T00:00:00Z","timestamp":1705363200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"funder":[{"DOI":"10.13039\/501100004410","name":"T\u00fcrkiye Bilimsel ve Teknolojik Ara\u015ft\u0131rma Kurumu","doi-asserted-by":"publisher","award":["121E003"],"award-info":[{"award-number":["121E003"]}],"id":[{"id":"10.13039\/501100004410","id-type":"DOI","asserted-by":"publisher"}]},{"name":"F\u0131rat University"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"abstract":"<jats:title>Abstract<\/jats:title><jats:p>Recent advancements in communication technologies have highlighted the pivotal role of information security for all individuals and entities. In response, researchers are increasingly focusing on cryptographic solutions to ensure the reliability of confidential information. Recognizing the superiority of chaotic systems preference as entropy source of cryptographic systems, this paper proposes a novel true random number generator (TRNG) design by combining four different chaotic systems outputs, tailored for real-time video encryption application. These chaotic systems are continuous-time Lorenz and fractional-order Chen-Lee systems, as well as discrete-time Logistic and Tent maps. This study generates true random bit (TRB) sequences at a high bit rate (25 Mbps) through the hardware implementations of four distinct chaotic systems to have the best statistical randomness in the resulting output. Then, the cryptographic true random key bits (8-bit at 25\u00a0MHz frequency) are employed in the post-processing with real-time video data by using the XOR operation, a fundamental post-processing algorithm. The real-time video encryption application is executed on an experimental assembly, composed of a Field Programmable Gate Array (FPGA) development kit, an OV7670 camera module, a VGA monitor, and prototype circuit boards for the chaotic systems. To evaluate the effectiveness of the proposed encryption system, several security assessments are conducted. These include NIST SP 800\u2009\u2212\u200922 statistical tests, FIPS 140-1 standards, chi-square tests, histogram and correlation analysis, and NPCR and UACI differential attack resilience tests. Consequently, the findings suggest that the presented real-time embedded cryptosystem is robust and suitable for secure communications, particularly in the realm of video transmission.<\/jats:p>","DOI":"10.1007\/s11042-023-17972-5","type":"journal-article","created":{"date-parts":[[2024,1,16]],"date-time":"2024-01-16T05:02:24Z","timestamp":1705381344000},"page":"64499-64532","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":7,"title":["Designing hardware for a robust high-speed cryptographic key generator based on multiple chaotic systems and its FPGA implementation for real-time video encryption"],"prefix":"10.1007","volume":"83","author":[{"given":"Esra","family":"\u0130nce","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7995-3901","authenticated-orcid":false,"given":"Bar\u0131\u015f","family":"Karakaya","sequence":"additional","affiliation":[]},{"given":"Mustafa","family":"T\u00fcrk","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,1,16]]},"reference":[{"key":"17972_CR1","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-71817-0","volume-title":"About cryptographic engineering. Cryptographic engineering","author":"\u00c7K Ko\u00e7","year":"2009","unstructured":"Ko\u00e7 \u00c7K (2009) About cryptographic engineering. Cryptographic engineering. Springer, Boston"},{"issue":"1","key":"17972_CR2","doi-asserted-by":"publisher","first-page":"325","DOI":"10.1007\/s11071-018-4361-4","volume":"94","author":"X Lv","year":"2018","unstructured":"Lv X, Liao X, Yang B (2018) A novel pseudo-random number generator from coupled map lattice with time-varying delay. Nonlinear Dyn 94(1):325\u2013341","journal-title":"Nonlinear Dyn"},{"key":"17972_CR3","doi-asserted-by":"publisher","first-page":"23995","DOI":"10.1007\/s11042-020-09200-1","volume":"79","author":"X