With the rapid development of internet technology,security protection of information has become more and more prominent,especially information encryption.Considering the great advantages of chaotic encryption,we propo...With the rapid development of internet technology,security protection of information has become more and more prominent,especially information encryption.Considering the great advantages of chaotic encryption,we propose a 2D-lag complex logistic map with complex parameters(2D-LCLMCP)and corresponding encryption schemes.Firstly,we present the model of the 2D-LCLMCP and analyze its chaotic properties and system stability through fixed points,Lyapunov exponent,bifurcation diagram,phase diagram,etc.Secondly,a block cipher algorithm based on the 2D-LCLMCP is proposed,the plaintext data is preprocessed using a pseudorandom sequence generated by the 2D-LCLMCP.Based on the generalized Feistel cipher structure,a round function F is constructed using dynamic S-box and DNA encoding rules as the core of the block cipher algorithm.The generalized Feistel cipher structure consists of two F functions,four XOR operations,and one permutation operation per round.The symmetric dynamic round keys that change with the plaintext are generated by the 2D-LCLMCP.Finally,experimental simulation and performance analysis tests are conducted.The results show that the block cipher algorithm has low complexit,good diffusion and a large key space.When the block length is 64 bits,only six rounds of encryption are required to provide sufficient security and robustness against cryptographic attacks.展开更多
The embedding of the Bernoulli shift into the logistic map x→μx(1 - x) for μ 〉 4 is reinterpreted by the theory of anti-integrability: it is inherited from the anti-integrable limit μ→∞.
Based on some analyses of existing chaotic image encryption frameworks and a new designed three-dimensional improved logistic chaotic map(3D-ILM),an asymmetric image encryption algorithm using public-key Rivest–Shami...Based on some analyses of existing chaotic image encryption frameworks and a new designed three-dimensional improved logistic chaotic map(3D-ILM),an asymmetric image encryption algorithm using public-key Rivest–Shamir–Adleman(RSA)is presented in this paper.In the first stage,a new 3D-ILM is proposed to enhance the chaotic behavior considering analysis of time sequence,Lyapunov exponent,and Shannon entropy.In the second stage,combined with the public key RSA algorithm,a new key acquisition mathematical model(MKA)is constructed to obtain the initial keys for the 3D-ILM.Consequently,the key stream can be produced depending on the plain image for a higher security.Moreover,a novel process model(NPM)for the input of the 3D-ILM is built,which is built to improve the distribution uniformity of the chaotic sequence.In the third stage,to encrypt the plain image,a pre-process by exclusive OR(XOR)operation with a random matrix is applied.Then,the pre-processed image is performed by a permutation for rows,a downward modulo function for adjacent pixels,a permutation for columns,a forward direction XOR addition-modulo diffusion,and a backward direction XOR addition-modulo diffusion to achieve the final cipher image.Moreover,experiments show that the the proposed algorithm has a better performance.Especially,the number of pixels change rate(NPCR)is close to ideal case 99.6094%,with the unified average changing intensity(UACI)close to 33.4634%,and the information entropy(IE)close to 8.展开更多
Oil and gas pipelines are affected by many factors,such as pipe wall thinning and pipeline rupture.Accurate prediction of failure pressure of oil and gas pipelines can provide technical support for pipeline safety man...Oil and gas pipelines are affected by many factors,such as pipe wall thinning and pipeline rupture.Accurate prediction of failure pressure of oil and gas pipelines can provide technical support for pipeline safety management.Aiming at the shortcomings of the BP Neural Network(BPNN)model,such as low learning efficiency,sensitivity to initial weights,and easy falling into a local optimal state,an Improved Sparrow Search Algorithm(ISSA)is adopted to optimize the initial weights and thresholds of BPNN,and an ISSA-BPNN failure pressure prediction model for corroded pipelines is established.Taking 61 sets of pipelines blasting test data as an example,the prediction model was built and predicted by MATLAB software,and compared with the BPNN model,GA-BPNN model,and SSA-BPNN model.The results show that the MAPE of the ISSA-BPNN model is 3.4177%,and the R2 is 0.9880,both of which are superior to its comparison model.Using the ISSA-BPNN model has high prediction accuracy and stability,and can provide support for pipeline inspection and maintenance.展开更多
