期刊文献+
共找到1,054篇文章
< 1 2 53 >
每页显示 20 50 100
A New Images Hiding Scheme Based on Chaotic Sequences 被引量:2
1
作者 LIUNian-sheng GUODong-hui +1 位作者 WUBo-xi ParrG 《Wuhan University Journal of Natural Sciences》 CAS 2005年第1期303-306,共4页
We propose a data hidding technique in a still image. This technique is based on chaotic sequence in the transform domain of cover image. We use different chaotic random sequences multiplied by multiple sensitive imag... We propose a data hidding technique in a still image. This technique is based on chaotic sequence in the transform domain of cover image. We use different chaotic random sequences multiplied by multiple sensitive images, respectively, to spread the spectrum of sensitive images. Multiple sensitive images are hidden in a covert image as a form of noise. The results of theoretical analysis and computer simulation show the new hiding technique have better properties with high security, imperceptibility and capacity for hidden information in comparison with the conventional scheme such as LSB (Least Significance Bit). 展开更多
关键词 information hiding chaotic sequence information security image transform
下载PDF
Survey on Research of RNN-Based Spatio-Temporal Sequence Prediction Algorithms 被引量:5
2
作者 Wei Fang Yupeng Chen Qiongying Xue 《Journal on Big Data》 2021年第3期97-110,共14页
In the past few years,deep learning has developed rapidly,and many researchers try to combine their subjects with deep learning.The algorithm based on Recurrent Neural Network(RNN)has been successfully applied in the ... In the past few years,deep learning has developed rapidly,and many researchers try to combine their subjects with deep learning.The algorithm based on Recurrent Neural Network(RNN)has been successfully applied in the fields of weather forecasting,stock forecasting,action recognition,etc.because of its excellent performance in processing Spatio-temporal sequence data.Among them,algorithms based on LSTM and GRU have developed most rapidly because of their good design.This paper reviews the RNN-based Spatio-temporal sequence prediction algorithm,introduces the development history of RNN and the common application directions of the Spatio-temporal sequence prediction,and includes precipitation nowcasting algorithms and traffic flow forecasting algorithms.At the same time,it also compares the advantages and disadvantages,and innovations of each algorithm.The purpose of this article is to give readers a clear understanding of solutions to such problems.Finally,it prospects the future development of RNN in the Spatio-temporal sequence prediction algorithm. 展开更多
关键词 RNN LSTM GRU spatio-temporal sequence prediction
下载PDF
Intrusion Detection Model Using Chaotic MAP for Network Coding Enabled Mobile Small Cells
3
作者 Chanumolu Kiran Kumar Nandhakumar Ramachandran 《Computers, Materials & Continua》 SCIE EI 2024年第3期3151-3176,共26页
Wireless Network security management is difficult because of the ever-increasing number of wireless network malfunctions,vulnerabilities,and assaults.Complex security systems,such as Intrusion Detection Systems(IDS),a... Wireless Network security management is difficult because of the ever-increasing number of wireless network malfunctions,vulnerabilities,and assaults.Complex security systems,such as Intrusion Detection Systems(IDS),are essential due to the limitations of simpler security measures,such as cryptography and firewalls.Due to their compact nature and low energy reserves,wireless networks present a significant challenge for security procedures.The features of small cells can cause threats to the network.Network Coding(NC)enabled small cells are vulnerable to various types of attacks.Avoiding attacks and performing secure“peer”to“peer”data transmission is a challenging task in small cells.Due to the low power and memory requirements of the proposed model,it is well suited to use with constrained small cells.An attacker cannot change the contents of data and generate a new Hashed Homomorphic Message Authentication Code(HHMAC)hash between transmissions since the HMAC function is generated using the shared secret.In this research,a chaotic sequence mapping based low overhead 1D Improved Logistic Map is used to secure“peer”to“peer”data transmission model using lightweight H-MAC(1D-LM-P2P-LHHMAC)is proposed with accurate intrusion detection.The proposed model is evaluated with the traditional models by considering various evaluation metrics like Vector Set Generation Accuracy Levels,Key Pair Generation Time Levels,Chaotic Map Accuracy Levels,Intrusion Detection Accuracy Levels,and the results represent that the proposed model performance in chaotic map accuracy level is 98%and intrusion detection is 98.2%.The proposed model is compared with the traditional models and the results represent that the proposed model secure data transmission levels are high. 展开更多