Li","year":"2020","unstructured":"Li X, Yu H, Zhang H, Jin X, Sun H, Liu J (2020) Video encryption based on hyperchaotic system. Multimed Tools Appl 79:23995\u201324011","journal-title":"Multimed Tools Appl"},{"key":"17972_CR4","doi-asserted-by":"publisher","DOI":"10.1016\/j.physa.2019.122660","volume":"537","author":"XH Song","year":"2020","unstructured":"Song XH, Wang HQ, Venegas-Andraca SE, Abd El-Latif AA (2020) Quantum video encryption based on qubit-planes controlled-XOR operations and improved logistic map. Physica A 537:122660","journal-title":"Physica A"},{"key":"17972_CR5","doi-asserted-by":"publisher","first-page":"112781","DOI":"10.1016\/j.chaos.2022.112781","volume":"165","author":"Q Lai","year":"2022","unstructured":"Lai Q, Yang L, Liu Y (2022) Design and realization of discrete memristive hyperchaotic map with application in image encryption. Chaos, Solitons Fractals 165:112781","journal-title":"Chaos, Solitons Fractals"},{"issue":"9","key":"17972_CR6","doi-asserted-by":"publisher","first-page":"2137","DOI":"10.1109\/TIFS.2018.2812080","volume":"13","author":"M Preishuber","year":"2018","unstructured":"Preishuber M, H\u00fctter T, Katzenbeisser S, Uhl A (2018) Depreciating motivation and empirical security analysis of chaos-based image and video encryption. IEEE Trans Inf Forensics Secur 13(9):2137\u20132150","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"17972_CR7","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1140\/epjp\/i2017-11819-7","volume":"132","author":"D Valli","year":"2017","unstructured":"Valli D, Ganesan K (2017) Chaos based video encryption using maps and Ikeda time delay system. Eur Phys J Plus 132:1\u201318","journal-title":"Eur Phys J Plus"},{"key":"17972_CR8","doi-asserted-by":"publisher","first-page":"27981","DOI":"10.1007\/s11042-018-6022-5","volume":"77","author":"M Altaf","year":"2018","unstructured":"Altaf M, Ahmad A, Khan FA, Uddin Z, Yang X (2018) Computationally efficient selective video encryption with chaos based block cipher. Multimed Tools Appl 77:27981\u201327995","journal-title":"Multimed Tools Appl"},{"key":"17972_CR9","doi-asserted-by":"publisher","first-page":"709","DOI":"10.1007\/s10836-018-5767-0","volume":"34","author":"D Lambi\u0107","year":"2018","unstructured":"Lambi\u0107 D, Jankovi\u0107 A, Ahmad M (2018) Security analysis of the efficient chaos pseudo-random number generator applied to video encryption. J Electron Test 34:709\u2013715","journal-title":"J Electron Test"},{"issue":"1","key":"17972_CR10","doi-asserted-by":"publisher","first-page":"389","DOI":"10.3233\/JIFS-151981","volume":"32","author":"MM Zirkohi","year":"2017","unstructured":"Zirkohi MM (2017) Model reference type-2 fuzzy sliding mode control for a novel uncertain hyperchaotic system. J Intell Fuzzy Syst 32(1):389\u2013400","journal-title":"J Intell Fuzzy Syst"},{"issue":"12","key":"17972_CR11","doi-asserted-by":"publisher","first-page":"4783","DOI":"10.1016\/j.camwa.2011.10.069","volume":"62","author":"N Jia","year":"2011","unstructured":"Jia N, Wang T (2011) Chaos control and hybrid projective synchronization for a class of new chaotic systems. Comput Math Appl 62(12):4783\u20134795","journal-title":"Comput Math Appl"},{"issue":"2","key":"17972_CR12","doi-asserted-by":"publisher","first-page":"130","DOI":"10.1175\/1520-0469(1963)020<0130:DNF>2.0.CO;2","volume":"20","author":"EN Lorenz","year":"1963","unstructured":"Lorenz EN (1963) Deterministic nonperiodic flow. J Atmos Sci 20(2):130\u2013141","journal-title":"J Atmos Sci"},{"key":"17972_CR13","doi-asserted-by":"crossref","unstructured":"Koyuncu \u0130, \u00d6zcerit AT, Pehlivan \u0130, Avaro\u011flu E (2014) Design and implementation of chaos based true random number generator on FPGA. In: 2014 IEEE 22nd Signal Processing and Communications Applications Conference (SIU), pp 