WorldWideScience

Sample records for chaotic encryption system

  1. Encryption in Chaotic Systems with Sinusoidal Excitations

    Directory of Open Access Journals (Sweden)

    G. Obregón-Pulido

    2014-01-01

    Full Text Available In this contribution an encryption method using a chaotic oscillator, excited by “n” sinusoidal signals, is presented. The chaotic oscillator is excited by a sum of “n” sinusoidal signals and a message. The objective is to encrypt such a message using the chaotic behavior and transmit it, and, as the chaotic system is perturbed by the sinusoidal signal, the transmission security could be increased due to the effect of such a perturbation. The procedure is based on the regulation theory and consider that the receiver knows the frequencies of the perturbing signal, with this considerations the algorithm estimates the excitation in such a way that the receiver can cancel out the perturbation and all the undesirable dynamics in order to produce only the message. In this way we consider that the security level is increased.

  2. Implementation of a new chaotic encryption system and synchronization

    Institute of Scientific and Technical Information of China (English)

    Long Min; Peng Fei; Qiu Shuisheng; Chen Yanfeng

    2006-01-01

    A new kind of secure communication system which combines the chaotic encryption means with the conventional encryption method is discussed. With the analysis results and the experiment data, the anti-attack ability of this communication system is significantly improved compared to that of the either method. At the same time, a new method of chaotic synchronization is proposed. With a small mixed discrete chaotic signal, it is quickly to synchronize the communication and a good security performance is ensured.

  3. Security analysis and modification of a chaotic encryption system

    Institute of Scientific and Technical Information of China (English)

    崔光亮; 冯正进; 胡国杰

    2004-01-01

    A type of digital chaotic encryption system was proposed in Ref. [1] which uses a class of 1-D piecewise linear (PWL) map to realize chaotic encryption and decryption system through the inverse system approach. In the general with the input terminal. In this paper we show that this cryptosystem can not frustrate chosen-cipher text attack. A type of chaotic encryption system based on self-synchronizing stream cipher is proposed. This system can avoid chosen-cipher text attack and has higher security.

  4. Digital Image Encryption Scheme Based on Multiple Chaotic Systems

    Science.gov (United States)

    Abd El-Latif, Ahmed A.; Li, Li; Zhang, Tiejun; Wang, Ning; Song, Xianhua; Niu, Xiamu

    2012-06-01

    Image encryption is a challenging task due to the significant level of sophistication achieved by forgerers and other cybercriminals. Advanced encryption methods for secure transmission, storage, and retrieval of digital images are increasingly needed for a number of military, medical, homeland security, and other applications. In this paper, we introduce a new digital image encryption algorithm. The new algorithm employs multiple chaotic systems and cryptographic primitive operations within the encryption process, which are efficiently implemented on modern processors, and adopts round keys for encryption using a chaotic map. Experiments conducted show that the proposed algorithm possesses robust security features such as fairly uniform distribution, high sensitivity to both keys and plainimages, almost ideal entropy, and the ability to highly de-correlate adjacent pixels in the cipherimages. Furthermore, it has a large key space, which greatly increases its security for image encryption applications.

  5. Video Encryption Based on Chaotic Systems in the Compression Domain

    Directory of Open Access Journals (Sweden)

    Ali Abdulgader

    2012-01-01

    Full Text Available With the development of the internet and multimedia technology digital video encryption has attracted a great deal of research interest in the recent few years in applications. In this paper, we propose a method to encrypt video data. The proposed algorithm is based on the MPEG video coding standard. It selectively encrypts some DCT coefficients in the I frame, B frame and P frame in MPEG video compression by using chaotic systems. The key in this paper is chaotic sequence based on logistic mapping. It can produce the pseudo-random sequences with good randomness. The experimental results based on chaotic maps prove the effectiveness of the proposed method, showing advantages of large key space and high-level security. The proposed algorithm was measured through a series of tests and achieved good results. The results indicate that the algorithm can be implemented for video encryption efficiently and it provides considerable levels of security.

  6. System for Information Encryption Implementing Several Chaotic Orbits

    Directory of Open Access Journals (Sweden)

    Jiménez-Rodríguez Maricela

    2015-07-01

    Full Text Available This article proposes a symmetric encryption algorithm that takes, as input value, the original information of length L, that when encoded, generates the ciphertext of greater length LM. A chaotic discrete system (logistic map is implemented to generate 3 different orbits: the first is used for applying a diffusion technique in order to mix the original data, the second orbit is combined with the mixed information and increases the length of L to LM, and with the third orbit, the confusion technique is implemented. The encryption algorithm was applied to encode an image which is then totally recovered by the keys used to encrypt and his respective, decrypt algorithm. The algorithm can encode any information, just dividing into 8 bits, it can cover the requirements for high level security, it uses 7 keys to encrypt and provides good encryption speed

  7. Image encryption using high-dimension chaotic system

    Institute of Scientific and Technical Information of China (English)

    Sun Fu-Yan; Liu Shu-Tang; Lü Zong-Wang

    2007-01-01

    In recent years, the chaos based cryptographic algorithms have suggested some new and efficient ways to develop secure image encryption techniques. This paper proposes a new approach for image encryption based on a highdimensional chaotic map. The new scheme employs the Cat map to shuffle the positions, then to confuse the relationship between the cipher-image and the plain-image using the high-dimensional Lorenz chaotic map preprocessed. The results of experimental, statistical analysis and key space analysis show that the proposed image encryption scheme provides an efficient and secure way for real-time image encryption and transmission.

  8. An Audio Data Encryption with Single and Double Dimension Discrete-Time Chaotic Systems

    OpenAIRE

    AKGÜL, Akif; KAÇAR, Sezgin; Pehlivan, İhsan

    2015-01-01

    — In this article, a study on increasing security of audio data encryption with single and double dimension discrete-time chaotic systems was carried out and application and security analyses were executed. Audio data samples of both mono and stereo types were encrypted. In the application here, single and double dimension discrete-time chaotic systems were used. In order to enhance security during encryption, a different method was applied by also using a non-linear function. In the chaos ba...

  9. A bit-level image encryption algorithm based on spatiotemporal chaotic system and self-adaptive

    Science.gov (United States)

    Teng, Lin; Wang, Xingyuan

    2012-09-01

    This paper proposes a bit-level image encryption algorithm based on spatiotemporal chaotic system which is self-adaptive. We use a bit-level encryption scheme to reduce the volume of data during encryption and decryption in order to reduce the execution time. We also use the adaptive encryption scheme to make the ciphered image dependent on the plain image to improve performance. Simulation results show that the performance and security of the proposed encryption algorithm can encrypt plaintext effectively and resist various typical attacks.

  10. Image compression-encryption scheme based on hyper-chaotic system and 2D compressive sensing

    Science.gov (United States)

    Zhou, Nanrun; Pan, Shumin; Cheng, Shan; Zhou, Zhihong

    2016-08-01

    Most image encryption algorithms based on low-dimensional chaos systems bear security risks and suffer encryption data expansion when adopting nonlinear transformation directly. To overcome these weaknesses and reduce the possible transmission burden, an efficient image compression-encryption scheme based on hyper-chaotic system and 2D compressive sensing is proposed. The original image is measured by the measurement matrices in two directions to achieve compression and encryption simultaneously, and then the resulting image is re-encrypted by the cycle shift operation controlled by a hyper-chaotic system. Cycle shift operation can change the values of the pixels efficiently. The proposed cryptosystem decreases the volume of data to be transmitted and simplifies the keys distribution simultaneously as a nonlinear encryption system. Simulation results verify the validity and the reliability of the proposed algorithm with acceptable compression and security performance.

  11. Quantum Color Image Encryption Algorithm Based on A Hyper-Chaotic System and Quantum Fourier Transform

    Science.gov (United States)

    Tan, Ru-Chao; Lei, Tong; Zhao, Qing-Min; Gong, Li-Hua; Zhou, Zhi-Hong

    2016-12-01

    To improve the slow processing speed of the classical image encryption algorithms and enhance the security of the private color images, a new quantum color image encryption algorithm based on a hyper-chaotic system is proposed, in which the sequences generated by the Chen's hyper-chaotic system are scrambled and diffused with three components of the original color image. Sequentially, the quantum Fourier transform is exploited to fulfill the encryption. Numerical simulations show that the presented quantum color image encryption algorithm possesses large key space to resist illegal attacks, sensitive dependence on initial keys, uniform distribution of gray values for the encrypted image and weak correlation between two adjacent pixels in the cipher-image.

  12. A new color image encryption scheme using CML and a fractional-order chaotic system.

    Directory of Open Access Journals (Sweden)

    Xiangjun Wu

    Full Text Available The chaos-based image cryptosystems have been widely investigated in recent years to provide real-time encryption and transmission. In this paper, a novel color image encryption algorithm by using coupled-map lattices (CML and a fractional-order chaotic system is proposed to enhance the security and robustness of the encryption algorithms with a permutation-diffusion structure. To make the encryption procedure more confusing and complex, an image division-shuffling process is put forward, where the plain-image is first divided into four sub-images, and then the position of the pixels in the whole image is shuffled. In order to generate initial conditions and parameters of two chaotic systems, a 280-bit long external secret key is employed. The key space analysis, various statistical analysis, information entropy analysis, differential analysis and key sensitivity analysis are introduced to test the security of the new image encryption algorithm. The cryptosystem speed is analyzed and tested as well. Experimental results confirm that, in comparison to other image encryption schemes, the new algorithm has higher security and is fast for practical image encryption. Moreover, an extensive tolerance analysis of some common image processing operations such as noise adding, cropping, JPEG compression, rotation, brightening and darkening, has been performed on the proposed image encryption technique. Corresponding results reveal that the proposed image encryption method has good robustness against some image processing operations and geometric attacks.

  13. Encrypting three-dimensional information system based on integral imaging and multiple chaotic maps

    Science.gov (United States)

    Xing, Yan; Wang, Qiong-Hua; Xiong, Zhao-Long; Deng, Huan

    2016-02-01

    An encrypting three-dimensional (3-D) information system based on integral imaging (II) and multiple chaotic maps is proposed. In the encrypting process, the elemental image array (EIA) which represents spatial and angular information of the real 3-D scene is picked up by a microlens array. Subsequently, R, G, and B color components decomposed by the EIA are encrypted using multiple chaotic maps. Finally, these three encrypted components are interwoven to obtain the cipher information. The decryption process implements the reverse operation of the encryption process for retrieving the high-quality 3-D images. Since the encrypted EIA has the data redundancy property due to II, and all parameters of the pickup part are the secret keys of the encrypting system, the system sensitivity on the changes of the plaintext and secret keys can be significantly improved. Moreover, the algorithm based on multiple chaotic maps can effectively enhance the security. A preliminary experiment is carried out, and the experimental results verify the effectiveness, robustness, and security of the proposed system.

  14. Security Analysis of a Block Encryption Algorithm Based on Dynamic Sequences of Multiple Chaotic Systems

    Institute of Scientific and Technical Information of China (English)

    DU Mao-Kang; HE Bo; WANG Yong

    2011-01-01

    Recently, the cryptosystem based on chaos has attracted much attention. Wang and Yu (Commun. Nonlin. Sci. Numer. Simulat. 14(2009)574) proposed a block encryption algorithm based on dynamic sequences of multiple chaotic systems. We analyze the potential Saws in the algorithm. Then, a chosen-plaintext attack is presented. Some remedial measures are suggested to avoid the flaws effectively. Furthermore, an improved encryption algorithm is proposed to resist the attacks and to keep all the merits of the original cryptosystem.

  15. Cryptanalysis of the public key encryption based on multiple chaotic systems

    Energy Technology Data Exchange (ETDEWEB)

    Zhang Linhua [College of Mathematics and Computer, Chongqing Normal University, Chongqing, 400047 (China)], E-mail: Linzhang@cqu.edu.cn

    2008-08-15

    Recently, Ranjan proposed a novel public key encryption technique based on multiple chaotic systems [Phys Lett 2005;95]. Unfortunately, Wang soon gave a successful attack on its special case based on Parseval's theorem [Wang K, Pei W, Zhou L, et al. Security of public key encryption technique based on multiple chaotic system. Phys Lett A, in press]. In this letter, we give an improved example which can avoid the attack and point out that Wang cannot find the essential drawback of the technique. However, further experimental result shows Ruanjan's encryption technique is inefficient, and detailed theoretic analysis shows that the complexity to break the cryptosystem is overestimated.

  16. High security chaotic multiple access scheme for visible light communication systems with advanced encryption standard interleaving

    Science.gov (United States)

    Qiu, Junchao; Zhang, Lin; Li, Diyang; Liu, Xingcheng

    2016-06-01

    Chaotic sequences can be applied to realize multiple user access and improve the system security for a visible light communication (VLC) system. However, since the map patterns of chaotic sequences are usually well known, eavesdroppers can possibly derive the key parameters of chaotic sequences and subsequently retrieve the information. We design an advanced encryption standard (AES) interleaving aided multiple user access scheme to enhance the security of a chaotic code division multiple access-based visible light communication (C-CDMA-VLC) system. We propose to spread the information with chaotic sequences, and then the spread information is interleaved by an AES algorithm and transmitted over VLC channels. Since the computation complexity of performing inverse operations to deinterleave the information is high, the eavesdroppers in a high speed VLC system cannot retrieve the information in real time; thus, the system security will be enhanced. Moreover, we build a mathematical model for the AES-aided VLC system and derive the theoretical information leakage to analyze the system security. The simulations are performed over VLC channels, and the results demonstrate the effectiveness and high security of our presented AES interleaving aided chaotic CDMA-VLC system.

  17. A Systematic Methodology for Multi-Images Encryption and Decryption Based on Single Chaotic System and FPGA Embedded Implementation

    Directory of Open Access Journals (Sweden)

    Hanzhong Zheng

    2014-01-01

    Full Text Available A systematic methodology is developed for multi-images encryption and decryption and field programmable gate array (FPGA embedded implementation by using single discrete time chaotic system. To overcome the traditional limitations that a chaotic system can only encrypt or decrypt one image, this paper initiates a new approach to design n-dimensional (n-D discrete time chaotic controlled systems via some variables anticontrol, which can achieve multipath drive-response synchronization. To that end, the designed n-dimensional discrete time chaotic controlled systems are used for multi-images encryption and decryption. A generalized design principle and the corresponding implementation steps are also given. Based on the FPGA embedded hardware system working platform with XUP Virtex-II type, a chaotic secure communication system for three digital color images encryption and decryption by using a 7D discrete time chaotic system is designed, and the related system design and hardware implementation results are demonstrated, with the related mathematical problems analyzed.

  18. Security of public key encryption technique based on multiple chaotic systems

    Energy Technology Data Exchange (ETDEWEB)

    Wang Kai [Department of Radio Engineering, Southeast University, Nanjing 210096 (China)]. E-mail: kaiwang@seu.edu.cn; Pei Wenjiang [Department of Radio Engineering, Southeast University, Nanjing 210096 (China); Zou Liuhua [Department of Radio Engineering, Southeast University, Nanjing 210096 (China); Cheung Yiuming [Department of Computer Science, Hong Kong Baptist University, Hong Kong (China); He Zhenya [Department of Radio Engineering, Southeast University, Nanjing 210096 (China)

    2006-12-25

    Recently, a new public key encryption technique based on multiple chaotic systems has been proposed [B. Ranjan, Phys. Rev. Lett. 95 (2005) 098702]. This scheme employs m-chaotic systems and a set of linear functions for key exchange over an insecure channel. Security of the proposed algorithm grows as (NP){sup m}, where N, P are the size of the key and the computational complexity of the linear functions respectively. In this Letter, the fundamental weakness of the cryptosystem is pointed out and a successful attack is described. Given the public keys and the initial vector, one can calculate the secret key based on Parseval's theorem. Both theoretical and experimental results show that the attacker can access to the secret key without difficulty. The lack of security discourages the use of such algorithm for practical applications.

  19. Control of Chaotic Regimes in Encryption Algorithm Based on Dynamic Chaos

    OpenAIRE

    Sidorenko, V.; Mulyarchik, K. S.

    2013-01-01

    Chaotic regime of a dynamic system is a necessary condition determining cryptographic security of an encryption algorithm. A chaotic dynamic regime control method is proposed which uses parameters of nonlinear dynamics regime for an analysis of encrypted data.

  20. Digital image encryption with chaotic map lattices

    Institute of Scientific and Technical Information of China (English)

    Sun Fu-Yan; Lü Zong-Wang

    2011-01-01

    This paper proposes a secure approach for encryption and decryption of digital images with chaotic map lattices.In the proposed encryption process, eight different types of operations are used to encrypt the pixels of an image and one of them will be used for particular pixels decided by the outcome of the chaotic map lattices. To make the cipher more robust against any attacks, the secret key is modified after encrypting each block of sixteen pixels of the image.The experimental results and security analysis show that the proposed image encryption scheme achieves high security and efficiency.

  1. Chaotic Image Encryption with Random Shuffling of Data

    Directory of Open Access Journals (Sweden)

    Murat Aydos

    2014-02-01

    Full Text Available Security of valuable multimedia contents such as images in personal photograph albums, electronic publishing, frames of multicast video conference can be achieved by image encryption. Secure transmission of these contents is required to be rapid, efficient and practical. Hence, image encryption process must be chosen not only to satisfy the security goals but also to fulfill these requirements. Due to the inadequacy and inefficiency of conventional text based information encryption methods, researchers have proposed several encryption schemes. Many of them are based on chaotic algorithms. Recently, the studies are concentrated on some weaknesses of chaotic algorithms and most of the presented solutions came up with complex structured chaotic maps. In this paper, we present a self-diagonal shuffler mechanism embedded to one dimensional chaotic encryption system to overcome its leak points while keeping simplicity and efficiency properties.

  2. A New Loss-Tolerant Image Encryption Scheme Based on Secret Sharing and Two Chaotic Systems

    Directory of Open Access Journals (Sweden)

    Li Li

    2012-04-01

    Full Text Available In this study, we propose an efficient loss-tolerant image encryption scheme that protects both confidentiality and loss-tolerance simultaneously in shadow images. In this scheme, we generate the key sequence based on two chaotic maps and then encrypt the image during the sharing phase based on Shamir’s method. Experimental results show a better performance of the proposed scheme for different images than other methods from human vision. Security analysis confirms a high probability to resist both brute-force and collusion attacks.

  3. Chaotic Encryption Method Based on Life-Like Cellular Automata

    CERN Document Server

    Machicao, Marina Jeaneth; Bruno, Odemir M

    2011-01-01

    We propose a chaotic encryption method based on Cellular Automata(CA), specifically on the family called the "Life-Like" type. Thus, the encryption process lying on the pseudo-random numbers generated (PRNG) by each CA's evolution, which transforms the password as the initial conditions to encrypt messages. Moreover, is explored the dynamical behavior of CA to reach a "good" quality as PRNG based on measures to quantify "how chaotic a dynamical system is", through the combination of the entropy, Lyapunov exponent, and Hamming distance. Finally, we present the detailed security analysis based on experimental tests: DIEHARD and ENT suites, as well as Fouriers Power Spectrum, used as a security criteria.

  4. Color image encryption based on hybrid hyper-chaotic system and cellular automata

    Science.gov (United States)

    Yaghouti Niyat, Abolfazl; Moattar, Mohammad Hossein; Niazi Torshiz, Masood

    2017-03-01

    This paper proposes an image encryption scheme based on Cellular Automata (CA). CA is a self-organizing structure with a set of cells in which each cell is updated by certain rules that are dependent on a limited number of neighboring cells. The major disadvantages of cellular automata in cryptography include limited number of reversal rules and inability to produce long sequences of states by these rules. In this paper, a non-uniform cellular automata framework is proposed to solve this problem. This proposed scheme consists of confusion and diffusion steps. In confusion step, the positions of the original image pixels are replaced by chaos mapping. Key image is created using non-uniform cellular automata and then the hyper-chaotic mapping is used to select random numbers from the image key for encryption. The main contribution of the paper is the application of hyper chaotic functions and non-uniform CA for robust key image generation. Security analysis and experimental results show that the proposed method has a very large key space and is resistive against noise and attacks. The correlation between adjacent pixels in the encrypted image is reduced and the amount of entropy is equal to 7.9991 which is very close to 8 which is ideal.

  5. Chaotic Image Encryption Design Using Tompkins-Paige Algorithm

    Directory of Open Access Journals (Sweden)

    Shahram Etemadi Borujeni

    2009-01-01

    Full Text Available In this paper, we have presented a new permutation-substitution image encryption architecture using chaotic maps and Tompkins-Paige algorithm. The proposed encryption system includes two major parts, chaotic pixels permutation and chaotic pixels substitution. A logistic map is used to generate a bit sequence, which is used to generate pseudorandom numbers in Tompkins-Paige algorithm, in 2D permutation phase. Pixel substitution phase includes two process, the tent pseudorandom image (TPRI generator and modulo addition operation. All parts of the proposed chaotic encryption system are simulated. Uniformity of the histogram of the proposed encrypted image is justified using the chi-square test, which is less than 2(255, 0.05. The vertical, horizontal, and diagonal correlation coefficients, as well as their average and RMS values for the proposed encrypted image are calculated that is about 13% less than previous researches. To quantify the difference between the encrypted image and the corresponding plain-image, three measures are used. These are MAE, NPCR, and UACI, which are improved in our proposed system considerably. NPCR of our proposed system is exactly the ideal value of this criterion. The key space of our proposed method is large enough to protect the system against any Brute-force and statistical attacks.

  6. Color image encryption based on Coupled Nonlinear Chaotic Map

    Energy Technology Data Exchange (ETDEWEB)

    Mazloom, Sahar [Faculty of Electrical, Computer and IT Engineering, Qazvin Islamic Azad University, Qazvin (Iran, Islamic Republic of)], E-mail: sahar.mazloom@gmail.com; Eftekhari-Moghadam, Amir Masud [Faculty of Electrical, Computer and IT Engineering, Qazvin Islamic Azad University, Qazvin (Iran, Islamic Republic of)], E-mail: eftekhari@qazviniau.ac.ir

    2009-11-15

    Image encryption is somehow different from text encryption due to some inherent features of image such as bulk data capacity and high correlation among pixels, which are generally difficult to handle by conventional methods. The desirable cryptographic properties of the chaotic maps such as sensitivity to initial conditions and random-like behavior have attracted the attention of cryptographers to develop new encryption algorithms. Therefore, recent researches of image encryption algorithms have been increasingly based on chaotic systems, though the drawbacks of small key space and weak security in one-dimensional chaotic cryptosystems are obvious. This paper proposes a Coupled Nonlinear Chaotic Map, called CNCM, and a novel chaos-based image encryption algorithm to encrypt color images by using CNCM. The chaotic cryptography technique which used in this paper is a symmetric key cryptography with a stream cipher structure. In order to increase the security of the proposed algorithm, 240 bit-long secret key is used to generate the initial conditions and parameters of the chaotic map by making some algebraic transformations to the key. These transformations as well as the nonlinearity and coupling structure of the CNCM have enhanced the cryptosystem security. For getting higher security and higher complexity, the current paper employs the image size and color components to cryptosystem, thereby significantly increasing the resistance to known/chosen-plaintext attacks. The results of several experimental, statistical analysis and key sensitivity tests show that the proposed image encryption scheme provides an efficient and secure way for real-time image encryption and transmission.

  7. Improving security of a chaotic encryption approach

    OpenAIRE

    Li, SJ; Mou, XQ; Cai, YL

    2001-01-01

    E. Alvarez et al. presented a new chaotic encryption approach recently. But soon G. Alvarez et al. broke it with four cryptanalytic methods and found some other weaknesses. In this Letter we point out why the original scheme is so vulnerable to the proposed four attacks. The chief reasons are two essential defects existing in the original scheme. Based on such a fact, we present an improved encryption scheme to obtain higher security. The cryptographic properties of the improved scheme are st...

  8. Optical noise-free image encryption based on quick response code and high dimension chaotic system in gyrator transform domain

    Science.gov (United States)

    Sui, Liansheng; Xu, Minjie; Tian, Ailing

    2017-04-01

    A novel optical image encryption scheme is proposed based on quick response code and high dimension chaotic system, where only the intensity distribution of encoded information is recorded as ciphertext. Initially, the quick response code is engendered from the plain image and placed in the input plane of the double random phase encoding architecture. Then, the code is encrypted to the ciphertext with noise-like distribution by using two cascaded gyrator transforms. In the process of encryption, the parameters such as rotation angles and random phase masks are generated as interim variables and functions based on Chen system. A new phase retrieval algorithm is designed to reconstruct the initial quick response code in the process of decryption, in which a priori information such as three position detection patterns is used as the support constraint. The original image can be obtained without any energy loss by scanning the decrypted code with mobile devices. The ciphertext image is the real-valued function which is more convenient for storing and transmitting. Meanwhile, the security of the proposed scheme is enhanced greatly due to high sensitivity of initial values of Chen system. Extensive cryptanalysis and simulation have performed to demonstrate the feasibility and effectiveness of the proposed scheme.

  9. Chaotic Image Encryption of Regions of Interest

    Science.gov (United States)

    Xiao, Di; Fu, Qingqing; Xiang, Tao; Zhang, Yushu

    Since different regions of an image have different importance, therefore only the important information of the image regions, which the users are really interested in, needs to be encrypted and protected emphatically in some special multimedia applications. However, the regions of interest (ROI) are always some irregular parts, such as the face and the eyes. Assuming the bulk data in transmission without being damaged, we propose a chaotic image encryption algorithm for ROI. ROI with irregular shapes are chosen and detected arbitrarily. Then the chaos-based image encryption algorithm with scrambling, S-box and diffusion parts is used to encrypt the ROI. Further, the whole image is compressed with Huffman coding. At last, a message authentication code (MAC) of the compressed image is generated based on chaotic maps. The simulation results show that the encryption algorithm has a good security level and can resist various attacks. Moreover, the compression method improves the storage and transmission efficiency to some extent, and the MAC ensures the integrity of the transmission data.

  10. 基于与Tent Map拓扑共轭系统的混沌流加密方案设计%Chaotic stream encryption scheme based on topological conjugate chaotic systems of Tent map

    Institute of Scientific and Technical Information of China (English)

    田清; 徐正光; 田立

    2015-01-01

    利用与Tent Map拓扑共轭的两类混沌系统,以及产生独立均匀分布密钥流的方法,设计了一种通用的流加密方案。此方案类似数字信封,但传递过程中不传输具体加密使用的密钥流,只传输随机产生的Tent Map初值以及两个系统的参数值作为系统密钥,产生两列独立同分布的密钥流对原始图像进行两次密文反馈异或加密。该方案达到初始值掩盖的目的,增加了截获者破译的难度。图像加密的实验结果显示该方案安全且有效。%A general chaotic stream encryption scheme is proposed by using two chaotic systems which topologically conjugate with Tent map and a method to generate independent and identically distributed chaotic streams. The stream encryption scheme is similar to the digital envelop, but the difference is that we only transport the initial values of Tent map and the parameters of the two chaotic sys-tems as the initial key. According to the conjugate relation, the initial values of the chaotic systems are obtained to achieve the purpose of masking these initial values. We calculate two independent and identically distributed chaotic key streams based on the two chaotic systems to encrypt the plaintext through twice feedback XOR. An application result of image cryptograph illustrates that the stream en-cryption scheme is effective and secure.

  11. A novel chaotic encryption scheme based on arithmetic coding

    Energy Technology Data Exchange (ETDEWEB)

    Mi Bo [Department of Computer Science and Engineering, Chongqing University, Chongqing 400044 (China)], E-mail: mi_bo@163.com; Liao Xiaofeng; Chen Yong [Department of Computer Science and Engineering, Chongqing University, Chongqing 400044 (China)

    2008-12-15

    In this paper, under the combination of arithmetic coding and logistic map, a novel chaotic encryption scheme is presented. The plaintexts are encrypted and compressed by using an arithmetic coder whose mapping intervals are changed irregularly according to a keystream derived from chaotic map and plaintext. Performance and security of the scheme are also studied experimentally and theoretically in detail.

  12. Stego Optical Encryption Based on Chaotic Baker's Map Transformation

    Science.gov (United States)

    Hussain, Iqtadar; Gondal, Muhammad Asif

    2014-06-01

    In this article, an optical image encryption algorithm based on chaotic baker's map is presented. The stego-image is encrypted with the help of double random phase encoding algorithm and then produced disorder with the help of chaotic transformation. Security test shows that the reading of proposed algorithm is very close to the optimal values.

  13. An Improved Piecewise Linear Chaotic Map Based Image Encryption Algorithm

    Directory of Open Access Journals (Sweden)

    Yuping Hu

    2014-01-01

    Full Text Available An image encryption algorithm based on improved piecewise linear chaotic map (MPWLCM model was proposed. The algorithm uses the MPWLCM to permute and diffuse plain image simultaneously. Due to the sensitivity to initial key values, system parameters, and ergodicity in chaotic system, two pseudorandom sequences are designed and used in the processes of permutation and diffusion. The order of processing pixels is not in accordance with the index of pixels, but it is from beginning or end alternately. The cipher feedback was introduced in diffusion process. Test results and security analysis show that not only the scheme can achieve good encryption results but also its key space is large enough to resist against brute attack.

  14. Symmetric encryption algorithms using chaotic and non-chaotic generators: A review.

    Science.gov (United States)

    Radwan, Ahmed G; AbdElHaleem, Sherif H; Abd-El-Hafiz, Salwa K

    2016-03-01

    This paper summarizes the symmetric image encryption results of 27 different algorithms, which include substitution-only, permutation-only or both phases. The cores of these algorithms are based on several discrete chaotic maps (Arnold's cat map and a combination of three generalized maps), one continuous chaotic system (Lorenz) and two non-chaotic generators (fractals and chess-based algorithms). Each algorithm has been analyzed by the correlation coefficients between pixels (horizontal, vertical and diagonal), differential attack measures, Mean Square Error (MSE), entropy, sensitivity analyses and the 15 standard tests of the National Institute of Standards and Technology (NIST) SP-800-22 statistical suite. The analyzed algorithms include a set of new image encryption algorithms based on non-chaotic generators, either using substitution only (using fractals) and permutation only (chess-based) or both. Moreover, two different permutation scenarios are presented where the permutation-phase has or does not have a relationship with the input image through an ON/OFF switch. Different encryption-key lengths and complexities are provided from short to long key to persist brute-force attacks. In addition, sensitivities of those different techniques to a one bit change in the input parameters of the substitution key as well as the permutation key are assessed. Finally, a comparative discussion of this work versus many recent research with respect to the used generators, type of encryption, and analyses is presented to highlight the strengths and added contribution of this paper.

  15. Cascade Chaotic System With Applications.

    Science.gov (United States)

    Zhou, Yicong; Hua, Zhongyun; Pun, Chi-Man; Chen, C L Philip

    2015-09-01

    Chaotic maps are widely used in different applications. Motivated by the cascade structure in electronic circuits, this paper introduces a general chaotic framework called the cascade chaotic system (CCS). Using two 1-D chaotic maps as seed maps, CCS is able to generate a huge number of new chaotic maps. Examples and evaluations show the CCS's robustness. Compared with corresponding seed maps, newly generated chaotic maps are more unpredictable and have better chaotic performance, more parameters, and complex chaotic properties. To investigate applications of CCS, we introduce a pseudo-random number generator (PRNG) and a data encryption system using a chaotic map generated by CCS. Simulation and analysis demonstrate that the proposed PRNG has high quality of randomness and that the data encryption system is able to protect different types of data with a high-security level.

  16. A Wheel-Switch Selective Image Encryption Scheme Using Spatiotemporal Chaotic System

    Science.gov (United States)

    Wang, Xing-Yuan; Bao, Xue-Mei

    2014-02-01

    In this paper, we propose a novel selective image encryption scheme using a one-way coupled map lattice (CML) consisting of logistic maps and a selector constructed by two variants of a cyclic shift register (VCSR). The initial conditions and the coupling constant of CML in our scheme are influenced by all the contents of the plain image. Moreover, the selector is closely related to the nonencrypted part of the plain image. In addition, we select only a portion of image data to encrypt via a wheel-switch scheme governed by the selector. Users can select an appropriate proportion to encrypt the plain image for their different demands of security and efficiency. Experimental results and theoretical analysis show that the cryptosystem is effective and can resist various typical attacks.

  17. IMAGE ENCRYPTION TECHNIQUES USING CHAOTIC SCHEMES: A REVIEW

    Directory of Open Access Journals (Sweden)

    Monisha Sharma

    2010-06-01

    Full Text Available Cryptography is about communication in the presence of an adversary. It encompasses many problems like encryption, authentication, and key distribution to name a few. The field of modern cryptography providesa theoretical foundation based on which one can understand what exactly these problems are, how to evaluate protocols that purport to solve them and how to build protocols in whose security one can haveconfidence. Advanced digital technologies have made multimedia data widely available. Recently, multimedia applications become common in practice and thus security of multimedia data has become main concern.The basic issues pertaining to the problem of encryption has been discussed and also a survey on image encryption techniques based on chaotic schemes has been dealt in the present communication.The chaotic image encryption can be developed by using properties of chaos including deterministic dynamics, unpredictable behavior and non-linear transform. This concept leads to techniques that can simultaneously provide security functions and an overall visualcheck, which might be suitable in some applications. Digital images are widely used in various applications, that include military, legal and medical systems and these applications need to control access toimages and provide the means to verify integrity of images.

  18. Synchronized chaotic phase masks for encrypting and decrypting images

    Science.gov (United States)

    Rueda, Edgar; Vera, Carlos A.; Rodríguez, Boris; Torroba, Roberto

    2008-12-01

    This paper presents an alternative to secure exchange of encrypted information through public open channels. Chaotic encryption introduces a security improvement by an efficient masking of the message with a chaotic signal. Message extraction by an authorized end user is done using a synchronization procedure, thus allowing a continuous change of the encrypting and decrypting keys. And optical implementation with a 4f optical encrypting architecture is suggested. Digital simulations, including the effects of missing data, corrupted data and noise addition are shown. These results proof the consistency of the proposal, and demonstrate a practical way to operate with it.

  19. Image encryption using eight dimensional chaotic cat map

    Science.gov (United States)

    Ganesan, K.; Murali, K.

    2014-06-01

    In recent years, a large number of discrete chaotic cryptographic algorithms have been proposed. However, most of them encounter some problems such as lack of robustness and security. In this paper, we introduce a new image encryption algorithm based on eight-dimensional (nonlinear) chaotic cat map. Encryption of image is different from that of texts due to some intrinsic features of image such as bulk data capacity and high redundancy, which are generally difficult to handle by traditional methods. In traditional methods the key space is small and the security is weak. The proposed algorithm tries to address these problems and also tries to enhance the encryption speed. In this paper an eight dimensional chaotic cat map is used to encrypt the intensity values of pixels using lookup table method thereby significantly increasing the speed and security of encryption. The proposed algorithm is found to be resistive against chosen/known-plaintext attacks, statistical and differential attacks.

  20. Cryptanalyzing a chaotic encryption algorithm for highly autocorrelated data

    Science.gov (United States)

    Li, Ming; Liu, Shangwang; Niu, Liping; Liu, Hong

    2016-12-01

    Recently, a chaotic encryption algorithm for highly autocorrelated data was proposed. By adding chaotic diffusion to the former work, the information leakage of the encryption results especially for the images with lower gray scales was eliminated, and both higher-level security and fast encryption time were achieved. In this study, we analyze the security weakness of this scheme. By applying the ciphertext-only attack, the encrypted image can be restored into the substituted image except for the first block; and then, by using the chosen-plaintext attack, the S-boxes, the distribution map, and the block of chaotic map values, can all be revealed, and the encrypted image can be completely cracked. The improvement is also proposed. Experimental results verify our assertion.

  1. Digital Image Encryption Based On Multiple Chaotic Maps

    Directory of Open Access Journals (Sweden)

    Amir Houshang Arab Avval

    2016-01-01

    Full Text Available A novel and robust chaos-based digital image encryption is proposed. The present paper presents a cipher block image encryption using multiple chaotic maps to lead increased security. An image block is encrypted by the block-based permutation process and cipher block encryption process. In the proposed scheme, secret key includes nineteen control and initial conditions parameter of the four chaotic maps and the calculated key space is 2883. The effectiveness and security of the proposed encryption scheme has been performed using the histograms, correlation coefficients, information entropy, differential analysis, key space analysis, etc. It can be concluded that the proposed image encryption technique is a suitable choice for practical applications.

  2. Chaotic substitution for highly autocorrelated data in encryption algorithm

    Science.gov (United States)

    Anees, Amir; Siddiqui, Adil Masood; Ahmed, Fawad

    2014-09-01

    This paper addresses the major drawback of substitution-box in highly auto-correlated data and proposes a novel chaotic substitution technique for encryption algorithm to sort the problem. Simulation results reveal that the overall strength of the proposed technique for encryption is much stronger than most of the existing encryption techniques. Furthermore, few statistical security analyses have also been done to show the strength of anticipated algorithm.

  3. Image encryption using the two-dimensional logistic chaotic map

    Science.gov (United States)

    Wu, Yue; Yang, Gelan; Jin, Huixia; Noonan, Joseph P.

    2012-01-01

    Chaos maps and chaotic systems have been proved to be useful and effective for cryptography. In our study, the two-dimensional logistic map with complicated basin structures and attractors are first used for image encryption. The proposed method adopts the classic framework of the permutation-substitution network in cryptography and thus ensures both confusion and diffusion properties for a secure cipher. The proposed method is able to encrypt an intelligible image into a random-like one from the statistical point of view and the human visual system point of view. Extensive simulation results using test images from the USC-SIPI image database demonstrate the effectiveness and robustness of the proposed method. Security analysis results of using both the conventional and the most recent tests show that the encryption quality of the proposed method reaches or excels the current state-of-the-art methods. Similar encryption ideas can be applied to digital data in other formats (e.g., digital audio and video). We also publish the cipher MATLAB open-source-code under the web page https://sites.google.com/site/tuftsyuewu/source-code.

  4. Multiple channel secure communication using chaotic system encoding

    Energy Technology Data Exchange (ETDEWEB)

    Miller, S.L.

    1996-12-31

    fA new method to encrypt signals using chaotic systems has been developed that offers benefits over conventional chaotic encryption methods. The method simultaneously encodes multiple plaintext streams using a chaotic system; a key is required to extract the plaintext from the chaotic cipertext. A working prototype demonstrates feasibility of the method by simultaneously encoding and decoding multiple audio signals using electrical circuits.

  5. 基于五维混沌系统的图像加密研究%Five-dimensional chaotic system based image encryption algorithm

    Institute of Scientific and Technical Information of China (English)

    高亮; 朱博; 孙鸣; 朱建良

    2011-01-01

    随着计算机技术、信息技术和通讯技术等高科技技术在近年来的迅猛发展,信息加密越来越受到人们的重视,提出了基于五维混沌系统用来实现图像加密的方法,并利用迭代次数和方式作为密码,实现了图像加密和解密,为信息加密提供了一种新方法.%With computer technology, information technology and communications technology, high technology, rapid development in recent years, more and more people pay close attention to information encryption. This paper, based on five-dimensional chaotic system realizes image encryption method, and means of using the number of iterations as the password, to realize the image encryption and decryption,the information provides a new method of encryption.

  6. Security analysis of image encryption based on two-dimensional chaotic maps and improved algorithm

    Institute of Scientific and Technical Information of China (English)

    Feng HUANG; Yong FENG

    2009-01-01

    The article proposes a new algorithm to improve the security of image encryption based on two-dimensional chaotic maps.Chaotic maps are often used in encrypting images.However,the encryption has periodic-ity,no diffusion,and at the same time,the real keys space of encryption are fewer than the theoretical keys space,which consequently results in potential security problems.Thus,this article puts forward several ways to solve the problems including adding diffusion mechanism,changing the design of keys and developing a composite encryption system.It designs an algorithm for the version B of the discretized baker map,which is one of the most prevalent chaotic maps,based on which a new image encryption is proposed to avoid the above problems.The simulation results show that the new encryption algorithm is valid and the result can be applied to other two-dimensional chaotic maps,such as the cat map.

  7. An Optimized Multikeying Chaotic Encryption for Real Time Applications

    Directory of Open Access Journals (Sweden)

    R. Tamijetchelvy

    2013-12-01

    Full Text Available In recent years, the availability of wireless technologies has become prominent solution for next generation wireless networks (NGWN. Hence the demand for secure communication is an important research issue. Cryptography is recognized as the best method of data protection against active and passive attacks. Therefore a novel chaotic cryptographic scheme is proposed for real time communication. Chaos signals are random behaviour, continuous and sensitive dependence on initial conditions. However, it has been shown that most of these chaotic methods have a low level of security because of single keying concept. In this paper an optimized fast encryption scheme based on chaotic signal with multi key is justified for video frame. Simulation results show that the proposed chaotic encryption scheme outperforms the existing scheme in terms of considerable reduction in encryption and decryption time. The security of the proposed scheme is also analysed by various cryptanalysis attacks.

  8. A Parallel Encryption Algorithm Based on Piecewise Linear Chaotic Map

    Directory of Open Access Journals (Sweden)

    Xizhong Wang

    2013-01-01

    Full Text Available We introduce a parallel chaos-based encryption algorithm for taking advantage of multicore processors. The chaotic cryptosystem is generated by the piecewise linear chaotic map (PWLCM. The parallel algorithm is designed with a master/slave communication model with the Message Passing Interface (MPI. The algorithm is suitable not only for multicore processors but also for the single-processor architecture. The experimental results show that the chaos-based cryptosystem possesses good statistical properties. The parallel algorithm provides much better performance than the serial ones and would be useful to apply in encryption/decryption file with large size or multimedia.

  9. A novel chaotic encryption scheme based on pseudorandom bit padding

    CERN Document Server

    Sadra, Yaser; Fard, Zahra Arasteh

    2012-01-01

    Cryptography is always very important in data origin authentications, entity authentication, data integrity and confidentiality. In recent years, a variety of chaotic cryptographic schemes have been proposed. These schemes has typical structure which performed the permutation and the diffusion stages, alternatively. The random number generators are intransitive in cryptographic schemes and be used in the diffusion functions of the image encryption for diffused pixels of plain image. In this paper, we propose a chaotic encryption scheme based on pseudorandom bit padding that the bits be generated by a novel logistic pseudorandom image algorithm. To evaluate the security of the cipher image of this scheme, the key space analysis, the correlation of two adjacent pixels and differential attack were performed. This scheme tries to improve the problem of failure of encryption such as small key space and level of security.

  10. Joint compression and encryption using chaotically mutated Huffman trees

    Science.gov (United States)

    Hermassi, Houcemeddine; Rhouma, Rhouma; Belghith, Safya

    2010-10-01

    This paper introduces a new scheme for joint compression and encryption using the Huffman codec. A basic tree is first generated for a given message and then based on a keystream generated from a chaotic map and depending from the input message, the basic tree is mutated without changing the statistical model. Hence a symbol can be coded by more than one codeword having the same length. The security of the scheme is tested against the known plaintext attack and the brute force attack. Performance analysis including encryption/decryption speed, additional computational complexity and compression ratio are given.

  11. Secure transmission of static and dynamic images via chaotic encryption in acousto-optic hybrid feedback with profiled light beams

    Science.gov (United States)

    Chatterjee, Monish R.; Almehmadi, Fares S.

    2015-01-01

    Secure information encryption via acousto-optic (AO) chaos with profiled optical beams indicates substantially better performance in terms of system robustness. This paper examines encryption of static and time-varying (video) images onto AO chaotic carriers using Gaussian-profile beams with diffracted data numerically generated using transfer functions. The use of profiled beams leads to considerable improvement in the encrypted signal. While static image encryption exhibits parameter tolerances within about +/-10% for uniform optical beams, profiled beams reduce the tolerance to less than 1%, thereby vastly improving both the overall security of the transmitted information as well as the quality of the image retrieval.

  12. CONSTRUCTION OF THE ENCRYPTION MATRIX BASED ON CHEBYSHEV CHAOTIC NEURAL NETWORKS

    Institute of Scientific and Technical Information of China (English)

    Zou Ajin; Wu Wei; Li Renfa; Li Yongjiang

    2012-01-01

    The paper proposes a novel algorithm to get the encryption matrix.Firstly,a chaotic sequence generated by Chebyshev chaotic neural networks is converted into a series of low-order integer matrices from which available encryption matrices are selected.Then,a higher order encryption matrix relating real world application is constructed by means of tensor production method based on selected encryption matrices.The results show that the proposed algorithm can produce a "one-time pad cipher" encryption matrix with high security; and the encryption results have good chaos and autocorrelation with the natural frequency of the plaintext being hidden and homogenized.

  13. A fast image encryption algorithm based on chaotic map

    Science.gov (United States)

    Liu, Wenhao; Sun, Kehui; Zhu, Congxu

    2016-09-01

    Derived from Sine map and iterative chaotic map with infinite collapse (ICMIC), a new two-dimensional Sine ICMIC modulation map (2D-SIMM) is proposed based on a close-loop modulation coupling (CMC) model, and its chaotic performance is analyzed by means of phase diagram, Lyapunov exponent spectrum and complexity. It shows that this map has good ergodicity, hyperchaotic behavior, large maximum Lyapunov exponent and high complexity. Based on this map, a fast image encryption algorithm is proposed. In this algorithm, the confusion and diffusion processes are combined for one stage. Chaotic shift transform (CST) is proposed to efficiently change the image pixel positions, and the row and column substitutions are applied to scramble the pixel values simultaneously. The simulation and analysis results show that this algorithm has high security, low time complexity, and the abilities of resisting statistical analysis, differential, brute-force, known-plaintext and chosen-plaintext attacks.

  14. Cryptanalysis and improvement of a digital image encryption method with chaotic map lattices

    Institute of Scientific and Technical Information of China (English)

    Wang Xing-Yuan; Liu Lin-Tao

    2013-01-01

    A digital image encryption scheme using chaotic map lattices has been proposed recently.In this paper,two fatal flaws of the cryptosystem are pointed out.According to these two drawbacks,cryptanalysts could recover the plaintext by applying the chosen plaintext attack.Therefore,the proposed cryptosystem is not secure enough to be used in the image transmission system.Experimental results show the feasibility of the attack.As a result,we make some improvements to the encryption scheme,which can completely resist our chosen plaintext attack.

  15. A novel color image encryption scheme using alternate chaotic mapping structure

    Science.gov (United States)

    Wang, Xingyuan; Zhao, Yuanyuan; Zhang, Huili; Guo, Kang

    2016-07-01

    This paper proposes an color image encryption algorithm using alternate chaotic mapping structure. Initially, we use the R, G and B components to form a matrix. Then one-dimension logistic and two-dimension logistic mapping is used to generate a chaotic matrix, then iterate two chaotic mappings alternately to permute the matrix. For every iteration, XOR operation is adopted to encrypt plain-image matrix, then make further transformation to diffuse the matrix. At last, the encrypted color image is obtained from the confused matrix. Theoretical analysis and experimental results has proved the cryptosystem is secure and practical, and it is suitable for encrypting color images.

  16. An improved image encryption algorithm based on chaotic maps

    Institute of Scientific and Technical Information of China (English)

    Xu Shu-Jiang; Wang Ji-Zhi; Yang Su-Xiang

    2008-01-01

    Recently,two chaotic image encryption schemes have been proposed,in which shuffling the positions and changing the grey values of image pixels are combined.This paper provides the chosen plaintext attack to recover the corresponding plaintext of a given ciphertext.Furthermore,it points out that the two schemes are not sufficiently sensitive to small changes of the plaintext.Based on the given analysis,it proposes an improved algorithm which includes two rounds of substitution and one round of permutation to strengthen the overall performance.

  17. A novel chaotic block image encryption algorithm based on dynamic random growth technique

    Science.gov (United States)

    Wang, Xingyuan; Liu, Lintao; Zhang, Yingqian

    2015-03-01

    This paper proposes a new block image encryption scheme based on hybrid chaotic maps and dynamic random growth technique. Since cat map is periodic and can be easily cracked by chosen plaintext attack, we use cat map in another securer way, which can completely eliminate the cyclical phenomenon and resist chosen plaintext attack. In the diffusion process, an intermediate parameter is calculated according to the image block. The intermediate parameter is used as the initial parameter of chaotic map to generate random data stream. In this way, the generated key streams are dependent on the plaintext image, which can resist the chosen plaintext attack. The experiment results prove that the proposed encryption algorithm is secure enough to be used in image transmission systems.

  18. Texture Analysis of Chaotic Coupled Map Lattices Based Image Encryption Algorithm

    Science.gov (United States)

    Khan, Majid; Shah, Tariq; Batool, Syeda Iram

    2014-09-01

    As of late, data security is key in different enclosures like web correspondence, media frameworks, therapeutic imaging, telemedicine and military correspondence. In any case, a large portion of them confronted with a few issues, for example, the absence of heartiness and security. In this letter, in the wake of exploring the fundamental purposes of the chaotic trigonometric maps and the coupled map lattices, we have presented the algorithm of chaos-based image encryption based on coupled map lattices. The proposed mechanism diminishes intermittent impact of the ergodic dynamical systems in the chaos-based image encryption. To assess the security of the encoded image of this scheme, the association of two nearby pixels and composition peculiarities were performed. This algorithm tries to minimize the problems arises in image encryption.

  19. Secure Image Encryption Based On a Chua Chaotic Noise Generator

    Directory of Open Access Journals (Sweden)

    A. S. Andreatos

    2013-10-01

    Full Text Available This paper presents a secure image cryptography telecom system based on a Chua's circuit chaotic noise generator. A chaotic system based on synchronised Master–Slave Chua's circuits has been used as a chaotic true random number generator (CTRNG. Chaotic systems present unpredictable and complex behaviour. This characteristic, together with the dependence on the initial conditions as well as the tolerance of the circuit components, make CTRNGs ideal for cryptography. In the proposed system, the transmitter mixes an input image with chaotic noise produced by a CTRNG. Using thresholding techniques, the chaotic signal is converted to a true random bit sequence. The receiver must be able to reproduce exactly the same chaotic noise in order to subtract it from the received signal. This becomes possible with synchronisation between the two Chua's circuits: through the use of specific techniques, the trajectory of the Slave chaotic system can be bound to that of the Master circuit producing (almost identical behaviour. Additional blocks have been used in order to make the system highly parameterisable and robust against common attacks. The whole system is simulated in Matlab. Simulation results demonstrate satisfactory performance, as well as, robustness against cryptanalysis. The system works with both greyscale and colour jpg images.

  20. A video encryption method based on chaotic maps in DCT domain

    Institute of Scientific and Technical Information of China (English)

    Shuguo Yang; Shenghe Sun

    2008-01-01

    This paper proposes a new and secure video encryption method based on chaotic maps in DCT domain,which is quite in keeping with the common ideas and the frequent practices of video encryption.We select the 1-frames of the video sequence as encryption objects.First,we introduce two coupling chaotic maps to scramble the DCT coefficients of every original I-frame,and receive the scrambled I-frame.Second,we encrypt the DCT coefficients of the scrambled I-frame using another chaotic map.In the whole process,we use three chaotic maps and five keys; the I-frame is encrypted twice.Finally,we performed several tests and the experimental results have proved our method to be secure and efficient.

  1. Symmetric Encryption Model Based on Chaotic Attractors

    Directory of Open Access Journals (Sweden)

    Edilma Isabel Amaya Barrera

    2016-10-01

    Conclusions: the algorithm is presented as an alternative to traditional algorithms demonstrating greater efficiency in the management of computing resources and raises the groundwork for continuing their study on the interested academic community due to the variety of dynamical systems nonlinear.