关键词 Network coding small cells data transmission intrusion detection model hashed message authentication code chaotic sequence mapping secure transmission
下载PDF
Particle Swarm Optimization Algorithm Based on Chaotic Sequences and Dynamic Self-Adaptive Strategy
4
作者 Mengshan Li Liang Liu +4 位作者 Genqin Sun Keming Su Huaijin Zhang Bingsheng Chen Yan Wu 《Journal of Computer and Communications》 2017年第12期13-23,共11页
To deal with the problems of premature convergence and tending to jump into the local optimum in the traditional particle swarm optimization, a novel improved particle swarm optimization algorithm was proposed. The se... To deal with the problems of premature convergence and tending to jump into the local optimum in the traditional particle swarm optimization, a novel improved particle swarm optimization algorithm was proposed. The self-adaptive inertia weight factor was used to accelerate the converging speed, and chaotic sequences were used to tune the acceleration coefficients for the balance between exploration and exploitation. The performance of the proposed algorithm was tested on four classical multi-objective optimization functions by comparing with the non-dominated sorting genetic algorithm and multi-objective particle swarm optimization algorithm. The results verified the effectiveness of the algorithm, which improved the premature convergence problem with faster convergence rate and strong ability to jump out of local optimum. 展开更多
关键词 Particle SWARM Algorithm chaotic sequences SELF-ADAPTIVE STRATEGY MULTI-OBJECTIVE Optimization
下载PDF
AN ALGORITHM OF LOCAL PREDICTION FOR CHAOTIC SEQUENCES WITH VARIABLE FRAME LENGTH
5
作者 Li Jinlong Lin Jiayu 《Journal of Electronics(China)》 2012年第3期345-352,共8页
According to the issues that the predict errors of chaotic sequences rapidly accumulated in multi-step forecasting which affects the predict accuracy, we proposed a new predict algorithm based on local modeling with v... According to the issues that the predict errors of chaotic sequences rapidly accumulated in multi-step forecasting which affects the predict accuracy, we proposed a new predict algorithm based on local modeling with variable frame length and interpolation points. The core idea is that, using interpolation method to increase the available sample data, then modeling the chaos dynamics system with least square algorithm which based on the Bernstein polynomial to realize the forecasting. We use the local modeling method, looking for the optimum frame length and interpolation points in every frame to improve the predict peformance. The experimental results show that the proposed algorithm can improve the predictive ability effectively, decreasing the accumulation of iterative errors in multi-step prediction. 展开更多
关键词 chaotic sequences forecasting Local modeling Variable frame length Bernstein polynomial Linear interpolation
下载PDF
Spatio-temporal epidemic type aftershock sequence model for Tangshan aftershock sequence
6
作者 Shaochuan Lue Yong Li 《Earthquake Science》 CSCD 2011年第5期401-408,共8页
Shallow earthquakes usually show obvious spatio-temporal clustering patterns. In this study, several spatio-temporal point process models are applied to investigate the clustering characteristics of the well-known Tan... Shallow earthquakes usually show obvious spatio-temporal clustering patterns. In this study, several spatio-temporal point process models are applied to investigate the clustering characteristics of the well-known Tangshan sequence based on classical empirical laws and a few assumptions. The relative fit of competing models is compared by Akalke Information Criterion. The spatial clustering pattern is well characterized by the model which gives the best fit to the data. A simulated aftershock sequence is generated by thinning algorithm and compared with the real seismicity. 展开更多
关键词 spatio-temporal model Tangshan aftershock sequence Laplace type clustering thinning simulation Akaike information criterion
下载PDF
Two Sequences of Operator Monotone Functions and Strictly Chaotic Order
7
作者 ZHA NG Lei JIANG Jian-fei 《Chinese Quarterly Journal of Mathematics》 CSCD 北大核心 2006年第4期597-607,共11页