The fixed points in logistic mapping digital-flow chaos strange attractor arestudied in detail. When k=n in logistic equation, there exist no more than 2n fixed points, whichare deduced and proved theoretically. Three...The fixed points in logistic mapping digital-flow chaos strange attractor arestudied in detail. When k=n in logistic equation, there exist no more than 2n fixed points, whichare deduced and proved theoretically. Three corollaries about the fixed points of logistic mappingare proposed and proved respectively. These theorem and corollaries provide a theoretical basis forchoosing parameter of chaotic sequences in chaotic secure communication and chaotic digitalwatermarking. And they are testified by simulation.展开更多
Secure transmission of images over a communication channel, with limited data transfer capacity, possesses compression and encryption schemes. A deep learning based hybrid image compression-encryption scheme is propos...Secure transmission of images over a communication channel, with limited data transfer capacity, possesses compression and encryption schemes. A deep learning based hybrid image compression-encryption scheme is proposed by combining stacked auto-encoder with the logistic map. The proposed structure of stacked autoencoder has seven multiple layers, and back propagation algorithm is intended to extend vector portrayal of information into lower vector space. The randomly generated key is used to set initial conditions and control parameters of logistic map. Subsequently, compressed image is encrypted by substituting and scrambling of pixel sequences using key stream sequences generated from logistic map.The proposed algorithms are experimentally tested over five standard grayscale images. Compression and encryption efficiency of proposed algorithms are evaluated and analyzed based on peak signal to noise ratio(PSNR), mean square error(MSE), structural similarity index metrics(SSIM) and statistical,differential, entropy analysis respectively. Simulation results show that proposed algorithms provide high quality reconstructed images with excellent levels of security during transmission..展开更多
The complex dynamics of the logistic map via two periodic impulsive forces is investigated in this paper. The influ- ences of the system parameter and the impulsive forces on the dynamics of the system are studied res...The complex dynamics of the logistic map via two periodic impulsive forces is investigated in this paper. The influ- ences of the system parameter and the impulsive forces on the dynamics of the system are studied respectively. With the parameter varying, the system produces the phenomenon such as periodic solutions, chaotic solutions, and chaotic crisis. Furthermore, the system can evolve to chaos by a cascading of period-doubling bifurcations. The Poincar6 map of the logistic map via two periodic impulsive forces is constructed and its bifurcation is analyzed. Finally, the Floquet theory is extended to explore the bifurcation mechanism for the periodic solutions of this non-smooth map.展开更多
In the current scenario,data transmission over the network is a challenging task as there is a need for protecting sensitive data.Traditional encryption schemes are less sensitive and less complex thus prone to attack...In the current scenario,data transmission over the network is a challenging task as there is a need for protecting sensitive data.Traditional encryption schemes are less sensitive and less complex thus prone to attacks during transmission.It has been observed that an encryption scheme using chaotic theory is more promising due to its non-linear and unpredictable behavior.Hence,proposed a novel hybrid image encryption scheme with multi-scroll attractors and quantum chaos logistic maps(MSA-QCLM).The image data is classified as inter-bits and intra-bits which are permutated separately using multi scroll attractor&quantum logistic maps to generate random keys.To increase the encryption efficiency,a hybrid chaotic technique was performed.Experimentation is performed in a Qiskit simulation tool for various image sets.The simulation results and theoretical analysis show that the proposed method is more efficient than its classical counterpart,and its security is verified by the statistical analysis,keys sensitivity,and keyspace analysis.The Number of changing pixel rate(NPCR)&the Unified averaged changed intensity(UACI)values were observed to be 99.6%&33.4%respectively.Also,entropy oscillates from 7.9 to 7.901 for the different tested encrypted images.The proposed algorithm can resist brute force attacks well,owing to the values of information entropy near the theoretical value of 8.The proposed algorithm has also passed the NIST test(Frequency Monobit test,Run test and DFT test).展开更多