  2. A New Algorithm of Encryption and Decryption of Images Using Chaotic Mapping

    Directory of Open Access Journals (Sweden)

    Musheer Ahmad

    2010-01-01

    Full Text Available The combination of chaotic theory and cryptography forms an important field of information security. In the past decade, chaos based image encryption is given much attention in the research of information security and a lot of image encryption algorithms based on chaotic maps have been proposed. Due to some inherent features of images like bulk data capacity and high data redundancy, the encryption of images is different from that of texts; therefore it is difficult to handle them by traditional encryption methods. In this communication, a new image encryption algorithm based on three different chaotic maps is proposed. In the proposed algorithm, the plain-image is first decomposed into 8x8 size blocks and then the block based shuffling of image is carried out using 2D Cat map. Further, the control parameters of shuffling are randomly generated by employing 2D coupled Logistic map. After that the shuffled image is encrypted using chaotic sequence generated by one-dimensional Logistic map. The experimental results show that the proposed algorithm can successfully encrypt/decrypt the images with same secret keys, and the algorithm has good encryption effect, large key space and high sensitivity to a small change in secret keys. Moreover, the simulation analysis also demonstrates that the encrypted images have good information entropy, very low correlation coefficients and the distribution of gray values of an encrypted image has random-like behavior.

  3. A novel chaotic map and an improved chaos-based image encryption scheme.

    Science.gov (United States)

    Zhang, Xianhan; Cao, Yang

    2014-01-01

    In this paper, we present a novel approach to create the new chaotic map and propose an improved image encryption scheme based on it. Compared with traditional classic one-dimensional chaotic maps like Logistic Map and Tent Map, this newly created chaotic map demonstrates many better chaotic properties for encryption, implied by a much larger maximal Lyapunov exponent. Furthermore, the new chaotic map and Arnold's Cat Map based image encryption method is designed and proved to be of solid robustness. The simulation results and security analysis indicate that such method not only can meet the requirement of imagine encryption, but also can result in a preferable effectiveness and security, which is usable for general applications.

  4. Efficient transmission of 1D and 2D chaotic map encrypted images with orthogonal frequency division multiplexing

    Science.gov (United States)

    Kasem, Hossam M.; Nasr, Mohamed E.; Sallam, Elsayed A.; Abd El-Samie, F. E.

    2011-10-01

    Image transmission takes place as an important research branch in multimedia broadcasting communication systems in the last decade. Our paper presents image transmission over a FFT-OFDM (Fast Fourier Transform Orthogonal Frequency Division Multiplexing). The need for encryption techniques increase with the appearance of the expression which said that our world became small village, and the use of image application such as conference and World Wide Web which increase rapidly in recent years. Encryption is an effective method for protecting the transmitted data by converting it into a form being invisible over transmission path and visible in receiver side. This paper presents a new hybrid encryption technique based on combination of Backer maps and logistic map. This proposed technique aims to increase PSNR and reduce the noise in the received image. The encryption is done by shuffling the positions of a pixel image using two dimensional Baker maps then encrypt using XOR operation with logistic map to generate cipher image over orthogonal frequency multiplexing (OFDM). The encryption approach adopted in this paper is based on chaotic Baker maps because the encoding and decoding steps in this approach are simple and fast enough for HDTV applications. The experimental results reveal the superiority of the proposed chaotic based image encryption technique using two logistic maps and two dimensional Backer map over normal Backer map.

  5. A Double Chaotic Layer Encryption Algorithm for Clinical Signals in Telemedicine.

    Science.gov (United States)

    Murillo-Escobar, M A; Cardoza-Avendaño, L; López-Gutiérrez, R M; Cruz-Hernández, C

    2017-04-01

    Recently, telemedicine offers medical services remotely via telecommunications systems and physiological monitoring devices. This scheme provides healthcare delivery services between physicians and patients conveniently, since some patients can not attend the hospital due to any reason. However, transmission of information over an insecure channel such as internet or private data storing generates a security problem. Therefore, authentication, confidentiality, and privacy are important challenges in telemedicine, where only authorized users should have access to medical or clinical records. On the other hand, chaotic systems have been implemented efficiently in cryptographic systems to provide confidential and privacy. In this work, we propose a novel symmetric encryption algorithm based on logistic map with double chaotic layer encryption (DCLE) in diffusion process and just one round of confusion-diffusion for the confidentiality and privacy of clinical information such as electrocardiograms (ECG), electroencephalograms (EEG), and blood pressure (BP) for applications in telemedicine. The clinical signals are acquired from PhysioBank data base for encryption proposes and analysis. In contrast with recent schemes in literature, we present a secure cryptographic algorithm based on chaos validated with the most complete security analysis until this time. In addition, the cryptograms are validated with the most complete pseudorandomness tests based on National Institute of Standards and Technology (NIST) 800-22 suite. All results are at MATLAB simulations and all them show the effectiveness, security, robustness, and the potential use of the proposed scheme in telemedicine.

  6. Transmission Error and Compression Robustness of 2D Chaotic Map Image Encryption Schemes

    Directory of Open Access Journals (Sweden)

    Michael Gschwandtner

    2007-11-01

    Full Text Available This paper analyzes the robustness properties of 2D chaotic map image encryption schemes. We investigate the behavior of such block ciphers under different channel error types and find the transmission error robustness to be highly dependent on on the type of error occurring and to be very different as compared to the effects when using traditional block ciphers like AES. Additionally, chaotic-mixing-based encryption schemes are shown to be robust to lossy compression as long as the security requirements are not too high. This property facilitates the application of these ciphers in scenarios where lossy compression is applied to encrypted material, which is impossible in case traditional ciphers should be employed. If high security is required chaotic mixing loses its robustness to transmission errors and compression, still the lower computational demand may be an argument in favor of chaotic mixing as compared to traditional ciphers when visual data is to be encrypted.

  7. Transmission Error and Compression Robustness of 2D Chaotic Map Image Encryption Schemes

    Directory of Open Access Journals (Sweden)

    Gschwandtner Michael

    2007-01-01

    Full Text Available This paper analyzes the robustness properties of 2D chaotic map image encryption schemes. We investigate the behavior of such block ciphers under different channel error types and find the transmission error robustness to be highly dependent on on the type of error occurring and to be very different as compared to the effects when using traditional block ciphers like AES. Additionally, chaotic-mixing-based encryption schemes are shown to be robust to lossy compression as long as the security requirements are not too high. This property facilitates the application of these ciphers in scenarios where lossy compression is applied to encrypted material, which is impossible in case traditional ciphers should be employed. If high security is required chaotic mixing loses its robustness to transmission errors and compression, still the lower computational demand may be an argument in favor of chaotic mixing as compared to traditional ciphers when visual data is to be encrypted.

  8. An Intelligent and Fast Chaotic Encryption Using Digital Logic Circuits for Ad-Hoc and Ubiquitous Computing

    Directory of Open Access Journals (Sweden)

    Ankur Khare

    2016-05-01

    Full Text Available Delays added by the encryption process represent an overhead for smart computing devices in ad-hoc and ubiquitous computing intelligent systems. Digital Logic Circuits are faster than other computing techniques, so these can be used for fast encryption to minimize processing delays. Chaotic Encryption is more attack-resilient than other encryption techniques. One of the most attractive properties of cryptography is known as an avalanche effect, in which two different keys produce distinct cipher text for the same information. Important properties of chaotic systems are sensitivity to initial conditions and nonlinearity, which makes two similar keys that generate different cipher text a source of confusion. In this paper a novel fast and secure Chaotic Map-based encryption technique using 2’s Compliment (CET-2C has been proposed, which uses a logistic map which implies that a negligible difference in parameters of the map generates different cipher text. Cryptanalysis of the proposed algorithm shows the strength and security of algorithm and keys. Performance of the proposed algorithm has been analyzed in terms of running time, throughput and power consumption. It is to be shown in comparison graphs that the proposed algorithm gave better results compare to different algorithms like AES and some others.

  9. Double-image encryption based on discrete fractional random transform and chaotic maps

    Science.gov (United States)

    Li, Huijuan; Wang, Yurong

    2011-07-01

    A novel double-image encryption algorithm is proposed, based on discrete fractional random transform and chaotic maps. The random matrices used in the discrete fractional random transform are generated by using a chaotic map. One of the two original images is scrambled by using another chaotic map, and then encoded into the phase of a complex matrix with the other original image as its amplitude. Then this complex matrix is encrypted by the discrete fractional random transform. By applying the correct keys which consist of initial values, control parameters, and truncated positions of the chaotic maps, and fractional orders, the two original images can be recovered without cross-talk. Numerical simulation has been performed to test the validity and the security of the proposed encryption algorithm. Encrypting two images together by this algorithm creates only one encrypted image, whereas other single-image encryption methods create two encrypted images. Furthermore, this algorithm requires neither the use of phase keys nor the use of matrix keys. In this sense, this algorithm can raise the efficiency when encrypting, storing or transmitting.

  10. Composite Chaotic Pseudo-Random Sequence Encryption Algorithm for Compressed Video

    Institute of Scientific and Technical Information of China (English)

    袁春; 钟玉琢; 杨士强

    2004-01-01

    Stream cryptosystems, which implement encryption by selecting parts of the block data and header information of the compressed video stream, achieve good real-time encryption with high flexibility. Chaotic random number generator-based approaches, for example, logistics maps, are comparatively promising approachs, but are vulnerable to attacks by nonlinear dynamic forecasting. A composite chaotic cryptography scheme was developed to encrypt the compressed video with the logistics map with a Z(231?1) field linear congruential algorithm to strengthen the security of the mono-chaotic cryptography. The scheme maintained real-time performance and flexibility of the chaotic sequence cryptography. The scheme also integrated asymmetrical public-key cryptography and encryption and identity authentification of control parameters at the initialization phase. Encryption is performed in a layered scheme based on the importance of the data in a compressed video stream. The composite chaotic cryptography scheme has the advantage that the value and updating frequency of the control parameters can be changed online to satisfy the network requirements and the processor capability, as well as the security requirements. Cryptanalysis shows that the scheme guarantees robust security,provides good real-time performance,and has flexible implementation. Statistical evaluations and tests verify that the scheme is effective.

  11. A novel image block cryptosystem based on a spatiotemporal chaotic system and a chaotic neural network

    Institute of Scientific and Technical Information of China (English)

    Wang Xing-Yuan; Bao Xue-Mei

    2013-01-01

    In this paper,we propose a novel block cryptographic scheme based on a spatiotemporal chaotic system and a chaotic neural network (CNN).The employed CNN comprises a 4-neuron layer called a chaotic neuron layer (CNL),where the spatiotemporal chaotic system participates in generating its weight matrix and other parameters.The spatiotemporal chaotic system used in our scheme is the typical coupled map lattice (CML),which can be easily implemented in parallel by hardware.A 160-bit-long binary sequence is used to generate the initial conditions of the CML.The decryption process is symmetric relative to the encryption process.Theoretical analysis and experimental results prove that the block cryptosystem is secure and practical,and suitable for image encryption.

  12. Chaotic Image Encryption with Random Shuffling of Data

    OpenAIRE

    Aydos, Murat; Uğur, Alper

    2014-01-01

    Security of valuable multimedia contents such as images in personal photograph albums, electronic publishing, frames of multicast video conference can be achieved by image encryption. Secure transmission of these contents is required to be rapid, efficient and practical. Hence, image encryption process must be chosen not only to satisfy the security goals but also to fulfill these requirements. Due to the inadequacy and inefficiency of conventional text based information encryption methods, r...

  13. Henon CSK Secure Communication System Using Chaotic Turbo Codes

    Institute of Scientific and Technical Information of China (English)

    2002-01-01

    In this paper,the authors design a novel chaotic secure communication system, which has high security and good errorcorrecting capability. Firstly, the Henon Chaos Shift Keying (CSK) modulation block is presented. Secondly,chaotic turbo encod er/decoder (hard decision) is introduced. Thirdly, this chaotic secure communication system, which comprises the Henon CSK modulation block and chaotic turbo en coder in a serially concatenated form, is shown. Furthermore, a novel two step encryption scheme is proposed, which is based on the chaotic turbo e ncoded Henon CSK secure communication system.

  14. A novel chaotic based image encryption using a hybrid model of deoxyribonucleic acid and cellular automata

    Science.gov (United States)

    Enayatifar, Rasul; Sadaei, Hossein Javedani; Abdullah, Abdul Hanan; Lee, Malrey; Isnin, Ismail Fauzi

    2015-08-01

    Currently, there are many studies have conducted on developing security of the digital image in order to protect such data while they are sending on the internet. This work aims to propose a new approach based on a hybrid model of the Tinkerbell chaotic map, deoxyribonucleic acid (DNA) and cellular automata (CA). DNA rules, DNA sequence XOR operator and CA rules are used simultaneously to encrypt the plain-image pixels. To determine rule number in DNA sequence and also CA, a 2-dimension Tinkerbell chaotic map is employed. Experimental results and computer simulations, both confirm that the proposed scheme not only demonstrates outstanding encryption, but also resists various typical attacks.

  15. Design of an image encryption scheme based on a multiple chaotic map

    Science.gov (United States)

    Tong, Xiao-Jun

    2013-07-01

    In order to solve the problem that chaos is degenerated in limited computer precision and Cat map is the small key space, this paper presents a chaotic map based on topological conjugacy and the chaotic characteristics are proved by Devaney definition. In order to produce a large key space, a Cat map named block Cat map is also designed for permutation process based on multiple-dimensional chaotic maps. The image encryption algorithm is based on permutation-substitution, and each key is controlled by different chaotic maps. The entropy analysis, differential analysis, weak-keys analysis, statistical analysis, cipher random analysis, and cipher sensibility analysis depending on key and plaintext are introduced to test the security of the new image encryption scheme. Through the comparison to the proposed scheme with AES, DES and Logistic encryption methods, we come to the conclusion that the image encryption method solves the problem of low precision of one dimensional chaotic function and has higher speed and higher security.

  16. Synchronization of chaotic systems.

    Science.gov (United States)

    Pecora, Louis M; Carroll, Thomas L

    2015-09-01

    We review some of the history and early work in the area of synchronization in chaotic systems. We start with our own discovery of the phenomenon, but go on to establish the historical timeline of this topic back to the earliest known paper. The topic of synchronization of chaotic systems has always been intriguing, since chaotic systems are known to resist synchronization because of their positive Lyapunov exponents. The convergence of the two systems to identical trajectories is a surprise. We show how people originally thought about this process and how the concept of synchronization changed over the years to a more geometric view using synchronization manifolds. We also show that building synchronizing systems leads naturally to engineering more complex systems whose constituents are chaotic, but which can be tuned to output various chaotic signals. We finally end up at a topic that is still in very active exploration today and that is synchronization of dynamical systems in networks of oscillators.

  17. Synchronization of chaotic systems

    Energy Technology Data Exchange (ETDEWEB)

    Pecora, Louis M.; Carroll, Thomas L. [U.S. Naval Research Laboratory, Washington, District of Columbia 20375 (United States)

    2015-09-15

    We review some of the history and early work in the area of synchronization in chaotic systems. We start with our own discovery of the phenomenon, but go on to establish the historical timeline of this topic back to the earliest known paper. The topic of synchronization of chaotic systems has always been intriguing, since chaotic systems are known to resist synchronization because of their positive Lyapunov exponents. The convergence of the two systems to identical trajectories is a surprise. We show how people originally thought about this process and how the concept of synchronization changed over the years to a more geometric view using synchronization manifolds. We also show that building synchronizing systems leads naturally to engineering more complex systems whose constituents are chaotic, but which can be tuned to output various chaotic signals. We finally end up at a topic that is still in very active exploration today and that is synchronization of dynamical systems in networks of oscillators.

  18. Secure and Fast Chaos based Encryption System using Digital Logic Circuit

    Directory of Open Access Journals (Sweden)

    Ankur A. Khare

    2014-05-01

    Full Text Available Chaotic system based message encryption system for wired and wireless networks broadly used in computer engineering, communication and network security, such as robotic systems, encryption, synchronization and genetic network. The main motive for developing the chaos based cryptosystem is to attain encryption with several compensation over the conventional encryption algorithms such as high security, speed, complexity, cost and quality assurance. These challenges encourage the researchers to develop novel chaos based data encryption techniques with digital logics dealing with encryption of messages for fast and secure communication networks. This effort provides a modified version of traditional data encryption algorithms to provide good quality and performance in a secure communication network environment. A cryptology technique is widely used in network security during communication. An avalanche effect is the attractive property of cryptography in which two different keys produce different cipher text for the same data information and also some Important properties related to chaotic systems are sensitivity to initial condition and nonlinearity, which makes two similar or slightly different keys to generate completely different cipher text to produce confusion. It has been proposed a novel fast & secure encryption Technique which uses the chaotic map function to generate the different multiple keys and shows that negligible difference in parameters of chaotic function generate completely different keys as well as cipher text. Cryptanalysis of the proposed algorithm shows the strength and security of algorithm and keys.

  19. Chaotic Image Encryption Based on Running-Key Related to Plaintext

    Directory of Open Access Journals (Sweden)

    Cao Guanghui

    2014-01-01

    Full Text Available In the field of chaotic image encryption, the algorithm based on correlating key with plaintext has become a new developing direction. However, for this kind of algorithm, some shortcomings in resistance to reconstruction attack, efficient utilization of chaotic resource, and reducing dynamical degradation of digital chaos are found. In order to solve these problems and further enhance the security of encryption algorithm, based on disturbance and feedback mechanism, we present a new image encryption scheme. In the running-key generation stage, by successively disturbing chaotic stream with cipher-text, the relation of running-key to plaintext is established, reconstruction attack is avoided, effective use of chaotic resource is guaranteed, and dynamical degradation of digital chaos is minimized. In the image encryption stage, by introducing random-feedback mechanism, the difficulty of breaking this scheme is increased. Comparing with the-state-of-the-art algorithms, our scheme exhibits good properties such as large key space, long key period, and extreme sensitivity to the initial key and plaintext. Therefore, it can resist brute-force, reconstruction attack, and differential attack.

  20. Chaotic image encryption based on running-key related to plaintext.

    Science.gov (United States)

    Guanghui, Cao; Kai, Hu; Yizhi, Zhang; Jun, Zhou; Xing, Zhang

    2014-01-01

    In the field of chaotic image encryption, the algorithm based on correlating key with plaintext has become a new developing direction. However, for this kind of algorithm, some shortcomings in resistance to reconstruction attack, efficient utilization of chaotic resource, and reducing dynamical degradation of digital chaos are found. In order to solve these problems and further enhance the security of encryption algorithm, based on disturbance and feedback mechanism, we present a new image encryption scheme. In the running-key generation stage, by successively disturbing chaotic stream with cipher-text, the relation of running-key to plaintext is established, reconstruction attack is avoided, effective use of chaotic resource is guaranteed, and dynamical degradation of digital chaos is minimized. In the image encryption stage, by introducing random-feedback mechanism, the difficulty of breaking this scheme is increased. Comparing with the-state-of-the-art algorithms, our scheme exhibits good properties such as large key space, long key period, and extreme sensitivity to the initial key and plaintext. Therefore, it can resist brute-force, reconstruction attack, and differential attack.

  1. UNIVERSAL DIGITAL IMAGE ENCRYPTION AND RECOVERY ALGORITHM BASED ON 3 D CHAOTIC SYSTEM%基于三维混沌系统的通用数字图像加密与恢复算法

    Institute of Scientific and Technical Information of China (English)

    卢守东; 肖芳雄

    2013-01-01

    In order to protect digital image information effectively , a new universal encryption algorithm based on 3D chaotic system and its improved sequences is proposed .Firstly, according to the key and the digital image size m ×n , a 3D chaotic sequence with length of m ×n is generated .Then, the chaotic sequence is improved to possess the ideal pseudo-randomness property according to the sub-key and the type of image.Also according to the sub-key and the type of image , at the same time the chaotic sequence is converted to unsigned integer se-quence.Finally, the improved sequence is sorted for generating the corresponding subscript sequence , and pixel coordinates of the image will be scrambled based on it .Meanwhile , the pixel value permutation is realised by using the XOR operation between the unsigned integer se -quence and the corresponding pixel value in turn .In allusion to the malicious shearing or painting attacks ,a recovery algorithm based on neigh-bouring pixels characteristic is presented simultaneously .The effect of the encryption and security is also analysed by using the evaluation in-dex.Experimental results and theoretical analysis show that the algorithm has high running efficiency , large space of keys , good encryption effect, statistical characteristics and security , it also has strong ability in resisting the shearing or painting attacks and anti-noise as well.%为有效保护数字图像的信息,提出一种新的基于三维混沌系统及其改进序列的通用加密算法。首先,根据密钥及数字图像的大小m ×n,产生一个长度为m ×n的三维混沌序列。然后,根据子密钥及图像类型对混沌序列进行改进,使其具有理想的伪随机特性。同时,根据子密钥及图像类型将混沌序列转换为无符号整数序列。最后,对改进后的序列进行排序以生成相应的下标序列,并据此对图像进行像素坐标置乱,同时将无符号整数序列依次与对应的

  2. Encryption test of pseudo-aleatory messages embedded on chaotic laser signals: An information theory approach

    Energy Technology Data Exchange (ETDEWEB)

    Rosso, O.A. [Centre for Bioinformatics, Biomarker Discovery and Information-Based Medicine, School of Electrical Engineering and Computer Science, The University of Newcastle, University Drive, Callaghan NSW 2308 (Australia); Chaos and Biology Group, Instituto de Calculo, Facultad de Ciencias Exactas y Naturales, Pabellon II, Ciudad Universitaria, 1428 Ciudad Autonoma de Buenos Aires (Argentina)], E-mail: oarosso@fibertel.com.ar; Vicente, R. [Frankfurt Institute for Advanced Studies (FIAS), Max-Von-Laue-Strasse 1, 60438 Frankfurt (Germany); Department Neurophysiology, Max-Planck-Institute for Brain Research, Deutschordenstrasse 46, 60528 Frankfurt (Germany)], E-mail: raulvicente@mpih-frankfurt.mpg.de; Mirasso, C.R. [Instituto de Fisica Interdisciplinar y Sistemas Complejos, Universitat de les Illes Balears, E-07122 Palma de Mallorca (Spain)], E-mail: claudio@ifisc.uib.es

    2008-02-11

    In this Letter, we make use of two information-theory based indicators to measure the goodness of two encryption schemes commonly used within the context of chaotic communications. In particular, we have shown that the computation of the normalized Shannon entropy and the MPR-Statistical Complexity measure [M.T. Martin, A. Plastino, O.A. Rosso, Phys. Lett. A 311 (2003) 126, P.W. Lamberti, M.T. Martin, A. Plastino, O.A. Rosso, Physica A 334 (2004) 119] for different chaotic laser signals can lead to statistically significant criteria to assess the quality of several encryption techniques. The proposed measures allow, in some cases, to detect the presence of a message embedded within a chaotic carrier. They also reveal that the Chaos Modulation scheme is more reliable from the statistical point of view, when compared with the Chaos Shift Keying.

  3. Image encryption algorithm based on inline time delay chaotic map coupled with Lorenz system%内联时延混沌映射耦合Lorenz系统的图像加密算法

    Institute of Scientific and Technical Information of China (English)

    宋鑫超; 苏庆堂; 赵永升

    2016-01-01

    为解决当前图像加密算法采用独立的置乱与扩散操作,降低算法内联性,且忽略混沌序列生成存在的时延因素,使其难以抵御明文攻击等不足,提出一种内联时延混沌映射耦合 Lorenz系统的图像加密算法。将时间延迟引入 Logistic 映射中,生成 Arnold映射的初值;基于明文像素点,构造 Arnold映射迭代次数计算模型;根据 Arnold映射的迭代次数,建立其映射控制参数的计算函数,生成一组随机序列,利用位置集合,完成图像置乱;迭代超混沌 Lorenz 系统,生成4D序列组;引入密钥流,修正4D序列组;构造像素扩散机制,完成图像加密。实验结果表明,与当前加密结构相比,该算法拥有更高的保密性能与更强的密钥敏感性。%Using current image encryption algorithm is difficult to resist plaintext attacks induced by independently scrambling and diffusion operating resulting in reducing the algorithm’s inline,also the existing time delay factor of the chaos sequence is ig-nored,so the image encryption algorithm based on inline time delay chaotic map coupled with Lorenz system was proposed.The initial value of Arnold map was generated by introducing the time delay into the Logistic map.The iteration number model of Ar-nold map was constructed based on the pixels of plaintext.The initial value of Arnold map was generated by introducing the time delay into the Logistic map and basing on iteration number.The calculation function of the mapping control parameters was es-tablished based on the initial value for iterating to produce the random sequence and the image was permutated by position set. The 4D sequence group was generated by iterating the hyper-chaotic system.The pixel diffusion mechanism was constructed by the modified 4D sequence group with key stream to finish image encryption.Experimental results show that this algorithm has better security performance and stronger key

  4. A Novel 1D Hybrid Chaotic Map-Based Image Compression and Encryption Using Compressed Sensing and Fibonacci-Lucas Transform

    Directory of Open Access Journals (Sweden)

    Tongfeng Zhang

    2016-01-01

    Full Text Available A one-dimensional (1D hybrid chaotic system is constructed by three different 1D chaotic maps in parallel-then-cascade fashion. The proposed chaotic map has larger key space and exhibits better uniform distribution property in some parametric range compared with existing 1D chaotic map. Meanwhile, with the combination of compressive sensing (CS and Fibonacci-Lucas transform (FLT, a novel image compression and encryption scheme is proposed with the advantages of the 1D hybrid chaotic map. The whole encryption procedure includes compression by compressed sensing (CS, scrambling with FLT, and diffusion after linear scaling. Bernoulli measurement matrix in CS is generated by the proposed 1D hybrid chaotic map due to its excellent uniform distribution. To enhance the security and complexity, transform kernel of FLT varies in each permutation round according to the generated chaotic sequences. Further, the key streams used in the diffusion process depend on the chaotic map as well as plain image, which could resist chosen plaintext attack (CPA. Experimental results and security analyses demonstrate the validity of our scheme in terms of high security and robustness against noise attack and cropping attack.

  5. Research on medical image encryption in telemedicine systems.

    Science.gov (United States)

    Dai, Yin; Wang, Huanzhen; Zhou, Zixia; Jin, Ziyi

    2016-04-29

    Recently, advances in computers and high-speed communication tools have led to enhancements in remote medical consultation research. Laws in some localities require hospitals to encrypt patient information (including images of the patient) before transferring the data over a network. Therefore, developing suitable encryption algorithms is quite important for modern medicine. This paper demonstrates a digital image encryption algorithm based on chaotic mapping, which uses the no-period and no-convergence properties of a chaotic sequence to create image chaos and pixel averaging. Then, the chaotic sequence is used to encrypt the image, thereby improving data security. With this method, the security of data and images can be improved.

  6. Chaotic Order Preserving Encryption for Efficient and Secure Queries on Databases

    Science.gov (United States)

    Lee, Seungmin; Park, Tae-Jun; Lee, Donghyeok; Nam, Taekyong; Kim, Sehun

    The need for data encryption that protects sensitive data in a database has increased rapidly. However, encrypted data can no longer be efficiently queried because nearly all of the data should be decrypted. Several order-preserving encryption schemes that enable indexes to be built over encrypted data have been suggested to solve this problem. They allow any comparison operation to be directly applied to encrypted data. However, one of the main disadvantages of these schemes is that they expose sensitive data to inference attacks with order information, especially when the data are used together with unencrypted columns in the database. In this study, a new order-preserving encryption scheme that provides secure queries by hiding the order is introduced. Moreover, it provides efficient queries because any user who has the encryption key knows the order. The proposed scheme is designed to be efficient and secure in such an environment. Thus, it is possible to encrypt only sensitive data while leaving other data unencrypted. The encryption is not only robust against order exposure, but also shows high performance for any query over encrypted data. In addition, the proposed scheme provides strong updates without assumptions of the distribution of plaintext. This allows it to be integrated easily with the existing database system.

  7. Ensemble of Chaotic and Naive Approaches for Performance Enhancement in Video Encryption

    Directory of Open Access Journals (Sweden)

    Jeyamala Chandrasekaran

    2015-01-01

    Full Text Available Owing to the growth of high performance network technologies, multimedia applications over the Internet are increasing exponentially. Applications like video conferencing, video-on-demand, and pay-per-view depend upon encryption algorithms for providing confidentiality. Video communication is characterized by distinct features such as large volume, high redundancy between adjacent frames, video codec compliance, syntax compliance, and application specific requirements. Naive approaches for video encryption encrypt the entire video stream with conventional text based cryptographic algorithms. Although naive approaches are the most secure for video encryption, the computational cost associated with them is very high. This research work aims at enhancing the speed of naive approaches through chaos based S-box design. Chaotic equations are popularly known for randomness, extreme sensitivity to initial conditions, and ergodicity. The proposed methodology employs two-dimensional discrete Henon map for (i generation of dynamic and key-dependent S-box that could be integrated with symmetric algorithms like Blowfish and Data Encryption Standard (DES and (ii generation of one-time keys for simple substitution ciphers. The proposed design is tested for randomness, nonlinearity, avalanche effect, bit independence criterion, and key sensitivity. Experimental results confirm that chaos based S-box design and key generation significantly reduce the computational cost of video encryption with no compromise in security.

  8. Ensemble of Chaotic and Naive Approaches for Performance Enhancement in Video Encryption.

    Science.gov (United States)

    Chandrasekaran, Jeyamala; Thiruvengadam, S J

    2015-01-01

    Owing to the growth of high performance network technologies, multimedia applications over the Internet are increasing exponentially. Applications like video conferencing, video-on-demand, and pay-per-view depend upon encryption algorithms for providing confidentiality. Video communication is characterized by distinct features such as large volume, high redundancy between adjacent frames, video codec compliance, syntax compliance, and application specific requirements. Naive approaches for video encryption encrypt the entire video stream with conventional text based cryptographic algorithms. Although naive approaches are the most secure for video encryption, the computational cost associated with them is very high. This research work aims at enhancing the speed of naive approaches through chaos based S-box design. Chaotic equations are popularly known for randomness, extreme sensitivity to initial conditions, and ergodicity. The proposed methodology employs two-dimensional discrete Henon map for (i) generation of dynamic and key-dependent S-box that could be integrated with symmetric algorithms like Blowfish and Data Encryption Standard (DES) and (ii) generation of one-time keys for simple substitution ciphers. The proposed design is tested for randomness, nonlinearity, avalanche effect, bit independence criterion, and key sensitivity. Experimental results confirm that chaos based S-box design and key generation significantly reduce the computational cost of video encryption with no compromise in security.

  9. An authenticated image encryption scheme based on chaotic maps and memory cellular automata

    Science.gov (United States)

    Bakhshandeh, Atieh; Eslami, Ziba

    2013-06-01

    This paper introduces a new image encryption scheme based on chaotic maps, cellular automata and permutation-diffusion architecture. In the permutation phase, a piecewise linear chaotic map is utilized to confuse the plain-image and in the diffusion phase, we employ the Logistic map as well as a reversible memory cellular automata to obtain an efficient and secure cryptosystem. The proposed method admits advantages such as highly secure diffusion mechanism, computational efficiency and ease of implementation. A novel property of the proposed scheme is its authentication ability which can detect whether the image is tampered during the transmission or not. This is particularly important in applications where image data or part of it contains highly sensitive information. Results of various analyses manifest high security of this new method and its capability for practical image encryption.

  10. A NEW TECHNIQUE BASED ON CHAOTIC STEGANOGRAPHY AND ENCRYPTION TEXT IN DCT DOMAIN FOR COLOR IMAGE

    Directory of Open Access Journals (Sweden)

    MELAD J. SAEED

    2013-10-01

    Full Text Available Image steganography is the art of hiding information into a cover image. This paper presents a new technique based on chaotic steganography and encryption text in DCT domain for color image, where DCT is used to transform original image (cover image from spatial domain to frequency domain. This technique used chaotic function in two phases; firstly; for encryption secret message, second; for embedding in DCT cover image. With this new technique, good results are obtained through satisfying the important properties of steganography such as: imperceptibility; improved by having mean square error (MSE, peak signal to noise ratio (PSNR and normalized correlation (NC, to phase and capacity; improved by encoding the secret message characters with variable length codes and embedding the secret message in one level of color image only.

  11. High-performance multimedia encryption system based on chaos

    Science.gov (United States)

    Hasimoto-Beltrán, Rogelio

    2008-06-01

    Current chaotic encryption systems in the literature do not fulfill security and performance demands for real-time multimedia communications. To satisfy these demands, we propose a generalized symmetric cryptosystem based on N independently iterated chaotic maps (N-map array) periodically perturbed with a three-level perturbation scheme and a double feedback (global and local) to increase the system's robustness to attacks. The first- and second-level perturbations make cryptosystem extremely sensitive to changes in the plaintext data since the system's output itself (ciphertext global feedback) is used in the perturbation process. Third-level perturbation is a system reset, in which the system-key and chaotic maps are replaced for totally new values. An analysis of the proposed scheme regarding its vulnerability to attacks, statistical properties, and implementation performance is presented. To the best of our knowledge we provide a secure cryptosystem with one of the highest levels of performance for real-time multimedia communications.

  12. A New Image Encryption Scheme Based on Dynamic S-Boxes and Chaotic Maps

    Science.gov (United States)

    Rehman, Atique Ur; Khan, Jan Sher; Ahmad, Jawad; Hwang, Soeng Oun

    2016-03-01

    Substitution box is a unique and nonlinear core component of block ciphers. A better designing technique of substitution box can boost up the quality of ciphertexts. In this paper, a new encryption method based on dynamic substitution boxes is proposed via using two chaotic maps. To break the correlation in an original image, pixels values of the original plaintext image are permuted row- and column-wise through random sequences. The aforementioned random sequences are generated by 2-D Burgers chaotic map. For the generation of dynamic substitution boxes, Logistic chaotic map is employed. In the process of diffusion, the permuted image is divided into blocks and each block is substituted via different dynamic substitution boxes. In contrast to conventional encryption schemes, the proposed scheme does not undergo the fixed block cipher and hence the security level can be enhanced. Extensive security analysis including histogram test is applied on the proposed image encryption technique. All experimental results reveal that the proposed scheme has a high level of security and robustness for transmission of digital images on insecure communication channels.

  13. Proposed Hyperchaotic System for Image Encryption

    Directory of Open Access Journals (Sweden)

    Asst. Prof. Dr. Alia Karim Abdul Hassan

    2016-01-01

    Full Text Available This paper presents a new hyper chaos system based on Hénon and Logistic maps which provides characteristics of high capacity, security and efficiency. The Proposed hyper chaos system is employed to generate the key for diffusion in an image encryption algorithm. The simulation experiments to the image encryption algorithm which based on the proposed hyper chaos system show that the algorithm security analysis it has large key space (10 84 that ensures a strong resistance against attack of exhaustion as the key space will be greater, strong sensitivity of encryption key and good statistical characteristics. Encryption and decryption time is suitable for different applications.

  14. A fractal-based image encryption system

    KAUST Repository

    Abd-El-Hafiz, S. K.

    2014-12-01

    This study introduces a novel image encryption system based on diffusion and confusion processes in which the image information is hidden inside the complex details of fractal images. A simplified encryption technique is, first, presented using a single-fractal image and statistical analysis is performed. A general encryption system utilising multiple fractal images is, then, introduced to improve the performance and increase the encryption key up to hundreds of bits. This improvement is achieved through several parameters: feedback delay, multiplexing and independent horizontal or vertical shifts. The effect of each parameter is studied separately and, then, they are combined to illustrate their influence on the encryption quality. The encryption quality is evaluated using different analysis techniques such as correlation coefficients, differential attack measures, histogram distributions, key sensitivity analysis and the National Institute of Standards and Technology (NIST) statistical test suite. The obtained results show great potential compared to other techniques.

  15. Cryptography based on spatial chaotic system

    Science.gov (United States)

    Sun, Fuyan; Lü, Zongwang

    2010-08-01

    Encryption of images is different from that of texts due to some intrinsic features of images such as bulk data capacity and high redundancy, which is generally difficult to handle by traditional methods. This paper proposes a new spatial chaos system(SCS), which is investigated by conducting FIPS 140-1 statistic test, and is especially useful for encryption of digital images. It is shown how to adapt a two dimensional(2D) ergodic matrix obtained from SCS to permute the positions of image pixels and confuse the relationship between the cipher image and plain image simultaneously. Experimental results show that the performance and security of the proposed cryptographic system are better than those of existing lower dimensional chaotic cryptographic systems.

  16. 基于FTP的图像混沌加密传输技术的实现%Implementation of transmitting chaotic-encrypted image based on FTP

    Institute of Scientific and Technical Information of China (English)

    刘新杰; 李黎明

    2014-01-01

    In order to accelerate the rate of chaotic-encrypted image transmission system and extend its field of application , this paper proposes a new method of transmitting chaotic-encrypted image: applying VSFTPD software to Mini 2440 ARM platform to setup a FTP server , and using FTP to convey the encrypted image files . The experiment result shows that this system can trans-fer chaotic-encrypted images rapidly and reliably .%为了提高混沌图像加密传输系统的传输速度并扩大应用范围,提出了一种实现混沌图像加密传输的新方法:利用 VSFTPD 软件在 Mini 2440 ARM 平台上构建 FTP 服务器,通过 FTP 实现混沌加密图像数据的传输。实验结果表明,该系统能够实现混沌加密图像的可靠快速传输。

  17. 基于混沌系统和极化恒等式的数字图像加密算法%An Image Encryption Algorithm Based on Chaotic System and Polarized Identity

    Institute of Scientific and Technical Information of China (English)

    周文杰; 冯嘉礼

    2009-01-01

    混沌系统具有初值敏感性,参数敏感性和类随机性等特性将图像分成大小为8 8的图像子块,利用经典的Logistic方程产生的混沌序列并对其排序生成匹配模板来改变图像子块的位置,然后利用极化恒等式内积分解加密算法改变图像像素的值因此,基于混沌系统和极化恒等式的数字图像加密算法使图像的像素的位置和值都发生了变化,实现了图像的混淆和扩散仿真实验表明该方法进行图像加密具有可行性和安全性.%Chaotic system has such attributes as initial value sensitivity ,sensitivity of the parameters and random - like.. On the one hand ,dignital image is divided into 8 8 sub_block image . The sub_block images scrambled by the template matching that can be gotten by the typical Logistic equation . On the other hand encryption algorithm based on inner product polarized identity and vector inner product decomposition of a constant change each pixel value in an image. So the method can attain the purpose of image confusion and diffusion.Through theoretical analysis and simulation , the method was proved to work well.

  18. A Color Image Encryption Algorithm Based on a Fractional-Order Hyperchaotic System

    Directory of Open Access Journals (Sweden)

    Xia Huang

    2014-12-01

    Full Text Available In this paper, a new color image encryption algorithm based on a fractional-order hyperchaotic system is proposed. Firstly, four chaotic sequences are generated by a fractional-order hyperchaotic system. The parameters of such a system, together with the initial value, are regarded as the secret keys and the plain image is encrypted by performing the XOR and shuffling operations simultaneously. The proposed encryption scheme is described in detail with security analyses, including correlation analysis, histogram analysis, differential attacks, and key sensitivity analysis. Experimental results show that the proposed encryption scheme has big key space, and high sensitivity to keys properties, and resists statistical analysis and differential attacks, so it has high security and is suitable for color image encryption.

  19. Combination of Hybrid Chaotic Encryption and LDPC for Secure Transmission of Images over Wireless Networks

    Directory of Open Access Journals (Sweden)

    Mona F. M. Mursi

    2014-11-01

    Full Text Available Robust and secure transmission strategy for high quality image through wireless networks is considered a great challenge. However, the majority of encrypted image transmission schemes don't consider well the effect of bit errors occurring during transmission. These errors are due to the factors that affect the information such as noise and multipath propagation. That should be handled by an efficient channel coding scheme. Our proposed scheme is based on combining hybrid chaotic encryption, which is based on two-dimensional chaotic maps which is utilized for data security, with an error correction technique based on the Low Density Parity Check (LDPC code. The LDPC is employed as channel coding for data communication in order to solve the problem of the channel’s limited bandwidth and improve throughput. Simulation results show that the proposed scheme achieves a high degree of robustness against channel impairments and wide varieties of attacks as wells as improved reliability of the wireless channel. In addition, LDPC is utilized for error correction in order to solve the limitations of wireless channels.

  20. A Simple and Robust Gray Image Encryption Scheme Using Chaotic Logistic Map and Artificial Neural Network

    Directory of Open Access Journals (Sweden)

    Adelaïde Nicole Kengnou Telem

    2014-01-01

    Full Text Available A robust gray image encryption scheme using chaotic logistic map and artificial neural network (ANN is introduced. In the proposed method, an external secret key is used to derive the initial conditions for the logistic chaotic maps which are employed to generate weights and biases matrices of the multilayer perceptron (MLP. During the learning process with the backpropagation algorithm, ANN determines the weight matrix of the connections. The plain image is divided into four subimages which are used for the first diffusion stage. The subimages obtained previously are divided into the square subimage blocks. In the next stage, different initial conditions are employed to generate a key stream which will be used for permutation and diffusion of the subimage blocks. Some security analyses such as entropy analysis, statistical analysis, and key sensitivity analysis are given to demonstrate the key space of the proposed algorithm which is large enough to make brute force attacks infeasible. Computing validation using experimental data with several gray images has been carried out with detailed numerical analysis, in order to validate the high security of the proposed encryption scheme.

  1. A novel chaotic encryption scheme based on generalized threshold function

    CERN Document Server

    Ahadpour, Sodeif; arasteh-Fard, Zahra

    2011-01-01

    In this paper, after reviewing the main points of random number generators and threshold function, we introduce two new methods of pseudorandom number generators(PRNGs) based on generalized threshold function (segmentation and self-similarity). These methods decrease periodic effect of the ergodic dynamical systems in randomness of the pseudorandom number generators(PRNGs). The essential idea of this paper is that given threshold functions of the ergodic dynamical systems to use in pseudorandom number generation. To evaluate the randomness of the bit sequences generated by the PRNGs, the NIST suite tests were performed. We find that the PRNGs pass these tests satisfactorily. The proposed PRNGs can be used in many applications requiring random bit sequences and also in the design of secure cryptosystems.

  2. Leaking Chaotic Systems

    CERN Document Server

    Altmann, Eduardo G; Tél, Tamás

    2013-01-01

    There are numerous physical situations in which a hole or leak is introduced in an otherwise closed chaotic system. The leak can have a natural origin, it can mimic measurement devices, and it can also be used to reveal dynamical properties of the closed system. In this paper we provide an unified treatment of leaking systems and we review applications to different physical problems, both in the classical and quantum pictures. Our treatment is based on the transient chaos theory of open systems, which is essential because real leaks have finite size and therefore estimations based on the closed system differ essentially from observations. The field of applications reviewed is very broad, ranging from planetary astronomy and hydrodynamical flows, to plasma physics and quantum fidelity. The theory is expanded and adapted to the case of partial leaks (partial absorption/transmission) with applications to room acoustics and optical microcavities in mind. Simulations in the lima .con family of billiards illustrate...

  3. Chaotic systems with absorption

    CERN Document Server

    Altmann, Eduardo G; Tél, Tamás

    2013-01-01

    Motivated by applications in optics and acoustics we develop a dynamical-system approach to describe absorption in chaotic systems. We introduce an operator formalism from which we obtain (i) a general formula for the escape rate $\\kappa$ in terms of the natural conditionally-invariant measure of the system; (ii) an increased multifractality when compared to the spectrum of dimensions $D_q$ obtained without taking absorption and return times into account; and (iii) a generalization of the Kantz-Grassberger formula that expresses $D_1$ in terms of $\\kappa$, the positive Lyapunov exponent, the average return time, and a new quantity, the reflection rate. Simulations in the cardioid billiard confirm these results.

  4. IMPULSIVE CONTROL OF CHAOTIC ATTRACTORS IN NONLINEAR CHAOTIC SYSTEMS

    Institute of Scientific and Technical Information of China (English)

    马军海; 任彪; 陈予恕

    2004-01-01

    Based on the study from both domestic and abroad, an impulsive control scheme on chaotic attractors in one kind of chaotic system is presented.By applying impulsive control theory of the universal equation, the asymptotically stable condition of impulsive control on chaotic attractors in such kind of nonlinear chaotic system has been deduced, and with it, the upper bond of the impulse interval for asymptotically stable control was given. Numerical results are presented, which are considered with important reference value for control of chaotic attractors.

  5. Chaotic systems in optical communications

    Science.gov (United States)

    Siuzdak, J.

    2016-09-01

    Communications application of chaotic oscillations of lasers with optoelectronic feedback was discussed. The possibility of eavesdropping of the transmission was analyzed. It was proved that if the rogue party precisely knows parameters of the chaotic system it may recreate the entire signals solely by observation of the optical signal power causing security breach.

  6. Information encryption systems based on Boolean functions

    Directory of Open Access Journals (Sweden)

    Aureliu Zgureanu

    2011-02-01

    Full Text Available An information encryption system based on Boolean functions is proposed. Information processing is done using multidimensional matrices, performing logical operations with these matrices. At the basis of ensuring high level security of the system the complexity of solving the problem of building systems of Boolean functions that depend on many variables (tens and hundreds is set. Such systems represent the private key. It varies both during the encryption and decryption of information, and during the transition from one message to another.

  7. Synchronization and an application of a novel fractional order King Cobra chaotic system

    Energy Technology Data Exchange (ETDEWEB)

    Muthukumar, P., E-mail: muthukumardgl@gmail.com; Balasubramaniam, P., E-mail: balugru@gmail.com [Department of Mathematics, Gandhigram Rural Institute‐Deemed University, Gandhigram 624 302, Tamilnadu (India); Ratnavelu, K., E-mail: kuru052001@gmail.com [Faculty of Science, Institute of Mathematical Sciences, University of Malaya, 50603 Kuala Lumpur (Malaysia)

    2014-09-01

    In this paper, we design a new three dimensional King Cobra face shaped fractional order chaotic system. The multi-scale synchronization scheme of two fractional order chaotic systems is described. The necessary conditions for the multi-scale synchronization of two identical fractional order King Cobra chaotic systems are derived through feedback control. A new cryptosystem is proposed for an image encryption and decryption by using synchronized fractional order King Cobra chaotic systems with the supports of multiple cryptographic assumptions. The security of the proposed cryptosystem is analyzed by the well known algebraic attacks. Numerical simulations are given to show the effectiveness of the proposed theoretical results.

  8. Synchronization and an application of a novel fractional order King Cobra chaotic system.

    Science.gov (United States)

    Muthukumar, P; Balasubramaniam, P; Ratnavelu, K

    2014-09-01

    In this paper, we design a new three dimensional King Cobra face shaped fractional order chaotic system. The multi-scale synchronization scheme of two fractional order chaotic systems is described. The necessary conditions for the multi-scale synchronization of two identical fractional order King Cobra chaotic systems are derived through feedback control. A new cryptosystem is proposed for an image encryption and decryption by using synchronized fractional order King Cobra chaotic systems with the supports of multiple cryptographic assumptions. The security of the proposed cryptosystem is analyzed by the well known algebraic attacks. Numerical simulations are given to show the effectiveness of the proposed theoretical results.

  9. Eigenfunctions in chaotic quantum systems

    Energy Technology Data Exchange (ETDEWEB)

    Baecker, Arnd

    2007-07-01

    The structure of wavefunctions of quantum systems strongly depends on the underlying classical dynamics. In this text a selection of articles on eigenfunctions in systems with fully chaotic dynamics and systems with a mixed phase space is summarized. Of particular interest are statistical properties like amplitude distribution and spatial autocorrelation function and the implication of eigenfunction structures on transport properties. For systems with a mixed phase space the separation into regular and chaotic states does not always hold away from the semiclassical limit, such that chaotic states may completely penetrate into the region of the regular island. The consequences of this flooding are discussed and universal aspects highlighted. (orig.)

  10. A Generic Hybrid Encryption System (HES

    Directory of Open Access Journals (Sweden)

    Ijaz Ali Shoukat

    2013-03-01

    Full Text Available This study proposes a Generic Hybrid Encryption System (HES under mutual committee of symmetric and asymmetric cryptosystems. Asymmetric (public key Cryptosystems associates several performance issues like computational incompetence, memory wastages, energy consumptions and employment limitations on bulky data sets but they are quite secure and reliable in key exchange over insecure remote communication channels. Symmetric (private key cryptosystems are 100 times out performed, having no such issues but they cannot fulfill non-repudiation, false modifications in secret key, fake modifications in cipher text and origin authentication of both parties while exchanging information. These contradictory issues can be omitted by utilizing hybrid encryption mechanisms (symmetric+asymmetric to get optimal benefits of both schemes. Several hybrid mechanisms are available with different logics but our logic differs in infrastructural design, simplicity, computational efficiency and security as compared to prior hybrid encryption schemes. Some prior schemes are either diversified in performance aspects, customer satisfaction, memory utilization or energy consumptions and some are vulnerable against forgery and password guessing (session key recovery attacks. We have done some functional and design related changes in existing Public Key Infrastructure (PKI to achieve simplicity, optimal privacy and more customer satisfaction by providing Hybrid Encryption System (HES that is able to fulfill all set of standardized security constraints. No such PKI based generic hybrid encryption scheme persists as we have provided in order to manage all these kinds of discussed issues.

  11. Research and Implementation of Chaotic Video Encryption based on LAN%基于局域网的混沌视频加密研究与实现

    Institute of Scientific and Technical Information of China (English)

    李黎明; 禹思敏

    2014-01-01

    This paper presents a new method of implementing chaotic video encryption based on embedded system,which transplants the H.264 codec to Cortex-A8 ARM board.The codec is used to compress encrypted video data,which is transported to and decrypted on another ARM board.Result shows that the system transfers encrypted videos quickly and reliably, and meets the requirement of real-time video encryption.%提出了在嵌入式平台上实现混沌视频保密通信的新方式,将基于H.264的视频编解码器移植到Cortex-A8 ARM开发板上,利用H.264编码器对已经混沌加密的视频进行压缩,再通过局域网传输到另一块ARM开发板上进行解码和解密。实验结果证明:该系统不但加密效果好,而且也能快速可靠地传输,满足了实时视频加密通信的要求。

  12. Optical multiple-image encryption based on the chaotic structured phase masks under the illumination of a vortex beam in the gyrator domain.

    Science.gov (United States)

    Liansheng, Sui; Bei, Zhou; Xiaojuan, Ning; Ailing, Tian

    2016-01-11

    A novel multiple-image encryption scheme using the nonlinear iterative phase retrieval algorithm in the gyrator transform domain under the illumination of an optical vortex beam is proposed. In order to increase the randomness, the chaotic structured phase mask based on the logistic map, Fresnel zone plate and radial Hilbert mask is proposed. With the help of two chaotic phase masks, each plain image is encoded into two phase-only masks that are considered as the private keys by using the iterative phase retrieval process in the gyrator domain. Then, the second keys of all plain images are modulated into the ciphertext, which has the stationary white noise distribution. Due to the use of the chaotic structured phase masks, the problem of axis alignment in the optical setup can easily be solved. Two private keys are directly relative to the plain images, which makes that the scheme has high resistance against various potential attacks. Moreover, the use of the vortex beam that can integrates more system parameters as the additional keys into one phase mask can improve the security level of the cryptosystem, which makes the key space enlarged widely. Simulation results are given to verify the feasibility and robustness of the proposed encryption scheme.

