WorldWideScience

Sample records for chaotic encryption system

  1. Encryption in Chaotic Systems with Sinusoidal Excitations

    Directory of Open Access Journals (Sweden)

    G. Obregón-Pulido

    2014-01-01

    Full Text Available In this contribution an encryption method using a chaotic oscillator, excited by “n” sinusoidal signals, is presented. The chaotic oscillator is excited by a sum of “n” sinusoidal signals and a message. The objective is to encrypt such a message using the chaotic behavior and transmit it, and, as the chaotic system is perturbed by the sinusoidal signal, the transmission security could be increased due to the effect of such a perturbation. The procedure is based on the regulation theory and consider that the receiver knows the frequencies of the perturbing signal, with this considerations the algorithm estimates the excitation in such a way that the receiver can cancel out the perturbation and all the undesirable dynamics in order to produce only the message. In this way we consider that the security level is increased.

  2. Implementation of a new chaotic encryption system and synchronization

    Institute of Scientific and Technical Information of China (English)

    Long Min; Peng Fei; Qiu Shuisheng; Chen Yanfeng

    2006-01-01

    A new kind of secure communication system which combines the chaotic encryption means with the conventional encryption method is discussed. With the analysis results and the experiment data, the anti-attack ability of this communication system is significantly improved compared to that of the either method. At the same time, a new method of chaotic synchronization is proposed. With a small mixed discrete chaotic signal, it is quickly to synchronize the communication and a good security performance is ensured.

  3. Selective image encryption using a spatiotemporal chaotic system.

    Science.gov (United States)

    Xiang, Tao; Wong, Kwok-wo; Liao, Xiaofeng

    2007-06-01

    A universal selective image encryption algorithm, in which the spatiotemporal chaotic system is utilized, is proposed to encrypt gray-level images. In order to resolve the tradeoff between security and performance, the effectiveness of selective encryption is discussed based on simulation results. The scheme is then extended to encrypt RGB color images. Security analyses for both scenarios show that the proposed schemes achieve high security and efficiency. PMID:17614669

  4. Digital Image Encryption Scheme Based on Multiple Chaotic Systems

    Science.gov (United States)

    Abd El-Latif, Ahmed A.; Li, Li; Zhang, Tiejun; Wang, Ning; Song, Xianhua; Niu, Xiamu

    2012-06-01

    Image encryption is a challenging task due to the significant level of sophistication achieved by forgerers and other cybercriminals. Advanced encryption methods for secure transmission, storage, and retrieval of digital images are increasingly needed for a number of military, medical, homeland security, and other applications. In this paper, we introduce a new digital image encryption algorithm. The new algorithm employs multiple chaotic systems and cryptographic primitive operations within the encryption process, which are efficiently implemented on modern processors, and adopts round keys for encryption using a chaotic map. Experiments conducted show that the proposed algorithm possesses robust security features such as fairly uniform distribution, high sensitivity to both keys and plainimages, almost ideal entropy, and the ability to highly de-correlate adjacent pixels in the cipherimages. Furthermore, it has a large key space, which greatly increases its security for image encryption applications.

  5. Video Encryption Based on Chaotic Systems in the Compression Domain

    Directory of Open Access Journals (Sweden)

    Ali Abdulgader

    2012-01-01

    Full Text Available With the development of the internet and multimedia technology digital video encryption has attracted a great deal of research interest in the recent few years in applications. In this paper, we propose a method to encrypt video data. The proposed algorithm is based on the MPEG video coding standard. It selectively encrypts some DCT coefficients in the I frame, B frame and P frame in MPEG video compression by using chaotic systems. The key in this paper is chaotic sequence based on logistic mapping. It can produce the pseudo-random sequences with good randomness. The experimental results based on chaotic maps prove the effectiveness of the proposed method, showing advantages of large key space and high-level security. The proposed algorithm was measured through a series of tests and achieved good results. The results indicate that the algorithm can be implemented for video encryption efficiently and it provides considerable levels of security.

  6. System for Information Encryption Implementing Several Chaotic Orbits

    Directory of Open Access Journals (Sweden)

    Jiménez-Rodríguez Maricela

    2015-07-01

    Full Text Available This article proposes a symmetric encryption algorithm that takes, as input value, the original information of length L, that when encoded, generates the ciphertext of greater length LM. A chaotic discrete system (logistic map is implemented to generate 3 different orbits: the first is used for applying a diffusion technique in order to mix the original data, the second orbit is combined with the mixed information and increases the length of L to LM, and with the third orbit, the confusion technique is implemented. The encryption algorithm was applied to encode an image which is then totally recovered by the keys used to encrypt and his respective, decrypt algorithm. The algorithm can encode any information, just dividing into 8 bits, it can cover the requirements for high level security, it uses 7 keys to encrypt and provides good encryption speed

  7. System for Information Encryption Implementing Several Chaotic Orbits

    OpenAIRE

    Jiménez-Rodríguez Maricela; Flores-Siordia Octavio; González-Novoa María Guadalupe

    2015-01-01

    This article proposes a symmetric encryption algorithm that takes, as input value, the original information of length L, that when encoded, generates the ciphertext of greater length LM. A chaotic discrete system (logistic map) is implemented to generate 3 different orbits: the first is used for applying a diffusion technique in order to mix the original data, the second orbit is combined with the mixed information and increases the length of L to LM, and with the third orbit, ...

  8. A New Study in Encryption Based on Fractional Order Chaotic System

    Institute of Scientific and Technical Information of China (English)

    Ming Yin; Li-Wei Wang

    2008-01-01

    In this paper, we introduce a novel approach to achieve the data encryption. The fractional order Lorenz chaotic system is used to generate the chaotic sequence and the characteristics of the chaotic sequence are studied. Some examples concerned with text and image encryption are also presented in the paper, which show exciting results by the approach weintroduced.

  9. Image encryption using high-dimension chaotic system

    Institute of Scientific and Technical Information of China (English)

    Sun Fu-Yan; Liu Shu-Tang; Lü Zong-Wang

    2007-01-01

    In recent years, the chaos based cryptographic algorithms have suggested some new and efficient ways to develop secure image encryption techniques. This paper proposes a new approach for image encryption based on a highdimensional chaotic map. The new scheme employs the Cat map to shuffle the positions, then to confuse the relationship between the cipher-image and the plain-image using the high-dimensional Lorenz chaotic map preprocessed. The results of experimental, statistical analysis and key space analysis show that the proposed image encryption scheme provides an efficient and secure way for real-time image encryption and transmission.

  10. An Anti-Cheating Visual Cryptography Scheme Based on Chaotic Encryption System

    Science.gov (United States)

    Han, Yanyan; Xu, Zhuolin; Ge, Xiaonan; He, Wencai

    By chaotic encryption system and introducing the trusted third party (TTP), in this paper, an anti-cheating visual cryptography scheme (VCS) is proposed. The scheme solved the problem of dishonest participants and improved the security of chaotic encryption system. Simulation results and analysis show that the recovery image is acceptable, the system can detect the cheating in participants effectively and with high security.

  11. A novel hybrid color image encryption algorithm using two complex chaotic systems

    Science.gov (United States)

    Wang, Leyuan; Song, Hongjun; Liu, Ping

    2016-02-01

    Based on complex Chen and complex Lorenz systems, a novel color image encryption algorithm is proposed. The larger chaotic ranges and more complex behaviors of complex chaotic systems, which compared with real chaotic systems could additionally enhance the security and enlarge key space of color image encryption. The encryption algorithm is comprised of three step processes. In the permutation process, the pixels of plain image are scrambled via two-dimensional and one-dimensional permutation processes among RGB channels individually. In the diffusion process, the exclusive-or (XOR for short) operation is employed to conceal pixels information. Finally, the mixing RGB channels are used to achieve a multilevel encryption. The security analysis and experimental simulations demonstrate that the proposed algorithm is large enough to resist the brute-force attack and has excellent encryption performance.

  12. Image compression-encryption scheme based on hyper-chaotic system and 2D compressive sensing

    Science.gov (United States)

    Zhou, Nanrun; Pan, Shumin; Cheng, Shan; Zhou, Zhihong

    2016-08-01

    Most image encryption algorithms based on low-dimensional chaos systems bear security risks and suffer encryption data expansion when adopting nonlinear transformation directly. To overcome these weaknesses and reduce the possible transmission burden, an efficient image compression-encryption scheme based on hyper-chaotic system and 2D compressive sensing is proposed. The original image is measured by the measurement matrices in two directions to achieve compression and encryption simultaneously, and then the resulting image is re-encrypted by the cycle shift operation controlled by a hyper-chaotic system. Cycle shift operation can change the values of the pixels efficiently. The proposed cryptosystem decreases the volume of data to be transmitted and simplifies the keys distribution simultaneously as a nonlinear encryption system. Simulation results verify the validity and the reliability of the proposed algorithm with acceptable compression and security performance.

  13. A New Color Image Encryption Scheme Using CML and a Fractional-Order Chaotic System

    Science.gov (United States)

    Wu, Xiangjun; Li, Yang; Kurths, Jürgen

    2015-01-01

    The chaos-based image cryptosystems have been widely investigated in recent years to provide real-time encryption and transmission. In this paper, a novel color image encryption algorithm by using coupled-map lattices (CML) and a fractional-order chaotic system is proposed to enhance the security and robustness of the encryption algorithms with a permutation-diffusion structure. To make the encryption procedure more confusing and complex, an image division-shuffling process is put forward, where the plain-image is first divided into four sub-images, and then the position of the pixels in the whole image is shuffled. In order to generate initial conditions and parameters of two chaotic systems, a 280-bit long external secret key is employed. The key space analysis, various statistical analysis, information entropy analysis, differential analysis and key sensitivity analysis are introduced to test the security of the new image encryption algorithm. The cryptosystem speed is analyzed and tested as well. Experimental results confirm that, in comparison to other image encryption schemes, the new algorithm has higher security and is fast for practical image encryption. Moreover, an extensive tolerance analysis of some common image processing operations such as noise adding, cropping, JPEG compression, rotation, brightening and darkening, has been performed on the proposed image encryption technique. Corresponding results reveal that the proposed image encryption method has good robustness against some image processing operations and geometric attacks. PMID:25826602

  14. Encrypting three-dimensional information system based on integral imaging and multiple chaotic maps

    Science.gov (United States)

    Xing, Yan; Wang, Qiong-Hua; Xiong, Zhao-Long; Deng, Huan

    2016-02-01

    An encrypting three-dimensional (3-D) information system based on integral imaging (II) and multiple chaotic maps is proposed. In the encrypting process, the elemental image array (EIA) which represents spatial and angular information of the real 3-D scene is picked up by a microlens array. Subsequently, R, G, and B color components decomposed by the EIA are encrypted using multiple chaotic maps. Finally, these three encrypted components are interwoven to obtain the cipher information. The decryption process implements the reverse operation of the encryption process for retrieving the high-quality 3-D images. Since the encrypted EIA has the data redundancy property due to II, and all parameters of the pickup part are the secret keys of the encrypting system, the system sensitivity on the changes of the plaintext and secret keys can be significantly improved. Moreover, the algorithm based on multiple chaotic maps can effectively enhance the security. A preliminary experiment is carried out, and the experimental results verify the effectiveness, robustness, and security of the proposed system.

  15. Security Analysis of a Block Encryption Algorithm Based on Dynamic Sequences of Multiple Chaotic Systems

    Institute of Scientific and Technical Information of China (English)

    DU Mao-Kang; HE Bo; WANG Yong

    2011-01-01

    Recently, the cryptosystem based on chaos has attracted much attention. Wang and Yu (Commun. Nonlin. Sci. Numer. Simulat. 14(2009)574) proposed a block encryption algorithm based on dynamic sequences of multiple chaotic systems. We analyze the potential Saws in the algorithm. Then, a chosen-plaintext attack is presented. Some remedial measures are suggested to avoid the flaws effectively. Furthermore, an improved encryption algorithm is proposed to resist the attacks and to keep all the merits of the original cryptosystem.

  16. A Systematic Methodology for Multi-Images Encryption and Decryption Based on Single Chaotic System and FPGA Embedded Implementation

    OpenAIRE

    Hanzhong Zheng; Simin Yu; Xiangqian Xu

    2014-01-01

    A systematic methodology is developed for multi-images encryption and decryption and field programmable gate array (FPGA) embedded implementation by using single discrete time chaotic system. To overcome the traditional limitations that a chaotic system can only encrypt or decrypt one image, this paper initiates a new approach to design n-dimensional (n-D) discrete time chaotic controlled systems via some variables anticontrol, which can achieve multipath drive-response synchronization. To th...

  17. A New Study in Encryption Based on Fractional Order Chaotic System

    Institute of Scientific and Technical Information of China (English)

    Ming Yin; Li-Wei Wang

    2008-01-01

    In this paper, we introduce a novelapproach to achieve the data encryption. The fractionalorder Lorenz chaotic system is used to generate thechaotic sequence and the characteristics of the chaoticsequence are studied. Some examples concerned withtext and image eneryption are also presented in thepaper, which show exciting results by the approach weintroduced.

  18. Image encryption based on a delayed fractional-order chaotic logistic system

    Institute of Scientific and Technical Information of China (English)

    Wang Zhen; Huang Xia; Li Ning; Song Xiao-Na

    2012-01-01

    A new image encryption scheme is proposed based on a delayed fractional-order chaotic logistic system.In the process of generating a key stream,the time-varying delay and fractional derivative are embedded in the proposed scheme to improve the security.Such a scheme is described in detail with security analyses including correlation analysis,information entropy analysis,run statistic analysis,mean-variance gray value analysis,and key sensitivity analysis.Experimental results show that the newly proposed image encryption scheme possesses high security.

  19. High security chaotic multiple access scheme for visible light communication systems with advanced encryption standard interleaving

    Science.gov (United States)

    Qiu, Junchao; Zhang, Lin; Li, Diyang; Liu, Xingcheng

    2016-06-01

    Chaotic sequences can be applied to realize multiple user access and improve the system security for a visible light communication (VLC) system. However, since the map patterns of chaotic sequences are usually well known, eavesdroppers can possibly derive the key parameters of chaotic sequences and subsequently retrieve the information. We design an advanced encryption standard (AES) interleaving aided multiple user access scheme to enhance the security of a chaotic code division multiple access-based visible light communication (C-CDMA-VLC) system. We propose to spread the information with chaotic sequences, and then the spread information is interleaved by an AES algorithm and transmitted over VLC channels. Since the computation complexity of performing inverse operations to deinterleave the information is high, the eavesdroppers in a high speed VLC system cannot retrieve the information in real time; thus, the system security will be enhanced. Moreover, we build a mathematical model for the AES-aided VLC system and derive the theoretical information leakage to analyze the system security. The simulations are performed over VLC channels, and the results demonstrate the effectiveness and high security of our presented AES interleaving aided chaotic CDMA-VLC system.

  20. A Systematic Methodology for Multi-Images Encryption and Decryption Based on Single Chaotic System and FPGA Embedded Implementation

    Directory of Open Access Journals (Sweden)

    Hanzhong Zheng

    2014-01-01

    Full Text Available A systematic methodology is developed for multi-images encryption and decryption and field programmable gate array (FPGA embedded implementation by using single discrete time chaotic system. To overcome the traditional limitations that a chaotic system can only encrypt or decrypt one image, this paper initiates a new approach to design n-dimensional (n-D discrete time chaotic controlled systems via some variables anticontrol, which can achieve multipath drive-response synchronization. To that end, the designed n-dimensional discrete time chaotic controlled systems are used for multi-images encryption and decryption. A generalized design principle and the corresponding implementation steps are also given. Based on the FPGA embedded hardware system working platform with XUP Virtex-II type, a chaotic secure communication system for three digital color images encryption and decryption by using a 7D discrete time chaotic system is designed, and the related system design and hardware implementation results are demonstrated, with the related mathematical problems analyzed.

  1. A New Loss-Tolerant Image Encryption Scheme Based on Secret Sharing and Two Chaotic Systems

    OpenAIRE

    Li Li; Ahmed A. Abd El-Latif; Zhenfeng Shi and Xiamu Niu

    2012-01-01

    In this study, we propose an efficient loss-tolerant image encryption scheme that protects both confidentiality and loss-tolerance simultaneously in shadow images. In this scheme, we generate the key sequence based on two chaotic maps and then encrypt the image during the sharing phase based on Shamir’s method. Experimental results show a better performance of the proposed scheme for different images than other methods from human vision. Security analysis confirms a high probability to resist...

  2. Video encryption using chaotic masks in joint transform correlator

    International Nuclear Information System (INIS)

    A real-time optical video encryption technique using a chaotic map has been reported. In the proposed technique, each frame of video is encrypted using two different chaotic random phase masks in the joint transform correlator architecture. The different chaotic random phase masks can be obtained either by using different iteration levels or by using different seed values of the chaotic map. The use of different chaotic random phase masks makes the decryption process very complex for an unauthorized person. Optical, as well as digital, methods can be used for video encryption but the decryption is possible only digitally. To further enhance the security of the system, the key parameters of the chaotic map are encoded using RSA (Rivest–Shamir–Adleman) public key encryption. Numerical simulations are carried out to validate the proposed technique. (paper)

  3. Digital image encryption with chaotic map lattices

    Institute of Scientific and Technical Information of China (English)

    Sun Fu-Yan; Lü Zong-Wang

    2011-01-01

    This paper proposes a secure approach for encryption and decryption of digital images with chaotic map lattices.In the proposed encryption process, eight different types of operations are used to encrypt the pixels of an image and one of them will be used for particular pixels decided by the outcome of the chaotic map lattices. To make the cipher more robust against any attacks, the secret key is modified after encrypting each block of sixteen pixels of the image.The experimental results and security analysis show that the proposed image encryption scheme achieves high security and efficiency.

  4. Chaotic Image Encryption with Random Shuffling of Data

    Directory of Open Access Journals (Sweden)

    Murat Aydos

    2014-02-01

    Full Text Available Security of valuable multimedia contents such as images in personal photograph albums, electronic publishing, frames of multicast video conference can be achieved by image encryption. Secure transmission of these contents is required to be rapid, efficient and practical. Hence, image encryption process must be chosen not only to satisfy the security goals but also to fulfill these requirements. Due to the inadequacy and inefficiency of conventional text based information encryption methods, researchers have proposed several encryption schemes. Many of them are based on chaotic algorithms. Recently, the studies are concentrated on some weaknesses of chaotic algorithms and most of the presented solutions came up with complex structured chaotic maps. In this paper, we present a self-diagonal shuffler mechanism embedded to one dimensional chaotic encryption system to overcome its leak points while keeping simplicity and efficiency properties.

  5. A New Loss-Tolerant Image Encryption Scheme Based on Secret Sharing and Two Chaotic Systems

    Directory of Open Access Journals (Sweden)

    Li Li

    2012-04-01

    Full Text Available In this study, we propose an efficient loss-tolerant image encryption scheme that protects both confidentiality and loss-tolerance simultaneously in shadow images. In this scheme, we generate the key sequence based on two chaotic maps and then encrypt the image during the sharing phase based on Shamir’s method. Experimental results show a better performance of the proposed scheme for different images than other methods from human vision. Security analysis confirms a high probability to resist both brute-force and collusion attacks.