Evolution of spiral wave generated from the excitable media within the Barkley model is investigated. The external gradient electric field modulated by the logistic map is imposed on the media (along x- and y-axis)....Evolution of spiral wave generated from the excitable media within the Barkley model is investigated. The external gradient electric field modulated by the logistic map is imposed on the media (along x- and y-axis). Drift and break up of spiral wave are observed when the amplitude of the electric field is modulated by the chaotic signal from the logistic map, and the whole system could become homogeneous finally and the relevant results are compared when the gradient electric field is modulated by the Lorenz or Rossler chaotic signal.展开更多
Consider a class of quasi-periodically forced logistic maps T×[0,1]■:(θ,x)→(θ+ω,c(θ)x(1-x))(T=R/Z),whereωis an irrational frequency and c(θ)is a specific bimodal function.We prove that under weak Liouvill...Consider a class of quasi-periodically forced logistic maps T×[0,1]■:(θ,x)→(θ+ω,c(θ)x(1-x))(T=R/Z),whereωis an irrational frequency and c(θ)is a specific bimodal function.We prove that under weak Liouvillean condition on frequency,the strange non-chaotic attractor occurs with negative Lyapunov exponent.This extends the result in[Bjerklov,CMP,2009].展开更多
Solar energy has become crucial in producing electrical energy because it is inexhaustible and sustainable.However,its uncertain generation causes problems in power system operation.Therefore,solar irradiance forecast...Solar energy has become crucial in producing electrical energy because it is inexhaustible and sustainable.However,its uncertain generation causes problems in power system operation.Therefore,solar irradiance forecasting is significant for suitable controlling power system operation,organizing the transmission expansion planning,and dispatching power system generation.Nonetheless,the forecasting performance can be decreased due to the unfitted prediction model and lacked preprocessing.To deal with mentioned issues,this paper pro-poses Meta-Learning Extreme Learning Machine optimized with Golden Eagle Optimization and Logistic Map(MGEL-ELM)and the Same Datetime Interval Averaged Imputation algorithm(SAME)for improving the fore-casting performance of incomplete solar irradiance time series datasets.Thus,the proposed method is not only imputing incomplete forecasting data but also achieving forecasting accuracy.The experimental result of fore-casting solar irradiance dataset in Thailand indicates that the proposed method can achieve the highest coeffi-cient of determination value up to 0.9307 compared to state-of-the-art models.Furthermore,the proposed method consumes less forecasting time than the deep learning model.展开更多
In order to protect copyright of digital images,a new robust digital image watermarking algorithm based on chaotic system and QR factorization was proposed.The host images were firstly divided into blocks with same si...In order to protect copyright of digital images,a new robust digital image watermarking algorithm based on chaotic system and QR factorization was proposed.The host images were firstly divided into blocks with same size,then QR factorization was performed on each block.Pseudorandom circular chain(PCC) generated by logistic mapping(LM) was applied to select the embedding blocks for enhancing the security of the scheme.The first column coefficients in Q matrix of chosen blocks were modified to embed watermarks without causing noticeable artifacts.Watermark extraction procedure was performed without the original cover image.The experimental results demonstrate that the watermarked images have good visual quality and this scheme is better than the existing techniques,especially when the image is attacked by cropping,noise pollution and so on.Analysis and discussion on robustness and security issues were also presented.展开更多
This paper studies the effect of amplitude-phase errors on the antenna performance. Via builting on a worst-case error tolerance model, a simple and practical worst error tolerance analysis based on the chaos-genetic ...This paper studies the effect of amplitude-phase errors on the antenna performance. Via builting on a worst-case error tolerance model, a simple and practical worst error tolerance analysis based on the chaos-genetic algorithm (CGA) is proposed. The proposed method utilizes chaos to optimize initial population for the genetic algorithm (GA) and introduces chaotic disturbance into the genetic mutation, thereby improving the ability of the GA to search for the global optimum. Numerical simulations demonstrate that the accuracy and stability of the worst-case analysis of the proposed approach are superior to the GA. And the proposed algorithm can be used easily for the error tolerant design of antenna arrays.展开更多