  13. A Novel Image Encryption Scheme Based on Multi-orbit Hybrid of Discrete Dynamical System

    Directory of Open Access Journals (Sweden)

    Ruisong Ye

    2014-10-01

    Full Text Available A multi-orbit hybrid image encryption scheme based on discrete chaotic dynamical systems is proposed. One generalized Arnold map is adopted to generate three orbits for three initial conditions. Another chaotic dynamical system, tent map, is applied to generate one pseudo-random sequence to determine the hybrid orbit points from which one of the three orbits of generalized Arnold map. The hybrid orbit sequence is then utilized to shuffle the pixels' positions of plain-image so as to get one permuted image. To enhance the encryption security, two rounds of pixel gray values' diffusion is employed as well. The proposed encryption scheme is simple and easy to manipulate. The security and performance of the proposed image encryption have been analyzed, including histograms, correlation coefficients, information entropy, key sensitivity analysis, key space analysis, differential analysis, etc. All the experimental results suggest that the proposed image encryption scheme is robust and secure and can be used for secure image and video communication applications.

  14. Optical image encryption based on gyrator transformation and chaotic function%基于回转器变换和混沌的光图像加密

    Institute of Scientific and Technical Information of China (English)

    孔德彭; 杜学文; 孔德辉

    2012-01-01

    提出一种基于混沌理论和回转器的光图像加密技术,它由混沌函数产生的随机相位掩膜对光学系统进行加密和解密.利用三种混沌函数对比研究,它们分别是改进的Logistic映射、Hybrid映射和Baker映射,给出了基于混沌理论与光学系统研究思路和方法,通过盲加密、旋转角度的盲解密来证实其鲁棒性与可靠性,借助计算机进行了模拟,证实了光学加密和解密实施可行性,最后给出了均方差的有效性.%The paper proposed a novel method of optical image encryption based on gyrator transformation and chaos theory. The random phase masks generated by chaotic function is used to encrypt and decrypt the optical system. In this method, the three kinds of chaotic functions are compared and studied. They can improve the Logistic mapping, Hybrid mapping and Baker mapping respectively. It gives research idea and method based on chaos theory and optical system. Its robustness and reliability is proved by blind encryption and the blind decryption of the rotation angle. Through the simulation on computer, the feasibility of the optical encryption and decryption is proved and the validity of the mean square error is given finally.

  15. A Novel Concatenated Chaotic Communication System

    Institute of Scientific and Technical Information of China (English)

    2002-01-01

    A strategy for a novel concatenated chaotic communication system is presented. The transmitter system comprises chaotic turbo encoder and logistic CSK block in a serially concatenated form. Chaotic turbo code is capable of reducing bit error rate (BER) of the chaotic system in the AWGN channel. Through the chaotic turbo encoder, the coded sequence, which has quasi-chaotic properties, will be transmitted into the logistic CSK block. Having a very sensitive dependence on initial conditions of the map, the logistic CSK block can also be taken as the chaotic authentication method. The receiver, which has logistic demodulation block and chaotic decoder, is a linear asymptotic approximation to the inverse of the transmitter system. A chaotic iterative soft-decision decoding algorithm is also developed based on conventional maximum A posteriori decoding algorithm. At last, a two-step authentication method of this chaotic system is also presented.

  16. An Efficient Image Encryption Scheme Based on a Peter De Jong Chaotic Map and a RC4 Stream Cipher

    Science.gov (United States)

    Hanchinamani, Gururaj; Kulkarni, Linganagouda

    2015-09-01

    Security is a vital issue in communication and storage of the images and encryption is one of the ways to ensure the security. This paper proposes an efficient image encryption scheme based on a Peter De Jong chaotic map and a RC4 stream cipher. A Peter De Jong map is employed to determine the initial keys for the RC4 stream generator and also during permutation stage. The RC4 stream generator is utilized to generate the pseudo random numbers for the pixel value rotation and diffusion operations. Each encryption round is comprised of three stages: permutation, pixel value rotation and diffusion. The permutation is based on scrambling the rows and columns, in addition, circular rotations of the rows and columns in alternate orientations. The second stage circularly rotates each and every pixel value by utilizing M × N pseudo random numbers. The last stage carries out the diffusion twice by scanning the image in two different ways. Each of the two diffusions accomplishes the diffusion in two orientations (forward and backward) with two previously diffused pixels and two pseudo random numbers. The security and performance of the proposed method is assessed thoroughly by using key space, statistical, differential, entropy and performance analysis. Moreover, two rounds of the call to the encrypt function provide the sufficient security. The experimental results show that the proposed encryption scheme is computationally fast with high security.

  17. A new multi-scroll chaotic system

    Institute of Scientific and Technical Information of China (English)

    Wang Fa-Qiang; Liu Chong-Xin

    2006-01-01

    This paper proposes a new simple autonomous chaotic system which can generate multi-scroll chaotic attractors.The characteristic of this new multi-scroll chaotic system is that the 4n + 2m +4-scroll chaotic attractors are generated easily with n and m varying under n ≤ m. Various number of scroll chaotic attractors are illustrated not on ly by computer simulation but also by the realization of an electronic circuit experiment on EWB (Electronics Workbench).

  18. Modeling of deterministic chaotic systems

    Energy Technology Data Exchange (ETDEWEB)

    Lai, Y. [Department of Physics and Astronomy and Department of Mathematics, The University of Kansas, Lawrence, Kansas 66045 (United States); Grebogi, C. [Institute for Plasma Research, University of Maryland, College Park, Maryland 20742 (United States); Grebogi, C.; Kurths, J. [Department of Physics and Astrophysics, Universitaet Potsdam, Postfach 601553, D-14415 Potsdam (Germany)

    1999-03-01

    The success of deterministic modeling of a physical system relies on whether the solution of the model would approximate the dynamics of the actual system. When the system is chaotic, situations can arise where periodic orbits embedded in the chaotic set have distinct number of unstable directions and, as a consequence, no model of the system produces reasonably long trajectories that are realized by nature. We argue and present physical examples indicating that, in such a case, though the model is deterministic and low dimensional, statistical quantities can still be reliably computed. {copyright} {ital 1999} {ital The American Physical Society}

  19. A joint image encryption and watermarking algorithm based on compressive sensing and chaotic map

    Science.gov (United States)

    Xiao, Di; Cai, Hong-Kun; Zheng, Hong-Ying

    2015-06-01

    In this paper, a compressive sensing (CS) and chaotic map-based joint image encryption and watermarking algorithm is proposed. The transform domain coefficients of the original image are scrambled by Arnold map firstly. Then the watermark is adhered to the scrambled data. By compressive sensing, a set of watermarked measurements is obtained as the watermarked cipher image. In this algorithm, watermark embedding and data compression can be performed without knowing the original image; similarly, watermark extraction will not interfere with decryption. Due to the characteristics of CS, this algorithm features compressible cipher image size, flexible watermark capacity, and lossless watermark extraction from the compressed cipher image as well as robustness against packet loss. Simulation results and analyses show that the algorithm achieves good performance in the sense of security, watermark capacity, extraction accuracy, reconstruction, robustness, etc. Project supported by the Open Research Fund of Chongqing Key Laboratory of Emergency Communications, China (Grant No. CQKLEC, 20140504), the National Natural Science Foundation of China (Grant Nos. 61173178, 61302161, and 61472464), and the Fundamental Research Funds for the Central Universities, China (Grant Nos. 106112013CDJZR180005 and 106112014CDJZR185501).

  20. Chaotic Synchronzation System and Electrocardiogram

    Institute of Scientific and Technical Information of China (English)

    LiuqingPei; XinlaiDai; 等

    1997-01-01

    A mathematical model of chaotic synchronization of the heart-blood flow coupling dynamics is propsed,which is based on a seven dimension nonlinear dynamical system constructed by three subsystems of the sinoatrial node natural pacemaker,the cardiac relaxation oscillator and the dynamics of blood-fluid in heart chambers.The existence and robustness of the self-chaotic synchronization of the system are demonstrated by both methods of theoretical analysis and numerical simulation.The spectrum of Lyapunov exponent,the Lyapunov dimension and the Kolmogorov entropy are estimated when the system was undergoing the state of self-chaotic synchronization evolution.The time waveform of the dynamical variable,which represents the membrane potential of the cardiac integrative cell,shows a shape which is similar to that of the normal electrocardiogram(ECG) of humans,thus implying that the model possesses physiological significance functionally.

  1. Steganography and encrypting based on immunochemical systems.

    Science.gov (United States)

    Kim, Kyung-Woo; Bocharova, Vera; Halámek, Jan; Oh, Min-Kyu; Katz, Evgeny

    2011-05-01

    Steganography and encrypting were demonstrated with immuno-specific systems. IgG-proteins were used as invisible ink developed with complementary antibodies labeled with enzymes producing color spots. The information security was achieved by mixing the target protein-antigens used for the text encoding with masking proteins of similar composition but having different bioaffinity. Two different texts were simultaneously encoded by using two different encoding proteins in a mixture. Various encrypting techniques were exemplified with the immuno-systems used for the steganography. Future use of the developed approach for information protection and watermark-technology was proposed. Scaling down the encoded text to a micro-size is feasible with the use of nanotechnology.

  2. A new cryptosystem based on spatial chaotic system

    Science.gov (United States)

    Sun, Fuyan; Lü, Zongwang; Liu, Shutang

    2010-05-01

    Encryption of images is different from that of texts due to some intrinsic features of images such as bulk data capacity and high redundancy, which is generally difficult to handle by traditional methods. This paper proposes a new spatial chaos system (SCS), which is investigated by conducting FIPS 140-1 statistic test, and is especially useful for encryption of digital images. It is shown how to adapt a two dimensional (2D) ergodic matrix obtained from SCS to permute the positions of image pixels and confuse the relationship between the cipher image and plain image simultaneously. Experimental results show that the performance and security of the proposed cryptographic system are better than those of existing lower dimensional chaotic cryptographic systems.

  3. Chaotic and Arnold stripes in weakly chaotic Hamiltonian systems.

    Science.gov (United States)

    Custódio, M S; Manchein, C; Beims, M W

    2012-06-01

    The dynamics in weakly chaotic Hamiltonian systems strongly depends on initial conditions (ICs) and little can be affirmed about generic behaviors. Using two distinct Hamiltonian systems, namely one particle in an open rectangular billiard and four particles globally coupled on a discrete lattice, we show that in these models, the transition from integrable motion to weak chaos emerges via chaotic stripes as the nonlinear parameter is increased. The stripes represent intervals of initial conditions which generate chaotic trajectories and increase with the nonlinear parameter of the system. In the billiard case, the initial conditions are the injection angles. For higher-dimensional systems and small nonlinearities, the chaotic stripes are the initial condition inside which Arnold diffusion occurs.

  4. Communication Scheme via Cascade Chaotic Systems

    Institute of Scientific and Technical Information of China (English)

    HUA Chang-Chun; GUAN Xin-Ping

    2004-01-01

    @@ A new chaotic communication scheme is constructed. Different from the existing literature, cascade chaotic systems are employed. Two cascade modes are considered. First, we investigate the input to state cascade mode;cascade systems between different kinds of chaotic systems are considered. Then the parameter cascade case of chaotic system is studied. Under the different cases, the corresponding receivers are designed, which can succeed in recovering the former emitted signal. Simulations are performed to verify the validity of the proposed main results.

  5. Observers for a Class of Chaotic Systems

    Institute of Scientific and Technical Information of China (English)

    ZHOU Ping

    2006-01-01

    The design of observers for a class of practical physical chaotic systems is discussed.By using only one state variable and its time derivatives,a control law is constructed to achieve the synchronization between the investigated chaotic systems and their observers,and the results are proved theoretically.Several observers of chaotic systems are designed by using this method.

  6. Suggested Rules for Designing Secure Communication Systems Utilizing Chaotic Lasers: A Survey

    CERN Document Server

    Zhao, Qingchun

    2010-01-01

    Chaotic communications based on semiconductor lasers have aroused great research interest since 1990s. Physical-layer encryption using chaotic lasers is an alternative to transmit message rapidly and confidentially. There are some practical devices and setups for optical chaotic communications, which are intuitively considered to be secure. However, there is lack of a set of security evaluation rules for these communication setups. According to the recent literature, we summarize several criteria for optical chaotic communications to evaluate the security and point out some methods to enhance the security. These criteria and suggested rules are very helpful in designing secure communication systems using chaotic lasers. Finally we propose some possible hot topics on security analysis of optical chaotic communications in future.

  7. Application of Ica-Eemd to Secure Communications in Chaotic Systems

    Science.gov (United States)

    Lin, Shih-Lin; Tung, Pi-Cheng; Huang, Norden E.

    2012-04-01

    We propose the application of ICA-EEMD to secure communication systems. ICA-EEMD is employed to retrieve the message data encrypted by a mixture of Gaussian white noise and chaotic noise. The results showed that ICA-EEMD can effectively extract the two original message data.

  8. Advances and applications in chaotic systems

    CERN Document Server

    Volos, Christos

    2016-01-01

    This book reports on the latest advances and applications of chaotic systems. It consists of 25 contributed chapters by experts who are specialized in the various topics addressed in this book. The chapters cover a broad range of topics of chaotic systems such as chaos, hyperchaos, jerk systems, hyperjerk systems, conservative and dissipative systems, circulant chaotic systems, multi-scroll chaotic systems, finance chaotic system, highly chaotic systems, chaos control, chaos synchronization, circuit realization and applications of chaos theory in secure communications, mobile robot, memristors, cellular neural networks, etc. Special importance was given to chapters offering practical solutions, modeling and novel control methods for the recent research problems in chaos theory. This book will serve as a reference book for graduate students and researchers with a basic knowledge of chaos theory and control systems. The resulting design procedures on the chaotic systems are emphasized using MATLAB software.

  9. A new reduced-order observer for the synchronization of nonlinear chaotic systems: An application to secure communications

    Energy Technology Data Exchange (ETDEWEB)

    Castro-Ramírez, Joel, E-mail: ingcastro.7@gmail.com [Universidad Politécnica de Tlaxcala Av. Universidad Politecnica de Tlaxcala No.1, San Pedro Xalcaltzinco, Tepeyanco, Tlaxcala, C.P. 90180 (Mexico); Martínez-Guerra, Rafael, E-mail: rguerra@ctrl.cinvestav.mx [Departamento de Control Automático CINVESTAV-IPN, A.P. 14-740, D.F., México C.P. 07360 (Mexico); Cruz-Victoria, Juan Crescenciano, E-mail: juancrescenciano.cruz@uptlax.edu.mx [Universidad Politécnica de Tlaxcala Av. Universidad Politécnica de Tlaxcala No.1, San Pedro Xalcaltzinco, Tepeyanco, Tlaxcala, C.P. 90180 (Mexico)

    2015-10-15

    This paper deals with the master-slave synchronization scheme for partially known nonlinear chaotic systems, where the unknown dynamics is considered as the master system and we propose the slave system structure which estimates the unknown states. It introduced a new reduced order observer, using the concept of Algebraic Observability; we applied the results to a Sundarapandian chaotic system, and by means of some numerical simulations we show the effectiveness of the suggested approach. Finally, the proposed observer is utilized for encryption, where encryption key is the master system and decryption key is the slave system.

  10. Triple Encrypted Holographic Storage and Digital Holographic System

    Institute of Scientific and Technical Information of China (English)

    ZHU Yi-Chao; ZHANG Jia-Sen; GONG Qi-Huang

    2008-01-01

    We propose a triple encrypted holographic memory containing a digital holographic system. The original image is encrypted using double random phase encryption and stored in a LiNbO3:Fe crystal with shift-multiplexing. Both the reference beams of the memory and the digital holographic system are random phase encoded. We theoretically and experimentally demonstrate the encryption and decryption of multiple images and the results show high quality and good fault tolerance. The total key length of this system is larger than 4.7×1033.

  11. Image Encryption Algorithm Based on Dynamic DNA Coding and Chen’s Hyperchaotic System

    Directory of Open Access Journals (Sweden)

    Jian Zhang

    2016-01-01

    Full Text Available With the development of national information processes, specific image information from secret departments or individuals is often required to be confidentially transmitted. Numerous image encryption methods exist, especially since the initial value sensitivity and other characteristics of chaos theory and chaos theory-based encryption have become increasingly important in recent years. At present, DNA coding constitutes a new research direction of image encryption that uses the four base pairs of DNA code and image pixel values to establish a special correspondence, in order to achieve pixel diffusion. There are eight DNA encoding rules, and current methods of selecting the DNA encoding rules are largely fixed. Thus, the security of encoded data is not high. In this paper, we use the Lorenz chaotic system, Chen’s hyperchaotic system, and the DNA encoding combination and present a new image encryption algorithm that can dynamically select eight types of DNA encoding rules and eight types of DNA addition and subtraction rules, with significant improvements in security. Through simulation experiments and histograms, correlations, and NPCR analyses, we have determined that the algorithm possesses numerous desirable features, including good encryption effects and antishear and antinoise performances.

  12. Chaotic Synchronization Theory Video Encryption Technology Research%混沌同步理论视频加密技术研究

    Institute of Scientific and Technical Information of China (English)

    曾凡培

    2012-01-01

    加密技术一直是国内外研究热点问题.本文利用混沌同步理论对视频图像进行加密处理,采用混沌理论中的Logistic映射序列密码加密系统进行加密.实验结果说明了采用该方法能够有效地对视频图像进行加密.%encryption technology has been a research hotspot issues, this paper uses chaotic synchronization theory on video image encryption processing, using chaos theory in the Logistic mapping sequence cipher encryption encryption, the experimental results show the method can effective video image encryption.

  13. Impulsive Synchronization of Discrete Chaotic Systems

    Institute of Scientific and Technical Information of China (English)

    郑永爱; 年漪蓓; 刘曾荣

    2003-01-01

    Impulsive synchronization of two chaotic maps is reformulated as impulsive control of the synchronization error system. We then present a theorem on the asymptotic synchronization of two chaotic maps by using synchronization impulses with varying impulsive intervals. As an example and application of the theorem, we derives some sufficient conditions for the synchronization of two chaotic Lozi maps via impulsive control. The effectiveness of this approach has been demonstrated with chaotic Lozi map.

  14. Signal and reference wave dually encrypted digital holographic system

    Institute of Scientific and Technical Information of China (English)

    ZHU YiChao; ZHANG JiaSen; GONG QiHuang

    2008-01-01

    We propose a secure digital holographic system with signal and reference waves dually encrypted. Two random phase masks are used to encrypt the images in the input and the Fourier planes. The reference beam is phase encoded by another random phase mask. The encrypted image and the key are recorded by a CCD camera. The data can be processed or transferred directly by computer. We theoretically and experimentally demonstrate encryption and decryption of multiple images and the results show a high quality and good fault tolerance.

  15. Communications with chaotic optoelectronic systems cryptography and multiplexing

    Science.gov (United States)

    Rontani, Damien

    With the rapid development of optical communications and the increasing amount of data exchanged, it has become utterly important to provide effective architectures to protect sensitive data. The use of chaotic optoelectronic devices has already demonstrated great potential in terms of additional computational security at the physical layer of the optical network. However, the determination of the security level and the lack of a multi-user framework are two hurdles which have prevented their deployment on a large scale. In this thesis, we propose to address these two issues. First, we investigate the security of a widely used chaotic generator, the external cavity semiconductor laser (ECSL). This is a time-delay system known for providing complex and high-dimensional chaos, but with a low level of security regarding the identification of its most critical parameter, the time delay. We perform a detailed analysis of the in uence of the ECSL parameters to devise how higher levels of security can be achieved and provide a physical interpretation of their origin. Second, we devise new architectures to multiplex optical chaotic signals and realize multi-user communications at high bit rates. We propose two different approaches exploiting known chaotic optoelectronic devices. The first one uses mutually coupled ECSL and extends typical chaos-based encryption strategies, such as chaos-shift keying (CSK) and chaos modulation (CMo). The second one uses an electro-optical oscillator (EOO) with multiple delayed feedback loops and aims first at transposing coded-division multiple access (CDMA) and then at developing novel strategies of encryption and decryption, when the time-delays of each feedback loop are time-dependent.

  16. Image encryption schemes for joint photographic experts group and graphics interchange format formats based on three-dimensional baker with compound chaotic sequence generator

    Science.gov (United States)

    Ji, Shiyu; Tong, Xiaojun; Zhang, Miao

    2013-01-01

    We propose several methods to transplant the compound chaotic image encryption scheme with permutation based on three-dimensional (3-D) baker onto image formats such as the joint photographic experts group (JPEG) and graphics interchange format (GIF). The new methods avert the discrete cosine transform and quantization, which result in floating point precision loss, and succeed to encrypt and decrypt JPEG images lossless. The ciphered JPEG images generated by our solution own much better randomness than most other existing schemes. Our proposed method for GIF keeps the property of animation successfully. The security test results indicate the proposed methods have high security, and the speed of our algorithm is faster than classical solutions. Since JPEG and GIF image formats are popular contemporarily, we show that the prospect of chaotic image encryption is promising.

  17. Robust synchronization of chaotic systems via feedback

    Energy Technology Data Exchange (ETDEWEB)

    Femat, Ricardo [IPICYT, San Luis Potosi (Mexico). Dept. de Matematicas Aplicadas; Solis-Perales, Gualberto [Universidad de Guadalajara, Centro Univ. de Ciencias Exactas e Ingenierias (Mexico). Div. de Electronica y Computacion

    2008-07-01

    This volume includes the results derived during last ten years about both suppression and synchronization of chaotic -continuous time- systems. Along this time, the concept was to study how the intrinsic properties of dynamical systems can be exploited to suppress and to synchronize the chaotic behaviour and what synchronization phenomena can be found under feedback interconnection. A compilation of these findings is described in this book. This book shows a perspective on synchronization of chaotic systems. (orig.)

  18. Identification of fractional chaotic system parameters

    Energy Technology Data Exchange (ETDEWEB)

    Al-Assaf, Yousef E-mail: yassaf@aus.ac.ae; El-Khazali, Reyad E-mail: khazali@ece.ac.ae; Ahmad, Wajdi E-mail: wajdi@sharjah.ac.ae

    2004-11-01

    In this work, a technique is introduced for parameter identification of fractional order chaotic systems. Features are extracted, from chaotic system outputs obtained for different system parameters, using discrete Fourier transform (DFT), power spectral density (PSD), and wavelets transform (WT). Artificial neural networks (ANN) are then trained on these features to predict the fractional chaotic system parameters. A fractional chaotic oscillator model is used through this work to demonstrate the developed technique. Numerical results show that recurrent Jordan-Elman neural networks with features obtained by the PSD estimate via Welch functions give adequate identification accuracy compared to other techniques.

  19. Quantum Image Encryption Algorithm Based on Quantum Image XOR Operations

    Science.gov (United States)

    Gong, Li-Hua; He, Xiang-Tao; Cheng, Shan; Hua, Tian-Xiang; Zhou, Nan-Run

    2016-07-01

    A novel encryption algorithm for quantum images based on quantum image XOR operations is designed. The quantum image XOR operations are designed by using the hyper-chaotic sequences generated with the Chen's hyper-chaotic system to control the control-NOT operation, which is used to encode gray-level information. The initial conditions of the Chen's hyper-chaotic system are the keys, which guarantee the security of the proposed quantum image encryption algorithm. Numerical simulations and theoretical analyses demonstrate that the proposed quantum image encryption algorithm has larger key space, higher key sensitivity, stronger resistance of statistical analysis and lower computational complexity than its classical counterparts.

  20. The transient ladder synchronization of chaotic systems

    Energy Technology Data Exchange (ETDEWEB)

    Chen, H.-K. [Department of Industrial Engineering and Management, Hsiuping Institute of Technology, No. 11, Gungye Rd., Dali City, Taichung, Taiwan (China)]. E-mail: kanechen@giga.net.tw; Sheu, L.-J. [Department of Mechanical Engineering, Chung Hua University, Hsinchu, Taiwan (China)]. E-mail: ljsheu@chu.edu.tw

    2006-07-03

    A new type for chaotically synchronizing systems, transient ladder chaos synchronization, is proposed in this Letter. For some physical systems, chaotic synchronization is possible in only some of the variables. It is shown that, for the non-synchronizing variable, synchronization up to a constant difference for t{sub 1}=chaotic Froude pendulums. Numerical simulations are shown for demonstration.

  1. Chaotic evolution of the solar system

    Science.gov (United States)

    Sussman, Gerald J.; Wisdom, Jack

    1992-01-01

    The evolution of the entire planetary system has been numerically integrated for a time span of nearly 100 million years. This calculation confirms that the evolution of the solar system as a whole is chaotic, with a time scale of exponential divergence of about 4 million years. Additional numerical experiments indicate that the Jovian planet subsystem is chaotic, although some small variations in the model can yield quasi-periodic motion. The motion of Pluto is independently and robustly chaotic.

  2. 基于AAC音频编码与混沌加密的语音加密技术实现%Implementation of voice encryption technology based on AAC audio coding and chaotic encryption

    Institute of Scientific and Technical Information of China (English)

    王先泉

    2012-01-01

    为了减少语音的加密数据量,在此提出一种基于压缩编码和混沌加密的语音加密方案.采用先编码后加密的实现方法,语音编码算法采用AAC低复杂度编码算法,加密算法采用二维猫映射算法,在ARM9硬件平台下的实现结果表明AAC编码压缩比为18:1,猫映射加解密算法执行效率快,解密后无失真,实验结论证实该方案是可行的.在此将音频压缩算法与混沌加密结合起来,在不影响语音音质和加密效果的前提下减少了加密运算的数据量以及最终加密文件的大小,缩短了加解密语音数据所花费的时间,减少了语音保密通信所需要的带宽.%A voice encryption program based on compression encoding and chaotic encryption is proposed in this paper for reducing the voice encryption data size. The implementation method to encode first and then encrypt is used in the progam. AAC low complexity encoding algorithm is adopted in the speech coding algorithm. The two-dimensional cat map algorithm is adopted in the encryption algorithm. The result achieved in ARM9 hardware platform indicates that the AAC encoding ratio of 18:1. the cat map encryption-decryption algorithm has high execution efficiency, and there is no distortion after decryption. The experimental results confirm that the program is feasible. The innovation of this paper is the combination of audio compression algorithm and chaotic encryption. It reduced the data size of encryption operation and the size of final encrypted files, shortened the time spent in encrypting and decrypting the voice data, and narrowed the bandwidth required for voice secure communication on the premise not to affect the voice quality and encryption effect.

  3. An image encryption scheme based on the MLNCML system using DNA sequences

    Science.gov (United States)

    Zhang, Ying-Qian; Wang, Xing-Yuan; Liu, Jia; Chi, Ze-Lin

    2016-07-01

    We propose a new image scheme based on the spatiotemporal chaos of the Mixed Linear-Nonlinear Coupled Map Lattices (MLNCML). This spatiotemporal chaotic system has more cryptographic features in dynamics than the system of Coupled Map Lattices (CML). In the proposed scheme, we employ the strategy of DNA computing and one time pad encryption policy, which can enhance the sensitivity to the plaintext and resist differential attack, brute-force attack, statistical attack and plaintext attack. Simulation results and theoretical analysis indicate that the proposed scheme has superior high security.

  4. Analysis and Anti-Synchronization of a Novel Chaotic System via Active and Adaptive Controllers

    Directory of Open Access Journals (Sweden)

    V. Sundarapandian

    2013-09-01

    Full Text Available Anti-synchronization of chaotic systems deals with the problem of asymptotically synchronizing the sum of states of a pair of chaotic systems called master and slave systems with the help of controllers attached to the slave system. When two chaotic systems are anti-synchronized, then their states are asymptotically equal in magnitude, but opposite in phase. Anti-synchronization of chaotic systems has applications in many engineering areas such as secure communications, secure data encryption, cryptosystems, etc. This paper announces a novel 3-D chaotic system and describes its qualitative properties. Next, this paper deals with the design of active and adaptive controllers for synchronizing the states of identical novel chaotic systems. Active controllers are used when the system parameters are available for measurement and the synchronization result is established using Lyapunov stability theory. Adaptive controllers are used when the system parameters are unknown. In this case, estimates are used in lieu of the unknown system parameters and adaptive controllers are designed using adaptive control theory and Lyapunov stability theory. Numerical simulations using MATLAB have been shown to demonstrate the proposed active and adaptive synchronization results for novel chaotic systems.

  5. A Novel Bit-level Image Encryption Method Based on Chaotic Map and Dynamic Grouping

    Institute of Scientific and Technical Information of China (English)

    张国基; 沈彦

    2012-01-01

    In this paper,a novel bit-level image encryption method based on dynamic grouping is proposed.In the proposed method,the plain-image is divided into several groups randomly,then permutation-diffusion process on bit level is carried out.The keystream generated by logistic map is related to the plain-image,which confuses the relationship between the plain-image and the cipher-image.The computer simulation results of statistical analysis,information entropy analysis and sensitivity analysis show that the proposed encryption method is secure and reliable enough to be used for communication application.

  6. Chaotic control and synchronization for system identification.

    Science.gov (United States)

    Carroll, T L

    2004-04-01

    Research into applications of synchronized chaotic systems assumes that it will be necessary to build many different drive-response pairs, but little is known in general about designing higher dimensional chaotic flows. In this paper, I do not add any design techniques, but I show that it is possible to create multiple drive-response pairs from one chaotic system by applying chaos control techniques to the drive and response systems. If one can design one chaotic system with the desired properties, then many drive-response pairs can be built from this system, so that it is not necessary to solve the design problem more than once. I show both numerical simulations and experimental work with chaotic circuits. I also test the response systems for ability to overcome noise or other interference.

  7. Identification of Chaotic Systems with Application to Chaotic Communication

    Institute of Scientific and Technical Information of China (English)

    FENG Jiu-Chao; QIU Yu-Hui

    2004-01-01

    @@ We propose and develop a novel method to identify a chaotic system with time-varying bifurcation parameters via an observation signal which has been contaminated by additive white Gaussian noise. This method is based on an adaptive algorithm, which takes advantage of the good approximation capability of the radial basis function neural network and the ability of the extended Kalman filter for tracking a time-varying dynamical system. It is demonstrated that, provided the bifurcation parameter varies slowly in a time window, a chaotic dynamical system can be tracked and identified continuously, and the time-varying bifurcation parameter can also be retrieved in a sub-window of time via a simple least-square-fit method.

  8. System for processing an encrypted instruction stream in hardware

    Science.gov (United States)

    Griswold, Richard L.; Nickless, William K.; Conrad, Ryan C.

    2016-04-12

    A system and method of processing an encrypted instruction stream in hardware is disclosed. Main memory stores the encrypted instruction stream and unencrypted data. A central processing unit (CPU) is operatively coupled to the main memory. A decryptor is operatively coupled to the main memory and located within the CPU. The decryptor decrypts the encrypted instruction stream upon receipt of an instruction fetch signal from a CPU core. Unencrypted data is passed through to the CPU core without decryption upon receipt of a data fetch signal.

  9. Extended Logistic Chaotic Sequence and Its Performance Analysis

    Institute of Scientific and Technical Information of China (English)

    ZHANG Xuefeng; FAN Jiulun

    2007-01-01

    In order to improve performance and security of image encryption algorithm effectively based on chaotic sequences, an extended chaotic sequence generating method is presented based on logistic chaotic system using Bernstein form Bezier curve generating algorithm. In order to test the pseudorandom performance of the extended chaotic sequence, we also analyze random performance, autocorrelation performance, and balance performance of the extended chaotic sequence. Simulation results show that the extended chaotic sequence generated using our method is pseudorandom and its correlation performance and balance performance are good. As an application, we apply the extended chaotic sequence in image encryption algorithm, the simulation results show that the performance of the encrypted image using our method is better than that using logistic chaotic sequence.

  10. Synchronization Techniques for Chaotic Communication Systems

    CERN Document Server

    Jovic, Branislav

    2011-01-01

    Since the early 1990s, when synchronization of chaotic communication systems became a popular research subject, a vast number of scientific papers have been published. However, most of today's books on chaotic communication systems deal exclusively with the systems where perfect synchronization is assumed, an assumption which separates theoretical from practical, real world, systems. This book is the first of its kind dealing exclusively with the synchronization techniques for chaotic communication systems. It describes a number of novel robust synchronization techniques, which there is a lack

  11. Compression and Encryption of ECG Signal Using Wavelet and Chaotically Huffman Code in Telemedicine Application.

    Science.gov (United States)

    Raeiatibanadkooki, Mahsa; Quchani, Saeed Rahati; KhalilZade, MohammadMahdi; Bahaadinbeigy, Kambiz

    2016-03-01

    In mobile health care monitoring, compression is an essential tool for solving storage and transmission problems. The important issue is able to recover the original signal from the compressed signal. The main purpose of this paper is compressing the ECG signal with no loss of essential data and also encrypting the signal to keep it confidential from everyone, except for physicians. In this paper, mobile processors are used and there is no need for any computers to serve this purpose. After initial preprocessing such as removal of the baseline noise, Gaussian noise, peak detection and determination of heart rate, the ECG signal is compressed. In compression stage, after 3 steps of wavelet transform (db04), thresholding techniques are used. Then, Huffman coding with chaos for compression and encryption of the ECG signal are used. The compression rates of proposed algorithm is 97.72 %. Then, the ECG signals are sent to a telemedicine center to acquire specialist diagnosis by TCP/IP protocol.

  12. Output Regulation of the Arneodo Chaotic System

    Directory of Open Access Journals (Sweden)

    Sundarapandian Vaidyanathan

    2010-08-01

    Full Text Available This paper solves the problem of regulating the output of the Arneodo chaotic system (1981, which is one of the paradigms of chaotic dynamical systems. Explicitly, using the state feedback control laws, the output of the Arneodo chaotic system is regulated so as to track constant reference signals as well as to track periodic reference signals. The control laws are derived using the regulator equations of Byrnes and Isidori (1990, which provide the solution of the output regulation problem for nonlinear control systems involving neutrally stable exosystem dynamics. Numerical results are shown to verify the results.

  13. Partial Encryption of Entropy-Coded Video Compression Using Coupled Chaotic Maps

    Directory of Open Access Journals (Sweden)

    Fadi Almasalha

    2014-10-01

    Full Text Available Due to pervasive communication infrastructures, a plethora of enabling technologies is being developed over mobile and wired networks. Among these, video streaming services over IP are the most challenging in terms of quality, real-time requirements and security. In this paper, we propose a novel scheme to efficiently secure variable length coded (VLC multimedia bit streams, such as H.264. It is based on code word error diffusion and variable size segment shuffling. The codeword diffusion and the shuffling mechanisms are based on random operations from a secure and computationally efficient chaos-based pseudo-random number generator. The proposed scheme is ubiquitous to the end users and can be deployed at any node in the network. It provides different levels of security, with encrypted data volume fluctuating between 5.5–17%. It works on the compressed bit stream without requiring any decoding. It provides excellent encryption speeds on different platforms, including mobile devices. It is 200% faster and 150% more power efficient when compared with AES software-based full encryption schemes. Regarding security, the scheme is robust to well-known attacks in the literature, such as brute force and known/chosen plain text attacks.

  14. Inventive Cubic Symmetric Encryption System for Multimedia

    Directory of Open Access Journals (Sweden)

    Ali M Alshahrani

    2015-01-01

    Full Text Available Cryptography is a security technique that must be applied in both communication sides to pro- tect the data during its transmission through the n etwork from all kinds of attack. On the sender side, the original data will be changed into differ ent symbols or shapes by using a known key; this is called encryption. On the other communicati on side, the decryption process will be done and the data will be returned to its former shape b y using the agreed key. The importance of cryptography is to fulfil the communication securit y requirements. Real time applications (RTA are vulnerable for the moment because of their big size. However, some of the current algo- rithms are not really appropriate for use with thes e kinds of information. In this paper, a novel symmetric block cipher cryptography algorithm has b een illustrated and discussed. The system uses an 8x8x8 cube, and each cell contains a pair o f binary inputs. The cube can provide a huge number of combinations that can produce a very stro ng algorithm and a long key size. Due to the lightweight and fast technique used in this ide a, it is expected to be extremely rapid com- pared to the majority of current algorithms, such a s DES and AES.

  15. Chaotic dynamics of controlled electric power systems

    Science.gov (United States)

    Kozlov, V. N.; Trosko, I. U.

    2016-12-01

    The conditions for appearance of chaotic dynamics of electromagnetic and electromechanical processes in energy systems described by the Park-Gorev bilinear differential equations with account for lags of coordinates and restrictions on control have been formulated. On the basis of classical equations, the parameters of synchronous generators and power lines, at which the chaotic dynamics of energy systems appears, have been found. The qualitative and quantitative characteristics of chaotic processes in energy associations of two types, based on the Hopf theorem, and methods of nonstationary linearization and decompositions are given. The properties of spectral characteristics of chaotic processes have been investigated, and the qualitative similarity of bilinear equations of power systems and Lorentz equations have been found. These results can be used for modernization of the systems of control of energy objects. The qualitative and quantitative characteristics for power energy systems as objects of control and for some laws of control with the feedback have been established.

  16. SPECIAL DYNAMIC BEHAVIORS OF A TEMPORAL CHAOTIC SYSTEM

    Institute of Scientific and Technical Information of China (English)

    Mingxuan Zhang; Jinjiang Yu; Wangqiang Han

    2008-01-01

    When dynamic behaviors of temporal chaotic system are analyzed,we find that a temporal chaotic system has not only genetic dynamic behaviors of chaotic reflection,but also has phenomena influencing two chaotic attractors by original values.Along with the system parameters changing to certain value,the system will appear a break in chaotic region,and jump to another orbit of attractors.When it is opposite that the system parameters change direction,the temporal chaotic system appears complicated chaotic behaviors.

  17. Adaptive tracking control of chaotic systems

    Institute of Scientific and Technical Information of China (English)

    卢钊; 卢和

    2004-01-01

    It is important to develop control techniques able to control not only known chaos but also chaotic systems with unknown parameters. This paper proposes a novel adaptive tracking control approach for identifying the unknown parameters and controlling the chaos, which is not closely related to the particular chaotic system to be controlled. The global uniform boundedness of estimated parameters and the asymptotical stability of the tracking errors are proved by Lyapunov stability theory and LaSalle-Yoshizawa theorem. The suggested method enables stabilization of chaotic motion to a steady state ad well as tracking of any desired trajectory to be achieved in a systematic way. Computer simulation on a complex chaotic system illustrtes the effectiveness of the proposed control method.

  18. A chaotic communication system of improved performance based on the Derivative-free nonlinear Kalman filter

    Science.gov (United States)

    Rigatos, Gerasimos

    2016-07-01

    The Derivative-free nonlinear Kalman Filter is used for developing a communication system that is based on a chaotic modulator such as the Duffing system. In the transmitter's side, the source of information undergoes modulation (encryption) in which a chaotic signal generated by the Duffing system is the carrier. The modulated signal is transmitted through a communication channel and at the receiver's side demodulation takes place, after exploiting the estimation provided about the state vector of the chaotic oscillator by the Derivative-free nonlinear Kalman Filter. Evaluation tests confirm that the proposed filtering method has improved performance over the Extended Kalman Filter and reduces significantly the rate of transmission errors. Moreover, it is shown that the proposed Derivative-free nonlinear Kalman Filter can work within a dual Kalman Filtering scheme, for performing simultaneously transmitter-receiver synchronisation and estimation of unknown coefficients of the communication channel.

  19. Synchronization of chaotic systems with parameter driven by a chaotic signal

    Energy Technology Data Exchange (ETDEWEB)

    Li Guohui [Department of Communication Engineering, Shanghai University, Yanchang Road 149, Shanghai 200072 (China)] e-mail: ghlee@shl63.net

    2005-12-01

    Chaos control with driving parameter scheme in uncoupled identical chaotic oscillators is presented. By driving the parameter of chaotic systems using external chaotic signal, synchronization and anti-synchronization can be implemented. Numerical simulations show that either synchronization or anti-synchronization can appear depending significantly on initial condition and on driving strength. The proposed method is particularly suited for a variety of chaotic systems, which cannot couple with each other in engineering.

  20. Fuzzy modeling and synchronization of hyper chaotic systems

    Energy Technology Data Exchange (ETDEWEB)

    Zhang Hongbin [Center for Nonlinear and Complex Systems, School of Electronic Engineering, University of Electronic Science and Technology of China, Chengdu 610054 (China)] e-mail: zhanghb@uestc.edu.cn; Liao Xiaofeng [Center for Nonlinear and Complex Systems, School of Electronic Engineering, University of Electronic Science and Technology of China, Chengdu 610054 (China); Institute of Computer Science, Chongqing University, Chongqing 400044 (China); Yu Juebang [Center for Nonlinear and Complex Systems, School of Electronic Engineering, University of Electronic Science and Technology of China, Chengdu 610054 (China)

    2005-11-01

    This paper presents fuzzy model-based designs for synchronization of hyper chaotic systems. The T-S fuzzy models for hyper chaotic systems are exactly derived. Based on the T-S fuzzy hyper chaotic models, the fuzzy controllers for hyper chaotic synchronization are designed via the exact linearization techniques. Numerical examples are given to demonstrate the effectiveness of the proposed method.

  1. CHAOTIC CONTROL OF NONLINEAR SYSTEMS BASED ON IMPROVED CORRELATIVITY

    Institute of Scientific and Technical Information of China (English)

    Zhou Xiaoan; Zhang Jihong

    2003-01-01

    Chaotic sequences are basically ergodic random sequences. By improving correlativity of a chaotic signal, the chaotic dynamic system can be controlled to converge to its equilibrium point and, more significantly, to its multi-periodic orbits. Mathematical theory analysis is carried out and some computer simulation results are provided to support such controllability of the chaotic Henon system and the discrete coupled map lattice.

  2. Windtalking Computers: Frequency Normalization, Binary Coding Systems and Encryption

    CERN Document Server

    Zirkind, Givon

    2009-01-01

    The goal of this paper is to discuss the application of known techniques, knowledge and technology in a novel way, to encrypt computer and non-computer data. To-date most computers use base 2 and most encryption systems use ciphering and/or an encryption algorithm, to convert data into a secret message. The method of having the computer "speak another secret language" as used in human military secret communications has never been imitated. The author presents the theory and several possible implementations of a method for computers for secret communications analogous to human beings using a secret language or; speaking multiple languages. The kind of encryption scheme proposed significantly increases the complexity of and the effort needed for, decryption. As every methodology has its drawbacks, so too, the data of the proposed system has its drawbacks. It is not as compressed as base 2 would be. However, this is manageable and acceptable, if the goal is very strong encryption: At least two methods and their ...

  3. Impulsive generalized synchronization of chaotic system

    Institute of Scientific and Technical Information of China (English)

    Zhang Rong; Xu Zhen-Yuan; He Xue-Ming

    2007-01-01

    In this paper, with a given manifold y=H(x), we have constructed a response system for a continuous-time chaotic system as a drive system, and used impulsive control theory to demonstrate theoretically that this response system can achieve impulsive generalized synchronization(GS)with the drive system. Our theoretical result is supported by numerical examples.

  4. An adaptive strategy for controlling chaotic system

    Institute of Scientific and Technical Information of China (English)

    曹一家; 张红先

    2003-01-01

    This paper presents an adaptive strategy for controlling chaotic systems. By employing the phase space reconstruction technique in nonlinear dynamical systems theory, the proposed strategy transforms the nonlinear system into canonical form, and employs a nonlinear observer to estimate the uncertainties and disturbances of the nonlinear system, and then establishes a state-error-like feedback law. The developed control scheme allows chaos control in spite of modeling errors and parametric variations. The effectiveness of the proposed approach has been demonstrated through its applications to two well-known chaotic systems : Duffing oscillator and Rǒssler chaos.

  5. An adaptive strategy for controlling chaotic system.

    Science.gov (United States)

    Cao, Yi-Jia; Hang, Hong-Xian

    2003-01-01

    This paper presents an adaptive strategy for controlling chaotic systems. By employing the phase space reconstruction technique in nonlinear dynamical systems theory, the proposed strategy transforms the nonlinear system into canonical form, and employs a nonlinear observer to estimate the uncertainties and disturbances of the nonlinear system, and then establishes a state-error-like feedback law. The developed control scheme allows chaos control in spite of modeling errors and parametric variations. The effectiveness of the proposed approach has been demonstrated through its applications to two well-known chaotic systems: Duffing oscillator and Rössler chaos.

  6. An adaptive strategy for controlling chaotic system

    Institute of Scientific and Technical Information of China (English)

    曹一家; 张红先

    2003-01-01

    This paper presents an adaptive strategy for controlling chaotic systems. By employing the phase space reconstruction technique in nonlinear dynamical systems theory, the proposed strategy transforms the nonlinear system into canonical form, and employs a nonlinear observer to estimate the uncertainties and disturbances of the nonlinear system, and then establishes a state-error-like feedback law. The developed control scheme allows chaos control in spite of modeling errors and parametric variations. The effectiveness of the proposed approach has been demonstrated through its applications to two well-known chaotic systems: Duffing oscillator and Rossler chaos.

  7. Controlled transitions between cupolets of chaotic systems

    Energy Technology Data Exchange (ETDEWEB)

    Morena, Matthew A., E-mail: matthew.morena@wildcats.unh.edu; Short, Kevin M.; Cooke, Erica E. [Integrated Applied Mathematics Program, University of New Hampshire, Durham, New Hampshire 03824 (United States)

    2014-03-15

    We present an efficient control scheme that stabilizes the unstable periodic orbits of a chaotic system. The resulting orbits are known as cupolets and collectively provide an important skeleton for the dynamical system. Cupolets exhibit the interesting property that a given sequence of controls will uniquely identify a cupolet, regardless of the system's initial state. This makes it possible to transition between cupolets, and thus unstable periodic orbits, simply by switching control sequences. We demonstrate that although these transitions require minimal controls, they may also involve significant chaotic transients unless carefully controlled. As a result, we present an effective technique that relies on Dijkstra's shortest path algorithm from algebraic graph theory to minimize the transients and also to induce certainty into the control of nonlinear systems, effectively providing an efficient algorithm for the steering and targeting of chaotic systems.

  8. Controlled transitions between cupolets of chaotic systems.

    Science.gov (United States)

    Morena, Matthew A; Short, Kevin M; Cooke, Erica E

    2014-03-01

    We present an efficient control scheme that stabilizes the unstable periodic orbits of a chaotic system. The resulting orbits are known as cupolets and collectively provide an important skeleton for the dynamical system. Cupolets exhibit the interesting property that a given sequence of controls will uniquely identify a cupolet, regardless of the system's initial state. This makes it possible to transition between cupolets, and thus unstable periodic orbits, simply by switching control sequences. We demonstrate that although these transitions require minimal controls, they may also involve significant chaotic transients unless carefully controlled. As a result, we present an effective technique that relies on Dijkstra's shortest path algorithm from algebraic graph theory to minimize the transients and also to induce certainty into the control of nonlinear systems, effectively providing an efficient algorithm for the steering and targeting of chaotic systems.

  9. Generalized synchronization of two different chaotic systems

    Institute of Scientific and Technical Information of China (English)

    Li Guo-Hui

    2007-01-01

    In this paper, generalized synchronization of two different chaotic dynamical systems is investigated. An active control is adopted to construct a response system which synchronizes with a given drive system for a function relation.Based on rigorous analysis, the error system is asymptotically stable at the equilibrium. Numerical simulations illustrate the effectiveness of the proposed theory.

  10. Urey Prize Lecture - Chaotic dynamics in the solar system

    Science.gov (United States)

    Wisdom, Jack

    1987-01-01

    Attention is given to solar system cases in which chaotic solutions of Newton's equations are important, as in chaotic rotation and orbital evolution. Hyperion is noted to be tumbling chaotically; chaotic orbital evolution is suggested to be of fundamental importance to an accounting for the Kirkwood gaps in asteroid distribution and for the phase space boundary of the chaotic zone at the 3/1 mean-motion commensurability with Jupiter. In addition, chaotic trajectories in the 2/1 chaotic zone reach very high eccentricities by a route that carries them to high inclinations temporarily.

  11. Formulation of statistical mechanics for chaotic systems

    Indian Academy of Sciences (India)

    Vishnu M Bannur; Ramesh Babu Thayyullathil

    2009-02-01

    We formulate the statistical mechanics of chaotic system with few degrees of freedom and investigated the quartic oscillator system using microcanonical and canonical ensembles. Results of statistical mechanics are numerically verified by considering the dynamical evolution of quartic oscillator system with two degrees of freedom.

  12. Encryption key distribution via chaos synchronization

    Science.gov (United States)

    Keuninckx, Lars; Soriano, Miguel C.; Fischer, Ingo; Mirasso, Claudio R.; Nguimdo, Romain M.; Van der Sande, Guy

    2017-01-01

    We present a novel encryption scheme, wherein an encryption key is generated by two distant complex nonlinear units, forced into synchronization by a chaotic driver. The concept is sufficiently generic to be implemented on either photonic, optoelectronic or electronic platforms. The method for generating the key bitstream from the chaotic signals is reconfigurable. Although derived from a deterministic process, the obtained bit series fulfill the randomness conditions as defined by the National Institute of Standards test suite. We demonstrate the feasibility of our concept on an electronic delay oscillator circuit and test the robustness against attacks using a state-of-the-art system identification method. PMID:28233876

  13. Generalized Synchronization of Diverse Structure Chaotic Systems

    Institute of Scientific and Technical Information of China (English)

    KADIR Abdurahman; WANG Xing-Yuan; ZHAO Yu-Zhang

    2011-01-01

    @@ Generalized synchronization between two diverse structures of chaotic systems possesses significance in the research of synchronization.We propose an approach based on the Lyapunov stability theory to study it.This method can be used widely.Numerical examples are given to demonstrate the effectiveness of this approach.%Generalized synchronization between two diverse structures of chaotic systems possesses significance in the research of synchronization. We propose an approach based on the Lyapunov stability theory to study it. This method can be used widely. Numerical examples are given to demonstrate the effectiveness of this approach.

  14. Chaotic Turing pattern formation in spatiotemporal systems

    Institute of Scientific and Technical Information of China (English)

    XIAO Jing-hua; LI Hai-hong; YANG Jun-zhong; HU Gang

    2006-01-01

    The problem of Turing pattern formation has attracted much attention in nonlinear science as well as physics,chemistry and biology.So far spatially ordered Turing patterns have been observed in stationary and oscillatory media only.In this paper we find that spatially ordered Turing patterns exist in chaotic extended systems.And chaotic Turing patterns are strikingly rich and surprisingly beautiful with their space structures.These findings are in sharp contrast with the intuition of pseudo-randomness of chaos.The richness and beauty of the chaotic Turing patterns are attributed to a large variety of symmetry properties realized by various types of self-organizations of partial chaos synchronizations.

  15. Universal impedance fluctuations in wave chaotic systems.

    Science.gov (United States)

    Hemmady, Sameer; Zheng, Xing; Ott, Edward; Antonsen, Thomas M; Anlage, Steven M

    2005-01-14

    We experimentally investigate theoretical predictions of universal impedance fluctuations in wave chaotic systems using a microwave analog of a quantum chaotic infinite square well potential. We emphasize the use of the radiation impedance to remove the nonuniversal effects of the particular coupling between the outside world and the scatterer. Specific predictions that we test include the probability density functions (PDFs) of the real and imaginary parts of the universal impedance, the equality of the variances of these PDFs, and the dependence of these PDFs on a single loss parameter.

  16. A chaotic block cipher algorithm for image cryptosystems

    Science.gov (United States)

    Amin, Mohamed; Faragallah, Osama S.; Abd El-Latif, Ahmed A.

