期刊文献+

混沌同步与应用 被引量:1

Chaotic Synchronization and Its Application
下载PDF
导出
摘要 就混沌的定义、特性、同步方式及其在通信中的应用作了介绍,介绍了在其主要的应用领域内的研究进展.以遮掩式和开关技术中的混沌切换为例来说明混沌同步技术在保密通讯中的应用,指出当前将混沌应用于实际通信系统存在的一些问题并对未来混沌通信研究的发展方向进行了展望,最后对混沌在超宽带无线通信和数字水印中的应用做了介绍. In this paper, the characteristics, definition synchronous mode of chaotic system and the applications of chaos in secure communication systems are introduced. Its development in the main application field is given. Cover and Switch technology is taken as an example to prove the chaotic synchronization application in secure communication technology. Some problems of application of chaos in practical communciation system are pointed out as well as some propects of research on developing direction of chaotic communication. Finlly, introduction of application of chaos in ultra wideband wireless communication and digital water is conducted.
出处 《河北北方学院学报(自然科学版)》 2008年第1期29-35,共7页 Journal of Hebei North University:Natural Science Edition
关键词 混沌 混沌系统 混沌同步 混沌通信 chaos chaotic systems chaotic synchronization chaotic communication
  • 相关文献

参考文献15

  • 1郝柏林.混沌现象的研究[J].中国科学院院刊,1988,3(1):5-14. 被引量:10
  • 2[3]Kawakami H,Kobayashio.Computer experiments on Chaotic Solutions of x(t+2)-ax(t+1)-x2(t)=b[J].B Facul Engin,1979,16:29-46
  • 3[4]Pecora L M,Carroll T L.Synchronization in chaotic system[J].Phys Rev Lett.1990,64:821-824
  • 4[5]Carroll T L,Pecora L M.Synchronization in chaotic system[J].IEEE Trans Circuits Syst.1991,38(4):453-456
  • 5刘建东.同步混沌系统研究[J].张家口师专学报(自然科学版),1995(2):24-28. 被引量:1
  • 6[7]Yang J z,Hu G.Chaos synchronization in coupled chaotic oscillators with multiple positive Lyapunov exponents[J].Phys Rev Lett,1998,80:496
  • 7[10]Oppenheim A V,womell C W,Isabelle S H,et al.Signal processing in the context of chaotic signals[J].Proc,IEEE ICASSP,1992,117-120
  • 8[11]Parlitz U,Chua L O,Kocarev L,et al.Experimental demonstration of secure communication via chaotic synchroniza-tion[J].Int JBC,1992,2(3):709-713
  • 9[12]Li J,Chen G,Zhen S.Dyuamical analysis of a new chaotic attractor[J].Int J Bifurc Chaos,2002,12(5):10-12
  • 10[14]Scholtr.Multiple access with time hopping impulse modulation[J/OL].http://Proc of MILCOM 93,1993:11-13

二级参考文献30

  • 1[1]Lin E T,Delp E J.A review of fragile image watermarks [A].Proc.of the Multimedia and Security Workshop (ACM Multimedia'99) [C].Orlando,1999.25-29.
  • 2[2]Walton S.Information authentication for a slippery new age [J].Dr.Dobbs Journal,1995,20(4):18-26.
  • 3[3]Yeung M,Mintzer F.Invisible watermarking for image verification [J].Journal of Electronic Imaging,1998,7(3):578-591.
  • 4[4]Wolfgang R B,Delp E J.A watermark for digital images [A].Proc.IEEE Int.Conf.on Image Processing [C].ACM Press,NY,1996.3.219-222.
  • 5[5]Schynael R van,Tirkel A,Osborce C.A digital watermark [A].Proc.of the IEEE ICIP [C].Austin,Texas,1994.2.86-90.
  • 6[6]Wolfgang R B,Delp E J.Fragile watermarking using the VW2D watermark [A].Proc.SPIE,Security and Watermarking of Multimedia Contents [C].San Jose,California,1999.204-213.
  • 7[7]Wong P W.A watermark for image integrity and ownership verification [A].Proc.IS&T PIC Conf.[C].Porland,OR,1998.
  • 8[8]Wong P W.A public key watermark for image verification and authentication [A].Proc.ICIP [C].Chicago,IL,Oct.1998.
  • 9[9]Wong P W,Memon N.Secret and public key image watermarking schemes for image authentication and ownership verification [J].IEEE Trans on Image Processing,2001,10(10):1593-1601.
  • 10[10]Wu M,liu B.Watermarking for image authentication [A].Proc.ICIP [C].Chicago,IL,1998.

共引文献60

同被引文献5

引证文献1

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部