Sliding mode control is an important method used in nonlinear control systems. In robust control systems, the sliding mode control is often adopted due to its inherent advantages of easy realization, fast response and...Sliding mode control is an important method used in nonlinear control systems. In robust control systems, the sliding mode control is often adopted due to its inherent advantages of easy realization, fast response and good transient performance as well as its insensitivity to parameter uncertainties and disturbances. In this paper, we derive new results based on the sliding mode control for the anti-synchronization of identical Qi three-dimensional (3D) four-wing chaotic systems (2008) and identical Liu 3D four-wing chaotic systems (2009). The stability results for the anti-synchronization schemes derived in this paper using sliding mode control (SMC) are established using Lyapunov stability theory. Since the Lyapunov exponents are not required for these calculations, the SMC method is very effective and convenient to achieve global chaos anti-synchronization of the identical Qi four-wing chaotic systems and identical Liu four-wing chaotic systems. Numerical simulations are shown to illustrate and validate the synchronization schemes derived in this paper.展开更多
In the paper, a novel four-wing hyper-chaotic system is proposed and analyzed. A rare dynamic phenomenon is found that this new system with one equilibrium generates a four-wing-hyper-chaotic attractor as parameter va...In the paper, a novel four-wing hyper-chaotic system is proposed and analyzed. A rare dynamic phenomenon is found that this new system with one equilibrium generates a four-wing-hyper-chaotic attractor as parameter varies. The system has rich and complex dynamical behaviors, and it is investigated in terms of Lyapunov exponents, bifurcation diagrams, Poincare maps, frequency spectrum, and numerical simulations. In addition, the theoretical analysis shows that the system undergoes a Hopf bifurcation as one parameter varies, which is illustrated by the numerical simulation. Finally, an analog circuit is designed to implement this hyper-chaotic system.展开更多
This paper presents a new 3D quadratic autonomous chaotic system which contains five system parameters and three quadratic cross-product terms,and the system can generate a single four-wing chaotic attractor with wide...This paper presents a new 3D quadratic autonomous chaotic system which contains five system parameters and three quadratic cross-product terms,and the system can generate a single four-wing chaotic attractor with wide parameter ranges. Through theoretical analysis,the Hopf bifurcation processes are proved to arise at certain equilibrium points.Numerical bifurcation analysis shows that the system has many interesting complex dynamical behaviours;the system trajectory can evolve to a chaotic attractor from a periodic orbit or a fixed point as the proper parameter varies. Finally,an analog electronic circuit is designed to physically realize the chaotic system;the existence of four-wing chaotic attractor is verified by the analog circuit realization.展开更多
In this paper,some basic properties of a new four-dimensional(4 D)continuous autonomous chaotic system,in which each equation contains a cubic cross-product term,are further analyzed.The new system has 9 equilibria di...In this paper,some basic properties of a new four-dimensional(4 D)continuous autonomous chaotic system,in which each equation contains a cubic cross-product term,are further analyzed.The new system has 9 equilibria displaying graceful symmetry with respect to the origin and coordinate planes,and the stability of them are discussed.Then detailed bifurcation analysis is given to demonstrate the evolution processes of the system.Numerical simulations show that the system evolves chaotic motions through period-doubling bifurcation or intermittence chaos while the system parameters vary.We design a new scheme of generalized projective synchronization,so-called unified generalized projective synchronization,whose response signal synchronizes with the linear combination of drive signal.The design has the advantages of containing complete synchronization,anti-synchronization and disorder synchronization over the usual generalized projective synchronization,such that it can provide greater security in secure communication.Based on Lyapunov stability theorem,some sufficient conditions for the new synchronization are inferred.Numerical simulations demonstrate the effectiveness and feasibility of the method by employing the four-wing chaotic system.展开更多
In this paper, we propose a novel four-dimensional autonomous chaotic system. Of particular interest is that this novel system can generate one-, two, three- and four-wing chaotic attractors with the variation of a si...In this paper, we propose a novel four-dimensional autonomous chaotic system. Of particular interest is that this novel system can generate one-, two, three- and four-wing chaotic attractors with the variation of a single parameter, and the multi-wing type of the chaotic attractors can be displayed in all directions. The system is simple with a large positive Lyapunov exponent and can exhibit some interesting and complicated dynamical behaviours. Basic dynamical properties of the four-dimensional chaotic system, such as equilibrium points, the Poincare map, the bifurcation diagram and the Lyapunov exponents are investigated by using either theoretical analysis or numerical method. Finally, a circuit is designed for the implementation of the multi-wing chaotic attractors. The electronic workbench observations axe in good agreement with the numerical simulation results.展开更多
This paper presents the problem of generating four-wing (eight-wing) chaotic attractors. The adopted method consists in suitably coupling two (three) identical Lorenz systems. In analogy with the original Lorenz s...This paper presents the problem of generating four-wing (eight-wing) chaotic attractors. The adopted method consists in suitably coupling two (three) identical Lorenz systems. In analogy with the original Lorenz system, where the two wings of the butterfly attractor are located around the two equilibria with the unstable pair of complex-conjugate eigenvalues, this paper shows that the four wings (eight wings) of these novel attractors axe located around the four (eight) equilibria with two (three) pairs of unstable complex-conjugate eigenvalues.展开更多