    2010-11-01

    Recently, many scholars have proposed chaotic cryptosystems in order to promote communication security. However, there are a number of major problems detected in some of those schemes such as weakness against differential attack, slow performance speed, and unacceptable data expansion. In this paper, we introduce a new chaotic block cipher scheme for image cryptosystems that encrypts block of bits rather than block of pixels. It encrypts 256-bits of plainimage to 256-bits of cipherimage within eight 32-bit registers. The scheme employs the cryptographic primitive operations and a non-linear transformation function within encryption operation, and adopts round keys for encryption using a chaotic system. The new scheme is able to encrypt large size of images with superior performance speed than other schemes. The security analysis of the new scheme confirms a high security level and fairly uniform distribution.

  17. A Design of Observers for a Discrete Chaotic System

    Institute of Scientific and Technical Information of China (English)

    2001-01-01

    It is very easy to design an observer for a discrete chaotic system which possesses one non-linear scalar quantity, and one can realize the synchronization between the investigated chaotic system and its observer easily. This method is applied to two chaotic systems.

  18. Robust synchronization of uncertain chaotic systems

    Institute of Scientific and Technical Information of China (English)

    Li Fang; Hu Ai-Hua; Xu Zheng-Yuan

    2006-01-01

    This paper investigates robust unified (lag, anticipated, and complete) synchronization of two coupled chaotic systems. By introducing the concepts of positive definite symmetrical matrix and Riccati inequality and the theory of robust stability, several criteria on robust synchronization are established. Extensive numerical simulations are also used to confirm the results.

  19. Projective synchronization of chaotic systems with bidirectional nonlinear coupling

    Indian Academy of Sciences (India)

    Mohammada Ali Khan; Swarup Poria

    2013-09-01

    This paper presents a new scheme for constructing bidirectional nonlinear coupled chaotic systems which synchronize projectively. Conditions necessary for projective synchronization (PS) of two bidirectionally coupled chaotic systems are derived using Lyapunov stability theory. The proposed PS scheme is discussed by taking as examples the so-called unified chaotic model, the Lorenz–Stenflo system and the nonautonomous chaotic Van der Pol oscillator. Numerical simulation results are presented to show the efficiency of the proposed synchronization scheme.

  20. Complexity and synchronization in stochastic chaotic systems

    Science.gov (United States)

    Son Dang, Thai; Palit, Sanjay Kumar; Mukherjee, Sayan; Hoang, Thang Manh; Banerjee, Santo

    2016-02-01

    We investigate the complexity of a hyperchaotic dynamical system perturbed by noise and various nonlinear speech and music signals. The complexity is measured by the weighted recurrence entropy of the hyperchaotic and stochastic systems. The synchronization phenomenon between two stochastic systems with complex coupling is also investigated. These criteria are tested on chaotic and perturbed systems by mean conditional recurrence and normalized synchronization error. Numerical results including surface plots, normalized synchronization errors, complexity variations etc show the effectiveness of the proposed analysis.

  1. SWITCHING CONTROL:FROM SIMPLE RULES TO COMPLEX CHAOTIC SYSTEMS

    Institute of Scientific and Technical Information of China (English)

    L(U) Jinhu

    2003-01-01

    This paper reviews and introduces some simple switching piecewise-linear controllers, which can generate complex chaotic behaviors from simple switching systems. The mechanism of simple switching rules creating complex chaotic behaviors is further investigated.

  2. CHAOTIC CONTROL OF NONLINEAR SYSTEMS BASED ON IMPROVED CORRELATIVITY

    Institute of Scientific and Technical Information of China (English)

    ZhouZiaoan; ZhangJihong

    2003-01-01

    Chaotic sequences are basically ergodic random esquences.By improving correlativity of a chaotic signal,the chaotic dynamic system can be controlled to converge to its equilibrium point and,more significantly,to its multi-periodic orbits.Mathematical theory analysis is carried out and some computer simulation results are provided to support such controllability of the chaotic Henon system and the discrete coupled map lattice.

  3. Chaotic Phenomena in Technical Control Systems

    DEFF Research Database (Denmark)

    Mosekilde, Erik

    1997-01-01

    The paper discusses a number of examples of technical control systems that can exhibit deterministic chaos and other forms of complex nonlinear behavior. These examples include thermostatically regulated radiators, closely placed refrigirators, and industrial cooling compressors. The paper...... continues to describe the possible perspective in driving our technical systems to operate in a chaotic regime. An example of a technical system capable of operating under unstable conditions is the F/A-18 fighter....

  4. Cascade adaptive control of uncertain unified chaotic systems

    Institute of Scientific and Technical Information of China (English)

    Wei Wei; Li Dong-Hai; Wang Jing

    2011-01-01

    The chaos control of uncertain unified chaotic systems is considered. Cascade adaptive control approach with only one control input is presented to stabilize states of the uncertain unified chaotic system at the zero equilibrium point.Since an adaptive controller based on dynamic compensation mechanism is employed, the exact model of the unified chaotic system is not necessarily required.By choosing appropriate controller parameters, chaotic phenomenon can be suppressed and the response speed is tunable. Sufficient condition for the asymptotic stability of the approach is derived. Numerical simulation results confirm that the cascade adaptive control approach with only one control signal is valid in chaos control of uncertain unified chaotic systems.

  5. Hardware Realization of Chaos Based Symmetric Image Encryption

    KAUST Repository

    Barakat, Mohamed L.

    2012-06-01

    This thesis presents a novel work on hardware realization of symmetric image encryption utilizing chaos based continuous systems as pseudo random number generators. Digital implementation of chaotic systems results in serious degradations in the dynamics of the system. Such defects are illuminated through a new technique of generalized post proceeding with very low hardware cost. The thesis further discusses two encryption algorithms designed and implemented as a block cipher and a stream cipher. The security of both systems is thoroughly analyzed and the performance is compared with other reported systems showing a superior results. Both systems are realized on Xilinx Vetrix-4 FPGA with a hardware and throughput performance surpassing known encryption systems.

  6. Frequency-Locking in Coupled Chaotic Systems

    Institute of Scientific and Technical Information of China (English)

    HU Bam-Bi; LIU Zong-Hua; ZHENG Zhi-Gang

    2001-01-01

    A novel approach is presented for measuring the phase synchronization (frequency-locking) of coupled N nonidentical oscillators, which can characterize frequency-locking for chaotic systems without well-defined phase by measuring the mean frequency. Numerical simulations confirm the existence of frequency-locking. The relations between the mean frequency and the coupling strength and the frequency mismatch are given. For the coupled hyperchaotic systems, the frequency-locking can be better characterized by more than one mean frequency curves.

  7. Entanglement production in Quantized Chaotic Systems

    CERN Document Server

    Bandyopadhyay, J N; Bandyopadhyay, Jayendra N.; Lakshminarayan, Arul

    2005-01-01

    Quantum chaos is a subject whose major goal is to identify and to investigate different quantum signatures of classical chaos. Here we study entanglement production in coupled chaotic systems as a possible quantum indicator of classical chaos. We use coupled kicked tops as a model for our extensive numerical studies. We find that, in general, presence of chaos in the system produces more entanglement. However, coupling strength between two subsystems is also very important parameter for the entanglement production. Here we show how chaos can lead to large entanglement which is universal and describable by random matrix theory (RMT). We also explain entanglement production in coupled strongly chaotic systems by deriving a formula based on RMT. This formula is valid for arbitrary coupling strengths, as well as for sufficiently long time. Here we investigate also the effect of chaos on the entanglement production for the mixed initial state. We find that many properties of the mixed state entanglement production...

  8. New robust chaotic system with exponential quadratic term

    Institute of Scientific and Technical Information of China (English)

    Bao Bo-Cheng; Li Chun-Biao; Xu Jian-Peing; Liu Zhong

    2008-01-01

    This paper proposes a new robust chaotic system of three-dimensional quadratic autonomous ordinary differential equations by introducing an exponential quadratic term.This system can display a double-scroll chaotic attractor with only two equilibria,and can be found to be robust chaotic in a very wide parameter domain with positive maximum Lyapunov exponent.Some basic dynamical properties and chaotic behaviour of novel attractor are studied.By numerical simulation,this paper verifies that the three-dimensional system can also evolve into periodic and chaotic behaviottrs by a constant controller.

  9. Exact Eigenfunctions of a Chaotic System

    CERN Document Server

    Ausländer, O M

    1997-01-01

    The interest in the properties of quantum systems, whose classical dynamics are chaotic, derives from their abundance in nature. The spectrum of such systems can be related, in the semiclassical approximation (SCA), to the unstable classical periodic orbits, through Gutzwiller's trace formula. The class of systems studied in this work, tiling billiards on the pseudo-sphere, is special in this correspondence being exact, via Selberg's trace formula. In this work, an exact expression for Green's function (GF) and the eigenfunctions (EF) of tiling billiards on the pseudo-sphere, whose classical dynamics are chaotic, is derived. GF is shown to be equal to the quotient of two infinite sums over periodic orbits, where the denominator is the spectral determinant. Such a result is known to be true for typical chaotic systems, in the leading SCA. From the exact expression for GF, individual EF can be identified. In order to obtain a SCA by finite series for the infinite sums encountered, resummation by analytic contin...

  10. Entanglement production in quantized chaotic systems

    Indian Academy of Sciences (India)

    Jayendra N Bandyopadhyay; Arul Lakshminarayan

    2005-04-01

    Quantum chaos is a subject whose major goal is to identify and to investigate different quantum signatures of classical chaos. Here we study entanglement production in coupled chaotic systems as a possible quantum indicator of classical chaos. We use coupled kicked tops as a model for our extensive numerical studies. We find that, in general, chaos in the system produces more entanglement. However, coupling strength between two subsystems is also a very important parameter for entanglement production. Here we show how chaos can lead to large entanglement which is universal and describable by random matrix theory (RMT). We also explain entanglement production in coupled strongly chaotic systems by deriving a formula based on RMT. This formula is valid for arbitrary coupling strengths, as well as for sufficiently long time. Here we investigate also the effect of chaos on the entanglement production for the mixed initial state. We find that many properties of the mixed-state entanglement production are qualitatively similar to the pure state entanglement production. We however still lack an analytical understanding of the mixed-state entanglement production in chaotic systems.

  11. Resonance eigenfunctions in chaotic scattering systems

    Indian Academy of Sciences (India)

    Martin Sieber

    2009-09-01

    We study the semiclassical structure of resonance eigenstates of open chaotic systems. We obtain semiclassical estimates for the weight of these states on different regions in phase space. These results imply that the long-lived right (left) eigenstates of the non-unitary propagator are concentrated in the semiclassical limit ħ → 0 on the backward (forward) trapped set of the classical dynamics. On this support the eigenstates display a self-similar behaviour which depends on the limiting decay rate.

  12. NEW SYMMETRIC ENCRYPTION SYSTEM BASED ON EVOLUTIONARY ALGORITHM

    Directory of Open Access Journals (Sweden)

    A. Mouloudi

    2015-12-01

    Full Text Available In this article, we present a new symmetric encryption system which is a combination of our ciphering evolutionary system SEC [1] and a new ciphering method called “fragmentation”. This latter allows the alteration of the appearance frequencies of characters from a given text. Our system has at its disposed two keys, the first one is generated by the evolutionary algorithm, the second one is generated after “fragmentation” part. Both of them are symmetric, session keys and strengthening the security of our system.

  13. Control uncertain continuous-time chaotic dynamical system

    Institute of Scientific and Technical Information of China (English)

    齐冬莲; 赵光宙

    2003-01-01

    The new chaos control method presented in this paper is useful for taking advantage of chaos. Based on sliding mode control theory, this paper provides a switching manifold controlling strategy of chaotic system, and also gives a kind of adaptive parameters estimated method to estimate the unknown systems' parameters by which chaotic dynamical system can be synchronized. Taking the Lorenz system as example, and with the help of this controlling strategy, we can synchronize chaotic systems with unknown parameters and different initial conditions.

  14. Control uncertain continuous-time chaotic dynamical system.

    Science.gov (United States)

    Qi, Dong-Lian; Zhao, Guang-Zhou

    2003-01-01

    The new chaos control method presented in this paper is useful for taking advantage of chaos. Based on sliding mode control theory, this paper provides a switching manifold controlling strategy of chaotic system, and also gives a kind of adaptive parameters estimated method to estimate the unknown systems' parameters by which chaotic dynamical system can be synchronized. Taking the Lorenz system as example, and with the help of this controlling strategy, we can synchronize chaotic systems with unknown parameters and different initial conditions.

  15. Cascaded Fresnel holographic image encryption scheme based on a constrained optimization algorithm and Henon map

    Science.gov (United States)

    Su, Yonggang; Tang, Chen; Chen, Xia; Li, Biyuan; Xu, Wenjun; Lei, Zhenkun

    2017-01-01

    We propose an image encryption scheme using chaotic phase masks and cascaded Fresnel transform holography based on a constrained optimization algorithm. In the proposed encryption scheme, the chaotic phase masks are generated by Henon map, and the initial conditions and parameters of Henon map serve as the main secret keys during the encryption and decryption process. With the help of multiple chaotic phase masks, the original image can be encrypted into the form of a hologram. The constrained optimization algorithm makes it possible to retrieve the original image from only single frame hologram. The use of chaotic phase masks makes the key management and transmission become very convenient. In addition, the geometric parameters of optical system serve as the additional keys, which can improve the security level of the proposed scheme. Comprehensive security analysis performed on the proposed encryption scheme demonstrates that the scheme has high resistance against various potential attacks. Moreover, the proposed encryption scheme can be used to encrypt video information. And simulations performed on a video in AVI format have also verified the feasibility of the scheme for video encryption.

  16. Fractional order control and synchronization of chaotic systems

    CERN Document Server

    Vaidyanathan, Sundarapandian; Ouannas, Adel

    2017-01-01

    The book reports on the latest advances in and applications of fractional order control and synchronization of chaotic systems, explaining the concepts involved in a clear, matter-of-fact style. It consists of 30 original contributions written by eminent scientists and active researchers in the field that address theories, methods and applications in a number of research areas related to fractional order control and synchronization of chaotic systems, such as: fractional chaotic systems, hyperchaotic systems, complex systems, fractional order discrete chaotic systems, chaos control, chaos synchronization, jerk circuits, fractional chaotic systems with hidden attractors, neural network, fuzzy logic controllers, behavioral modeling, robust and adaptive control, sliding mode control, different types of synchronization, circuit realization of chaotic systems, etc. In addition to providing readers extensive information on chaos fundamentals, fractional calculus, fractional differential equations, fractional contro...

  17. Chaotic attractor transforming control of hybrid Lorenz-Chen system

    Institute of Scientific and Technical Information of China (English)

    Qi Dong-Lian; Wang Qiao; Gu Hong

    2008-01-01

    Based on passive theory, this paper studies a hybrid chaotic dynamical system from the mathematics perspective to implement the control of system stabilization.According to the Jacobian matrix of the nonlinear system, the stabilization control region is gotten.The controller is designed to stabilize fast the minimum phase Lorenz-Chen chaotic system after equivalently transforming from chaotic system to passive system. The simulation results show that the system not only can be controlled at the different equilibria, but also can be transformed between the different chaotic attractors.

  18. Review: Image Encryption Using Chaos Based algorithms

    Directory of Open Access Journals (Sweden)

    Er. Ankita Gaur

    2014-03-01

    Full Text Available Due to the development in the field of network technology and multimedia applications, every minute thousands of messages which can be text, images, audios, videos are created and transmitted over wireless network. Improper delivery of the message may leads to the leakage of important information. So encryption is used to provide security. In last few years, variety of image encryption algorithms based on chaotic system has been proposed to protect image from unauthorized access. 1-D chaotic system using logistic maps has weak security, small key space and due to the floating of pixel values, some data lose occurs and proper decryption of image becomes impossible. In this paper different chaotic maps such as Arnold cat map, sine map, logistic map, tent map have been studied.

  19. Optical image encryption topology.

    Science.gov (United States)

    Yong-Liang, Xiao; Xin, Zhou; Qiong-Hua, Wang; Sheng, Yuan; Yao-Yao, Chen

    2009-10-15

    Optical image encryption topology is proposed based on the principle of random-phase encoding. Various encryption topological units, involving peer-to-peer, ring, star, and tree topologies, can be realized by an optical 6f system. These topological units can be interconnected to constitute an optical image encryption network. The encryption and decryption can be performed in both digital and optical methods.

  20. ADAPTIVE CONTROL AND IDENTIFICATION OF CHAOTIC SYSTEMS

    Institute of Scientific and Technical Information of China (English)

    LI ZHI; HAN CHONG-ZHAO

    2001-01-01

    A novel adaptive control and identification on-line method is proposed for a class of chaotic system with uncertain parameters. We prove that, using the presented method, a controller and identifier is developed which can remove chaos in nonlinear systems and make the system asymptotically stabilizing to an arbitrarily desired smooth orbit. And at the same time, estimates to uncertain parameters converge to their true values. The advantage of our method over the existing result is that the controller and identifier is directly constructed by analytic formula without knowing unknown bounds about uncertain parameters in advance. A computer simulation example is given to validate the proposed approach.

  1. Universal and nonuniversal properties of wave-chaotic scattering systems.

    Science.gov (United States)

    Yeh, Jen-Hao; Hart, James A; Bradshaw, Elliott; Antonsen, Thomas M; Ott, Edward; Anlage, Steven M

    2010-02-01

    Prediction of the statistics of scattering in typical wave-chaotic systems requires combining system-specific information with universal aspects of chaotic scattering as described by random matrix theory. This Rapid Communication shows that the average impedance matrix, which characterizes such system-specific properties, can be semiclassically calculated in terms of ray trajectories between ports. Theoretical predictions are compared with experimental results for a microwave billiard, demonstrating that the theory successfully uncovered universal statistics of wave-chaotic scattering systems.

  2. Tracking control of chaotic dynamical systems with feedback linearization

    Institute of Scientific and Technical Information of China (English)

    QI Dong-lian; MA Guo-jin

    2005-01-01

    A new method was proposed for tracking the desired output of chaotic dynamical system using the feedback linearization and nonlinear extended statement observer method. The feedback linearization was used to convert the nonlinear chaotic system into linear system. The extended Luenberger-like statements observer was designed to reconstructing and observing the unmeasured statements when the tracking controller was designed. By this way, the chaotic system could be forced to track variable desired output, which could be a time variant function or an equilibrium points.Taken the Lorenz chaotic system as example, the simulation results show the validity of the conclusion and effectiveness of the algorithm.

  3. ON FEEDBACK CONTROL OF DELAYED CHAOTIC SYSTEM

    Institute of Scientific and Technical Information of China (English)

    李丽香; 彭海朋; 卢辉斌; 关新平

    2001-01-01

    In this paper two different types of feedback control technique are discussed: the standard feedback control and the time-delay feedback control which have been successfully used in many control systems. In order to understand to what extent the two different types of control technique are useful in delayed chaotic systems, some analytic stabilization conditions for chaos control from the two types of control technique are derived based on Lyapunov stabilization arguments. Similarly, we discuss the tracking problem by applying the time-delay feedback control. Finally, numerical examples are provided.

  4. Circuit realization of the fractional-order unified chaotic system

    Institute of Scientific and Technical Information of China (English)

    Chen Xiang-Rong; Liu Chong-Xin; Wang Fa-Qiang

    2008-01-01

    This paper studies the chaotic behaviours of the fractional-order unified chaotic system.Based on the approximation method in frequency domain,it proposes an electronic circuit model of tree shape to realize the fractional-order operator.According to the tree shape model,an electronic circuit is designed to realize the 2.7-order unified chaotic system.Numerical simulations and circuit experiments have verified the existence of chaos in the fraction-order unified system.

  5. Adaptive generalized functional synchronization of Chaotic systems with unknown parameters

    Institute of Scientific and Technical Information of China (English)

    Wang Dong-Feng; Han Pu

    2008-01-01

    A universal adaptive generalized functional synchronization approach to any two different or identical chaotic systems with unknown parameters is proposed,based on a unified mathematical expression of a large class of chaotic system.Self-adaptive parameter law and control law are given in the form of a theorem.The synchronization between the three-dimensional R(o)ssler chaotic system and the four-dimensional Chen's hyper-chaotic system is studied as an example for illustration.The computer simulation results demonstrate the feasibility of the method proposed.

  6. Projective Synchronization in Time-Delayed Chaotic Systems

    Institute of Scientific and Technical Information of China (English)

    FENG Cun-Fang; ZHANG Yan; WANG Ying-Hai

    2006-01-01

    For the first time, we report on projective synchronization between two time delay chaotic systems with single time delays. It overcomes some limitations of the previous wort, where projective synchronization has been investigated only in finite-dimensional chaotic systems, so we can achieve projective synchronization in infinite-dimensional chaotic systems. We give a general method with which we can achieve projective synchronization in time-delayed chaotic systems. The method is illustrated using the famous delay-differential equations related to optical bistability. Numerical simulations fully support the analytical approach.

  7. Chaotic Synchronization of the Master Slave Chaotic Systems with Different Structures Based on BANG-BANG Control Principle

    Institute of Scientific and Technical Information of China (English)

    WANG Jian-Gen; ZHAO Yi

    2005-01-01

    @@ We propose a Bang-Bang control scheme that can synchronize master-slave chaotic systems. The chaotic systems considered here are structurally different from each other. Different from some control strategies reported previously, the scheme proposed here can be taken as a generalone that is independent of the chaotic system itself.

  8. Double Layer Image Security System using Encryption and Steganography

    Directory of Open Access Journals (Sweden)

    Samreen Sekhon Brar

    2016-03-01

    Full Text Available The image security on internet transfers is the concern of the hour as the breaching attacks into the image databases are rising every year. The hackers take advantage of the stolen personal and important images to fulfill their dangerous and unethical intentions. The image data theft can be used to defame a person on the internet by posting the illegal and unacceptable images of that person (internet user. Hence the images transfers have to be secure to ensure the privacy of the user's image data. In this research, a number of image security systems have been studied to evaluate the research gap. Majority of the existing image security systems are not up to date to protect against the latest breaching attacks. So, we have proposed an effective and robust image security framework particularly designed for the images. The proposed has been designed and implemented using MATLAB. In this research, a hybrid image security framework has been proposed to overcome the problem stated earlier, which will be implemented by combining various techniques together to achieve the image security goal. The techniques included in the combination would beimage compression, cryptography andsteganography. DWT compression has been used, because it is a stronger compression algorithm. The steganographed image would be compressed to reduce its size. Blowfish encryption algorithm would be used for the encryption purposes. It offers maximum throughput (faster and also energy efficient. Compressed image would be encrypted to enhance the image security. Real image will be hidden into another image. A cluster based steganographic technique will be used. Real image and face image would be analyzed, and the real image would be embedded in those areas of face image, where color schemes of the real image and face image would be most similar. Kmeans or Hierarchical clustering would be used as a clustering technique. An all new comparative analysis technique would be applied to

  9. Efficient methodology for implementation of Encrypted File System in User Space

    CERN Document Server

    Kumar, Dr Shishir; Jasra, Sameer Kumar; Jain, Akshay Kumar

    2009-01-01

    The Encrypted File System (EFS) pushes encryption services into the file system itself. EFS supports secure storage at the system level through a standard UNIX file system interface to encrypted files. User can associate a cryptographic key with the directories they wish to protect. Files in these directories (as well as their pathname components) are transparently encrypted and decrypted with the specified key without further user intervention; clear text is never stored on a disk or sent to a remote file server. EFS can use any available file system for its underlying storage without modifications, including remote file servers such as NFS. System management functions, such as file backup, work in a normal manner and without knowledge of the key. Performance is an important factor to users since encryption can be time consuming. This paper describes the design and implementation of EFS in user space using faster cryptographic algorithms on UNIX Operating system. Implementing EFS in user space makes it porta...

  10. Projective synchronization in fractional order chaotic systems and its control

    OpenAIRE

    Li, Chunguang

    2006-01-01

    The chaotic dynamics of fractional (non-integer) order systems have begun to attract much attention in recent years. In this paper, we study the projective synchronization in two coupled fractional order chaotic oscillators. It is shown that projective synchronization can also exist in coupled fractional order chaotic systems. A simple feedback control method for controlling the scaling factor onto a desired value is also presented.

  11. Random digital encryption secure communication system

    Science.gov (United States)

    Doland, G. D. (Inventor)

    1982-01-01

    The design of a secure communication system is described. A product code, formed from two pseudorandom sequences of digital bits, is used to encipher or scramble data prior to transmission. The two pseudorandom sequences are periodically changed at intervals before they have had time to repeat. One of the two sequences is transmitted continuously with the scrambled data for synchronization. In the receiver portion of the system, the incoming signal is compared with one of two locally generated pseudorandom sequences until correspondence between the sequences is obtained. At this time, the two locally generated sequences are formed into a product code which deciphers the data from the incoming signal. Provision is made to ensure synchronization of the transmitting and receiving portions of the system.

  12. Noise-Induced Riddling in Chaotic Systems

    Energy Technology Data Exchange (ETDEWEB)

    Lai, Y.; Grebogi, C. [Departments of Physics and Astronomy and of Mathematics, The University of Kansas, Lawrence, Kansas 66045 (United States)]|[Institute for Plasma Research, The University of Maryland, College Park, Maryland 20742 (United States)

    1996-12-01

    Recent works have considered the situation of riddling where, when a chaotic attractor lying in an invariant subspace is {ital transversely} {ital stable}, the basin of the attractor can be riddled with holes that belong to the basin of another attractor. We show that riddling can be induced by arbitrarily small random noise {ital even} {ital if} {ital the} {ital attractor} {ital is} {ital transversely} {ital unstable}, and we obtain universal scaling laws for noise-induced riddling. Our results imply that the phenomenon of riddling can be more prevalent than expected before, as noise is practically inevitable in dynamical systems. {copyright} {ital 1996 The American Physical Society.}

  13. Quantum ratchets in dissipative chaotic systems.

    Science.gov (United States)

    Carlo, Gabriel G; Benenti, Giuliano; Casati, Giulio; Shepelyansky, Dima L

    2005-04-29

    Using the method of quantum trajectories, we study a quantum chaotic dissipative ratchet appearing for particles in a pulsed asymmetric potential in the presence of a dissipative environment. The system is characterized by directed transport emerging from a quantum strange attractor. This model exhibits, in the limit of small effective Planck constant, a transition from quantum to classical behavior, in agreement with the correspondence principle. We also discuss parameter values suitable for the implementation of the quantum ratchet effect with cold atoms in optical lattices.

  14. Infinite-Dimensional Linear Dynamical Systems with Chaoticity

    CERN Document Server

    Fu Xin Chu; Fu, Xin-Chu; Duan, Jinqiao

    1998-01-01

    The authors present two results on infinite-dimensional linear dynamical systems with chaoticity. One is about the chaoticity of the backward shift map in the space of infinite sequences on a general Fréchet space. The other is about the chaoticity of a translation map in the space of real continuous functions. The chaos is shown in the senses of both Li-Yorke and Wiggins. Treating dimensions as freedoms, the two results imply that in the case of an infinite number of freedoms, a system may exhibit complexity even when the action is linear. Finally, the authors discuss physical applications of infinite-dimensional linear chaotic dynamical systems.

  15. Synchronization of spatiotemporal semiconductor lasers and its application in color image encryption

    CERN Document Server

    Banerjee, S; Mukhopadhyay, S; Misra, A P; 10.1016/j.optcom.2010.12.077

    2011-01-01

    Optical chaos is a topic of current research characterized by high-dimensional nonlinearity which is attributed to the delay-induced dynamics, high bandwidth and easy modular implementation of optical feedback. In light of these facts, which adds enough confusion and diffusion properties for secure communications, we explore the synchronization phenomena in spatiotemporal semiconductor laser systems. The novel system is used in a two-phase colored image encryption process. The high-dimensional chaotic attractor generated by the system produces a completely randomized chaotic time series, which is ideal in the secure encoding of messages. The scheme thus illustrated is a two-phase encryption method, which provides sufficiently high confusion and diffusion properties of chaotic cryptosystem employed with unique data sets of processed chaotic sequences. In this novel method of cryptography, the chaotic phase masks are represented as images using the chaotic sequences as the elements of the image. The scheme dras...

  16. A hyper-chaos-based image encryption algorithm using pixel-level permutation and bit-level permutation

    Science.gov (United States)

    Li, Yueping; Wang, Chunhua; Chen, Hua

    2017-03-01

    Recently, a number of chaos-based image encryption algorithms that use low-dimensional chaotic map and permutation-diffusion architecture have been proposed. However, low-dimensional chaotic map is less safe than high-dimensional chaotic system. And permutation process is independent of plaintext and diffusion process. Therefore, they cannot resist efficiently the chosen-plaintext attack and chosen-ciphertext attack. In this paper, we propose a hyper-chaos-based image encryption algorithm. The algorithm adopts a 5-D multi-wing hyper-chaotic system, and the key stream generated by hyper-chaotic system is related to the original image. Then, pixel-level permutation and bit-level permutation are employed to strengthen security of the cryptosystem. Finally, a diffusion operation is employed to change pixels. Theoretical analysis and numerical simulations demonstrate that the proposed algorithm is secure and reliable for image encryption.

  17. Towards generalized synchronization of strictly different chaotic systems

    Energy Technology Data Exchange (ETDEWEB)

    Femat, R. [Matematicas Aplicadas y Sistemas Computacionales, IPICYT, Apdo. Postal 3-90, 78291 Tangamanga, San Luis Potosi S.L.P. (Mexico)]. E-mail: rfemat@ipicyt.edu.mx; Kocarev, L. [Institute for Nonlinear Science, University of California, San Diego, 9500 Gilman Drive, La Jolla, CA 92093-0402 (United States)]. E-mail: lkocarev@ucsd.edu; Gerven, L. van [Department of Mechanical Engineering, Technische Universiteit Eindhoven (Netherlands); Monsivais-Perez, M.E. [Matematicas Aplicadas y Sistemas Computacionales, IPICYT, Camino a la Presa San Jose 2055, 78216 Lomas 4a Sec., San Luis Potosi S.L.P. (Mexico)

    2005-07-11

    This contribution addresses the problem of the generalized synchronization (GS) in different chaotic systems, and departs from chaotic systems in a triangular from, which can be derived from Lie derivatives. A state-feedback (full knowledge of both master and slave systems) scheme is designed, which achieves GS. The work includes illustrative examples; moreover an experimental setup is used to corroborate the obtained results.

  18. Synchronization between integer-order chaotic systems and a class of fractional-order chaotic systems via sliding mode control.

    Science.gov (United States)

    Chen, Diyi; Zhang, Runfan; Sprott, J C; Chen, Haitao; Ma, Xiaoyi

    2012-06-01

    In this paper, we focus on the synchronization between integer-order chaotic systems and a class of fractional-order chaotic system using the stability theory of fractional-order systems. A new sliding mode method is proposed to accomplish this end for different initial conditions and number of dimensions. More importantly, the vector controller is one-dimensional less than the system. Furthermore, three examples are presented to illustrate the effectiveness of the proposed scheme, which are the synchronization between a fractional-order Chen chaotic system and an integer-order T chaotic system, the synchronization between a fractional-order hyperchaotic system based on Chen's system and an integer-order hyperchaotic system, and the synchronization between a fractional-order hyperchaotic system based on Chen's system and an integer-order Lorenz chaotic system. Finally, numerical results are presented and are in agreement with theoretical analysis.

  19. Adaptive Synchronization of Memristor-based Chaotic Neural Systems

    Directory of Open Access Journals (Sweden)

    Xiaofang Hu

    2014-11-01

    Full Text Available Chaotic neural networks consisting of a great number of chaotic neurons are able to reproduce the rich dynamics observed in biological nervous systems. In recent years, the memristor has attracted much interest in the efficient implementation of artificial synapses and neurons. This work addresses adaptive synchronization of a class of memristor-based neural chaotic systems using a novel adaptive backstepping approach. A systematic design procedure is presented. Simulation results have demonstrated the effectiveness of the proposed adaptive synchronization method and its potential in practical application of memristive chaotic oscillators in secure communication.

  20. Modified Projective Synchronization between Different Fractional-Order Systems Based on Open-Plus-Closed-Loop Control and Its Application in Image Encryption

    Directory of Open Access Journals (Sweden)

    Hongjuan Liu

    2014-01-01

    Full Text Available A new general and systematic coupling scheme is developed to achieve the modified projective synchronization (MPS of different fractional-order systems under parameter mismatch via the Open-Plus-Closed-Loop (OPCL control. Based on the stability theorem of linear fractional-order systems, some sufficient conditions for MPS are proposed. Two groups of numerical simulations on the incommensurate fraction-order system and commensurate fraction-order system are presented to justify the theoretical analysis. Due to the unpredictability of the scale factors and the use of fractional-order systems, the chaotic data from the MPS is selected to encrypt a plain image to obtain higher security. Simulation results show that our method is efficient with a large key space, high sensitivity to encryption keys, resistance to attack of differential attacks, and statistical analysis.

  1. On closure parameter estimation in chaotic systems

    Directory of Open Access Journals (Sweden)

    J. Hakkarainen

    2012-02-01

    Full Text Available Many dynamical models, such as numerical weather prediction and climate models, contain so called closure parameters. These parameters usually appear in physical parameterizations of sub-grid scale processes, and they act as "tuning handles" of the models. Currently, the values of these parameters are specified mostly manually, but the increasing complexity of the models calls for more algorithmic ways to perform the tuning. Traditionally, parameters of dynamical systems are estimated by directly comparing the model simulations to observed data using, for instance, a least squares approach. However, if the models are chaotic, the classical approach can be ineffective, since small errors in the initial conditions can lead to large, unpredictable deviations from the observations. In this paper, we study numerical methods available for estimating closure parameters in chaotic models. We discuss three techniques: off-line likelihood calculations using filtering methods, the state augmentation method, and the approach that utilizes summary statistics from long model simulations. The properties of the methods are studied using a modified version of the Lorenz 95 system, where the effect of fast variables are described using a simple parameterization.

  2. Measuring-Basis Encrypted Quantum Key Distribution with Four-State Systems

    Institute of Scientific and Technical Information of China (English)

    CHEN Pan; LI Yan-Song; DENG Fu-Guo; LONG Gui-Lu

    2007-01-01

    A measuring-basis encrypted quantum key distribution scheme is proposed by using twelve nonorthogonal states in a four-state system and the measuring-basis encryption technique. In this scheme, two bits of classical information can be encoded on one four-state particle and the transmitted particles can be fully used.

  3. Persistent excitation in adaptive parameter identification of uncertain chaotic system

    Institute of Scientific and Technical Information of China (English)

    Zhao Jun-chan; Zhang Qun-Jiao; Lu Jun-An

    2011-01-01

    This paper studies the parameter identification problem of chaotic systems. Adaptive identification laws are proposed to estimate the parameters of uncertain chaotic systems. It proves that the asymptotical identification is ensured by a persistently exciting condition. Additionally, the method can be applied to identify the uncertain parameters with any number. Numerical simulations are given to validate the theoretical analysis.

  4. Impulsive Control for Fractional-Order Chaotic Systems

    Institute of Scientific and Technical Information of China (English)

    ZHONG Qi-Shui; BAO Jing-Fu; YU Yong-Bin; LIAO Xiao-Feng

    2008-01-01

    @@ We propose an impulsive control scheme for fractional-order chaotic systems. Based on the Takagi-Sugeno (T-S) fuzzy model and linear matrix inequalities (LMIs), some sufficient conditions are given to stabilize the fractional-order chaotic system via impulsive control. Numerical simulation shows the effectiveness of this approach.

  5. Chaotic Behavior in a Switched Dynamical System

    Directory of Open Access Journals (Sweden)

    Hassane Bouzahir

    2008-05-01

    Full Text Available We present a numerical study of an example of piecewise linear systems that constitute a class of hybrid systems. Precisely, we study the chaotic dynamics of the voltage-mode controlled buck converter circuit in an open loop. By considering the voltage input as a bifurcation parameter, we observe that the obtained simulations show that the buck converter is prone to have subharmonic behavior and chaos. We also present the corresponding bifurcation diagram. Our modeling techniques are based on the new French native modeler and simulator for hybrid systems called Scicos (Scilab connected object simulator which is a Scilab (scientific laboratory package. The followed approach takes into account the hybrid nature of the circuit.

  6. Chaotic Disintegration of the Inner Solar System

    CERN Document Server

    Batygin, Konstantin; Holman, Mathew J

    2014-01-01

    On timescales that greatly exceed an orbital period, typical planetary orbits evolve in a stochastic yet stable fashion. On even longer timescales, however, planetary orbits can spontaneously transition from bounded to unbound chaotic states. Large-scale instabilities associated with such behavior appear to play a dominant role in shaping the architectures of planetary systems, including our own. Here we show how such transitions are possible, focusing on the specific case of the long-term evolution of Mercury. We develop a simple analytical model for Mercury's dynamics and elucidate the origins of its short term stochastic behavior as well as of its sudden progression to unbounded chaos. Our model allows us to estimate the timescale on which this transition is likely to be triggered, i.e. the dynamical lifetime of the Solar System as we know it. The formulated theory is consistent with the results of numerical simulations and is broadly applicable to extrasolar planetary systems dominated by secular interact...

  7. Nonlinear Dynamics, Chaotic and Complex Systems

    Science.gov (United States)

    Infeld, E.; Zelazny, R.; Galkowski, A.

    2011-04-01

    Part I. Dynamic Systems Bifurcation Theory and Chaos: 1. Chaos in random dynamical systems V. M. Gunldach; 2. Controlling chaos using embedded unstable periodic orbits: the problem of optimal periodic orbits B. R. Hunt and E. Ott; 3. Chaotic tracer dynamics in open hydrodynamical flows G. Karolyi, A. Pentek, T. Tel and Z. Toroczkai; 4. Homoclinic chaos L. P. Shilnikov; Part II. Spatially Extended Systems: 5. Hydrodynamics of relativistic probability flows I. Bialynicki-Birula; 6. Waves in ionic reaction-diffusion-migration systems P. Hasal, V. Nevoral, I. Schreiber, H. Sevcikova, D. Snita, and M. Marek; 7. Anomalous scaling in turbulence: a field theoretical approach V. Lvov and I. Procaccia; 8. Abelian sandpile cellular automata M. Markosova; 9. Transport in an incompletely chaotic magnetic field F. Spineanu; Part III. Dynamical Chaos Quantum Physics and Foundations Of Statistical Mechanics: 10. Non-equilibrium statistical mechanics and ergodic theory L. A. Bunimovich; 11. Pseudochaos in statistical physics B. Chirikov; 12. Foundations of non-equilibrium statistical mechanics J. P. Dougherty; 13. Thermomechanical particle simulations W. G. Hoover, H. A. Posch, C. H. Dellago, O. Kum, C. G. Hoover, A. J. De Groot and B. L. Holian; 14. Quantum dynamics on a Markov background and irreversibility B. Pavlov; 15. Time chaos and the laws of nature I. Prigogine and D. J. Driebe; 16. Evolutionary Q and cognitive systems: dynamic entropies and predictability of evolutionary processes W. Ebeling; 17. Spatiotemporal chaos information processing in neural networks H. Szu; 18. Phase transitions and learning in neural networks C. Van den Broeck; 19. Synthesis of chaos A. Vanecek and S. Celikovsky; 20. Computational complexity of continuous problems H. Wozniakowski; Part IV. Complex Systems As An Interface Between Natural Sciences and Environmental Social and Economic Sciences: 21. Stochastic differential geometry in finance studies V. G. Makhankov; Part V. Conference Banquet

  8. Chiral scars in chaotic Dirac fermion systems.

    Science.gov (United States)

    Xu, Hongya; Huang, Liang; Lai, Ying-Cheng; Grebogi, Celso

    2013-02-08

    Do relativistic quantum scars in classically chaotic systems possess unique features that are not shared by nonrelativistic quantum scars? We report a class of relativistic quantum scars in massless Dirac fermion systems whose phases return to the original values or acquire a 2π change only after circulating twice about some classical unstable periodic orbits. We name such scars chiral scars, the successful identification of which has been facilitated tremendously by our development of an analytic, conformal-mapping-based method to calculate an unprecedentedly large number of eigenstates with high accuracy. Our semiclassical theory indicates that the physical origin of chiral scars can be attributed to a combined effect of chirality intrinsic to massless Dirac fermions and the geometry of the underlying classical orbit.

  9. Chaotic Diffusion in the Gliese-876 Planetary System

    CERN Document Server

    Martí, J G; Beaugé, C

    2016-01-01

    Chaotic diffusion is supposed to be responsible for orbital instabilities in planetary systems after the dissipation of the protoplanetary disk, and a natural consequence of irregular motion. In this paper we show that resonant multi-planetary systems, despite being highly chaotic, not necessarily exhibit significant diffusion in phase space, and may still survive virtually unchanged over timescales comparable to their age.Using the GJ-876 system as an example, we analyze the chaotic diffusion of the outermost (and less massive) planet. We construct a set of stability maps in the surrounding regions of the Laplace resonance. We numerically integrate ensembles of close initial conditions, compute Poincar\\'e maps and estimate the chaotic diffusion present in this system. Our results show that, the Laplace resonance contains two different regions: an inner domain characterized by low chaoticity and slow diffusion, and an outer one displaying larger values of dynamical indicators. In the outer resonant domain, th...

  10. Lighten Encryption Schemes for Secure and Private RFID Systems

    Science.gov (United States)

    Canard, Sébastien; Coisel, Iwen; Etrog, Jonathan

    We provide several concrete implementations of a generic method given by Vaudenay to construct secure privacy-preserving RFID authentication and identification systems. More precisely, we give the first instantiation of the Vaudenay's result by using the IND-CCA secure DHAES cryptosystem. Next we argue that weaker cryptosystems can also be used by recalling the WIPR RFID system and giving a new protocol based on the El Gamal encryption scheme. After that, we introduce a new generic construction based on the use of any IND-CPA secure public key cryptosystem together with a MAC scheme and describe a possibility using the Hash El Gamal cryptosystem. We finally compare all these schemes, both in terms of implementation and security, proving that, nowadays the DHAES and our Hash El Gamal based solutions appear as the most promising schemes.

  11. Steganographic optical image encryption system based on reversible data hiding and double random phase encoding

    Science.gov (United States)

    Chuang, Cheng-Hung; Chen, Yen-Lin

    2013-02-01

    This study presents a steganographic optical image encryption system based on reversible data hiding and double random phase encoding (DRPE) techniques. Conventional optical image encryption systems can securely transmit valuable images using an encryption method for possible application in optical transmission systems. The steganographic optical image encryption system based on the DRPE technique has been investigated to hide secret data in encrypted images. However, the DRPE techniques vulnerable to attacks and many of the data hiding methods in the DRPE system can distort the decrypted images. The proposed system, based on reversible data hiding, uses a JBIG2 compression scheme to achieve lossless decrypted image quality and perform a prior encryption process. Thus, the DRPE technique enables a more secured optical encryption process. The proposed method extracts and compresses the bit planes of the original image using the lossless JBIG2 technique. The secret data are embedded in the remaining storage space. The RSA algorithm can cipher the compressed binary bits and secret data for advanced security. Experimental results show that the proposed system achieves a high data embedding capacity and lossless reconstruction of the original images.

  12. The implementation of material data encryption QR code recognition system%物料数据加密QR码识别系统的实现

    Institute of Scientific and Technical Information of China (English)

    张文爱; 吕韬

    2012-01-01

    针对工业物料管理系统对于保密安全的要求,为采样的物料设计了一种加密的QR码,并在Android手机系统下实现识别.介绍了对RC4算法的混沌改进及混沌参数的选择,提出了将改进的RC4算法用于QR码加密的方法,实现了物科数据QR码的编码及识别.测试结果表明,该系统能满足实际应用对加密性能和识别速度的要求.%According to the privacy and security requirements in industrial management system, the paper designs an encrypted QR code for the sampling material and achieves the recognition on the Android mobile phone. The paper introduces the chaotic improvement of RC4 algorithm and the selection of the chaotic parameters. It puts forward that the improved KC4 algorithm be used for the encrypted QR code algorithm and it achieves the result of QR coding and recognition foi the material data. Test results show that it achieves the requirements for the encryption performance and the recognition speed.

  13. High speed data encryption and decryption using stimulated Brillouin scattering effect in optical fiber

    Science.gov (United States)

    Yi, Lilin; Zhang, Tao; Hu, Weisheng

    2011-11-01

    A novel all-optical encryption/decryption method based on stimulated Brillouin scattering (SBS) effect in optical fiber is proposed for the first time. The operation principle is explained in detail and the encryption and decryption performance is experimentally evaluated. The encryption keys could be the SBS gain amplitude, bandwidth, central wavelength and spectral shape, which are configurable and flexibly controlled by the users. We experimentally demonstrate the SBS encryption/decryption process of a 10.86-Gb/s non-return-to-zero (NRZ) data by using both phase-modulated and current-dithered Brillouin pumps for proof-of-concept. Unlike the traditional optical encryption methods of chaotic communications and optical code-division-multiplexing access (OCDMA), the SBS based encryption/decryption technique can directly upgrade the current optical communication system to a secure communication system without changing the terminal transceivers, which is completely compatible with the current optical communication systems.

  14. 一种基于混沌加密算法的保密视频会议方案及实现%A Video Conference Solution and Achievement Based on Chaotic Encryption Algorithms

    Institute of Scientific and Technical Information of China (English)

    刘银森

    2011-01-01

    针对目前混沌加密算法重于理论研究的现实,结合 P2P 网络传输结构的安全隐患,以 Windows Peer-to-Peer Networking 平台的 Graph 模块为基础,设计了一种运用混沌加密算法进行通信数据加密的 P2P 保密视频会议方案.方案在 P2P 网络结构采用 CA 机制,在网络传输结构上层采用混沌加密算法以及动态密钥管理,构建视频会议的安全环境.在实现该方案基础上探索了混沌加密算法的可用性.%Focusing on the reality of chaotic encryption algorithms more often appearing in theory, combining with the security risks of P2P network structure, this paper provides a new P2P secure video conferencing solution based on the Graph module of WPPN and a chaotic encryption algorithm. The application of CA mechanism inside P2P network structure and chaotic encryption with dynamic key management on data transmission creates a secure environment for video conference. After the realization of this solution, it probes a fact that the chaotic encryption algorithm is available.

  15. Chaos Control of Lure Like Chaotic System using Backstepping Controller Optimized by Chaotic Particle Swarm Optimization

    Directory of Open Access Journals (Sweden)

    Alireza Khosravi

    2012-03-01

    Full Text Available This paper deals with the design of optimal backstepping controller, by using the chaotic particle swarm optimization (CPSO algorithm to control of chaos in Lure like chaotic system. The backstepping method consists of parameters which could have positive values. The parameters are usually chosen optional by trial and error method. The controlled system provides different behaviors for different values of the parameters. It is necessary to select proper parameters to obtain a good response, because the improper selection of the parameters leads to inappropriate responses or even may lead to instability of the system. The proposed optimal backstepping controller without trial and error determines the parameters of backstepping controller automatically and intelligently by minimizing the Integral of Time multiplied Absolute Error (ITAE and squared controller output. Finally, the efficiency of the proposed optimal backstepping controller (OBSC is illustrated by implementing the method on the Lure like chaotic system.

  16. Dynamics of quantum trajectories in chaotic systems

    CERN Document Server

    Wisniacki, D A; Benito, R M

    2003-01-01

    Quantum trajectories defined in the de Broglie--Bohm theory provide a causal way to interpret physical phenomena. In this Letter, we use this formalism to analyze the short time dynamics induced by unstable periodic orbits in a classically chaotic system, a situation in which scars are known to play a very important role. We find that the topologies of the quantum orbits are much more complicated than that of the scarring and associated periodic orbits, since the former have quantum interference built in. Thus scar wave functions are necessary to analyze the corresponding dynamics. Moreover, these topologies imply different return routes to the vicinity of the initial positions, and this reflects in the existence of different contributions in each peak of the survival probability function.

  17. Hardware Realization of Chaos-based Symmetric Video Encryption

    KAUST Repository

    Ibrahim, Mohamad A.

    2013-05-01

    This thesis reports original work on hardware realization of symmetric video encryption using chaos-based continuous systems as pseudo-random number generators. The thesis also presents some of the serious degradations caused by digitally implementing chaotic systems. Subsequently, some techniques to eliminate such defects, including the ultimately adopted scheme are listed and explained in detail. Moreover, the thesis describes original work on the design of an encryption system to encrypt MPEG-2 video streams. Information about the MPEG-2 standard that fits this design context is presented. Then, the security of the proposed system is exhaustively analyzed and the performance is compared with other reported systems, showing superiority in performance and security. The thesis focuses more on the hardware and the circuit aspect of the system’s design. The system is realized on Xilinx Vetrix-4 FPGA with hardware parameters and throughput performance surpassing conventional encryption systems.

  18. Synchronization of chaotic fractional-order systems via linear control

    OpenAIRE

    Odibat, Zaid,; Corson, Nathalie; Aziz-Alaoui, Moulay; Bertelle, Cyrille

    2010-01-01

    International audience; The chaotic dynamics of fractional-order systems has attracted much attention recently. Chaotic synchronization of fractional-order systems is further studied in this paper. We investigate the chaos synchronization of two identical systems via a suitable linear controller applied to the response system. Based on the stability results of linear fractional-order systems, sufficient conditions for chaos synchronization of these systems are given. Control laws are derived ...

  19. Passive control of Permanent Magnet Synchronous Motor chaotic systems

    Institute of Scientific and Technical Information of China (English)

    QI Dong-lian; WANG Jia-jun; ZHAO Guang-zhou

    2005-01-01

    Permanent Magnet Synchronous Motor model can exhibit a variety of chaotic phenomena under some choices of system parameters and external input. Based on the property of passive system, the essential conditions were studied, by which Permanent Magnet Synchronous Motor chaotic system could be equivalent to passive system. Using Lyapunov stability theory, the convergence condition deciding the system's characters was discussed. In the convergence condition area, the equivalent passive system could be globally asymptotically stabilized by smooth state feedback.

  20. Control of Unknown Chaotic Systems Based on Neural Predictive Control

    Institute of Scientific and Technical Information of China (English)

    LIDong-Mei; WANGZheng-Ou

    2003-01-01

    We introduce the predictive control into the control of chaotic system and propose a neural network control algorithm based on predictive control. The proposed control system stabilizes the chaotic motion in an unknown chaotic system onto the desired target trajectory. The proposed algorithm is simple and its convergence speed is much higher than existing similar algorithms. The control system can control hyperchaos. We analyze the stability of the control system and prove the convergence property of the neural controller. The theoretic derivation and simulations demonstrate the effectiveness of the algorithm.

  1. Chaotic carrier pulse position modulation communication system and method

    Science.gov (United States)

    Abarbanel, Henry D. I.; Larson, Lawrence E.; Rulkov, Nikolai F.; Sushchik, Mikhail M.; Tsimring, Lev S.; Volkovskii, Alexander R.

    2001-01-01

    A chaotic carrier pulse position modulation communication system and method is disclosed. The system includes a transmitter and receiver having matched chaotic pulse regenerators. The chaotic pulse regenerator in the receiver produces a synchronized replica of a chaotic pulse train generated by the regenerator in the transmitter. The pulse train from the transmitter can therefore act as a carrier signal. Data is encoded by the transmitter through selectively altering the interpulse timing between pulses in the chaotic pulse train. The altered pulse train is transmitted as a pulse signal. The receiver can detect whether a particular interpulse interval in the pulse signal has been altered by reference to the synchronized replica it generates, and can therefore detect the data transmitted by the receiver. Preferably, the receiver predicts the earliest moment in time it can expect a next pulse after observation of at least two consecutive pulses. It then decodes the pulse signal beginning at a short time before expected arrival of a pulse.