236\u2013239","DOI":"10.1109\/SIU.2014.6830209"},{"issue":"4","key":"17972_CR14","first-page":"218","volume":"57","author":"MDP Galajda","year":"2006","unstructured":"Galajda MDP (2006) Chaos-based true random number generator embedded in a mixed-signal reconfigurable hardware. J Electr Eng 57(4):218\u2013225","journal-title":"J Electr Eng"},{"key":"17972_CR15","doi-asserted-by":"publisher","first-page":"189","DOI":"10.1007\/s11071-015-1981-9","volume":"81","author":"E Avaro\u011flu","year":"2015","unstructured":"Avaro\u011flu E, Tuncer T, \u00d6zer AB, Ergen B, T\u00fcrk M (2015) A novel chaos-based post-processing for TRNG. Nonlinear Dyn 81:189\u2013199","journal-title":"Nonlinear Dyn"},{"key":"17972_CR16","doi-asserted-by":"publisher","first-page":"111506","DOI":"10.1016\/j.chaos.2021.111506","volume":"153","author":"DA Trujillo-Toledo","year":"2021","unstructured":"Trujillo-Toledo DA, L\u00f3pez-Bonilla OR, Garc\u00eda-Guerrero EE, Tlelo-Cuautle E, L\u00f3pez-Mancilla D, Guill\u00e9n-Fern\u00e1ndez O, Inzunza-Gonz\u00e1lez E (2021) Real-time RGB image encryption for IoT applications using enhanced sequences from chaotic maps. Chaos, Solitons Fractals 153:111506","journal-title":"Chaos, Solitons Fractals"},{"issue":"06","key":"17972_CR17","doi-asserted-by":"publisher","first-page":"1707","DOI":"10.1142\/S021812740100295X","volume":"11","author":"ME Yal\u00e7in","year":"2001","unstructured":"Yal\u00e7in ME, Suykens JA, Vandewalle J (2001) Master\u2013slave synchronization of Lur\u2019e systems with time-delay. Int J Bifurcat Chaos 11(06):1707\u20131722","journal-title":"Int J Bifurcat Chaos"},{"issue":"10","key":"17972_CR18","doi-asserted-by":"publisher","first-page":"565","DOI":"10.1049\/el.2012.0432","volume":"48","author":"JP Murphy","year":"2012","unstructured":"Murphy JP (2012) Field-programmable true random number generator. Electron Lett 48(10):565\u2013566","journal-title":"Electron Lett"},{"issue":"7","key":"17972_CR19","doi-asserted-by":"publisher","first-page":"1395","DOI":"10.1109\/TCSI.2004.830683","volume":"51","author":"ME Yal\u00e7in","year":"2004","unstructured":"Yal\u00e7in ME, Suykens JA, Vandewalle J (2004) True random bit generation from a double-scroll attractor. IEEE Trans Circuits Syst I Regul Pap 51(7):1395\u20131404","journal-title":"IEEE Trans Circuits Syst I Regul Pap"},{"issue":"3","key":"17972_CR20","first-page":"329","volume":"64","author":"I Cicek","year":"2016","unstructured":"Cicek I, Pusane AE, Dundar G (2016) An integrated dual entropy core true random number generator. IEEE Trans Circuits Syst II Express Briefs 64(3):329\u2013333","journal-title":"IEEE Trans Circuits Syst II Express Briefs"},{"key":"17972_CR21","doi-asserted-by":"publisher","first-page":"1342","DOI":"10.1007\/s00034-018-0905-6","volume":"38","author":"T Bonny","year":"2019","unstructured":"Bonny T, Al Debsi R, Majzoub S, Elwakil AS (2019) Hardware optimized FPGA implementations of high-speed true random bit generators based on switching-type chaotic oscillators. Circuits Syst Signal Process 38:1342\u20131359","journal-title":"Circuits Syst Signal Process"},{"issue":"4","key":"17972_CR22","first-page":"296","volume":"44","author":"T Tuncer","year":"2014","unstructured":"Tuncer T, Avaroglu E, T\u00fcrk M, Ozer AB (2014) Implementation of non-periodic sampling true random number generator on FPGA. Informacije Midem 44(4):296\u2013302","journal-title":"Informacije Midem"},{"key":"17972_CR23","unstructured":"Y\u0131ld\u0131r\u0131m S (2012) A true random number generator in Fpga for cryptographic applications. A thesis submitted to the Graduate School of Natural and Applied Sciences of Middle East Technical University"},{"issue":"11","key":"17972_CR24","doi-asserted-by":"publisher","first-page":"1650","DOI":"10.1016\/j.mejo.2009.02.004","volume":"40","author":"JL Danger","year":"2009","unstructured":"Danger JL, Guilley S, Hoogvorst P (2009) High speed true random number generator based on open loop