期刊文献+
共找到312篇文章
< 1 2 16 >
每页显示 20 50 100
Two-dimensional-lag complex logistic map with complex parameters and its encryption application
1
作者 张芳芳 武金波 +3 位作者 寇磊 马凤英 吴黎明 张雪 《Chinese Physics B》 SCIE EI CAS CSCD 2024年第5期324-335,共12页
With the rapid development of internet technology,security protection of information has become more and more prominent,especially information encryption.Considering the great advantages of chaotic encryption,we propo... With the rapid development of internet technology,security protection of information has become more and more prominent,especially information encryption.Considering the great advantages of chaotic encryption,we propose a 2D-lag complex logistic map with complex parameters(2D-LCLMCP)and corresponding encryption schemes.Firstly,we present the model of the 2D-LCLMCP and analyze its chaotic properties and system stability through fixed points,Lyapunov exponent,bifurcation diagram,phase diagram,etc.Secondly,a block cipher algorithm based on the 2D-LCLMCP is proposed,the plaintext data is preprocessed using a pseudorandom sequence generated by the 2D-LCLMCP.Based on the generalized Feistel cipher structure,a round function F is constructed using dynamic S-box and DNA encoding rules as the core of the block cipher algorithm.The generalized Feistel cipher structure consists of two F functions,four XOR operations,and one permutation operation per round.The symmetric dynamic round keys that change with the plaintext are generated by the 2D-LCLMCP.Finally,experimental simulation and performance analysis tests are conducted.The results show that the block cipher algorithm has low complexit,good diffusion and a large key space.When the block length is 64 bits,only six rounds of encryption are required to provide sufficient security and robustness against cryptographic attacks. 展开更多
关键词 logistic map block ciphers chaotic system ENCRYPTION
下载PDF
A novel class of two-dimensional chaotic maps with infinitely many coexisting attractors 被引量:1
2
作者 Li-Ping Zhang Yang Liu +2 位作者 Zhou-ChaoWei Hai-Bo Jiang Qin-Sheng Bi 《Chinese Physics B》 SCIE EI CAS CSCD 2020年第6期109-114,共6页
We study a novel class of two-dimensional maps with infinitely many coexisting attractors.Firstly,the mathematical model of these maps is formulated by introducing a sinusoidal function.The existence and the stability... We study a novel class of two-dimensional maps with infinitely many coexisting attractors.Firstly,the mathematical model of these maps is formulated by introducing a sinusoidal function.The existence and the stability of the fixed points in the model are studied indicating that they are infinitely many and all unstable.In particular,a computer searching program is employed to explore the chaotic attractors in these maps,and a simple map is exemplified to show their complex dynamics.Interestingly,this map contains infinitely many coexisting attractors which has been rarely reported in the literature.Further studies on these coexisting attractors are carried out by investigating their time histories,phase trajectories,basins of attraction,Lyapunov exponents spectrum,and Lyapunov(Kaplan–Yorke)dimension.Bifurcation analysis reveals that the map has periodic and chaotic solutions,and more importantly,exhibits extreme multi-stability. 展开更多
