期刊文献+
共找到16篇文章
< 1 >
每页显示 20 50 100
AN ALGORITHM OF LOCAL PREDICTION FOR CHAOTIC SEQUENCES WITH VARIABLE FRAME LENGTH
1
作者 Li Jinlong Lin Jiayu 《Journal of Electronics(China)》 2012年第3期345-352,共8页
According to the issues that the predict errors of chaotic sequences rapidly accumulated in multi-step forecasting which affects the predict accuracy, we proposed a new predict algorithm based on local modeling with v... According to the issues that the predict errors of chaotic sequences rapidly accumulated in multi-step forecasting which affects the predict accuracy, we proposed a new predict algorithm based on local modeling with variable frame length and interpolation points. The core idea is that, using interpolation method to increase the available sample data, then modeling the chaos dynamics system with least square algorithm which based on the Bernstein polynomial to realize the forecasting. We use the local modeling method, looking for the optimum frame length and interpolation points in every frame to improve the predict peformance. The experimental results show that the proposed algorithm can improve the predictive ability effectively, decreasing the accumulation of iterative errors in multi-step prediction. 展开更多
关键词 chaotic sequences forecasting Local modeling Variable frame length Bernstein polynomial Linear interpolation
下载PDF
A New Images Hiding Scheme Based on Chaotic Sequences 被引量:2
2
作者 LIUNian-sheng GUODong-hui +1 位作者 WUBo-xi ParrG 《Wuhan University Journal of Natural Sciences》 CAS 2005年第1期303-306,共4页
We propose a data hidding technique in a still image. This technique is based on chaotic sequence in the transform domain of cover image. We use different chaotic random sequences multiplied by multiple sensitive imag... We propose a data hidding technique in a still image. This technique is based on chaotic sequence in the transform domain of cover image. We use different chaotic random sequences multiplied by multiple sensitive images, respectively, to spread the spectrum of sensitive images. Multiple sensitive images are hidden in a covert image as a form of noise. The results of theoretical analysis and computer simulation show the new hiding technique have better properties with high security, imperceptibility and capacity for hidden information in comparison with the conventional scheme such as LSB (Least Significance Bit). 展开更多
关键词 information hiding chaotic sequence information security image transform
下载PDF
A Class of Chaotic Sequences with Gauss Probability Distribution for Radar Mask Jamming
3
作者 Ni-Ni Rao Yu-Chuan Huang Bin Liu 《Journal of Electronic Science and Technology of China》 2007年第2期180-182,共3页
A simple generation approach for chaotic sequences with Gauss probability distribution is proposed. Theoretical analysis and simulation based on Logistic chaotic model show that the approach is feasible and effective.... A simple generation approach for chaotic sequences with Gauss probability distribution is proposed. Theoretical analysis and simulation based on Logistic chaotic model show that the approach is feasible and effective. The distribution characteristics of the novel chaotic sequence are comparable to that of the standard normal distribution. Its mean and variance can be changed to the desired values. The novel sequences have also good randomness. The applications for radar mask jamming are analyzed. 展开更多
关键词 chaotic sequence gauss probability distribution radar mask jamming jamming effectiveness.