  2. The chaotic "sculpting" of the Solar System

    Science.gov (United States)

    Tsiganis, K.

    2006-01-01

    The orbits of the large celestial bodies in our Solar System are stable for very long times, as can be shown by numerical simulation. This gives the erroneous impression of perpetual stability of the system. It is only when we study the orbital distribution of the numerous minor bodies in the Solar System that we discover the rich variety of complex dynamical processes that have in fact shaped our system. During the last decade, enormous progress has been made, in understanding the evolution of the system over the last ~3.9 Gy. However, it also became clear that, in order to unveil its behaviour during the first ~700 million years of its lifetime, we have to find convincing explanations for observations that appear as details of its dynamical architecture. In the following we are going to show how the two best known - and up to now unexplained - observations in the Solar System, namely (i) the heavily cratered surface of the Moon and (ii) the elliptic (and not circular) motion of the planets, lead us to the discovery of the chaotic sculpting of the Solar System [1]-[3].

  3. Chaotic and hyperchaotic attractors of a complex nonlinear system

    Energy Technology Data Exchange (ETDEWEB)

    Mahmoud, Gamal M; Al-Kashif, M A; Farghaly, A A [Department of Mathematics, Faculty of Science, Assiut University, Assiut 71516 (Egypt)

    2008-02-08

    In this paper, we introduce a complex nonlinear hyperchaotic system which is a five-dimensional system of nonlinear autonomous differential equations. This system exhibits both chaotic and hyperchaotic behavior and its dynamics is very rich. Based on the Lyapunov exponents, the parameter values at which this system has chaotic, hyperchaotic attractors, periodic and quasi-periodic solutions and solutions that approach fixed points are calculated. The stability analysis of these fixed points is carried out. The fractional Lyapunov dimension of both chaotic and hyperchaotic attractors is calculated. Some figures are presented to show our results. Hyperchaos synchronization is studied analytically as well as numerically, and excellent agreement is found.

  4. Equilibrium points and bifurcation control of a chaotic system

    Institute of Scientific and Technical Information of China (English)

    Liang Cui-Xiang; Tang Jia-Shi

    2008-01-01

    Based on the Routh-Hurwitz criterion,this paper investigates the stability of a new chaotic system.State feedback controllers are designed to control the chaotic system to the unsteady equilibrium points and limit cycle.Theoretical analyses give the range of value of control parameters to stabilize the unsteady equilibrium points of the chaotic system and its critical parameter for generating Hopf bifurcation.Certain nP periodic orbits can be stabilized by parameter adjustment.Numerical simulations indicate that the method can effectively guide the system trajectories to unsteady equilibrium points and periodic orbits.

  5. Complexity analyses of multi-wing chaotic systems

    Institute of Scientific and Technical Information of China (English)

    He Shao-Bo; Sun Ke-Hui; Zhu Cong-Xu

    2013-01-01

    The complexities of multi-wing chaotic systems based on the modified Chen system and a multi-segment quadratic function are investigated by employing the statistical complexity measure (SCM) and the spectral entropy (SE) algorithm.How to choose the parameters of the SCM and SE algorithms is discussed.The results show that the complexity of the multi-wing chaotic system does not increase as the number of wings increases,and it is consistent with the results of the Grassberger-Procaccia (GP) algorithm and the largest Lyapunov exponent (LLE) of the multi-wing chaotic system.

  6. Complexity analyses of multi-wing chaotic systems

    Science.gov (United States)

    He, Shao-Bo; Sun, Ke-Hui; Zhu, Cong-Xu

    2013-05-01

    The complexities of multi-wing chaotic systems based on the modified Chen system and a multi-segment quadratic function are investigated by employing the statistical complexity measure (SCM) and the spectral entropy (SE) algorithm. How to choose the parameters of the SCM and SE algorithms is discussed. The results show that the complexity of the multi-wing chaotic system does not increase as the number of wings increases, and it is consistent with the results of the Grassberger—Procaccia (GP) algorithm and the largest Lyapunov exponent (LLE) of the multi-wing chaotic system.

  7. Generalized Synchronization Between Different Fractional-Order Chaotic Systems

    Institute of Scientific and Technical Information of China (English)

    ZHOU Ping; CHENG Xue-Feng; ZHANG Nian-Ying

    2008-01-01

    In this paper, using scalar feedback controller and stability theory of fractional-order systems, a gener-alized synchronization method for different fractional-order chaotic systems is established. Simulation results show the effectiveness of the theoretical results.

  8. Chaotic synchronization for a class of fractional-order chaotic systems

    Institute of Scientific and Technical Information of China (English)

    Zhou Ping

    2007-01-01

    In this paper, a very simple synchronization method is presented for a class of fractional-order chaotic systems only via feedback control. The synchronization technique, based on the stability theory of fractional-order systems, is simple and theoretically rigorous.

  9. An optical CDMA system based on chaotic sequences

    Science.gov (United States)

    Liu, Xiao-lei; En, De; Wang, Li-guo

    2014-03-01

    In this paper, a coherent asynchronous optical code division multiple access (OCDMA) system is proposed, whose encoder/decoder is an all-optical generator. This all-optical generator can generate analog and bipolar chaotic sequences satisfying the logistic maps. The formula of bit error rate (BER) is derived, and the relationship of BER and the number of simultaneous transmissions is analyzed. Due to the good property of correlation, this coherent OCDMA system based on these bipolar chaotic sequences can support a large number of simultaneous users, which shows that these chaotic sequences are suitable for asynchronous OCDMA system.

  10. Function projective synchronization of different chaotic systems with uncertain parameters

    Energy Technology Data Exchange (ETDEWEB)

    Du Hongyue [Space Control and Inertial Technology Research Center, Harbin Institute of Technology, Harbin 150001 (China)], E-mail: du_hong_yue@yahoo.com.cn; Zeng Qingshuang; Wang Changhong [Space Control and Inertial Technology Research Center, Harbin Institute of Technology, Harbin 150001 (China)

    2008-08-11

    This Letter investigates the function projective synchronization of different chaotic systems with unknown parameters. By Lyapunov stability theory, the adaptive control law and the parameter update law are derived to make the states of two different chaotic systems asymptotically synchronized up to a desired scaling function. Numerical simulations on Lorenz system and Newton-Leipnik system are presented to verify the effectiveness of the proposed scheme.

  11. Spread spectrum communication system with chaotic frequency modulation

    Science.gov (United States)

    Volkovskii, A. R.; Tsimring, L. Sh.; Rulkov, N. F.; Langmore, I.

    2005-09-01

    A new spread spectrum communication system utilizing chaotic frequency modulation of sinusoidal signals is discussed. A single phase lock loop (PLL) system in the receiver is used both to synchronize the local chaotic oscillator and to recover the information signal. We study the dynamics of the synchronization process, stability of the PLL system, and evaluate the bit-error-rate performance of this chaos-based communication system.

  12. Passive control of a 4-scroll chaotic system

    Institute of Scientific and Technical Information of China (English)

    Wang Fa-Qiang; Liu Chong-Xin

    2007-01-01

    This paper studies the control of a new chaotic system which can generate 4-scroll attractors. Based on the properties of a passive system, it derives the essential conditions under which this new chaotic system could be equivalent to a passive system and globally asymptotically stabilize at a zero equilibrium point via smooth state feedback. Simulation results and circuit experiment show that the proposed chaos control method is effective.

  13. Image Encryption Algorithm Based on Chaotic Mappings%基于混沌映射的图像加密算法

    Institute of Scientific and Technical Information of China (English)

    卢辉斌; 肖霞

    2011-01-01

    This paper designs a new kind of image encryption algorithm which uses two Logistic systems. The auxiliary key m is obtained by a certain line data of the changed image matrix. The initial values of two Logistic mappings are modified by the key in. The Logistic mappings are used to generate the encryption sequences which are used to encrypt with every pixel of the image. Theoretical analysis and simulation results show the new algorithm not only has better sensitivity and very uniform pixel-value distribution, but also is simple and easy to achieve.%提出一种基于混沌映射的图像加密算法,该算法对图像进行拉伸融合折叠变换,通过映射其矩阵的某行数据,得到修改Logistic 映射初值的关键密钥m,并由2个Logistic混沌映射相结合产生加密序列,将图像与该序列进行相应代数运算,从而获得加密图像.理论分析和实验结果表明,该算法对密钥具有较强的敏感性,且加密图的像素值分布较均匀.

  14. CHAOTIC DISINTEGRATION OF THE INNER SOLAR SYSTEM

    Energy Technology Data Exchange (ETDEWEB)

    Batygin, Konstantin [Division of Geological and Planetary Sciences, California Institute of Technology, 1200 East California Boulevard, Pasadena, CA 91125 (United States); Morbidelli, Alessandro [Department Lagrange, Observatoire de la Côte d' Azur, F-06304 Nice (France); Holman, Mathew J. [Harvard-Smithsonian Center for Astrophysics, 60 Garden Street, Cambridge, MA 02138 (United States)

    2015-02-01

    On timescales that greatly exceed an orbital period, typical planetary orbits evolve in a stochastic yet stable fashion. On even longer timescales, however, planetary orbits can spontaneously transition from bounded to unbound chaotic states. Large-scale instabilities associated with such behavior appear to play a dominant role in shaping the architectures of planetary systems, including our own. Here we show how such transitions are possible, focusing on the specific case of the long-term evolution of Mercury. We develop a simple analytical model for Mercury's dynamics and elucidate the origins of its short-term stochastic behavior as well as of its sudden progression to unbounded chaos. Our model allows us to estimate the timescale on which this transition is likely to be triggered, i.e., the dynamical lifetime of the solar system as we know it. The formulated theory is consistent with the results of numerical simulations and is broadly applicable to extrasolar planetary systems dominated by secular interactions. These results constitute a significant advancement in our understanding of the processes responsible for sculpting of the dynamical structures of generic planetary systems.

  15. Bluetooth Based Chaos Synchronization Using Particle Swarm Optimization and Its Applications to Image Encryption

    Directory of Open Access Journals (Sweden)

    Tzu-Hsiang Hung

    2012-06-01

    Full Text Available This study used the complex dynamic characteristics of chaotic systems and Bluetooth to explore the topic of wireless chaotic communication secrecy and develop a communication security system. The PID controller for chaos synchronization control was applied, and the optimum parameters of this PID controller were obtained using a Particle Swarm Optimization (PSO algorithm. Bluetooth was used to realize wireless transmissions, and a chaotic wireless communication security system was developed in the design concept of a chaotic communication security system. The experimental results show that this scheme can be used successfully in image encryption.

  16. Bluetooth based chaos synchronization using particle swarm optimization and its applications to image encryption.

    Science.gov (United States)

    Yau, Her-Terng; Hung, Tzu-Hsiang; Hsieh, Chia-Chun

    2012-01-01

    This study used the complex dynamic characteristics of chaotic systems and Bluetooth to explore the topic of wireless chaotic communication secrecy and develop a communication security system. The PID controller for chaos synchronization control was applied, and the optimum parameters of this PID controller were obtained using a Particle Swarm Optimization (PSO) algorithm. Bluetooth was used to realize wireless transmissions, and a chaotic wireless communication security system was developed in the design concept of a chaotic communication security system. The experimental results show that this scheme can be used successfully in image encryption.

  17. Open-loop frequency response for a chaotic masking system

    Institute of Scientific and Technical Information of China (English)

    Huang Xian-Gao; Yu Pei; Huang Wei

    2006-01-01

    In this paper, a new numerical simulation approach is proposed for the study of open-loop frequency response of a chaotic masking system. Using Chua's circuit and the Lorenz system as illustrative examples, we have shown that one can employ chaos synchronization to separate the feedback network from a chaotic masking system, and then use numerical simulation to obtain the open-loop synchronization response, the phase response, and the amplitude response of a chaotic masking system. Based on the analysis of the frequency response, we have also proved that changing the amplitude of the exciting (input) signal within normal working domain does not influence the frequency response of the chaotic masking system. The new numerical simulation method developed in this paper can be extended to consider the open-loop frequency response of other systems described by differential or difference equations.

  18. From Fault-Diagnosis and Performance Recovery of a Controlled System to Chaotic Secure Communication

    Science.gov (United States)

    Hsu, Wen-Teng; Tsai, Jason Sheng-Hong; Guo, Fang-Cheng; Guo, Shu-Mei; Shieh, Leang-San

    Chaotic systems are often applied to encryption on secure communication, but they may not provide high-degree security. In order to improve the security of communication, chaotic systems may need to add other secure signals, but this may cause the system to diverge. In this paper, we redesign a communication scheme that could create secure communication with additional secure signals, and the proposed scheme could keep system convergence. First, we introduce the universal state-space adaptive observer-based fault diagnosis/estimator and the high-performance tracker for the sampled-data linear time-varying system with unanticipated decay factors in actuators/system states. Besides, robustness, convergence in the mean, and tracking ability are given in this paper. A residual generation scheme and a mechanism for auto-tuning switched gain is also presented, so that the introduced methodology is applicable for the fault detection and diagnosis (FDD) for actuator and state faults to yield a high tracking performance recovery. The evolutionary programming-based adaptive observer is then applied to the problem of secure communication. Whenever the tracker induces a large control input which might not conform to the input constraint of some physical systems, the proposed modified linear quadratic optimal tracker (LQT) can effectively restrict the control input within the specified constraint interval, under the acceptable tracking performance. The effectiveness of the proposed design methodology is illustrated through tracking control simulation examples.

  19. Chaos-based partial image encryption scheme based on linear fractional and lifting wavelet transforms

    Science.gov (United States)

    Belazi, Akram; Abd El-Latif, Ahmed A.; Diaconu, Adrian-Viorel; Rhouma, Rhouma; Belghith, Safya

    2017-01-01

    In this paper, a new chaos-based partial image encryption scheme based on Substitution-boxes (S-box) constructed by chaotic system and Linear Fractional Transform (LFT) is proposed. It encrypts only the requisite parts of the sensitive information in Lifting-Wavelet Transform (LWT) frequency domain based on hybrid of chaotic maps and a new S-box. In the proposed encryption scheme, the characteristics of confusion and diffusion are accomplished in three phases: block permutation, substitution, and diffusion. Then, we used dynamic keys instead of fixed keys used in other approaches, to control the encryption process and make any attack impossible. The new S-box was constructed by mixing of chaotic map and LFT to insure the high confidentiality in the inner encryption of the proposed approach. In addition, the hybrid compound of S-box and chaotic systems strengthened the whole encryption performance and enlarged the key space required to resist the brute force attacks. Extensive experiments were conducted to evaluate the security and efficiency of the proposed approach. In comparison with previous schemes, the proposed cryptosystem scheme showed high performances and great potential for prominent prevalence in cryptographic applications.

  20. Dual Key Speech Encryption Algorithm Based Underdetermined BSS

    Directory of Open Access Journals (Sweden)

    Huan Zhao

    2014-01-01

    Full Text Available When the number of the mixed signals is less than that of the source signals, the underdetermined blind source separation (BSS is a significant difficult problem. Due to the fact that the great amount data of speech communications and real-time communication has been required, we utilize the intractability of the underdetermined BSS problem to present a dual key speech encryption method. The original speech is mixed with dual key signals which consist of random key signals (one-time pad generated by secret seed and chaotic signals generated from chaotic system. In the decryption process, approximate calculation is used to recover the original speech signals. The proposed algorithm for speech signals encryption can resist traditional attacks against the encryption system, and owing to approximate calculation, decryption becomes faster and more accurate. It is demonstrated that the proposed method has high level of security and can recover the original signals quickly and efficiently yet maintaining excellent audio quality.

  1. Dual key speech encryption algorithm based underdetermined BSS.

    Science.gov (United States)

    Zhao, Huan; He, Shaofang; Chen, Zuo; Zhang, Xixiang

    2014-01-01

    When the number of the mixed signals is less than that of the source signals, the underdetermined blind source separation (BSS) is a significant difficult problem. Due to the fact that the great amount data of speech communications and real-time communication has been required, we utilize the intractability of the underdetermined BSS problem to present a dual key speech encryption method. The original speech is mixed with dual key signals which consist of random key signals (one-time pad) generated by secret seed and chaotic signals generated from chaotic system. In the decryption process, approximate calculation is used to recover the original speech signals. The proposed algorithm for speech signals encryption can resist traditional attacks against the encryption system, and owing to approximate calculation, decryption becomes faster and more accurate. It is demonstrated that the proposed method has high level of security and can recover the original signals quickly and efficiently yet maintaining excellent audio quality.

  2. Modified scaling function projective synchronization of chaotic systems

    Institute of Scientific and Technical Information of China (English)

    Xu Yu-Hua; Zhou Wu-Neng; Fang Jian-An

    2011-01-01

    This paper investigates a kind of modified scaling function projective synchronization of uncertain chaotic systems using an adaptive controller. The given scaling function in the new method can be an equilibrium point,a periodic orbit,or even a chaotic attractor in the phase space. Based on LaSa11e's invariance set principle,the adaptive control law is derived to make the states of two chaotic systems function projective synchronized. Some numerical examples are also given to show the effectiveness of the proposed method.

  3. Exploiting the natural redundancy of chaotic signals in communication systems

    Science.gov (United States)

    Marino; Rosa; Grebogi

    2000-09-18

    Chaotic signals can be used as carriers of information in communication systems. In this work we describe a simple encoding method that allows one to map any desired bit sequence into a chaotic waveform. The redundancy of the resulting information carrying signal enables us to devise a novel signal reconstruction technique that is able to recover relatively large parts of the chaotic signal starting from just a few samples of it. We show that this technique allows one to increase both the transmission reliability and the transmission rate of a communication system even in the presence of noise.

  4. Linear generalized synchronization of continuous-time chaotic systems

    Energy Technology Data Exchange (ETDEWEB)

    Lu Junguo E-mail: jglu@sjtu.edu.cn; Xi Yugeng

    2003-08-01

    This paper develops a general approach for constructing a response system to implement linear generalized synchronization (GS) with the drive continuous-time chaotic system. Some sufficient conditions of global asymptotic linear GS between the drive and response continuous-time chaotic systems are attained from rigorously modern control theory. Finally, we take Chua's circuit as an example for illustration and verification.

  5. Chaos control of chaotic dynamical systems using backstepping design

    Energy Technology Data Exchange (ETDEWEB)

    Yassen, M.T. [Mathematics Department, Faculty of Science, Mansoura University, Mansoura 35516 (Egypt)] e-mail: mtyassen@yahoo.com

    2006-01-01

    This work presents chaos control of chaotic dynamical systems by using backstepping design method. This technique is applied to achieve chaos control for each of the dynamical systems Lorenz, Chen and Lue systems. Based on Lyapunov stability theory, control laws are derived. We used the same technique to enable stabilization of chaotic motion to a steady state as well as tracking of any desired trajectory to be achieved in a systematic way. Numerical simulations are shown to verify the results.

  6. An Adaptive Tracking Control of Fractional-Order Chaotic Systems with Uncertain System Parameter

    OpenAIRE

    Ping Zhou; Rui Ding

    2011-01-01

    An adaptive tracking control scheme is presented for fractional-order chaotic systems with uncertain parameter. It is theoretically proved that this approach can make the uncertain parameter fractional-order chaotic system track any given reference signal and the uncertain system parameter is estimated through the adaptive tracking control process. Furthermore, the reference signal may belong to other integer-orders chaotic system or belong to different fractional-order chaotic system with di...

  7. Passive control of chaotic system with multiple strange attractors

    Institute of Scientific and Technical Information of China (English)

    Song Yun-Zhong; Zhao Guang-Zhou; Qi Dong-Lian

    2006-01-01

    In this paper we present a new simple controller for a chaotic system, that is, the Newton-Leipnik equation with two strange attractors: the upper attractor (UA) and the lower attractor (LA). The controller design is based on the passive technique. The final structure of this controller for original stabilization has a simple nonlinear feedback form.Using a passive method, we prove the stability of a closed-loop system. Based on the controller derived from the passive principle, we investigate three different kinds of chaotic control of the system, separately: the original control forcing the chaotic motion to settle down to the origin from an arbitrary position of the phase space; the chaotic intra-attractor control for stabilizing the equilibrium points only belonging to the upper chaotic attractor or the lower chaotic one,and the inter-attractor control for compelling the chaotic oscillation from one basin to another one. Both theoretical analysis and simulation results verify the validity of the suggested method.

  8. Decoherence, delocalization and irreversibility in quantum chaotic systems

    CERN Document Server

    Shiokawa, K; Shiokawa, K; Hu, B L

    1995-01-01

    Decoherence in quantum systems which are classically chaotic is studied. The Arnold cat map and the quantum kicked rotor are chosen as examples of linear and nonlinear chaotic systems. The Feynman-Vernon influence functional formalism is used to study the effect of the environment on the system. It is well-known that quantum coherence can obliterate many chaotic behavior in the corresponding classical system. But interaction with an environment can under general circumstances quickly diminish quantum coherence and reenact many classical chaotic behavior. How effective decoherence works to sustain chaos, and how the resultant behavior qualitatively differs from the quantum picture depend on the coupling of the system with the environment and the spectral density and temperature of the environment. We show how recurrence in the quantum cat map is lost and classical ergodicity is recovered due to the effect of the environment. Quantum coherence and diffusion suppression are instrumental to dynamical localization...

  9. Improved decryption quality and security of a joint transform correlator-based encryption system

    Science.gov (United States)

    Vilardy, Juan M.; Millán, María S.; Pérez-Cabré, Elisabet

    2013-02-01

    Some image encryption systems based on modified double random phase encoding and joint transform correlator architecture produce low quality decrypted images and are vulnerable to a variety of attacks. In this work, we analyse the algorithm of some reported methods that optically implement the double random phase encryption in a joint transform correlator. We show that it is possible to significantly improve the quality of the decrypted image by introducing a simple nonlinear operation in the encrypted function that contains the joint power spectrum. This nonlinearity also makes the system more resistant to chosen-plaintext attacks. We additionally explore the system resistance against this type of attack when a variety of probability density functions are used to generate the two random phase masks of the encryption-decryption process. Numerical results are presented and discussed.

  10. Synchronization of spatiotemporal semiconductor lasers and its application in color image encryption

    Science.gov (United States)

    Banerjee, S.; Rondoni, L.; Mukhopadhyay, S.; Misra, A. P.

    2011-05-01

    Optical chaos is a topic of current research characterized by high-dimensional nonlinearity which is attributed to the delay-induced dynamics, high bandwidth and easy modular implementation of optical feedback. In light of these facts, which add enough confusion and diffusion properties for secure communications, we explore the synchronization phenomena in spatiotemporal semiconductor laser systems. The novel system is used in a two-phase colored image encryption process. The high-dimensional chaotic attractor generated by the system produces a completely randomized chaotic time series, which is ideal in the secure encoding of messages. The scheme thus illustrated is a two-phase encryption method, which provides sufficiently high confusion and diffusion properties of chaotic cryptosystem employed with unique data sets of processed chaotic sequences. In this novel method of cryptography, the chaotic phase masks are represented as images using the chaotic sequences as the elements of the image. The scheme drastically permutes the positions of the picture elements. The next additional layer of security further alters the statistical information of the original image to a great extent along the three-color planes. The intermediate results during encryption demonstrate the infeasibility for an unauthorized user to decipher the cipher image. Exhaustive statistical tests conducted validate that the scheme is robust against noise and resistant to common attacks due to the double shield of encryption and the infinite dimensionality of the relevant system of partial differential equations.

  11. Impulsive control of chaotic systems with exogenous perturbations

    Institute of Scientific and Technical Information of China (English)

    Liu Xing-Wen; Huang Qin-Zhen; Gao Xin; Shao Shi-Quan

    2007-01-01

    The impulsive control of chaotic systems, which are subjected to unbounded exogenous perturbations, is considered. By using the theory of impulsive differential equation together with the fuzzy control technique, the authors propose an impulsive robust chaos controlling criterion expressed as linear matrix inequalities (LMIs). Based on the proposed control criterion, the procedure for designing impulsive controllers of common (perturbed) chaotic systems is provided. Finally, a numerical example is given to demonstrate the obtained theoretical result.

  12. Generation and dynamics analysis of N-scrolls existence in new translation-type chaotic systems

    Science.gov (United States)

    Liu, Yue; Guo, Shuxu

    2016-11-01

    In this paper, we propose two kinds of translation type chaotic systems for creating 2 N + 1-and 2(N + 1)-scrolls chaotic attractors from a simple three-dimensional system, which are named the translation-2 chaotic system (a12a21 0). We also propose the successful design criterion for constructing 2 N + 1-and 2(N + 1)-scrolls, respectively. Then, the dynamics property of the translation-2 chaotic system is studied in detail. MATLAB simulation results show that very sophisticated dynamical behaviors and unique chaotic behaviors of the system. Finally, the definition and criterion of multi-scroll attractors for the translation-3 chaotic system is obtained. Three representative examples are shown in some classical chaotic systems that can be equally obtained via the set parameters of the translation type chaotic system. Furthermore, we show that the translation type chaotic systems have similar but topologically non-equivalent chaotic attractors, and they are the three-dimensional ordinary differential equations.

  13. Blind adaptive identification of FIR channel in chaotic communication systems

    Institute of Scientific and Technical Information of China (English)

    Wang Bao-Yun; Tommy W.S.Chow; K.T.Ng

    2004-01-01

    In this paper we study the problem of blind channel identification in chaotic communications. An adaptive algorithm is proposed, which exploits the boundness property of chaotic signals. Compared with the EKF-based approach, the proposed algorithm achieves a great complexity gain but at the expense of a slight accuracy degradation.However, our approach enjoys the important advantage that it does not require the a priori information such as nonlinearity of chaotic dynamics and the variances of measurement noise and the coefficient model noise. In addition,our approach is applicable to the ARMA system.

  14. Pattern formations in chaotic spatio-temporal systems

    Indian Academy of Sciences (India)

    Ying Zhang; Shihong Wang; Jinhua Xiao; Hilda A Cerdeira; S Chen; Gang Hu

    2005-06-01

    Pattern formations in chaotic spatio-temporal systems modelled by coupled chaotic oscillators are investigated. We focus on various symmetry breakings and different kinds of chaos synchronization–desynchronization transitions, which lead to certain types of spontaneous spatial orderings and the emergence of some typical ordered patterns, such as rotating wave patterns with splay phase ordering (orientational symmetry breaking) and partially synchronous standing wave patterns with in-phase ordering (translational symmetry breaking). General pictures of the global behaviors of pattern formations and transitions in coupled chaotic oscillators are provided.

  15. Adaptive Control of the Chaotic System via Singular System Approach

    Directory of Open Access Journals (Sweden)

    Yudong Li

    2014-01-01

    Full Text Available This paper deals with the control problem of the chaotic system subject to disturbance. The sliding mode surface is designed by singular system approach, and sufficient condition for convergence is given. Then, the adaptive sliding mode controller is designed to make the state arrive at the sliding mode surface in finite time. Finally, Lorenz system is considered as an example to show the effectiveness of the proposed method.

  16. Efficiency of Monte Carlo sampling in chaotic systems.

    Science.gov (United States)

    Leitão, Jorge C; Lopes, J M Viana Parente; Altmann, Eduardo G

    2014-11-01

    In this paper we investigate how the complexity of chaotic phase spaces affect the efficiency of importance sampling Monte Carlo simulations. We focus on flat-histogram simulations of the distribution of finite-time Lyapunov exponent in a simple chaotic system and obtain analytically that the computational effort: (i) scales polynomially with the finite time, a tremendous improvement over the exponential scaling obtained in uniform sampling simulations; and (ii) the polynomial scaling is suboptimal, a phenomenon known as critical slowing down. We show that critical slowing down appears because of the limited possibilities to issue a local proposal in the Monte Carlo procedure when it is applied to chaotic systems. These results show how generic properties of chaotic systems limit the efficiency of Monte Carlo simulations.

  17. Wigner function statistics in classically chaotic systems

    CERN Document Server

    Horvat, M; Horvat, Martin; Prosen, Tomaz

    2003-01-01

    We have studied statistical properties of the values of the Wigner function W(x) of 1D quantum maps on compact 2D phase space of finite area V. For this purpose we have defined a Wigner function probability distribution P(w) = (1/V) int delta(w-W(x)) dx, which has, by definition, fixed first and second moment. In particular, we concentrate on relaxation of time evolving quantum state in terms of W(x), starting from a coherent state. We have shown that for a classically chaotic quantum counterpart the distribution P(w) in the semi-classical limit becomes a Gaussian distribution that is fully determined by the first two moments. Numerical simulations have been performed for the quantum sawtooth map and the quantized kicked top. In a quantum system with Hilbert space dimension N (similar 1/hbar) the transition of P(w) to a Gaussian distribution was observed at times t proportional to log N. In addition, it has been shown that the statistics of Wigner functions of propagator eigenstates is Gaussian as well in the...

  18. Chaotic diffusion in the Gliese-876 planetary system

    Science.gov (United States)

    Martí, J. G.; Cincotta, P. M.; Beaugé, C.

    2016-07-01

    Chaotic diffusion is supposed to be responsible for orbital instabilities in planetary systems after the dissipation of the protoplanetary disc, and a natural consequence of irregular motion. In this paper, we show that resonant multiplanetary systems, despite being highly chaotic, not necessarily exhibit significant diffusion in phase space, and may still survive virtually unchanged over time-scales comparable to their age. Using the GJ-876 system as an example, we analyse the chaotic diffusion of the outermost (and less massive) planet. We construct a set of stability maps in the surrounding regions of the Laplace resonance. We numerically integrate ensembles of close initial conditions, compute Poincaré maps and estimate the chaotic diffusion present in this system. Our results show that, the Laplace resonance contains two different regions: an inner domain characterized by low chaoticity and slow diffusion, and an outer one displaying larger values of dynamical indicators. In the outer resonant domain, the stochastic borders of the Laplace resonance seem to prevent the complete destruction of the system. We characterize the diffusion for small ensembles along the parameters of the outermost planet. Finally, we perform a stability analysis of the inherent chaotic, albeit stable Laplace resonance, by linking the behaviour of the resonant variables of the configurations to the different sub-structures inside the three-body resonance.

  19. Optical stream-cipher-like system for image encryption based on Michelson interferometer.

    Science.gov (United States)

    Yang, Bing; Liu, Zhengjun; Wang, Bo; Zhang, Yan; Liu, Shutian

    2011-01-31

    A novel optical image encryption scheme based on interference is proposed. The original image is digitally encoded into one phase-only mask by employing an improved Gerchberg-Saxton phase retrieval algorithm together with another predefined random phase mask which serves as the encryption key. The decryption process can be implemented optically based on Michelson interferometer by using the same key. The scheme can be regarded as a stream-cipher-like encryption system, the encryption and decryption keys are the same, however the operations are different. The position coordinates and light wavelength can also be used as additional keys during the decryption. Numerical simulations have demonstrated the validity and robustness of the proposed method.

  20. Reconstruction of time-delay systems from chaotic time series.

    Science.gov (United States)

    Bezruchko, B P; Karavaev, A S; Ponomarenko, V I; Prokhorov, M D

    2001-11-01

    We propose a method that allows one to estimate the parameters of model scalar time-delay differential equations from time series. The method is based on a statistical analysis of time intervals between extrema in the time series. We verify our method by using it for the reconstruction of time-delay differential equations from their chaotic solutions and for modeling experimental systems with delay-induced dynamics from their chaotic time series.

  1. Chaotic Dynamical Behaviour in Soliton Solutions for a New (2+1)-Dimensional Long Dispersive Wave System

    Institute of Scientific and Technical Information of China (English)

    张解放; 郑春龙; 孟剑平; 方建平

    2003-01-01

    With the help of variable separation approach, a quite general excitation of a new (2+l)-dimensional long dispersive wave system is derived. The chaotic behaviour, such as chaotic line soliton patterns, chaotic dromion patterns, chaotic-period patterns, and chaotic-chaotic patterns, in some new localized excitations are found by selecting appropriate functions.

  2. Cryptanalysis of "an improvement over an image encryption method based on total shuffling"

    Science.gov (United States)

    Akhavan, A.; Samsudin, A.; Akhshani, A.

    2015-09-01

    In the past two decades, several image encryption algorithms based on chaotic systems had been proposed. Many of the proposed algorithms are meant to improve other chaos based and conventional cryptographic algorithms. Whereas, many of the proposed improvement methods suffer from serious security problems. In this paper, the security of the recently proposed improvement method for a chaos-based image encryption algorithm is analyzed. The results indicate the weakness of the analyzed algorithm against chosen plain-text.

  3. Modelling and Research of Chaotic Rossler System with LabView and Multisim Software Environment

    Directory of Open Access Journals (Sweden)

    V. B. Rusyn

    2014-12-01

    Full Text Available Introduction. In this paper is presented a theoretical basis of chaotic Rossler system. Modelling of Chaotic Rossler System in LabView. Submitted programming interface that has been developed in LabView software environment. It allows generating and researching chaotic Rossler system. Submitted by time distribution of three chaotic coordinates and spectral analysis. Also submitted values of variables in which generated different period (controlled attractors of the chaotic Rossler system. The software interface demonstrates masking and decrypt information carrier of the chaotic Rossler system. Modelling of Chaotic Rossler System in MultiSim. Using MultiSim software environment conducted scheme technical analysis circuit of a generator that implements a chaotic Rossler system. Conclusions. Modelled circuit of generator confirming correspondence scheme-technical solution to mathematical apparatus that describing chaotic Rossler system. Keywords: chaos; control; system; Rossler; LabView; MultiSim

  4. Chaos Synchronization on Parameters Adaptive Control for Chen Chaotic System

    Institute of Scientific and Technical Information of China (English)

    ZHOU Ping

    2003-01-01

    Chaos synchronization of Chen chaotic system for parameters unknown is discussed in this paper using a scalar output. Using the concept of conditional Lyapunov exponents, the negativity of all Lyapunov exponents shows the synchronization of transmitter systems with receiver systems even though system parametes are not known to receiver systems.

  5. Product Anti-counterfeit Research Based on Chaotic Encryption and QR Code%基于映射混沌加密和QR码的产品防伪研究

    Institute of Scientific and Technical Information of China (English)

    丁红胜

    2013-01-01

    In order to realize the product identification security requirements based on the QR code,a QR code encryption and decryption algorithm based on Logistic map chaotic is proposed,the key parameterμvalue is close to 4, x0∈[0,1],and Logistic chaotic sequences generated by two values,then cipher text is formed by original information of the Unicode (or ASCII) coding XOR. The encryption and decryption is the inverse process. Because the selected Logistic iteration formula in key parametersμ,x0 value have an infinite variety of possibility theory,its encryption security is high,compared to RSA,DES encryption algorithm,this algorithm is simple,the efficiency of implementation is high,achieving the security,at the same time not damaging the QR code image structure.%  为了实现基于QR码的产品标识防伪的要求,提出了一种基于Logistic映射混沌的QR码加密和解密算法。密钥参数μ取值接近4,x0∈[0,1],将Logistic迭代公式产生的混沌序列二值化,通过与原始信息的Unicode(或ASCII)编码异或,形成密文,从而实现对信息的加密,解密过程是加密的逆过程。由于选取Logistic迭代公式中密钥参数μ,x0的取值有无限多种可能性,理论上其加密安全性高,相比RSA,DES加密算法,该算法简单、执行效率高,实现防伪的同时不会破坏QR码图像结构。

  6. Git as an Encrypted Distributed Version Control System

    Science.gov (United States)

    2015-03-01

    compression. 59 Figure 16. GV2 Repository Size Increase Diagram Figure 16 shows the added components of overhead with the GCM encryption...Chacon, S. (2014). Git- SCM . Retrieved from http://git-scm.com. [3] Chacon, S. (2014) Git Community Book. Retrieved from http://schacon.github.io

  7. Realization of fractional-order Liu chaotic system by circuit

    Institute of Scientific and Technical Information of China (English)

    Lu Jun-Jie; Liu Chong-Xin

    2007-01-01

    In this paper, chaotic behaviours in the fractional-order Liu system are studied. Based on the approximation theory of fractional-order operator, circuits are designed to simulate the fractional- order Liu system with q = 0.1 - 0.9 in a step of 0.1, and an experiment has demonstrated the 2.7-order Liu system. The simulation results prove that the chaos exists indeed in the fractional-order Liu system with an order as low as 0.3. The experimental results prove that the fractional-order chaotic system can be realized by using hardware devices, which lays the foundation for its practical applications.

  8. Increased-order generalized synchronization of chaotic and hyperchaotic systems

    Indian Academy of Sciences (India)

    K S Ojo; S T Ogunjo; A N Njah; I A Fuwape

    2015-01-01

    This paper presents increased-order generalized synchronization (GS) of chaotic and hyperchaotic systems with different order based on active control technique. By this technique, we design suitable control functions to achieve GS between (i) a new three-dimensional (3D) chaotic system and four-dimensional (4D) hyperchaotic Lorenz system and (ii) four-dimensional hyperchaotic Lorenz system and five-dimensional (5D) hyperchaotic Lorenz system. The corresponding numerical simulation results are presented to verify the effectiveness of this technique.

  9. Control of Unknown Chaotic Systems Based on Neural Predictive Control

    Institute of Scientific and Technical Information of China (English)

    LI Dong-Mei; WANG Zheng-Ou

    2003-01-01

    We introduce the predictive control into the control of chaotic system and propose a neural networkcontrol algorithm based on predictive control. The proposed control system stabilizes the chaotic motion in an unknownchaotic system onto the desired target trajectory. The proposed algorithm is simple and its convergence speed is muchhigher than existing similar algorithms. The control system can control hyperchaos. We analyze the stability of thecontrol system and prove the convergence property of the neural controller. The theoretic derivation and simulationsdemonstrate the effectiveness of the algorithm.

  10. PERFORMANCE OF A NEW DECODING METHOD USED IN OPEN-LOOP ALL-OPTICAL CHAOTIC COMMUNICATION SYSTEM

    Institute of Scientific and Technical Information of China (English)

    Liu Huijie; Feng Jiuchao

    2011-01-01

    A new decoding method with decoder is used in open-loop all-optical chaotic communication system under strong injection condition.The performance of the new decoding method is numerically investigated by comparing it with the common decoding method without decoder.For new decoding method,two cases are analyzed,including whether or not the output of the decoder is adjusted by its input to receiver.The results indicate the decoding quality can be improved by adjusting for the new decoding method.Meanwhile,the injection strength of decoder can be restricted in a certain range.The adjusted new decoding method with decoder can achieve better decoding quality than decoding method without decoder when the bit rate of message is under 5 Gb/s.However,a stronger injection for receiver is needed.Moreover,the new decoding method can broaden the range of injection strength acceptable for good decoding quality.Different message encryption techniques are tested,and the result is similar to that of the common decoding method,indicative of the fact that the message encoded by using Chaotic Modulation (CM) can be best recovered by the new decoding method owning to the essence of this encryption technique.

  11. Noise Separation from the Weak Signal Chaotic Detection System

    Directory of Open Access Journals (Sweden)

    Hanjie Gu

    2014-11-01

    Full Text Available The traditional weak signal chaotic detection system still restricts some technical issues in the situation of the signal with noise, such as poor denoising ability and low detection precision. In this paper, we propose a novel weak signal chaotic detection system based on an improved wavelet transform algorithm. First, the traditional wavelet transform algorithm domain variables have been transformed and discretized to eliminate the redundant transform. Then, based on the discrete optimization, the wavelet coefficients have been optimized by threshold compromise strategy. The improved wavelet transform algorithm is applied in the weak signal chaotic detection system. The noise signal after finite discrete processing is treated as a perturbation of cycle power and put into a chaotic system for detecting weak signal under the noise conditions. The simulation experiments show that the proposed improved wavelet transform algorithm has a better denoising effect than the traditional wavelet transform algorithm. Moreover, the improved algorithm shows better accuracy and higher robustness in the weak signal chaotic detection system.

  12. Adaptive synchronization of Chen chaotic system with uncertain parameters

    Institute of Scientific and Technical Information of China (English)

    LIU Yu-liang; ZHU Jie; DING Da-wei

    2007-01-01

    By the control method independent of system parameters, synchronization of two Chen chaotic systems with identical, but uncertain parameters is discussed in this article. Based on Lyapunov's theorem, an adaptive controller and the parameters estimate update law are derived to make the solution of the error dynamical equation converge at the point E(0, 0, 0) with a quick speed, that is, the states of two Chen chaotic systems can be asymptotically synchronized. Numerical simulations verify the effectiveness and the adaptivity to the variation of Chen system parameters.

  13. Control uncertain continuous-time chaotic dynamical system

    Institute of Scientific and Technical Information of China (English)

    齐冬莲; 赵光宙

    2003-01-01

    The new chaos control method presented in this paper is useful for taking advantage of chaos.Based on sliding mode control theory, this paper provides a switching manifold controlling strategy of chaoticsystem, and also gives a kind of adaptive parameters estimated method to estimate the unknown systems' pa-rameters by which chaotic dynamical system can be synchronized. Taking the Lorenz system as example, and with the help of this controlling strategy, we can synchronize chaotic systems with unknown parameters and different initial conditions.

  14. Optimal Control for a Class of Chaotic Systems

    Directory of Open Access Journals (Sweden)

    Jianxiong Zhang

    2012-01-01

    Full Text Available This paper proposes the optimal control methods for a class of chaotic systems via state feedback. By converting the chaotic systems to the form of uncertain piecewise linear systems, we can obtain the optimal controller minimizing the upper bound on cost function by virtue of the robust optimal control method of piecewise linear systems, which is cast as an optimization problem under constraints of bilinear matrix inequalities (BMIs. In addition, the lower bound on cost function can be achieved by solving a semidefinite programming (SDP. Finally, numerical examples are given to illustrate the results.

  15. A joint encryption/watermarking system for verifying the reliability of medical images.

    Science.gov (United States)

    Bouslimi, Dalel; Coatrieux, Gouenou; Cozic, Michel; Roux, Christian

    2012-09-01

    In this paper, we propose a joint encryption/water-marking system for the purpose of protecting medical images. This system is based on an approach which combines a substitutive watermarking algorithm, the quantization index modulation, with an encryption algorithm: a stream cipher algorithm (e.g., the RC4) or a block cipher algorithm (e.g., the AES in cipher block chaining (CBC) mode of operation). Our objective is to give access to the outcomes of the image integrity and of its origin even though the image is stored encrypted. If watermarking and encryption are conducted jointly at the protection stage, watermark extraction and decryption can be applied independently. The security analysis of our scheme and experimental results achieved on 8-bit depth ultrasound images as well as on 16-bit encoded positron emission tomography images demonstrate the capability of our system to securely make available security attributes in both spatial and encrypted domains while minimizing image distortion. Furthermore, by making use of the AES block cipher in CBC mode, the proposed system is compliant with or transparent to the DICOM standard.

  16. Compact Global Chaotic Attractors of Discrete Control Systems

    Directory of Open Access Journals (Sweden)

    Cheban David

    2014-01-01

    Full Text Available The paper is dedicated to the study of the problem of existence of compact global chaotic attractors of discrete control systems and to the description of its structure. We consider so called switched systems with discrete time xn+1 = fv(n(xn, where v: Z+ → {1; 2; : : : ;m}. If m≥2 we give sufficient conditions (the family M := {f1; f2; : : : ; fm} of functions is contracting in the extended sense for the existence of a compact global chaotic attractor. We study this problem in the framework of non-autonomous dynamical systems (cocycles

  17. Synchronization of Unified Chaotic System Using Occasional Driving

    Institute of Scientific and Technical Information of China (English)

    Wu Xiao-qun; Lu Jun-an

    2003-01-01

    The synchronization of the unified chaotic systems using occasional driving technique is studied. The relation among interim period T, sampling interval 2ε, feedback gain r and the parameter α of the system is thoroughly investigated. Numerical results show that smaller interim period T and properly larger sampling interval 2ε can accelerate the synchronizing pace. Furthermore, for a unified chaotic system in which a is given, we can achieve satisfying synchronizing results as long as T,ε and r are appropriately chosen. As we adopt the occasional driving method, we greatly reduce the control cost. Therefore with this method we can obtain the expecting goals with little control cost.

  18. Automatic control and tracking of periodic orbits in chaotic systems.

    Science.gov (United States)

    Ando, Hiroyasu; Boccaletti, S; Aihara, Kazuyuki

    2007-06-01

    Based on an automatic feedback adjustment of an additional parameter of a dynamical system, we propose a strategy for controlling periodic orbits of desired periods in chaotic dynamics and tracking them toward the set of unstable periodic orbits embedded within the original chaotic attractor. The method does not require information on the system to be controlled, nor on any reference states for the targets, and it overcomes some of the difficulties encountered by other techniques. Assessments of the method's effectiveness and robustness are given by means of the application of the technique to the stabilization of unstable periodic orbits in both discrete- and continuous-time systems.

  19. Active synchronization between two different chaotic dynamical system

    Energy Technology Data Exchange (ETDEWEB)

    Maheri, M. [Institute for Mathematical Research, 43400 UPM, Serdang, Selengor (Malaysia); Arifin, N. Md; Ismail, F. [Department of Mathematics, 43400 UPM, Serdang, Selengor (Malaysia)

    2015-05-15

    In this paper we investigate on the synchronization problem between two different chaotic dynamical system based on the Lyapunov stability theorem by using nonlinear control functions. Active control schemes are used for synchronization Liu system as drive and Rossler system as response. Numerical simulation by using Maple software are used to show effectiveness of the proposed schemes.

  20. The control of an optical hyper-chaotic system

    Energy Technology Data Exchange (ETDEWEB)

    Jiang Shumin [Nonlinear Scientific Research Center, Faculty of Science, Jiangsu University, Zhenjiang, Jiangsu 212013 (China); Tian Lixin [Nonlinear Scientific Research Center, Faculty of Science, Jiangsu University, Zhenjiang, Jiangsu 212013 (China)]. E-mail: tianlx@ujs.edu.cn; Wang Xuedi [Nonlinear Scientific Research Center, Faculty of Science, Jiangsu University, Zhenjiang, Jiangsu 212013 (China)

    2007-12-15

    This paper discusses the problem of hyper-chaos control of an optical system. Based on Lyapunov stability theory, a non-autonomous feedback controller is designed. The proposed controller ensures that the hyper-chaotic system will be asymptotically stable. Numerical simulation of the original and the controlled system is provided to show the effectiveness of our method.

  1. A novel four-wing non-equilibrium chaotic system and its circuit implementation

    Indian Academy of Sciences (India)

    Lin Yuan; Wang Chunhua; He Haizhen; Zhou Li Li

    2016-04-01

    In this paper, we construct a novel, 4D smooth autonomous system. Compared to the existing chaotic systems, the most attractive point is that this system does not display any equilibria, but can still exhibit four-wing chaotic attractors. The proposed system is investigated through numerical simulations and analyses including time phase portraits, Lyapunov exponents, bifurcation diagram, and Poincaré maps. There is little difference between this chaotic system withoutequilibria and other chaotic systems with equilibria shown by phase portraits and Lyapunov exponents. But the bifurcation diagram shows that the chaotic systems without equilibria do not have characteristics such as pitchfork bifurcation, Hopf bifurcation etc. which are common to the normal chaotic systems. The Poincaré maps show that this system is a four-wing chaotic system with more complicated dynamics. Moreover, the physical existence of the four-wing chaotic attractor without equilibria is verified by an electronic circuit.

  2. Stable classical structures in dissipative quantum chaotic systems

    CERN Document Server

    Raviola, Lisandro A; Rivas, Alejandro M F

    2009-01-01

    We study the stability of classical structures in chaotic systems when a dissipative quantum evolution takes place. We consider a paradigmatic model, the quantum baker map in contact with a heat bath at finite temperature. We analyze the behavior of the purity, fidelity and Husimi distributions corresponding to initial states localized on short periodic orbits (scar functions) and map eigenstates. Scar functions, that have a fundamental role in the semiclassical description of chaotic systems, emerge as very robust against environmental perturbations. This is confirmed by the study of other states localized on classical structures. Also, purity and fidelity show a complementary behavior as decoherence measures.

  3. Hybrid synchronization of two independent chaotic systems on complex network

    Indian Academy of Sciences (India)

    NIAN FUZHONG; LIU WEILONG

    2016-06-01

    The real network nodes are always interfered by other messages. So, how to realize the hybrid synchronization of two independent chaotic systems based on the complex network is very important. To solve this problem, two other problems should be considered. One is how the same network node of the complex network was affected by different information sources. Another is how to achieve hybrid synchronization on the network. In this paper, the theoretical analysis andnumerical simulation on various complex networks are implemented. The results indicate that the hybrid synchronization of two independent chaotic systems is feasible.

  4. Synchronization of an uncertain chaotic system via recurrent neural networks

    Institute of Scientific and Technical Information of China (English)

    谭文; 王耀南

    2005-01-01

    Incorporating distributed recurrent networks with high-order connections between neurons, the identification and synchronization problem of an unknown chaotic system in the presence of unmodelled dynamics is investigated. Based on the Lyapunov stability theory, the weights learning algorithm for the recurrent high-order neural network model is presented. Also, analytical results concerning the stability properties of the scheme are obtained. Then adaptive control law for eliminating synchronization error of uncertain chaotic plant is developed via Lyapunov methodology.The proposed scheme is applied to model and synchronize an unknown Rossler system.

  5. Synchronization of Unified Chaotic System Using Occasional Driving

    Institute of Scientific and Technical Information of China (English)

    WuXiao-qun; LuJun-an

    2003-01-01

    The synchronization of the unified chaotic systems using occasional driving technique is studied. The relation among interim period T, sampling interval 2ε, feedback gain r and the parameter α of the system is thoroughly investigated. Numerical results show that smaller interim period T and properly larger sampling interval 2ε can accelerate the synchronizing pace. Furthermore, for a unified chaotic systemin which α is given, we can achieve satisfying synchronizing results as long as T,ε and r are appropriately chosen. As we adopt the occasional driving method, we greatly reduce the control cost. Therefore with this method we can obtain the expeetlng goals with little control cost.

  6. Design of output feedback controller for a unified chaotic system

    Institute of Scientific and Technical Information of China (English)

    Li Wen-Lin; Chen Xiu-Qin; Shen Zhi-Ping

    2008-01-01

    In this paper,the synchronization of a unified chaotic system is investigated by the use of output feedback controllers;a two-input single-output feedback controller and single-input single-output feedback controller are presented to synchronize the unified chaotic system when the states are not all measurable.Compared with the existing results,the controllers designed in this paper have some advantages such as small feedback gain,simple structure and less conservation.Finally,numerical simulations results are provided to demonstrate the validity and effectiveness of the proposed method.

  7. Fuzzy Control of Chaotic System with Genetic Algorithm

    Institute of Scientific and Technical Information of China (English)

    FANG Jian-an; GUO Zhao-xia; SHAO Shi-huang

    2002-01-01

    A novel approach to control the unpredictable behavior of chaotic systems is presented. The control algorithm is based on fuzzy logic control technique combined with genetic algorithm. The use of fuzzy logic allows for the implementation of human "rule-of-thumb" approach to decision making by employing linguistic variables. An improved Genetic Algorithm (GA) is used to learn to optimally select the fuzzy membership functions of the linguistic labels in the condition portion of each rule,and to automatically generate fuzzy control actions under each condition. Simulation results show that such an approach for the control of chaotic systems is both effective and robust.