  6. Image Encryption Algorithm Based on Chaotic Economic Model

    OpenAIRE

    S. S. Askar; Karawia, A. A.; Ahmad Alshamrani

    2015-01-01

    In literature, chaotic economic systems have got much attention because of their complex dynamic behaviors such as bifurcation and chaos. Recently, a few researches on the usage of these systems in cryptographic algorithms have been conducted. In this paper, a new image encryption algorithm based on a chaotic economic map is proposed. An implementation of the proposed algorithm on a plain image based on the chaotic map is performed. The obtained results show that the proposed algorithm can su...

  7. Image Encryption Algorithm Based on Chaotic Economic Model

    Directory of Open Access Journals (Sweden)

    S. S. Askar

    2015-01-01

    Full Text Available In literature, chaotic economic systems have got much attention because of their complex dynamic behaviors such as bifurcation and chaos. Recently, a few researches on the usage of these systems in cryptographic algorithms have been conducted. In this paper, a new image encryption algorithm based on a chaotic economic map is proposed. An implementation of the proposed algorithm on a plain image based on the chaotic map is performed. The obtained results show that the proposed algorithm can successfully encrypt and decrypt the images with the same security keys. The security analysis is encouraging and shows that the encrypted images have good information entropy and very low correlation coefficients and the distribution of the gray values of the encrypted image has random-like behavior.

  8. 3D Chaotic Functions for Image Encryption

    Directory of Open Access Journals (Sweden)

    Pawan N. Khade

    2012-05-01

    Full Text Available This paper proposes the chaotic encryption algorithm based on 3D logistic map, 3D Chebyshev map, and 3D, 2D Arnolds cat map for color image encryption. Here the 2D Arnolds cat map is used for image pixel scrambling and 3D Arnolds cat map is used for R, G, and B component substitution. 3D Chebyshev map is used for key generation and 3D logistic map is used for image scrambling. The use of 3D chaotic functions in the encryption algorithm provide more security by using the, shuffling and substitution to the encrypted image. The Chebyshev map is used for public key encryption and distribution of generated private keys.

  9. Color image encryption based on Coupled Nonlinear Chaotic Map

    Energy Technology Data Exchange (ETDEWEB)

    Mazloom, Sahar [Faculty of Electrical, Computer and IT Engineering, Qazvin Islamic Azad University, Qazvin (Iran, Islamic Republic of)], E-mail: sahar.mazloom@gmail.com; Eftekhari-Moghadam, Amir Masud [Faculty of Electrical, Computer and IT Engineering, Qazvin Islamic Azad University, Qazvin (Iran, Islamic Republic of)], E-mail: eftekhari@qazviniau.ac.ir

    2009-11-15

    Image encryption is somehow different from text encryption due to some inherent features of image such as bulk data capacity and high correlation among pixels, which are generally difficult to handle by conventional methods. The desirable cryptographic properties of the chaotic maps such as sensitivity to initial conditions and random-like behavior have attracted the attention of cryptographers to develop new encryption algorithms. Therefore, recent researches of image encryption algorithms have been increasingly based on chaotic systems, though the drawbacks of small key space and weak security in one-dimensional chaotic cryptosystems are obvious. This paper proposes a Coupled Nonlinear Chaotic Map, called CNCM, and a novel chaos-based image encryption algorithm to encrypt color images by using CNCM. The chaotic cryptography technique which used in this paper is a symmetric key cryptography with a stream cipher structure. In order to increase the security of the proposed algorithm, 240 bit-long secret key is used to generate the initial conditions and parameters of the chaotic map by making some algebraic transformations to the key. These transformations as well as the nonlinearity and coupling structure of the CNCM have enhanced the cryptosystem security. For getting higher security and higher complexity, the current paper employs the image size and color components to cryptosystem, thereby significantly increasing the resistance to known/chosen-plaintext attacks. The results of several experimental, statistical analysis and key sensitivity tests show that the proposed image encryption scheme provides an efficient and secure way for real-time image encryption and transmission.

  10. 基于Chen系统的DSP混沌图像加密%DSP Chaotic image encryption based on Chen system

    Institute of Scientific and Technical Information of China (English)

    何丹; 李敬园

    2013-01-01

    介绍了在DSP基础上,实现数字图像的混沌加密及硬件实现方法.根据离散化和数字化处理技术,对三维Chen混沌系统作离散化处理,用C语言和DSP技术产生三维Chen混沌迭代序列,分别对数字图像进行混沌加密和解密.基于芯片型号为TMS32 0VC5509A的DSP开发平台,以灰度图像为例,设计了Chen混沌序列对数字图像进行加密与解密算法,给出了DSP硬件实现结果表明,改善了安全性、提高了速度、满足了实时性要求.%A novel method for realizing chaotic digital image encryption and its hardware implementation based on DSP is presented. By the discrete and digital process technology, the three-dimensional Chen chaotic system is made discrete and Chen chaotic iteration sequence is generated by using Hardware Description Language C and DSP technology.Red,green,and blue tricolor signals of the image are encrypted and decrypted, respectively .On the basis of the DSP exploitation platform with TMS320VC55O9A chip.a gray image with an BMP format is taken as an example. The digital image encryption and decryption algorithm using Chen chaotic sequence is designed,and DSP hardware implementation result is given.

  11. Grayscale image encryption algorithm based on chaotic maps

    Institute of Scientific and Technical Information of China (English)

    李昌刚; 韩正之

    2003-01-01

    A new image encryption/decryption algorithm has been designed using discrete chaotic systems as aSP (Substitution and Permutation) network architecture often used in cryptosystems. It is composed of two mainmodules: substitution module and permutation module. Both analyses and numerical results imply that the algo-rithm has the desirable security and efficiency.

  12. Securing Images Using Chaotic-based Image Encryption Cryptosystem

    Directory of Open Access Journals (Sweden)

    Abdalwhab A. Alkher

    2016-03-01

    Full Text Available Given the rapid evolution in imaging and communication techniques, images become very important data transmitted over public networks type. Therefore, a fast and secure encryption system for high-resolution images is a tremendous demand. In this paper, a novel encryption system is proposed to secure images on the basis of Arnold Catmap. In the First, Arnold cat map system is used to scramble the positions of image pixels. Then, chaotic map is used to generate pseudorandom image for substitution. The statistical analysis was performed on the proposed encryption algorithm demonstrating superior confusion and deployment of its properties, which strongly resist statistical attacks. Coefficients of correlation between adjacent pixels showed that correlation between pixels of the encrypted image has significantly decreased. It is noted that the number of pixels of the image encoded drops significantly which indicates that the proposed system can thwart correlation attacks.

  13. Double-image encryption based on Yang-Gu mixture amplitude-phase retrieval algorithm and high dimension chaotic system in gyrator domain

    Science.gov (United States)

    Sui, Liansheng; Liu, Benqing; Wang, Qiang; Li, Ye; Liang, Junli

    2015-11-01

    A double-image encryption scheme is proposed based on Yang-Gu mixture amplitude-phase retrieval algorithm and high dimension chaotic system in gyrator transform domain, in which three chaotic random sequences are generated by using Chen system. First, an enlarged image constituted with two plaintext images is scrambled by using the first two sequences, and then separated into two new interim images. Second, one interim image is converted to the private phase key with the help of the third sequence, which is modulated by a random phase key generated based on logistic map. Based on this private phase key, another interim image is converted to the ciphertext with white noise distribution in the Yang-Gu amplitude-phase retrieval process. In the process of encryption and decryption, the images both in spatial domain and gyrator domain are nonlinear and disorder by using high dimension chaotic system. Moreover, the ciphertext image is only a real-valued function which is more convenient for storing and transmitting, and the security of the proposed encryption scheme is enhanced greatly because of high sensitivity of initial values of Chen system and rotation angle of gyrator transform. Extensive cryptanalysis and simulation results have demonstrated the security, validity and feasibility of the propose encryption scheme.

  14. Stego Optical Encryption Based on Chaotic Baker's Map Transformation

    Science.gov (United States)

    Hussain, Iqtadar; Gondal, Muhammad Asif

    2014-06-01

    In this article, an optical image encryption algorithm based on chaotic baker's map is presented. The stego-image is encrypted with the help of double random phase encoding algorithm and then produced disorder with the help of chaotic transformation. Security test shows that the reading of proposed algorithm is very close to the optimal values.

  15. An Improved Piecewise Linear Chaotic Map Based Image Encryption Algorithm

    Science.gov (United States)

    Hu, Yuping; Wang, Zhijian

    2014-01-01

    An image encryption algorithm based on improved piecewise linear chaotic map (MPWLCM) model was proposed. The algorithm uses the MPWLCM to permute and diffuse plain image simultaneously. Due to the sensitivity to initial key values, system parameters, and ergodicity in chaotic system, two pseudorandom sequences are designed and used in the processes of permutation and diffusion. The order of processing pixels is not in accordance with the index of pixels, but it is from beginning or end alternately. The cipher feedback was introduced in diffusion process. Test results and security analysis show that not only the scheme can achieve good encryption results but also its key space is large enough to resist against brute attack. PMID:24592159

  16. Symmetric encryption algorithms using chaotic and non-chaotic generators: A review.

    Science.gov (United States)

    Radwan, Ahmed G; AbdElHaleem, Sherif H; Abd-El-Hafiz, Salwa K

    2016-03-01

    This paper summarizes the symmetric image encryption results of 27 different algorithms, which include substitution-only, permutation-only or both phases. The cores of these algorithms are based on several discrete chaotic maps (Arnold's cat map and a combination of three generalized maps), one continuous chaotic system (Lorenz) and two non-chaotic generators (fractals and chess-based algorithms). Each algorithm has been analyzed by the correlation coefficients between pixels (horizontal, vertical and diagonal), differential attack measures, Mean Square Error (MSE), entropy, sensitivity analyses and the 15 standard tests of the National Institute of Standards and Technology (NIST) SP-800-22 statistical suite. The analyzed algorithms include a set of new image encryption algorithms based on non-chaotic generators, either using substitution only (using fractals) and permutation only (chess-based) or both. Moreover, two different permutation scenarios are presented where the permutation-phase has or does not have a relationship with the input image through an ON/OFF switch. Different encryption-key lengths and complexities are provided from short to long key to persist brute-force attacks. In addition, sensitivities of those different techniques to a one bit change in the input parameters of the substitution key as well as the permutation key are assessed. Finally, a comparative discussion of this work versus many recent research with respect to the used generators, type of encryption, and analyses is presented to highlight the strengths and added contribution of this paper. PMID:26966561

  17. Symmetric encryption algorithms using chaotic and non-chaotic generators: A review.

    Science.gov (United States)

    Radwan, Ahmed G; AbdElHaleem, Sherif H; Abd-El-Hafiz, Salwa K

    2016-03-01

    This paper summarizes the symmetric image encryption results of 27 different algorithms, which include substitution-only, permutation-only or both phases. The cores of these algorithms are based on several discrete chaotic maps (Arnold's cat map and a combination of three generalized maps), one continuous chaotic system (Lorenz) and two non-chaotic generators (fractals and chess-based algorithms). Each algorithm has been analyzed by the correlation coefficients between pixels (horizontal, vertical and diagonal), differential attack measures, Mean Square Error (MSE), entropy, sensitivity analyses and the 15 standard tests of the National Institute of Standards and Technology (NIST) SP-800-22 statistical suite. The analyzed algorithms include a set of new image encryption algorithms based on non-chaotic generators, either using substitution only (using fractals) and permutation only (chess-based) or both. Moreover, two different permutation scenarios are presented where the permutation-phase has or does not have a relationship with the input image through an ON/OFF switch. Different encryption-key lengths and complexities are provided from short to long key to persist brute-force attacks. In addition, sensitivities of those different techniques to a one bit change in the input parameters of the substitution key as well as the permutation key are assessed. Finally, a comparative discussion of this work versus many recent research with respect to the used generators, type of encryption, and analyses is presented to highlight the strengths and added contribution of this paper.

  18. Symmetric encryption algorithms using chaotic and non-chaotic generators: A review

    Science.gov (United States)

    Radwan, Ahmed G.; AbdElHaleem, Sherif H.; Abd-El-Hafiz, Salwa K.

    2015-01-01

    This paper summarizes the symmetric image encryption results of 27 different algorithms, which include substitution-only, permutation-only or both phases. The cores of these algorithms are based on several discrete chaotic maps (Arnold’s cat map and a combination of three generalized maps), one continuous chaotic system (Lorenz) and two non-chaotic generators (fractals and chess-based algorithms). Each algorithm has been analyzed by the correlation coefficients between pixels (horizontal, vertical and diagonal), differential attack measures, Mean Square Error (MSE), entropy, sensitivity analyses and the 15 standard tests of the National Institute of Standards and Technology (NIST) SP-800-22 statistical suite. The analyzed algorithms include a set of new image encryption algorithms based on non-chaotic generators, either using substitution only (using fractals) and permutation only (chess-based) or both. Moreover, two different permutation scenarios are presented where the permutation-phase has or does not have a relationship with the input image through an ON/OFF switch. Different encryption-key lengths and complexities are provided from short to long key to persist brute-force attacks. In addition, sensitivities of those different techniques to a one bit change in the input parameters of the substitution key as well as the permutation key are assessed. Finally, a comparative discussion of this work versus many recent research with respect to the used generators, type of encryption, and analyses is presented to highlight the strengths and added contribution of this paper. PMID:26966561

  19. Security Improvement of an Image Encryption Based on mPixel-Chaotic-Shuffle and Pixel-Chaotic-Diffusion

    OpenAIRE

    Ahmad, Musheer; Alsharari, Hamed D.; Nizam, Munazza

    2014-01-01

    In this paper, we propose to improve the security performance of a recently proposed color image encryption algorithm which is based on multi-chaotic systems. The existing cryptosystem employed a pixel-chaotic-shuffle mechanism to encrypt images, in which the generation of shuffling sequences are independent to the plain-image/cipher-image. As a result, it fails to the chosen-plaintext and known-plaintext attacks. Moreover, the statistical features of the cryptosystem are not up to the standa...

  20. Cascade Chaotic System With Applications.

    Science.gov (United States)

    Zhou, Yicong; Hua, Zhongyun; Pun, Chi-Man; Chen, C L Philip

    2015-09-01

    Chaotic maps are widely used in different applications. Motivated by the cascade structure in electronic circuits, this paper introduces a general chaotic framework called the cascade chaotic system (CCS). Using two 1-D chaotic maps as seed maps, CCS is able to generate a huge number of new chaotic maps. Examples and evaluations show the CCS's robustness. Compared with corresponding seed maps, newly generated chaotic maps are more unpredictable and have better chaotic performance, more parameters, and complex chaotic properties. To investigate applications of CCS, we introduce a pseudo-random number generator (PRNG) and a data encryption system using a chaotic map generated by CCS. Simulation and analysis demonstrate that the proposed PRNG has high quality of randomness and that the data encryption system is able to protect different types of data with a high-security level.

  1. A fast chaotic block cipher for image encryption

    Science.gov (United States)

    Armand Eyebe Fouda, J. S.; Yves Effa, J.; Sabat, Samrat L.; Ali, Maaruf

    2014-03-01

    Image encryption schemes based on chaos usually involve real number arithmetic operations to generate the chaotic orbits from the chaotic system. These operations are time-consuming and are normally performed with high-end processors. To overcome this drawback, this paper proposes a one round encryption scheme for the fast generation of large permutation and diffusion keys based on the sorting of the solutions of the Linear Diophantine Equation (LDE) whose coefficients are integers and dynamically generated from any type of chaotic systems. The high security and low computational complexity are achieved not only by using large permutation based on the sorting of the solutions of LDE but also by generating only one permutation from the sorting of the solutions of the LDE, then by dynamically updating d number of integers (d>2) in the permutation. The performance of the proposed scheme is evaluated using various types of analysis such as entropy analysis, difference analysis, statistical analysis, key sensitivity analysis, key space analysis and speed analysis. The experimental results indicate that the proposed algorithm is secure and fast as compared to the two round encryption scheme.

  2. IMAGE ENCRYPTION TECHNIQUES USING CHAOTIC SCHEMES: A REVIEW

    Directory of Open Access Journals (Sweden)

    Monisha Sharma

    2010-06-01

    Full Text Available Cryptography is about communication in the presence of an adversary. It encompasses many problems like encryption, authentication, and key distribution to name a few. The field of modern cryptography providesa theoretical foundation based on which one can understand what exactly these problems are, how to evaluate protocols that purport to solve them and how to build protocols in whose security one can haveconfidence. Advanced digital technologies have made multimedia data widely available. Recently, multimedia applications become common in practice and thus security of multimedia data has become main concern.The basic issues pertaining to the problem of encryption has been discussed and also a survey on image encryption techniques based on chaotic schemes has been dealt in the present communication.The chaotic image encryption can be developed by using properties of chaos including deterministic dynamics, unpredictable behavior and non-linear transform. This concept leads to techniques that can simultaneously provide security functions and an overall visualcheck, which might be suitable in some applications. Digital images are widely used in various applications, that include military, legal and medical systems and these applications need to control access toimages and provide the means to verify integrity of images.

  3. Image encryption using eight dimensional chaotic cat map

    Science.gov (United States)

    Ganesan, K.; Murali, K.

    2014-06-01

    In recent years, a large number of discrete chaotic cryptographic algorithms have been proposed. However, most of them encounter some problems such as lack of robustness and security. In this paper, we introduce a new image encryption algorithm based on eight-dimensional (nonlinear) chaotic cat map. Encryption of image is different from that of texts due to some intrinsic features of image such as bulk data capacity and high redundancy, which are generally difficult to handle by traditional methods. In traditional methods the key space is small and the security is weak. The proposed algorithm tries to address these problems and also tries to enhance the encryption speed. In this paper an eight dimensional chaotic cat map is used to encrypt the intensity values of pixels using lookup table method thereby significantly increasing the speed and security of encryption. The proposed algorithm is found to be resistive against chosen/known-plaintext attacks, statistical and differential attacks.

  4. Chaotic trigonometric Haar wavelet with focus on image encryption

    OpenAIRE

    Ahadpour, Sodeif; Sadra, Yaser

    2014-01-01

    In this paper, after reviewing the main points of Haar wavelet transform and chaotic trigonometric maps, we introduce a new perspective of Haar wavelet transform. The essential idea of the paper is given linearity properties of the scaling function of the Haar wavelet. With regard to applications of Haar wavelet transform in image processing, we introduce chaotic trigonometric Haar wavelet transform to encrypt the plain images. In addition, the encrypted images based on a proposed algorithm w...

  5. Image encryption using the two-dimensional logistic chaotic map

    Science.gov (United States)

    Wu, Yue; Yang, Gelan; Jin, Huixia; Noonan, Joseph P.

    2012-01-01

    Chaos maps and chaotic systems have been proved to be useful and effective for cryptography. In our study, the two-dimensional logistic map with complicated basin structures and attractors are first used for image encryption. The proposed method adopts the classic framework of the permutation-substitution network in cryptography and thus ensures both confusion and diffusion properties for a secure cipher. The proposed method is able to encrypt an intelligible image into a random-like one from the statistical point of view and the human visual system point of view. Extensive simulation results using test images from the USC-SIPI image database demonstrate the effectiveness and robustness of the proposed method. Security analysis results of using both the conventional and the most recent tests show that the encryption quality of the proposed method reaches or excels the current state-of-the-art methods. Similar encryption ideas can be applied to digital data in other formats (e.g., digital audio and video). We also publish the cipher MATLAB open-source-code under the web page https://sites.google.com/site/tuftsyuewu/source-code.