下载PDF
Intrusion Detection Model Using Chaotic MAP for Network Coding Enabled Mobile Small Cells
4
作者 Chanumolu Kiran Kumar Nandhakumar Ramachandran 《Computers, Materials & Continua》 SCIE EI 2024年第3期3151-3176,共26页
Wireless Network security management is difficult because of the ever-increasing number of wireless network malfunctions,vulnerabilities,and assaults.Complex security systems,such as Intrusion Detection Systems(IDS),a... Wireless Network security management is difficult because of the ever-increasing number of wireless network malfunctions,vulnerabilities,and assaults.Complex security systems,such as Intrusion Detection Systems(IDS),are essential due to the limitations of simpler security measures,such as cryptography and firewalls.Due to their compact nature and low energy reserves,wireless networks present a significant challenge for security procedures.The features of small cells can cause threats to the network.Network Coding(NC)enabled small cells are vulnerable to various types of attacks.Avoiding attacks and performing secure“peer”to“peer”data transmission is a challenging task in small cells.Due to the low power and memory requirements of the proposed model,it is well suited to use with constrained small cells.An attacker cannot change the contents of data and generate a new Hashed Homomorphic Message Authentication Code(HHMAC)hash between transmissions since the HMAC function is generated using the shared secret.In this research,a chaotic sequence mapping based low overhead 1D Improved Logistic Map is used to secure“peer”to“peer”data transmission model using lightweight H-MAC(1D-LM-P2P-LHHMAC)is proposed with accurate intrusion detection.The proposed model is evaluated with the traditional models by considering various evaluation metrics like Vector Set Generation Accuracy Levels,Key Pair Generation Time Levels,Chaotic Map Accuracy Levels,Intrusion Detection Accuracy Levels,and the results represent that the proposed model performance in chaotic map accuracy level is 98%and intrusion detection is 98.2%.The proposed model is compared with the traditional models and the results represent that the proposed model secure data transmission levels are high. 展开更多
关键词 Network coding small cells data transmission intrusion detection model hashed message authentication code chaotic sequence mapping secure transmission
下载PDF
An image encryption algorithm based on improved baker transformation and chaotic S-box 被引量:3
5
作者 Xing-Yuan Wang Huai-Huai Sun Hao Gao 《Chinese Physics B》 SCIE EI CAS CSCD 2021年第6期216-225,共10页
The algorithm is an image encryption algorithm based on the improved baker transformation and chaotic substitution box(S-box). It mainly uses the initial values and parameters of a one-dimensional logistic chaotic sys... The algorithm is an image encryption algorithm based on the improved baker transformation and chaotic substitution box(S-box). It mainly uses the initial values and parameters of a one-dimensional logistic chaotic system as an encryption key. Specifically, in the image scrambling stage, the algorithm primarily uses an improved baker transform method to process the image. In the image diffusion stage, the algorithm first uses the chaotic S-box method to process the encryption key. Secondly, an exclusive OR(XOR) operation is performed on the image and the encryption key to initially diffuse the image. Finally, the image is again diffused using the method of ortho XOR. Simulation analysis shows that the algorithm can achieve good encryption effect, simple and easy implementation, and good security. In the digital image communication transmission, it has good practical value. 展开更多
关键词 image encryption improved baker transformation chaotic S-box chaotic sequence
下载PDF
Periodic performance of the chaotic spread spectrum sequence on finite precision 被引量:3
6
作者 Zhu Canyan Zhang Lihua +2 位作者 Wang Yiming Liu Jiasheng Mao Lingfeng 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2008年第4期672-678,共7页
It is well known that the periodic performance of spread spectrum sequence heavily affects the correlative and secure characteristics of communication systems. The chaotic binary sequence is paid more and more attenti... It is well known that the periodic performance of spread spectrum sequence heavily affects the correlative and secure characteristics of communication systems. The chaotic binary sequence is paid more and more attention since it is one kind of applicable spread spectrum sequences. However, there are unavoidable short cyclic problems for chaotic binary sequences in finite precision. The chaotic binary sequence generating methods are studied first. Then the short cyclic behavior of the chaotic sequences is analyzed in detail, which are generated by quantification approaches with finite word-length. At the same time, a chaotic similar function is defined for presenting the cyclic characteristics of the sequences. Based on these efforts, an improved method with scrambling control for generating chaotic binary sequences is proposed. To quantitatively describe the improvement of periodic performance of the sequences, an orthogonal estimator is also defined. Some simulating results are provided. From the theoretical deduction and the experimental results, it is concluded that the proposed method can effectively increase the period and raise the complexity of the chaotic sequences to some extent. 展开更多
关键词 chaotic binary sequence finite precision periodic performance orthogonal estimator
下载PDF
Hybrid chaotic sequence for QS-CDMA system with RAKE receiver 被引量:1
7
作者 饶妮妮 许晓晶 李少谦 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2004年第3期278-282,共5页
A class of the hybrid chaotic sequences is presented. The generator of the sequences is given and realized by the digital method. The hybrid chaotic sequences exhibit good random properties that are very important for... A class of the hybrid chaotic sequences is presented. The generator of the sequences is given and realized by the digital method. The hybrid chaotic sequences exhibit good random properties that are very important for the performance of QS-CDMA system with RAKE receiver. The performance of the system is analyzed when the hybrid chaotic sequences are used as spreading codes in a QS-CDMA system with RAKE receiver and compared with those obtained for m-se-quences and logistic sequences. The results show that the hybrid chaotic sequences are a class of very promising spreading codes for QS-CDMA system. 展开更多
关键词 hybrid chaotic sequence QS-CDMA RAKE receiver BEP.