In this paper we introduce two sequences of operator functions and their dual functions:f_k(t)=((tlog t)~k-(t-1)~k)/(log^k+1t)(k=1,2,...),gk(t)=((t-1)~k-log^k t)/(log^k+1t)(k=1,2,...)and f_k~*=(t^klog^(k+1)t)/((tlog t... In this paper we introduce two sequences of operator functions and their dual functions:f_k(t)=((tlog t)~k-(t-1)~k)/(log^k+1t)(k=1,2,...),gk(t)=((t-1)~k-log^k t)/(log^k+1t)(k=1,2,...)and f_k~*=(t^klog^(k+1)t)/((tlog t)~k-(t-1)~k)(k=1,2,...),g_k~*(t)=(t^klog^(k+1)t)/((t-1)~k-log^k t)(k=1,2,...)definedon(0,+∞). We find that they are all operator monotone functions with respect to the strictly chaotic order and some ordinary orders among positive invertible operators.Indeed,we extend the results of the operator monotone function(tlog t -t+1)/(log^2t)which is widely used in the theory of heat transfer of the heat engineering and fluid mechanics[1]. 展开更多
关键词 单调算子函数 混乱次序 正常次序 可逆转算子
下载PDF
A Class of Chaotic Sequences with Gauss Probability Distribution for Radar Mask Jamming
8
作者 Ni-Ni Rao Yu-Chuan Huang Bin Liu 《Journal of Electronic Science and Technology of China》 2007年第2期180-182,共3页
A simple generation approach for chaotic sequences with Gauss probability distribution is proposed. Theoretical analysis and simulation based on Logistic chaotic model show that the approach is feasible and effective.... A simple generation approach for chaotic sequences with Gauss probability distribution is proposed. Theoretical analysis and simulation based on Logistic chaotic model show that the approach is feasible and effective. The distribution characteristics of the novel chaotic sequence are comparable to that of the standard normal distribution. Its mean and variance can be changed to the desired values. The novel sequences have also good randomness. The applications for radar mask jamming are analyzed. 展开更多
关键词 chaotic sequence gauss probability distribution radar mask jamming jamming effectiveness.
下载PDF
Periodic performance of the chaotic spread spectrum sequence on finite precision 被引量:3
9
作者 Zhu Canyan Zhang Lihua +2 位作者 Wang Yiming Liu Jiasheng Mao Lingfeng 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2008年第4期672-678,共7页
It is well known that the periodic performance of spread spectrum sequence heavily affects the correlative and secure characteristics of communication systems. The chaotic binary sequence is paid more and more attenti... It is well known that the periodic performance of spread spectrum sequence heavily affects the correlative and secure characteristics of communication systems. The chaotic binary sequence is paid more and more attention since it is one kind of applicable spread spectrum sequences. However, there are unavoidable short cyclic problems for chaotic binary sequences in finite precision. The chaotic binary sequence generating methods are studied first. Then the short cyclic behavior of the chaotic sequences is analyzed in detail, which are generated by quantification approaches with finite word-length. At the same time, a chaotic similar function is defined for presenting the cyclic characteristics of the sequences. Based on these efforts, an improved method with scrambling control for generating chaotic binary sequences is proposed. To quantitatively describe the improvement of periodic performance of the sequences, an orthogonal estimator is also defined. Some simulating results are provided. From the theoretical deduction and the experimental results, it is concluded that the proposed method can effectively increase the period and raise the complexity of the chaotic sequences to some extent. 展开更多
关键词 chaotic binary sequence finite precision periodic performance orthogonal estimator
下载PDF
Hybrid chaotic sequence for QS-CDMA system with RAKE receiver 被引量:1
10
作者 饶妮妮 许晓晶 李少谦 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2004年第3期278-282,共5页
A class of the hybrid chaotic sequences is presented. The generator of the sequences is given and realized by the digital method. The hybrid chaotic sequences exhibit good random properties that are very important for... A class of the hybrid chaotic sequences is presented. The generator of the sequences is given and realized by the digital method. The hybrid chaotic sequences exhibit good random properties that are very important for the performance of QS-CDMA system with RAKE receiver. The performance of the system is analyzed when the hybrid chaotic sequences are used as spreading codes in a QS-CDMA system with RAKE receiver and compared with those obtained for m-se-quences and logistic sequences. The results show that the hybrid chaotic sequences are a class of very promising spreading codes for QS-CDMA system. 展开更多
关键词 hybrid chaotic sequence QS-CDMA RAKE receiver BEP.
