期刊文献+
共找到2篇文章
< 1 >
每页显示 20 50 100
Breaking chaotic shift key communication via adaptive key identification 被引量:1
1
作者 任海鹏 韩崇昭 刘丁 《Chinese Physics B》 SCIE EI CAS CSCD 2008年第4期1202-1208,共7页
This paper proposes an adaptive parameter identification method for breaking chaotic shift key communication from the transmitted signal in public channel. The sensitive dependence property of chaos on parameter misma... This paper proposes an adaptive parameter identification method for breaking chaotic shift key communication from the transmitted signal in public channel. The sensitive dependence property of chaos on parameter mismatch is used for chaos adaptive synchronization and parameter identification. An index function about the synchronization error is defined and conjugate gradient method is used to minimize the index function and to search the transmitter's parameter (key). By using proposed method, secure key is recovered from transmitted signal generated by low dimensional chaos and hyper chaos switching communication. Multi-parameters can also be identified from the transmitted signal with noise. 展开更多
关键词 chaotic shift key adaptive synchronization conjugate gradient method parameter identification
下载PDF
Adaptive image encryption scheme based on chaotic map
2
作者 邱劲 Liao Xiaofeng +1 位作者 Xiao Di Xiang Tao 《High Technology Letters》 EI CAS 2013年第1期76-81,共6页
Most of the existing image encryption schemes with the substitutlon-chltuslon structure are not secure and efficient. In this letter, a chaos-based pseudo-random bit generator with good statistical properties is propo... Most of the existing image encryption schemes with the substitutlon-chltuslon structure are not secure and efficient. In this letter, a chaos-based pseudo-random bit generator with good statistical properties is proposed, where a simple post-processing by compressing is employed. A new adaptive image encryption scheme with the substitution-diffusion architecture is designed using the new pseu- do-random bit generator. In the scheme, the session key for the pseudo-random bit generator is dependent on the content of the image which ensures that the scheme can effectively resist knownplaintext and chosen-plaintext attacks. Theoretical analysis and computer simulation indicate that the proposed algorithm is efficient and highly secure. 展开更多
关键词 image encryption chaotic map substitution-diffusion chaotic key stream
下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部