In this paper, a fast image encryption algorithm is proposed, in which the shuffling and diffusion is performed simul- taneously. The cipher-text image is divided into blocks and each block has k x k pixels, while the...In this paper, a fast image encryption algorithm is proposed, in which the shuffling and diffusion is performed simul- taneously. The cipher-text image is divided into blocks and each block has k x k pixels, while the pixels of the plain-text are scanned one by one. Four logistic maps are used to generate the encryption key stream and the new place in the cipher image of plain image pixels, including the row and column of the block which the pixel belongs to and the place where the pixel would be placed in the block. After encrypting each pixel, the initial conditions of logistic maps would be changed ac- cording to the encrypted pixel's value; after encrypting each row of plain image, the initial condition would also be changed by the skew tent map. At last, it is illustrated that this algorithm has a faster speed, big key space, and better properties in withstanding differential attacks, statistical analysis, known plaintext, and chosen plaintext attacks.展开更多
In this paper, a novel image encryption algorithm is presented based on self-cited pixel summation. With the classical mechanism of permutation plus diffusion, a pixel summation of the plain image is employed to make ...In this paper, a novel image encryption algorithm is presented based on self-cited pixel summation. With the classical mechanism of permutation plus diffusion, a pixel summation of the plain image is employed to make a gravity influence on the pixel positions in the permutation stage. Then, for each pixel in every step of the diffusion stage, the pixel summation calculated from the permuted image is updated. The values from a chaotic sequence generated by an intertwining logistic map are selected by this summation. Consequently, the keystreams generated in both stages are dependent on both the plain image and the permuted image. Because of the sensitivity of the chaotic map to its initial conditions and the plain-imagedependent keystreams, any tiny change in the secret key or the plain image would lead to a significantly different cipher image. As a result, the proposed encryption algorithm is immune to the known plaintext attack(KPA) and the chosen plaintext attack(CPA). Moreover, experimental simulations and security analyses show that the proposed permutationdiffusion encryption scheme can achieve a satisfactory level of security.展开更多
基金Project supported by the Shandong Province Natural Science Foundation(Grant Nos.ZR2023MF089,R2023QF036,and ZR2021MF073)the Industry-University-Research Collaborative Innovation Fund Project of Qilu University of Technology(Shandong Academy of Sciences)(Grant Nos.2021CXY-13 and 2021CXY-14)+2 种基金the Major Scientific and Technological Innovation Projects of Shandong Province(Grant No.2020CXGC010901)the Talent Research Project of Qilu University of Technology(Shandong Academy of Sciences)(Grant No.2023RCKY054)the Basic Research Projects of Science,Education and Industry Integration Pilot Project of Qilu University of Technology(Shandong Academy of Sciences)(Grant No.2023PX081)。
文摘With the rapid development of internet technology,security protection of information has become more and more prominent,especially information encryption.Considering the great advantages of chaotic encryption,we propose a 2D-lag complex logistic map with complex parameters(2D-LCLMCP)and corresponding encryption schemes.Firstly,we present the model of the 2D-LCLMCP and analyze its chaotic properties and system stability through fixed points,Lyapunov exponent,bifurcation diagram,phase diagram,etc.Secondly,a block cipher algorithm based on the 2D-LCLMCP is proposed,the plaintext data is preprocessed using a pseudorandom sequence generated by the 2D-LCLMCP.Based on the generalized Feistel cipher structure,a round function F is constructed using dynamic S-box and DNA encoding rules as the core of the block cipher algorithm.The generalized Feistel cipher structure consists of two F functions,four XOR operations,and one permutation operation per round.The symmetric dynamic round keys that change with the plaintext are generated by the 2D-LCLMCP.Finally,experimental simulation and performance analysis tests are conducted.The results show that the block cipher algorithm has low complexit,good diffusion and a large key space.When the block length is 64 bits,only six rounds of encryption are required to provide sufficient security and robustness against cryptographic attacks.
文摘The embedding of the Bernoulli shift into the logistic map x→μx(1 - x) for μ 〉 4 is reinterpreted by the theory of anti-integrability: it is inherited from the anti-integrable limit μ→∞.
基金the National Natural Science Foundation of China(Grant No.61972103)the Natural Science Foundation of Guangdong Province of China(Grant No.2023A1515011207)+3 种基金the Special Project in Key Area of General University in Guangdong Province of China(Grant No.2020ZDZX3064)the Characteristic Innovation Project of General University in Guangdong Province of China(Grant No.2022KTSCX051)the Postgraduate Education Innovation Project of Guangdong Ocean University of China(Grant No.202263)the Foundation of Guangdong Provincial Engineering and Technology Research Center of Far Sea Fisheries Management and Fishing of South China Sea.