关键词 two-dimensional map infinitely many coexisting attractors extreme multi-stability chaotic attractor
下载PDF
Image encryption technique based on new two-dimensional fractional-order discrete chaotic map and Menezes–Vanstone elliptic curve cryptosystem 被引量:1
3
作者 Zeyu Liu Tiecheng Xia Jinbo Wang 《Chinese Physics B》 SCIE EI CAS CSCD 2018年第3期161-176,共16页
We propose a new fractional two-dimensional triangle function combination discrete chaotic map(2D-TFCDM)with the discrete fractional difference.Moreover,the chaos behaviors of the proposed map are observed and the bif... We propose a new fractional two-dimensional triangle function combination discrete chaotic map(2D-TFCDM)with the discrete fractional difference.Moreover,the chaos behaviors of the proposed map are observed and the bifurcation diagrams,the largest Lyapunov exponent plot,and the phase portraits are derived,respectively.Finally,with the secret keys generated by Menezes-Vanstone elliptic curve cryptosystem,we apply the discrete fractional map into color image encryption.After that,the image encryption algorithm is analyzed in four aspects and the result indicates that the proposed algorithm is more superior than the other algorithms. 展开更多
关键词 CHAOS fractional two-dimensional triangle function combination discrete chaotic map image encryption Menezes-Vanstone elliptic curve cryptosystem
下载PDF
Asymmetric image encryption algorithm based on a new three-dimensional improved logistic chaotic map 被引量:1
4
作者 叶国栋 吴惠山 +1 位作者 黄小玲 Syh-Yuan Tan 《Chinese Physics B》 SCIE EI CAS CSCD 2023年第3期153-163,共11页
Based on some analyses of existing chaotic image encryption frameworks and a new designed three-dimensional improved logistic chaotic map(3D-ILM),an asymmetric image encryption algorithm using public-key Rivest–Shami... Based on some analyses of existing chaotic image encryption frameworks and a new designed three-dimensional improved logistic chaotic map(3D-ILM),an asymmetric image encryption algorithm using public-key Rivest–Shamir–Adleman(RSA)is presented in this paper.In the first stage,a new 3D-ILM is proposed to enhance the chaotic behavior considering analysis of time sequence,Lyapunov exponent,and Shannon entropy.In the second stage,combined with the public key RSA algorithm,a new key acquisition mathematical model(MKA)is constructed to obtain the initial keys for the 3D-ILM.Consequently,the key stream can be produced depending on the plain image for a higher security.Moreover,a novel process model(NPM)for the input of the 3D-ILM is built,which is built to improve the distribution uniformity of the chaotic sequence.In the third stage,to encrypt the plain image,a pre-process by exclusive OR(XOR)operation with a random matrix is applied.Then,the pre-processed image is performed by a permutation for rows,a downward modulo function for adjacent pixels,a permutation for columns,a forward direction XOR addition-modulo diffusion,and a backward direction XOR addition-modulo diffusion to achieve the final cipher image.Moreover,experiments show that the the proposed algorithm has a better performance.Especially,the number of pixels change rate(NPCR)is close to ideal case 99.6094%,with the unified average changing intensity(UACI)close to 33.4634%,and the information entropy(IE)close to 8. 展开更多