下载PDF
Comparative analysis between chaotic sequence and PN sequence in spread spectrum system 被引量:1
8
作者 GAO Peng-peng YAO Jin-jie +3 位作者 HAN Yan HE Guan-hua GUO Hua GAO Kai 《Journal of Measurement Science and Instrumentation》 CAS CSCD 2016年第4期363-367,共5页
This paper introduces two kinds of sequences used in spread spectrum communication system: pseudo-noise (PN) se-quence generated by linear feedback shift register(LFSR), such as m-sequence and Gold sequence... This paper introduces two kinds of sequences used in spread spectrum communication system: pseudo-noise (PN) se-quence generated by linear feedback shift register(LFSR), such as m-sequence and Gold sequence, and the chaotic sequence generated by the determination of the nonlinear system. The characteristics of PN sequence and chaotic sequence are analyzed by simulation, and the advantages and disadvantages of different sequences in spread spectrum communication system are ob-tained. The advantages of sequence can be used to improve signal transmission in a spread spectrum communication system. 展开更多
关键词 spread spectrum system chaotic sequence linear feedback shift register (LSFR) sequence peseudo-noise (PN) sequence
下载PDF
A SWITCHED HYPERCHAOTIC SYSTEM AND ITS FPGA CIRCUITRY IMPLEMENTATION 被引量:1
9
作者 Qi Aixue Zhang Chengliang Wang Honggang 《Journal of Electronics(China)》 2011年第3期383-388,共6页
This paper introduces a switched hyperchaotic system that changes its behavior randomly from one subsystem to another via two switch functions, and its characteristics of symmetry, dissipation, equilibrium, bifurcatio... This paper introduces a switched hyperchaotic system that changes its behavior randomly from one subsystem to another via two switch functions, and its characteristics of symmetry, dissipation, equilibrium, bifurcation diagram, basic dynamics have been analyzed. The hardware implementation of the system is based on Field Programmable Gate Array (FPGA). It is shown that the experimental results are identical with numerical simulations, and the chaotic trajectories are much more complex. 展开更多
关键词 chaotic sequence HYPERCHAOS Field Programmable Gate Array (FPGA) circuitry implementation
下载PDF
Analysis of quaternary digital chaotic sequence performance based on chaotic matrix
10
作者 Li Peize Zhao Bing Li Wenquan 《High Technology Letters》 EI CAS 2021年第1期103-109,共7页
With good randomness and high sensitivity to initial values,chaotic sequences have been extensively used in secure communication.Real chaotic sequences are highly sensitive to initial values.It is an analog quantity i... With good randomness and high sensitivity to initial values,chaotic sequences have been extensively used in secure communication.Real chaotic sequences are highly sensitive to initial values.It is an analog quantity in the domain of attraction,which is not conducive to the transmission of digital signals.In order to improve the stability,real chaotic sequences can be quantized into digital chaotic sequences.According to the relationship between the information rate and the symbol rate,the symbol rate of binary sequence is the same as the information rate.The information rate can be doubled by quantizing a real-valued sequence into a quaternary sequence.The chaotic sequence has weak periodicity.Moreover,the periodicity of binary digital chaotic sequences is much weaker than that of quaternary chaotic sequences.Compared with the multi-dimensional chaotic map,the one-dimensional chaotic map has small key space and low security.In this paper,a new real-valued chaotic sequence is generated based on the chaotic matrix method constructed by Logistic map and Kent map.Two quantization methods are used to digitize the real-valued chaotic sequence to obtain the quaternary digital chaotic sequence.Moreover,the randomness,the time series complexity and the correlation of the new quaternary chaotic sequence are compared and studied.The simulation results demonstrate that the quaternary digital chaotic sequence obtained by the chaotic matrix has good randomness and correlation. 展开更多
关键词 chaotic matrix digital chaotic sequence RANDOMNESS
下载PDF
Design of Digital Hybrid Chaotic Sequence Generator
11
作者 饶妮妮 曾东 《Journal of Electronic Science and Technology of China》 2004年第1期14-16,75,共4页