We present a fractional-order three-dimensional chaotic system, which can generate four-wing chaotic attractor. Dy- namics of the fractional-order system is investigated by numerical simulations. To rigorously verify ...We present a fractional-order three-dimensional chaotic system, which can generate four-wing chaotic attractor. Dy- namics of the fractional-order system is investigated by numerical simulations. To rigorously verify the chaos properties of this system, the existence of horseshoe in the four-wing attractor is presented. Firstly, a Poincar6 section is selected properly, and a first-return Poincar6 map is established. Then, a one-dimensional tensile horseshoe is discovered, which verifies the chaos existence of the system in mathematical view. Finally, the fractional-order chaotic attractor is imple- mented physically with a field-programmable gate array (FPGA) chip, which is useful in further engineering applications of information encryption and secure communications.展开更多
Images are the most important carrier of human information. Moreover, how to safely transmit digital imagesthrough public channels has become an urgent problem. In this paper, we propose a novel image encryptionalgori...Images are the most important carrier of human information. Moreover, how to safely transmit digital imagesthrough public channels has become an urgent problem. In this paper, we propose a novel image encryptionalgorithm, called chaotic compressive sensing (CS) encryption (CCSE), which can not only improve the efficiencyof image transmission but also introduce the high security of the chaotic system. Specifically, the proposed CCSEcan fully leverage the advantages of the Chebyshev chaotic system and CS, enabling it to withstand various attacks,such as differential attacks, and exhibit robustness. First, we use a sparse trans-form to sparse the plaintext imageand then use theArnold transformto perturb the image pixels. After that,we elaborate aChebyshev Toeplitz chaoticsensing matrix for CCSE. By using this Toeplitz matrix, the perturbed image is compressed and sampled to reducethe transmission bandwidth and the amount of data. Finally, a bilateral diffusion operator and a chaotic encryptionoperator are used to perturb and expand the image pixels to change the pixel position and value of the compressedimage, and ultimately obtain an encrypted image. Experimental results show that our method can be resistant tovarious attacks, such as the statistical attack and noise attack, and can outperform its current competitors.展开更多
This paper explores a double quantum images representation(DNEQR)model that allows for simultaneous storage of two digital images in a quantum superposition state.Additionally,a new type of two-dimensional hyperchaoti...This paper explores a double quantum images representation(DNEQR)model that allows for simultaneous storage of two digital images in a quantum superposition state.Additionally,a new type of two-dimensional hyperchaotic system based on sine and logistic maps is investigated,offering a wider parameter space and better chaotic behavior compared to the sine and logistic maps.Based on the DNEQR model and the hyperchaotic system,a double quantum images encryption algorithm is proposed.Firstly,two classical plaintext images are transformed into quantum states using the DNEQR model.Then,the proposed hyperchaotic system is employed to iteratively generate pseudo-random sequences.These chaotic sequences are utilized to perform pixel value and position operations on the quantum image,resulting in changes to both pixel values and positions.Finally,the ciphertext image can be obtained by qubit-level diffusion using two XOR operations between the position-permutated image and the pseudo-random sequences.The corresponding quantum circuits are also given.Experimental results demonstrate that the proposed scheme ensures the security of the images during transmission,improves the encryption efficiency,and enhances anti-interference and anti-attack capabilities.展开更多
This paper addresses the preassigned-time chaos control problem of memristor chaotic systems with time delays.Since the introduction of memristor,the presented models are nonlinear systems with chaotic dynamics.First,...This paper addresses the preassigned-time chaos control problem of memristor chaotic systems with time delays.Since the introduction of memristor,the presented models are nonlinear systems with chaotic dynamics.First,the TS fuzzy method is adopted to describe the chaotic systems.Then,a sliding-model-based control approach is proposed to achieve the preassigned-time stabilization of the presented models,where the upper bound of stabilization time can be arbitrarily specified in advance.Finally,simulation results demonstrate the validity of presented control approach and theoretic results.展开更多
With the rapid advancement in exploring perceptual interactions and digital twins,metaverse technology has emerged to transcend the constraints of space-time and reality,facilitating remote AI-based collaboration.In t...With the rapid advancement in exploring perceptual interactions and digital twins,metaverse technology has emerged to transcend the constraints of space-time and reality,facilitating remote AI-based collaboration.In this dynamic metasystem environment,frequent information exchanges necessitate robust security measures,with Authentication and Key Agreement(AKA)serving as the primary line of defense to ensure communication security.However,traditional AKA protocols fall short in meeting the low-latency requirements essential for synchronous interactions within the metaverse.To address this challenge and enable nearly latency-free interactions,a novel low-latency AKA protocol based on chaotic maps is proposed.This protocol not only ensures mutual authentication of entities within the metasystem but also generates secure session keys.The security of these session keys is rigorously validated through formal proofs,formal verification,and informal proofs.When confronted with the Dolev-Yao(DY)threat model,the session keys are formally demonstrated to be secure under the Real-or-Random(ROR)model.The proposed protocol is further validated through simulations conducted using VMware workstation compiled in HLPSL language and C language.The simulation results affirm the protocol’s effectiveness in resisting well-known attacks while achieving the desired low latency for optimal metaverse interactions.展开更多