关键词 three-dimensional improved logistic chaotic map(3D-ILM) Rivest–Shamir–Adleman(RSA)algorithm image encryption CONFUSION ENTROPY
下载PDF
A Novel Triangular Chaotic Map (TCM) with Full Intensive Chaotic Population Based on Logistic Map
5
作者 Mahmoud Maqableh 《Journal of Software Engineering and Applications》 2015年第12期635-659,共25页
Chaos theory attempts to explain the result of a system that is sensitive to initial conditions, complex, and shows an unpredictable behaviour. Chaotic systems are sensitive to any change or changes in the initial con... Chaos theory attempts to explain the result of a system that is sensitive to initial conditions, complex, and shows an unpredictable behaviour. Chaotic systems are sensitive to any change or changes in the initial condition(s) and are unpredictable in the long term. Chaos theory are implementing today in many different fields of studies. In this research, we propose a new one-dimensional Triangular Chaotic Map (TCM) with full intensive chaotic population. TCM chaotic map is a one-way function that prevents the finding of a relationship between the successive output values and increases the randomness of output results. The tests and analysis results of the proposed triangular chaotic map show a great sensitivity to initial conditions, have unpredictability, are uniformly distributed and random-like and have an infinite range of intensive chaotic population with large positive Lyapunov exponent values. Moreover, TCM characteristics are very promising for possible utilization in many different study fields. 展开更多
关键词 Chaos chaotic maps TRIANGULAR chaotic map logistic map LYAPUNOV EXPONENT
下载PDF
改进型Logistic-Map混沌序列分析 被引量:6
6
作者 魏金成 魏巍 《电子设计工程》 2011年第4期20-23,共4页
为了进一步提高Logistic-Map混沌序列的互相关性与自相关性,提出了一种改进型的Logistic-Map混沌序列的构造方法。通过Matlab仿真出扩频通信系统,并对改进型Logistic-Map混沌序列的相关性特性进行了分析,并与传统的Logistic-Map混沌序... 为了进一步提高Logistic-Map混沌序列的互相关性与自相关性,提出了一种改进型的Logistic-Map混沌序列的构造方法。通过Matlab仿真出扩频通信系统,并对改进型Logistic-Map混沌序列的相关性特性进行了分析,并与传统的Logistic-Map混沌序列做了比较。仿真结果表明,改进型Logistic-Map混沌序列与白噪声的统计特性一致,并且该混沌序列具有更为理想的互相关和自相关特性,更加适合作为扩频通信地址码。 展开更多
关键词 混沌序列 logisticmap 改进型的logisticmap MATLAB仿真
下载PDF
基于Logistic-Map的数字混沌调制方法 被引量:1
7
作者 唐秋玲 覃团发 林硒 《重庆邮电学院学报(自然科学版)》 2001年第3期14-16,45,共4页
离散混沌动力系统Logistic-Map产生的混沌离散序列具有良好的统计特性和对初值非常敏感的特性,利用这些特性,提出一种基于Logistic-Map数字混沌调制方法并构造相应的保密通信系统,且进行了计算机仿真。在此... 离散混沌动力系统Logistic-Map产生的混沌离散序列具有良好的统计特性和对初值非常敏感的特性,利用这些特性,提出一种基于Logistic-Map数字混沌调制方法并构造相应的保密通信系统,且进行了计算机仿真。在此基础上提出了调制系数宽范围变化的数字混沌调制方法。 展开更多
关键词 logistic-map 混沌序列 数字混沌调制 固定判决函数
下载PDF
并行组合扩频通信中Logistic-Map序列的优选研究 被引量:3
8
作者 杨斌 郭黎利 +1 位作者 李北明 付江志 《舰船电子工程》 2006年第6期130-133,155,共5页
