期刊文献+
共找到5篇文章
< 1 >
每页显示 20 50 100
Performances of improved Tent chaos-based FM radar signal 被引量:6
1
作者 Shaobin Xie Zishu He +2 位作者 Jinfeng Hu Lidong Liu Jichun Pan 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2012年第3期385-390,共6页
A novel algorithm is proposed to solve the poor per- formance problem of the Tent chaos-based frequency modulation (FM) signal for range-Doppler imaging, which takes it into complex multi-segment system by increasin... A novel algorithm is proposed to solve the poor per- formance problem of the Tent chaos-based frequency modulation (FM) signal for range-Doppler imaging, which takes it into complex multi-segment system by increasing its segments. The simulation results show that the effectiveness of the proposed algorithm, as well as the performance of the improved Tent FM signal is obvious in a multipath or noise propagation environment. 展开更多
关键词 chaos-based frequency modulation signal Tent map multipath Lyapunov exponent AUTOCORRELATION ambiguity function
下载PDF
Application of periodic orbit theory in chaos-based security analysis 被引量:3
2
作者 龙敏 丘水生 《Chinese Physics B》 SCIE EI CAS CSCD 2007年第8期2254-2258,共5页
Chaos-based encryption schemes have been studied extensively, while the security analysis methods for them are still problems to be resolved. Based on the periodic orbit theory, this paper proposes a novel security an... Chaos-based encryption schemes have been studied extensively, while the security analysis methods for them are still problems to be resolved. Based on the periodic orbit theory, this paper proposes a novel security analysis method. The periodic orbits theory indicates that the fundamental frequency of the spiraling orbits is the natural frequency of associated linearized system, which is decided by the parameters of the chaotic system. Thus, it is possible to recover the plaintext of secure communication systems based on chaotic shift keying by getting the average time on the spiraling orbits. Analysis and simulation results show that the security analysis method can break chaos shift keying secure communication systems, which use the parameters as keys. 展开更多
关键词 periodic orbit theory secure communication chaos-based security analysis
下载PDF
CHAOS-BASED SECURE COMMUNICATIONS
3
作者 Xiaofeng Liao Shutang Liu +1 位作者 Chengqing Li Yulong Zou 《China Communications》 SCIE CSCD 2020年第5期I0001-I0002,共2页
With the massive increase of wirelessly connected devices and the rapid development of the Internet, information is transmitted more and more frequently. Since the information transmissions over these networks are gre... With the massive increase of wirelessly connected devices and the rapid development of the Internet, information is transmitted more and more frequently. Since the information transmissions over these networks are greatly threatened not only by the imperfection of channels but also by the potential attackers or eavesdroppers, security and reliability become some of the crucial requirements for our future networks. Due to the complex dynamic behavior, ergodicity, wide spectrum and sensitivity to initial values, chaos signals show most required attributes of good cryptosystems and great potentials in optical fiber communications for desirable spatial accuracy and distance. In this context, it has become imperative to investigate and apply chaos theories to solve emerging secure communication problems in various networks. This includes leveraging chaos systems and signals to address a wide range of secure communication challenges in optical fiber communications, chaos cipher, image encryption, etc. 展开更多
关键词 IMAGE chaos-based SECURE COMMUNICATIONS
下载PDF
Hyper-chaos encryption using convolutional masking and model free unmasking
4
作者 齐国元 Sandra Bazebo Matondo 《Chinese Physics B》 SCIE EI CAS CSCD 2014年第5期161-166,共6页
In this paper, during the masking process the encrypted message is convolved and embedded into a Qi hyper-chaotic system characterizing a high disorder degree. The masking scheme was tested using both Qi hyper-chaos a... In this paper, during the masking process the encrypted message is convolved and embedded into a Qi hyper-chaotic system characterizing a high disorder degree. The masking scheme was tested using both Qi hyper-chaos and Lorenz chaos and indicated that Qi hyper-chaos based masking can resist attacks of the filtering and power spectrum analysis, while the Lorenz based scheme fails for high amplitude data. To unmask the message at the receiving end, two methods are proposed. In the first method, a model-free synchronizer, i.e. a multivariable higher-order differential feedback controller between the transmitter and receiver is employed to de-convolve the message embedded in the receiving signal. In the second method, no synchronization is required since the message is de-convolved using the information of the estimated derivative. 展开更多
关键词 Qi hyper-chaos MASKING high-order differentiator chaos-based encryption
下载PDF
Design and experimental confirmation of a novel switched hyperchaotic system 被引量:6
5
作者 ZHANG Ya-jun WANG Cui-ping +2 位作者 WANG Guang-yi XU Ning WANG Zhong-lin 《The Journal of China Universities of Posts and Telecommunications》 EI CSCD 2009年第2期122-128,共7页
To generate complex pseudo-noise (PN) sequences for chaos-based communications, this article presents a novel switched hyperchaotic model, which is constructed based on a modified Chen system by introducing a dynami... To generate complex pseudo-noise (PN) sequences for chaos-based communications, this article presents a novel switched hyperchaotic model, which is constructed based on a modified Chen system by introducing a dynamical controller. The system consists of two different hyperchaotic subsystems and can change its behavior randomly via a switching function. Basic dynamical behaviors of the hyperchaotic system are further investigated. Furthermore, the switched system is confirmed by its positive Lyapunov exponents and laboratory measurements by an electronic circuit. 展开更多
关键词 chaos-based communication HYPERCHAOS circuit realization
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部