下载PDF
Multi-scale regionalization based mining of spatio-temporal teleconnection patterns between anomalous sea and land climate events
11
作者 徐枫 石岩 +3 位作者 邓敏 龚健雅 刘启亮 金瑞 《Journal of Central South University》 SCIE EI CAS CSCD 2017年第10期2438-2448,共11页
Climate sequences can be applied to defining sensitive climate zones, and then the mining of spatio-temporal teleconnection patterns is useful for learning from the past and preparing for the future. However, scale-de... Climate sequences can be applied to defining sensitive climate zones, and then the mining of spatio-temporal teleconnection patterns is useful for learning from the past and preparing for the future. However, scale-dependency in this kind of pattern is still not well handled by existing work. Therefore, in this study, the multi-scale regionalization is embedded into the spatio-temporal teleconnection pattern mining between anomalous sea and land climatic events. A modified scale-space clustering algorithm is first developed to group climate sequences into multi-scale climate zones. Then, scale variance analysis method is employed to identify climate zones at characteristic scales, indicating the main characteristics of geographical phenomena. Finally, by using the climate zones identified at characteristic scales, a time association rule mining algorithm based on sliding time windows is employed to discover spatio-temporal teleconnection patterns. Experiments on sea surface temperature, sea level pressure, land precipitation and land temperature datasets show that many patterns obtained by the multi-scale approach are coincident with prior knowledge, indicating that this method is effective and reasonable. In addition, some unknown teleconnection patterns discovered from the multi-scale approach can be further used to guide the prediction of land climate. 展开更多
关键词 CLIMATE sequences ANOMALOUS climatic EVENTS spatio-temporal teleconnection patterns MULTI-SCALE REGIONALIZATION
下载PDF
Analysis of quaternary digital chaotic sequence performance based on chaotic matrix
12
作者 李佩泽 Zhao Bing Li Wenquan 《High Technology Letters》 EI CAS 2021年第1期103-109,共7页
With good randomness and high sensitivity to initial values,chaotic sequences have been extensively used in secure communication.Real chaotic sequences are highly sensitive to initial values.It is an analog quantity i... With good randomness and high sensitivity to initial values,chaotic sequences have been extensively used in secure communication.Real chaotic sequences are highly sensitive to initial values.It is an analog quantity in the domain of attraction,which is not conducive to the transmission of digital