  6. 基于五维混沌系统的图像加密研究%Five-dimensional chaotic system based image encryption algorithm

    Institute of Scientific and Technical Information of China (English)

    高亮; 朱博; 孙鸣; 朱建良

    2011-01-01

    随着计算机技术、信息技术和通讯技术等高科技技术在近年来的迅猛发展,信息加密越来越受到人们的重视,提出了基于五维混沌系统用来实现图像加密的方法,并利用迭代次数和方式作为密码,实现了图像加密和解密,为信息加密提供了一种新方法.%With computer technology, information technology and communications technology, high technology, rapid development in recent years, more and more people pay close attention to information encryption. This paper, based on five-dimensional chaotic system realizes image encryption method, and means of using the number of iterations as the password, to realize the image encryption and decryption,the information provides a new method of encryption.

  7. Plaintext Related Image Encryption Scheme Using Chaotic Map

    Directory of Open Access Journals (Sweden)

    Yong Zhang

    2013-07-01

    Full Text Available A plaintext related image blocking encryption algorithm is proposed in this paper, which includes two kinds of operations on inner-block confusion and inter-block diffusion. Firstly, a float-point lookup table need to be generated by iterating chaotic system; Secondly, choose one of the entries in the look-up table as initial value of chaotic system, and iterate it to produce one secret code sequence for inner-block confusion; Thirdly, by using one pixel value of the former block to locate another entry in the look-up table, iterate it to yield another secret code sequence for inter-block diffusion; Finally, through two rounds of the block-by-block processes, the plain-image will be transformed into the cipher-image. The simulation results show that the proposed method has many good characters.

  8. Security analysis of image encryption based on two-dimensional chaotic maps and improved algorithm

    Institute of Scientific and Technical Information of China (English)

    Feng HUANG; Yong FENG

    2009-01-01

    The article proposes a new algorithm to improve the security of image encryption based on two-dimensional chaotic maps.Chaotic maps are often used in encrypting images.However,the encryption has periodic-ity,no diffusion,and at the same time,the real keys space of encryption are fewer than the theoretical keys space,which consequently results in potential security problems.Thus,this article puts forward several ways to solve the problems including adding diffusion mechanism,changing the design of keys and developing a composite encryption system.It designs an algorithm for the version B of the discretized baker map,which is one of the most prevalent chaotic maps,based on which a new image encryption is proposed to avoid the above problems.The simulation results show that the new encryption algorithm is valid and the result can be applied to other two-dimensional chaotic maps,such as the cat map.

  9. Improved Cryptanalysis of CMC Chaotic Image Encryption Scheme

    Directory of Open Access Journals (Sweden)

    Jiansheng Guo

    2010-12-01

    Full Text Available Recently, chaos has attracted much attention in the field of cryptography. To study the security with a known image of a symmetric image encryption scheme, the attack algorithm of equivalent key is given. We give the known image attacks under different other conditions to obtain the equivalent key. The concrete step and complexity of the attack algorithm is given. So the symmetric image encryption scheme based on 3D chaotic cat maps is not secure.

  10. A Parallel Encryption Algorithm Based on Piecewise Linear Chaotic Map

    Directory of Open Access Journals (Sweden)

    Xizhong Wang

    2013-01-01

    Full Text Available We introduce a parallel chaos-based encryption algorithm for taking advantage of multicore processors. The chaotic cryptosystem is generated by the piecewise linear chaotic map (PWLCM. The parallel algorithm is designed with a master/slave communication model with the Message Passing Interface (MPI. The algorithm is suitable not only for multicore processors but also for the single-processor architecture. The experimental results show that the chaos-based cryptosystem possesses good statistical properties. The parallel algorithm provides much better performance than the serial ones and would be useful to apply in encryption/decryption file with large size or multimedia.

  11. A novel chaotic encryption scheme based on pseudorandom bit padding

    CERN Document Server

    Sadra, Yaser; Fard, Zahra Arasteh

    2012-01-01

    Cryptography is always very important in data origin authentications, entity authentication, data integrity and confidentiality. In recent years, a variety of chaotic cryptographic schemes have been proposed. These schemes has typical structure which performed the permutation and the diffusion stages, alternatively. The random number generators are intransitive in cryptographic schemes and be used in the diffusion functions of the image encryption for diffused pixels of plain image. In this paper, we propose a chaotic encryption scheme based on pseudorandom bit padding that the bits be generated by a novel logistic pseudorandom image algorithm. To evaluate the security of the cipher image of this scheme, the key space analysis, the correlation of two adjacent pixels and differential attack were performed. This scheme tries to improve the problem of failure of encryption such as small key space and level of security.

  12. A novel chaotic image encryption scheme using DNA sequence operations

    Science.gov (United States)

    Wang, Xing-Yuan; Zhang, Ying-Qian; Bao, Xue-Mei

    2015-10-01

    In this paper, we propose a novel image encryption scheme based on DNA (Deoxyribonucleic acid) sequence operations and chaotic system. Firstly, we perform bitwise exclusive OR operation on the pixels of the plain image using the pseudorandom sequences produced by the spatiotemporal chaos system, i.e., CML (coupled map lattice). Secondly, a DNA matrix is obtained by encoding the confused image using a kind of DNA encoding rule. Then we generate the new initial conditions of the CML according to this DNA matrix and the previous initial conditions, which can make the encryption result closely depend on every pixel of the plain image. Thirdly, the rows and columns of the DNA matrix are permuted. Then, the permuted DNA matrix is confused once again. At last, after decoding the confused DNA matrix using a kind of DNA decoding rule, we obtain the ciphered image. Experimental results and theoretical analysis show that the scheme is able to resist various attacks, so it has extraordinarily high security.

  13. Application of the Chaotic Ergodicity of Standard Map in Image Encryption and Watermarking

    OpenAIRE

    Ruisong Ye; Huiqing Huang

    2010-01-01

    Thanks to the exceptionally good properties in chaotic systems, such as sensitivity to initial conditions and control parameters, pseudo-randomness and ergodicity, chaos-based image encryption algorithms have been widely studied and developed in recent years. Standard map is chaotic so that it can be employed to shuffle the positions of image pixels to get a totally visual difference from the original images. This paper proposes two novel schemes to shuffle digital images. Different from the ...

  14. Image Encryption Based On Diffusion And Multiple Chaotic Maps

    Directory of Open Access Journals (Sweden)

    G.A.Sathishkumar

    2011-03-01

    Full Text Available In the recent world, security is a prime important issue, and encryption is one of the best alternative wayto ensure security. More over, there are many image encryption schemes have been proposed, each one ofthem has its own strength and weakness. This paper presents a new algorithm for the imageencryption/decryption scheme. This paper is devoted to provide a secured image encryption techniqueusing multiple chaotic based circular mapping. In this paper, first, a pair of sub keys is given by usingchaotic logistic maps. Second, the image is encrypted using logistic map sub key and in its transformationleads to diffusion process. Third, sub keys are generated by four different chaotic maps. Based on theinitial conditions, each map may produce various random numbers from various orbits of the maps.Among those random numbers, a particular number and from a particular orbit are selected as a key forthe encryption algorithm. Based on the key, a binary sequence is generated to control the encryptionalgorithm. The input image of 2-D is transformed into a 1- D array by using two different scanningpattern (raster and Zigzag and then divided into various sub blocks. Then the position permutation andvalue permutation is applied to each binary matrix based on multiple chaos maps. Finally the receiveruses the same sub keys to decrypt the encrypted images. The salient features of the proposed imageencryption method are loss-less, good peak signal –to noise ratio (PSNR, Symmetric key encryption, lesscross correlation, very large number of secret keys, and key-dependent pixel value replacement.

  15. CONSTRUCTION OF THE ENCRYPTION MATRIX BASED ON CHEBYSHEV CHAOTIC NEURAL NETWORKS

    Institute of Scientific and Technical Information of China (English)

    Zou Ajin; Wu Wei; Li Renfa; Li Yongjiang

    2012-01-01

    The paper proposes a novel algorithm to get the encryption matrix.Firstly,a chaotic sequence generated by Chebyshev chaotic neural networks is converted into a series of low-order integer matrices from which available encryption matrices are selected.Then,a higher order encryption matrix relating real world application is constructed by means of tensor production method based on selected encryption matrices.The results show that the proposed algorithm can produce a "one-time pad cipher" encryption matrix with high security; and the encryption results have good chaos and autocorrelation with the natural frequency of the plaintext being hidden and homogenized.

  16. A fast image encryption algorithm based on chaotic map

    Science.gov (United States)

    Liu, Wenhao; Sun, Kehui; Zhu, Congxu

    2016-09-01

    Derived from Sine map and iterative chaotic map with infinite collapse (ICMIC), a new two-dimensional Sine ICMIC modulation map (2D-SIMM) is proposed based on a close-loop modulation coupling (CMC) model, and its chaotic performance is analyzed by means of phase diagram, Lyapunov exponent spectrum and complexity. It shows that this map has good ergodicity, hyperchaotic behavior, large maximum Lyapunov exponent and high complexity. Based on this map, a fast image encryption algorithm is proposed. In this algorithm, the confusion and diffusion processes are combined for one stage. Chaotic shift transform (CST) is proposed to efficiently change the image pixel positions, and the row and column substitutions are applied to scramble the pixel values simultaneously. The simulation and analysis results show that this algorithm has high security, low time complexity, and the abilities of resisting statistical analysis, differential, brute-force, known-plaintext and chosen-plaintext attacks.

  17. Cryptanalysis and improvement of a digital image encryption method with chaotic map lattices

    Institute of Scientific and Technical Information of China (English)

    Wang Xing-Yuan; Liu Lin-Tao

    2013-01-01

    A digital image encryption scheme using chaotic map lattices has been proposed recently.In this paper,two fatal flaws of the cryptosystem are pointed out.According to these two drawbacks,cryptanalysts could recover the plaintext by applying the chosen plaintext attack.Therefore,the proposed cryptosystem is not secure enough to be used in the image transmission system.Experimental results show the feasibility of the attack.As a result,we make some improvements to the encryption scheme,which can completely resist our chosen plaintext attack.

  18. A novel color image encryption scheme using alternate chaotic mapping structure

    Science.gov (United States)

    Wang, Xingyuan; Zhao, Yuanyuan; Zhang, Huili; Guo, Kang

    2016-07-01

    This paper proposes an color image encryption algorithm using alternate chaotic mapping structure. Initially, we use the R, G and B components to form a matrix. Then one-dimension logistic and two-dimension logistic mapping is used to generate a chaotic matrix, then iterate two chaotic mappings alternately to permute the matrix. For every iteration, XOR operation is adopted to encrypt plain-image matrix, then make further transformation to diffuse the matrix. At last, the encrypted color image is obtained from the confused matrix. Theoretical analysis and experimental results has proved the cryptosystem is secure and practical, and it is suitable for encrypting color images.

  19. An improved image encryption algorithm based on chaotic maps

    Institute of Scientific and Technical Information of China (English)

    Xu Shu-Jiang; Wang Ji-Zhi; Yang Su-Xiang

    2008-01-01

    Recently,two chaotic image encryption schemes have been proposed,in which shuffling the positions and changing the grey values of image pixels are combined.This paper provides the chosen plaintext attack to recover the corresponding plaintext of a given ciphertext.Furthermore,it points out that the two schemes are not sufficiently sensitive to small changes of the plaintext.Based on the given analysis,it proposes an improved algorithm which includes two rounds of substitution and one round of permutation to strengthen the overall performance.

  20. A New Algorithm of Encryption and Decryption of Images Using Chaotic Mapping

    OpenAIRE

    Musheer Ahmad; M. Shamsher Alam

    2010-01-01

    The combination of chaotic theory and cryptography forms an important field of information security. In the past decade, chaos based image encryption is given much attention in the research of information security and a lot of image encryption algorithms based on chaotic maps have been proposed. Due to some inherent features of images like bulk data capacity and high data redundancy, the encryption of images is different from that of texts; therefore it is difficult to handle them by traditio...

  1. Secure Image Encryption Based On a Chua Chaotic Noise Generator

    Directory of Open Access Journals (Sweden)

    A. S. Andreatos

    2013-10-01

    Full Text Available This paper presents a secure image cryptography telecom system based on a Chua's circuit chaotic noise generator. A chaotic system based on synchronised Master–Slave Chua's circuits has been used as a chaotic true random number generator (CTRNG. Chaotic systems present unpredictable and complex behaviour. This characteristic, together with the dependence on the initial conditions as well as the tolerance of the circuit components, make CTRNGs ideal for cryptography. In the proposed system, the transmitter mixes an input image with chaotic noise produced by a CTRNG. Using thresholding techniques, the chaotic signal is converted to a true random bit sequence. The receiver must be able to reproduce exactly the same chaotic noise in order to subtract it from the received signal. This becomes possible with synchronisation between the two Chua's circuits: through the use of specific techniques, the trajectory of the Slave chaotic system can be bound to that of the Master circuit producing (almost identical behaviour. Additional blocks have been used in order to make the system highly parameterisable and robust against common attacks. The whole system is simulated in Matlab. Simulation results demonstrate satisfactory performance, as well as, robustness against cryptanalysis. The system works with both greyscale and colour jpg images.

  2. A video encryption method based on chaotic maps in DCT domain

    Institute of Scientific and Technical Information of China (English)

    Shuguo Yang; Shenghe Sun

    2008-01-01

    This paper proposes a new and secure video encryption method based on chaotic maps in DCT domain,which is quite in keeping with the common ideas and the frequent practices of video encryption.We select the 1-frames of the video sequence as encryption objects.First,we introduce two coupling chaotic maps to scramble the DCT coefficients of every original I-frame,and receive the scrambled I-frame.Second,we encrypt the DCT coefficients of the scrambled I-frame using another chaotic map.In the whole process,we use three chaotic maps and five keys; the I-frame is encrypted twice.Finally,we performed several tests and the experimental results have proved our method to be secure and efficient.

  3. A New Algorithm of Encryption and Decryption of Images Using Chaotic Mapping

    Directory of Open Access Journals (Sweden)

    Musheer Ahmad

    2010-01-01

    Full Text Available The combination of chaotic theory and cryptography forms an important field of information security. In the past decade, chaos based image encryption is given much attention in the research of information security and a lot of image encryption algorithms based on chaotic maps have been proposed. Due to some inherent features of images like bulk data capacity and high data redundancy, the encryption of images is different from that of texts; therefore it is difficult to handle them by traditional encryption methods. In this communication, a new image encryption algorithm based on three different chaotic maps is proposed. In the proposed algorithm, the plain-image is first decomposed into 8x8 size blocks and then the block based shuffling of image is carried out using 2D Cat map. Further, the control parameters of shuffling are randomly generated by employing 2D coupled Logistic map. After that the shuffled image is encrypted using chaotic sequence generated by one-dimensional Logistic map. The experimental results show that the proposed algorithm can successfully encrypt/decrypt the images with same secret keys, and the algorithm has good encryption effect, large key space and high sensitivity to a small change in secret keys. Moreover, the simulation analysis also demonstrates that the encrypted images have good information entropy, very low correlation coefficients and the distribution of gray values of an encrypted image has random-like behavior.

  4. Multiple Chaotic Real-time Image Encryption System Based on DSP+FPGA%基于DSP+FPGA的多混沌实时视频图像加密系统

    Institute of Scientific and Technical Information of China (English)

    许艳

    2013-01-01

      Aiming at the security and privacy problems of videos/images in digital communications, a system design scheme for realize real-time videos/images encryption is proposed based on DSP+FPGA, and then the realization of multi-chaotic encryption algorithm based on the DSP+FPGA is introduced in detail. The experimental results show that the encryption algorithm can enhance the security of the videos/images transmission, and it is proved that the system can run with rather fast encryption speed for the real-time videos/images.%  针对视频图像在数字通信中存在着安全和隐私问题,提出了基于DSP+FPGA技术来实现实时视频图像加密的系统设计方案,并详细介绍了多混沌加密算法在DSP和FPGA上的实现。实验结果表明多混沌实时视频图像加密增强了视频图像传输的安全性,同时证明了本系统对实时视频图像能快速地进行加密。

  5. A novel chaotic map and an improved chaos-based image encryption scheme.

    Science.gov (United States)

    Zhang, Xianhan; Cao, Yang

    2014-01-01

    In this paper, we present a novel approach to create the new chaotic map and propose an improved image encryption scheme based on it. Compared with traditional classic one-dimensional chaotic maps like Logistic Map and Tent Map, this newly created chaotic map demonstrates many better chaotic properties for encryption, implied by a much larger maximal Lyapunov exponent. Furthermore, the new chaotic map and Arnold's Cat Map based image encryption method is designed and proved to be of solid robustness. The simulation results and security analysis indicate that such method not only can meet the requirement of imagine encryption, but also can result in a preferable effectiveness and security, which is usable for general applications.

  6. A Novel Chaotic Map and an Improved Chaos-Based Image Encryption Scheme

    Science.gov (United States)

    2014-01-01

    In this paper, we present a novel approach to create the new chaotic map and propose an improved image encryption scheme based on it. Compared with traditional classic one-dimensional chaotic maps like Logistic Map and Tent Map, this newly created chaotic map demonstrates many better chaotic properties for encryption, implied by a much larger maximal Lyapunov exponent. Furthermore, the new chaotic map and Arnold's Cat Map based image encryption method is designed and proved to be of solid robustness. The simulation results and security analysis indicate that such method not only can meet the requirement of imagine encryption, but also can result in a preferable effectiveness and security, which is usable for general applications. PMID:25143990

  7. Efficient transmission of 1D and 2D chaotic map encrypted images with orthogonal frequency division multiplexing

    Science.gov (United States)

    Kasem, Hossam M.; Nasr, Mohamed E.; Sallam, Elsayed A.; Abd El-Samie, F. E.

    2011-10-01

    Image transmission takes place as an important research branch in multimedia broadcasting communication systems in the last decade. Our paper presents image transmission over a FFT-OFDM (Fast Fourier Transform Orthogonal Frequency Division Multiplexing). The need for encryption techniques increase with the appearance of the expression which said that our world became small village, and the use of image application such as conference and World Wide Web which increase rapidly in recent years. Encryption is an effective method for protecting the transmitted data by converting it into a form being invisible over transmission path and visible in receiver side. This paper presents a new hybrid encryption technique based on combination of Backer maps and logistic map. This proposed technique aims to increase PSNR and reduce the noise in the received image. The encryption is done by shuffling the positions of a pixel image using two dimensional Baker maps then encrypt using XOR operation with logistic map to generate cipher image over orthogonal frequency multiplexing (OFDM). The encryption approach adopted in this paper is based on chaotic Baker maps because the encoding and decoding steps in this approach are simple and fast enough for HDTV applications. The experimental results reveal the superiority of the proposed chaotic based image encryption technique using two logistic maps and two dimensional Backer map over normal Backer map.