直接序列扩频通信通常选择m序列和gold码作为地址码,但对于并行组合扩频系统其地址码数量少。在分析并行组合扩频系统基础上,研究Logistic-Map混沌扩频序列优选准则。Logistic-Map混沌扩频序列应用在并行组合扩频系统中,仿真结果表明,Lo... 直接序列扩频通信通常选择m序列和gold码作为地址码,但对于并行组合扩频系统其地址码数量少。在分析并行组合扩频系统基础上,研究Logistic-Map混沌扩频序列优选准则。Logistic-Map混沌扩频序列应用在并行组合扩频系统中,仿真结果表明,Logistic-Map混沌扩频序列可以提供数量众多的适于并行组合扩频通信系统的扩频序列族。 展开更多
关键词 并行组合扩频通信 logisticmap 混沌扩频序列
下载PDF
Logistic混沌映射最低数字位5的特性研究
9
作者 吕志皓 宋大全 +2 位作者 薛博文 王佳音 刘嘉辉 《牡丹江师范学院学报(自然科学版)》 2024年第1期9-13,共5页
Logistic混沌映射在真实轨道中迭代真值在最低数字位是5的时候,迭代真值高数字位部分表现出随机特性,迭代真值低数字位表现出线性递增的公共数字位.实验分析显示,在绝对精度条件下,混沌真实轨道保持随机性和公共部分稳定的结构特征,在... Logistic混沌映射在真实轨道中迭代真值在最低数字位是5的时候,迭代真值高数字位部分表现出随机特性,迭代真值低数字位表现出线性递增的公共数字位.实验分析显示,在绝对精度条件下,混沌真实轨道保持随机性和公共部分稳定的结构特征,在有限精度条件下,迭代值随机性受计算精度影响很大,公共部分只能通过低位迭代法获取. 展开更多
关键词 logistic 混沌映射 数字位 真实轨道
下载PDF
属性Logistic混沌映射下的物联网隐私数据安全共享 被引量:2
10
作者 黄杨杨 《现代电子技术》 北大核心 2024年第13期97-101,共5页
为加强物联网隐私数据保护,提高用户信任度与满意度,提出属性Logistic混沌映射下的物联网隐私数据安全共享。构建基于主从式结构的三层物联网隐私数据安全共享模型并设计数据访问机制,在此基础上,基于量子细胞神经网络和Logistic映射得... 为加强物联网隐私数据保护,提高用户信任度与满意度,提出属性Logistic混沌映射下的物联网隐私数据安全共享。构建基于主从式结构的三层物联网隐私数据安全共享模型并设计数据访问机制,在此基础上,基于量子细胞神经网络和Logistic映射得到矩阵A,对其分解后,得到矩阵B和序列C,由B矩阵构造混沌序列池,对C序列元素作映射处理,生成索引序列,并确定Logistic映射初始值,再对索引作Logistic映射后,从混沌序列池检索出CP-ABE加密算法的公钥、主密钥后,利用其与用户属性集合生成用户私钥,基于数据访问结构实现物联网隐私数据的加密。实验结果表明,该方法生成的密钥能够通过随机性验证,实现物联网隐私数据加密,且操作数量少,加密强度高。 展开更多
关键词 logistic 混沌映射 物联网 隐私数据 主从式 访问机制 量子细胞神经网络 CP-ABE 用户属性
下载PDF
Modified Logistic Maps for Cryptographic Application 被引量:6
11
作者 Shahram Etemadi Borujeni Mohammad Saeed Ehsani 《Applied Mathematics》 2015年第5期773-782,共10页
In this paper, definition and properties of logistic map along with orbit and bifurcation diagrams, Lyapunov exponent, and its histogram are considered. In order to expand chaotic region of Logistic map and make it su... In this paper, definition and properties of logistic map along with orbit and bifurcation diagrams, Lyapunov exponent, and its histogram are considered. In order to expand chaotic region of Logistic map and make it suitable for cryptography, two modified versions of Logistic map are proposed. In the First Modification of Logistic map (FML), vertical symmetry and transformation to the right are used. In the Second Modification of Logistic (SML) map, vertical and horizontal symmetry and transformation to the right are used. Sensitivity of FML to initial condition is less and sensitivity of SML map to initial condition is more than the others. The total chaotic range of SML is more than others. Histograms of Logistic map and SML map are identical. Chaotic range of SML map is fivefold of chaotic range of Logistic map. This property gave more key space for cryptographic purposes. 展开更多
关键词 chaotic map MODIFIED logistic map FML map SML map
下载PDF
Logistic-Map混沌序列的单片机实现 被引量:3
12
作者 李伟 禹思敏 《信息化纵横》 2009年第15期31-33,37,共4页
混沌序列的产生是混沌理论应用于保密通信领域的一个重要问题。通过对Logistic映射进行变换处理,利用整数运算代替小数运算,使程序便于在MCS-51系列单片机平台上运行,由此产生Logistic-Map混沌序列。
关键词 混沌序列 logistic-map 单片机
下载PDF
Hybrid Image Compression-Encryption Scheme Based on Multilayer Stacked Autoencoder and Logistic Map 被引量:1
13
作者 Neetu Gupta Ritu Vijay 《China Communications》 SCIE CSCD 2022年第1期238-252,共15页