文摘Based on some analyses of existing chaotic image encryption frameworks and a new designed three-dimensional improved logistic chaotic map(3D-ILM),an asymmetric image encryption algorithm using public-key Rivest–Shamir–Adleman(RSA)is presented in this paper.In the first stage,a new 3D-ILM is proposed to enhance the chaotic behavior considering analysis of time sequence,Lyapunov exponent,and Shannon entropy.In the second stage,combined with the public key RSA algorithm,a new key acquisition mathematical model(MKA)is constructed to obtain the initial keys for the 3D-ILM.Consequently,the key stream can be produced depending on the plain image for a higher security.Moreover,a novel process model(NPM)for the input of the 3D-ILM is built,which is built to improve the distribution uniformity of the chaotic sequence.In the third stage,to encrypt the plain image,a pre-process by exclusive OR(XOR)operation with a random matrix is applied.Then,the pre-processed image is performed by a permutation for rows,a downward modulo function for adjacent pixels,a permutation for columns,a forward direction XOR addition-modulo diffusion,and a backward direction XOR addition-modulo diffusion to achieve the final cipher image.Moreover,experiments show that the the proposed algorithm has a better performance.Especially,the number of pixels change rate(NPCR)is close to ideal case 99.6094%,with the unified average changing intensity(UACI)close to 33.4634%,and the information entropy(IE)close to 8.
文摘Oil and gas pipelines are affected by many factors,such as pipe wall thinning and pipeline rupture.Accurate prediction of failure pressure of oil and gas pipelines can provide technical support for pipeline safety management.Aiming at the shortcomings of the BP Neural Network(BPNN)model,such as low learning efficiency,sensitivity to initial weights,and easy falling into a local optimal state,an Improved Sparrow Search Algorithm(ISSA)is adopted to optimize the initial weights and thresholds of BPNN,and an ISSA-BPNN failure pressure prediction model for corroded pipelines is established.Taking 61 sets of pipelines blasting test data as an example,the prediction model was built and predicted by MATLAB software,and compared with the BPNN model,GA-BPNN model,and SSA-BPNN model.The results show that the MAPE of the ISSA-BPNN model is 3.4177%,and the R2 is 0.9880,both of which are superior to its comparison model.Using the ISSA-BPNN model has high prediction accuracy and stability,and can provide support for pipeline inspection and maintenance.
基金This work was financially supported by the National Natural Science Foundation of China(No.69772014).]
文摘The fixed points in logistic mapping digital-flow chaos strange attractor arestudied in detail. When k=n in logistic equation, there exist no more than 2n fixed points, whichare deduced and proved theoretically. Three corollaries about the fixed points of logistic mappingare proposed and proved respectively. These theorem and corollaries provide a theoretical basis forchoosing parameter of chaotic sequences in chaotic secure communication and chaotic digitalwatermarking. And they are testified by simulation.
文摘Secure transmission of images over a communication channel, with limited data transfer capacity, possesses compression and encryption schemes. A deep learning based hybrid image compression-encryption scheme is proposed by combining stacked auto-encoder with the logistic map. The proposed structure of stacked autoencoder has seven multiple layers, and back propagation algorithm is intended to extend vector portrayal of information into lower vector space. The randomly generated key is used to set initial conditions and control parameters of logistic map. Subsequently, compressed image is encrypted by substituting and scrambling of pixel sequences using key stream sequences generated from logistic map.The proposed algorithms are experimentally tested over five standard grayscale images. Compression and encryption efficiency of proposed algorithms are evaluated and analyzed based on peak signal to noise ratio(PSNR), mean square error(MSE), structural similarity index metrics(SSIM) and statistical,differential, entropy analysis respectively. Simulation results show that proposed algorithms provide high quality reconstructed images with excellent levels of security during transmission..