signals.In order to improve the stability,real chaotic sequences can be quantized into digital chaotic sequences.According to the relationship between the information rate and the symbol rate,the symbol rate of binary sequence is the same as the information rate.The information rate can be doubled by quantizing a real-valued sequence into a quaternary sequence.The chaotic sequence has weak periodicity.Moreover,the periodicity of binary digital chaotic sequences is much weaker than that of quaternary chaotic sequences.Compared with the multi-dimensional chaotic map,the one-dimensional chaotic map has small key space and low security.In this paper,a new real-valued chaotic sequence is generated based on the chaotic matrix method constructed by Logistic map and Kent map.Two quantization methods are used to digitize the real-valued chaotic sequence to obtain the quaternary digital chaotic sequence.Moreover,the randomness,the time series complexity and the correlation of the new quaternary chaotic sequence are compared and studied.The simulation results demonstrate that the quaternary digital chaotic sequence obtained by the chaotic matrix has good randomness and correlation. 展开更多
关键词 chaotic matrix digital chaotic sequence RANDOMNESS
下载PDF
Design of Digital Hybrid Chaotic Sequence Generator
13
作者 饶妮妮 曾东 《Journal of Electronic Science and Technology of China》 2004年第1期14-16,75,共4页
The feasibility of the hybrid chaotic sequences as the spreading codes in code divided multiple access(CDMA) system is analyzed. The design and realization of the digital hybrid chaotic sequence generator by very high... The feasibility of the hybrid chaotic sequences as the spreading codes in code divided multiple access(CDMA) system is analyzed. The design and realization of the digital hybrid chaotic sequence generator by very high speed integrated circuit hardware description language(VHDL) are described. A valid hazard canceledl method is presented. Computer simulations show that the stable digital sequence waveforms can be produced. The correlations of the digital hybrid chaotic sequences are compared with those of m-sequences. The results show that the correlations of the digital hybrid chaotic sequences are almost as good as those of m-sequences. The works in this paper explored a road for the practical applications of chaos. 展开更多
关键词 digital hybrid chaotic sequence GENERATOR VHDL code divided multiple access(CDMA)
下载PDF
Video Transmission Secrecy Improvement Based on Fractional Order Hyper Chaotic System
14
作者 S.Kayalvizhi S.Malarvizhi 《Computer Systems Science & Engineering》 SCIE EI 2023年第7期1201-1214,共14页