  8. Image encryption based on Independent Component Analysis and Arnold’s Cat Map

    Directory of Open Access Journals (Sweden)

    Nidaa AbdulMohsin Abbas

    2016-03-01

    Full Text Available Security of the multimedia data including image and video is one of the basic requirements for the telecommunications and computer networks. In this paper, a new efficient image encryption technique is presented. It is based on modifying the mixing matrix in Independent Component Analysis (ICA using the chaotic Arnold’s Cat Map (ACM for encryption. First, the mixing matrix is generated from the ACM by insert square image of any dimension. Second, the mixing process is implemented using the mixing matrix and the image sources the result is the encryption images that depend on the number of sources. Third, images decrypted using ICA algorithms. We use the Joint Approximate Diagonalization of Eigen-matrices (JADE algorithm as a case study. The results of several experiments, PSNR, SDR and SSIM index tests compared with standard mixing matrix showed that the proposed image encryption system provided effective and safe way for image encryption.

  9. The novel block encryption scheme based on hybrid chaotic maps for the wireless sensor networks%基于无线传感器网络的混合混沌新分组加密算法

    Institute of Scientific and Technical Information of China (English)

    佟晓筠; 左科; 王翥

    2012-01-01

    Traditional encryption schemes are not suitable for the Wireless sensor networks(WSNS) due to some intrinsic features of nodes in WSNS such as low energy,limited computation ability and storage resources.In this paper,we present a novel block encryption scheme based on hybrid chaotic maps dynamically and propose an integer digital random method,and the Feistel network structure, which is a kind of fast,secure,low resource consumption and suited for WSNS nodes encryption scheme.The experimental tests show the new encryption scheme has the following prefect performances:large key space,very good diffusion and disrupt performance, strict avalanche effect,excellent statistical balance and fast encryption speed of the new scheme,and the encryption scheme passes the SP800-22 test;meanwhile,the analysis and the testing of speed,time and storage space on the simulator platform show that this new encryption scheme is well able to hide the data information about the node in WSNS.%针对无线传感器网络(WSNS)中节点配备的能源少、节点计算能力低、存储资源有限以及化统的加密方法不适用于WSNS中等问题,提出了一种新的基于动态迭代的混合混沌方程及其整型数值化方法.并结合Feistel网络结构设计了一种快速、安全且资源消耗低的适用于WSNS节点的分组加密算法.通过对混合混沌分组加密算法进行了大量的实验测试之后,发现该算法具有密钥空间大、严格的雪崩效应、扩散及扰乱性高以及均等的统计平衡性等优点,同时该算法还成功地通过了SP800-22的严格测试;算法经过仿真器平台上运行的速度、时间及所占存储空间的测试分析,结果表明设计的混合混沌分组加密算法是完全能够通用于WSNS节点的数据加密.

  10. Chaotic behaviour of a predator-prey system

    NARCIS (Netherlands)

    Kooi, B.W.; Boer, M.P.

    2003-01-01

    Generally a predator-prey system is modelled by two ordinary differential equations which describe the rate of changes of the biomasses. Since such a system is two-dimensional no chaotic behaviour can occur. In the popular Rosenzweig-MacArthur model, which replaced the Lotka-Volterra model, a stable

  11. A universal projective synchronization of general autonomous chaotic system

    Indian Academy of Sciences (India)

    Fuzhong Nian; Zingyuan Wang; Ming Li; Ge Guo

    2012-12-01

    This paper investigates the generalized projective synchronization in general autonomous chaotic system. A universal controller is designed and the effectiveness is verified via theoretical analysis and numerical simulations. The controller design is irrelevant to concrete system structure and initial values. It has strong robustness and broad application perspective.

  12. Synchronization between two different chaotic systems with nonlinear feedback control

    Institute of Scientific and Technical Information of China (English)

    Lü Ling; Guo Zhi-An; Zhang Chao

    2007-01-01

    This paper presents chaos synchronization between two different chaotic systems by using a nonlinear controller, in which the nonlinear functions of the system are used as a nonlinear feedback term. The feedback controller is designed on the basis of stability theory, and the area of feedback gain is determined. The artificial simulation results show that this control method is commendably effective and feasible.

  13. Learning to simulate and predict chaotic dynamical systems

    NARCIS (Netherlands)

    Bakker, R.

    2007-01-01

    With precise knowledge of the rules which govern a deterministic chaotic system, it is possible to interact with the system and change its dynamics. This research is part of a larger project, in which chaos control is used to improve the bubbling behavior of multi-phase chemical reactors. Chaos con

  14. A Chaos-Based Encryption Scheme for DCT Precoded OFDM-Based Visible Light Communication Systems

    Directory of Open Access Journals (Sweden)

    Zhongpeng Wang

    2016-01-01

    Full Text Available This paper proposes a physical encryption scheme for discrete cosine transform (DCT precoded OFDM-based visible light communication systems by employing chaos scrambling. In the proposed encryption scheme, the Logistic map is adopted for the chaos mapping. The chaos scrambling strategy can allocate the two scrambling sequences to the real (I and imaginary (Q parts of OFDM frames according to the initial condition, which enhance the confidentiality of the physical layer. The simulation experimental results prove the efficiency of the proposed encryption method for DCT precoded OFDM-based VLC systems. The experimental results show that the proposed security scheme can protect the DCT precoded OFDM-based VLC from eavesdropper, while keeping the advantage of the DCT precoding technique, which can reduce the PAPR and improve the BER performance of OFDM-based VLC.

  15. Experimental chaotic quantification in bistable vortex induced vibration systems

    Science.gov (United States)

    Huynh, B. H.; Tjahjowidodo, T.

    2017-02-01

    The study of energy harvesting by means of vortex induced vibration systems has been initiated a few years ago and it is considered to be potential as a low water current energy source. The energy harvester is realized by exposing an elastically supported blunt structure under water flow. However, it is realized that the system will only perform at a limited operating range (water flow) that is attributed to the resonance phenomenon that occurs only at a frequency that corresponds to the fluid flow. An introduction of nonlinear elements seems to be a prominent solution to overcome the problem. Among many nonlinear elements, a bistable spring is known to be able to improve the harvested power by a vortex induced vibrations (VIV) based energy converter at the low velocity water flows. However, it is also observed that chaotic vibrations will occur at different operating ranges that will erratically diminish the harvested power and cause a difficulty in controlling the system that is due to the unpredictability in motions of the VIV structure. In order to design a bistable VIV energy converter with improved harvested power and minimum negative effect of chaotic vibrations, the bifurcation map of the system for varying governing parameters is highly on demand. In this study, chaotic vibrations of a VIV energy converter enhanced by a bistable stiffness element are quantified in a wide range of the governing parameters, i.e. damping and bistable gap. Chaotic vibrations of the bistable VIV energy converter are simulated by utilization of a wake oscillator model and quantified based on the calculation of the Lyapunov exponent. Ultimately, a series of experiments of the system in a water tunnel, facilitated by a computer-based force-feedback testing platform, is carried out to validate the existence of chaotic responses. The main challenge in dealing with experimental data is in distinguishing chaotic response from noise-contaminated periodic responses as noise will smear

  16. Using wavefront coding technique as an optical encryption system: reliability analysis and vulnerabilities assessment

    Science.gov (United States)

    Konnik, Mikhail V.

    2012-04-01

    Wavefront coding paradigm can be used not only for compensation of aberrations and depth-of-field improvement but also for an optical encryption. An optical convolution of the image with the PSF occurs when a diffractive optical element (DOE) with a known point spread function (PSF) is placed in the optical path. In this case, an optically encoded image is registered instead of the true image. Decoding of the registered image can be performed using standard digital deconvolution methods. In such class of optical-digital systems, the PSF of the DOE is used as an encryption key. Therefore, a reliability and cryptographic resistance of such an encryption method depends on the size and complexity of the PSF used for optical encoding. This paper gives a preliminary analysis on reliability and possible vulnerabilities of such an encryption method. Experimental results on brute-force attack on the optically encrypted images are presented. Reliability estimation of optical coding based on wavefront coding paradigm is evaluated. An analysis of possible vulnerabilities is provided.

  17. Color image encryption based on gyrator transform and Arnold transform

    Science.gov (United States)

    Sui, Liansheng; Gao, Bo

    2013-06-01

    A color image encryption scheme using gyrator transform and Arnold transform is proposed, which has two security levels. In the first level, the color image is separated into three components: red, green and blue, which are normalized and scrambled using the Arnold transform. The green component is combined with the first random phase mask and transformed to an interim using the gyrator transform. The first random phase mask is generated with the sum of the blue component and a logistic map. Similarly, the red component is combined with the second random phase mask and transformed to three-channel-related data. The second random phase mask is generated with the sum of the phase of the interim and an asymmetrical tent map. In the second level, the three-channel-related data are scrambled again and combined with the third random phase mask generated with the sum of the previous chaotic maps, and then encrypted into a gray scale ciphertext. The encryption result has stationary white noise distribution and camouflage property to some extent. In the process of encryption and decryption, the rotation angle of gyrator transform, the iterative numbers of Arnold transform, the parameters of the chaotic map and generated accompanied phase function serve as encryption keys, and hence enhance the security of the system. Simulation results and security analysis are presented to confirm the security, validity and feasibility of the proposed scheme.

  18. Fully Digital Chaotic Differential Equation-based Systems And Methods

    KAUST Repository

    Radwan, Ahmed Gomaa Ahmed

    2012-09-06

    Various embodiments are provided for fully digital chaotic differential equation-based systems and methods. In one embodiment, among others, a digital circuit includes digital state registers and one or more digital logic modules configured to obtain a first value from two or more of the digital state registers; determine a second value based upon the obtained first values and a chaotic differential equation; and provide the second value to set a state of one of the plurality of digital state registers. In another embodiment, a digital circuit includes digital state registers, digital logic modules configured to obtain outputs from a subset of the digital shift registers and to provide the input based upon a chaotic differential equation for setting a state of at least one of the subset of digital shift registers, and a digital clock configured to provide a clock signal for operating the digital shift registers.

  19. Optimal periodic orbits of continuous time chaotic systems

    Science.gov (United States)

    Yang; Hunt; Ott

    2000-08-01

    In previous work [B. R. Hunt and E. Ott, Phys. Rev. Lett. 76, 2254 (1996); Phys. Rev. E 54, 328, (1996)], based on numerical experiments and analysis, it was conjectured that the optimal orbit selected from all possible orbits on a chaotic attractor is "typically" a periodic orbit of low period. By an optimal orbit we mean the orbit that yields the largest value of a time average of a given smooth "performance" function of the system state. Thus optimality is defined with respect to the given performance function. (The study of optimal orbits is of interest in at least three contexts: controlling chaos, embedding of low-dimensional attractors of high-dimensional dynamical systems in low-dimensional measurement spaces, and bubbling bifurcations of synchronized chaotic systems.) Here we extend this previous work. In particular, the previous work was for discrete time dynamical systems, and here we shall consider continuous time systems (flows). An essential difference for flows is that chaotic attractors can have embedded within them, not only unstable periodic orbits, but also unstable steady states, and we find that optimality can often occur on steady states. We also shed further light on the sense in which optimality is "typically" achieved at low period. In particular, we find that, as a system parameter is tuned to be closer to a crisis of the chaotic attractor, optimality may occur at higher period.

  20. Localized Structures Embedded in the Eigenfunctions of Chaotic Hamiltonian Systems

    CERN Document Server

    Vergini, E G

    1998-01-01

    We study quantum localization phenomena in chaotic systems with a parameter. The parametric motion of energy levels proceeds without crossing any other and the defined avoided crossings quantify the interaction between states. We propose the elimination of avoided crossings as the natural mechanism to uncover localized structures. We describe an efficient method for the elimination of avoided crossings in chaotic billiards and apply it to the stadium billiard. We find many scars of short periodic orbits revealing the skeleton on which quantum mechanics is built. Moreover, we have observed strong interaction between similar localized structures.

  1. State Prediction of Chaotic System Based on ANN Model

    Institute of Scientific and Technical Information of China (English)

    YUE Yi-hong; HAN Wen-xiu

    2002-01-01

    The choice of time delay and embedding dimension is very important to the phase space reconstruction of any chaotic time series. In this paper, we determine optimal time delay by computing autocorrelation function of time series. Optimal embedding dimension is given by means of the relation between embedding dimension and correlation dimension of chaotic time series. Based on the methods above,we choose ANN model to appoximate the given true system. At the same time, a new algorithm is applied to determine the network weights. At the end of this paper, the theory above is demonstrated through the research of time series generated by Logistic map.

  2. Hardware realization of chaos based block cipher for image encryption

    KAUST Repository

    Barakat, Mohamed L.

    2011-12-01

    Unlike stream ciphers, block ciphers are very essential for parallel processing applications. In this paper, the first hardware realization of chaotic-based block cipher is proposed for image encryption applications. The proposed system is tested for known cryptanalysis attacks and for different block sizes. When implemented on Virtex-IV, system performance showed high throughput and utilized small area. Passing successfully in all tests, our system proved to be secure with all block sizes. © 2011 IEEE.

  3. Adaptive projective synchronization between different chaotic systems with parametric uncertainties and external disturbances

    Indian Academy of Sciences (India)

    Mayank Srivastava; Saurabh K Agrawal; Subir Das

    2013-09-01

    The article deals with adaptive projective synchronization between two different chaotic systems with parametric uncertainties and external disturbances. Based on Lyapunov stability theory, the projective synchronization between a pair of different chaotic systems with fully unknown parameters are derived. An adaptive control law and a parameter update rule for uncertain parameters are designed such that the chaotic response system controls the chaotic drive system. Numerical simulation results are performed to explain the effectiveness and feasibility of the techniques.

  4. Tracking Control and Synchronization for Two-Dimension Discrete Chaotic Systems

    Institute of Scientific and Technical Information of China (English)

    2002-01-01

    The popular method of tracking control and synchronization for two-dimension discrete chaotic systems is put forward in this paper, and the chaotic system track arbitrarily reference signal is realized. This method is applied to two chaotic systems, and one can get good control result.

  5. Intrinsic Chaoticity in Stable Classical Systems and Quantum Fluctuations

    CERN Document Server

    De Martino, S; Illuminati, F

    1997-01-01

    We postulate the existence of a universal Keplerian tremor for any stable classical complex system on every scale. Deriving the characteristic unit of action $\\alpha$ for each classical interaction, we obtain in all cases $\\alpha connected to an intrinsic chaoticity needed to assure stability of matter. Introducing temperature, we provide further consistency checks corroborating our hypothesis.

  6. Chaotic Dynamics and Transport in Classical and Quantum Systems

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2003-07-01

    The aim of this summer school is to provide a set of extended and pedagogical lectures, on the major present-day topics in dynamical systems and statistical mechanics including applications. Some articles are dedicated to chaotic transport in plasma turbulence and to quantum chaos. This document gathers the summaries of some presentations.

  7. Multiscality in the Dynamics of Coupled Chaotic Systems

    DEFF Research Database (Denmark)

    Pavlov, A.N.; Sosnovtseva, Olga; Ziganshin, A.R.;

    2002-01-01

    We investigate the scaling features of complex motions in systems of two coupled chaotic oscillators by means of the wavelet-transform modulus maxima method and the detrended fluctuation analysis. We show that the transition from asynchronous to synchronous dynamics typically reduces the degree...

  8. Synchronization in driven chaotic systems: Diagnostics and bifurcations

    DEFF Research Database (Denmark)

    Vadivasova, T.E.; Balanov, A.G.; Sosnovtseva, O.V.;

    1999-01-01

    We investigate generic aspects of chaos synchronization in an externally forced Rössler system. By comparing different diagnostic methods, we show the existence of a well-defined cut-off of synchronization associated with the transition from weak to fully developed chaos. Two types of chaotic beh...... behavior, differing by the number of vanishing Lyapunov exponents, are observed outside the synchronization regime....

  9. Comparison between different synchronization methods of identical chaotic systems

    Energy Technology Data Exchange (ETDEWEB)

    Haeri, Mohammad [Advanced Control System Laboratory, Electrical Engineering Department, Sharif University of Technology, Azadi Avenue, P.O. Box 11365-9363 Tehran (Iran, Islamic Republic of)]. E-mail: haeri@sina.sharif.edu; Khademian, Behzad [Advanced Control System Laboratory, Electrical Engineering Department, Sharif University of Technology, Azadi Avenue, P.O. Box 11365-9363 Tehran (Iran, Islamic Republic of)

    2006-08-15

    This paper studies and compares three nonadaptive (bidirectional, unidirectional, and sliding mode) and two adaptive (active control and backstepping) synchronization methods on the synchronizing of four pairs of identical chaotic systems (Chua's circuit, Roessler system, Lorenz system, and Lue system). Results from computer simulations are presented in order to illustrate the effectiveness of the methods and to compare them based on different criteria.

  10. Linearly Coupled Synchronization of the New Chaotic Systems

    Institute of Scientific and Technical Information of China (English)

    LU Jun-an; ZHOU Jin; LI Yi-tian

    2005-01-01

    This paper investigates synchronization within the new systems, which we denote as Liu system in this paper. New stability criteria for synchronization of linearly coupled Liu systems are attained using the Lyapunov method. Some sufficient conditions for synchronization are concluded through rigorous mathematical theory, which can be further applied to more chaotic systems. Moreover, numerical simulations are given to show the effectiveness of our synchronization criterions.

  11. Hybrid optical-digital encryption system based on wavefront coding paradigm

    Science.gov (United States)

    Konnik, Mikhail V.

    2012-04-01

    The wavefront coding is a widely used in the optical systems to compensate aberrations and increase the depth of field. This paper presents experimental results on application of the wavefront coding paradigm for data encryption. We use a synthesised diffractive optical element (DOE) to deliberately introduce a phase distortion during the images registration process to encode the acquired image. In this case, an optical convolution of the input image with the point spread function (PSF) of the DOE is registered. The encryption is performed optically, and is therefore is fast and secure. Since the introduced distortion is the same across the image, the decryption is performed digitally using deconvolution methods. However, due to noise and finite accuracy of a photosensor, the reconstructed image is degraded but still readable. The experimental results, which are presented in this paper, indicate that the proposed hybrid optical-digital system can be implemented as a portable device using inexpensive off-the-shelf components. We present the results of optical encryption and digital restoration with quantitative estimations of the images quality. Details of hardware optical implementation of the hybrid optical-digital encryption system are discussed.

  12. Adaptive Control on a Class of Uncertain Chaotic Systems

    Institute of Scientific and Technical Information of China (English)

    LIU Guo-Gang; ZHAO Yi

    2005-01-01

    @@ By using a simple combination of feedback entrainment control (with an updating feedback strength) and adaptive scheme, for a large class of chaotic systems, it is proven rigorously by using the invariance principle of differential equations that all unknown model parameters can be estimated dynamically and the uncertain system can be controlled to an arbitrary desired smooth orbit. The illustration of the Lorenz system and the corresponding numerical results on the effect of noise are given.

  13. Chaotic Motion in the Solar System and Beyond

    Science.gov (United States)

    Lissauer, Jack; DeVincenzi, Donald (Technical Monitor)

    2001-01-01

    The motion of planetary bodies is the archetypal clockwork system. Indeed, clocks and calendars were developed to keep track of the relative motions of the Earth, the Sun and the Moon. However, studies over the past few decades imply that this predictable regularity does not extend to small bodies, nor does it apply to the precise trajectories of the planets themselves over long timescale.s. Various examples of chaotic motion within our Solar System and, extrasolar planetary systems will be discussed.

  14. Communicating via robust synchronization of chaotic lasers

    Energy Technology Data Exchange (ETDEWEB)

    Lopez-Gutierrez, R.M. [Engineering Faculty, Baja California Autonomous University (UABC), Km. 103 Carret. Tij-Ens., 22860 Ensenada, B.C. (Mexico); Posadas-Castillo, C. [Engineering Faculty, Baja California Autonomous University (UABC), Km. 103 Carret. Tij-Ens., 22860 Ensenada, B.C. (Mexico); FIME, Autonomous University of Nuevo Leon (UANL), Pedro de Alba, S.N., Cd. Universitaria, San Nicolas de los Garza, NL (Mexico); Lopez-Mancilla, D. [Departamento de Ciencias Exactas y Tecnologicas, Centro Universitario de los Lagos, Universidad de Guadalajara (CULagos-UdeG), Enrique Diaz de Leon s/n, 47460 Lagos de Moreno, Jal. (Mexico); Cruz-Hernandez, C. [Electronics and Telecommunications Department, Scientific Research and Advanced Studies of Ensenada (CICESE), Km. 107 Carret. Tij-Ens., 22860 Ensenada, B.C. (Mexico)], E-mail: ccruz@cicese.mx

    2009-10-15

    In this paper, the robust synchronization problem for coupled chaotic Nd:YAG lasers is addressed. We resort to complex systems theory to achieve chaos synchronization. Based on stability theory, it is shown that the state trajectories of the perturbed error synchronization are ultimately bounded, provided the unperturbed synchronization error system is exponentially stable, and some conditions on the bounds of the perturbation terms are satisfied. So that, encoding, transmission, and decoding in chaotic optical communications are presented. We analyze the transmission and recovery of encrypted information when parameter mismatches are considered. Computer simulations are provided to show the effectiveness of this robustness synchronization property, we present the encrypted transmission of image messages, and we show that, the transmitted image is faithfully recovered.

  15. Robust finite-time stabilization of unified chaotic complex systems with certain and uncertain parameters

    Science.gov (United States)

    Liu, Ping

    2013-07-01

    This paper deals with the finite-time stabilization of unified chaotic complex systems with known and unknown parameters. Based on the finite-time stability theory, nonlinear control laws are presented to achieve finite-time chaos control of the determined and uncertain unified chaotic complex systems, respectively. The two controllers are simple, and one of the uncertain unified chaotic complex systems is robust. For the design of a finite-time controller on uncertain unified chaotic complex systems, only some of the unknown parameters need to be bounded. Simulation results for the chaotic complex Lorenz, Lü and Chen systems are presented to validate the design and analysis.

  16. Parallel Algorithm for Wireless Data Compression and Encryption

    Directory of Open Access Journals (Sweden)

    Qin Jiancheng

    2017-01-01

    Full Text Available As the wireless network has limited bandwidth and insecure shared media, the data compression and encryption are very useful for the broadcasting transportation of big data in IoT (Internet of Things. However, the traditional techniques of compression and encryption are neither competent nor efficient. In order to solve this problem, this paper presents a combined parallel algorithm named “CZ algorithm” which can compress and encrypt the big data efficiently. CZ algorithm uses a parallel pipeline, mixes the coding of compression and encryption, and supports the data window up to 1 TB (or larger. Moreover, CZ algorithm can encrypt the big data as a chaotic cryptosystem which will not decrease the compression speed. Meanwhile, a shareware named “ComZip” is developed based on CZ algorithm. The experiment results show that ComZip in 64 b system can get better compression ratio than WinRAR and 7-zip, and it can be faster than 7-zip in the big data compression. In addition, ComZip encrypts the big data without extra consumption of computing resources.

  17. On nonlinear control design for autonomous chaotic systems of integer and fractional orders

    Energy Technology Data Exchange (ETDEWEB)

    Ahmad, Wajdi M. E-mail: wajdi@sharjah.ac.ae; Harb, Ahmad M. E-mail: aharb@just.edu.jo

    2003-11-01

    In this paper, we address the problem of chaos control for autonomous nonlinear chaotic systems. We use the recursive 'backstepping' method of nonlinear control design to derive the nonlinear controllers. The controller effect is to stabilize the output chaotic trajectory by driving it to the nearest equilibrium point in the basin of attraction. We study two nonlinear chaotic systems: an electronic chaotic oscillator model, and a mechanical chaotic 'jerk' model. We demonstrate the robustness of the derived controllers against system order reduction arising from the use of fractional integrators in the system models. Our results are validated via numerical simulations.

  18. A chaotic system with only one stable equilibrium

    CERN Document Server

    Xiong, Wang

    2011-01-01

    If you are given a simple three-dimensional autonomous quadratic system that has only one stable equilibrium, what would you predict its dynamics to be, stable or periodic? Will it be surprising if you are shown that such a system is actually chaotic? Although chaos theory for three-dimensional autonomous systems has been intensively and extensively studied since the time of Lorenz in the 1960s, and the theory has become quite mature today, it seems that no one would anticipate a possibility of finding a three-dimensional autonomous quadratic chaotic system with only one stable equilibrium. The discovery of the new system, to be reported in this Letter, is indeed striking because for a three-dimensional autonomous quadratic system with a single stable node-focus equilibrium, one typically would anticipate non-chaotic and even asymptotically converging behaviors. Although the new system is not of saddle-focus type, therefore the familiar \\v{S}i'lnikov homoclinic criterion is not applicable, it is demonstrated ...

  19. An exponential polynomial observer for synchronization of chaotic systems

    Science.gov (United States)

    Mata-Machuca, J. L.; Martínez-Guerra, R.; Aguilar-López, R.

    2010-12-01

    In this paper, we consider the synchronization problem via nonlinear observer design. A new exponential polynomial observer for a class of nonlinear oscillators is proposed, which is robust against output noises. A sufficient condition for synchronization is derived analytically with the help of Lyapunov stability theory. The proposed technique has been applied to synchronize chaotic systems (Rikitake and Rössler systems) by means of numerical simulation.

  20. Improvement of Networked Control Systems Performance Using a New Encryption Algorithm

    Directory of Open Access Journals (Sweden)

    Seyed Ali Mesbahifard

    2014-07-01

    Full Text Available Networked control systems are control systems which controllers and plants are connected via telecommunication network. One of the most important challenges in networked control systems is the problem of network time delay. Increasing of time delay may affect on control system performance extremely. Other important issue in networked control systems is the security problems. Since it is possible that unknown people access to network especially Internet, the probability of terrible attacks such as deception attacks is greater, therefore presentation of methods which could decrease time delay and increase system immunity are desired. In this paper a symmetric encryption with low data volume against deception attacks is proposed. This method has high security and low time delay rather than the other encryption algorithms and could improve the control system performance against deception attacks.

  1. Intelligent Controller for Synchronization New Three Dimensional Chaotic System

    Directory of Open Access Journals (Sweden)

    Alireza Sahab

    2014-07-01

    Full Text Available One of the most important phenomena of some systems is chaos which is caused by nonlinear dynamics. In this paper, the new 3 dimensional chaotic system is first investigated and then utilized an intelligent controller based on brain emotional learning (BELBIC, this new chaotic system is synchronized. The BELBIC consists of reward signal which accepts positive values. Improper selection of the parameters causes an improper behavior which may cause serious problems such as instability of the system. It is needed to optimize these parameters. Genetic Algorithm (GA, Cuckoo Optimization Algorithm (COA, Particle Swarm Optimization Algorithm (PSO and Imperialist Competitive Algorithm (ICA are used to compute the optimal parameters for the reward signal of BELBIC. These algorithms can select appropriate and optimal values for the parameters. These minimize the Cost Function, so the optimal values for the parameters will be founded. Selected cost function is defined to minimizing the least square errors. Cost function enforces the system errors to decay to zero rapidly. Numerical simulation will show that this method much better, faster and more effective than previous methods can be new 3D chaotic system mode to bring synchronized.

  2. A Retrospection of Chaotic Phenomena in Electrical Systems

    Directory of Open Access Journals (Sweden)

    Umesh Kumar

    1998-01-01

    Full Text Available In the last decade new phenomena have been observed in all areas of non linear dynamics, principal among these being ‘Chaotic phenomena’. Chaos has been reported virtually from every scientific discipline. This paper summarizes a study of the chaotic phenomena in electrical systems and attempts to translate the mathematical ideas and techniques into language that engineers and applied scientists can use to study ‘Chaos’. Towards this end, the paper has summarized the study of chaos in several examples like Chua’s circuit family; Folded Torus circuit; non-autonomous circuits; switched capacitor circuits and hyper-chaos circuits. As observed in power systems, control systems and digital filters, chaos has been exhibited and shown on examples.

  3. Frustrated synchronization in competing drive-response coupled chaotic systems

    CERN Document Server

    Sinha, S

    1998-01-01

    Chaotic systems can be synchronized by linking them to a common signal, subject to certain conditions. However, the presence of multiple driving signals coming from different systems, give rise to novel behavior. The particular case of Lorenz systems, with two independent systems driving another system through drive-response coupling has been studied in this paper. This is the simplest arrangement which shows the effect of ``frustrated synchronization'' due to competition between the two driver systems. The resulting response system attractor deviates significantly from the conventional Lorenz attractor. A new measure of desynchronization is proposed, which shows a power-law scaling with the competition parameter.

  4. A survey of applied approaches for software encryption of data in different operating systems

    OpenAIRE

    Damjanović, Boris; Simić, Dejan

    2013-01-01

    Along with the increased amount of digital information that are stored in computer systems increases the importance of protecting this information. Today's operating systems offer a number of different mechanisms to encrypt data that often provide unequal levels of protection. In this paper we provide an overview of basic block based and file based cryptographic solutions that are used in operating systems along with the presentation of efforts to unify cryptographic APIs in Linux and Windows...

  5. Chaotic time series. Part II. System Identification and Prediction

    Directory of Open Access Journals (Sweden)

    Bjørn Lillekjendlie

    1994-10-01

    Full Text Available This paper is the second in a series of two, and describes the current state of the art in modeling and prediction of chaotic time series. Sample data from deterministic non-linear systems may look stochastic when analysed with linear methods. However, the deterministic structure may be uncovered and non-linear models constructed that allow improved prediction. We give the background for such methods from a geometrical point of view, and briefly describe the following types of methods: global polynomials, local polynomials, multilayer perceptrons and semi-local methods including radial basis functions. Some illustrative examples from known chaotic systems are presented, emphasising the increase in prediction error with time. We compare some of the algorithms with respect to prediction accuracy and storage requirements, and list applications of these methods to real data from widely different areas.

  6. Complete chaotic synchronization in mutually coupled time-delay systems.

    Science.gov (United States)

    Landsman, Alexandra S; Schwartz, Ira B

    2007-02-01

    Complete chaotic synchronization of end lasers has been observed in a line of mutually coupled, time-delayed system of three lasers, with no direct communication between the end lasers. The present paper uses ideas from generalized synchronization to explain the complete synchronization in the presence of long coupling delays, applied to a model of mutually coupled semiconductor lasers in a line. These ideas significantly simplify the analysis by casting the stability in terms of the local dynamics of each laser. The variational equations near the synchronization manifold are analyzed, and used to derive the synchronization condition that is a function of parameters. The results explain and predict the dependence of synchronization on various parameters, such as time delays, strength of coupling and dissipation. The ideas can be applied to understand complete synchronization in other chaotic systems with coupling delays and no direct communication between synchronized subsystems.

  7. Unstable dimension variability and synchronization of chaotic systems

    CERN Document Server

    Viana, R L; Viana, Ricardo L.; Grebogi, Celso

    1999-01-01

    An aspect of the synchronization dynamics is investigated in this work. We argue analytically and confirm numerically that the chaotic dynamics on the synchronization manifold exhibits unstable dimension variability. Unstable dimension variability is a cause of severe modeling difficulty for physical phenomena, since trajectories obtained from the mathematical model may not be related to trajectories of the actual system. We present and example of unstable dimension variability occurring in a system of two coupled chaotic maps, considering the dynamics in the synchronization manifold and its corresponding transversal direction, where a tongue-like structure is formed. The unstable dimension variability is revealed in the statistical distribution of the finite-time transversal Lyapunov exponent, having both negative and positive values.

  8. Chaotic time series; 2, system identification and prediction

    CERN Document Server

    Lillekjendlie, B

    1994-01-01

    This paper is the second in a series of two, and describes the current state of the art in modelling and prediction of chaotic time series. Sampled data from deterministic non-linear systems may look stochastic when analysed with linear methods. However, the deterministic structure may be uncovered and non-linear models constructed that allow improved prediction. We give the background for such methods from a geometrical point of view, and briefly describe the following types of methods: global polynomials, local polynomials, multi layer perceptrons and semi-local methods including radial basis functions. Some illustrative examples from known chaotic systems are presented, emphasising the increase in prediction error with time. We compare some of the algorithms with respect to prediction accuracy and storage requirements, and list applications of these methods to real data from widely different areas.

  9. A Devaney Chaotic System Which Is Neither Distributively nor Topologically Chaotic

    Institute of Scientific and Technical Information of China (English)

    Chen Zhi-zhi; Liao Li; Wang Wei

    2013-01-01

    Weiss proved that Devaney chaos does not imply topological chaos and Oprocha pointed out that Devaney chaos does not imply distributional chaos. In this paper, by constructing a simple example which is Devaney chaotic but neither distributively nor topologically chaotic, we give a unified proof for the results of Weiss and Oprocha.

  10. Generation and control of multi-scroll chaotic attractors in fractional order systems

    Energy Technology Data Exchange (ETDEWEB)

    Ahmad, Wajdi M. [Department of Electrical and Computer Engineering, University of Sharjah, P.O. Box 27272, Sharjah (United Arab Emirates)] e-mail: wajdi@sharjah.ac.ae

    2005-08-01

    The objective of this paper is twofold: on one hand we demonstrate the generation of multi-scroll attractors in fractional order chaotic systems. Then, we design state feedback controllers to eliminate chaos from the system trajectories. It is demonstrated that modifying the underlying nonlinearity of the fractional chaotic system results in the birth of multiple chaotic attractors, thus forming the so called multi-scroll attractors. The presence of chaotic behavior is evidenced by a positive largest Lyapunov exponent computed for the output time series. We investigate generation and control of multi-scroll attractors in two different models, both of which are fractional order and chaotic: an electronic oscillator, and a mechanical 'jerk' model. The current findings extend previously reported results on generation of n-scroll attractors from the domain of integer order to the domain of fractional order chaotic systems, and addresses the issue of controlling such chaotic behaviors. Our investigations are validated through numerical simulations.

  11. Preference of Chaotic Synchronization in a Coupled Laser System

    Institute of Scientific and Technical Information of China (English)

    ZHOU Yun; ZHU Shi-Qun; WU Liang

    2005-01-01

    In a coupled laser system, the dynamics of the receiving laser is investigated when two separate transmitting lasers are injected into the receiving laser with different coupling strengths. It is shown that the phenomenon of preference of chaotic synchronization appears under appropriate coupling conditions. The receiving laser will entrain the pulses of either one or both transmitting lasers when the coupling is strong while it keeps its own dynamics when the coupling is weak.

  12. Synchronization in a unified fractional-order chaotic system

    Institute of Scientific and Technical Information of China (English)

    Wu Zheng-Mao; Xie Jian-Ying

    2007-01-01

    In this paper, the synchronization in a unified fractional-order chaotic system is investigated by two methods. One is the frequency-domain method that is analysed by using the Laplace transform theory. The other is the time-domain method that is analysed by using the Lyapunov stability theory. Finally, the numerical simulations are used-to illustrate the effectiveness of the proposed synchronization methods.

  13. Synchronization of a chaotic optical system using control

    Science.gov (United States)

    Lai, Ying-Cheng; Grebogi, Celso

    1993-11-01

    It has been demonstrated that two identical chaotic systems can be made to synchronize by applying small, judiciously chosen, temporal parameter perturbations to one of them [Y. C. Lai and C. Grebogi, Phys. Rev. E 47, 2357(1993)]. This idea is applied to a nonlinear optical ring resonator modeled by the Ikeda-Hammel-Jones-Maloney map. The average time to achieve synchronization and the effect of noise are also discussed.

  14. A kind of fuzzy control for chaotic systems

    Institute of Scientific and Technical Information of China (English)

    WANG Hong-wei; MA Guang-fu

    2007-01-01

    With a T-S fuzzy dynamic model approximating to a non-linear system, the nonlinear system can be decomposed into some local linear models. A variable structure controller based on Lyapunov theories is designed to guarantee the global stability of the T-S fuzzy model. The controlling problems of a nonlinear system can be solved by means of consisting of linear system variable structure control and fuzzy control. The validity of the control method based on the simulating result of two kinds of chaotic systems is shown here.

  15. Linear optimal control of continuous time chaotic systems.

    Science.gov (United States)

    Merat, Kaveh; Abbaszadeh Chekan, Jafar; Salarieh, Hassan; Alasty, Aria

    2014-07-01

    In this research study, chaos control of continuous time systems has been performed by using dynamic programming technique. In the first step by crossing the response orbits with a selected Poincare section and subsequently applying linear regression method, the continuous time system is converted to a discrete type. Then, by solving the Riccati equation a sub-optimal algorithm has been devised for the obtained discrete chaotic systems. In the next step, by implementing the acquired algorithm on the quantized continuous time system, the chaos has been suppressed in the Rossler and AFM systems as some case studies.

  16. Global bifurcations in fractional-order chaotic systems with an extended generalized cell mapping method.

    Science.gov (United States)

    Liu, Xiaojun; Hong, Ling; Jiang, Jun

    2016-08-01

    Global bifurcations include sudden changes in chaotic sets due to crises. There are three types of crises defined by Grebogi et al. [Physica D 7, 181 (1983)]: boundary crisis, interior crisis, and metamorphosis. In this paper, by means of the extended generalized cell mapping (EGCM), boundary and interior crises of a fractional-order Duffing system are studied as one of the system parameters or the fractional derivative order is varied. It is found that a crisis can be generally defined as a collision between a chaotic basic set and a basic set, either periodic or chaotic, to cause a sudden discontinuous change in chaotic sets. Here chaotic sets involve three different kinds: a chaotic attractor, a chaotic saddle on a fractal basin boundary, and a chaotic saddle in the interior of a basin and disjoint from the attractor. A boundary crisis results from the collision of a periodic (or chaotic) attractor with a chaotic (or regular) saddle in the fractal (or smooth) boundary. In such a case, the attractor, together with its basin of attraction, is suddenly destroyed as the control parameter passes through a critical value, leaving behind a chaotic saddle in the place of the original attractor and saddle after the crisis. An interior crisis happens when an unstable chaotic set in the basin of attraction collides with a periodic attractor, which causes the appearance of a new chaotic attractor, while the original attractor and the unstable chaotic set are converted to the part of the chaotic attractor after the crisis. These results further demonstrate that the EGCM is a powerful tool to reveal the mechanism of crises in fractional-order systems.

  17. Global bifurcations in fractional-order chaotic systems with an extended generalized cell mapping method

    Science.gov (United States)

    Liu, Xiaojun; Hong, Ling; Jiang, Jun

    2016-08-01

    Global bifurcations include sudden changes in chaotic sets due to crises. There are three types of crises defined by Grebogi et al. [Physica D 7, 181 (1983)]: boundary crisis, interior crisis, and metamorphosis. In this paper, by means of the extended generalized cell mapping (EGCM), boundary and interior crises of a fractional-order Duffing system are studied as one of the system parameters or the fractional derivative order is varied. It is found that a crisis can be generally defined as a collision between a chaotic basic set and a basic set, either periodic or chaotic, to cause a sudden discontinuous change in chaotic sets. Here chaotic sets involve three different kinds: a chaotic attractor, a chaotic saddle on a fractal basin boundary, and a chaotic saddle in the interior of a basin and disjoint from the attractor. A boundary crisis results from the collision of a periodic (or chaotic) attractor with a chaotic (or regular) saddle in the fractal (or smooth) boundary. In such a case, the attractor, together with its basin of attraction, is suddenly destroyed as the control parameter passes through a critical value, leaving behind a chaotic saddle in the place of the original attractor and saddle after the crisis. An interior crisis happens when an unstable chaotic set in the basin of attraction collides with a periodic attractor, which causes the appearance of a new chaotic attractor, while the original attractor and the unstable chaotic set are converted to the part of the chaotic attractor after the crisis. These results further demonstrate that the EGCM is a powerful tool to reveal the mechanism of crises in fractional-order systems.

  18. Robust Blind Adaptive Channel Equalization in Chaotic Communication Systems

    Institute of Scientific and Technical Information of China (English)

    ZHANG Jia-Shu

    2006-01-01

    Based on the bounded property and statistics of chaotic signal and the idea of set-membership identification,we propose a set-membership generalized least mean square (SM-GLMS) algorithm with variable step size for blind adaptive channel equalization in chaotic communication systems. The steady state performance of the proposed SM-GLMS algorithm is analysed, and comparison with an extended Kalman filter (EKF)-based adaptive algorithm and variable gain least mean square (VG-LMS) algorithm is performed for blind adaptive channel equalization. Simulations show that the proposed SM-GLMS algorithm can provide more significant steady state performance improvement than the EKF-based adaptive algorithm and VG-LMS algorithm.

  19. Quantifying Volume Changing Perturbations in a Wave Chaotic System

    CERN Document Server

    Taddese, Biniyam Tesfaye; Moglie, Franco; Antonsen, Thomas M; Ott, Edward; Anlage, Steven M

    2012-01-01

    A sensor was developed to quantitatively measure perturbations which change the volume of a wave chaotic cavity while leaving its shape intact. The sensors work in the time domain by using either scattering fidelity of the transmitted signals or the classical analog of the Loschmidt echo. The sensors were tested experimentally by inducing volume changing perturbations to a one cubic meter pseudo-integrable, real-world cavity. Perturbations which caused a volume change that is as small as 54 parts in a million were quantitatively measured. These results were obtained by using electromagnetic waves with a wavelength of about $5cm$, therefore, the sensor is sensitive to extreme sub-wavelength changes of the boundaries of a cavity. The experimental results were compared with Finite Difference Time Domain (FDTD) simulation results, and good agreement was found. Furthermore, the sensor was tested using a frequency domain approach on a numerical model of the star graph, which is a representative wave chaotic system....

  20. A NEW SLIDING MODE CONTROL FOR A CLASS OF UNCERTAIN TIME-DELAY CHAOTIC SYSTEMS

    Institute of Scientific and Technical Information of China (English)

    LI LI-XIANG; PENG HAI-PENG; GUAN BAO-ZHU; XU JIN-MING

    2001-01-01

    We propose a new sliding mode control scheme for a class of uncertain time-delay chaotic systems. It is shown that a linear time invariant system with the desired system dynamics is used as a reference model for the output of a time-delay chaotic system to track. A sliding mode controller is then designed to drive the output of the time-delay chaotic system to track the desired linear system. On the sliding mode, the output of the controlled time-delay chaotic system can behave like the desired linear system. A simulation example is given in support of the proposed control scheme.

  1. Construction and Verification of a Simple Smooth Chaotic System

    Institute of Scientific and Technical Information of China (English)

    2007-01-01

    This article introduces a new chaotic system of three-dimensional quadratic autonomous ordinary differential equations, which can display different attractors with two unstable equilibrium points and four unstable equilibrium points respectively. Dynamical properties of this system are then studied. Furthermore, by applying the undetermined coefficient method, heteroclinic orbit of (S)hil'nikov's type in this system is found and the convergence of the series expansions of this heteroclinic orbit are proved in this article. The (S)hil'nikov's theorem guarantees that this system has Smale horseshoes and the horseshoe chaos.

  2. Gravitational ionization: a chaotic net in the Kepler system

    Science.gov (United States)

    Chicone, C.; Mashhoon, B.; Retzloff, D. G.

    1997-03-01

    The long-term nonlinear dynamics of a Keplerian binary system under the combined influences of gravitational radiation damping and external tidal perturbations is analysed. Gravitational radiation reaction leads the binary system towards eventual collapse, while the external periodic perturbations could lead to the ionization of the system via Arnold diffusion. When these two opposing tendencies nearly balance each other, interesting chaotic behaviour occurs which is briefly studied in this paper. It is possible to show that periodic orbits can exist in this system for sufficiently small damping. Moreover, we employ the method of averaging to investigate the phenomenon of capture into resonance.

  3. Circuit Implementation and Antisynchronization of an Improved Lorenz Chaotic System

    Directory of Open Access Journals (Sweden)

    Li Xiong

    2016-01-01

    Full Text Available An improved Lorenz chaotic system is proposed, making it into a circuit which is easy to be implemented by using some basic electronic components. The antisynchronization error systems can be asymptotically stabilized at the origin with three different methods which are proposed to control the improved Lorenz system. Theoretical analyses and simulation results are given to demonstrate the feasibility and effectiveness of these proposed schemes. Then the hardware circuit for the proposed Lorenz system is implemented by repeated optimization design. Experimental results show that the circuit has good comprehensive performance.

  4. Impulsive control for synchronization of nonlinear R(o)ssler chaotic systems

    Institute of Scientific and Technical Information of China (English)

    Li Yang; Liao Xiao-Feng; Li Chuan-Dong; Chen Guo

    2006-01-01

    This paper reports that an impulsive control theory for synchronization of nonlinear R(o)ssler chaotic systems is developed. A new framework for impulsive synchronization between such chaotic systems is presented, which makes the synchronization error system a linear impulsive control system. Therefore, it is easy to derive the impulsive synchronization law. The proposed impulsive control scheme is illustrated by nonlinear R(o)ssler chaotic systems and the simulation results demonstrate the effectiveness of the method.

  5. Chaos enhanced differential evolution in the task of evolutionary control of selected set of discrete chaotic systems.

    Science.gov (United States)

    Senkerik, Roman; Zelinka, Ivan; Pluhacek, Michal; Davendra, Donald; Oplatková Kominkova, Zuzana

    2014-01-01

    Evolutionary technique differential evolution (DE) is used for the evolutionary tuning of controller parameters for the stabilization of set of different chaotic systems. The novelty of the approach is that the selected controlled discrete dissipative chaotic system is used also as the chaotic pseudorandom number generator to drive the mutation and crossover process in the DE. The idea was to utilize the hidden chaotic dynamics in pseudorandom sequences given by chaotic map to help differential evolution algorithm search for the best controller settings for the very same chaotic system. The optimizations were performed for three different chaotic systems, two types of case studies and developed cost functions.

  6. Chaos Enhanced Differential Evolution in the Task of Evolutionary Control of Selected Set of Discrete Chaotic Systems

    Directory of Open Access Journals (Sweden)

    Roman Senkerik

    2014-01-01

    Full Text Available Evolutionary technique differential evolution (DE is used for the evolutionary tuning of controller parameters for the stabilization of set of different chaotic systems. The novelty of the approach is that the selected controlled discrete dissipative chaotic system is used also as the chaotic pseudorandom number generator to drive the mutation and crossover process in the DE. The idea was to utilize the hidden chaotic dynamics in pseudorandom sequences given by chaotic map to help differential evolution algorithm search for the best controller settings for the very same chaotic system. The optimizations were performed for three different chaotic systems, two types of case studies and developed cost functions.

  7. A New Feigenbaum-Like Chaotic 3D System

    Directory of Open Access Journals (Sweden)

    Huitao Zhao

    2014-01-01

    Full Text Available Based on Sprott N system, a new three-dimensional autonomous system is reported. It is demonstrated to be chaotic in the sense of having positive largest Lyapunov exponent and fractional dimension. To further understand the complex dynamics of the system, some basic properties such as Lyapunov exponents, bifurcation diagram, Poincaré mapping, and period-doubling route to chaos are analyzed with careful numerical simulations. The obtained results also show that the period-doubling sequence of bifurcations leads to a Feigenbaum-like strange attractor.

  8. Fourier's law for quasi-one-dimensional chaotic quantum systems

    Science.gov (United States)

    Seligman, Thomas H.; Weidenmüller, Hans A.

    2011-05-01

    We derive Fourier's law for a completely coherent quasi-one-dimensional chaotic quantum system coupled locally to two heat baths at different temperatures. We solve the master equation to first order in the temperature difference. We show that the heat conductance can be expressed as a thermodynamic equilibrium coefficient taken at some intermediate temperature. We use that expression to show that for temperatures large compared to the mean level spacing of the system, the heat conductance is inversely proportional to the level density and, thus, inversely proportional to the length of the system.

  9. Impulsive control of chaotic systems and its applications in synchronization

    Institute of Scientific and Technical Information of China (English)

    Wu Bo; Liu Yang; Lu Jian-Quan

    2011-01-01

    In this paper, some novel sufficient conditions for asymptotic stability of impulsive control systems are presented by comparison systems. The results are used to obtain the conditions under which the chaotic systems can be asymptotically controlled to the origin via impulsive control. Compared with some existing results, our results are more relaxed in the sense that the Lyapunov function is required to be nonincreasing only along a subsequence of switchings. Moreover, a larger upper bound of impulsive intervals for stabilization and synchronization is obtained.

  10. Adaptive control of uncertain time-delay chaotic systems

    Institute of Scientific and Technical Information of China (English)

    Zhuhong ZHANG

    2005-01-01

    This work investigates adaptive control of a large class of uncertain me-delay chaotic systems (UTCSs) with unknown general perturbation terms bounded by a polynomial ( unknown gains). Associated with the different cases of known and unknown system matrices, two corresponding adaptive controllers are proposed to stabilize unstable fixed points of the systems by means of Lyapunov stability theory and linear matrix inequalities (LMI) which can be solved easily by convex optimization algorithms. Two examples are used for examining the effectiveness of the proposed methods.

  11. Adaptive Projective Synchronization between Two Different Fractional-Order Chaotic Systems with Fully Unknown Parameters

    OpenAIRE

    Liping Chen; Shanbi Wei; Yi Chai; Ranchao Wu

    2012-01-01

    Projective synchronization between two different fractional-order chaotic systems with fully unknown parameters for drive and response systems is investigated. On the basis of the stability theory of fractional-order differential equations, a suitable and effective adaptive control law and a parameter update rule for unknown parameters are designed, such that projective synchronization between the fractional-order chaotic Chen system and the fractional-order chaoticsystem with unknown par...

  12. Adaptive control of chaotic systems based on a single layer neural network

    Energy Technology Data Exchange (ETDEWEB)

    Shen Liqun [Space Control and Inertia Technology Research Center, Harbin Institute of Technology, Harbin 150001 (China)], E-mail: liqunshen@gmail.com; Wang Mao [Space Control and Inertia Technology Research Center, Harbin Institute of Technology, Harbin 150001 (China)

    2007-08-27

    This Letter presents an adaptive neural network control method for the chaos control problem. Based on a single layer neural network, the dynamic about the unstable fixed period point of the chaotic system can be adaptively identified without detailed information about the chaotic system. And the controlled chaotic system can be stabilized on the unstable fixed period orbit. Simulation results of Henon map and Lorenz system verify the effectiveness of the proposed control method.

  13. A Simple Discrete System with Chaotic Behavior

    NARCIS (Netherlands)

    Asveld, Peter R.J.

    1988-01-01

    We discuss the behavior of a particular discrete system, viz. Post's system of tag with alphabet $\\{0,1\\}$, deletion number $d=3$, and rules: $0\\rightarrow 00$, $1\\rightarrow 1101$. As initial strings we consider all strings of length less than or equal to 15 as well as all 'worst case' inputs of t

  14. Chaotic dynamics in N-body systems

    NARCIS (Netherlands)

    Boekholt, Tjarda Coenraad Nico

    2015-01-01

    Ever since Isaac Newton in 1687 posed the N-body problem, astronomers have been looking for its solutions in order to understand the evolution of dynamical systems, such as our own solar system, star clusters and galaxies. The main difficulty is that small errors grow exponentially, so that numerica

  15. A Novel Image Encryption Algorithm Based on DNA Encoding and Spatiotemporal Chaos

    Directory of Open Access Journals (Sweden)

    Chunyan Song

    2015-10-01

    Full Text Available DNA computing based image encryption is a new, promising field. In this paper, we propose a novel image encryption scheme based on DNA encoding and spatiotemporal chaos. In particular, after the plain image is primarily diffused with the bitwise Exclusive-OR operation, the DNA mapping rule is introduced to encode the diffused image. In order to enhance the encryption, the spatiotemporal chaotic system is used to confuse the rows and columns of the DNA encoded image. The experiments demonstrate that the proposed encryption algorithm is of high key sensitivity and large key space, and it can resist brute-force attack, entropy attack, differential attack, chosen-plaintext attack, known-plaintext attack and statistical attack.