To improve the prediction accuracy of chaotic time series and reconstruct a more reasonable phase space structure of the prediction network,we propose a convolutional neural network-long short-term memory(CNN-LSTM)pre...To improve the prediction accuracy of chaotic time series and reconstruct a more reasonable phase space structure of the prediction network,we propose a convolutional neural network-long short-term memory(CNN-LSTM)prediction model based on the incremental attention mechanism.Firstly,a traversal search is conducted through the traversal layer for finite parameters in the phase space.Then,an incremental attention layer is utilized for parameter judgment based on the dimension weight criteria(DWC).The phase space parameters that best meet DWC are selected and fed into the input layer.Finally,the constructed CNN-LSTM network extracts spatio-temporal features and provides the final prediction results.The model is verified using Logistic,Lorenz,and sunspot chaotic time series,and the performance is compared from the two dimensions of prediction accuracy and network phase space structure.Additionally,the CNN-LSTM network based on incremental attention is compared with long short-term memory(LSTM),convolutional neural network(CNN),recurrent neural network(RNN),and support vector regression(SVR)for prediction accuracy.The experiment results indicate that the proposed composite network model possesses enhanced capability in extracting temporal features and achieves higher prediction accuracy.Also,the algorithm to estimate the phase space parameter is compared with the traditional CAO,false nearest neighbor,and C-C,three typical methods for determining the chaotic phase space parameters.The experiments reveal that the phase space parameter estimation algorithm based on the incremental attention mechanism is superior in prediction accuracy compared with the traditional phase space reconstruction method in five networks,including CNN-LSTM,LSTM,CNN,RNN,and SVR.展开更多
The dynamic model of a bistable laminated composite shell simply supported by four corners is further developed to investigate the resonance responses and chaotic behaviors.The existence of the 1:1 resonance relations...The dynamic model of a bistable laminated composite shell simply supported by four corners is further developed to investigate the resonance responses and chaotic behaviors.The existence of the 1:1 resonance relationship between two order vibration modes of the system is verified.The resonance response of this class of bistable structures in the dynamic snap-through mode is investigated,and the four-dimensional(4D)nonlinear modulation equations are derived based on the 1:1 internal resonance relationship by means of the multiple scales method.The Hopf bifurcation and instability interval of the amplitude frequency and force amplitude curves are analyzed.The discussion focuses on investigating the effects of key parameters,e.g.,excitation amplitude,damping coefficient,and detuning parameters,on the resonance responses.The numerical simulations show that the foundation excitation and the degree of coupling between the vibration modes exert a substantial effect on the chaotic dynamics of the system.Furthermore,the significant motions under particular excitation conditions are visualized by bifurcation diagrams,time histories,phase portraits,three-dimensional(3D)phase portraits,and Poincare maps.Finally,the vibration experiment is carried out to study the amplitude frequency responses and bifurcation characteristics for the bistable laminated composite shell,yielding results that are qualitatively consistent with the theoretical results.展开更多
A novel color image encryption scheme is developed to enhance the security of encryption without increasing the complexity. Firstly, the plain color image is decomposed into three grayscale plain images, which are con...A novel color image encryption scheme is developed to enhance the security of encryption without increasing the complexity. Firstly, the plain color image is decomposed into three grayscale plain images, which are converted into the frequency domain coefficient matrices(FDCM) with discrete cosine transform(DCT) operation. After that, a twodimensional(2D) coupled chaotic system is developed and used to generate one group of embedded matrices and another group of encryption matrices, respectively. The embedded matrices are integrated with the FDCM to fulfill the frequency domain encryption, and then the inverse DCT processing is implemented to recover the spatial domain signal. Eventually,under the function of the encryption matrices and the proposed diagonal scrambling algorithm, the final color ciphertext is obtained. The experimental results show that the proposed method can not only ensure efficient encryption but also satisfy various sizes of image encryption. Besides, it has better performance than other similar techniques in statistical feature analysis, such as key space, key sensitivity, anti-differential attack, information entropy, noise attack, etc.展开更多