structures in FPGAs. Microelectron J 40(11):1650\u20131656","journal-title":"Microelectron J"},{"issue":"11","key":"17972_CR25","doi-asserted-by":"publisher","first-page":"1885","DOI":"10.1002\/cta.2374","volume":"45","author":"B Karakaya","year":"2017","unstructured":"Karakaya B, \u00c7elik V, G\u00fclten A (2017) Chaotic cellular neural network-based true random number generator. Int J Circuit Theory Appl 45(11):1885\u20131897","journal-title":"Int J Circuit Theory Appl"},{"key":"17972_CR26","doi-asserted-by":"crossref","unstructured":"Nag A, Singh JP, Khan S, Ghosh S, Biswas S, Sarkar D, Sarkar PP (2011) Image encryption using affine transform and XOR operation. In: 2011 IEEE International Conference on Signal Processing, Communication, Computing and Networking Technologies (pp 309\u2013312)","DOI":"10.1109\/ICSCCN.2011.6024565"},{"key":"17972_CR27","doi-asserted-by":"publisher","first-page":"162","DOI":"10.1016\/j.aeue.2017.04.028","volume":"78","author":"MF Tolba","year":"2017","unstructured":"Tolba MF, AbdelAty AM, Soliman NS, Said LA, Madian AH, Azar AT, Radwan AG (2017) FPGA implementation of two fractional order chaotic systems. AEU-Int J Electron Commun 78:162\u2013172","journal-title":"AEU-Int J Electron Commun"},{"key":"17972_CR28","doi-asserted-by":"publisher","first-page":"96","DOI":"10.1016\/j.physa.2019.03.058","volume":"525","author":"Y Peng","year":"2019","unstructured":"Peng Y, Sun K, Peng D, Ai W (2019) Dynamics of a higher dimensional fractional-order chaotic map. Physica A 525:96\u2013107","journal-title":"Physica A"},{"issue":"02","key":"17972_CR29","doi-asserted-by":"publisher","first-page":"1350030","DOI":"10.1142\/S0218127413500302","volume":"23","author":"SP Wang","year":"2013","unstructured":"Wang SP, Lao SK, Chen HK, Chen JH, Chen SY (2013) Implementation of the fractional-order Chen\u2013Lee system by electronic circuit. Int J Bifurcat chaos 23(02):1350030","journal-title":"Int J Bifurcat chaos"},{"issue":"2","key":"17972_CR30","doi-asserted-by":"publisher","first-page":"380","DOI":"10.1007\/s40565-018-0458-5","volume":"7","author":"V Celik","year":"2019","unstructured":"Celik V, \u00d6zdemir MT, Lee KY (2019) Effects of fractional-order PI controller on delay margin in single-area delayed load frequency control systems. J Mod Power Syst Clean Energy 7(2):380\u2013389","journal-title":"J Mod Power Syst Clean Energy"},{"issue":"1\u20134","key":"17972_CR31","doi-asserted-by":"publisher","first-page":"251","DOI":"10.1023\/A:1016566017098","volume":"29","author":"S Manabe","year":"2002","unstructured":"Manabe S (2002) A suggestion of fractional-order controller for flexible spacecraft attitude control. Nonlinear Dyn 29(1\u20134):251\u2013268","journal-title":"Nonlinear Dyn"},{"key":"17972_CR32","doi-asserted-by":"publisher","first-page":"4370","DOI":"10.1007\/s00034-021-01665-1","volume":"40","author":"VR Folifack Signing","year":"2021","unstructured":"Folifack Signing VR, Fozin Fonzin T, Kountchou M, Kengne J, Njitacke ZT (2021) Chaotic jerk system with hump structure for text and image encryption using DNA coding. Circuits Syst Signal Process 40:4370\u20134406","journal-title":"Circuits Syst Signal Process"},{"key":"17972_CR33","doi-asserted-by":"publisher","unstructured":"Arslan Tuncer S, Kaya T (2018) True random number generation from bioelectrical and physical signals. Comput Math Methods Med 2018:11. https:\/\/doi.org\/10.1155\/2018\/3579275","DOI":"10.1155\/2018\/3579275"},{"key":"17972_CR34","doi-asserted-by":"publisher","first-page":"111797","DOI":"10.1016\/j.chaos.2022.111797","volume":"156","author":"P Huang","year":"2022","unstructured":"Huang P, Chai Y, Chen X (2022) Multiple dynamics analysis of Lorenz-family systems and the application in signal detection. Chaos, Solitons Fractals 156:111797","journal-title":"Chaos, Solitons Fractals"},{"key":"17972_CR35","doi-asserted-by":"publisher","DOI":"10.1016\/j.chaos.2022.112646","volume":"164","author":"A