  16. An Image Encryption Scheme Based on Bit Circular Shift and Bi-directional Diffusion

    Directory of Open Access Journals (Sweden)

    Ruisong Ye

    2013-12-01

    Full Text Available A novel image encryption scheme based on chaotic system is proposed. The proposed encryption scheme utilizes one tent map to generate a pseudo-random sequence and then shift the bits of the expanding 0-1 image circularly so as to shuffle the image gray values. To make the encryption scheme resist differential attack efficiently, generalized Arnold maps and Bernoulli shift maps are applied to produce two pseudo-random gray value sequences and then diffuse the gray values bi-directionally. The bit circular shift process and diffusion processes greatly confuse the statistical nature between plain-images and cipher-images. Security analyses including key sensitivity analysis, key space analysis, statistical analysis, differential attack analysis and information entropy analysis are performed. All the experimental results demonstrate that the proposed image encryption scheme possesses large key space to frustrate brute-force attack efficiently and can resist statistical attack, differential attack, etc.

  17. Hybrid Dislocated Control and General Hybrid Projective Dislocated Synchronization for Memristor Chaotic Oscillator System

    Directory of Open Access Journals (Sweden)

    Junwei Sun

    2014-01-01

    Full Text Available Some important dynamical properties of the memristor chaotic oscillator system have been studied in the paper. A novel hybrid dislocated control method and a general hybrid projective dislocated synchronization scheme have been realized for memristor chaotic oscillator system. The paper firstly presents hybrid dislocated control method for stabilizing chaos to the unstable equilibrium point. Based on the Lyapunov stability theorem, general hybrid projective dislocated synchronization has been studied for the drive memristor chaotic oscillator system and the same response memristor chaotic oscillator system. For the different dimensions, the memristor chaotic oscillator system and the other chaotic system have realized general hybrid projective dislocated synchronization. Numerical simulations are given to show the effectiveness of these methods.

  18. 提取明文信息耦合多混沌像素混乱的彩图 RGB 分量同步无损加密算法%Lossless encryption algorithm of color image RGB components based on extraction plaintext information coupled multi-chaotic pixel shuffle

    Institute of Scientific and Technical Information of China (English)

    潘强; 印鉴

    2015-01-01

    针对当前的彩色图像加密方案都是将 R、G、B 三基色的像素分离来单独进行加密,且生成的混沌序列不依赖于明文信息,导致密文随机性和抗攻击性较差等不足,提出了提取明文信息耦合多混沌像素混乱的彩图RGB 同步加密算法。首先,将图像 RGB 三基色的像素进行分离、二值化与矢量化处理,得到 RGB 三个矢量;重组这些矢量,得到 R、G、B 各像素均彼此依赖的置乱矩阵;然后,通过提取明文图像信息来控制四个超混沌系统的迭代,得到与明文相关的随机序列,对置乱矩阵完成列、行扩散。仿真结果表明,与其他彩图加密机制相比,加密系统的安全性更高,且密钥空间更大,密钥敏感性强。%In order to solve these defects such as poor performance of cipher random as well as anti-attack induced by the ob-tained sequence aren't dependent on the plaintext and separately encrypting RGB pixel in current color image encryption sys-tems, this paper proposed the lossless synchronously encryption algorithm of color image RGB components based on extraction plaintext information coupled multi-chaotic pixel shuffle.Firstly, it performed the operation of the color image RGB pixels sep-aration, binarization and vectorization to get the three vectors of RGB, and regrouped theses vectors to obtain the permutation matrix of RGB pixels interaction.Then it extracted the image information to control iterative processes of four super-chaotic systems for making the random sequence associated with the plaintext, and used these random sequences to encrypt the permu-tation matrix by shuffling column-wise and row-wise.Simulation results show that compared with other color image encryption algorithm, this algorithm has higher security and larger key space, as well as strong key sensitive performance.This algorithm has high security, and it can meet the actual engineering requirements.

  19. An efficient and provably-secure certificateless public key encryption scheme for telecare medicine information systems.

    Science.gov (United States)

    Guo, Rui; Wen, Qiaoyan; Shi, Huixian; Jin, Zhengping; Zhang, Hua

    2013-10-01

    Telecare Medicine Information Systems (TMIS) promote the traditional medical and healthcare services by information and communication technology. Since the physician and caregiver can monitor the patient's physiological condition remotely in TMIS, the confidentiality of this sensitive data should be protected, which is the key issue in the Health Insurance Portability and Accountability Act. In this paper, we propose an efficient certificateless public key encryption scheme without bilinear pairing for TMIS. Our proposal is proved to be secure in the random oracle model under the hardness assumption of computational Diffie-Hellman problem. Moreover, after modifying the original model of the certificateless encryption, this scheme achieves Girault's trust level 3. Compared with the related protocols, the perform evaluations show that our scheme is more efficient and appropriate to collocate with low power mobile devices for TMIS.

  20. Low-power Implementation of an Encryption/Decryption System with Asynchronous Techniques

    Directory of Open Access Journals (Sweden)

    Nikos Sklavos

    2002-01-01

    Full Text Available An asynchronous VLSI implementation of the International Data Encryption Algorithm (IDEA is presented in this paper. In order to evaluate the asynchronous design a synchronous version of the algorithm was also designed. VHDL hardware description language was used in order to describe the algorithm. By using Synopsys commercial available tools the VHDL code was synthesized. After placing and routing both designs were fabricated with 0.6 μm CMOS technology. With a system clock of up to 8 MHz and a power supply of 5 V the two chips were tested and evaluated comparing with the software implementation of the IDEA algorithm. This new approach proves efficiently the lowest power consumption of the asynchronous implementation compared to the existing synchronous. Therefore, the asynchronous chip performs efficiently in Wireless Encryption Protocols and high speed networks.

  1. An optical authentication system based on encryption technique and multimodal biometrics

    Science.gov (United States)

    Yuan, Sheng; Zhang, Tong; Zhou, Xin; Liu, Xuemei; Liu, Mingtang

    2013-12-01

    A major concern nowadays for a biometric credential management system is its potential vulnerability to protect its information sources. To prevent a genuine user's templates from both internal and external threats, a novel and simple method combined optical encryption with multimodal biometric authentication technique is proposed. In this method, the standard biometric templates are generated real-timely by the verification keys owned by legal user so that they are unnecessary to be stored in a database. Compared with the traditional recognition algorithms, storage space and matching time are greatly saved. In addition, the verification keys are difficult to be forged due to the utilization of optical encryption technique. Although the verification keys are lost or stolen, they are useless for others in absence of the legal owner's biometric. A series of numerical simulations are performed to demonstrate the feasibility and performance of this method.

  2. Modified function projective synchronization of chaotic system

    Energy Technology Data Exchange (ETDEWEB)

    Du Hongyue [School of Automation, Harbin University of Science and Technology, Harbin 150080 (China); Space Control and Inertial Technology Research Center, Harbin Institute of Technology, Harbin 150001 (China)], E-mail: du_hong_yue@yahoo.com.cn; Zeng Qingshuang; Wang Changhong [Space Control and Inertial Technology Research Center, Harbin Institute of Technology, Harbin 150001 (China)

    2009-11-30

    This paper presents a new type synchronization called modified function projective synchronization, where the drive and response systems could be synchronized up to a desired scale function matrix. It is obvious that the unpredictability of the scaling functions can additionally enhance the security of communication. By active control scheme, we take Lorenz system as an example to illustrate above synchronization phenomenon. Furthermore, based on modified function projective synchronization, a scheme for secure communication is investigated in theory. The corresponding numerical simulations are performed to verify and illustrate the analytical results.

  3. Chaotic motion in nonlinear feedback systems

    Energy Technology Data Exchange (ETDEWEB)

    Baillieul, J. (Scientific Systems, Inc., Cambridge, MA); Brockett, R.W.; Washburn, R.B.

    1980-11-01

    New criteria are found which imply the existence of chaos in R/sup n/. These differ significantly from criteria previously reported in the mathematics literature, and in fact our methods apply to a class of systems which do not satisfy the hypotheses of the usual theorems on chaos in R/sup n/. The results are stated in such a way as to preserve the flavor of many well-known frequency-domain stability techniques. The results provide easily verifiable criteria for the existence of chaos in systems which are of dimension greater than one.

  4. Instantaneous frequencies of a chaotic system

    Indian Academy of Sciences (India)

    C Chandre; T Uzer

    2005-03-01

    The structure and geometry of high-dimensional, complex dynamical systems is usually hidden under a profusion of numerical data. We show that time–frequency analysis allows one to analyze these data regardless of the number of degrees of freedom. Our method takes snapshots of the system in terms of its instantaneous frequencies defined as ridges of the time–frequency landscape. Using the wavelet transform of a single trajectory, it can characterize key dynamical properties like the extent of chaos, resonance transitions and trappings.

  5. NUMERICAL ANALYSIS OF A CHAOTIC SYSTEM

    Institute of Scientific and Technical Information of China (English)

    任志坚

    2001-01-01

    This paper further proves that a single spiral strange attractor can be observed in an extremely simple autonomous electrical circuit by computer simulation. It is of third order and has only one nonlinear element: a three-segment piecewise linear resistor. The digital analyses show that the strange attractor has peculiar features compared with other third-order differential systems.

  6. Chaotic systems in complex phase space

    CERN Document Server

    Bender, Carl M; Hook, Daniel W; Weir, David J

    2008-01-01

    This paper examines numerically the complex classical trajectories of the kicked rotor and the double pendulum. Both of these systems exhibit a transition to chaos, and this feature is studied in complex phase space. Additionally, it is shown that the short-time and long-time behaviors of these two PT-symmetric dynamical models in complex phase space exhibit strong qualitative similarities.

  7. Synchronization of uncertain chaotic systems using active sliding mode control

    Energy Technology Data Exchange (ETDEWEB)

    Haeri, Mohammad [Advanced Control System Lab, Electrical Engineering Department, Sharif University of Technology, Azadi Avenue, 11365-9363 Tehran (Iran, Islamic Republic of)]. E-mail: haeri@sina.sharif.edu; Tavazoei, Mohammad Saleh [Advanced Control System Lab, Electrical Engineering Department, Sharif University of Technology, Azadi Avenue, 11365-9363 Tehran (Iran, Islamic Republic of); Naseh, Majid Reza [Electrical Engineering Department, Islamic Azad University of Birjand, Birjand (Iran, Islamic Republic of)

    2007-08-15

    We apply the active sliding mode controller to synchronize two uncertain chaotic systems. Uncertainties are considered both in linear and nonlinear parts of the system dynamics. We have also studied the case that the signals are contaminated by measuring channel noise. It is shown that having some conditions on the uncertainties and noise magnitude, the closed loop stability can be guaranteed. The synchronization errors are shown to be confined into some bounded value. Numerical simulations are presented to evaluate the analysis and effectiveness of the controller.

  8. Adaptive fuzzy sliding mode control of Lorenz chaotic system

    Institute of Scientific and Technical Information of China (English)

    WU Ligang; WANG Changhong

    2007-01-01

    By using the exponential reaching law technology,a sliding mode controller was designed for Lorenz chaotic system subject to an unknown external disturbance.On this basis,considering the unknown disturbance,an adaptive law was introduced to adaptively estimate the parameters of the disturbance bounds.Furthermore,to eliminate the chattering resulting from the discontinuous switch controller and to guarantee system transient performance,a new adaptive fuzzy sliding mode controller was designed.The results of the simulation show the effectiveness of the proposed control scheme.

  9. Global adaptive synchronization of chaotic systems with uncertain parameters

    Institute of Scientific and Technical Information of China (English)

    李智; 韩崇昭

    2002-01-01

    We propose a novel adaptive synchronization method for a class of nonlinear chaotic systems with uncertainparameters. Using the chaos control method, we derive a synchronizer, which can make the states of the driven systemglobally track the states of the drive system asymptotically. The advantage of our method is that our problem setting ismore general than those that already exist, and the synchronizer is simply constructed by an analytic formula, withoutknowledge in advance of the unknown bounds of the uncertain parameters. A computer simulation example is given tovalidate the proposed approach.

  10. Nonlinear control of chaotic systems:A switching manifold approach

    Directory of Open Access Journals (Sweden)

    Jin-Qing Fang

    2000-01-01

    Full Text Available In this paper, a switching manifold approach is developed for nonlinear feed-back control of chaotic systems. The design strategy is straightforward, and the nonlinear control law is the simple bang–bang control. Yet, this control method is very effective; for instance, several desired equilibria can be stabilized by using one control law with different initial conditions. Its effectiveness is verified by both theoretical analysis and numerical simulations. The Lorenz system simulation is shown for the purpose of illustration.

  11. Chaotic mechanics in systems with impacts and friction

    CERN Document Server

    Blazejczyk-Okolewska, Barbara; Kapitaniak, Tomasz; Wojewoda, Jerzy

    1999-01-01

    This book is devoted to the theory of chaotic oscillations in mechanical systems. Detailed descriptions of the basic types of nonlinearity - impacts and dry friction - are presented. The properties of such behavior are discussed, and the numerical and experimental results obtained by the authors are presented.The dynamic properties of systems described here can be useful in the proper design and use of mechanics where such behavior still creates problems.This book will be very useful for anyone with a fundamental knowledge of nonlinear mechanics who is beginning research in the field.

  12. The equal combination synchronization of a class of chaotic systems with discontinuous output

    Energy Technology Data Exchange (ETDEWEB)

    Luo, Runzi; Zeng, Yanhui [Department of Mathematics, Nanchang University, Nanchang 330031 (China)

    2015-11-15

    This paper investigates the equal combination synchronization of a class of chaotic systems. The chaotic systems are assumed that only the output state variable is available and the output may be discontinuous state variable. By constructing proper observers, some novel criteria for the equal combination synchronization are proposed. The Lorenz chaotic system is taken as an example to demonstrate the efficiency of the proposed approach.

  13. Realization of generalized synchronization between different chaotic systems via scalar controller

    Institute of Scientific and Technical Information of China (English)

    2007-01-01

    In this paper, a very simple generalized synchronization method between different chaotic systems is presented.Only a scalar controller is used in this method. The method of obtaining the scalar controller from chaotic systems is established. The sufficient and necessary condition of generalized synchronization is obtained from a rigorous theory,and the sufficient and necessary condition of generalized synchronization is irrelative to chaotic system itself. Theoretical analyses and simulation results show that the method established in this paper is effective.

  14. A General Threshold Signature and Authenticated Encryption Scheme Based on ElGamal System

    Directory of Open Access Journals (Sweden)

    Yulian Shang

    2013-07-01

    Full Text Available Based on ElGamal system, a group-oriented threshold signature and authenticated encryption scheme was put forward. After being signed by a signer group employing threshold signature scheme, the message was transmitted to a particular verifier group, and then the signature was verified through the cooperation of  ones from the verifier group with  members. Similarly, a general authenticated encryption scheme characterized by joint verification was put forward through integrating threshold signature scheme and message recovery technique together; After being encrypted singed by any  ones from a group with  members, the message was transmitted to a particular verifier group with members, and then recovered through the cooperation of any ones from the verifier group. The security of this scheme is based on Shamir threshold scheme and ElGamal system. It realized the directional transmission of message between different groups and enjoyed the characteristics of reduced communication load and lowered calculation complexity, etc.

  15. A Study on Design of Database Encrypting System%数据库加密系统设计研究

    Institute of Scientific and Technical Information of China (English)

    周婕; 李斌

    2011-01-01

    从增强数据库安全性出发,对数据库加密的层次、原理、算法和密钥管理等关键技术进行了分析研究,并研究了如何设计数据库加密系统,提出了一种数据库加密系统设计方案,给出了具体的设计模型并说明了各个功能模块的主要作用和实现方法,最后讨论了该加密系统对数据库的影响.%For the sake of enhancing the security of database, the article firstly analyzes the key technologies of encrypting database such as encrypting levels, encrypting principle, arithmetic, key management and so on.It also investigates into how to design a database encrypting system.Secondly, it puts forward a scheme of designing a database encrypting system.Then it puts forward the idiographic designing model and illuminates the main function and realization method of each module Lastly, it discusses the influence of the database encrypting system to the database.

  16. Chaotic systems in complex phase space

    Indian Academy of Sciences (India)

    Carl M Bender; Joshua Feinberg; Daniel W Hook; David J Weir

    2009-09-01

    This paper examines numerically the complex classical trajectories of the kicked rotor and the double pendulum. Both of these systems exhibit a transition to chaos, and this feature is studied in complex phase space. Additionally, it is shown that the short-time and long-time behaviours of these two $\\mathcal{PT}$ -symmetric dynamical models in complex phase space exhibit strong qualitative similarities.

  17. Hybrid TS fuzzy modelling and simulation for chaotic Lorenz system

    Institute of Scientific and Technical Information of China (English)

    Li De-Quan

    2006-01-01

    The projection of the chaotic attractor observed from the Lorenz system in the X-Z plane is like a butterfly, hence the classical Lorenz system is widely known as the butterfly attractor, and has served as a prototype model for studying chaotic behaviour since it was coined. In this work we take one step further to investigate some fundamental dynamic behaviours of a novel hybrid Takagi-Sugeno (TS) fuzzy Lorenz-type system, which is essentially derived from the delta-operator-based TS fuzzy modelling for complex nonlinear systems, and contains the original Lorenz system of continuous-time TS fuzzy form as a special case. By simply and appropriately tuning the additional parametric perturbations in the two-rule hybrid TS fuzzy Lorenz-type system, complex (two-wing) butterfly attractors observed from this system in the three dimensional (3D) X-Y-Z space are created, which have not yet been reported in the literature, and the forming mechanism of the compound structures have been numerically investigated.

  18. A New Image Encryption Algorithm Based on Quantum Key and Chaotic Mapping%一种基于量子密钥与混沌映射的图像加密新方法

    Institute of Scientific and Technical Information of China (English)

    张克; 高会新

    2016-01-01

    According to the certifiable security of quantum key distribution protocol and pseudo random characteristics of the chaotic sequence, a new image encryption method that combined quantum key and chaotic mapping was proposed. Firstly, initial quantum key was obtained with BB84 protocol, then quantum key was formed after error checking for the initial key with data consulting approach, and the last key stream was achieved by combining the quantum key and chaotic sequence from Logistic mapping. Lastly, pixel values were replaced with XOR operation of pixel values and the last key stream, and image was encrypted. Simulation results and analysis show that, the new cryptographic algorithm can more effectively resist statistics-based and plain text attack, while ensuring the security of key transformation; the key stream results from the new method is highly sensitive to initial parameters.%依据量子密钥分配协议具有可证明的安全性及混沌序列的伪随机性,提出一种基于量子密钥与混沌映射相结合的图像加密新方法。根据BB84协议获得初始量子密钥,采用数据协商方式对初始密钥进行纠错,再将所得量子密钥与Logistic混沌序列相融合,生成最终的密钥流,以此对图像像素值通过异或运算进行置换实现图像加密。仿真结果与分析表明:本文方法在保证密钥传输安全性的同时,可以更为有效地掩盖图像的统计信息、抵御明文攻击;密钥流对于初始参数具有高敏感性。

  19. On entanglement spreading in chaotic systems

    CERN Document Server

    Mezei, Márk

    2016-01-01

    We discuss the time dependence of subsystem entropies in interacting quantum systems. As a model for the time dependence, we suggest that the entropy is as large as possible given two constraints: one follows from the existence of an emergent light cone, and the other is a conjecture associated to the "entanglement velocity" $v_E$. We compare this model to new holographic and spin chain computations, and to an operator growth picture. Finally, we introduce a second way of computing the emergent light cone speed in holographic theories that provides a boundary dynamics explanation for a special case of entanglement wedge subregion duality in AdS/CFT.

  20. Hybrid chaotic sequence for QS-CDMA system with RAKE receiver

    Institute of Scientific and Technical Information of China (English)

    饶妮妮; 许晓晶; 李少谦

    2004-01-01

    A class of the hybrid chaotic sequences is presented. The generator of the sequences is given and realized by the digital method. The hybrid chaotic sequences exhibit good random properties that are very important for the performance of QS-CDMA system with RAKE receiver. The performance of the system is analyzed when the hybrid chaotic sequences are used as spreading codes in a QS-CDMA system with RAKE receiver and compared with those obtained for m-sequences and logistic sequences. The results show that the hybrid chaotic sequences are a class of very promising spreading codes for QS-CDMA system.

  1. Simultaneous Synchronization and Anti-Synchronization of Two Identical New 4D Chaotic Systems

    Institute of Scientific and Technical Information of China (English)

    GUO Rong-Wei

    2011-01-01

    We investigate the synchronization and anti-synchronization of the new 4D chaotic system and propose a same adaptive controller in the form which not only synchronizes, but also anti-synchronizes two identical new 4D chaotic systems. Numerical simulations verify the correctness and the effectiveness of the proposed theoretical results.%@@ We investigate the synchronization and anti-synchronization of the new 4D chaotic system and propose a same adaptive controller in the form which not only synchronizes, but also anti-synchronizes two identical new 4D chaotic systems.Numerical simulations verify the correctness and the effectiveness of the proposed theoretical results.

  2. Properties of numerical experiments in chaotic dynamical systems

    Science.gov (United States)

    Yuan, Guo-Cheng

    1999-10-01

    This dissertation contains four projects that I have worked on during my graduate study at University of Maryland at College Park. These projects are all related to numerical simulations of chaotic dynamical systems. In particular, the two conjectures in Chapter 1 are inspired by the numerical discoveries in Hunt and Ott [1, 2]. In Chapter 2, statistical properties of scalar transport in chaotic flows are investigated by using numerical simulations. In Chapters 3 and 4, I take a different angle and discuss the limitations of numerical simulations; i.e. for certain ``bad'' systems numerical simulations will yield incorrect or at least unreliable results no matter how many digits of precision are used. Chapter 1 discusses the properties of optimal orbits. Given a dynamical system and a function f from the state space to the real numbers, an optimal orbit for f is an orbit over which the average of f is maximal. In this chapter we discuss some basic mathematical aspects of optimal orbits: existence, sensitivity to perturbations of f, and approximability by periodic orbits with low period. For hyperbolic systems, we conjecture that (1)for (topologically) generic smooth functions, there exists an optimal periodic orbit, and (2)the optimal average can be approximated exponentially well by averages over certain periodic orbits with increasing period. In Chapter 2 we theoretically study the power spectrum of passive scalars transported in two dimensional chaotic fluid flows. Using a wave-packet method introduced by Antonsen et al. [3] [4], we numerically investigate several model flows, and confirm that the power spectrum has the k -l- scaling predicted by Batchelor [5]. In Chapter 3 we consider a class of nonhyperbolic systems, for which there are two fixed points in an attractor having a dense trajectory; the unstable manifold of one fixed point has dimension one and the other's is two dimensional. Under the condition that there exists a direction which is more expanding

  3. Perfect synchronization of chaotic systems: a controllability perspective

    Institute of Scientific and Technical Information of China (English)

    Sun Ming-Xuan; He Xiong-Xiong; Yu Li

    2006-01-01

    This paper presents a synchronization method, motivated from the constructive controllability analysis, for two identical chaotic systems. This technique is applied to achieve perfect synchronization for Lorenz systems and coupled dynamo systems. It turns out that states of the drive system and the response system are synchronized within finite time, and the reaching time is independent of initial conditions, which can be specified in advance. In addition to the simultaneous synchronization, the response system is synchronized un-simultaneously to the drive system with different reaching time for each state. The performance of the resulting system is analytically quantified in the face of initial condition error, and with numerical experiments the proposed method is demonstrated to perform well.

  4. A novel chaos-based image encryption algorithm using DNA sequence operations

    Science.gov (United States)

    Chai, Xiuli; Chen, Yiran; Broyde, Lucie

    2017-01-01

    An image encryption algorithm based on chaotic system and deoxyribonucleic acid (DNA) sequence operations is proposed in this paper. First, the plain image is encoded into a DNA matrix, and then a new wave-based permutation scheme is performed on it. The chaotic sequences produced by 2D Logistic chaotic map are employed for row circular permutation (RCP) and column circular permutation (CCP). Initial values and parameters of the chaotic system are calculated by the SHA 256 hash of the plain image and the given values. Then, a row-by-row image diffusion method at DNA level is applied. A key matrix generated from the chaotic map is used to fuse the confused DNA matrix; also the initial values and system parameters of the chaotic system are renewed by the hamming distance of the plain image. Finally, after decoding the diffused DNA matrix, we obtain the cipher image. The DNA encoding/decoding rules of the plain image and the key matrix are determined by the plain image. Experimental results and security analyses both confirm that the proposed algorithm has not only an excellent encryption result but also resists various typical attacks.

  5. A chaotic system with a single unstable node

    Energy Technology Data Exchange (ETDEWEB)

    Sprott, J.C. [Department of Physics, University of Wisconsin, Madison, WI 53706 (United States); Jafari, Sajad, E-mail: sajadjafari@aut.ac.ir [Biomedical Engineering Department, Amirkabir University of Technology, Tehran 15875-4413 (Iran, Islamic Republic of); Pham, Viet-Thanh [School of Electronics and Telecommunications, Hanoi University of Science and Technology, 01 Dai Co Viet, Hanoi (Viet Nam); Hosseini, Zahra Sadat [Biomedical Engineering Department, Amirkabir University of Technology, Tehran 15875-4413 (Iran, Islamic Republic of)

    2015-09-25

    This paper describes an unusual example of a three-dimensional dissipative chaotic flow with quadratic nonlinearities in which the only equilibrium is an unstable node. The region of parameter space with bounded solutions is relatively small as is the basin of attraction, which accounts for the difficulty of its discovery. Furthermore, for some values of the parameters, the system has an attracting torus, which is uncommon in three-dimensional systems, and this torus can coexist with a strange attractor or with a limit cycle. The limit cycle and strange attractor exhibit symmetry breaking and attractor merging. All the attractors appear to be hidden in that they cannot be found by starting with initial conditions in the vicinity of the equilibrium, and thus they represent a new type of hidden attractor with important and potentially problematic engineering consequences. - Highlights: • An unusual example of a three-dimensional dissipative chaotic flow is introduced. • In this system the only equilibrium is an unstable node. • For some values of the parameters, the system has an attracting torus. • This torus can coexist with a strange attractor or with a limit cycle. • These properties are uncommon in three-dimensional systems.

  6. A chaotic neural network mimicking an olfactory system and its application on image recognition

    Institute of Scientific and Technical Information of China (English)

    WANG Le; LI Guang; LI Xu; GUO Hong-ji; Walter J. Freeman

    2004-01-01

    Based on the research of a biological olfactory system, a novel chaotic neural network model - K set model has been established. This chaotic neural network not only simulates the real brain activity of an olfactory system, but also presents a novel chaotic concept for signal processing and pattern recognition. The characteristics of the K set models are investigated and show that a KⅢ model can be used for image pattern classification.

  7. The n-level spectral correlations for chaotic systems

    Energy Technology Data Exchange (ETDEWEB)

    Nagao, Taro [Graduate School of Mathematics, Nagoya University, Chikusa-ku, Nagoya 464-8602 (Japan); Mueller, Sebastian [Department of Mathematics, University of Bristol, Bristol BS8 1TW (United Kingdom)

    2009-09-18

    We study the n-level spectral correlation functions of classically chaotic quantum systems without time-reversal symmetry. According to Bohigas, Giannoni and Schmit's universality conjecture, it is expected that the correlation functions are in agreement with the prediction of the circular unitary ensemble (CUE) of random matrices. A semiclassical resummation formalism allows us to express the correlation functions as sums over pseudo-orbits. Using an extended version of the diagonal approximation on the pseudo-orbit sums, we derive the n-level correlation functions identical to the n x n determinantal correlation functions of the CUE.

  8. Linear generalized synchronization of chaotic systems with uncertain parameters

    Institute of Scientific and Technical Information of China (English)

    Jia Zhen

    2008-01-01

    A more general form of projective synchronization,so called linear generalized synchronization(LGS)is proposed,which includes the generalized projective synchronization(GPS)and the hybrid projective synchronization(HPS)as its special cases.Based on the adaptive technique and Lyapunov stability theory,a general method for achieving the LGS between two chaotic or hyperchaotic systems with uncertain parameters in any scaling matrix is presented.Some numerical simulations are provided to show the effectiveness and feasibility of the proposed synchronization method.

  9. Nonlinear time reversal in a wave chaotic system.

    Science.gov (United States)

    Frazier, Matthew; Taddese, Biniyam; Antonsen, Thomas; Anlage, Steven M

    2013-02-01

    Exploiting the time-reversal invariance and reciprocal properties of the lossless wave equation enables elegantly simple solutions to complex wave-scattering problems and is embodied in the time-reversal mirror. Here we demonstrate the implementation of an electromagnetic time-reversal mirror in a wave chaotic system containing a discrete nonlinearity. We demonstrate that the time-reversed nonlinear excitations reconstruct exclusively upon the source of the nonlinearity. As an example of its utility, we demonstrate a new form of secure communication and point out other applications.

  10. A mixed analog/digital chaotic neuro-computer system for quadratic assignment problems.

    Science.gov (United States)

    Horio, Yoshihiko; Ikeguchi, Tohru; Aihara, Kazuyuki

    2005-01-01

    We construct a mixed analog/digital chaotic neuro-computer prototype system for quadratic assignment problems (QAPs). The QAP is one of the difficult NP-hard problems, and includes several real-world applications. Chaotic neural networks have been used to solve combinatorial optimization problems through chaotic search dynamics, which efficiently searches optimal or near optimal solutions. However, preliminary experiments have shown that, although it obtained good feasible solutions, the Hopfield-type chaotic neuro-computer hardware system could not obtain the optimal solution of the QAP. Therefore, in the present study, we improve the system performance by adopting a solution construction method, which constructs a feasible solution using the analog internal state values of the chaotic neurons at each iteration. In order to include the construction method into our hardware, we install a multi-channel analog-to-digital conversion system to observe the internal states of the chaotic neurons. We show experimentally that a great improvement in the system performance over the original Hopfield-type chaotic neuro-computer is obtained. That is, we obtain the optimal solution for the size-10 QAP in less than 1000 iterations. In addition, we propose a guideline for parameter tuning of the chaotic neuro-computer system according to the observation of the internal states of several chaotic neurons in the network.

  11. A discrete-time chaos synchronization system for electronic locking devices

    Science.gov (United States)

    Minero-Ramales, G.; López-Mancilla, D.; Castañeda, Carlos E.; Huerta Cuellar, G.; Chiu Z., R.; Hugo García López, J.; Jaimes Reátegui, R.; Villafaña Rauda, E.; Posadas-Castillo, C.

    2016-11-01

    This paper presents a novel electronic locking key based on discrete-time chaos synchronization. Two Chen chaos generators are synchronized using the Model-Matching Approach, from non-linear control theory, in order to perform the encryption/decryption of the signal to be transmitted. A model/transmitter system is designed, generating a key of chaotic pulses in discrete-time. A plant/receiver system uses the above mentioned key to unlock the mechanism. Two alternative schemes to transmit the private chaotic key are proposed. The first one utilizes two transmission channels. One channel is used to encrypt the chaotic key and the other is used to achieve output synchronization. The second alternative uses only one transmission channel for obtaining synchronization and encryption of the chaotic key. In both cases, the private chaotic key is encrypted again with chaos to solve secure communication-related problems. The results obtained via simulations contribute to enhance the electronic locking devices.

  12. Controlling a Chaotic System through Control Parameter Self-Modulation

    Energy Technology Data Exchange (ETDEWEB)

    Pastor, I.

    1994-07-01

    A method for obtaining active control of a chaotic system based on the modulation of a control parameter by adding to it a small perturbation proportional to one output signal is proposed. From a theoretical point of view, chaos can be stabilized in the framework of this method because small modifications of the vector field controlling the dynamics are allowed, and thus some of the previously oxi sting unstable periodic trajectories can be made stable. The method is much inspired on recent treatments of some related problems, and i t is compared with them. One of its most attractive features is that is should be very easy to implement it on real experiments. The method is tested on a system of ordinary differential equations model ling the coupling of two se If - oscillating electronic circuits (van der Pol oscillators). Some brief comments are made on the no possibility that it could be applied to complex spatio-temporal systems where multiple chaotic structures can coexist for some values of the control parameters. (Author) 28 refs.

  13. Passive control of Permanent Magnet Synchronous Motor chaotic system based on state observer

    Institute of Scientific and Technical Information of China (English)

    QI Dong-lian; WANG Qiao

    2006-01-01

    Passive system theory was applied to propose a new passive control method with nonlinear observer of the Permanent Magnet Synchronous Motor chaotic system. Through constructing a Lyapunov function, the subsystem of the Permanent Magnet Synchronous Motor chaotic system could be proved to be globally stable at the equilibrium point. Then a controller with smooth state feedback is designed so that the Permanent Magnet Synchronous Motor chaotic system can be equivalent to a passive system.To get the state variables of the controller, the nonlinear observer is also studied. It is found that the outputs of the nonlinear observer can approximate the state variables of the Permanent Magnet Synchronous Motor chaotic system if the system's nonlinear function is a globally Lipschitz function. Simulation results showed that the equivalent passive system of Permanent Magnet Synchronous Motor chaotic system could be globally asymptotically stabilized by smooth state feedback in the observed parameter convergence condition area.

  14. Global Chaos Synchronization Between Two New DifferentChaotic Systems Via Active Control

    Institute of Scientific and Technical Information of China (English)

    XU Guang-Li

    2009-01-01

    This work presents chaos synchronization between two new different chaotic systems by using active control.The proposed controller ensures that the states of the controlled chaotic response system asymptotically synchronizes the states of the drive system.Numerical simulations are shown to verify the result.

  15. Global Chaos Synchronization between Two New Different Chaotic Systems via Active Control

    Institute of Scientific and Technical Information of China (English)

    SUN Feng-Yun

    2006-01-01

    We present chaos synchronization between two new different chaotic systems by using active control.The proposed controller ensures that the states of the controlled chaotic response system asymptotically synchronizes the states of the drive system.Numerical simulations are shown to verify the result.

  16. Hierarchical fractal Weyl laws for chaotic resonance states in open mixed systems.

    Science.gov (United States)

    Körber, M J; Michler, M; Bäcker, A; Ketzmerick, R

    2013-09-13

    In open chaotic systems the number of long-lived resonance states obeys a fractal Weyl law, which depends on the fractal dimension of the chaotic saddle. We study the generic case of a mixed phase space with regular and chaotic dynamics. We find a hierarchy of fractal Weyl laws, one for each region of the hierarchical decomposition of the chaotic phase-space component. This is based on our observation of hierarchical resonance states localizing on these regions. Numerically this is verified for the standard map and a hierarchical model system.

  17. Multiswitching combination–combination synchronization of chaotic systems

    Indian Academy of Sciences (India)

    AYUB KHAN; DINESH KHATTAR; NITISH PRAJAPATI

    2017-03-01

    In this paper, a novel synchronization scheme is investigated for a class of chaotic systems. Themultiswitching synchronization scheme is extended to the combination–combination synchronization scheme such that the combination of state variables of two drive systems synchronize with different combination of state variables of two response systems, simultaneously. The new scheme, multiswitching combination–combination synchronization (MSCCS), is a notable extension of the earlier multiswitching schemes concerning only the single drive–response system model. Various multiswitching modified projective synchronization schemes are obtained as special cases of MSCCS, for a suitable choice of scaling factors. Suitable controllers have been designed and using Lyapunov stability theory sufficient condition is obtained to achieve MSCCS between four hyperchaotic systems and the corresponding theoretical proof is given. Numerical simulations are performed to validate the theoretical results.

  18. Chaos pass filter: Linear response of synchronized chaotic systems

    Science.gov (United States)

    Zeeb, Steffen; Kestler, Johannes; Kanter, Ido; Kinzel, Wolfgang

    2013-04-01

    The linear response of synchronized time-delayed chaotic systems to small external perturbations, i.e., the phenomenon of chaos pass filter, is investigated for iterated maps. The distribution of distances, i.e., the deviations between two synchronized chaotic units due to external perturbations on the transferred signal, is used as a measure of the linear response. It is calculated numerically and, for some special cases, analytically. Depending on the model parameters this distribution has power law tails in the region of synchronization leading to diverging moments of distances. This is a consequence of multiplicative and additive noise in the corresponding linear equations due to chaos and external perturbations. The linear response can also be quantified by the bit error rate of a transmitted binary message which perturbs the synchronized system. The bit error rate is given by an integral over the distribution of distances and is calculated analytically and numerically. It displays a complex nonmonotonic behavior in the region of synchronization. For special cases the distribution of distances has a fractal structure leading to a devil's staircase for the bit error rate as a function of coupling strength. The response to small harmonic perturbations shows resonances related to coupling and feedback delay times. A bidirectionally coupled chain of three units can completely filter out the perturbation. Thus the second moment and the bit error rate become zero.

  19. System using data compression and hashing adapted for use for multimedia encryption

    Science.gov (United States)

    Coffland, Douglas R.

    2011-07-12

    A system and method is disclosed for multimedia encryption. Within the system of the present invention, a data compression module receives and compresses a media signal into a compressed data stream. A data acquisition module receives and selects a set of data from the compressed data stream. And, a hashing module receives and hashes the set of data into a keyword. The method of the present invention includes the steps of compressing a media signal into a compressed data stream; selecting a set of data from the compressed data stream; and hashing the set of data into a keyword.

  20. Identification of models for chaotic systems from noisy data: implications for performance and nonlinear filtering

    Science.gov (United States)

    Aguirre, Luis Antonio; Billings, S. A.

    This paper investigates the identification of global models from chaotic data corrupted by additive noise. It is verified that noise has a strong influence on the identification of chaotic systems. In particular, there seems to be a critical noise level beyond which the accurate estimation of polynomial models from chaotic data becomes very difficult. Similarities with the estimation of the largest Lyapunov exponent from noisy data suggest that part of the problem might be related to the limited ability of predicting the data records when these are chaotic. A nonlinear filtering scheme is suggested in order to reduce the noise in the data and thereby enable the estimation of good models. This prediction-based filtering incorporates a resetting mechanism which enables the filtering of chaotic data and which is also applicable to non-chaotic data.

  1. Nonlinear feedback synchronisation control between fractional-order and integer-order chaotic systems

    Institute of Scientific and Technical Information of China (English)

    Jia Li-Xin; Dai Hao; Hui Meng

    2010-01-01

    This paper focuses on the synchronisation between fractional-order and integer-order chaotic systems.Based on Lyapunov stability theory and numerical differentiation,a nonlinear feedback controller is obtained to achieve the synchronisation between fractional-order and integer-order chaotic systems.Numerical simulation results are presented to illustrate the effectiveness of this method.

  2. Stabilization of three-dimensional chaotic systems via single state feedback controller

    Energy Technology Data Exchange (ETDEWEB)

    Yu Wenguang, E-mail: smilewgyu@163.co [School of Statistics and Mathematics, Shandong Economic University, Jinan 250014 (China)

    2010-03-29

    This Letter investigates the stabilization of three-dimensional chaotic systems, and proposes a novel simple adaptive-feedback controller for chaos control. In comparison with previous methods, the present controller which only contains single state feedback, to our knowledge, is the simplest control scheme for controlling the three-dimensional chaotic system. The results are validated using numerical simulations.

  3. A novel four-wing chaotic attractor generated from a three-dimensional quadratic autonomous system

    Institute of Scientific and Technical Information of China (English)

    Dong En-Zeng; Chen Zai-Ping; Chen Zeng-Qiang; Yuan Zhu-Zhi

    2009-01-01

    This paper presents a new 3D quadratic autonomous chaotic system which contains five system parameters and three quadratic cross-product terms, and the system can generate a single four-wing chaotic attractor with wide parameter ranges. Through theoretical analysis, the Hopf bifurcation processes are proved to arise at certain equilibrium points. Numerical bifurcation analysis shows that the system has many interesting complex dynamical behaviours; the system trajectory can evolve to a chaotic attractor from a periodic orbit or a fixed point as the proper parameter varies.Finally, an analog electronic circuit is designed to physically realize the chaotic system; the existence of four-wing chaotic attractor is verified by the analog circuit realization.

  4. High-dimensional chaotic and attractor systems a comprehensive introduction

    CERN Document Server

    Ivancevic, Vladimir G

    2007-01-01

    This is a graduate–level monographic textbook devoted to understanding, prediction and control of high–dimensional chaotic and attractor systems of real life. The objective of the book is to provide the serious reader with a serious scientific tool that will enable the actual performance of competitive research in high–dimensional chaotic and attractor dynamics. The book has nine Chapters. The first Chapter gives a textbook-like introduction into the low-dimensional attractors and chaos. This Chapter has an inspirational character, similar to other books on nonlinear dynamics and deterministic chaos. The second Chapter deals with Smale’s topological transformations of stretching, squeezing and folding (of the system’s phase–space), developed for the purpose of chaos theory. The third Chapter is devoted to Poincaré's 3-body problem and basic techniques of chaos control, mostly of Ott-Grebogi-Yorke type. The fourth Chapter is a review of both Landau’s and topological phase transition theory, as w...

  5. Cross-section fluctuations in chaotic scattering systems

    Science.gov (United States)

    Ericson, Torleif E. O.; Dietz, Barbara; Richter, Achim

    2016-10-01

    Exact analytical expressions for the cross-section correlation functions of chaotic scattering systems have hitherto been derived only under special conditions. The objective of the present article is to provide expressions that are applicable beyond these restrictions. The derivation is based on a statistical model of Breit-Wigner type for chaotic scattering amplitudes which has been shown to describe the exact analytical results for the scattering (S )-matrix correlation functions accurately. Our results are given in the energy and in the time representations and apply in the whole range from isolated to overlapping resonances. The S -matrix contributions to the cross-section correlations are obtained in terms of explicit irreducible and reducible correlation functions. Consequently, the model can be used for a detailed exploration of the key features of the cross-section correlations and the underlying physical mechanisms. In the region of isolated resonances, the cross-section correlations contain a dominant contribution from the self-correlation term. For narrow states the self-correlations originate predominantly from widely spaced states with exceptionally large partial width. In the asymptotic region of well-overlapping resonances, the cross-section autocorrelation functions are given in terms of the S -matrix autocorrelation functions. For inelastic correlations, in particular, the Ericson fluctuations rapidly dominate in that region. Agreement with known analytical and experimental results is excellent.

  6. A general method for synchronizing an integer-order chaotic system and a fractional-order chaotic system

    Institute of Scientific and Technical Information of China (English)

    Si Gang-Quan; Sun Zhi-Yong; Zhang Yan-Bin

    2011-01-01

    This paper investigates the synchronization between integer-order and fractional-order chaotic systems.By introducing fractional-order operators into the controllers,the addressed problem is transformed into a synchronization one among integer-order systems.A novel general method is presented in the paper with rigorous proof.Based on this method,effective controllers are designed for the synchronization between Lorenz systems with an integer order and a fractional order,and for the synchronization between an integer-order Chen system and a fractional-order Liu system.Numerical results,which agree well with the theoretical analyses,are also given to show the effectiveness of this method.

  7. Scale-Free Networks Hidden in Chaotic Dynamical Systems

    CERN Document Server

    Iba, Takashi

    2010-01-01

    In this paper, we show our discovery that state-transition networks in several chaotic dynamical systems are "scale-free networks," with a technique to understand a dynamical system as a whole, which we call the analysis for "Discretized-State Transition" (DST) networks; This scale-free nature is found universally in the logistic map, the sine map, the cubic map, the general symmetric map, the sine-circle map, the Gaussian map, and the delayed logistic map. Our findings prove that there is a hidden order in chaos, which has not detected yet. Furthermore, we anticipate that our study opens up a new way to a "network analysis approach to dynamical systems" for understanding complex phenomena.

  8. Chaotic oscillator detection system about weak signals in spot welding

    Institute of Scientific and Technical Information of China (English)

    Kai-lei SONG; Zhen LUO; Feng YE; Xin-xin TANG; Shu-xian YUAN

    2009-01-01

    Spot welding is an efficient and shortcut processing method used in plate, and its quality detection is very important. However, there are many factors affecting the spot welding quality. Because of the low precision of traditional detection methods, spot welding has seldom been used in the aerospace industry which requires high welding quality. In this article, we give a new weak signal detection model based on chaotic oscillators. Using Melnikov methods and Lyapunov exponent, we can determine the critical values when the system enters in and out of chaos. Through lots of numerical simulations, it can be found that the lowest value of the weak sinusoidal signal the system can detect reach 10-11, and its signal-to-noise ratio (SNR) is = 126 dB. Compared with other detection methods, chaos oscillator detection system not only has a lower threshold value, but also is easy to implement in practice. This model thus has good application prospects.

  9. Improving Image Encryption Using 3D Cat Map and Turing Machine

    Directory of Open Access Journals (Sweden)

    Nehal A. Mohamed

    2016-01-01

    Full Text Available Security of data is of prime importance. Security is a very complex and vast topic. One of the common ways to protect this digital data from unauthorized eavesdropping is encryption. This paper introduces an improved image encryption technique based on a chaotic 3D cat map and Turing machine in the form of dynamic random growth technique. The algorithm consists of two main sections: The first does a preprocessing operation to shuffle the image using 3D chaotic map in the form of dynamic random growth technique. The second uses Turing machine simultaneous with shuffling pixels’ locations to diffuse pixels’ values using a random key that is generated by chaotic 3D cat map. The hybrid compound of a 3D chaotic system and Turing machine strengthen the encryption performance and enlarge the key space required to resist the brute force attacks. The main advantages of such a secure technique are the simplicity and efficiency. These good cryptographic properties prove that it is secure enough to use in image transmission systems.

  10. Analysis and Adaptive Synchronization of Two Novel Chaotic Systems with Hyperbolic Sinusoidal and Cosinusoidal Nonlinearity and Unknown Parameters

    Directory of Open Access Journals (Sweden)

    S. Vaidyanathan

    2013-09-01

    Full Text Available This research work describes the modelling of two novel 3-D chaotic systems, the first with a hyperbolic sinusoidal nonlinearity and two quadratic nonlinearities (denoted as system (A and the second with a hyperbolic cosinusoidal nonlinearity and two quadratic nonlinearities (denoted as system (B. In this work, a detailed qualitative analysis of the novel chaotic systems (A and (B has been presented, and the Lyapunov exponents and Kaplan-Yorke dimension of these chaotic systems have been obtained. It is found that the maximal Lyapunov exponent (MLE for the novel chaotic systems (A and (B has a large value, viz. for the system (A and for the system (B. Thus, both the novel chaotic systems (A and (B display strong chaotic behaviour. This research work also discusses the problem of finding adaptive controllers for the global chaos synchronization of identical chaotic systems (A, identical chaotic systems (B and nonidentical chaotic systems (A and (B with unknown system parameters. The adaptive controllers for achieving global chaos synchronization of the novel chaotic systems (A and (B have been derived using adaptive control theory and Lyapunov stability theory. MATLAB simulations have been shown to illustrate the novel chaotic systems (A and (B, and also the adaptive synchronization results derived for the novel chaotic systems (A and (B.

  11. Robust finite-time stabilization of unified chaotic complex systems with certain and uncertain parameters

    Institute of Scientific and Technical Information of China (English)

    Liu Ping

    2013-01-01

    This paper deals with the finite-time stabilization of unified chaotic complex systems with known and unknown parameters.Based on the finite-time stability theory,nonlinear control laws are presented to achieve finite-time chaos control of the determined and uncertain unified chaotic complex systems,respectively.The two controllers are simple,and one of the uncertain unified chaotic complex systems is robust.For the design of a finite-time controller on uncertain unified chaotic complex systems,only some of the unknown parameters need to be bounded.Simulation results for the chaotic complex Lorenz,Lü and Chen systems are presented to validate the design and analysis.

  12. Parameter Identification and Synchronization of Uncertain Chaotic Systems Based on Sliding Mode Observer

    Directory of Open Access Journals (Sweden)

    Li-lian Huang

    2013-01-01

    Full Text Available The synchronization of nonlinear uncertain chaotic systems is investigated. We propose a sliding mode state observer scheme which combines the sliding mode control with observer theory and apply it into the uncertain chaotic system with unknown parameters and bounded interference. Based on Lyapunov stability theory, the constraints of synchronization and proof are given. This method not only can realize the synchronization of chaotic systems, but also identify the unknown parameters and obtain the correct parameter estimation. Otherwise, the synchronization of chaotic systems with unknown parameters and bounded external disturbances is robust by the design of the sliding surface. Finally, numerical simulations on Liu chaotic system with unknown parameters and disturbances are carried out. Simulation results show that this synchronization and parameter identification has been totally achieved and the effectiveness is verified very well.

  13. Spatial chaos-based image encryption design

    Institute of Scientific and Technical Information of China (English)

    2009-01-01

    In recent years, the chaos based cryptographic algorithms have suggested some new and efficient ways to develop secure image encryption techniques, but the drawbacks of small key space and weak security in one-dimensional chaotic cryptosystems are obvious. In this paper, permutation and sub- stitution methods are incorporated to present a stronger image encryption algorithm. Spatial chaotic maps are used to realize the position permutation, and to confuse the relationship between the ci- pher-image and the plain-image. The experimental results demonstrate that the suggested encryption scheme of image has the advantages of large key space and high security; moreover, the distribution of grey values of the encrypted image has a random-like behavior.

  14. Spatial chaos-based image encryption design

    Institute of Scientific and Technical Information of China (English)

    LIU ShuTang; SUN FuYan

    2009-01-01

    In recent years, the chaos based cryptographic algorithms have suggested some new and efficient ways to develop secure image encryption techniques, but the drawbacks of small key space and weak security in one-dimensional chaotic cryptosystems are obvious. In this paper, permutation and sub-stitution methods are incorporated to present a stronger image encryption algorithm. Spatial chaotic maps are used to realize the position permutation, and to confuse the relationship between the ci-pher-image and the plain-image. The experimental results demonstrate that the suggested encryption scheme of image has the advantages of large key space and high security; moreover, the distribution of grey values of the encrypted image has a random-like behavior.

  15. Unfolding of the spectrum for chaotic and mixed systems

    Science.gov (United States)

    Abul-Magd, Ashraf A.; Abul-Magd, Adel Y.

    2014-02-01

    Random Matrix Theory (RMT) is capable of making predictions for the spectral fluctuations of a physical system only after removing the influence of the level density by unfolding the spectra. When the level density is known, unfolding is done by using the integrated level density to transform the eigenvalues into dimensionless variables with unit mean spacing. When it is not known, as in most practical cases, one usually approximates the level staircase function by a polynomial. We here study the effect of unfolding procedure on the spectral fluctuation of two systems for which the level density is known asymptotically. The first is a time-reversal-invariant chaotic system, which is modeled in RMT by a Gaussian Orthogonal Ensemble (GOE). The second is the case of chaotic systems in which m quantum numbers remain almost undistorted in the early stage of the stochastic transition. The Hamiltonian of a system may be represented by a block diagonal matrix with m blocks of the same size, in which each block is a GOE. Unfolding is done once by using the asymptotic level densities for the eigenvalues of the m blocks and once by representing the integrated level density in terms of polynomials of different orders. We find that the spacing distribution of the eigenvalues shows a little sensitivity to the unfolding method. On the other hand, the variance of level number Σ2(L) is sensitive to the choice of the unfolding function. Unfolding that utilizes low order polynomials enhances Σ2(L) relative to the theoretical value, while the use of high order polynomial reduces it. The optimal value of the order of the unfolding polynomial depends on the dimension of the corresponding ensemble.