Security during remote transmission has been an important concern for researchers in recent years.In this paper,a hierarchical encryption multi-image encryption scheme for people with different security levels is desi...Security during remote transmission has been an important concern for researchers in recent years.In this paper,a hierarchical encryption multi-image encryption scheme for people with different security levels is designed,and a multiimage encryption(MIE)algorithm with row and column confusion and closed-loop bi-directional diffusion is adopted in the paper.While ensuring secure communication of medical image information,people with different security levels have different levels of decryption keys,and differentiated visual effects can be obtained by using the strong sensitivity of chaotic keys.The highest security level can obtain decrypted images without watermarks,and at the same time,patient information and copyright attribution can be verified by obtaining watermark images.The experimental results show that the scheme is sufficiently secure as an MIE scheme with visualized differences and the encryption and decryption efficiency is significantly improved compared to other works.展开更多
Wireless Network security management is difficult because of the ever-increasing number of wireless network malfunctions,vulnerabilities,and assaults.Complex security systems,such as Intrusion Detection Systems(IDS),a...Wireless Network security management is difficult because of the ever-increasing number of wireless network malfunctions,vulnerabilities,and assaults.Complex security systems,such as Intrusion Detection Systems(IDS),are essential due to the limitations of simpler security measures,such as cryptography and firewalls.Due to their compact nature and low energy reserves,wireless networks present a significant challenge for security procedures.The features of small cells can cause threats to the network.Network Coding(NC)enabled small cells are vulnerable to various types of attacks.Avoiding attacks and performing secure“peer”to“peer”data transmission is a challenging task in small cells.Due to the low power and memory requirements of the proposed model,it is well suited to use with constrained small cells.An attacker cannot change the contents of data and generate a new Hashed Homomorphic Message Authentication Code(HHMAC)hash between transmissions since the HMAC function is generated using the shared secret.In this research,a chaotic sequence mapping based low overhead 1D Improved Logistic Map is used to secure“peer”to“peer”data transmission model using lightweight H-MAC(1D-LM-P2P-LHHMAC)is proposed with accurate intrusion detection.The proposed model is evaluated with the traditional models by considering various evaluation metrics like Vector Set Generation Accuracy Levels,Key Pair Generation Time Levels,Chaotic Map Accuracy Levels,Intrusion Detection Accuracy Levels,and the results represent that the proposed model performance in chaotic map accuracy level is 98%and intrusion detection is 98.2%.The proposed model is compared with the traditional models and the results represent that the proposed model secure data transmission levels are high.展开更多
This paper focus on the chaotic properties of minimal subshift of shift operators. It is proved that the minimal subshift of shift operators is uniformly distributional chaotic, distributional chaotic in a sequence, d...This paper focus on the chaotic properties of minimal subshift of shift operators. It is proved that the minimal subshift of shift operators is uniformly distributional chaotic, distributional chaotic in a sequence, distributional chaotic of type k ( k∈{ 1,2,2 1 2 ,3 } ), and ( 0,1 ) -distribution.展开更多
The methods to determine time delays and embedding dimensions in the phase space delay reconstruction of multivariate chaotic time series are proposed. Three nonlinear prediction methods of multivariate chaotic tim...The methods to determine time delays and embedding dimensions in the phase space delay reconstruction of multivariate chaotic time series are proposed. Three nonlinear prediction methods of multivariate chaotic time series including local mean prediction, local linear prediction and BP neural networks prediction are considered. The simulation results obtained by the Lorenz system show that no matter what nonlinear prediction method is used, the prediction error of multivariate chaotic time series is much smaller than the prediction error of univariate time series, even if half of the data of univariate time series are used in multivariate time series. The results also verify that methods to determine the time delays and the embedding dimensions are correct from the view of minimizing the prediction error.展开更多
Chaotic neural networks have global searching ability.But their applications are generally confined to combinatorial optimization to date.By introducing chaotic noise annealing process into conventional Hopfield netwo...Chaotic neural networks have global searching ability.But their applications are generally confined to combinatorial optimization to date.By introducing chaotic noise annealing process into conventional Hopfield network,this paper proposes a new chaotic annealing neural network (CANN) for global optimization of continuous constrained non linear programming.It is easy to implement,conceptually simple,and generally applicable.Numerical experiments on severe test functions manifest that CANN is efficient and reliable to search for global optimum and outperforms the existing genetic algorithm GAMAS for the same purpose.展开更多
文摘Sliding mode control is an important method used in nonlinear control systems. In robust control systems, the sliding mode control is often adopted due to its inherent advantages of easy realization, fast response and good transient performance as well as its insensitivity to parameter uncertainties and disturbances. In this paper, we derive new results based on the sliding mode control for the anti-synchronization of identical Qi three-dimensional (3D) four-wing chaotic systems (2008) and identical Liu 3D four-wing chaotic systems (2009). The stability results for the anti-synchronization schemes derived in this paper using sliding mode control (SMC) are established using Lyapunov stability theory. Since the Lyapunov exponents are not required for these calculations, the SMC method is very effective and convenient to achieve global chaos anti-synchronization of the identical Qi four-wing chaotic systems and identical Liu four-wing chaotic systems. Numerical simulations are shown to illustrate and validate the synchronization schemes derived in this paper.