In the Digital World scenario,the confidentiality of information in video transmission plays an important role.Chaotic systems have been shown to be effective for video signal encryption.To improve video transmission ... In the Digital World scenario,the confidentiality of information in video transmission plays an important role.Chaotic systems have been shown to be effective for video signal encryption.To improve video transmission secrecy,compressive encryption method is proposed to accomplish compression and encryption based on fractional order hyper chaotic system that incorporates Compressive Sensing(CS),pixel level,bit level scrambling and nucleotide Sequences operations.The measurement matrix generates by the fractional order hyper chaotic system strengthens the efficiency of the encryption process.To avoid plain text attack,the CS measurement is scrambled to its pixel level,bit level scrambling decreases the similarity between the adjacent measurements and the nucleotide sequence operations are done on the scrambled bits,increasing the encryption.Two stages are comprised in the reconstruction technique,the first stage uses the intra-frame similarity and offers robust preliminary retrieval for each frame,and the second stage iteratively improves the efficiency of reconstruction by integrating inter frame Multi Hypothesis(MH)estimation and weighted residual sparsity modeling.In each iteration,the residual coefficient weights are modified using a mathematical approach based on the MH predictions,and the Split Bregman iteration algorithm is defined to resolve weighted l1 regularization.Experimental findings show that the proposed algorithm provides good compression of video coupled with an efficient encryption method that is resistant to multiple attacks. 展开更多
关键词 Fractional order hyper chaotic system compressive sensing pixel level scrambling bit level scrambling nucleotide sequences
下载PDF
混沌密码理论研究与应用新进展
15
作者 赵耿 马英杰 董有恒 《信息网络安全》 CSCD 北大核心 2024年第2期203-216,共14页
混沌密码研究主要包括混沌序列密码、混沌分组密码和混沌公钥密码。混沌序列密码具有软硬件实现简单、加解密处理速度快、没有或只有有限的错误传播等特点。混沌序列密码的设计方面研究成果极为丰硕,但其安全性分析一般停留在统计性验... 混沌密码研究主要包括混沌序列密码、混沌分组密码和混沌公钥密码。混沌序列密码具有软硬件实现简单、加解密处理速度快、没有或只有有限的错误传播等特点。混沌序列密码的设计方面研究成果极为丰硕,但其安全性分析一般停留在统计性验证分析阶段,而对可证明安全性或其他有条件安全性的证明和分析很少,因此证明混沌序列密码的安全性已成为该领域亟需填补的空白。混沌分组密码的研究颇为成熟,但其整体结构一般受限于Feistel结构、SPN结构、Lai-Massey结构及其变形结构。因此,构建突破传统结构的创新性密码架构成为混沌分组密码亟待解决的关键问题之一。混沌公钥密码的研究相对薄弱,利用混沌系统特有的密码特性和公钥密码系统相结合的混沌公钥密码算法不仅具有理论研究意义,而且具有实际应用价值。混沌系统也被广泛应用于通信传输、语音加密、图像加密和扩频通信等保密通信领域。电、光混沌系统实现简便,其计算复杂性不会随着密钥空间的增大而明显增大,能够为无线通信、物理层链路安全、应用层数据安全等不同场景提供安全保护。 展开更多
关键词 保密通信 混沌系统 混沌序列密码 混沌分组密码 混沌公钥密码
下载PDF
动作时序优化振动信号混沌吸引子特征的断路器操动状态辨识方法
16
作者 刘会兰 常庚垚 +3 位作者 赵书涛 裘实 黄伟杰 刘教民 《高电压技术》 EI CAS CSCD 北大核心 2024年第6期2635-2644,共10页