Durdu","year":"2022","unstructured":"Durdu A, Uyaro\u011flu Y (2022) Comparison of synchronization of chaotic Burke-Shaw attractor with active control and integer-order and fractional-order PC method. Chaos Solitons Fractals 164:112646","journal-title":"Chaos Solitons Fractals"},{"issue":"2","key":"17972_CR36","first-page":"16","volume":"1","author":"A Mahdi","year":"2016","unstructured":"Mahdi A, Jawad AK, Hreshee SS (2016) Digital chaotic scrambling of voice based on duffing map. Int J Inform Communication Sci 1(2):16\u201321","journal-title":"Int J Inform Communication Sci"},{"key":"17972_CR37","unstructured":"Montanari A (2011) Digital System Design with VHDL Project, [online]. Available: https:\/\/code.google.com\/archive\/p\/vhdl-project\/downloads#makechanges.\u00a0Accessed 25 Jul 2023"},{"key":"17972_CR38","doi-asserted-by":"crossref","unstructured":"Yaman S, Karakaya B, Erol Y (2019) Real time edge detection via IP-core based sobel filter on FPGA. In: 2019 IEEE International Conference on Applied Automation and Industrial Diagnostics (ICAAID) (Vol. 1, pp 1\u20134)","DOI":"10.1109\/ICAAID.2019.8934964"},{"key":"17972_CR39","doi-asserted-by":"crossref","unstructured":"Karakaya B, Yeni\u00e7eri R, Yal\u00e7\u0131n ME (2015) Wave computer core using fixed-point arithmetic. In: 2015 IEEE International Symposium on Circuits and Systems (ISCAS) (pp. 1514\u20131517)","DOI":"10.1109\/ISCAS.2015.7168933"},{"key":"17972_CR40","doi-asserted-by":"crossref","unstructured":"Bassham L, Rukhin A, Soto J, Nechvatal J, Smid M, Leigh S, Levenson M, Vangel M, Heckert N, Banks D (2010) A statistical test suite for random and pseudorandom number generators for cryptographic applications. Special Publication (NIST SP), National Institute of Standards and Technology, Gaithersburg, MD, [online]. Available: https:\/\/tsapps.nist.gov\/publication\/get_pdf.cfm?pub_id=906762. Accessed 25 Jul 2023","DOI":"10.6028\/NIST.SP.800-22r1a"},{"key":"17972_CR41","doi-asserted-by":"publisher","first-page":"3946","DOI":"10.1109\/TIFS.2020.2988505","volume":"17","author":"D Hurley-Smith","year":"2020","unstructured":"Hurley-Smith D, Patsakis C, Hernandez-Castro J (2020) On the unbearable lightness of FIPS 140\u20132 randomness tests. IEEE Trans Inf Forensics Secur 17:3946\u20133958","journal-title":"IEEE Trans Inf Forensics Secur"},{"issue":"08","key":"17972_CR42","doi-asserted-by":"publisher","first-page":"1750130","DOI":"10.1142\/S0218127417501309","volume":"27","author":"X Wang","year":"2017","unstructured":"Wang X, Akgul A, Cicek S, Pham VT, Hoang DV (2017) A chaotic system with two stable equilibrium points: Dynamics, circuit realization and communication application. Int J Bifurcat Chaos 27(08):1750130","journal-title":"Int J Bifurcat Chaos"},{"key":"17972_CR43","doi-asserted-by":"crossref","unstructured":"Kang JS, Park H, Yeom Y (2017) On the additional chi-square tests for the IID assumption of NIST SP 800-90B. In: 2017 IEEE 15th Annual Conference on Privacy, Security and Trust (PST) (pp 375\u20133757)","DOI":"10.1109\/PST.2017.00051"},{"key":"17972_CR44","doi-asserted-by":"publisher","first-page":"26203","DOI":"10.1007\/s11042-019-07818-4","volume":"78","author":"M Khan","year":"2019","unstructured":"Khan M, Masood F (2019) A novel chaotic image encryption technique based on multiple discrete dynamical maps. Multimed Tools Appl 78:26203\u201326222","journal-title":"Multimed Tools Appl"},{"issue":"31\u201332","key":"17972_CR45","doi-asserted-by":"publisher","first-page":"22375","DOI":"10.1007\/s11042-020-08957-9","volume":"79","author":"R Logeshwari","year":"2020","unstructured":"Logeshwari R, Rama Parvathy L (2020) Generating logistic chaotic sequence using geometric pattern to decompose and recombine the pixel values. Multimed Tools Appl 79(31\u201332):22375\u201322388","journal-title":"Multimed Tools Appl"},{"key":"17972_CR46","doi-asserted-by":"crossref","unstructured":"Burhan