基金supported by the National Natural Science Foundation of China(Grant Nos.10772135 and 60874028)the Young Scientists Fund of the National Natural Science Foundation of China(Grant No.11202148)+2 种基金the Incentive Funding of the National Research Foundation of South Africa(GrantNo.IFR2009090800049)the Eskom Tertiary Education Support Programme of South Africathe Research Foundation of Tianjin University of Science and Technology
文摘In the paper, a novel four-wing hyper-chaotic system is proposed and analyzed. A rare dynamic phenomenon is found that this new system with one equilibrium generates a four-wing-hyper-chaotic attractor as parameter varies. The system has rich and complex dynamical behaviors, and it is investigated in terms of Lyapunov exponents, bifurcation diagrams, Poincare maps, frequency spectrum, and numerical simulations. In addition, the theoretical analysis shows that the system undergoes a Hopf bifurcation as one parameter varies, which is illustrated by the numerical simulation. Finally, an analog circuit is designed to implement this hyper-chaotic system.
基金Project supported by the National Natural Science Foundation of China(Grant Nos 60774088 and 10772135)the Foundation of the Application Base and Frontier Technology Research Project of Tianjin,China (Grant Nos 07JCZDJC09600,08JCZDJC21900 and 08JCZDJC18600)the Tianjin Key Laboratory for Control Theory & Applications in Complicated Industry Systems of China
文摘This paper presents a new 3D quadratic autonomous chaotic system which contains five system parameters and three quadratic cross-product terms,and the system can generate a single four-wing chaotic attractor with wide parameter ranges. Through theoretical analysis,the Hopf bifurcation processes are proved to arise at certain equilibrium points.Numerical bifurcation analysis shows that the system has many interesting complex dynamical behaviours;the system trajectory can evolve to a chaotic attractor from a periodic orbit or a fixed point as the proper parameter varies. Finally,an analog electronic circuit is designed to physically realize the chaotic system;the existence of four-wing chaotic attractor is verified by the analog circuit realization.
基金Supported by the National Natural Science Foundation of China(61863022)the Natural Science Foundation of Gansu Province(17JR5RA096)。
文摘In this paper,some basic properties of a new four-dimensional(4 D)continuous autonomous chaotic system,in which each equation contains a cubic cross-product term,are further analyzed.The new system has 9 equilibria displaying graceful symmetry with respect to the origin and coordinate planes,and the stability of them are discussed.Then detailed bifurcation analysis is given to demonstrate the evolution processes of the system.Numerical simulations show that the system evolves chaotic motions through period-doubling bifurcation or intermittence chaos while the system parameters vary.We design a new scheme of generalized projective synchronization,so-called unified generalized projective synchronization,whose response signal synchronizes with the linear combination of drive signal.The design has the advantages of containing complete synchronization,anti-synchronization and disorder synchronization over the usual generalized projective synchronization,such that it can provide greater security in secure communication.Based on Lyapunov stability theorem,some sufficient conditions for the new synchronization are inferred.Numerical simulations demonstrate the effectiveness and feasibility of the method by employing the four-wing chaotic system.
文摘In this paper, we propose a novel four-dimensional autonomous chaotic system. Of particular interest is that this novel system can generate one-, two, three- and four-wing chaotic attractors with the variation of a single parameter, and the multi-wing type of the chaotic attractors can be displayed in all directions. The system is simple with a large positive Lyapunov exponent and can exhibit some interesting and complicated dynamical behaviours. Basic dynamical properties of the four-dimensional chaotic system, such as equilibrium points, the Poincare map, the bifurcation diagram and the Lyapunov exponents are investigated by using either theoretical analysis or numerical method. Finally, a circuit is designed for the implementation of the multi-wing chaotic attractors. The electronic workbench observations axe in good agreement with the numerical simulation results.