Secure transmission of images over a communication channel, with limited data transfer capacity, possesses compression and encryption schemes. A deep learning based hybrid image compression-encryption scheme is propos... Secure transmission of images over a communication channel, with limited data transfer capacity, possesses compression and encryption schemes. A deep learning based hybrid image compression-encryption scheme is proposed by combining stacked auto-encoder with the logistic map. The proposed structure of stacked autoencoder has seven multiple layers, and back propagation algorithm is intended to extend vector portrayal of information into lower vector space. The randomly generated key is used to set initial conditions and control parameters of logistic map. Subsequently, compressed image is encrypted by substituting and scrambling of pixel sequences using key stream sequences generated from logistic map.The proposed algorithms are experimentally tested over five standard grayscale images. Compression and encryption efficiency of proposed algorithms are evaluated and analyzed based on peak signal to noise ratio(PSNR), mean square error(MSE), structural similarity index metrics(SSIM) and statistical,differential, entropy analysis respectively. Simulation results show that proposed algorithms provide high quality reconstructed images with excellent levels of security during transmission.. 展开更多
关键词 compression-encryption stacked autoencoder chaotic system back propagation algorithm logistic map
下载PDF
A class of two-dimensional rational maps with self-excited and hidden attractors
14
作者 Li-Ping Zhang Yang Liu +2 位作者 Zhou-Chao Wei Hai-Bo Jiang Qin-Sheng Bi 《Chinese Physics B》 SCIE EI CAS CSCD 2022年第3期224-233,共10页
This paper studies a new class of two-dimensional rational maps exhibiting self-excited and hidden attractors. The mathematical model of these maps is firstly formulated by introducing a rational term. The analysis of... This paper studies a new class of two-dimensional rational maps exhibiting self-excited and hidden attractors. The mathematical model of these maps is firstly formulated by introducing a rational term. The analysis of existence and stability of the fixed points in these maps suggests that there are four types of fixed points, i.e., no fixed point, one single fixed point, two fixed points and a line of fixed points. To investigate the complex dynamics of these rational maps with different types of fixed points, numerical analysis tools, such as time histories, phase portraits, basins of attraction, Lyapunov exponent spectrum, Lyapunov(Kaplan–Yorke) dimension and bifurcation diagrams, are employed. Our extensive numerical simulations identify both self-excited and hidden attractors, which were rarely reported in the literature. Therefore, the multi-stability of these maps, especially the hidden one, is further explored in the present work. 展开更多
关键词 two-dimensional rational map hidden attractors multi-stability a line of fixed points chaotic attractor
下载PDF
Logistic混沌映射性能分析与改进 被引量:75
15
作者 陈志刚 梁涤青 +1 位作者 邓小鸿 张颖 《电子与信息学报》 EI CSCD 北大核心 2016年第6期1547-1551,共5页