基金Project supported by the National Natural Science Foundation of China(Grant Nos.11202180,61273106,and 11171290)the Natural Science Foundation of Jiangsu Province,China(Grant Nos.BK2010292 and BK2010293)+2 种基金the Natural Science Foundation of the Jiangsu Higher Education Institutions of China(Grant No.10KJB510026)the National Training Programs of Innovation and Entrepreneurship for Undergraduates,China(Grant No.201210324009)the Training Programs of Practice and Innovation for Jiangsu College Students,China(Grant No.2012JSSPITP2378)
文摘The complex dynamics of the logistic map via two periodic impulsive forces is investigated in this paper. The influ- ences of the system parameter and the impulsive forces on the dynamics of the system are studied respectively. With the parameter varying, the system produces the phenomenon such as periodic solutions, chaotic solutions, and chaotic crisis. Furthermore, the system can evolve to chaos by a cascading of period-doubling bifurcations. The Poincar6 map of the logistic map via two periodic impulsive forces is constructed and its bifurcation is analyzed. Finally, the Floquet theory is extended to explore the bifurcation mechanism for the periodic solutions of this non-smooth map.
文摘In the current scenario,data transmission over the network is a challenging task as there is a need for protecting sensitive data.Traditional encryption schemes are less sensitive and less complex thus prone to attacks during transmission.It has been observed that an encryption scheme using chaotic theory is more promising due to its non-linear and unpredictable behavior.Hence,proposed a novel hybrid image encryption scheme with multi-scroll attractors and quantum chaos logistic maps(MSA-QCLM).The image data is classified as inter-bits and intra-bits which are permutated separately using multi scroll attractor&quantum logistic maps to generate random keys.To increase the encryption efficiency,a hybrid chaotic technique was performed.Experimentation is performed in a Qiskit simulation tool for various image sets.The simulation results and theoretical analysis show that the proposed method is more efficient than its classical counterpart,and its security is verified by the statistical analysis,keys sensitivity,and keyspace analysis.The Number of changing pixel rate(NPCR)&the Unified averaged changed intensity(UACI)values were observed to be 99.6%&33.4%respectively.Also,entropy oscillates from 7.9 to 7.901 for the different tested encrypted images.The proposed algorithm can resist brute force attacks well,owing to the values of information entropy near the theoretical value of 8.The proposed algorithm has also passed the NIST test(Frequency Monobit test,Run test and DFT test).
基金The project supported partially by National Natural Science Foundation of China under Grant No. 10572056 and the Natural Science Foundation of Qansu Province under Grant No. 3ZS042-B25-021
文摘Evolution of spiral wave generated from the excitable media within the Barkley model is investigated. The external gradient electric field modulated by the logistic map is imposed on the media (along x- and y-axis). Drift and break up of spiral wave are observed when the amplitude of the electric field is modulated by the chaotic signal from the logistic map, and the whole system could become homogeneous finally and the relevant results are compared when the gradient electric field is modulated by the Lorenz or Rossler chaotic signal.
基金supported by NSFC(Grant No.12101311)supported by GuangDong Basic and Applied Basic Research Foundation(Grant No.2022A1515110427)。
文摘Consider a class of quasi-periodically forced logistic maps T×[0,1]■:(θ,x)→(θ+ω,c(θ)x(1-x))(T=R/Z),whereωis an irrational frequency and c(θ)is a specific bimodal function.We prove that under weak Liouvillean condition on frequency,the strange non-chaotic attractor occurs with negative Lyapunov exponent.This extends the result in[Bjerklov,CMP,2009].
文摘Solar energy has become crucial in producing electrical energy because it is inexhaustible and sustainable.However,its uncertain generation causes problems in power system operation.Therefore,solar irradiance forecasting is significant for suitable controlling power system operation,organizing the transmission expansion planning,and dispatching power system generation.Nonetheless,the forecasting performance can be decreased due to the unfitted prediction model and lacked preprocessing.To deal with mentioned issues,this paper pro-poses Meta-Learning Extreme Learning Machine optimized with Golden Eagle Optimization and Logistic Map(MGEL-ELM)and the Same Datetime Interval Averaged Imputation algorithm(SAME)for improving the fore-casting performance of incomplete solar irradiance time series datasets.Thus,the proposed method is not only imputing incomplete forecasting data but also achieving forecasting accuracy.The experimental result of fore-casting solar irradiance dataset in Thailand indicates that the proposed method can achieve the highest coeffi-cient of determination value up to 0.9307 compared to state-of-the-art models.Furthermore,the proposed method consumes less forecasting time than the deep learning model.