The feasibility of the hybrid chaotic sequences as the spreading codes in code divided multiple access(CDMA) system is analyzed. The design and realization of the digital hybrid chaotic sequence generator by very high... The feasibility of the hybrid chaotic sequences as the spreading codes in code divided multiple access(CDMA) system is analyzed. The design and realization of the digital hybrid chaotic sequence generator by very high speed integrated circuit hardware description language(VHDL) are described. A valid hazard canceledl method is presented. Computer simulations show that the stable digital sequence waveforms can be produced. The correlations of the digital hybrid chaotic sequences are compared with those of m-sequences. The results show that the correlations of the digital hybrid chaotic sequences are almost as good as those of m-sequences. The works in this paper explored a road for the practical applications of chaos. 展开更多
关键词 digital hybrid chaotic sequence GENERATOR VHDL code divided multiple access(CDMA)
下载PDF
New Semi-Fragile Authentication Watermarking
12
作者 孙鑫 易开祥 费敏锐 《Journal of Shanghai University(English Edition)》 CAS 2002年第2期158-162,共5页
In this paper we propose a semi fragile watermarking scheme, which can be used for image authentication. Let the original image be performed by l level discrete wavelet transformation. An approximate wavelet coeffi... In this paper we propose a semi fragile watermarking scheme, which can be used for image authentication. Let the original image be performed by l level discrete wavelet transformation. An approximate wavelet coefficient matrix of the original image and real value chaotic sequences are than used to generate the content based and secure watermark. The watermark is embedded into original image by using HVS. The tamper detection can identify the tampered region of the received watermarked image. Experimental results are given. 展开更多
关键词 fragile watermark AUTHENTICATION chaotic sequences human visual system (HVS) DWT.
下载PDF
A Novel Digital Audio Watermarking Scheme in the Wavelet Domain 被引量:2
13
作者 WANGXiang-yang YANGHong-ying ZHAOHong 《Wuhan University Journal of Natural Sciences》 CAS 2005年第1期311-314,共4页
We present a novel quantization-based digital audio walermarking scheme inwavelet domain. By quantizing a host audio's wavelet coefficients (Integer Lifting WaveletTransform) and utilizing the characteristics of h... We present a novel quantization-based digital audio walermarking scheme inwavelet domain. By quantizing a host audio's wavelet coefficients (Integer Lifting WaveletTransform) and utilizing the characteristics of human auditory system (HAS), the grayimage isembedded using our watermarking method. Experimental results show that the proposed watermarkingscheme is inaudible and robust against various signal processing such as noising adding, lossycompression, low pass filtering, re-sampling, and re-quantifying. 展开更多
关键词 digital audio watermarking lifting wavelet transform human auditory system chaotic sequence QUANTIZATION
下载PDF
An improved chaotic hybrid differential evolution for the short-term hydrothermal scheduling problem considering practical constraints 被引量:1
14
作者 Tahir Nadeem MALIK Salman ZAFAR Saaqib HAROON 《Frontiers of Information Technology & Electronic Engineering》 SCIE EI CSCD 2015年第5期404-417,共14页
Short-term hydrothermal scheduling(STHTS) is a non-linear and complex optimization problem with a set of operational hydraulic and thermal constraints. Earlier, this problem has been addressed by several classical tec... Short-term hydrothermal scheduling(STHTS) is a non-linear and complex optimization problem with a set of operational hydraulic and thermal constraints. Earlier, this problem has been addressed by several classical techniques; however, due to limitations such as non-linearity and non-convexity in cost curves, artificial intelligence tools based techniques are being used to solve the STHTS problem. In this paper an improved chaotic hybrid differential evolution(ICHDE) algorithm is proposed to find an optimal solution to this problem taking into account practical constraints. A self-adjusted parameter setting is obtained in differential evolution(DE) with the