  8. Transmission Error and Compression Robustness of 2D Chaotic Map Image Encryption Schemes

    Directory of Open Access Journals (Sweden)

    Gschwandtner Michael

    2007-01-01

    Full Text Available This paper analyzes the robustness properties of 2D chaotic map image encryption schemes. We investigate the behavior of such block ciphers under different channel error types and find the transmission error robustness to be highly dependent on on the type of error occurring and to be very different as compared to the effects when using traditional block ciphers like AES. Additionally, chaotic-mixing-based encryption schemes are shown to be robust to lossy compression as long as the security requirements are not too high. This property facilitates the application of these ciphers in scenarios where lossy compression is applied to encrypted material, which is impossible in case traditional ciphers should be employed. If high security is required chaotic mixing loses its robustness to transmission errors and compression, still the lower computational demand may be an argument in favor of chaotic mixing as compared to traditional ciphers when visual data is to be encrypted.

  9. An Intelligent and Fast Chaotic Encryption Using Digital Logic Circuits for Ad-Hoc and Ubiquitous Computing

    Directory of Open Access Journals (Sweden)

    Ankur Khare

    2016-05-01

    Full Text Available Delays added by the encryption process represent an overhead for smart computing devices in ad-hoc and ubiquitous computing intelligent systems. Digital Logic Circuits are faster than other computing techniques, so these can be used for fast encryption to minimize processing delays. Chaotic Encryption is more attack-resilient than other encryption techniques. One of the most attractive properties of cryptography is known as an avalanche effect, in which two different keys produce distinct cipher text for the same information. Important properties of chaotic systems are sensitivity to initial conditions and nonlinearity, which makes two similar keys that generate different cipher text a source of confusion. In this paper a novel fast and secure Chaotic Map-based encryption technique using 2’s Compliment (CET-2C has been proposed, which uses a logistic map which implies that a negligible difference in parameters of the map generates different cipher text. Cryptanalysis of the proposed algorithm shows the strength and security of algorithm and keys. Performance of the proposed algorithm has been analyzed in terms of running time, throughput and power consumption. It is to be shown in comparison graphs that the proposed algorithm gave better results compare to different algorithms like AES and some others.

  10. Application of the Chaotic Ergodicity of Standard Map in Image Encryption and Watermarking

    Directory of Open Access Journals (Sweden)

    Ruisong Ye

    2010-11-01

    Full Text Available Thanks to the exceptionally good properties in chaotic systems, such as sensitivity to initial conditions and control parameters, pseudo-randomness and ergodicity, chaos-based image encryption algorithms have been widely studied and developed in recent years. Standard map is chaotic so that it can be employed to shuffle the positions of image pixels to get a totally visual difference from the original images. This paper proposes two novel schemes to shuffle digital images. Different from the conventional schemes based on Standard map, we disorder the pixel positions according to the orbits of the Standard map. The proposed shuffling schemes don’t need to discretize the Standard map and own more cipher leys compared with the conventional shuffling scheme based on the discretized Standard map. The shuffling schemes are applied to encrypt image and disorder the host image in watermarking scheme to enhance the robustness against attacks. Experimental results show that the proposed encryption scheme yields good secure effects. The watermarked images are robust against attacks as well.

  11. Double-image encryption based on discrete fractional random transform and chaotic maps

    Science.gov (United States)

    Li, Huijuan; Wang, Yurong

    2011-07-01

    A novel double-image encryption algorithm is proposed, based on discrete fractional random transform and chaotic maps. The random matrices used in the discrete fractional random transform are generated by using a chaotic map. One of the two original images is scrambled by using another chaotic map, and then encoded into the phase of a complex matrix with the other original image as its amplitude. Then this complex matrix is encrypted by the discrete fractional random transform. By applying the correct keys which consist of initial values, control parameters, and truncated positions of the chaotic maps, and fractional orders, the two original images can be recovered without cross-talk. Numerical simulation has been performed to test the validity and the security of the proposed encryption algorithm. Encrypting two images together by this algorithm creates only one encrypted image, whereas other single-image encryption methods create two encrypted images. Furthermore, this algorithm requires neither the use of phase keys nor the use of matrix keys. In this sense, this algorithm can raise the efficiency when encrypting, storing or transmitting.

  12. Composite Chaotic Pseudo-Random Sequence Encryption Algorithm for Compressed Video

    Institute of Scientific and Technical Information of China (English)

    袁春; 钟玉琢; 杨士强

    2004-01-01

    Stream cryptosystems, which implement encryption by selecting parts of the block data and header information of the compressed video stream, achieve good real-time encryption with high flexibility. Chaotic random number generator-based approaches, for example, logistics maps, are comparatively promising approachs, but are vulnerable to attacks by nonlinear dynamic forecasting. A composite chaotic cryptography scheme was developed to encrypt the compressed video with the logistics map with a Z(231?1) field linear congruential algorithm to strengthen the security of the mono-chaotic cryptography. The scheme maintained real-time performance and flexibility of the chaotic sequence cryptography. The scheme also integrated asymmetrical public-key cryptography and encryption and identity authentification of control parameters at the initialization phase. Encryption is performed in a layered scheme based on the importance of the data in a compressed video stream. The composite chaotic cryptography scheme has the advantage that the value and updating frequency of the control parameters can be changed online to satisfy the network requirements and the processor capability, as well as the security requirements. Cryptanalysis shows that the scheme guarantees robust security,provides good real-time performance,and has flexible implementation. Statistical evaluations and tests verify that the scheme is effective.

  13. Dynamic video encryption algorithm for H.264/AVC based on a spatiotemporal chaos system.

    Science.gov (United States)

    Xu, Hui; Tong, Xiao-Jun; Zhang, Miao; Wang, Zhu; Li, Ling-Hao

    2016-06-01

    Video encryption schemes mostly employ the selective encryption method to encrypt parts of important and sensitive video information, aiming to ensure the real-time performance and encryption efficiency. The classic block cipher is not applicable to video encryption due to the high computational overhead. In this paper, we propose the encryption selection control module to encrypt video syntax elements dynamically which is controlled by the chaotic pseudorandom sequence. A novel spatiotemporal chaos system and binarization method is used to generate a key stream for encrypting the chosen syntax elements. The proposed scheme enhances the resistance against attacks through the dynamic encryption process and high-security stream cipher. Experimental results show that the proposed method exhibits high security and high efficiency with little effect on the compression ratio and time cost. PMID:27409446

  14. A novel image block cryptosystem based on a spatiotemporal chaotic system and a chaotic neural network

    Institute of Scientific and Technical Information of China (English)

    Wang Xing-Yuan; Bao Xue-Mei

    2013-01-01

    In this paper,we propose a novel block cryptographic scheme based on a spatiotemporal chaotic system and a chaotic neural network (CNN).The employed CNN comprises a 4-neuron layer called a chaotic neuron layer (CNL),where the spatiotemporal chaotic system participates in generating its weight matrix and other parameters.The spatiotemporal chaotic system used in our scheme is the typical coupled map lattice (CML),which can be easily implemented in parallel by hardware.A 160-bit-long binary sequence is used to generate the initial conditions of the CML.The decryption process is symmetric relative to the encryption process.Theoretical analysis and experimental results prove that the block cryptosystem is secure and practical,and suitable for image encryption.

  15. A novel bit-level image encryption algorithm based on chaotic maps

    Science.gov (United States)

    Xu, Lu; Li, Zhi; Li, Jian; Hua, Wei

    2016-03-01

    Recently, a number of chaos-based image encryption algorithms have been proposed at the pixel level, but little research at the bit level has been conducted. This paper presents a novel bit-level image encryption algorithm that is based on piecewise linear chaotic maps (PWLCM). First, the plain image is transformed into two binary sequences of the same size. Second, a new diffusion strategy is introduced to diffuse the two sequences mutually. Then, we swap the binary elements in the two sequences by the control of a chaotic map, which can permute the bits in one bitplane into any other bitplane. The proposed algorithm has excellent encryption performance with only one round. The simulation results and performance analysis show that the proposed algorithm is both secure and reliable for image encryption.

  16. A new image encryption algorithm based on logistic chaotic map with varying parameter

    OpenAIRE

    Liu, Lingfeng; Miao, Suoxia

    2016-01-01

    In this paper, we proposed a new image encryption algorithm based on parameter-varied logistic chaotic map and dynamical algorithm. The parameter-varied logistic map can cure the weaknesses of logistic map and resist the phase space reconstruction attack. We use the parameter-varied logistic map to shuffle the plain image, and then use a dynamical algorithm to encrypt the image. We carry out several experiments, including Histogram analysis, information entropy analysis, sensitivity analysis,...

  17. Henon CSK Secure Communication System Using Chaotic Turbo Codes

    Institute of Scientific and Technical Information of China (English)

    2002-01-01

    In this paper,the authors design a novel chaotic secure communication system, which has high security and good errorcorrecting capability. Firstly, the Henon Chaos Shift Keying (CSK) modulation block is presented. Secondly,chaotic turbo encod er/decoder (hard decision) is introduced. Thirdly, this chaotic secure communication system, which comprises the Henon CSK modulation block and chaotic turbo en coder in a serially concatenated form, is shown. Furthermore, a novel two step encryption scheme is proposed, which is based on the chaotic turbo e ncoded Henon CSK secure communication system.

  18. Multiple-image encryption with bit-plane decomposition and chaotic maps

    Science.gov (United States)

    Tang, Zhenjun; Song, Juan; Zhang, Xianquan; Sun, Ronghai

    2016-05-01

    Image encryption is an efficient technique of image content protection. In this work, we propose a useful image encryption algorithm for multiple grayscale images. The proposed algorithm decomposes input images into bit-planes, randomly swaps bit-blocks among different bit-planes, and conducts XOR operation between the scrambled images and secret matrix controlled by chaotic map. Finally, an encrypted PNG image is obtained by viewing four scrambled grayscale images as its red, green, blue and alpha components. Many simulations are done to illustrate efficiency of our algorithm.

  19. A new image encryption algorithm based on logistic chaotic map with varying parameter.

    Science.gov (United States)

    Liu, Lingfeng; Miao, Suoxia

    2016-01-01

    In this paper, we proposed a new image encryption algorithm based on parameter-varied logistic chaotic map and dynamical algorithm. The parameter-varied logistic map can cure the weaknesses of logistic map and resist the phase space reconstruction attack. We use the parameter-varied logistic map to shuffle the plain image, and then use a dynamical algorithm to encrypt the image. We carry out several experiments, including Histogram analysis, information entropy analysis, sensitivity analysis, key space analysis, correlation analysis and computational complexity to evaluate its performances. The experiment results show that this algorithm is with high security and can be competitive for image encryption. PMID:27066326

  20. Design of an image encryption scheme based on a multiple chaotic map

    Science.gov (United States)

    Tong, Xiao-Jun

    2013-07-01

    In order to solve the problem that chaos is degenerated in limited computer precision and Cat map is the small key space, this paper presents a chaotic map based on topological conjugacy and the chaotic characteristics are proved by Devaney definition. In order to produce a large key space, a Cat map named block Cat map is also designed for permutation process based on multiple-dimensional chaotic maps. The image encryption algorithm is based on permutation-substitution, and each key is controlled by different chaotic maps. The entropy analysis, differential analysis, weak-keys analysis, statistical analysis, cipher random analysis, and cipher sensibility analysis depending on key and plaintext are introduced to test the security of the new image encryption scheme. Through the comparison to the proposed scheme with AES, DES and Logistic encryption methods, we come to the conclusion that the image encryption method solves the problem of low precision of one dimensional chaotic function and has higher speed and higher security.

  1. Synchronization of chaotic systems.

    Science.gov (United States)

    Pecora, Louis M; Carroll, Thomas L

    2015-09-01

    We review some of the history and early work in the area of synchronization in chaotic systems. We start with our own discovery of the phenomenon, but go on to establish the historical timeline of this topic back to the earliest known paper. The topic of synchronization of chaotic systems has always been intriguing, since chaotic systems are known to resist synchronization because of their positive Lyapunov exponents. The convergence of the two systems to identical trajectories is a surprise. We show how people originally thought about this process and how the concept of synchronization changed over the years to a more geometric view using synchronization manifolds. We also show that building synchronizing systems leads naturally to engineering more complex systems whose constituents are chaotic, but which can be tuned to output various chaotic signals. We finally end up at a topic that is still in very active exploration today and that is synchronization of dynamical systems in networks of oscillators.

  2. Synchronization of chaotic systems

    Energy Technology Data Exchange (ETDEWEB)

    Pecora, Louis M.; Carroll, Thomas L. [U.S. Naval Research Laboratory, Washington, District of Columbia 20375 (United States)

    2015-09-15

    We review some of the history and early work in the area of synchronization in chaotic systems. We start with our own discovery of the phenomenon, but go on to establish the historical timeline of this topic back to the earliest known paper. The topic of synchronization of chaotic systems has always been intriguing, since chaotic systems are known to resist synchronization because of their positive Lyapunov exponents. The convergence of the two systems to identical trajectories is a surprise. We show how people originally thought about this process and how the concept of synchronization changed over the years to a more geometric view using synchronization manifolds. We also show that building synchronizing systems leads naturally to engineering more complex systems whose constituents are chaotic, but which can be tuned to output various chaotic signals. We finally end up at a topic that is still in very active exploration today and that is synchronization of dynamical systems in networks of oscillators.

  3. Synchronization of chaotic systems

    Science.gov (United States)

    Pecora, Louis M.; Carroll, Thomas L.

    2015-09-01

    We review some of the history and early work in the area of synchronization in chaotic systems. We start with our own discovery of the phenomenon, but go on to establish the historical timeline of this topic back to the earliest known paper. The topic of synchronization of chaotic systems has always been intriguing, since chaotic systems are known to resist synchronization because of their positive Lyapunov exponents. The convergence of the two systems to identical trajectories is a surprise. We show how people originally thought about this process and how the concept of synchronization changed over the years to a more geometric view using synchronization manifolds. We also show that building synchronizing systems leads naturally to engineering more complex systems whose constituents are chaotic, but which can be tuned to output various chaotic signals. We finally end up at a topic that is still in very active exploration today and that is synchronization of dynamical systems in networks of oscillators.

  4. Chaotic image encryption based on running-key related to plaintext.

    Science.gov (United States)

    Guanghui, Cao; Kai, Hu; Yizhi, Zhang; Jun, Zhou; Xing, Zhang

    2014-01-01

    In the field of chaotic image encryption, the algorithm based on correlating key with plaintext has become a new developing direction. However, for this kind of algorithm, some shortcomings in resistance to reconstruction attack, efficient utilization of chaotic resource, and reducing dynamical degradation of digital chaos are found. In order to solve these problems and further enhance the security of encryption algorithm, based on disturbance and feedback mechanism, we present a new image encryption scheme. In the running-key generation stage, by successively disturbing chaotic stream with cipher-text, the relation of running-key to plaintext is established, reconstruction attack is avoided, effective use of chaotic resource is guaranteed, and dynamical degradation of digital chaos is minimized. In the image encryption stage, by introducing random-feedback mechanism, the difficulty of breaking this scheme is increased. Comparing with the-state-of-the-art algorithms, our scheme exhibits good properties such as large key space, long key period, and extreme sensitivity to the initial key and plaintext. Therefore, it can resist brute-force, reconstruction attack, and differential attack.

  5. Chaotic Image Encryption Based on Running-Key Related to Plaintext

    Science.gov (United States)

    Guanghui, Cao; Kai, Hu; Yizhi, Zhang; Jun, Zhou; Xing, Zhang

    2014-01-01

    In the field of chaotic image encryption, the algorithm based on correlating key with plaintext has become a new developing direction. However, for this kind of algorithm, some shortcomings in resistance to reconstruction attack, efficient utilization of chaotic resource, and reducing dynamical degradation of digital chaos are found. In order to solve these problems and further enhance the security of encryption algorithm, based on disturbance and feedback mechanism, we present a new image encryption scheme. In the running-key generation stage, by successively disturbing chaotic stream with cipher-text, the relation of running-key to plaintext is established, reconstruction attack is avoided, effective use of chaotic resource is guaranteed, and dynamical degradation of digital chaos is minimized. In the image encryption stage, by introducing random-feedback mechanism, the difficulty of breaking this scheme is increased. Comparing with the-state-of-the-art algorithms, our scheme exhibits good properties such as large key space, long key period, and extreme sensitivity to the initial key and plaintext. Therefore, it can resist brute-force, reconstruction attack, and differential attack. PMID:24711727

  6. UNIVERSAL DIGITAL IMAGE ENCRYPTION AND RECOVERY ALGORITHM BASED ON 3 D CHAOTIC SYSTEM%基于三维混沌系统的通用数字图像加密与恢复算法

    Institute of Scientific and Technical Information of China (English)

    卢守东; 肖芳雄

    2013-01-01

    In order to protect digital image information effectively , a new universal encryption algorithm based on 3D chaotic system and its improved sequences is proposed .Firstly, according to the key and the digital image size m ×n , a 3D chaotic sequence with length of m ×n is generated .Then, the chaotic sequence is improved to possess the ideal pseudo-randomness property according to the sub-key and the type of image.Also according to the sub-key and the type of image , at the same time the chaotic sequence is converted to unsigned integer se-quence.Finally, the improved sequence is sorted for generating the corresponding subscript sequence , and pixel coordinates of the image will be scrambled based on it .Meanwhile , the pixel value permutation is realised by using the XOR operation between the unsigned integer se -quence and the corresponding pixel value in turn .In allusion to the malicious shearing or painting attacks ,a recovery algorithm based on neigh-bouring pixels characteristic is presented simultaneously .The effect of the encryption and security is also analysed by using the evaluation in-dex.Experimental results and theoretical analysis show that the algorithm has high running efficiency , large space of keys , good encryption effect, statistical characteristics and security , it also has strong ability in resisting the shearing or painting attacks and anti-noise as well.%为有效保护数字图像的信息,提出一种新的基于三维混沌系统及其改进序列的通用加密算法。首先,根据密钥及数字图像的大小m ×n,产生一个长度为m ×n的三维混沌序列。然后,根据子密钥及图像类型对混沌序列进行改进,使其具有理想的伪随机特性。同时,根据子密钥及图像类型将混沌序列转换为无符号整数序列。最后,对改进后的序列进行排序以生成相应的下标序列,并据此对图像进行像素坐标置乱,同时将无符号整数序列依次与对应的

  7. Chaotic Image Encryption Algorithm by Correlating Keys with Plaintext

    Institute of Scientific and Technical Information of China (English)

    Zhu Congxu; Sun Kehui

    2012-01-01

    A novel image encryption scheme based on the modified skew tent map was proposed in this paper. In the key generating procedure, the algorithm generates a plaintext-dependent secret keys set. In the encryption process, the diffusion operation with cipher output feedback is introduced. Thus, cipher-irmge is sensitive to both initial keys and plaintext through only one round diffusion operation. The key space is large. As a resuk, the algorithm can effectively resist differential attacks, statistical attacks, brute-force attacks, known plaintext and chosen plaintext attacks. Perforrmnce test and security analysis demonstrates that this algorithm is eficient and reliable, with high potential to be adopted for secure comnmnications.