Y, Artuger F, Ozkaynak F (2019) A novel hybrid image encryption algorithm based on data compression and chaotic key planning algorithms. In: 2019 IEEE 7th International Symposium on Digital Forensics and Security (ISDFS), pp 1\u20135","DOI":"10.1109\/ISDFS.2019.8757530"},{"key":"17972_CR47","doi-asserted-by":"crossref","unstructured":"Chen C, Wang X, Huang G, Liu G (2022) An efficient randomly-selective video encryption algorithm. In: 2022 IEEE 8th International Conference on Computer and Communications (ICCC) (pp 1287\u20131293)","DOI":"10.1109\/ICCC56324.2022.10065724"},{"key":"17972_CR48","doi-asserted-by":"crossref","unstructured":"Malladar RS, Kunte RS (2020) Selective video encryption using chaos for H. 264 videos applicable to video on demand (VoD). In: 2020 IEEE 5th International Conference on Communication and Electronics Systems (ICCES) (pp 215\u2013220)","DOI":"10.1109\/ICCES48766.2020.9137861"},{"key":"17972_CR49","doi-asserted-by":"crossref","unstructured":"\u0130nce E, Karakaya B, T\u00fcrk M (2022) Fractional and integer order chaotic system-based Pseudo Random Bit Generator for Secure Image Encryption. In: 2022 IEEE 13th National Conference with International Participation (ELECTRONICA), pp 1\u20134","DOI":"10.1109\/ELECTRONICA55578.2022.9874397"},{"key":"17972_CR50","doi-asserted-by":"publisher","first-page":"11541","DOI":"10.1109\/ACCESS.2023.3242311","volume":"11","author":"W Alexan","year":"2023","unstructured":"Alexan W, Elkandoz M, Mashaly M, Azab E, Aboshousha A (2023) Color image encryption through chaos and kaa map. IEEE Access 11:11541\u201311554","journal-title":"IEEE Access"},{"issue":"1","key":"17972_CR51","first-page":"326","volume":"70","author":"F Yu","year":"2022","unstructured":"Yu F, Kong X, Mokbel AAM, Yao W, Cai S (2022) Complex dynamics, hardware implementation and image encryption application of multiscroll memeristive Hopfield neural network with a novel local active memeristor. IEEE Trans Circuits Syst II Express Briefs 70(1):326\u2013330","journal-title":"IEEE Trans Circuits Syst II Express Briefs"},{"issue":"12","key":"17972_CR52","doi-asserted-by":"publisher","first-page":"12708","DOI":"10.1109\/TIE.2020.3047012","volume":"68","author":"H Lin","year":"2020","unstructured":"Lin H, Wang C, Yu F, Xu C, Hong Q, Yao W, Sun Y (2020) An extremely simple multiwing chaotic system: dynamics analysis, encryption application, and hardware implementation. IEEE Trans Industr Electron 68(12):12708\u201312719","journal-title":"IEEE Trans Industr Electron"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-023-17972-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11042-023-17972-5\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-023-17972-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,7,8]],"date-time":"2024-07-08T17:45:10Z","timestamp":1720460710000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11042-023-17972-5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,1,16]]},"references-count":52,"journal-issue":{"issue":"24","published-online":{"date-parts":[[2024,7]]}},"alternative-id":["17972"],"URL":"https:\/\/doi.org\/10.1007\/s11042-023-17972-5","relation":{},"ISSN":["1573-7721"],"issn-type":[{"value":"1573-7721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,1,16]]},"assertion":[{"value":"2 August 2023","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"17 November 2023","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"21 December 2023","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"16 January 2024","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no known competing financial interests or personal relationships that could have appeared to influence the work reported in this paper.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}},{"value":"The authors declare that they have no conflict of interest.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}