高压断路器分合闸操作过程包括掣子脱扣、弹簧释能、动静触头碰撞等动作,机械振动信号作为能量传递的表现,蕴含着丰富的运行状态信息。该文基于断路器关键动作节点的时序,提出一种动作时序优化振动信号混沌吸引子特征的断路器操动状态... 高压断路器分合闸操作过程包括掣子脱扣、弹簧释能、动静触头碰撞等动作,机械振动信号作为能量传递的表现,蕴含着丰富的运行状态信息。该文基于断路器关键动作节点的时序,提出一种动作时序优化振动信号混沌吸引子特征的断路器操动状态辨识方法。首先,由高速相机捕捉断路器操动过程主轴拐臂运动图像,利用目标跟踪算法获取动触头关键运动节点时序指标;然后,依据时序指标划分操动过程,通过对不同阶段的振动信号相空间重构,提取相空间吸引子几何和属性特征;最后,利用智能分类算法进行故障辨识,实验结果验证该方法在大幅节省时间开销的同时,有效提高了分类辨识的准确率达96.9%。该文方法在断路器状态监测和带电测试中具有广阔应用前景。 展开更多
关键词 高压断路器 动作时序 吸引子特征 混沌分析 振动信号
下载PDF
基于三维超混沌映射的图像加密及其FPGA实现
17
作者 黄丽莲 叶优欣 +3 位作者 马衍昊 李创 项建弘 窦铮 《实验技术与管理》 CAS 北大核心 2024年第4期15-24,共10页
随着信息技术的不断发展,确保信息安全已成为重要问题,而图像作为被广泛使用的多媒体工具,时常面临着泄露的风险,针对该问题提出一种基于三维超混沌映射的图像加密算法。该算法首先构造一个离散三维超混沌系统,此系统相较于传统的混沌... 随着信息技术的不断发展,确保信息安全已成为重要问题,而图像作为被广泛使用的多媒体工具,时常面临着泄露的风险,针对该问题提出一种基于三维超混沌映射的图像加密算法。该算法首先构造一个离散三维超混沌系统,此系统相较于传统的混沌系统拥有更好的混沌特性,所生成的序列具有更强的随机性。然后在此序列的基础上对图片进行置乱和扩散:在置乱阶段,通过混沌序列对原始图片的像素点进行索引排序,实现像素置乱;在扩散阶段,使用处理后的混沌序列对置乱图像的像素值进行分层异或,实现像素扩散。软件仿真和性能分析表明,该算法具有较高的安全性和较强的抗干扰能力,最后通过FPGA硬件平台完成图像加密。整个算法包括软件仿真和硬件实现两个部分,能够有效提升学生将理论和实践相结合的能力,增强学生对非线性理论的理解。 展开更多
关键词 超混沌映射 混沌序列 图像加密 FPGA实现
下载PDF
基于长度可变密钥的光学图像加密方法
18
作者 杨晓云 石峰 《激光杂志》 CAS 北大核心 2024年第2期107-112,共6页
为提升光学图像加密效果,设计了一种基于长度可变密钥的光学图像加密方法。基于混沌方程构成混沌序列均匀化普适算法,运用该算法生成均匀化伪随机序列,以此作为长度可变密钥,经空间光调制器调制后,转换此类密钥为伪随机相位掩模(PRPM),... 为提升光学图像加密效果,设计了一种基于长度可变密钥的光学图像加密方法。基于混沌方程构成混沌序列均匀化普适算法,运用该算法生成均匀化伪随机序列,以此作为长度可变密钥,经空间光调制器调制后,转换此类密钥为伪随机相位掩模(PRPM),运用两个转换后PRPM双重随机相位编码初始光学图像,并结合变形分数傅里叶变换(AFrFT),相位转换编码后光学图像,获得加密光学图像,完成光学图像加密。实验结果显示,该方法可针对不同光学图像生成敏感性与唯一性密钥,实现不同光学图像的加密处理,加密效果显著,加密光学图像的像素频数分布均匀,且解密后光学图像与初始光学图像几乎一致,整体加解密效果理想,可有效保障光学图像的安全性,而且本方法可以在最短3 s的时间内完成光学图像的加密和解密,加解密效率更高,综合效果更佳。 展开更多
关键词 长度可变密钥 光学图像加密 混沌序列 相位掩模 随机相位编码 傅里叶变换
下载PDF
基于混沌序列的电子档案上传加密方法
19
作者 许德斌 《吉首大学学报(自然科学版)》 CAS 2024年第1期19-23,29,共6页
为了提升数据的存储效率和电子档案的传输安全性,设计了一种基于混沌序列的电子档案上传加密方法(混沌序列方法).以形式化方案分解电子档案上传步骤,在交互过程中统一定义上传形式.采用Logistic映射关系表示混沌模式;给定混沌序列变化区... 为了提升数据的存储效率和电子档案的传输安全性,设计了一种基于混沌序列的电子档案上传加密方法(混沌序列方法).以形式化方案分解电子档案上传步骤,在交互过程中统一定义上传形式.采用Logistic映射关系表示混沌模式;给定混沌序列变化区间,随机生成档案加密密钥流;在保证电子档案可完整解密的前提下,设定密文置换规则,设置置换流程,根据可逆关系调整密文顺序,完成电子档案的加密上传.在光纤网络配置基础上模拟电子档案上传全过程,实验结果表明,混沌序列方法能够在10 s内生成128 bit加密密钥,且在规定时间内完成498组1.5 GB内存大小的电子档案传输. 展开更多
关键词 密文置换 电子档案 混沌序列 LOGISTIC映射
下载PDF
基于混沌序列和AES算法的数据库外层数据传输同步加密方法
20
作者 陈琳 《黑龙江工程学院学报》 CAS 2024年第4期38-43,共6页
为保障数据库外层数据的安全传输,提出一种基于混沌序列和AES算法的数据库外层数据传输同步加密方法。该方法结合AES算法的加密安全性和混沌序列的加密速度优势,通过加密代理服务器和应用服务器对数据库外层数据进行处理,利用混沌序列lo... 为保障数据库外层数据的安全传输,提出一种基于混沌序列和AES算法的数据库外层数据传输同步加密方法。该方法结合AES算法的加密安全性和混沌序列的加密速度优势,通过加密代理服务器和应用服务器对数据库外层数据进行处理,利用混沌序列logistic映射参数初始化、混沌序列二进制量化、AES动态加密和尾端处理实现数据库外层数据传输同步加密。实验结果表明,该方法能够成功地对文本和图像数据进行加密和隐藏,同时提高加密效率,并兼顾了数据的安全性和传输效率。 展开更多
关键词 混沌序列 AES算法 数据库 数据传输 数据加密 外层数据
下载PDF
上一页 1 2 53 下一页 到第
使用帮助 返回顶部