diffusion structure
Recently Published Documents


TOTAL DOCUMENTS

35
(FIVE YEARS 12)

H-INDEX

7
(FIVE YEARS 1)

Entropy ◽  
2021 ◽  
Vol 23 (12) ◽  
pp. 1581
Author(s):  
Haiju Fan ◽  
Chenjiu Zhang ◽  
Heng Lu ◽  
Ming Li ◽  
Yanfang Liu

Recently, a new chaotic image encryption technique was proposed based on multiple discrete dynamic maps. The authors claim that the scheme can provide excellent privacy for traditional digital images. However, in order to minimize the computational cost, the encryption scheme adopts one-round encryption and a traditional permutation–diffusion structure. Through cryptanalysis, there is no strong correlation between the key and the plain image, which leads to the collapse of cryptosystem. Based on this, two methods of chosen-plaintext attacks are proposed in this paper. The two methods require 3 pairs and 258 pairs of plain and cipher images, respectively, to break the original encryption system. The simulation results show the effectiveness of the two schemes.


2021 ◽  
Vol 4 (1) ◽  
Author(s):  
Aleix Bassolas ◽  
Vincenzo Nicosia

AbstractVirtually all the emergent properties of complex systems are rooted in the non-homogeneous nature of the behaviours of their elements and of the interactions among them. However, heterogeneity and correlations appear simultaneously at multiple relevant scales, making it hard to devise a systematic approach to quantify them. We develop here a scalable and non-parametric framework to characterise the presence of heterogeneity and correlations in a complex system, based on normalised mean first passage times between preassigned classes of nodes. We showcase a variety of concrete applications, including the quantification of polarisation in the UK Brexit referendum and the roll-call votes in the US Congress, the identification of key players in disease spreading, and the comparison of spatial segregation of US cities. These results show that the diffusion structure of a system is indeed a defining aspect of the complexity of its organisation and functioning.


2021 ◽  
Vol 118 (11) ◽  
pp. e2013443118
Author(s):  
Sandra González-Bailón ◽  
Manlio De Domenico

Information manipulation is widespread in today’s media environment. Online networks have disrupted the gatekeeping role of traditional media by allowing various actors to influence the public agenda; they have also allowed automated accounts (or bots) to blend with human activity in the flow of information. Here, we assess the impact that bots had on the dissemination of content during two contentious political events that evolved in real time on social media. We focus on events of heightened political tension because they are particularly susceptible to information campaigns designed to mislead or exacerbate conflict. We compare the visibility of bots with human accounts, verified accounts, and mainstream news outlets. Our analyses combine millions of posts from a popular microblogging platform with web-tracking data collected from two different countries and timeframes. We employ tools from network science, natural language processing, and machine learning to analyze the diffusion structure, the content of the messages diffused, and the actors behind those messages as the political events unfolded. We show that verified accounts are significantly more visible than unverified bots in the coverage of the events but also that bots attract more attention than human accounts. Our findings highlight that social media and the web are very different news ecosystems in terms of prevalent news sources and that both humans and bots contribute to generate discrepancy in news visibility with their activity.


Author(s):  
Wenyao Li ◽  
Shuang Zhang ◽  
Wei Wang ◽  
Tao Lin

In this paper, we study the information diffusion structure on social networks with general degree distribution. To describe the information diffusion structure, we adopt six different viewpoints of metrics, including structural virality, distance variance, distance variability, distance susceptibility, cascade depth and cascade width. On Erdös–Rényi (ER) networks, we can intuitively see that as the diffusion tree becomes denser, the depth of the diffusion tree first increases to a peak and then decreases with the infection rate increasing, in addition the distance distribution of the diffusion tree obeys exponential distribution, and the metrics except cascade width decrease after reaching their peak values. When the information diffuses on scale-free (SF) networks, the diffusion trees are similar with the ones on ER networks. In other words, compared with the degree distribution, the infection rate is the main factor of diffusion tree in the same network scale.


Complexity ◽  
2020 ◽  
Vol 2020 ◽  
pp. 1-23
Author(s):  
Yucheng Chen ◽  
Chunming Tang ◽  
Zongxiang Yi

In the past decades, considerable attention has been paid to the chaos-based image encryption schemes owing to their characteristics such as extreme sensitivity to initial conditions and parameters, pseudo-randomness, and unpredictability. However, some schemes have been proven to be insecure due to using a single chaotic system. To increase the security, this work proposes a novel image encryption scheme based on the piecewise linear chaotic map (PWLCM) and the standard map. To the best of our knowledge, it is the first chaos-based image encryption scheme combining the PWLCM with the standard map, which adopts permutation-diffusion structure. Unlike the traditional scrambling way, a hierarchical diffusion strategy, which not only changes the pixel position but also modifies the value, is employed in the permutation phase. The operation model of row-by-row and column-by-column is further used to enhance the efficiency in the diffusion process. Consequently, a good trade-off efficiency and security can be achieved. Furthermore, the numerical simulations and performance analyses illustrate that the proposed encryption scheme can be used in practical application scenarios requiring lightweight security.


2020 ◽  
Author(s):  
Aleix Bassolas ◽  
Vincenzo Nicosia

Abstract Virtually all the emergent properties of complex systems are rooted in the non-homogeneous nature of the behaviours of their elements and of the interactions among them. However, heterogeneity and correlations appear simultaneously at multiple relevant scales, making it hard to devise a systematic approach to quantify them. We develop here a scalable and non-parametric framework to characterise the presence of heterogeneity and correlations in a complex system, based on normalised mean first passage times between pre-assigned classes of nodes. We showcase a variety of concrete applications, including the quantification of polarisation in the UK Brexit referendum and the roll-call votes in the US Congress, the identification of key players in disease spreading, and the comparison of spatial segregation of US cities. These results show that the diffusion structure of a system is indeed a defining aspect of the complexity of its structure and function.


2020 ◽  
pp. 464-473
Author(s):  
Mohammed Hussein Ahmed ◽  
Ahmed Kareem Shibeeb ◽  
Fadhil Hanoon Abbood

Chaos-based image encryption has great significance as a branch of image security. So, a series of chaos-based cryptosystems protecting digital images are proposed in recent years. But, most of them have been broken as a result of poor encryption structure. This research paper suggests an effective image encryption structure to resist possible attacks. The proposed method employs plain image related Henon map (PIHM) for shuffling and diffusion processes in a connected way which is different from conventional chaotic based image encryption systems, since the initial conditions of diffusion process are established based on the initial conditions of shuffling process. The principle of confusion is achieved by shuffling the pixels over all the rows and columns. And the diffusion is ensured by using XOR operation of current shuffled pixel value with the previous value, and random pixel produced from PIHM map. The results of simulation and security analysis indicate that the proposed scheme has desirable encryption effects and is robust against different common attacks.


2020 ◽  
Vol 79 (43-44) ◽  
pp. 31957-31980
Author(s):  
Shuqin Zhu ◽  
Congxu Zhu ◽  
Yu Fu ◽  
Weimeng Zhang ◽  
Xiaoting Wu

Sign in / Sign up

Export Citation Format

Share Document