  8. A Novel 1D Hybrid Chaotic Map-Based Image Compression and Encryption Using Compressed Sensing and Fibonacci-Lucas Transform

    Directory of Open Access Journals (Sweden)

    Tongfeng Zhang

    2016-01-01

    Full Text Available A one-dimensional (1D hybrid chaotic system is constructed by three different 1D chaotic maps in parallel-then-cascade fashion. The proposed chaotic map has larger key space and exhibits better uniform distribution property in some parametric range compared with existing 1D chaotic map. Meanwhile, with the combination of compressive sensing (CS and Fibonacci-Lucas transform (FLT, a novel image compression and encryption scheme is proposed with the advantages of the 1D hybrid chaotic map. The whole encryption procedure includes compression by compressed sensing (CS, scrambling with FLT, and diffusion after linear scaling. Bernoulli measurement matrix in CS is generated by the proposed 1D hybrid chaotic map due to its excellent uniform distribution. To enhance the security and complexity, transform kernel of FLT varies in each permutation round according to the generated chaotic sequences. Further, the key streams used in the diffusion process depend on the chaotic map as well as plain image, which could resist chosen plaintext attack (CPA. Experimental results and security analyses demonstrate the validity of our scheme in terms of high security and robustness against noise attack and cropping attack.

  9. Ensemble of Chaotic and Naive Approaches for Performance Enhancement in Video Encryption

    Directory of Open Access Journals (Sweden)

    Jeyamala Chandrasekaran

    2015-01-01

    Full Text Available Owing to the growth of high performance network technologies, multimedia applications over the Internet are increasing exponentially. Applications like video conferencing, video-on-demand, and pay-per-view depend upon encryption algorithms for providing confidentiality. Video communication is characterized by distinct features such as large volume, high redundancy between adjacent frames, video codec compliance, syntax compliance, and application specific requirements. Naive approaches for video encryption encrypt the entire video stream with conventional text based cryptographic algorithms. Although naive approaches are the most secure for video encryption, the computational cost associated with them is very high. This research work aims at enhancing the speed of naive approaches through chaos based S-box design. Chaotic equations are popularly known for randomness, extreme sensitivity to initial conditions, and ergodicity. The proposed methodology employs two-dimensional discrete Henon map for (i generation of dynamic and key-dependent S-box that could be integrated with symmetric algorithms like Blowfish and Data Encryption Standard (DES and (ii generation of one-time keys for simple substitution ciphers. The proposed design is tested for randomness, nonlinearity, avalanche effect, bit independence criterion, and key sensitivity. Experimental results confirm that chaos based S-box design and key generation significantly reduce the computational cost of video encryption with no compromise in security.

  10. An authenticated image encryption scheme based on chaotic maps and memory cellular automata

    Science.gov (United States)

    Bakhshandeh, Atieh; Eslami, Ziba

    2013-06-01

    This paper introduces a new image encryption scheme based on chaotic maps, cellular automata and permutation-diffusion architecture. In the permutation phase, a piecewise linear chaotic map is utilized to confuse the plain-image and in the diffusion phase, we employ the Logistic map as well as a reversible memory cellular automata to obtain an efficient and secure cryptosystem. The proposed method admits advantages such as highly secure diffusion mechanism, computational efficiency and ease of implementation. A novel property of the proposed scheme is its authentication ability which can detect whether the image is tampered during the transmission or not. This is particularly important in applications where image data or part of it contains highly sensitive information. Results of various analyses manifest high security of this new method and its capability for practical image encryption.

  11. A NEW TECHNIQUE BASED ON CHAOTIC STEGANOGRAPHY AND ENCRYPTION TEXT IN DCT DOMAIN FOR COLOR IMAGE

    Directory of Open Access Journals (Sweden)

    MELAD J. SAEED

    2013-10-01

    Full Text Available Image steganography is the art of hiding information into a cover image. This paper presents a new technique based on chaotic steganography and encryption text in DCT domain for color image, where DCT is used to transform original image (cover image from spatial domain to frequency domain. This technique used chaotic function in two phases; firstly; for encryption secret message, second; for embedding in DCT cover image. With this new technique, good results are obtained through satisfying the important properties of steganography such as: imperceptibility; improved by having mean square error (MSE, peak signal to noise ratio (PSNR and normalized correlation (NC, to phase and capacity; improved by encoding the secret message characters with variable length codes and embedding the secret message in one level of color image only.

  12. A New Image Encryption Scheme Based on Dynamic S-Boxes and Chaotic Maps

    Science.gov (United States)

    Rehman, Atique Ur; Khan, Jan Sher; Ahmad, Jawad; Hwang, Soeng Oun

    2016-03-01

    Substitution box is a unique and nonlinear core component of block ciphers. A better designing technique of substitution box can boost up the quality of ciphertexts. In this paper, a new encryption method based on dynamic substitution boxes is proposed via using two chaotic maps. To break the correlation in an original image, pixels values of the original plaintext image are permuted row- and column-wise through random sequences. The aforementioned random sequences are generated by 2-D Burgers chaotic map. For the generation of dynamic substitution boxes, Logistic chaotic map is employed. In the process of diffusion, the permuted image is divided into blocks and each block is substituted via different dynamic substitution boxes. In contrast to conventional encryption schemes, the proposed scheme does not undergo the fixed block cipher and hence the security level can be enhanced. Extensive security analysis including histogram test is applied on the proposed image encryption technique. All experimental results reveal that the proposed scheme has a high level of security and robustness for transmission of digital images on insecure communication channels.

  13. The Research of Image Encryption Algorithm Based on Chaos Cellular Automata

    OpenAIRE

    Shuiping Zhang; Huijune Luo

    2012-01-01

    The Research presents an image encryption algorithm which bases on chaotic cellular automata. This algorithm makes use of features that extreme sensitivity of chaotic system to initial conditions, the cellular automaton with a high degree of parallel processing. The encryption algorithm uses two-dimensional chaotic system to Encrypt image, Then establish a cellular automaton model on the initial encrypted image. Encryption key of this algorithm is made up of the initial value by the two-dimen...

  14. A fractal-based image encryption system

    KAUST Repository

    Abd-El-Hafiz, S. K.

    2014-12-01

    This study introduces a novel image encryption system based on diffusion and confusion processes in which the image information is hidden inside the complex details of fractal images. A simplified encryption technique is, first, presented using a single-fractal image and statistical analysis is performed. A general encryption system utilising multiple fractal images is, then, introduced to improve the performance and increase the encryption key up to hundreds of bits. This improvement is achieved through several parameters: feedback delay, multiplexing and independent horizontal or vertical shifts. The effect of each parameter is studied separately and, then, they are combined to illustrate their influence on the encryption quality. The encryption quality is evaluated using different analysis techniques such as correlation coefficients, differential attack measures, histogram distributions, key sensitivity analysis and the National Institute of Standards and Technology (NIST) statistical test suite. The obtained results show great potential compared to other techniques.

  15. 基于FTP的图像混沌加密传输技术的实现%Implementation of transmitting chaotic-encrypted image based on FTP

    Institute of Scientific and Technical Information of China (English)

    刘新杰; 李黎明

    2014-01-01

    In order to accelerate the rate of chaotic-encrypted image transmission system and extend its field of application , this paper proposes a new method of transmitting chaotic-encrypted image: applying VSFTPD software to Mini 2440 ARM platform to setup a FTP server , and using FTP to convey the encrypted image files . The experiment result shows that this system can trans-fer chaotic-encrypted images rapidly and reliably .%为了提高混沌图像加密传输系统的传输速度并扩大应用范围,提出了一种实现混沌图像加密传输的新方法:利用 VSFTPD 软件在 Mini 2440 ARM 平台上构建 FTP 服务器,通过 FTP 实现混沌加密图像数据的传输。实验结果表明,该系统能够实现混沌加密图像的可靠快速传输。

  16. Digital Chaotic Synchronized Communication System

    Directory of Open Access Journals (Sweden)

    L. Magafas

    2009-01-01

    Full Text Available The experimental study of a secure chaotic synchronized communication system is presented. The synchronization betweentwo digital chaotic oscillators, serving as a transmitter-receiver scheme, is studied. The oscillators exhibit rich chaotic behaviorand are unidirectionally coupled, forming a master-slave topology. Both the input information signal and the transmittedchaotic signal are digital ones.

  17. Image encryption schemes for JPEG and GIF formats based on 3D baker with compound chaotic sequence generator

    OpenAIRE

    Ji, Shiyu; Tong, Xiaojun; Zhang, Miao

    2012-01-01

    This paper proposed several methods to transplant the compound chaotic image encryption scheme with permutation based on 3D baker into image formats as Joint Photographic Experts Group (JPEG) and Graphics Interchange Format (GIF). The new method averts the lossy Discrete Cosine Transform and quantization and can encrypt and decrypt JPEG images lossless. Our proposed method for GIF keeps the property of animation successfully. The security test results indicate the proposed methods have high s...

  18. A new chaotic cryptosystem

    Energy Technology Data Exchange (ETDEWEB)

    Wei Jun [Department of Computer Science and Engineering, Chongqing University, Chongqing 400044 (China); Zhunyi Medical College, Zhunyi 563000, Guizhou (China); Liao Xiaofeng [Department of Computer Science and Engineering, Chongqing University, Chongqing 400044 (China)]. E-mail: xfliao@cqu.edu.cn; Wong, Kwok-wo [Department of Computer Engineering and Information Technology, City University of Hong Kong (China); Xiang Tao [Department of Computer Science and Engineering, Chongqing University, Chongqing 400044 (China)

    2006-12-15

    Based on the study of some previously proposed chaotic encryption algorithms, we found that it is dangerous to mix chaotic state or iteration number of the chaotic system with ciphertext. In this paper, a new chaotic cryptosystem is proposed. Instead of simply mixing the chaotic signal of the proposed chaotic cryptosystem with the ciphertext, a noise-like variable is utilized to govern the encryption and decryption processes. This adds statistical sense to the new cryptosystem. Numerical simulations show that the new cryptosystem is practical whenever efficiency, ciphertext length or security is concerned.

  19. Design of Image Security System Based on Chaotic Maps Group

    Directory of Open Access Journals (Sweden)

    Feng Huang

    2011-12-01

    Full Text Available Images are used more and more widely in people’s life today. The image security becomes an important issue. Some encryption technologies are used to ensure the security of images. In them, the SCAN patterns are the one of effective tools to protect image. It generates very large number of scanning patterns of image. Then it shuffles the positions of image pixels by the patterns. The idea of chaotic maps group is similar to SCAN patterns. The paper designs a new image security system based on chaotic maps group. It takes the different maps of chaotic maps as patterns. The key represents different chaotic map patterns. Simulation shows that the image security system has a fast encryption speed and large enough key space, which mean high security. The design solve the limit between the keys and the size of image when encrypt image by chaotic map. At the same time it also solves the problem of the size of image required by SCAN pattern.

  20. Combination of Hybrid Chaotic Encryption and LDPC for Secure Transmission of Images over Wireless Networks

    Directory of Open Access Journals (Sweden)

    Mona F. M. Mursi

    2014-11-01

    Full Text Available Robust and secure transmission strategy for high quality image through wireless networks is considered a great challenge. However, the majority of encrypted image transmission schemes don't consider well the effect of bit errors occurring during transmission. These errors are due to the factors that affect the information such as noise and multipath propagation. That should be handled by an efficient channel coding scheme. Our proposed scheme is based on combining hybrid chaotic encryption, which is based on two-dimensional chaotic maps which is utilized for data security, with an error correction technique based on the Low Density Parity Check (LDPC code. The LDPC is employed as channel coding for data communication in order to solve the problem of the channel’s limited bandwidth and improve throughput. Simulation results show that the proposed scheme achieves a high degree of robustness against channel impairments and wide varieties of attacks as wells as improved reliability of the wireless channel. In addition, LDPC is utilized for error correction in order to solve the limitations of wireless channels.

  1. Research on medical image encryption in telemedicine systems.

    Science.gov (United States)

    Dai, Yin; Wang, Huanzhen; Zhou, Zixia; Jin, Ziyi

    2016-04-29

    Recently, advances in computers and high-speed communication tools have led to enhancements in remote medical consultation research. Laws in some localities require hospitals to encrypt patient information (including images of the patient) before transferring the data over a network. Therefore, developing suitable encryption algorithms is quite important for modern medicine. This paper demonstrates a digital image encryption algorithm based on chaotic mapping, which uses the no-period and no-convergence properties of a chaotic sequence to create image chaos and pixel averaging. Then, the chaotic sequence is used to encrypt the image, thereby improving data security. With this method, the security of data and images can be improved. PMID:27163302

  2. Leaking Chaotic Systems

    CERN Document Server

    Altmann, Eduardo G; Tél, Tamás

    2013-01-01

    There are numerous physical situations in which a hole or leak is introduced in an otherwise closed chaotic system. The leak can have a natural origin, it can mimic measurement devices, and it can also be used to reveal dynamical properties of the closed system. In this paper we provide an unified treatment of leaking systems and we review applications to different physical problems, both in the classical and quantum pictures. Our treatment is based on the transient chaos theory of open systems, which is essential because real leaks have finite size and therefore estimations based on the closed system differ essentially from observations. The field of applications reviewed is very broad, ranging from planetary astronomy and hydrodynamical flows, to plasma physics and quantum fidelity. The theory is expanded and adapted to the case of partial leaks (partial absorption/transmission) with applications to room acoustics and optical microcavities in mind. Simulations in the lima .con family of billiards illustrate...

  3. IMPULSIVE CONTROL OF CHAOTIC ATTRACTORS IN NONLINEAR CHAOTIC SYSTEMS

    Institute of Scientific and Technical Information of China (English)

    马军海; 任彪; 陈予恕

    2004-01-01

    Based on the study from both domestic and abroad, an impulsive control scheme on chaotic attractors in one kind of chaotic system is presented.By applying impulsive control theory of the universal equation, the asymptotically stable condition of impulsive control on chaotic attractors in such kind of nonlinear chaotic system has been deduced, and with it, the upper bond of the impulse interval for asymptotically stable control was given. Numerical results are presented, which are considered with important reference value for control of chaotic attractors.

  4. Design a New Image Encryption using Fuzzy Integral Permutation with Coupled Chaotic Maps

    Directory of Open Access Journals (Sweden)

    Yasaman Hashemi

    2013-01-01

    Full Text Available This article introduces a novel image encryption algorithm based on DNA addition combining and coupled two-dimensional piecewise nonlinear chaotic map. This algorithm consists of two parts. In the first part of the algorithm, a DNA sequence matrix is obtained by encoding each color component, and is divided into some equal blocks and then the generated sequence of Sugeno integral fuzzy and the DNA sequence addition operation is used to add these blocks. Next, the DNA sequence matrix from the previous step is decoded and the complement operation to the result of the added matrix is performed by using Sugeno fuzzy integral. In the second part of the algorithm, the three modified color components are encrypted in a coupling fashion in such a way to strengthen the cryptosystem security. It is observed that the histogram, the correlation and avalanche criterion, can satisfy security and performance requirements (Avalanche criterion > 0.49916283. The experimental results obtained for the CVG-UGR image databases reveal the fact that the proposed algorithm is suitable for practical use to protect the security of digital image information over the Internet.

  5. Eigenfunctions in chaotic quantum systems

    International Nuclear Information System (INIS)

    The structure of wavefunctions of quantum systems strongly depends on the underlying classical dynamics. In this text a selection of articles on eigenfunctions in systems with fully chaotic dynamics and systems with a mixed phase space is summarized. Of particular interest are statistical properties like amplitude distribution and spatial autocorrelation function and the implication of eigenfunction structures on transport properties. For systems with a mixed phase space the separation into regular and chaotic states does not always hold away from the semiclassical limit, such that chaotic states may completely penetrate into the region of the regular island. The consequences of this flooding are discussed and universal aspects highlighted. (orig.)

  6. Eigenfunctions in chaotic quantum systems

    Energy Technology Data Exchange (ETDEWEB)

    Baecker, Arnd

    2007-07-01

    The structure of wavefunctions of quantum systems strongly depends on the underlying classical dynamics. In this text a selection of articles on eigenfunctions in systems with fully chaotic dynamics and systems with a mixed phase space is summarized. Of particular interest are statistical properties like amplitude distribution and spatial autocorrelation function and the implication of eigenfunction structures on transport properties. For systems with a mixed phase space the separation into regular and chaotic states does not always hold away from the semiclassical limit, such that chaotic states may completely penetrate into the region of the regular island. The consequences of this flooding are discussed and universal aspects highlighted. (orig.)

  7. Synchronization and an application of a novel fractional order King Cobra chaotic system.

    Science.gov (United States)

    Muthukumar, P; Balasubramaniam, P; Ratnavelu, K

    2014-09-01

    In this paper, we design a new three dimensional King Cobra face shaped fractional order chaotic system. The multi-scale synchronization scheme of two fractional order chaotic systems is described. The necessary conditions for the multi-scale synchronization of two identical fractional order King Cobra chaotic systems are derived through feedback control. A new cryptosystem is proposed for an image encryption and decryption by using synchronized fractional order King Cobra chaotic systems with the supports of multiple cryptographic assumptions. The security of the proposed cryptosystem is analyzed by the well known algebraic attacks. Numerical simulations are given to show the effectiveness of the proposed theoretical results.

  8. Synchronization and an application of a novel fractional order King Cobra chaotic system

    International Nuclear Information System (INIS)

    In this paper, we design a new three dimensional King Cobra face shaped fractional order chaotic system. The multi-scale synchronization scheme of two fractional order chaotic systems is described. The necessary conditions for the multi-scale synchronization of two identical fractional order King Cobra chaotic systems are derived through feedback control. A new cryptosystem is proposed for an image encryption and decryption by using synchronized fractional order King Cobra chaotic systems with the supports of multiple cryptographic assumptions. The security of the proposed cryptosystem is analyzed by the well known algebraic attacks. Numerical simulations are given to show the effectiveness of the proposed theoretical results

  9. Synchronization and an application of a novel fractional order King Cobra chaotic system

    Energy Technology Data Exchange (ETDEWEB)

    Muthukumar, P., E-mail: muthukumardgl@gmail.com; Balasubramaniam, P., E-mail: balugru@gmail.com [Department of Mathematics, Gandhigram Rural Institute‐Deemed University, Gandhigram 624 302, Tamilnadu (India); Ratnavelu, K., E-mail: kuru052001@gmail.com [Faculty of Science, Institute of Mathematical Sciences, University of Malaya, 50603 Kuala Lumpur (Malaysia)

    2014-09-01

    In this paper, we design a new three dimensional King Cobra face shaped fractional order chaotic system. The multi-scale synchronization scheme of two fractional order chaotic systems is described. The necessary conditions for the multi-scale synchronization of two identical fractional order King Cobra chaotic systems are derived through feedback control. A new cryptosystem is proposed for an image encryption and decryption by using synchronized fractional order King Cobra chaotic systems with the supports of multiple cryptographic assumptions. The security of the proposed cryptosystem is analyzed by the well known algebraic attacks. Numerical simulations are given to show the effectiveness of the proposed theoretical results.

  10. Leaking chaotic systems

    Science.gov (United States)

    Altmann, Eduardo G.; Portela, Jefferson S. E.; Tél, Tamás

    2013-04-01

    There are numerous physical situations in which a hole or leak is introduced in an otherwise closed chaotic system. The leak can have a natural origin, it can mimic measurement devices, and it can also be used to reveal dynamical properties of the closed system. A unified treatment of leaking systems is provided and applications to different physical problems, in both the classical and quantum pictures, are reviewed. The treatment is based on the transient chaos theory of open systems, which is essential because real leaks have finite size and therefore estimations based on the closed system differ essentially from observations. The field of applications reviewed is very broad, ranging from planetary astronomy and hydrodynamical flows to plasma physics and quantum fidelity. The theory is expanded and adapted to the case of partial leaks (partial absorption and/or transmission) with applications to room acoustics and optical microcavities in mind. Simulations in the limaçon family of billiards illustrate the main text. Regarding billiard dynamics, it is emphasized that a correct discrete-time representation can be given only in terms of the so-called true-time maps, while traditional Poincaré maps lead to erroneous results. Perron-Frobenius-type operators are generalized so that they describe true-time maps with partial leaks.