  16. Ciphertext-only attack on a joint transform correlator encryption system.

    Science.gov (United States)

    Zhang, Chenggong; Liao, Meihua; He, Wenqi; Peng, Xiang

    2013-11-18

    A ciphertext-only attack (COA) on a joint transform correlator (JTC) encryption system is proposed. From the perspective view of optical cryptanalysis, we find out that the issue to be solved in the COA scheme could be transferred into a phase retrieval problem with single intensity measurement. And in this paper, the hybrid input-output (HIO) algorithm is employed to handle this issue with the help of an inartificial signal domain support and a given frequency domain constraint. Meanwhile, we provide a set of numerical simulations to demonstrate the validity and feasibility of the presented method.

  17. Fault Tolerant Approach for Data Encryption and Digital Signature Based on ECC System

    Institute of Scientific and Technical Information of China (English)

    ZENG Yong; MA Jian-feng

    2005-01-01

    An integrated fault tolerant approach for data encryption and digital signature based on elliptic curve cryptography is proposed. This approach allows the receiver to verify the sender's identity and can simultaneously deal with error detection and data correction. Up to three errors in our approach can be detected and corrected. This approach has at least the same security as that based on RSA system, but smaller keys to achieve the same level of security. Our approach is more efficient than the known ones and more suited for limited environments like personal digital assistants (PDAs), mobile phones and smart cards without RSA co- processors.

  18. a Multiple-Plaintexts Chaotic Cryptosystem

    Science.gov (United States)

    Wang, Xing-Yuan; Tan, Yisong

    2013-10-01

    In recent years, a lot of chaotic cryptosystems have been proposed. However, most of these cryptosystems can encrypt only one plaintext in one encryption process. We call these cryptosystems single-plaintext-oriented cryptosystems. In this paper, the authors propose a new chaotic cryptosystem which can encrypt multiple plaintexts in one encryption process. The proposed cryptosystem is dedicated to encrypting multiple plaintexts in the situation of transmitting multiple secret files over public data communication network in one secure transmission. Experiments and theoretic analysis show that the proposed cryptosystem possesses high security and fast performance speed. They also show that the proposed cryptosystem is more secure than single-plaintext-oriented chaotic cryptosystems in this special situation.

  19. Robust chaotic control of Lorenz system by backstepping design

    Energy Technology Data Exchange (ETDEWEB)

    Peng, C.-C. [Department of Aeronautics and Astronautics, National Cheng Kung University, Tainan, Taiwan (China); Chen, C.-L. [Department of Aeronautics and Astronautics, National Cheng Kung University, Tainan, Taiwan (China)], E-mail: chiehli@mail.ncku.edu.tw

    2008-07-15

    This work presents a robust chaotic control strategy for the Lorenz chaos via backstepping design. Backstepping technique is a systematic tool of control law design to provide Lyapunov stability. The concept of extended system is used such that a continuous sliding mode control (SMC) effort is generated using backstepping scheme. In the proposed control algorithm, an adaptation law is applied to estimate the system parameter and the SMC offers the robustness to model uncertainties and external disturbances so that the asymptotical convergence of tracking error can be achieved. Regarding the SMC, an equivalent control algorithm is chosen based on the selection of Lyapunov stability criterion during backstepping approach. The converging rate of error state is relative to the corresponding dynamics of sliding surface. Numerical simulations demonstrate its advantages to a regulation problem and an orbit tracking problem of the Lorenz chaos.

  20. Novel four-dimensional autonomous chaotic system generating one-, two-, three- and four-wing attractors

    Institute of Scientific and Technical Information of China (English)

    Yu Fei; Wang Chun-Hua; Yin Jin-Wen; Xu Hao

    2011-01-01

    In this paper,we propose a novel four-dimensional autonomous chaotic system.Of particular interest is that this novel system can generate one-,two,three- and four-wing chaotic attractors with the variation of a single parameter,and the multi-wing type of the chaotic attractors can be displayed in all directions.The system is simple with a large positive Lyapunov exponent and can exhibit some interesting and complicated dynamical behaviours.Basic dynamical properties of the four-dimensional chaotic system,such as equilibrium points,the Poincaré map,the bifurcation diagram and the Lyapunov exponents are investigated by using either theoretical analysis or numerical method.Finally,a circuit is designed for the implementation of the multi-wing chaotic attractors.The electronic workbench observations are in good agreement with the numerical simulation results.

  1. An observer based asymptotic trajectory control using a scalar state for chaotic systems

    Institute of Scientific and Technical Information of China (English)

    Yu Dong-Chuan; Xia Lin-Hua; Wang Dong-Qing

    2006-01-01

    A state-observer based full-state asymptotic trajectory control (OFST3 method requiring a scalar state is presented to asymptotically drive all the states of chaotic systems to arbitrary desired trajectories. It is no surprise that OFSTC can obtain good tracking performance as desired due to using a state-observer. Significantly OFSTC requires only a scalar state of chaotic systems. A sinusoidal wave and two chaotic variables were taken as illustrative tracking trajectories to validate that using OFSTC can make all the states of a unified chaotic system track the desired trajectories with high tracking accuracy and in a finite time. It is noted that this is the first time that the state-observer of chaotic systems is designed on the basis of Kharitonov's Theorem.

  2. Hybrid dislocated control and general hybrid projective dislocated synchronization for the modified Lue chaotic system

    Energy Technology Data Exchange (ETDEWEB)

    Xu Yuhua [College of Information Science and Technology, Donghua University, Shanghai 201620 (China) and Department of Maths, Yunyang Teacher' s College, Hubei 442000 (China)], E-mail: yuhuaxu2004@163.com; Zhou Wuneng [College of Information Science and Technology, Donghua University, Shanghai 201620 (China)], E-mail: wnzhou@163.com; Fang Jianan [College of Information Science and Technology, Donghua University, Shanghai 201620 (China)

    2009-11-15

    This paper introduces a modified Lue chaotic system, and some basic dynamical properties are studied. Based on these properties, we present hybrid dislocated control method for stabilizing chaos to unstable equilibrium and limit cycle. In addition, based on the Lyapunov stability theorem, general hybrid projective dislocated synchronization (GHPDS) is proposed, which includes complete dislocated synchronization, dislocated anti-synchronization and projective dislocated synchronization as its special item. The drive and response systems discussed in this paper can be strictly different dynamical systems (including different dimensional systems). As examples, the modified Lue chaotic system, Chen chaotic system and hyperchaotic Chen system are discussed. Numerical simulations are given to show the effectiveness of these methods.

  3. Synchronization and anti-synchronization of chaotic systems: A differential and algebraic approach

    Energy Technology Data Exchange (ETDEWEB)

    Martinez-Guerra, Rafael [Departamento de Control Automatico, Cinvestav-IPN A. P. 14-740, Av. IPN 2508, 07360 Mexico, D.F. (Mexico)], E-mail: rguerra@ctrl.cinvestav.mx; Pasaye, Jose Juan Rincon [Departamento de Control Automatico, Cinvestav-IPN A. P. 14-740, Av. IPN 2508, 07360 Mexico, D.F. (Mexico)], E-mail: jrincon@ctrl.cinvestav.mx

    2009-10-30

    Chaotic systems synchronization and anti-synchronization problems are tackled by means of differential and algebraic techniques for nonlinear systems. An algebraic observer is proposed for systems satisfying an algebraic observability condition. This observer can be used as a slave system whose states are synchronized with the master (chaotic) system. This approach has the advantages of being independent of the chaotic nature of the master system, it uses a reduced set of measurable signal from the master system and it also solves the anti-synchronization problem as a straightforward extension of the synchronization one. A Colpitts oscillator is given to illustrate the effectiveness of the suggested approach.

  4. An Efficient Searchable Encryption Against Keyword Guessing Attacks for Sharable Electronic Medical Records in Cloud-based System.

    Science.gov (United States)

    Wu, Yilun; Lu, Xicheng; Su, Jinshu; Chen, Peixin

    2016-12-01

    Preserving the privacy of electronic medical records (EMRs) is extremely important especially when medical systems adopt cloud services to store patients' electronic medical records. Considering both the privacy and the utilization of EMRs, some medical systems apply searchable encryption to encrypt EMRs and enable authorized users to search over these encrypted records. Since individuals would like to share their EMRs with multiple persons, how to design an efficient searchable encryption for sharable EMRs is still a very challenge work. In this paper, we propose a cost-efficient secure channel free searchable encryption (SCF-PEKS) scheme for sharable EMRs. Comparing with existing SCF-PEKS solutions, our scheme reduces the storage overhead and achieves better computation performance. Moreover, our scheme can guard against keyword guessing attack, which is neglected by most of the existing schemes. Finally, we implement both our scheme and a latest medical-based scheme to evaluate the performance. The evaluation results show that our scheme performs much better performance than the latest one for sharable EMRs.

  5. Hybrid Projective Synchronization for Two Identical Fractional-Order Chaotic Systems

    Directory of Open Access Journals (Sweden)

    Ping Zhou

    2012-01-01

    Full Text Available A hybrid projective synchronization scheme for two identical fractional-order chaotic systems is proposed in this paper. Based on the stability theory of fractional-order systems, a controller for the synchronization of two identical fractional-order chaotic systems is designed. This synchronization scheme needs not to absorb all the nonlinear terms of response system. Hybrid projective synchronization for the fractional-order Chen chaotic system and hybrid projective synchronization for the fractional-order hyperchaotic Lu system are used to demonstrate the validity and feasibility of the proposed scheme.

  6. Study on Super-Twisting synchronization control of chaotic system based on U model

    Directory of Open Access Journals (Sweden)

    Jianhua ZHANG

    2016-06-01

    Full Text Available A U model based Super-Twisting synchronization control method for chaotic systems is proposed. The chaos control of chaotic systems is prescribed, then, based on the current research status of chaotic systems and some useful research results in nonlinear system design, some new methods for chaos control and synchronization are provided, and the controller is designed to achieve the finite time chaos synchronization. The numerical simulations are carried out for Lorenz system and Chen system, and the result proves the effectiveness of the method.

  7. CAPS satellite spread spectrum communication blind multi-user detecting system based on chaotic sequences

    Institute of Scientific and Technical Information of China (English)

    2009-01-01

    Multiple Path Interference (MPI) and Multiple Access Interference (MAI) are important factors that affect the performance of Chinese Area Positioning System (CAPS). These problems can be solved by using spreading sequences with ideal properties and multi-user detectors. Chaotic sequences based on Chebyshev map are studied and the satellite communication system model is set up to investigate the application of chaotic sequences for CAPS in this paper. Simulation results show that chaotic sequences have desirable correlation properties and it is easy to generate a large number of chaotic sequences with good security. It has great practical value to apply chaotic sequences to CAPS together with multi-user detecting technology and the system performance can be improved greatly.

  8. CAPS satellite spread spectrum communication blind multi-user detecting system based on chaotic sequences

    Institute of Scientific and Technical Information of China (English)

    LEI LiHua; SHI HuLi; MA GuanYi

    2009-01-01

    Multiple Path Interference (MPI) and Multiple Access Interference (MAI) are Important factors that affect the performance of Chinese Area Positioning System (CAPS),These problems can be solved by using spreading sequences with ideal properties and multi-user detectors.Chaotic sequences based on Chebyshev map are studied and the satellite communication system model is set up to investigate the application of chaotic sequences for CAPS in this paper,Simulation results show that chaotic sequences have desirable correlation properties and it is easy to generate a large number of chaotic sequences with good security.It has great practical value to apply chaotic sequences to CAPS together with multi-user detecting technology and the system performance can be improved greatly.

  9. Spectral Statistics in Chaotic Systems with Two Identical Connected Cells

    CERN Document Server

    Dittrich, T; Koboldt, G; Dittrich, Thomas; Schanz, Holger; Koboldt, Gerd

    1998-01-01

    Chaotic systems that decompose into two cells connected only by a narrow channel exhibit characteristic deviations of their quantum spectral statistics from the canonical random-matrix ensembles. The equilibration between the cells introduces an additional classical time scale that is manifest also in the spectral form factor. If the two cells are related by a spatial symmetry, the spectrum shows doublets, reflected in the form factor as a positive peak around the Heisenberg time. We combine a semiclassical analysis with an independent random-matrix approach to the doublet splittings to obtain the form factor on all time (energy) scales. Its only free parameter is the characteristic time of exchange between the cells in units of the Heisenberg time.

  10. Decoherence in chaotic and integrable systems: a random matrix approach

    Science.gov (United States)

    Gorin, T.; Seligman, T. H.

    2003-03-01

    We study the influence of chaos and order on entanglement and decoherence. In view of applications in quantum computing and teleportation which should be able to work with arbitrarily complicated states, we pay particular attention to the behavior of random states. While studies with coherent states indicate that chaos accelerates decoherence and entanglement, we find that there is practically no difference between the chaotic and the integrable case, as far as random states are concerned. In the present studies we use unitary time evolution of the total system, and partial traces to emulate decoherence. Random matrix models are a natural choice to describe the dynamics of random states. The invariant aspects of chaos and order are then reflected in the different spectral statistics. We develop random matrix models for the evolution of entanglement for a large variety of situations, discussing the strong coupling case in full detail.

  11. Decoherence in chaotic and integrable systems: a random matrix approach

    Energy Technology Data Exchange (ETDEWEB)

    Gorin, T.; Seligman, T.H

    2003-03-17

    We study the influence of chaos and order on entanglement and decoherence. In view of applications in quantum computing and teleportation which should be able to work with arbitrarily complicated states, we pay particular attention to the behavior of random states. While studies with coherent states indicate that chaos accelerates decoherence and entanglement, we find that there is practically no difference between the chaotic and the integrable case, as far as random states are concerned. In the present studies we use unitary time evolution of the total system, and partial traces to emulate decoherence. Random matrix models are a natural choice to describe the dynamics of random states. The invariant aspects of chaos and order are then reflected in the different spectral statistics. We develop random matrix models for the evolution of entanglement for a large variety of situations, discussing the strong coupling case in full detail.

  12. Localization in chaotic systems with a single-channel opening.

    Science.gov (United States)

    Lippolis, Domenico; Ryu, Jung-Wan; Kim, Sang Wook

    2015-07-01

    We introduce a single-channel opening in a random Hamiltonian and a quantized chaotic map: localization on the opening occurs as a sensible deviation of the wave-function statistics from the predictions of random matrix theory, even in the semiclassical limit. Increasing the coupling to the open channel in the quantum model, we observe a similar picture to resonance trapping, made of a few fast-decaying states, whose left (right) eigenfunctions are entirely localized on the (preimage of the) opening, and plentiful long-lived states, whose probability density is instead suppressed at the opening. For the latter, we derive and test a linear relation between the wave-function intensities and the decay rates, similar to the Breit-Wigner law. We then analyze the statistics of the eigenfunctions of the corresponding (discretized) classical propagator, finding a similar behavior to the quantum system only in the weak-coupling regime.

  13. Study on phase synchronization of stochastic chaotic system

    Institute of Scientific and Technical Information of China (English)

    Yang Xiao-Li; Xu Wei

    2008-01-01

    This paper detects and characterizes the diverse roles played by bounded noise in chaotic phase synchronization (CPS) of weakly coupled nonlinear stochastic systems. Analysis of a paradigmatic model of two bidirectional coupled three-level food chains is carried out by various statistical measures such as Shannon entropy and mutual information. The results indicate that inside the synchronous regime, CPS is considerably reduced under the influence of bounded noise; near the onset of phase synchronization, temporal phase locking is diversely changed with the increase of noise, i.e., either weak or strong noise also degrades the degree of CPS, while intermediate noise enhances CPS remarkably, and an optimal noise intensity is detected that maximizes the enhancement.

  14. Analysis of chaotic FM system synchronization for bistatic radar

    Science.gov (United States)

    Pappu, Chandra S.; Verdin, Berenice; Flores, Benjamin C.; Boehm, James; Debroux, Patrick

    2015-05-01

    We propose a scheme for bistatic radar that uses a chaotic system to generate a wideband FM signal that is reconstructed at the receiver via a conventional phase lock loop. The setup for the bistatic radar includes a 3 state variable drive oscillator at the transmitter and a response oscillator at the receiver. The challenge is in synchronizing the response oscillator of the radar receiver utilizing a scaled version of the transmitted signal sr(t, x) = αst(t, x) where x is one of three driver oscillator state variables and α is the scaling factor that accounts for antenna gain, system losses, and space propagation. For FM, we also assume that the instantaneous frequency of the received signal, xs, is a scaled version of the Lorenz variable x. Since this additional scaling factor may not be known a priori, the response oscillator must be able to accept the scaled version of x as an input. Thus, to achieve synchronization we utilize a generalized projective synchronization technique that introduces a controller term -μe where μ is a control factor and e is the difference between the response state variable xs and a scaled x. Since demodulation of sr(t) is required to reconstruct the chaotic state variable x, the phase lock loop imposes a limit on the minimum error e. We verify through simulations that, once synchronization is achieved, the short-time correlation of x and xs is high and that the self-noise in the correlation is negligible over long periods of time.

  15. Generalized Combination Complex Synchronization for Fractional-Order Chaotic Complex Systems

    Directory of Open Access Journals (Sweden)

    Cuimei Jiang

    2015-07-01

    Full Text Available Based on two fractional-order chaotic complex drive systems and one fractional-order chaotic complex response system with different dimensions, we propose generalized combination complex synchronization. In this new synchronization scheme, there are two complex scaling matrices that are non-square matrices. On the basis of the stability theory of fractional-order linear systems, we design a general controller via active control. Additionally, by virtue of two complex scaling matrices, generalized combination complex synchronization between fractional-order chaotic complex systems and real systems is investigated. Finally, three typical examples are given to demonstrate the effectiveness and feasibility of the schemes.

  16. Security of a key agreement protocol based on chaotic maps

    Energy Technology Data Exchange (ETDEWEB)

    Han Song [Curtin University of Technology, G.P.O. Box U1987 Perth, WA 6845 (Australia)], E-mail: s.han@curtin.edu.au

    2008-11-15

    Kacorev et al. proposed new public key encryption scheme using chaotic maps. Subsequently, Bergamo et al. has broken Kacorev and Tasev's encryption scheme and then applied the attack on a key agreement protocol based on Kacorev et al.'s system. In order to address Bergamo et al.' attack, Xiao et al. proposed a novel key agreement protocol. In this paper, we will present two attacks on Xiao et al.'s key agreement protocol using chaotic maps. Our new attack method is different from the one that Bergamo et al. developed. The proposed attacks work in a way that an adversary can prevent the user and the server from establishing a shared session key even though the adversary cannot get any private information from the user and the server's communications.

  17. Bidirectional Partial Generalized Synchronization in Chaotic and Hyperchaotic Systems via a New Scheme

    Institute of Scientific and Technical Information of China (English)

    WANG Qi

    2006-01-01

    In this paper, a bidirectional partial generalized (lag, complete, and anticipated) synchronization of a class of continuous-time systems is defined. Then based on the active control idea, a new systematic and concrete scheme is developed to achieve bidirectional partial generalized (lag, complete, and anticipated) synchronization between two chaotic systems or between chaotic and hyperchaotic systems. With the help of symbolic-numerical computation,we choose the modified Chua system, Lorenz system, and the hyperchaotic Tamasevicius-Namajunas-Cenys system to illustrate the proposed scheme. Numerical simulations are used to verify the effectiveness of the proposed scheme. It is interesting that partialchaos synchronization not only can take place between two chaotic systems, but also can take place between chaotic and hyperchaotic systems. The proposed scheme can also be extended to research bidirectional partial generalized (lag, complete, and anticipated) synchronization between other dynamical systems.

  18. Parametric Control on Fractional-Order Response for Lü Chaotic System

    KAUST Repository

    Moaddy, K

    2013-04-10

    This paper discusses the influence of the fractional order parameter on conventional chaotic systems. These fractional-order parameters increase the system degree of freedom allowing it to enter new domains and thus it can be used as a control for such dynamical systems. This paper investigates the behaviour of the equally-fractional-order Lü chaotic system when changing the fractional-order parameter and determines the fractional-order ranges for chaotic behaviour. Five different parameter values and six fractional-order cases are discussed through this paper. Unlike the conventional parameters, as the fractional-order increases the system response begins with stability, passing by chaotic behaviour then reaches periodic response. As the system parameter α increases, a shift in the fractional order is required to maintain chaotic response.Therefore, the range of chaotic response can be expanded or minimized by controlling the fractional-order parameter. The non-standard finite difference method is used to solve the fractional-order Lü chaotic system numerically to validate these responses.

  19. Hybrid internal model control and proportional control of chaotic dynamical systems

    Institute of Scientific and Technical Information of China (English)

    齐冬莲; 姚良宾

    2004-01-01

    A new chaos control method is proposed to take advantage of chaos or avoid it. The hybrid Internal Model Control and Proportional Control learning scheme are introduced. In order to gain the desired robust performance and ensure the system's stability, Adaptive Momentum Algorithms are also developed. Through properly designing the neural network plant model and neural network controller, the chaotic dynamical systems are controlled while the parameters of the BP neural network are modified. Taking the Lorenz chaotic system as example, the results show that chaotic dynamical systems can be stabilized at the desired orbits by this control strategy.

  20. Adaptive control and synchronization of a fractional-order chaotic system

    Indian Academy of Sciences (India)

    Chunlai Li; Yaonan Tong

    2013-04-01

    In this paper, the chaotic dynamics of a three-dimensional fractional-order chaotic system is investigated. The lowest order for exhibiting chaos in the fractional-order system is obtained. Adaptive schemes are proposed for control and synchronization of the fractional-order chaotic system based on the stability theory of fractional-order dynamic systems. The presented schemes, which contain only a single-state variable, are simple and flexible. Numerical simulations are used to demonstrate the feasibility of the presented methods.

  1. Method to modify random matrix theory using short-time behavior in chaotic systems.

    Science.gov (United States)

    Smith, A Matthew; Kaplan, Lev

    2009-09-01

    We discuss a modification to random matrix theory (RMT) eigenstate statistics that systematically takes into account the nonuniversal short-time behavior of chaotic systems. The method avoids diagonalization of the Hamiltonian, instead requiring only knowledge of short-time dynamics for a chaotic system or ensemble of similar systems. Standard RMT and semiclassical predictions are recovered in the limits of zero Ehrenfest time and infinite Heisenberg time, respectively. As examples, we discuss wave-function autocorrelations and cross correlations and show how the approach leads to a significant improvement in the accuracy for simple chaotic systems where comparison can be made with brute-force diagonalization.

  2. Lag synchronization of chaotic systems with time-delayed linear terms via impulsive control

    Indian Academy of Sciences (India)

    Ranchao Wu; Dongxu Cao

    2013-11-01

    In this paper, the lag synchronization of chaotic systems with time-delayed linear terms via impulsive control is investigated. Based on the stability theory of impulsive delayed differential equations, some sufficient conditions are obtained guaranteeing the synchronized behaviours between two delayed chaotic systems. Numerical simulations on time-delayed Lorenz and hyperchaotic Chen systems are also carried out to show the effectiveness of the proposed scheme. Note that under the scheme the chaotic system is controlled only at discrete time instants, and so it reduces the control cost in real applications.

  3. Hybrid internal model control and proportional control of chaotic dynamical systems.

    Science.gov (United States)

    Qi, Dong-lian; Yao, Liang-bin

    2004-01-01

    A new chaos control method is proposed to take advantage of chaos or avoid it. The hybrid Internal Model Control and Proportional Control learning scheme are introduced. In order to gain the desired robust performance and ensure the system's stability, Adaptive Momentum Algorithms are also developed. Through properly designing the neural network plant model and neural network controller, the chaotic dynamical systems are controlled while the parameters of the BP neural network are modified. Taking the Lorenz chaotic system as example, the results show that chaotic dynamical systems can be stabilized at the desired orbits by this control strategy.

  4. Delayed Feedback Control of Bao Chaotic System Based on Hopf Bifurcation Analysis

    Directory of Open Access Journals (Sweden)

    Farhad Khellat

    2014-11-01

    Full Text Available This paper is concerned with bifurcation and chaos control in a new chaotic system recently introduced by Bao et al [9]. First a condition that the system has a Hopf bifurcation is derived. Then by applying delayed feedback controller, the chaotic system is forced to have a stable periodic orbit extracting from chaotic attractor. This is done by making Hopf bifurcation value of the open loop and the closed loop systems identical. Also by suitable tuning of the controller parameters, unstable equilibrium points become stable. Numerical simulations verify the results.

  5. Chaos control and global synchronization of Liu chaotic systems using linear balanced feedback control

    Energy Technology Data Exchange (ETDEWEB)

    Chen, H.-H. [Department of Mechanical Engineering, HsiuPing Institute of Technology, Taichung 412, Taiwan (China)], E-mail: richard@mail.hit.edu.tw

    2009-04-15

    Liu chaotic systems exhibit two- or four-scroll attractors and are observed in a variety of engineering phenomena, including rigid body motion, brushless DC motor system and so forth. This study applies the Lyapunov stability theorem to identify the sufficient conditions for the asymptotic stability of the equilibrium points of Liu chaotic systems. A linear balanced feedback gain control method is then employed to design a controller to achieve the global synchronization of two identical four-scroll Liu chaotic systems. The feasibility and effectiveness of the proposed chaos stability and synchronization schemes are verified via numerical simulations.

  6. A new theorem to synchronization of unified chaotic systems via adaptive control

    Institute of Scientific and Technical Information of China (English)

    Lequan Min; Jianyi Jing

    2003-01-01

    Chaos synchronization has been applied in secure communication, chemical reaction, biological systems, and information processing. A new theorem to synchronization of unified chaotic systems via adaptive control is proposed. The consutructive theorem provides the design scheme for adaptive controller such that a respond system can synchronize with respect to an uncertain drive system. One example for discontinuous chaotic system is proposed to illustrate the effectiveness and feasibility.

  7. Chaos control of 4D chaotic systems using recursive backstepping nonlinear controller

    Energy Technology Data Exchange (ETDEWEB)

    Laoye, J.A. [Nonlinear and Statistical Physics Research Group, Department of Physics, Olabisi Onabanjo University, P.M.B. 2002, Ago-Iwoye (Nigeria); Vincent, U.E. [Nonlinear and Statistical Physics Research Group, Department of Physics, Olabisi Onabanjo University, P.M.B. 2002, Ago-Iwoye (Nigeria)], E-mail: ue_vincent@yahoo.com; Kareem, S.O. [Nonlinear and Statistical Physics Research Group, Department of Physics, Olabisi Onabanjo University, P.M.B. 2002, Ago-Iwoye (Nigeria)

    2009-01-15

    This paper examines chaos control of two four-dimensional chaotic systems, namely: the Lorenz-Stenflo (LS) system that models low-frequency short-wavelength gravity waves and a new four-dimensional chaotic system (Qi systems), containing three cross products. The control analysis is based on recursive backstepping design technique and it is shown to be effective for the 4D systems considered. Numerical simulations are also presented.

  8. Towards provably secure efficiently searchable encryption

    NARCIS (Netherlands)

    Sedghi, Saeed

    2012-01-01

    Traditional encryption systems are designed in such a way that either the whole data is decrypted, if the encryption and decryption keys match, or nothing is decrypted otherwise. However, there are applications that require a more flexible encryption system which supports decrypting data partially.

  9. Semiconductor lasers driven by self-sustained chaotic electronic oscillators and applications to optical chaos cryptography.

    Science.gov (United States)

    Kingni, Sifeu Takougang; Mbé, Jimmi Hervé Talla; Woafo, Paul

    2012-09-01

    In this work, we numerically study the dynamics of vertical cavity surface emitting laser (VCSEL) firstly when it is driven by Chua's oscillator, secondly in case where it is driven by a broad frequency spectral bandwidth chaotic oscillator developed by Nana et al. [Commun. Nonlinear Sci. Numer. Simul. 14, 2266 (2009)]. We demonstrated that the VCSEL generated robust chaotic dynamics compared to the ones found in VCSEL subject to a sinusoidally modulated current and therefore it is more suitable for chaos encryption techniques. The synchronization characteristics and the communication performances of unidirectional coupled VCSEL driven by the broad frequency spectral bandwidth chaotic oscillators are investigated numerically. The results show that high-quality synchronization and transmission of messages can be realized for suitable system parameters. Chaos shift keying method is successfully applied to encrypt a message at a high bitrate.

  10. A single adaptive controller with one variable for synchronization of fractional-order chaotic systems

    Institute of Scientific and Technical Information of China (English)

    Zhang Ruo-Xun; Yang Shi-Ping

    2012-01-01

    In this paper we investigate the synchronization of a class of three-dimensional fractional-order chaotic systems.Based on the Lyapunov stability theory and adaptive control technique,a single adaptive-feedback controller is developed to synchronize a class of fractional-order chaotic systems.The presented controller which only contains a single driving variable is simple both in design and in implementation.Numerical simulation and circuit experimental results for fractional-order chaotic system are provided to illustrate the effectiveness of the proposed scheme.

  11. Design and implementation of a novel multi-scroll chaotic system

    Institute of Scientific and Technical Information of China (English)

    Zhang Chao-Xia; Yu Si-Min

    2009-01-01

    This paper proposes a novel approach for generating a multi-scroll chaotic system. Together with the theoretical design and numerical simulations, three different types of attractor are available, governed by constructing triangular wave, sawtooth wave and hysteresis sequence. The presented new multi-scroll chaotic system is different from the classical multi-scroll chaotic Chua system in dimensionless state equations, nonlinear functions and maximum Lyapunov exponents. In addition, the basic dynamical behaviours, including equilibrium points, eigenvalues, eigenvectors, eigenplanes, bifurcation diagrams and Lyapunov exponents, are further investigated. The success of the design is illustrated by both numerical simulations and circuit experiments.

  12. Symplectic Synchronization of Lorenz-Stenflo System with Uncertain Chaotic Parameters via Adaptive Control

    Directory of Open Access Journals (Sweden)

    Cheng-Hsiung Yang

    2013-01-01

    Full Text Available A new symplectic chaos synchronization of chaotic systems with uncertain chaotic parameters is studied. The traditional chaos synchronizations are special cases of the symplectic chaos synchronization. A sufficient condition is given for the asymptotical stability of the null solution of error dynamics and a parameter difference. The symplectic chaos synchronization with uncertain chaotic parameters may be applied to the design of secure communication systems. Finally, numerical results are studied for symplectic chaos synchronized from two identical Lorenz-Stenflo systems in three different cases.

  13. Constraint on periodic orbits of chaotic systems given by Random Matrix Theory

    CERN Document Server

    Monastra, Alejandro G

    2010-01-01

    Considering the fluctuations of spectral functions, we prove that if chaotic systems fulfill the Bohigas-Gianonni-Schmit (BGS) conjecture, which relates their spectral statistics to that of random matrices, therefore by virtue of Gutzwiller trace formula, the instability of classical periodic orbits is constrained. In particular for two-dimensional chaotic systems, the Lyapunov exponent $\\lambda_p$ of each periodic orbit $p$ should be bigger than a minimum value $\\lambda_{\\text{min}} \\geq 0.850738$. This opens the possibility of new constraints for a system to be fully chaotic, or the failure of the BGS conjecture.

  14. Robust Exponential Converge Controller Design for a Unified Chaotic System with Structured Uncertainties via LMI

    Directory of Open Access Journals (Sweden)

    Neng-Sheng Pai

    2010-01-01

    Full Text Available This paper focuses on the chaos control problem of the unified chaotic systems with structured uncertainties. Applying Schur-complement and some matrix manipulation techniques, the controlled uncertain unified chaotic system is then transformed into the linear matrix inequality (LMI form. Based on Lyapunov stability theory and linear matrix inequality (LMI formulation, a simple linear feedback control law is obtained to enforce the prespecified exponential decay dynamics of the uncertain unified chaotic system. Numerical results validate the effectiveness of the proposed robust control scheme.

  15. Synchronization of the time-varying parameter chaotic system and its application to secure communication

    Institute of Scientific and Technical Information of China (English)

    牟静; 陶超; 杜功焕

    2003-01-01

    In this paper we propose and investigate the synchronization of a new chaotic model with time-varying parameters and apply it to improve the security of chaotic communication. In this model, the chaotic system is modulated by both the message and the varying parameters. The varying parameters distort the phase space so heavily that they prevent the carrier from being broken by nonlinear dynamic forecasting method. Theory and simulation experiments with speech signal communication indicate that the receiver can gain a perfect synchronization with the transmitter, and the intruder cannot break down this communication system. We also discuss the robustness of the new communication system.

  16. Synchronization of the time—varying parameter chaotic system and its application to secure communication

    Institute of Scientific and Technical Information of China (English)

    Mujing; TaoChao; DuGong-Huan

    2003-01-01

    In this paper we propose and investigate the synchronization of a new chaotic model with time-varying parameters and apply it to improve the security of chaotic communication. In this model, the chaotic system is modulated by both the message and the varying parameters. The varying parameters distort the phase space so heavily that they prevent the carrier from being broken by nonlinear dynamic forecasting method. Theory and simulation experiments with speech signal communication indicate that the receiver can gain a perfect synchronization with the transmitter, and the intruder cannot break down this communication system. We also discuss the robustness of the new communication system.

  17. Synchronization of N different coupled chaotic systems with ring and chain connections

    Institute of Scientific and Technical Information of China (English)

    LIU Yan; L(U) Ling

    2008-01-01

    Synchronization of N different coupled chaotic systems with ring and chain Lorenz system, and the R(o)ssler system are used as examples in verifying effectiveness of the method. Based on the Lyapunov stability theory, the form of the controller is designed and the area of the coupling coefficients is determined. Simulations indicate that global synchronization of the N different chaotic systems can be realized by choosing appropriate coupling coefficients by using the controller.

  18. A symmetrical image encryption scheme in wavelet and time domain

    Science.gov (United States)

    Luo, Yuling; Du, Minghui; Liu, Junxiu

    2015-02-01

    There has been an increasing concern for effective storages and secure transactions of multimedia information over the Internet. Then a great variety of encryption schemes have been proposed to ensure the information security while transmitting, but most of current approaches are designed to diffuse the data only in spatial domain which result in reducing storage efficiency. A lightweight image encryption strategy based on chaos is proposed in this paper. The encryption process is designed in transform domain. The original image is decomposed into approximation and detail components using integer wavelet transform (IWT); then as the more important component of the image, the approximation coefficients are diffused by secret keys generated from a spatiotemporal chaotic system followed by inverse IWT to construct the diffused image; finally a plain permutation is performed for diffusion image by the Logistic mapping in order to reduce the correlation between adjacent pixels further. Experimental results and performance analysis demonstrate the proposed scheme is an efficient, secure and robust encryption mechanism and it realizes effective coding compression to satisfy desirable storage.

  19. Synchronisation of chaotic systems using a novel sampled-data fuzzy controller

    Institute of Scientific and Technical Information of China (English)

    Feng Yi-Fu; Zhang Qing-Ling

    2011-01-01

    This paper presents the synchronisation of chaotic systems using a sampled-data fuzzy controller and is meaningful for many physical real-life applications. Firstly, a Takagi-Sugeno (T-S) fuzzy model is employed to represent the chaotic systems that contain some nonlinear terms, then a type of fuzzy sampled-data controller is proposed and an error system formed by the response and drive chaotic system. Secondly, relaxed LMI-based synchronisation conditions are derived by using a new paraneter-dependent Lyapunov-Krasovskii functional and relaxed stabilisation techniques for the underlying error system. The derived LMI-based conditions are used to aid the design of a sampled-data fuzzy controller to achieve the synchronisation of chaotic systems. Finally, a numerical example is provided to illustrate the effectiveness of the proposed results.

  20. Hyper-chaoticSystem Simulation Design of Digital Circuit Based on DSP Builder

    Directory of Open Access Journals (Sweden)

    Zhang Xiaohong

    2013-05-01

    Full Text Available In order to overcome sensitive defects of components deviations and environment defects in analog circuit design, a novel four-dimensional hyperchaotic systems is constructed based on LÜ system. Basic nonlinear dynamics characteristics are analyzed to the new system. By optimizing the design of sampling frequency selection, gain adjustments, parameter configuration etc., the hyperchaotic circuit runs stably while the signal amplitude is reasonably controlled. Curves of the digital chaotic sequence show smooth without jagged shape. The circuit can be applied to other digital realization of chaotic systems with commonality and expandability. Its experimental results fully consistent with phase space structures of the continuous chaotic system, which shows the development of chaotic systems based on FPGA is feasible and practical.

  1. Identical synchronization of chaotic secure communication systems with channel induced coherence resonance

    Science.gov (United States)

    Sepantaie, Marc M.; Namazi, Nader M.; Sepantaie, Amir M.

    2016-05-01

    This paper is devoted to addressing the synchronization, and detection of random binary data exposed to inherent channel variations existing in Free Space Optical (FSO) communication systems. This task is achieved by utilizing the identical synchronization methodology of Lorenz chaotic communication system, and its synergetic interaction in adversities imposed by the FSO channel. Moreover, the Lorenz system has been analyzed, and revealed to induce Stochastic Resonance (SR) once exposed to Additive White Gaussian Noise (AWGN). In particular, the resiliency of the Lorenz chaotic system, in light of channel adversities, has been attributed to the success of the proposed communication system. Furthermore, this paper advocates the use of Haar wavelet transform for enhanced detection capability of the proposed chaotic communication system, which utilizes Chaotic Parameter Modulation (CPM) technique for means of transmission.

  2. Generalized Projective Synchronization of Fractional Order Chaotic Systems with Different Dimensions

    Institute of Scientific and Technical Information of China (English)

    WANG Sha; YU Yong-Guang

    2012-01-01

    The generalized projective synchronization of different dimensional fractional order chaotic systems is investigated. According to the stability theory of linear fractional order systems, a sufficient condition to realize synchronization is obtained. The fractional order chaotic and hyperchaotic systems are applied to achieve synchronization in both reduced and increased dimensions. The corresponding numerical results coincide with theoretical analysis.%The generalized projective synchronization of different dimensional fractional order chaotic systems is investigated.According to the stability theory of linear fractional order systems,a sufficient condition to realize synchronization is obtained.The fractional order chaotic and hyperchaotic systems are applied to achieve synchronization in both reduced and increased dimensions.The corresponding numerical results coincide with theoretical analysis.

  3. Fuzzy Modeling, Tracking Control and Synchronization of the Rossler's Chaotic System

    Institute of Scientific and Technical Information of China (English)

    方建安; 范丹丹

    2004-01-01

    In this paper, a novel method to model, track control and synchronize the Rossler's chaotic system is proposed. The fuzzy logical system is used so that the fuzzy inference rule is transferred into a type of variable coef ficient nonlinear ordinary differential equation. Consequently the model of the chaotic system is obtained. Then a fuzzy tracking control and a fuzzy synchronization for chaotic systems is proposed as well. First, a known tracking control for the Rossler's system is used in this paper. We represent the Rossler's chaotic and control systems into fuzzy inference rules. Then the variable coefficient nonlinear ordinary differential equation is also got. Simulation results show that such an approach is effective and has a high precision.

  4. Generalized reduced-order synchronization of chaotic system based on fast slide mode

    Institute of Scientific and Technical Information of China (English)

    Gao Tie-Gang; Chen Zeng-Qiang; Yuan Zhu-Zhi

    2005-01-01

    A new kind of generalized reduced-order synchronization of different chaotic systems is proposed in this paper.It is shown that dynamical evolution of third-order oscillator can be synchronized with the canonical projection of a fourth-order chaotic system generated through nonsingular states transformation from a cell neural net chaotic system.In this sense, it is said that generalized synchronization is achieved in reduced-order. The synchronization discussed here expands the scope of reduced-order synchronization studied in relevant literatures. In this way, we can achieve generalized reduced-order synchronization between many famous chaotic systems such as the second-order D(u)ffing system and the third-order Lorenz system by designing a fast slide mode controller. Simulation results are provided to verify the operation of the designed synchronization.

  5. Chaotic signal reconstruction with application to noise radar system

    Science.gov (United States)

    Liu, Lidong; Hu, Jinfeng; He, Zishu; Han, Chunlin; Li, Huiyong; Li, Jun

    2011-12-01

    Chaotic signals are potentially attractive in engineering applications, most of which require an accurate estimation of the actual chaotic signal from a noisy background. In this article, we present an improved symbolic dynamics-based method (ISDM) for accurate estimating the initial condition of chaotic signal corrupted by noise. Then, a new method, called piecewise estimation method (PEM), for chaotic signal reconstruction based on ISDM is proposed. The reconstruction performance using PEM is much better than that using the existing initial condition estimation methods. Next, PEM is applied in a noncoherent reception noise radar scheme and an improved noncoherent reception scheme is given. The simulation results show that the improved noncoherent scheme has better correlation performance and range resolution especially at low signal-to-noise ratios (SNRs).

  6. Chaotic signal reconstruction with application to noise radar system

    Directory of Open Access Journals (Sweden)

    Liu Lidong

    2011-01-01

    Full Text Available Abstract Chaotic signals are potentially attractive in engineering applications, most of which require an accurate estimation of the actual chaotic signal from a noisy background. In this article, we present an improved symbolic dynamics-based method (ISDM for accurate estimating the initial condition of chaotic signal corrupted by noise. Then, a new method, called piecewise estimation method (PEM, for chaotic signal reconstruction based on ISDM is proposed. The reconstruction performance using PEM is much better than that using the existing initial condition estimation methods. Next, PEM is applied in a noncoherent reception noise radar scheme and an improved noncoherent reception scheme is given. The simulation results show that the improved noncoherent scheme has better correlation performance and range resolution especially at low signal-to-noise ratios (SNRs.

  7. Chaotic Visual Cryptosystem Using Empirical Mode Decomposition Algorithm for Clinical EEG Signals.

    Science.gov (United States)

    Lin, Chin-Feng

    2016-03-01

    This paper, proposes a chaotic visual cryptosystem using an empirical mode decomposition (EMD) algorithm for clinical electroencephalography (EEG) signals. The basic design concept is to integrate two-dimensional (2D) chaos-based encryption scramblers, the EMD algorithm, and a 2D block interleaver method to achieve a robust and unpredictable visual encryption mechanism. Energy-intrinsic mode function (IMF) distribution features of the clinical EEG signal are developed for chaotic encryption parameters. The maximum and second maximum energy ratios of the IMFs of a clinical EEG signal to its refereed total energy are used for the starting points of chaotic logistic map types of encrypted chaotic signals in the x and y vectors, respectively. The minimum and second minimum energy ratios of the IMFs of a clinical EEG signal to its refereed total energy are used for the security level parameters of chaotic logistic map types of encrypted chaotic signals in the x and y vectors, respectively. Three EEG database, and seventeen clinical EEG signals were tested, and the average r and mse values are 0.0201 and 4.2626 × 10(-29), respectively, for the original and chaotically-encrypted through EMD clinical EEG signals. The chaotically-encrypted signal cannot be recovered if there is an error in the input parameters, for example, an initial point error of 0.000001 %. The encryption effects of the proposed chaotic EMD visual encryption mechanism are excellent.

  8. A description of stochastic systems using chaotic maps

    Directory of Open Access Journals (Sweden)

    Abraham Boyarsky

    2004-01-01

    Full Text Available Let ρ(x,t denote a family of probability density functions parameterized by time t. We show the existence of a family {τ1:t>0} of deterministic nonlinear (chaotic point transformations whose invariant probability density functions are precisely ρ(x,t. In particular, we are interested in the densities that arise from the diffusions. We derive a partial differential equation whose solution yields the family of chaotic maps whose density functions are precisely those of the diffusion.

  9. Scar and Antiscar Quantum Effects in Open Chaotic Systems

    CERN Document Server

    Kaplan, L

    1999-01-01

    We predict and numerically observe strong periodic orbit effects in the properties of open quantum systems with a chaotic classical limit. Antiscars lead to a large number of exponentially narrow resonances when the opening is located on a short unstable orbit of the closed system; the probability to remain in the system at long times is thus exponentially enhanced over the random matrix theory prediction. The distribution of resonance widths and the probability to remain are quantitatively given in terms of only the stability matrix of the orbit on which the opening is placed. The long-time remaining probability density is non-trivially distributed over the available phase space; it can be enhanced or suppressed near orbits other than the one on which the lead is located, depending on the periods and classical actions of these other orbits. These effects of the short periodic orbits on quantum decay rates have no classical counterpart, and first appear on times scales much larger than the Heisenberg time of ...

  10. Hopf Bifurcation Analysis and Chaos Control of a Chaotic System without ilnikov Orbits

    Directory of Open Access Journals (Sweden)

    Na Li

    2015-01-01

    Full Text Available This paper mainly investigates the dynamical behaviors of a chaotic system without ilnikov orbits by the normal form theory. Both the stability of the equilibria and the existence of local Hopf bifurcation are proved in view of analyzing the associated characteristic equation. Meanwhile, the direction and the period of bifurcating periodic solutions are determined. Regarding the delay as a parameter, we discuss the effect of time delay on the dynamics of chaotic system with delayed feedback control. Finally, numerical simulations indicate that chaotic oscillation is converted into a steady state when the delay passes through a certain critical value.

  11. Sliding Mode Control of the Fractional-Order Unified Chaotic System

    OpenAIRE

    Jian Yuan; Bao Shi; Xiaoyun Zeng; Wenqiang Ji; Tetie Pan

    2013-01-01

    This paper deals with robust synchronization of the fractional-order unified chaotic systems. Firstly, control design for synchronization of nominal systems is proposed via fractional sliding mode technique. Then, systematic uncertainties and external disturbances are considered in the fractional-order unified chaotic systems, and adaptive sliding mode control is designed for the synchronization issue. Finally, numerical simulations are carried out to verify the effectiveness of the two propo...

  12. Generalized Combination Complex Synchronization for Fractional-Order Chaotic Complex Systems

    OpenAIRE

    Cuimei Jiang; Shutang Liu; Da Wang

    2015-01-01

    Based on two fractional-order chaotic complex drive systems and one fractional-order chaotic complex response system with different dimensions, we propose generalized combination complex synchronization. In this new synchronization scheme, there are two complex scaling matrices that are non-square matrices. On the basis of the stability theory of fractional-order linear systems, we design a general controller via active control. Additionally, by virtue of two complex scaling matrices, general...

  13. Control and Synchronization of the Fractional-Order Lorenz Chaotic System via Fractional-Order Derivative

    OpenAIRE

    Ping Zhou; Rui Ding

    2012-01-01

    The unstable equilibrium points of the fractional-order Lorenz chaotic system can be controlled via fractional-order derivative, and chaos synchronization for the fractional-order Lorenz chaotic system can be achieved via fractional-order derivative. The control and synchronization technique, based on stability theory of fractional-order systems, is simple and theoretically rigorous. The numerical simulations demonstrate the validity and feasibility of the proposed method.

  14. Chaotic anti-control for the bounded linear continuous-time system

    Institute of Scientific and Technical Information of China (English)

    Li Jianfen; Lin Hui; Li Nong

    2008-01-01

    With regard to the bounded linear continuous-time system, a universal chaotic anti-controlling method was presented on the basis of tracking control. A tracking controller is designed to such an extent that it can track any chaotic reference input, thus making it possible to chaotify the linear system. The controller is identical in structure for different controlled linear systems. Computer simulations proved the effectiveness of the proposed method.

  15. Chaotic anti-control for the bounded linear continuous-time system

    Institute of Scientific and Technical Information of China (English)

    2008-01-01

    With regard to the bounded linear continuous-time system,a universal chaotic anti-controlling method was presented on the basis of tracking control.A tracking controller is designed to such an extent that it can track any chaotic reference input,thus making it possible to chaotify the linear system.The controller is identical in structure for different controlled linear systems.Computer simulations proved the effectiveness of the proposed method.

  16. Increasing-order Projective Synchronization of Chaotic Systems with Time Delay

    Institute of Scientific and Technical Information of China (English)

    MIAO Qing-Ying; FANG Jian-An; TANG Yang; DONG Ai-Hua

    2009-01-01

    This work is concerned with lag projective synchronization of chaotic systems with increasing order. The systems under consideration have unknown parameters and different structures. Combining the adaptive control method and feedback control technique, we design a suitable controller and parameter update law to achieve lag synchronization of chaotic systems with increasing order. The result is rigorously proved by the Lyapunov stability theorem. Moreover, corresponding simulation results are given to verify the effectiveness of the proposed methods.

  17. Chaotic system for the detection of periodic signals under the background of strong noise

    Institute of Scientific and Technical Information of China (English)

    2003-01-01

    We propose a method to study the chaotic system for the detection of periodic signals in the presence of strong background noise. The numerical experiments indicate that the chaotic system constructed from the modified Duffing-Holmes equation is sensitive to the weak periodic signal mixed with noise, and it has certain immunity to noise. The signal to noise ratio for the system can reach to about -91 dB.

  18. Tuning of PID controller for an automatic regulator voltage system using chaotic optimization approach

    Energy Technology Data Exchange (ETDEWEB)

    Santos Coelho, Leandro dos [Pontifical Catholic University of Parana, PUCPR Industrial and Systems Engineering Graduate Program, LAS/PPGEPS Imaculada Conceicao, 1155, Zip code 80215-901, Curitiba, Parana (Brazil)], E-mail: leandro.coelho@pucpr.br

    2009-02-28

    Despite the popularity, the tuning aspect of proportional-integral-derivative (PID) controllers is a challenge for researchers and plant operators. Various controllers tuning methodologies have been proposed in the literature such as auto-tuning, self-tuning, pattern recognition, artificial intelligence, and optimization methods. Chaotic optimization algorithms as an emergent method of global optimization have attracted much attention in engineering applications. Chaotic optimization algorithms, which have the features of easy implementation, short execution time and robust mechanisms of escaping from local optimum, is a promising tool for engineering applications. In this paper, a tuning method for determining the parameters of PID control for an automatic regulator voltage (AVR) system using a chaotic optimization approach based on Lozi map is proposed. Since chaotic mapping enjoys certainty, ergodicity and the stochastic property, the proposed chaotic optimization introduces chaos mapping using Lozi map chaotic sequences which increases its convergence rate and resulting precision. Simulation results are promising and show the effectiveness of the proposed approach. Numerical simulations based on proposed PID control of an AVR system for nominal system parameters and step reference voltage input demonstrate the good performance of chaotic optimization.

  19. LMI-based output feedback fuzzy control of chaotic system with uncertainties

    Institute of Scientific and Technical Information of China (English)

    Tan Wen; Wang Yao-Nan; Duan Feng; Li Xiao-Hui

    2006-01-01

    This paper studies the robust fuzzy control for nonlinear chaotic system in the presence of parametric uncertainties. An uncertain Takagi-Sugeno (T-S) fuzzy model is employed for fuzzy modelling of an unknown chaotic system. A sufficient condition formulated in terms of linear matrix inequality (LMI) for the existence of fuzzy controller is obtained. Then the output feedback fuzzy-model-based regulator derived from the LMI solutions can guarantee the stability of the closed-loop overall fuzzy system. The T-S fuzzy model of the chaotic Chen system is developed as an example for illustration. The effectiveness of the proposed controller design methodology is finally demonstrated through computer simulations on the uncertain Chen chaotic system.

  20. Parameter estimation for chaotic systems based on improved boundary chicken swarm optimization

    Science.gov (United States)

    Chen, Shaolong; Yan, Renhuan

    2016-10-01

    Estimating unknown parameters for chaotic system is a key problem in the field of chaos control and synchronization. Through constructing an appropriate fitness function, parameter estimation of chaotic system could be converted to a multidimensional parameter optimization problem. In this paper, a new method base on improved boundary chicken swarm optimization (IBCSO) algorithm is proposed for solving the problem of parameter estimation in chaotic system. However, to the best of our knowledge, there is no published research work on chicken swarm optimization for parameters estimation of chaotic system. Computer simulation based on Lorenz system and comparisons with chicken swarm optimization, particle swarm optimization, and genetic algorithm shows the effectiveness and feasibility of the proposed method.