application of chaos theory, and a chaotic hybridized local search mechanism is embedded in DE to effectively prevent it from premature convergence. Furthermore, heuristic constraint handling techniques without any penalty factor setting are adopted to handle the complex hydraulic and thermal constraints. The superiority and effectiveness of the developed methodology are evaluated by its application in two illustrated hydrothermal test systems taken from the literature. The transmission line losses, prohibited discharge zones of hydel plants, and ramp rate limits of thermal plants are also taken into account. The simulation results reveal that the proposed technique is competent to produce an encouraging solution as compared with other recently established evolutionary approaches. 展开更多
关键词 Valve-point effect Prohibited discharge zones Differential evolution chaotic sequences Constraint handling
原文传递
Discrete memristive neuron model and its interspike interval-encoded application in image encryption 被引量:7
15
作者 BAO Han HUA ZhongYun +1 位作者 LIU WenBo BAO BoCheng 《Science China(Technological Sciences)》 SCIE EI CAS CSCD 2021年第10期2281-2291,共11页
Bursting is a diverse and common phenomenon in neuronal activation patterns and it indicates that fast action voltage spiking periods are followed by resting periods.The interspike interval(ISI)is the time between suc... Bursting is a diverse and common phenomenon in neuronal activation patterns and it indicates that fast action voltage spiking periods are followed by resting periods.The interspike interval(ISI)is the time between successive action voltage spikes of neuron and it is a key indicator used to characterize the bursting.Recently,a three-dimensional memristive Hindmarsh-Rose(mHR)neuron model was constructed to generate hidden chaotic bursting.However,the properties of the discrete mHR neuron model have not been investigated,yet.In this article,we first construct a discrete mHR neuron model and then acquire different hidden chaotic bursting sequences under four typical sets of parameters.To make these sequences more suitable for the application,we further encode these hidden chaotic sequences using their ISIs and the performance comparative results show that the ISI-encoded chaotic sequences have much more complex chaos properties than the original sequences.In addition,we apply these ISI-encoded chaotic sequences to the application of image encryption.The image encryption scheme has a symmetric key structure and contains plain-text permutation and bidirectional diffusion processes.Experimental results and security analyses prove that it has excellent robustness against various possible attacks. 展开更多
关键词 chaos complexity chaotic bursting sequence memristive neuron model interspike interval(ISI) image encryption
原文传递
Security analysis of a new stream cipher 被引量:4
16
作者 ZHANG Bin FENG Dengguo 《Science in China(Series F)》 2006年第3期286-301,共16页
In this paper, we analyze the security of a new stream cipher-COSvd(2,128). This cipher was proposed by E. Filiol et al. at the ECRYPT SASC'2004 (The State of the Art of Stream Ciphers). It uses clock-controlled ... In this paper, we analyze the security of a new stream cipher-COSvd(2,128). This cipher was proposed by E. Filiol et al. at the ECRYPT SASC'2004 (The State of the Art of Stream Ciphers). It uses clock-controlled non-linear feedback registers together with an S-box controlled by a chaotic sequence and was claimed to prevent any existing attacks. However, our analysis shows that there are some serious security flaws in the design of the S-box, resulting in heavy biased byte distribution in the keystream. In some broadcast applications, this flaw will cause a ciphertext-only attack with high success rate. Besides, there are also many security flaws in other parts of the cipher. We point out these flaws one by one and develop a divide-and-conquer attack to recover the secret keys from O(2^26)-byte known plaintext with success rate 93.4597% and complexity O(2^113), which is much lower than 2^512, the complexity of exhaustive search. 展开更多
关键词 stream cipher divide-and-conquer attack non-linear feedback shift registers (NLFSR) chaotic sequence.
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部