  11. An Algorithm of Lorenz Chaotic Encryption Audio Watermarking Based on DWT%基于Lorenz混沌加密的DWT音频水印算法

    Institute of Scientific and Technical Information of China (English)

    陈雪松; 申美玲

    2011-01-01

    将混沌理论引入音频水印系统的设计中,提出一种基于Lorenz混沌系统的小波域数字音频水印算法.先将图像水印进行Logistic混沌加密,再利用三维Lorenz混沌吸引子在一定初值条件下产生的矩阵二次加密图像水印.把加密后的水印图像作为载体嵌入音频信号的小波域.因为高维混沌的系统结构更为复杂、不可预测性更强,若没有初始值便无法得到加密矩阵,因此保障了水印的安全性;而在水印检测时,只要提供混沌加密的密钥和产生加密矩阵的初始值,就可完成水印的提取.仿真实验采用多种攻击方法,证明此方法具有很强的安全性和鲁棒性.%A methodology for increasing audio watermark robustness based on Lorenz chaotic system was presented.A binary image watermarking was encrypted by a chaotic sequence and a matrix which was generated by Lorenz chaotic attractor depending on the initial data.The digital encrypted image could be embedded in the original signal wavelet domain in the algorithm.Because the high-dimensional chaotic system structure was more complex and unpredictable, only having the initial value of the matrix could be encrypted, the security of the watermark was protected.As long as the chaotic encryption keys and the initial value were provided, watermark extraction could be completed in watermark detection.The experimental results using a variety of attack methods show that the watermarks are imperceptible and the algorithm is robust.

  12. Research and Implementation of Chaotic Video Encryption based on LAN%基于局域网的混沌视频加密研究与实现

    Institute of Scientific and Technical Information of China (English)

    李黎明; 禹思敏

    2014-01-01

    This paper presents a new method of implementing chaotic video encryption based on embedded system,which transplants the H.264 codec to Cortex-A8 ARM board.The codec is used to compress encrypted video data,which is transported to and decrypted on another ARM board.Result shows that the system transfers encrypted videos quickly and reliably, and meets the requirement of real-time video encryption.%提出了在嵌入式平台上实现混沌视频保密通信的新方式,将基于H.264的视频编解码器移植到Cortex-A8 ARM开发板上,利用H.264编码器对已经混沌加密的视频进行压缩,再通过局域网传输到另一块ARM开发板上进行解码和解密。实验结果证明:该系统不但加密效果好,而且也能快速可靠地传输,满足了实时视频加密通信的要求。

  13. Optical multiple-image encryption based on the chaotic structured phase masks under the illumination of a vortex beam in the gyrator domain.

    Science.gov (United States)

    Liansheng, Sui; Bei, Zhou; Xiaojuan, Ning; Ailing, Tian

    2016-01-11

    A novel multiple-image encryption scheme using the nonlinear iterative phase retrieval algorithm in the gyrator transform domain under the illumination of an optical vortex beam is proposed. In order to increase the randomness, the chaotic structured phase mask based on the logistic map, Fresnel zone plate and radial Hilbert mask is proposed. With the help of two chaotic phase masks, each plain image is encoded into two phase-only masks that are considered as the private keys by using the iterative phase retrieval process in the gyrator domain. Then, the second keys of all plain images are modulated into the ciphertext, which has the stationary white noise distribution. Due to the use of the chaotic structured phase masks, the problem of axis alignment in the optical setup can easily be solved. Two private keys are directly relative to the plain images, which makes that the scheme has high resistance against various potential attacks. Moreover, the use of the vortex beam that can integrates more system parameters as the additional keys into one phase mask can improve the security level of the cryptosystem, which makes the key space enlarged widely. Simulation results are given to verify the feasibility and robustness of the proposed encryption scheme.

  14. Correlation control theory of chaotic laser systems

    International Nuclear Information System (INIS)

    A novel control theory of chaotic systems is studied. The correlation functions are calculated and used as feedback signals of the chaotic lasers. Computer experiments have shown that in this way the chaotic systems can be controlled to have time-independent output when the external control parameters are in chaotic domain. (author)

  15. Optical image encryption based on gyrator transformation and chaotic function%基于回转器变换和混沌的光图像加密

    Institute of Scientific and Technical Information of China (English)

    孔德彭; 杜学文; 孔德辉

    2012-01-01

    提出一种基于混沌理论和回转器的光图像加密技术,它由混沌函数产生的随机相位掩膜对光学系统进行加密和解密.利用三种混沌函数对比研究,它们分别是改进的Logistic映射、Hybrid映射和Baker映射,给出了基于混沌理论与光学系统研究思路和方法,通过盲加密、旋转角度的盲解密来证实其鲁棒性与可靠性,借助计算机进行了模拟,证实了光学加密和解密实施可行性,最后给出了均方差的有效性.%The paper proposed a novel method of optical image encryption based on gyrator transformation and chaos theory. The random phase masks generated by chaotic function is used to encrypt and decrypt the optical system. In this method, the three kinds of chaotic functions are compared and studied. They can improve the Logistic mapping, Hybrid mapping and Baker mapping respectively. It gives research idea and method based on chaos theory and optical system. Its robustness and reliability is proved by blind encryption and the blind decryption of the rotation angle. Through the simulation on computer, the feasibility of the optical encryption and decryption is proved and the validity of the mean square error is given finally.

  16. A Novel Concatenated Chaotic Communication System

    Institute of Scientific and Technical Information of China (English)

    2002-01-01

    A strategy for a novel concatenated chaotic communication system is presented. The transmitter system comprises chaotic turbo encoder and logistic CSK block in a serially concatenated form. Chaotic turbo code is capable of reducing bit error rate (BER) of the chaotic system in the AWGN channel. Through the chaotic turbo encoder, the coded sequence, which has quasi-chaotic properties, will be transmitted into the logistic CSK block. Having a very sensitive dependence on initial conditions of the map, the logistic CSK block can also be taken as the chaotic authentication method. The receiver, which has logistic demodulation block and chaotic decoder, is a linear asymptotic approximation to the inverse of the transmitter system. A chaotic iterative soft-decision decoding algorithm is also developed based on conventional maximum A posteriori decoding algorithm. At last, a two-step authentication method of this chaotic system is also presented.

  17. A new multi-scroll chaotic system

    Institute of Scientific and Technical Information of China (English)

    Wang Fa-Qiang; Liu Chong-Xin

    2006-01-01

    This paper proposes a new simple autonomous chaotic system which can generate multi-scroll chaotic attractors.The characteristic of this new multi-scroll chaotic system is that the 4n + 2m +4-scroll chaotic attractors are generated easily with n and m varying under n ≤ m. Various number of scroll chaotic attractors are illustrated not on ly by computer simulation but also by the realization of an electronic circuit experiment on EWB (Electronics Workbench).

  18. A joint image encryption and watermarking algorithm based on compressive sensing and chaotic map

    Science.gov (United States)

    Xiao, Di; Cai, Hong-Kun; Zheng, Hong-Ying

    2015-06-01

    In this paper, a compressive sensing (CS) and chaotic map-based joint image encryption and watermarking algorithm is proposed. The transform domain coefficients of the original image are scrambled by Arnold map firstly. Then the watermark is adhered to the scrambled data. By compressive sensing, a set of watermarked measurements is obtained as the watermarked cipher image. In this algorithm, watermark embedding and data compression can be performed without knowing the original image; similarly, watermark extraction will not interfere with decryption. Due to the characteristics of CS, this algorithm features compressible cipher image size, flexible watermark capacity, and lossless watermark extraction from the compressed cipher image as well as robustness against packet loss. Simulation results and analyses show that the algorithm achieves good performance in the sense of security, watermark capacity, extraction accuracy, reconstruction, robustness, etc. Project supported by the Open Research Fund of Chongqing Key Laboratory of Emergency Communications, China (Grant No. CQKLEC, 20140504), the National Natural Science Foundation of China (Grant Nos. 61173178, 61302161, and 61472464), and the Fundamental Research Funds for the Central Universities, China (Grant Nos. 106112013CDJZR180005 and 106112014CDJZR185501).

  19. A secure image encryption method based on dynamic harmony search (DHS) combined with chaotic map

    Science.gov (United States)

    Mirzaei Talarposhti, Khadijeh; Khaki Jamei, Mehrzad

    2016-06-01

    In recent years, there has been increasing interest in the security of digital images. This study focuses on the gray scale image encryption using dynamic harmony search (DHS). In this research, first, a chaotic map is used to create cipher images, and then the maximum entropy and minimum correlation coefficient is obtained by applying a harmony search algorithm on them. This process is divided into two steps. In the first step, the diffusion of a plain image using DHS to maximize the entropy as a fitness function will be performed. However, in the second step, a horizontal and vertical permutation will be applied on the best cipher image, which is obtained in the previous step. Additionally, DHS has been used to minimize the correlation coefficient as a fitness function in the second step. The simulation results have shown that by using the proposed method, the maximum entropy and the minimum correlation coefficient, which are approximately 7.9998 and 0.0001, respectively, have been obtained.

  20. Compound Synchronization of Four Chaotic Complex Systems

    Directory of Open Access Journals (Sweden)

    Junwei Sun

    2015-01-01

    Full Text Available The chaotic complex system is designed from the start of the chaotic real system. Dynamical properties of a chaotic complex system in complex space are investigated. In this paper, a compound synchronization scheme is achieved for four chaotic complex systems. According to Lyapunov stability theory and the adaptive control method, four chaotic complex systems are considered and the corresponding controllers are designed to realize the compound synchronization scheme. Four novel design chaotic complex systems are given as an example to verify the validity and feasibility of the proposed control scheme.

  1. Chaotic Synchronzation System and Electrocardiogram

    Institute of Scientific and Technical Information of China (English)

    LiuqingPei; XinlaiDai; 等

    1997-01-01

    A mathematical model of chaotic synchronization of the heart-blood flow coupling dynamics is propsed,which is based on a seven dimension nonlinear dynamical system constructed by three subsystems of the sinoatrial node natural pacemaker,the cardiac relaxation oscillator and the dynamics of blood-fluid in heart chambers.The existence and robustness of the self-chaotic synchronization of the system are demonstrated by both methods of theoretical analysis and numerical simulation.The spectrum of Lyapunov exponent,the Lyapunov dimension and the Kolmogorov entropy are estimated when the system was undergoing the state of self-chaotic synchronization evolution.The time waveform of the dynamical variable,which represents the membrane potential of the cardiac integrative cell,shows a shape which is similar to that of the normal electrocardiogram(ECG) of humans,thus implying that the model possesses physiological significance functionally.

  2. Steganography and encrypting based on immunochemical systems.

    Science.gov (United States)

    Kim, Kyung-Woo; Bocharova, Vera; Halámek, Jan; Oh, Min-Kyu; Katz, Evgeny

    2011-05-01

    Steganography and encrypting were demonstrated with immuno-specific systems. IgG-proteins were used as invisible ink developed with complementary antibodies labeled with enzymes producing color spots. The information security was achieved by mixing the target protein-antigens used for the text encoding with masking proteins of similar composition but having different bioaffinity. Two different texts were simultaneously encoded by using two different encoding proteins in a mixture. Various encrypting techniques were exemplified with the immuno-systems used for the steganography. Future use of the developed approach for information protection and watermark-technology was proposed. Scaling down the encoded text to a micro-size is feasible with the use of nanotechnology.

  3. Chaotic and Arnold stripes in weakly chaotic Hamiltonian systems.

    Science.gov (United States)

    Custódio, M S; Manchein, C; Beims, M W

    2012-06-01

    The dynamics in weakly chaotic Hamiltonian systems strongly depends on initial conditions (ICs) and little can be affirmed about generic behaviors. Using two distinct Hamiltonian systems, namely one particle in an open rectangular billiard and four particles globally coupled on a discrete lattice, we show that in these models, the transition from integrable motion to weak chaos emerges via chaotic stripes as the nonlinear parameter is increased. The stripes represent intervals of initial conditions which generate chaotic trajectories and increase with the nonlinear parameter of the system. In the billiard case, the initial conditions are the injection angles. For higher-dimensional systems and small nonlinearities, the chaotic stripes are the initial condition inside which Arnold diffusion occurs.

  4. Communication Scheme via Cascade Chaotic Systems

    Institute of Scientific and Technical Information of China (English)

    HUA Chang-Chun; GUAN Xin-Ping

    2004-01-01

    @@ A new chaotic communication scheme is constructed. Different from the existing literature, cascade chaotic systems are employed. Two cascade modes are considered. First, we investigate the input to state cascade mode;cascade systems between different kinds of chaotic systems are considered. Then the parameter cascade case of chaotic system is studied. Under the different cases, the corresponding receivers are designed, which can succeed in recovering the former emitted signal. Simulations are performed to verify the validity of the proposed main results.

  5. Observers for a Class of Chaotic Systems

    Institute of Scientific and Technical Information of China (English)

    ZHOU Ping

    2006-01-01

    The design of observers for a class of practical physical chaotic systems is discussed.By using only one state variable and its time derivatives,a control law is constructed to achieve the synchronization between the investigated chaotic systems and their observers,and the results are proved theoretically.Several observers of chaotic systems are designed by using this method.

  6. Advances and applications in chaotic systems

    CERN Document Server

    Volos, Christos

    2016-01-01

    This book reports on the latest advances and applications of chaotic systems. It consists of 25 contributed chapters by experts who are specialized in the various topics addressed in this book. The chapters cover a broad range of topics of chaotic systems such as chaos, hyperchaos, jerk systems, hyperjerk systems, conservative and dissipative systems, circulant chaotic systems, multi-scroll chaotic systems, finance chaotic system, highly chaotic systems, chaos control, chaos synchronization, circuit realization and applications of chaos theory in secure communications, mobile robot, memristors, cellular neural networks, etc. Special importance was given to chapters offering practical solutions, modeling and novel control methods for the recent research problems in chaos theory. This book will serve as a reference book for graduate students and researchers with a basic knowledge of chaos theory and control systems. The resulting design procedures on the chaotic systems are emphasized using MATLAB software.

  7. NES++: number system for encryption based privacy preserving speaker verification

    Science.gov (United States)

    Xu, Lei; Feng, Tao; Zhao, Xi; Shi, Weidong

    2014-05-01

    As speech based operation becomes a main hand-free interaction solution between human and mobile devices (i.e., smartphones, Google Glass), privacy preserving speaker verification receives much attention nowadays. Privacy preserving speaker verification can be achieved through many different ways, such as fuzzy vault and encryption. Encryption based solutions are promising as cryptography is based on solid mathematic foundations and the security properties can be easily analyzed in a well established framework. Most current asymmetric encryption schemes work on finite algebraic structures, such as finite group and finite fields. However, the encryption scheme for privacy preserving speaker verification must handle floating point numbers. This gap must be filled to make the overall scheme practical. In this paper, we propose a number system that meets the requirements of both speaker verification and the encryption scheme used in the process. It also supports addition homomorphic property of Pailliers encryption, which is crucial for privacy preserving speaker verification. As asymmetric encryption is expensive, we propose a method of packing several numbers into one plain-text and the computation overhead is greatly reduced. To evaluate the performance of this method, we implement Pailliers encryption scheme over proposed number system and the packing technique. Our findings show that the proposed solution can fulfill the gap between speaker verification and encryption scheme very well, and the packing technique improves the overall performance. Furthermore, our solution is a building block of encryption based privacy preserving speaker verification, the privacy protection and accuracy rate are not affected.

  8. A new reduced-order observer for the synchronization of nonlinear chaotic systems: An application to secure communications

    Energy Technology Data Exchange (ETDEWEB)

    Castro-Ramírez, Joel, E-mail: ingcastro.7@gmail.com [Universidad Politécnica de Tlaxcala Av. Universidad Politecnica de Tlaxcala No.1, San Pedro Xalcaltzinco, Tepeyanco, Tlaxcala, C.P. 90180 (Mexico); Martínez-Guerra, Rafael, E-mail: rguerra@ctrl.cinvestav.mx [Departamento de Control Automático CINVESTAV-IPN, A.P. 14-740, D.F., México C.P. 07360 (Mexico); Cruz-Victoria, Juan Crescenciano, E-mail: juancrescenciano.cruz@uptlax.edu.mx [Universidad Politécnica de Tlaxcala Av. Universidad Politécnica de Tlaxcala No.1, San Pedro Xalcaltzinco, Tepeyanco, Tlaxcala, C.P. 90180 (Mexico)

    2015-10-15

    This paper deals with the master-slave synchronization scheme for partially known nonlinear chaotic systems, where the unknown dynamics is considered as the master system and we propose the slave system structure which estimates the unknown states. It introduced a new reduced order observer, using the concept of Algebraic Observability; we applied the results to a Sundarapandian chaotic system, and by means of some numerical simulations we show the effectiveness of the suggested approach. Finally, the proposed observer is utilized for encryption, where encryption key is the master system and decryption key is the slave system.

  9. A new reduced-order observer for the synchronization of nonlinear chaotic systems: An application to secure communications

    International Nuclear Information System (INIS)

    This paper deals with the master-slave synchronization scheme for partially known nonlinear chaotic systems, where the unknown dynamics is considered as the master system and we propose the slave system structure which estimates the unknown states. It introduced a new reduced order observer, using the concept of Algebraic Observability; we applied the results to a Sundarapandian chaotic system, and by means of some numerical simulations we show the effectiveness of the suggested approach. Finally, the proposed observer is utilized for encryption, where encryption key is the master system and decryption key is the slave system

  10. Triple Encrypted Holographic Storage and Digital Holographic System

    International Nuclear Information System (INIS)

    We propose a triple encrypted holographic memory containing a digital holographic system. The original image is encrypted using double random phase encryption and stored in a LiNbO3:Fe crystal with shift-multiplexing. Both the reference beams of the memory and the digital holographic system are random phase encoded. We theoretically and experimentally demonstrate the encryption and decryption of multiple images and the results show high quality and good fault tolerance. The total key length of this system is larger than 4.7 × 1033. (fundamental areas of phenomenology (including applications))

  11. Triple Encrypted Holographic Storage and Digital Holographic System

    Institute of Scientific and Technical Information of China (English)

    ZHU Yi-Chao; ZHANG Jia-Sen; GONG Qi-Huang

    2008-01-01

    We propose a triple encrypted holographic memory containing a digital holographic system. The original image is encrypted using double random phase encryption and stored in a LiNbO3:Fe crystal with shift-multiplexing. Both the reference beams of the memory and the digital holographic system are random phase encoded. We theoretically and experimentally demonstrate the encryption and decryption of multiple images and the results show high quality and good fault tolerance. The total key length of this system is larger than 4.7×1033.