混沌系统是基于混沌的数据加密领域的一个重要研究对象,Logistic混沌映射是最简单和有效的混沌系统,被广泛应用在大多数混沌加密算法中,Logistic映射的安全性成为研究的热点。针对Logistic序列存在的吸引子与空白区问题,该文提出一种基... 混沌系统是基于混沌的数据加密领域的一个重要研究对象,Logistic混沌映射是最简单和有效的混沌系统,被广泛应用在大多数混沌加密算法中,Logistic映射的安全性成为研究的热点。针对Logistic序列存在的吸引子与空白区问题,该文提出一种基于初始值和分形控制参数之间关系的Logistic映射改进方法。利用两者之间关系对映射自变量区间进行合理分段,扩大了混沌控制参数区域,将满射范围扩大到整个控制参数区间,使产生的序列分布更均匀,解决了"稳定窗"与空白区等问题。通过将改进Logistic与其它分段Logistic映射进行仿真对比,实验结果表明改进后的映射产生的序列混沌特性得到显著加强,分布更均匀,具有更好的随机性能测试指标。另外,改进Logistic映射计算复杂度低,实现简单,在扩频通信与混沌密码等领域有广阔的应用前景。 展开更多
关键词 数据加密 logistic映射 混沌序列 安全性
下载PDF
改进分段Logistic混沌映射的方法及其性能分析 被引量:13
16
作者 蔡丹 季晓勇 +1 位作者 史贺 潘家民 《南京大学学报(自然科学版)》 CAS CSCD 北大核心 2016年第5期809-815,共7页
Logistic混沌映射和Tent映射是两种广泛应用于通信安全领域的混沌映射,Tent映射具有分段特性,由此联想到将Logistic混沌映射推广为分段映射.提出一种三分段相切的Logistic混沌序列的方法,不仅规避了Tent映射需施加随机扰动的过程,并改善... Logistic混沌映射和Tent映射是两种广泛应用于通信安全领域的混沌映射,Tent映射具有分段特性,由此联想到将Logistic混沌映射推广为分段映射.提出一种三分段相切的Logistic混沌序列的方法,不仅规避了Tent映射需施加随机扰动的过程,并改善了Logistic混沌映射的随机性能,增加了系统的复杂度和抗攻击能力.实验证明在相同的区间上,三分段相切的Logistic混沌映射更早地进入混沌状态,且在3.57≤μ≤4时运动轨迹愈发地不稳定,Lyapunov指数为逐渐增大的正数,更复杂的非线性方程提高了系统的安全性.在相同的分叉判定阈值下,三分段相切Logistic混沌映射进入混沌状态时需要的迭代次数明显减小.因此,三分段相切的Logistic混沌序列具有更加良好的随机性和不可预测性.经过研究表明,该三分段相切的Logistic混沌映射具有良好的初值敏感性,广泛地适用于信息安全领域. 展开更多
关键词 混沌 分段logistic混沌映射 TENT映射 随机性
下载PDF
基于Logistic映射的加密算法的安全性分析与改进 被引量:15
17
作者 谢建全 谢勍 +1 位作者 阳春华 黄大足 《小型微型计算机系统》 CSCD 北大核心 2010年第6期1073-1076,共4页
分析Logistic混沌映射所产生的序列用于加密时存在的安全问题,针对这些安全问题提出相应的改进算法.算法通过增大分支参数的值解决Logistic混沌映射所存在的"稳定窗"、空白窗口和序列分布不均匀等问题,通过取模运算解决产生... 分析Logistic混沌映射所产生的序列用于加密时存在的安全问题,针对这些安全问题提出相应的改进算法.算法通过增大分支参数的值解决Logistic混沌映射所存在的"稳定窗"、空白窗口和序列分布不均匀等问题,通过取模运算解决产生的序列超界的问题,突破了分支控制参数不能大于4的限制.实验表明,改进算法所产生序列的伪随机性好,计算复杂度低,同时密钥空间有大幅度提高,非常适合于多媒体等数据的加密. 展开更多
关键词 混沌序列 logistic映射 安全性 伪随机性 数据加密
下载PDF
Logistic映射数字混沌产生器 被引量:13
18
作者 赵耿 郑德玲 董冀媛 《北京科技大学学报》 EI CAS CSCD 北大核心 2001年第2期173-176,共4页
对用于保密通信系统的连续流混沌产生器的原理及可实现性进行分析.在对Logistic映射的区间特性分析的基础上,首次研究并实现了一种Logistic映射数字混沌产生器.实验结果表明,输出混沌信号与logistic映射的... 对用于保密通信系统的连续流混沌产生器的原理及可实现性进行分析.在对Logistic映射的区间特性分析的基础上,首次研究并实现了一种Logistic映射数字混沌产生器.实验结果表明,输出混沌信号与logistic映射的分析结果一致,这说明了数字混沌产生器的有效性. 展开更多
关键词 logistic映射 连续流混沌 数字混沌 混沌产生器 混沌保密通信 混沌遮掩 混沌调制
下载PDF
基于Logistic映射的图像保密通信 被引量:7
19
作者 彭军 刘勇国 +3 位作者 李学明 张伟 廖晓峰 吴中福 《重庆大学学报(自然科学版)》 EI CAS CSCD 北大核心 2003年第1期18-21,共4页
将Logistic映射产生的混沌序列作为载波 ,利用序列具有的良好相关特性 ,提出了一种图像保密通信方案。计算机仿真结果表明 ,只要收发双方使用相同的初值条件 ,即使在有一定噪声的情况下也能正确地进行图像传输 ,而初值的微小差异将导致... 将Logistic映射产生的混沌序列作为载波 ,利用序列具有的良好相关特性 ,提出了一种图像保密通信方案。计算机仿真结果表明 ,只要收发双方使用相同的初值条件 ,即使在有一定噪声的情况下也能正确地进行图像传输 ,而初值的微小差异将导致通信失败 ,表明混沌序列用于保密通信具有很高的安全性能 ,同时方案具有很强的抗干扰能力。对图像恢复质量进行了评估 。 展开更多
关键词 logistic映射 混沌序列 统计相关 图像保密通信 计算机仿真
下载PDF
改进型Logistic混沌映射及其在图像加密与隐藏中的应用 被引量:17
20
作者 刘公致 吴琼 +1 位作者 王光义 靳培培 《电子与信息学报》 EI CSCD 北大核心 2022年第10期3602-3609,共8页
鉴于原Logistic映射的映射范围有限、混沌参数范围小、分布不均匀等缺陷,该文提出一个新的改进型Logistic混沌映射。该映射有μ和α两个参数,x_(n-1)和_(n-1)两个初值,参数和初值选取范围可扩展到任意实数,其混沌映射均为满映射,且映射... 鉴于原Logistic映射的映射范围有限、混沌参数范围小、分布不均匀等缺陷,该文提出一个新的改进型Logistic混沌映射。该映射有μ和α两个参数,x_(n-1)和_(n-1)两个初值,参数和初值选取范围可扩展到任意实数,其混沌映射均为满映射,且映射范围可任意调控。将该映射应用到图像加密,其算法采用像素值异或(XOR)加密、像素位置置乱处理。之后再把密文数据隐藏在与密文无关的载图之中。对密文图像做了一系列的分析,包括图像的相邻像素点相关性,直方图分析和密钥敏感性测试。分析结果表明,所提加密算法具有很好的安全性和加密效果。 展开更多
关键词 logistic混沌映射 图像加密 图像隐藏
下载PDF
上一页 1 2 16 下一页 到第
使用帮助 返回顶部