文摘This paper presents the problem of generating four-wing (eight-wing) chaotic attractors. The adopted method consists in suitably coupling two (three) identical Lorenz systems. In analogy with the original Lorenz system, where the two wings of the butterfly attractor are located around the two equilibria with the unstable pair of complex-conjugate eigenvalues, this paper shows that the four wings (eight wings) of these novel attractors axe located around the four (eight) equilibria with two (three) pairs of unstable complex-conjugate eigenvalues.
基金Project supported by the National Natural Science Foundation of China(Grant Nos.61502340 and 61374169)the Application Base and Frontier Technology Research Project of Tianjin,China(Grant No.15JCYBJC51800)the South African National Research Foundation Incentive Grants(Grant No.81705)
文摘We present a fractional-order three-dimensional chaotic system, which can generate four-wing chaotic attractor. Dy- namics of the fractional-order system is investigated by numerical simulations. To rigorously verify the chaos properties of this system, the existence of horseshoe in the four-wing attractor is presented. Firstly, a Poincar6 section is selected properly, and a first-return Poincar6 map is established. Then, a one-dimensional tensile horseshoe is discovered, which verifies the chaos existence of the system in mathematical view. Finally, the fractional-order chaotic attractor is imple- mented physically with a field-programmable gate array (FPGA) chip, which is useful in further engineering applications of information encryption and secure communications.
基金the National Natural Science Foundation of China(Nos.62002028,62102040 and 62202066).
文摘Images are the most important carrier of human information. Moreover, how to safely transmit digital imagesthrough public channels has become an urgent problem. In this paper, we propose a novel image encryptionalgorithm, called chaotic compressive sensing (CS) encryption (CCSE), which can not only improve the efficiencyof image transmission but also introduce the high security of the chaotic system. Specifically, the proposed CCSEcan fully leverage the advantages of the Chebyshev chaotic system and CS, enabling it to withstand various attacks,such as differential attacks, and exhibit robustness. First, we use a sparse trans-form to sparse the plaintext imageand then use theArnold transformto perturb the image pixels. After that,we elaborate aChebyshev Toeplitz chaoticsensing matrix for CCSE. By using this Toeplitz matrix, the perturbed image is compressed and sampled to reducethe transmission bandwidth and the amount of data. Finally, a bilateral diffusion operator and a chaotic encryptionoperator are used to perturb and expand the image pixels to change the pixel position and value of the compressedimage, and ultimately obtain an encrypted image. Experimental results show that our method can be resistant tovarious attacks, such as the statistical attack and noise attack, and can outperform its current competitors.
基金Project supported by the Open Fund of Anhui Key Laboratory of Mine Intelligent Equipment and Technology (Grant No.ZKSYS202204)the Talent Introduction Fund of Anhui University of Science and Technology (Grant No.2021yjrc34)the Scientific Research Fund of Anhui Provincial Education Department (Grant No.KJ2020A0301)。
文摘This paper explores a double quantum images representation(DNEQR)model that allows for simultaneous storage of two digital images in a quantum superposition state.Additionally,a new type of two-dimensional hyperchaotic system based on sine and logistic maps is investigated,offering a wider parameter space and better chaotic behavior compared to the sine and logistic maps.Based on the DNEQR model and the hyperchaotic system,a double quantum images encryption algorithm is proposed.Firstly,two classical plaintext images are transformed into quantum states using the DNEQR model.Then,the proposed hyperchaotic system is employed to iteratively generate pseudo-random sequences.These chaotic sequences are utilized to perform pixel value and position operations on the quantum image,resulting in changes to both pixel values and positions.Finally,the ciphertext image can be obtained by qubit-level diffusion using two XOR operations between the position-permutated image and the pseudo-random sequences.The corresponding quantum circuits are also given.Experimental results demonstrate that the proposed scheme ensures the security of the images during transmission,improves the encryption efficiency,and enhances anti-interference and anti-attack capabilities.
基金Project supported by the National Natural Science Foundation of China(Grant Nos.62473348 and 62076229)the Knowledge Innovation Program of Wuhan-Basic Research(Grant No.2023010201010101).