  12. Impulsive Synchronization of Discrete Chaotic Systems

    Institute of Scientific and Technical Information of China (English)

    郑永爱; 年漪蓓; 刘曾荣

    2003-01-01

    Impulsive synchronization of two chaotic maps is reformulated as impulsive control of the synchronization error system. We then present a theorem on the asymptotic synchronization of two chaotic maps by using synchronization impulses with varying impulsive intervals. As an example and application of the theorem, we derives some sufficient conditions for the synchronization of two chaotic Lozi maps via impulsive control. The effectiveness of this approach has been demonstrated with chaotic Lozi map.

  13. Design of Image Security System Based on Chaotic Maps Group

    OpenAIRE

    Feng Huang; Xilong Qu

    2011-01-01

    Images are used more and more widely in people’s life today. The image security becomes an important issue. Some encryption technologies are used to ensure the security of images. In them, the SCAN patterns are the one of effective tools to protect image. It generates very large number of scanning patterns of image. Then it shuffles the positions of image pixels by the patterns. The idea of chaotic maps group is similar to SCAN patterns. The paper designs a new image security system bas...

  14. Chaotic Synchronization Theory Video Encryption Technology Research%混沌同步理论视频加密技术研究

    Institute of Scientific and Technical Information of China (English)

    曾凡培

    2012-01-01

    加密技术一直是国内外研究热点问题.本文利用混沌同步理论对视频图像进行加密处理,采用混沌理论中的Logistic映射序列密码加密系统进行加密.实验结果说明了采用该方法能够有效地对视频图像进行加密.%encryption technology has been a research hotspot issues, this paper uses chaotic synchronization theory on video image encryption processing, using chaos theory in the Logistic mapping sequence cipher encryption encryption, the experimental results show the method can effective video image encryption.

  15. Broadcast encryption: paving the road to practical content protection systems

    Science.gov (United States)

    Deen, G.; Ponceleon, D.; Leake, Donald, Jr.

    2009-02-01

    Broadcast encryption is a well established alternative to public key encryption for use in content protection systems. It offers significant performance benefits, as well as useful features such a one-to-many delivery, dynamic membership in the authorized receivers group, and provides anonymous access to content, permitting content protection systems to preserve privacy for consumers. Broadcast encryption has been successfully deployed to users for protection of commercial content on digital media such as flash memory devices and optical media for both standard-definition and high-definition content. In this paper, we present the Advanced Secure Content Cluster Technology which applies broadcast encryption to content protection for home media networks

  16. 基于混沌序列的数字彩色图像加密算法%Encryption Algorithm for Digital Color Image Based on Chaotic Sequences

    Institute of Scientific and Technical Information of China (English)

    何松林

    2011-01-01

    The new encryption algorithm for digital color image is proposed. The image can be encrypted through encryption matrixes generated with Logistic chaotic sequences to exclusive OR(XOR) color matrixes many times. The R, G and B components of the color image can be treated randomly and encrypted image becomes more uniform. Because the chaotic sequences are extremely sensitive to the parameters and the initial values, even ifthe encryption algorithm is open. Without the right key, the useful information can not be got. The encryption key length is effectively enlarged by using multiple sets of parameter of the branch and initial value as the encryption key. The experiments confirm its validity.%提出用Logistic混沌序列产生多个加密矩阵与基色矩阵进行多次异或的方法,对彩色图像的RGB分量进行随机化处理,使加密后的图像均匀.由于混沌序列对参数和初始值的极端敏感性,即使加密算法被公开,没有正确的密钥也无法得到有用信息.因此采用多组分支参数和初始值作为密钥,使密钥长度有效增加.实验结果证明了该算法是有效的.

  17. Signal and reference wave dually encrypted digital holographic system

    Institute of Scientific and Technical Information of China (English)

    ZHU YiChao; ZHANG JiaSen; GONG QiHuang

    2008-01-01

    We propose a secure digital holographic system with signal and reference waves dually encrypted. Two random phase masks are used to encrypt the images in the input and the Fourier planes. The reference beam is phase encoded by another random phase mask. The encrypted image and the key are recorded by a CCD camera. The data can be processed or transferred directly by computer. We theoretically and experimentally demonstrate encryption and decryption of multiple images and the results show a high quality and good fault tolerance.

  18. CifrarFS – Encrypted File System Using FUSE

    Directory of Open Access Journals (Sweden)

    Anagha Kulkarni

    2009-10-01

    Full Text Available This paper describes a file system that enables transparent encryption and decryption of files by using advanced, standard cryptographic algorithm, Data Encryption Standard (DES [1]. Any individual, including super user, or program, that doesn't possess the appropriate passphrase for the directory which contains encrypted files cannot read the encrypted data. Encrypted files can be protected even from those who gain physical possession of the computer on which files reside [2]. ‘CifrarFS’, an encrypted file system using ‘File system in USEr space (FUSE’ maintains all the files in a specific directory in an encrypted form and decrypts them on demand. It encodes the file name while storing but decodes it while viewed from the mount point. We propose an idea of watermark in every encrypted file that is validated before decryption and also log all the operations on ‘CifrarFS’. It is a stackable file system that operates on top of ext3. It does not need root privileges.

  19. Image encryption schemes for joint photographic experts group and graphics interchange format formats based on three-dimensional baker with compound chaotic sequence generator

    Science.gov (United States)

    Ji, Shiyu; Tong, Xiaojun; Zhang, Miao

    2013-01-01

    We propose several methods to transplant the compound chaotic image encryption scheme with permutation based on three-dimensional (3-D) baker onto image formats such as the joint photographic experts group (JPEG) and graphics interchange format (GIF). The new methods avert the discrete cosine transform and quantization, which result in floating point precision loss, and succeed to encrypt and decrypt JPEG images lossless. The ciphered JPEG images generated by our solution own much better randomness than most other existing schemes. Our proposed method for GIF keeps the property of animation successfully. The security test results indicate the proposed methods have high security, and the speed of our algorithm is faster than classical solutions. Since JPEG and GIF image formats are popular contemporarily, we show that the prospect of chaotic image encryption is promising.

  20. Robust synchronization of chaotic systems via feedback

    Energy Technology Data Exchange (ETDEWEB)

    Femat, Ricardo [IPICYT, San Luis Potosi (Mexico). Dept. de Matematicas Aplicadas; Solis-Perales, Gualberto [Universidad de Guadalajara, Centro Univ. de Ciencias Exactas e Ingenierias (Mexico). Div. de Electronica y Computacion

    2008-07-01

    This volume includes the results derived during last ten years about both suppression and synchronization of chaotic -continuous time- systems. Along this time, the concept was to study how the intrinsic properties of dynamical systems can be exploited to suppress and to synchronize the chaotic behaviour and what synchronization phenomena can be found under feedback interconnection. A compilation of these findings is described in this book. This book shows a perspective on synchronization of chaotic systems. (orig.)

  1. Chaotic evolution of the solar system

    Science.gov (United States)

    Sussman, Gerald J.; Wisdom, Jack

    1992-01-01

    The evolution of the entire planetary system has been numerically integrated for a time span of nearly 100 million years. This calculation confirms that the evolution of the solar system as a whole is chaotic, with a time scale of exponential divergence of about 4 million years. Additional numerical experiments indicate that the Jovian planet subsystem is chaotic, although some small variations in the model can yield quasi-periodic motion. The motion of Pluto is independently and robustly chaotic.

  2. The transient ladder synchronization of chaotic systems

    Energy Technology Data Exchange (ETDEWEB)

    Chen, H.-K. [Department of Industrial Engineering and Management, Hsiuping Institute of Technology, No. 11, Gungye Rd., Dali City, Taichung, Taiwan (China)]. E-mail: kanechen@giga.net.tw; Sheu, L.-J. [Department of Mechanical Engineering, Chung Hua University, Hsinchu, Taiwan (China)]. E-mail: ljsheu@chu.edu.tw

    2006-07-03

    A new type for chaotically synchronizing systems, transient ladder chaos synchronization, is proposed in this Letter. For some physical systems, chaotic synchronization is possible in only some of the variables. It is shown that, for the non-synchronizing variable, synchronization up to a constant difference for t{sub 1}=chaotic Froude pendulums. Numerical simulations are shown for demonstration.

  3. Amplitude death in steadily forced chaotic systems

    Institute of Scientific and Technical Information of China (English)

    Feng Guo-Lin; He Wen-Ping

    2007-01-01

    Steady forcing can induce the amplitude death in chaotic systems, which generally exists in coupled dynamic systems. Using the Lorenz system as a typical example, this paper investigates the dynamic behaviours of the chaotic system with steady forcing numerically, and finds that amplitude death can occur as the strength of the steady forcing goes beyond a critical constant.

  4. 基于AAC音频编码与混沌加密的语音加密技术实现%Implementation of voice encryption technology based on AAC audio coding and chaotic encryption

    Institute of Scientific and Technical Information of China (English)

    王先泉

    2012-01-01

    为了减少语音的加密数据量,在此提出一种基于压缩编码和混沌加密的语音加密方案.采用先编码后加密的实现方法,语音编码算法采用AAC低复杂度编码算法,加密算法采用二维猫映射算法,在ARM9硬件平台下的实现结果表明AAC编码压缩比为18:1,猫映射加解密算法执行效率快,解密后无失真,实验结论证实该方案是可行的.在此将音频压缩算法与混沌加密结合起来,在不影响语音音质和加密效果的前提下减少了加密运算的数据量以及最终加密文件的大小,缩短了加解密语音数据所花费的时间,减少了语音保密通信所需要的带宽.%A voice encryption program based on compression encoding and chaotic encryption is proposed in this paper for reducing the voice encryption data size. The implementation method to encode first and then encrypt is used in the progam. AAC low complexity encoding algorithm is adopted in the speech coding algorithm. The two-dimensional cat map algorithm is adopted in the encryption algorithm. The result achieved in ARM9 hardware platform indicates that the AAC encoding ratio of 18:1. the cat map encryption-decryption algorithm has high execution efficiency, and there is no distortion after decryption. The experimental results confirm that the program is feasible. The innovation of this paper is the combination of audio compression algorithm and chaotic encryption. It reduced the data size of encryption operation and the size of final encrypted files, shortened the time spent in encrypting and decrypting the voice data, and narrowed the bandwidth required for voice secure communication on the premise not to affect the voice quality and encryption effect.

  5. Quantum Image Encryption Algorithm Based on Quantum Image XOR Operations

    Science.gov (United States)

    Gong, Li-Hua; He, Xiang-Tao; Cheng, Shan; Hua, Tian-Xiang; Zhou, Nan-Run

    2016-07-01

    A novel encryption algorithm for quantum images based on quantum image XOR operations is designed. The quantum image XOR operations are designed by using the hyper-chaotic sequences generated with the Chen's hyper-chaotic system to control the control-NOT operation, which is used to encode gray-level information. The initial conditions of the Chen's hyper-chaotic system are the keys, which guarantee the security of the proposed quantum image encryption algorithm. Numerical simulations and theoretical analyses demonstrate that the proposed quantum image encryption algorithm has larger key space, higher key sensitivity, stronger resistance of statistical analysis and lower computational complexity than its classical counterparts.

  6. A Novel Bit-level Image Encryption Method Based on Chaotic Map and Dynamic Grouping

    Institute of Scientific and Technical Information of China (English)

    张国基; 沈彦

    2012-01-01

    In this paper,a novel bit-level image encryption method based on dynamic grouping is proposed.In the proposed method,the plain-image is divided into several groups randomly,then permutation-diffusion process on bit level is carried out.The keystream generated by logistic map is related to the plain-image,which confuses the relationship between the plain-image and the cipher-image.The computer simulation results of statistical analysis,information entropy analysis and sensitivity analysis show that the proposed encryption method is secure and reliable enough to be used for communication application.

  7. An image encryption scheme based on the MLNCML system using DNA sequences

    Science.gov (United States)

    Zhang, Ying-Qian; Wang, Xing-Yuan; Liu, Jia; Chi, Ze-Lin

    2016-07-01

    We propose a new image scheme based on the spatiotemporal chaos of the Mixed Linear-Nonlinear Coupled Map Lattices (MLNCML). This spatiotemporal chaotic system has more cryptographic features in dynamics than the system of Coupled Map Lattices (CML). In the proposed scheme, we employ the strategy of DNA computing and one time pad encryption policy, which can enhance the sensitivity to the plaintext and resist differential attack, brute-force attack, statistical attack and plaintext attack. Simulation results and theoretical analysis indicate that the proposed scheme has superior high security.

  8. System for processing an encrypted instruction stream in hardware

    Science.gov (United States)

    Griswold, Richard L.; Nickless, William K.; Conrad, Ryan C.

    2016-04-12

    A system and method of processing an encrypted instruction stream in hardware is disclosed. Main memory stores the encrypted instruction stream and unencrypted data. A central processing unit (CPU) is operatively coupled to the main memory. A decryptor is operatively coupled to the main memory and located within the CPU. The decryptor decrypts the encrypted instruction stream upon receipt of an instruction fetch signal from a CPU core. Unencrypted data is passed through to the CPU core without decryption upon receipt of a data fetch signal.

  9. Extended Logistic Chaotic Sequence and Its Performance Analysis

    Institute of Scientific and Technical Information of China (English)

    ZHANG Xuefeng; FAN Jiulun

    2007-01-01

    In order to improve performance and security of image encryption algorithm effectively based on chaotic sequences, an extended chaotic sequence generating method is presented based on logistic chaotic system using Bernstein form Bezier curve generating algorithm. In order to test the pseudorandom performance of the extended chaotic sequence, we also analyze random performance, autocorrelation performance, and balance performance of the extended chaotic sequence. Simulation results show that the extended chaotic sequence generated using our method is pseudorandom and its correlation performance and balance performance are good. As an application, we apply the extended chaotic sequence in image encryption algorithm, the simulation results show that the performance of the encrypted image using our method is better than that using logistic chaotic sequence.

  10. Synchronization Techniques for Chaotic Communication Systems

    CERN Document Server

    Jovic, Branislav

    2011-01-01

    Since the early 1990s, when synchronization of chaotic communication systems became a popular research subject, a vast number of scientific papers have been published. However, most of today's books on chaotic communication systems deal exclusively with the systems where perfect synchronization is assumed, an assumption which separates theoretical from practical, real world, systems. This book is the first of its kind dealing exclusively with the synchronization techniques for chaotic communication systems. It describes a number of novel robust synchronization techniques, which there is a lack

  11. The study of effects of small perturbations on chaotic systems

    Energy Technology Data Exchange (ETDEWEB)

    Grebogi, C. (Maryland Univ., College Park, MD (USA). Lab. for Plasma Research); Yorke, J.A. (Maryland Univ., College Park, MD (USA). Inst. for Physical Science and Technology)

    1990-12-01

    This report discusses the following topics on small perturbations on chaotic systems: controlling chaos; shadowing and noise reduction; chaotic scattering; random maps; magnetic dynamo; and aids transmission. (LSP)

  12. Inventive Cubic Symmetric Encryption System for Multimedia

    Directory of Open Access Journals (Sweden)

    Ali M Alshahrani

    2015-01-01

    Full Text Available Cryptography is a security technique that must be applied in both communication sides to pro- tect the data during its transmission through the n etwork from all kinds of attack. On the sender side, the original data will be changed into differ ent symbols or shapes by using a known key; this is called encryption. On the other communicati on side, the decryption process will be done and the data will be returned to its former shape b y using the agreed key. The importance of cryptography is to fulfil the communication securit y requirements. Real time applications (RTA are vulnerable for the moment because of their big size. However, some of the current algo- rithms are not really appropriate for use with thes e kinds of information. In this paper, a novel symmetric block cipher cryptography algorithm has b een illustrated and discussed. The system uses an 8x8x8 cube, and each cell contains a pair o f binary inputs. The cube can provide a huge number of combinations that can produce a very stro ng algorithm and a long key size. Due to the lightweight and fast technique used in this ide a, it is expected to be extremely rapid com- pared to the majority of current algorithms, such a s DES and AES.

  13. Digital Image Encryption Algorithm Design Based on Genetic Hyperchaos

    OpenAIRE

    Wang, Jian

    2016-01-01

    In view of the present chaotic image encryption algorithm based on scrambling (diffusion is vulnerable to choosing plaintext (ciphertext) attack in the process of pixel position scrambling), we put forward a image encryption algorithm based on genetic super chaotic system. The algorithm, by introducing clear feedback to the process of scrambling, makes the scrambling effect related to the initial chaos sequence and the clear text itself; it has realized the image features and the organic fusi...

  14. 一种基于混沌加密的 DWT 数字音频水印算法%A Digital Audio Watermarking Algorithm Based on Chaotic Encrypting in DWT

    Institute of Scientific and Technical Information of China (English)

    陈雪松; 李昊天; 贾瑞成; 孙立娜; 卜广龙

    2014-01-01

    An algorithm based on the chaos theory of digital audio watermarking algorithm is proposed .For the security of digital audio watermark, the chaos theory in the high dimensional chaos theory is applied to the watermark encryption .For the first time, we use chaotic sequence to encrypt watermark signal , and the second time , we use high dimension chaotic system to encrypt the encrypted watermark again .In order to improve the robustness of the algorithm , the algorithm was embed the same watermark in-formation repeatedly by the way .The principle of majority was used to enhance the error correction capability of watermark infor -mation when the watermark information was extracted .Simulation results showed that the algorithm is of better robustness and se-curity.%提出一种基于混沌加密的DWT数字音频水印算法。算法从水印的安全性出发,水印信息加密过程引入混沌理论,第一次加密过程利用二维映射对水印信息进行置乱加密,再利用高维混沌系统对得到的第一次加密后的水印进行二次加密。为了提高算法鲁棒性,采用同时嵌入多个同一水印信息的方式,通过少数服从多数的原则来确定提取出的水印信息,进而增强水印信息的纠错能力,提高水印的鲁棒性。仿真实验结果及数据分析表明该算法具有较好的鲁棒性及安全性。

  15. Compression and Encryption of ECG Signal Using Wavelet and Chaotically Huffman Code in Telemedicine Application.

    Science.gov (United States)

    Raeiatibanadkooki, Mahsa; Quchani, Saeed Rahati; KhalilZade, MohammadMahdi; Bahaadinbeigy, Kambiz

    2016-03-01

    In mobile health care monitoring, compression is an essential tool for solving storage and transmission problems. The important issue is able to recover the original signal from the compressed signal. The main purpose of this paper is compressing the ECG signal with no loss of essential data and also encrypting the signal to keep it confidential from everyone, except for physicians. In this paper, mobile processors are used and there is no need for any computers to serve this purpose. After initial preprocessing such as removal of the baseline noise, Gaussian noise, peak detection and determination of heart rate, the ECG signal is compressed. In compression stage, after 3 steps of wavelet transform (db04), thresholding techniques are used. Then, Huffman coding with chaos for compression and encryption of the ECG signal are used. The compression rates of proposed algorithm is 97.72 %. Then, the ECG signals are sent to a telemedicine center to acquire specialist diagnosis by TCP/IP protocol. PMID:26779641

  16. SPECIAL DYNAMIC BEHAVIORS OF A TEMPORAL CHAOTIC SYSTEM

    Institute of Scientific and Technical Information of China (English)

    Mingxuan Zhang; Jinjiang Yu; Wangqiang Han

    2008-01-01

    When dynamic behaviors of temporal chaotic system are analyzed,we find that a temporal chaotic system has not only genetic dynamic behaviors of chaotic reflection,but also has phenomena influencing two chaotic attractors by original values.Along with the system parameters changing to certain value,the system will appear a break in chaotic region,and jump to another orbit of attractors.When it is opposite that the system parameters change direction,the temporal chaotic system appears complicated chaotic behaviors.