基金Project(2007AA01Z241-2) supported by the National High-tech Research and Development Program of ChinaProject(2006XM002) supported by Beijing Jiaotong University Science Foundation,ChinaProject(0910KYZY55) supported by the Fundamental Research Funds for the Central University in China
文摘In order to protect copyright of digital images,a new robust digital image watermarking algorithm based on chaotic system and QR factorization was proposed.The host images were firstly divided into blocks with same size,then QR factorization was performed on each block.Pseudorandom circular chain(PCC) generated by logistic mapping(LM) was applied to select the embedding blocks for enhancing the security of the scheme.The first column coefficients in Q matrix of chosen blocks were modified to embed watermarks without causing noticeable artifacts.Watermark extraction procedure was performed without the original cover image.The experimental results demonstrate that the watermarked images have good visual quality and this scheme is better than the existing techniques,especially when the image is attacked by cropping,noise pollution and so on.Analysis and discussion on robustness and security issues were also presented.
基金supported by the National Natural Science Foundation of China (60901055)
文摘This paper studies the effect of amplitude-phase errors on the antenna performance. Via builting on a worst-case error tolerance model, a simple and practical worst error tolerance analysis based on the chaos-genetic algorithm (CGA) is proposed. The proposed method utilizes chaos to optimize initial population for the genetic algorithm (GA) and introduces chaotic disturbance into the genetic mutation, thereby improving the ability of the GA to search for the global optimum. Numerical simulations demonstrate that the accuracy and stability of the worst-case analysis of the proposed approach are superior to the GA. And the proposed algorithm can be used easily for the error tolerant design of antenna arrays.
基金Project supported by the National Natural Science Foundation of China(Grant Nos.61370145,61173183,and 60973152)the Doctoral Program Foundation of Institution of Higher Education of China(Grant No.20070141014)+2 种基金the Program for Liaoning Excellent Talents in University,China(Grant No.LR2012003)the National Natural Science Foundation of Liaoning Province,China(Grant No.20082165)the Fundamental Research Funds for the Central Universities,China(Grant No.DUT12JB06)
文摘In this paper, a fast image encryption algorithm is proposed, in which the shuffling and diffusion is performed simul- taneously. The cipher-text image is divided into blocks and each block has k x k pixels, while the pixels of the plain-text are scanned one by one. Four logistic maps are used to generate the encryption key stream and the new place in the cipher image of plain image pixels, including the row and column of the block which the pixel belongs to and the place where the pixel would be placed in the block. After encrypting each pixel, the initial conditions of logistic maps would be changed ac- cording to the encrypted pixel's value; after encrypting each row of plain image, the initial condition would also be changed by the skew tent map. At last, it is illustrated that this algorithm has a faster speed, big key space, and better properties in withstanding differential attacks, statistical analysis, known plaintext, and chosen plaintext attacks.
基金supported by the National Natural Science Foundation of China(Grant Nos.61602124,61273021,11526057,and 11301091)the Natural Science Foundation of Guangdong Province,China(Grant Nos.2016A030310333,2015A030313614,and 2015A030313620)+3 种基金the Science & Technology Planning Projects of Zhanjiang City,China(Grant Nos.2015B01098 and 2015B01051)the Project Foundation of Chongqing Municipal Education Committee of China(Grant No.KJ1500501)the Program for Scientific Research Start-up Funds of Guangdong Ocean University of Chinathe Special Funding Program for Excellent Young Scholars of Guangdong Ocean University of China
文摘In this paper, a novel image encryption algorithm is presented based on self-cited pixel summation. With the classical mechanism of permutation plus diffusion, a pixel summation of the plain image is employed to make a gravity influence on the pixel positions in the permutation stage. Then, for each pixel in every step of the diffusion stage, the pixel summation calculated from the permuted image is updated. The values from a chaotic sequence generated by an intertwining logistic map are selected by this summation. Consequently, the keystreams generated in both stages are dependent on both the plain image and the permuted image. Because of the sensitivity of the chaotic map to its initial conditions and the plain-imagedependent keystreams, any tiny change in the secret key or the plain image would lead to a significantly different cipher image. As a result, the proposed encryption algorithm is immune to the known plaintext attack(KPA) and the chosen plaintext attack(CPA). Moreover, experimental simulations and security analyses show that the proposed permutationdiffusion encryption scheme can achieve a satisfactory level of security.