文摘This paper addresses the preassigned-time chaos control problem of memristor chaotic systems with time delays.Since the introduction of memristor,the presented models are nonlinear systems with chaotic dynamics.First,the TS fuzzy method is adopted to describe the chaotic systems.Then,a sliding-model-based control approach is proposed to achieve the preassigned-time stabilization of the presented models,where the upper bound of stabilization time can be arbitrarily specified in advance.Finally,simulation results demonstrate the validity of presented control approach and theoretic results.
基金This work has received funding from National Natural Science Foundation of China(No.42275157).
文摘With the rapid advancement in exploring perceptual interactions and digital twins,metaverse technology has emerged to transcend the constraints of space-time and reality,facilitating remote AI-based collaboration.In this dynamic metasystem environment,frequent information exchanges necessitate robust security measures,with Authentication and Key Agreement(AKA)serving as the primary line of defense to ensure communication security.However,traditional AKA protocols fall short in meeting the low-latency requirements essential for synchronous interactions within the metaverse.To address this challenge and enable nearly latency-free interactions,a novel low-latency AKA protocol based on chaotic maps is proposed.This protocol not only ensures mutual authentication of entities within the metasystem but also generates secure session keys.The security of these session keys is rigorously validated through formal proofs,formal verification,and informal proofs.When confronted with the Dolev-Yao(DY)threat model,the session keys are formally demonstrated to be secure under the Real-or-Random(ROR)model.The proposed protocol is further validated through simulations conducted using VMware workstation compiled in HLPSL language and C language.The simulation results affirm the protocol’s effectiveness in resisting well-known attacks while achieving the desired low latency for optimal metaverse interactions.
文摘To improve the prediction accuracy of chaotic time series and reconstruct a more reasonable phase space structure of the prediction network,we propose a convolutional neural network-long short-term memory(CNN-LSTM)prediction model based on the incremental attention mechanism.Firstly,a traversal search is conducted through the traversal layer for finite parameters in the phase space.Then,an incremental attention layer is utilized for parameter judgment based on the dimension weight criteria(DWC).The phase space parameters that best meet DWC are selected and fed into the input layer.Finally,the constructed CNN-LSTM network extracts spatio-temporal features and provides the final prediction results.The model is verified using Logistic,Lorenz,and sunspot chaotic time series,and the performance is compared from the two dimensions of prediction accuracy and network phase space structure.Additionally,the CNN-LSTM network based on incremental attention is compared with long short-term memory(LSTM),convolutional neural network(CNN),recurrent neural network(RNN),and support vector regression(SVR)for prediction accuracy.The experiment results indicate that the proposed composite network model possesses enhanced capability in extracting temporal features and achieves higher prediction accuracy.Also,the algorithm to estimate the phase space parameter is compared with the traditional CAO,false nearest neighbor,and C-C,three typical methods for determining the chaotic phase space parameters.The experiments reveal that the phase space parameter estimation algorithm based on the incremental attention mechanism is superior in prediction accuracy compared with the traditional phase space reconstruction method in five networks,including CNN-LSTM,LSTM,CNN,RNN,and SVR.
基金Project supported by the National Natural Science Foundation of China(Nos.12293000,12293001,11988102,12172006,and 12202011)。
文摘The dynamic model of a bistable laminated composite shell simply supported by four corners is further developed to investigate the resonance responses and chaotic behaviors.The existence of the 1:1 resonance relationship between two order vibration modes of the system is verified.The resonance response of this class of bistable structures in the dynamic snap-through mode is investigated,and the four-dimensional(4D)nonlinear modulation equations are derived based on the 1:1 internal resonance relationship by means of the multiple scales method.The Hopf bifurcation and instability interval of the amplitude frequency and force amplitude curves are analyzed.The discussion focuses on investigating the effects of key parameters,e.g.,excitation amplitude,damping coefficient,and detuning parameters,on the resonance responses.The numerical simulations show that the foundation excitation and the degree of coupling between the vibration modes exert a substantial effect on the chaotic dynamics of the system.Furthermore,the significant motions under particular excitation conditions are visualized by bifurcation diagrams,time histories,phase portraits,three-dimensional(3D)phase portraits,and Poincare maps.Finally,the vibration experiment is carried out to study the amplitude frequency responses and bifurcation characteristics for the bistable laminated composite shell,yielding results that are qualitatively consistent with the theoretical results.
