Chaos-based approaches to data security: Analysis of incommensurate fractional-order Arneodo chaotic system and engineering application on a microcomputer


Akgül A., YAZ M., Emi̇n B.

Integration, cilt.102, 2025 (SCI-Expanded) identifier

  • Yayın Türü: Makale / Tam Makale
  • Cilt numarası: 102
  • Basım Tarihi: 2025
  • Doi Numarası: 10.1016/j.vlsi.2025.102355
  • Dergi Adı: Integration
  • Derginin Tarandığı İndeksler: Science Citation Index Expanded (SCI-EXPANDED), Scopus, Academic Search Premier, PASCAL, Aerospace Database, Applied Science & Technology Source, Communication Abstracts, Compendex, Computer & Applied Sciences, INSPEC, Metadex, zbMATH, Civil Engineering Abstracts
  • Anahtar Kelimeler: Electronic circuit realization, Incommensurate fractional-order chaotic system, Microcomputer based security applications
  • Yozgat Bozok Üniversitesi Adresli: Evet

Özet

In this study, the Arneodo chaotic system was designed as an incommensurate fractional-order system, and the equilibrium points, time series, and phase portraits of the system were obtained, while the Lyapunov exponents were calculated. The incommensurate fractional-order system was modeled and simulated on the Nvidia Jetson AGX Orin, and its practical applications were realized with the designed electronic circuit. The chaotic equations were discretized via the Grünwald–Letnikov method, and a random number generator (RNG) based on an embedded system was implemented using the proposed algorithm. The RNG successfully met the criteria of international statistical evaluations, including NIST 800-22, FIPS 140-1, and ENT, thereby serving as a foundation for encryption and steganography algorithms. An original image encryption algorithm based on an embedded system was developed using the incommensurate fractional-order chaotic RNG. Encryption algorithm performance was evaluated through various security analyses, demonstrating the success of the incommensurate fractional-order Arneodo (IFOAR) system in embedded encryption applications. Furthermore, an embedded system-based image steganography algorithm was developed using the designed RNG, providing two-level security. The effectiveness of incommensurate chaotic system in steganography applications has been proved by various security analyses.