基金Project supported by the National Natural Science Foundation of China(Grant Nos.62105004 and 52174141)the College Student Innovation and Entrepreneurship Fund Project(Grant No.202210361053)+1 种基金Anhui Mining Machinery and Electrical Equipment Coordination Innovation Center,Anhui University of Science&Technology(Grant No.KSJD202304)the Anhui Province Digital Agricultural Engineering Technology Research Center Open Project(Grant No.AHSZNYGC-ZXKF021)。
文摘A novel color image encryption scheme is developed to enhance the security of encryption without increasing the complexity. Firstly, the plain color image is decomposed into three grayscale plain images, which are converted into the frequency domain coefficient matrices(FDCM) with discrete cosine transform(DCT) operation. After that, a twodimensional(2D) coupled chaotic system is developed and used to generate one group of embedded matrices and another group of encryption matrices, respectively. The embedded matrices are integrated with the FDCM to fulfill the frequency domain encryption, and then the inverse DCT processing is implemented to recover the spatial domain signal. Eventually,under the function of the encryption matrices and the proposed diagonal scrambling algorithm, the final color ciphertext is obtained. The experimental results show that the proposed method can not only ensure efficient encryption but also satisfy various sizes of image encryption. Besides, it has better performance than other similar techniques in statistical feature analysis, such as key space, key sensitivity, anti-differential attack, information entropy, noise attack, etc.
基金Project supported by the National Natural Science Foundation of China(Grant No.62061014)the Natural Science Foundation of Liaoning province of China(Grant No.2020-MS-274).
文摘Security during remote transmission has been an important concern for researchers in recent years.In this paper,a hierarchical encryption multi-image encryption scheme for people with different security levels is designed,and a multiimage encryption(MIE)algorithm with row and column confusion and closed-loop bi-directional diffusion is adopted in the paper.While ensuring secure communication of medical image information,people with different security levels have different levels of decryption keys,and differentiated visual effects can be obtained by using the strong sensitivity of chaotic keys.The highest security level can obtain decrypted images without watermarks,and at the same time,patient information and copyright attribution can be verified by obtaining watermark images.The experimental results show that the scheme is sufficiently secure as an MIE scheme with visualized differences and the encryption and decryption efficiency is significantly improved compared to other works.
文摘Wireless Network security management is difficult because of the ever-increasing number of wireless network malfunctions,vulnerabilities,and assaults.Complex security systems,such as Intrusion Detection Systems(IDS),are essential due to the limitations of simpler security measures,such as cryptography and firewalls.Due to their compact nature and low energy reserves,wireless networks present a significant challenge for security procedures.The features of small cells can cause threats to the network.Network Coding(NC)enabled small cells are vulnerable to various types of attacks.Avoiding attacks and performing secure“peer”to“peer”data transmission is a challenging task in small cells.Due to the low power and memory requirements of the proposed model,it is well suited to use with constrained small cells.An attacker cannot change the contents of data and generate a new Hashed Homomorphic Message Authentication Code(HHMAC)hash between transmissions since the HMAC function is generated using the shared secret.In this research,a chaotic sequence mapping based low overhead 1D Improved Logistic Map is used to secure“peer”to“peer”data transmission model using lightweight H-MAC(1D-LM-P2P-LHHMAC)is proposed with accurate intrusion detection.The proposed model is evaluated with the traditional models by considering various evaluation metrics like Vector Set Generation Accuracy Levels,Key Pair Generation Time Levels,Chaotic Map Accuracy Levels,Intrusion Detection Accuracy Levels,and the results represent that the proposed model performance in chaotic map accuracy level is 98%and intrusion detection is 98.2%.The proposed model is compared with the traditional models and the results represent that the proposed model secure data transmission levels are high.
文摘This paper focus on the chaotic properties of minimal subshift of shift operators. It is proved that the minimal subshift of shift operators is uniformly distributional chaotic, distributional chaotic in a sequence, distributional chaotic of type k ( k∈{ 1,2,2 1 2 ,3 } ), and ( 0,1 ) -distribution.
文摘The methods to determine time delays and embedding dimensions in the phase space delay reconstruction of multivariate chaotic time series are proposed. Three nonlinear prediction methods of multivariate chaotic time series including local mean prediction, local linear prediction and BP neural networks prediction are considered. The simulation results obtained by the Lorenz system show that no matter what nonlinear prediction method is used, the prediction error of multivariate chaotic time series is much smaller than the prediction error of univariate time series, even if half of the data of univariate time series are used in multivariate time series. The results also verify that methods to determine the time delays and the embedding dimensions are correct from the view of minimizing the prediction error.
基金the National Natural Science Foundation of China(No.79970 0 4 2 )
文摘Chaotic neural networks have global searching ability.But their applications are generally confined to combinatorial optimization to date.By introducing chaotic noise annealing process into conventional Hopfield network,this paper proposes a new chaotic annealing neural network (CANN) for global optimization of continuous constrained non linear programming.It is easy to implement,conceptually simple,and generally applicable.Numerical experiments on severe test functions manifest that CANN is efficient and reliable to search for global optimum and outperforms the existing genetic algorithm GAMAS for the same purpose.