  17. Adaptive tracking control of chaotic systems

    Institute of Scientific and Technical Information of China (English)

    卢钊; 卢和

    2004-01-01

    It is important to develop control techniques able to control not only known chaos but also chaotic systems with unknown parameters. This paper proposes a novel adaptive tracking control approach for identifying the unknown parameters and controlling the chaos, which is not closely related to the particular chaotic system to be controlled. The global uniform boundedness of estimated parameters and the asymptotical stability of the tracking errors are proved by Lyapunov stability theory and LaSalle-Yoshizawa theorem. The suggested method enables stabilization of chaotic motion to a steady state ad well as tracking of any desired trajectory to be achieved in a systematic way. Computer simulation on a complex chaotic system illustrtes the effectiveness of the proposed control method.

  18. Dispersion compensation in an open-loop all-optical chaotic communication system

    Institute of Scientific and Technical Information of China (English)

    Liu Hui-Jie; Ren Bin; Feng Jiu-Chao

    2012-01-01

    The optical chaotic communication system using open-loop fiber transmission is studied under strong injection conditions.The optical chaotic communication system with open-loop configuration is studied using fiber transmission under strong injection conditions.The performances of fiber links composed of two types of fiber segments in different dispersion compensation maps are compared by testing the quality of the recovered message with different bit rates and encrypted by chaotic modulation (CM) or chaotic shift keying (CSK).The result indicates that the performance of the pre-compensation map is always worst.Two types of symmetrical maps are identical whatever the encryption method and bit-rate of message are.For the transmitting and the recovering of message of lower bit rate (1 Gb/s),the post-compensation map is the best scheme.However,for the message of higher bit rate (2.5 Gb/s),the parameters in communication system need to be modified properly in order to adapt to the high-speed application.Meanwhile,two types of symmetrical maps are the best scheme.In addition,the CM method is superior to the CSK method for high-speed applications.It is in accordance with the result in a back-to-back configuration system.

  19. The Research of Image Encryption Algorithm Based on Chaos Cellular Automata

    Directory of Open Access Journals (Sweden)

    Shuiping Zhang

    2012-02-01

    Full Text Available The Research presents an image encryption algorithm which bases on chaotic cellular automata. This algorithm makes use of features that extreme sensitivity of chaotic system to initial conditions, the cellular automaton with a high degree of parallel processing. The encryption algorithm uses two-dimensional chaotic system to Encrypt image, Then establish a cellular automaton model on the initial encrypted image. Encryption key of this algorithm is made up of the initial value by the two-dimensional chaotic systems, parameters, two-dimensional cellular automata local evolution rules f and iterations n. Experimental results shows that the algorithm has features that high efficiency, better security, sensitivity to the key and so on.

  20. A chaotic communication system of improved performance based on the Derivative-free nonlinear Kalman filter

    Science.gov (United States)

    Rigatos, Gerasimos

    2016-07-01

    The Derivative-free nonlinear Kalman Filter is used for developing a communication system that is based on a chaotic modulator such as the Duffing system. In the transmitter's side, the source of information undergoes modulation (encryption) in which a chaotic signal generated by the Duffing system is the carrier. The modulated signal is transmitted through a communication channel and at the receiver's side demodulation takes place, after exploiting the estimation provided about the state vector of the chaotic oscillator by the Derivative-free nonlinear Kalman Filter. Evaluation tests confirm that the proposed filtering method has improved performance over the Extended Kalman Filter and reduces significantly the rate of transmission errors. Moreover, it is shown that the proposed Derivative-free nonlinear Kalman Filter can work within a dual Kalman Filtering scheme, for performing simultaneously transmitter-receiver synchronisation and estimation of unknown coefficients of the communication channel.

  1. CHAOTIC CONTROL OF NONLINEAR SYSTEMS BASED ON IMPROVED CORRELATIVITY

    Institute of Scientific and Technical Information of China (English)

    Zhou Xiaoan; Zhang Jihong

    2003-01-01

    Chaotic sequences are basically ergodic random sequences. By improving correlativity of a chaotic signal, the chaotic dynamic system can be controlled to converge to its equilibrium point and, more significantly, to its multi-periodic orbits. Mathematical theory analysis is carried out and some computer simulation results are provided to support such controllability of the chaotic Henon system and the discrete coupled map lattice.

  2. Windtalking Computers: Frequency Normalization, Binary Coding Systems and Encryption

    CERN Document Server

    Zirkind, Givon

    2009-01-01

    The goal of this paper is to discuss the application of known techniques, knowledge and technology in a novel way, to encrypt computer and non-computer data. To-date most computers use base 2 and most encryption systems use ciphering and/or an encryption algorithm, to convert data into a secret message. The method of having the computer "speak another secret language" as used in human military secret communications has never been imitated. The author presents the theory and several possible implementations of a method for computers for secret communications analogous to human beings using a secret language or; speaking multiple languages. The kind of encryption scheme proposed significantly increases the complexity of and the effort needed for, decryption. As every methodology has its drawbacks, so too, the data of the proposed system has its drawbacks. It is not as compressed as base 2 would be. However, this is manageable and acceptable, if the goal is very strong encryption: At least two methods and their ...

  3. An adaptive strategy for controlling chaotic system

    Institute of Scientific and Technical Information of China (English)

    曹一家; 张红先

    2003-01-01

    This paper presents an adaptive strategy for controlling chaotic systems. By employing the phase space reconstruction technique in nonlinear dynamical systems theory, the proposed strategy transforms the nonlinear system into canonical form, and employs a nonlinear observer to estimate the uncertainties and disturbances of the nonlinear system, and then establishes a state-error-like feedback law. The developed control scheme allows chaos control in spite of modeling errors and parametric variations. The effectiveness of the proposed approach has been demonstrated through its applications to two well-known chaotic systems : Duffing oscillator and Rǒssler chaos.

  4. An adaptive strategy for controlling chaotic system

    Institute of Scientific and Technical Information of China (English)

    曹一家; 张红先

    2003-01-01

    This paper presents an adaptive strategy for controlling chaotic systems. By employing the phase space reconstruction technique in nonlinear dynamical systems theory, the proposed strategy transforms the nonlinear system into canonical form, and employs a nonlinear observer to estimate the uncertainties and disturbances of the nonlinear system, and then establishes a state-error-like feedback law. The developed control scheme allows chaos control in spite of modeling errors and parametric variations. The effectiveness of the proposed approach has been demonstrated through its applications to two well-known chaotic systems: Duffing oscillator and Rossler chaos.

  5. Digital color image encoding and decoding using a novel chaotic random generator

    Energy Technology Data Exchange (ETDEWEB)

    Nien, H.H. [Department of Electrical Engineering, Chienkuo Technology University, Changhua 500, Taiwan (China); Huang, C.K. [Department of Electrical Engineering, Chienkuo Technology University, Changhua 500, Taiwan (China)]. E-mail: hcg@cc.ctu.edu.tw; Changchien, S.K. [Department of Electrical Engineering, Chienkuo Technology University, Changhua 500, Taiwan (China); Shieh, H.W. [Department of Electrical Engineering, Chienkuo Technology University, Changhua 500, Taiwan (China); Chen, C.T. [Department of Electrical Engineering, Chienkuo Technology University, Changhua 500, Taiwan (China); Tuan, Y.Y. [Department of Electrical Engineering, Chienkuo Technology University, Changhua 500, Taiwan (China)

    2007-05-15

    This paper proposes a novel chaotic system, in which variables are treated as encryption keys in order to achieve secure transmission of digital color images. Since the dynamic response of chaotic system is highly sensitive to the initial values of a system and to the variation of a parameter, and chaotic trajectory is so unpredictable, we use elements of variables as encryption keys and apply these to computer internet communication of digital color images. As a result, we obtain much higher communication security. We adopt one statistic method involving correlation coefficient {gamma} and FIPS PUB 140-1 to test on the distribution of distinguished elements of variables for continuous-time chaotic system, and accordingly select optimal encryption keys to use in secure communication of digital color images. At the transmitter end, we conduct RGB level decomposition on digital color images, and encrypt them with chaotic keys, and finally transmit them through computer internet. The same encryption keys are used to decrypt and recover the original images at the receiver end. Even if the encrypted images are stolen in the public channel, an intruder is not able to decrypt and recover the original images because of the lack of adequate encryption keys. Empirical example shows that the chaotic system and encryption keys applied in the encryption, transmission, decryption, and recovery of digital color images can achieve higher communication security and best recovered images.

  6. Controlled transitions between cupolets of chaotic systems

    Energy Technology Data Exchange (ETDEWEB)

    Morena, Matthew A., E-mail: matthew.morena@wildcats.unh.edu; Short, Kevin M.; Cooke, Erica E. [Integrated Applied Mathematics Program, University of New Hampshire, Durham, New Hampshire 03824 (United States)

    2014-03-15

    We present an efficient control scheme that stabilizes the unstable periodic orbits of a chaotic system. The resulting orbits are known as cupolets and collectively provide an important skeleton for the dynamical system. Cupolets exhibit the interesting property that a given sequence of controls will uniquely identify a cupolet, regardless of the system's initial state. This makes it possible to transition between cupolets, and thus unstable periodic orbits, simply by switching control sequences. We demonstrate that although these transitions require minimal controls, they may also involve significant chaotic transients unless carefully controlled. As a result, we present an effective technique that relies on Dijkstra's shortest path algorithm from algebraic graph theory to minimize the transients and also to induce certainty into the control of nonlinear systems, effectively providing an efficient algorithm for the steering and targeting of chaotic systems.

  7. Controlled transitions between cupolets of chaotic systems.

    Science.gov (United States)

    Morena, Matthew A; Short, Kevin M; Cooke, Erica E

    2014-03-01

    We present an efficient control scheme that stabilizes the unstable periodic orbits of a chaotic system. The resulting orbits are known as cupolets and collectively provide an important skeleton for the dynamical system. Cupolets exhibit the interesting property that a given sequence of controls will uniquely identify a cupolet, regardless of the system's initial state. This makes it possible to transition between cupolets, and thus unstable periodic orbits, simply by switching control sequences. We demonstrate that although these transitions require minimal controls, they may also involve significant chaotic transients unless carefully controlled. As a result, we present an effective technique that relies on Dijkstra's shortest path algorithm from algebraic graph theory to minimize the transients and also to induce certainty into the control of nonlinear systems, effectively providing an efficient algorithm for the steering and targeting of chaotic systems.

  8. Controlled transitions between cupolets of chaotic systems

    Science.gov (United States)

    Morena, Matthew A.; Short, Kevin M.; Cooke, Erica E.

    2014-03-01

    We present an efficient control scheme that stabilizes the unstable periodic orbits of a chaotic system. The resulting orbits are known as cupolets and collectively provide an important skeleton for the dynamical system. Cupolets exhibit the interesting property that a given sequence of controls will uniquely identify a cupolet, regardless of the system's initial state. This makes it possible to transition between cupolets, and thus unstable periodic orbits, simply by switching control sequences. We demonstrate that although these transitions require minimal controls, they may also involve significant chaotic transients unless carefully controlled. As a result, we present an effective technique that relies on Dijkstra's shortest path algorithm from algebraic graph theory to minimize the transients and also to induce certainty into the control of nonlinear systems, effectively providing an efficient algorithm for the steering and targeting of chaotic systems.

  9. Generalized synchronization of two different chaotic systems

    Institute of Scientific and Technical Information of China (English)

    Li Guo-Hui

    2007-01-01

    In this paper, generalized synchronization of two different chaotic dynamical systems is investigated. An active control is adopted to construct a response system which synchronizes with a given drive system for a function relation.Based on rigorous analysis, the error system is asymptotically stable at the equilibrium. Numerical simulations illustrate the effectiveness of the proposed theory.

  10. Urey Prize Lecture - Chaotic dynamics in the solar system

    Science.gov (United States)

    Wisdom, Jack

    1987-01-01

    Attention is given to solar system cases in which chaotic solutions of Newton's equations are important, as in chaotic rotation and orbital evolution. Hyperion is noted to be tumbling chaotically; chaotic orbital evolution is suggested to be of fundamental importance to an accounting for the Kirkwood gaps in asteroid distribution and for the phase space boundary of the chaotic zone at the 3/1 mean-motion commensurability with Jupiter. In addition, chaotic trajectories in the 2/1 chaotic zone reach very high eccentricities by a route that carries them to high inclinations temporarily.

  11. An Image Encryption Scheme Based on Hyperchaotic Rabinovich and Exponential Chaos Maps

    Directory of Open Access Journals (Sweden)

    Xiaojun Tong

    2015-01-01

    Full Text Available This paper proposes a new four-dimensional hyperchaotic map based on the Rabinovich system to realize chaotic encryption in higher dimension and improve the security. The chaotic sequences generated by Runge-Kutta method are combined with the chaotic sequences generated by an exponential chaos map to generate key sequences. The key sequences are used for image encryption. The security test results indicate that the new hyperchaotic system has high security and complexity. The comparison between the new hyperchaotic system and the several low-dimensional chaotic systems shows that the proposed system performs more efficiently.

  12. Formulation of statistical mechanics for chaotic systems

    Indian Academy of Sciences (India)

    Vishnu M Bannur; Ramesh Babu Thayyullathil

    2009-02-01

    We formulate the statistical mechanics of chaotic system with few degrees of freedom and investigated the quartic oscillator system using microcanonical and canonical ensembles. Results of statistical mechanics are numerically verified by considering the dynamical evolution of quartic oscillator system with two degrees of freedom.

  13. Generalized Synchronization of Diverse Structure Chaotic Systems

    Institute of Scientific and Technical Information of China (English)

    KADIR Abdurahman; WANG Xing-Yuan; ZHAO Yu-Zhang

    2011-01-01

    @@ Generalized synchronization between two diverse structures of chaotic systems possesses significance in the research of synchronization.We propose an approach based on the Lyapunov stability theory to study it.This method can be used widely.Numerical examples are given to demonstrate the effectiveness of this approach.%Generalized synchronization between two diverse structures of chaotic systems possesses significance in the research of synchronization. We propose an approach based on the Lyapunov stability theory to study it. This method can be used widely. Numerical examples are given to demonstrate the effectiveness of this approach.

  14. A method of improving the properties of digital chaotic system

    International Nuclear Information System (INIS)

    To weaken the degradation phenomenon of digital chaotic systems with finite computing precision, the paper brings forward a varying parameter compensation method (VPCM) on the basis of the Lyapunov number. According to the differential mean-value theorem, the proposed method employs the varying parameter and Lyapunov number to improve the properties of digital chaotic systems with finite computing precision. Results of the experiments demonstrate that: the method prolongs the cycle length greatly, the digital chaotic systems achieve ergodicity in finite precision, and the distribution of digital chaotic sequences (DCSs) approximates that of real chaotic sequences (RCSs). This method can be applied to the fields of chaotic cryptography and broad spectrum communications

  15. A Chaotic Attractor in Delayed Memristive System

    Directory of Open Access Journals (Sweden)

    Lidan Wang

    2012-01-01

    Full Text Available Over the last three decades, theoretical design and circuitry implementation of various chaotic generators by simple electronic circuits have been a key subject of nonlinear science. In 2008, the successful development of memristor brings new activity for this research. Memristor is a new nanometre-scale passive circuit element, which possesses memory and nonlinear characteristics. This makes it have a unique charm to attract many researchers’ interests. In this paper, memristor, for the first time, is introduced in a delayed system to design a signal generator to produce chaotic behaviour. By replacing the nonlinear function with memristors in parallel, the memristor oscillator exhibits a chaotic attractor. The simulated results demonstrate that the performance is well predicted by the mathematical analysis and supports the viability of the design.

  16. Chaotic Turing pattern formation in spatiotemporal systems

    Institute of Scientific and Technical Information of China (English)

    XIAO Jing-hua; LI Hai-hong; YANG Jun-zhong; HU Gang

    2006-01-01

    The problem of Turing pattern formation has attracted much attention in nonlinear science as well as physics,chemistry and biology.So far spatially ordered Turing patterns have been observed in stationary and oscillatory media only.In this paper we find that spatially ordered Turing patterns exist in chaotic extended systems.And chaotic Turing patterns are strikingly rich and surprisingly beautiful with their space structures.These findings are in sharp contrast with the intuition of pseudo-randomness of chaos.The richness and beauty of the chaotic Turing patterns are attributed to a large variety of symmetry properties realized by various types of self-organizations of partial chaos synchronizations.

  17. Universal impedance fluctuations in wave chaotic systems.

    Science.gov (United States)

    Hemmady, Sameer; Zheng, Xing; Ott, Edward; Antonsen, Thomas M; Anlage, Steven M

    2005-01-14

    We experimentally investigate theoretical predictions of universal impedance fluctuations in wave chaotic systems using a microwave analog of a quantum chaotic infinite square well potential. We emphasize the use of the radiation impedance to remove the nonuniversal effects of the particular coupling between the outside world and the scatterer. Specific predictions that we test include the probability density functions (PDFs) of the real and imaginary parts of the universal impedance, the equality of the variances of these PDFs, and the dependence of these PDFs on a single loss parameter.

  18. Several types of the chaotic mapping image encryption algorithm%几类混沌映射图像加密算法的比较

    Institute of Scientific and Technical Information of China (English)

    薛香莲

    2015-01-01

    对图像信息安全技术进行了研究,报告了现阶段图像加密的相关现状,分析了基于混沌理论的图像加密的主要方法,提出分别用一维混沌映射Logistic、二维混沌映射2DLogistic以及Chen超混沌映射对图像进行位置和值置乱来实现图像加密,并从实验仿真结果、密钥空间、密钥灵敏性、灰度直方图、置乱程度以及加密时间等方面来比较以上三种混沌理论作用于图像加密中的各自优缺点。%Studied the image information security technology,the report related to the status quo of the current image encryption,analyzed the main method of image encryption based on chaos theory,put forward respectively in one-dimensional chaotic map Logistic,2 dlogistic two-dimensional chaos mapping and hyperchaos mapping for the position and value of Chen to behave in such a way to realize image encryption, and from the experimental simulation results,the key space,key sensitivity,gray histogram,scrambling degree and the encryption time and so on to compare the above three kinds of chaos theory applied to image encryption in the respective advantages and disadvantages.

  19. A Design of Observers for a Discrete Chaotic System

    Institute of Scientific and Technical Information of China (English)

    2001-01-01

    It is very easy to design an observer for a discrete chaotic system which possesses one non-linear scalar quantity, and one can realize the synchronization between the investigated chaotic system and its observer easily. This method is applied to two chaotic systems.

  20. Robust synchronization of uncertain chaotic systems

    Institute of Scientific and Technical Information of China (English)

    Li Fang; Hu Ai-Hua; Xu Zheng-Yuan

    2006-01-01

    This paper investigates robust unified (lag, anticipated, and complete) synchronization of two coupled chaotic systems. By introducing the concepts of positive definite symmetrical matrix and Riccati inequality and the theory of robust stability, several criteria on robust synchronization are established. Extensive numerical simulations are also used to confirm the results.

  1. Controlling projective synchronization in coupled chaotic systems

    Institute of Scientific and Technical Information of China (English)

    Zou Yan-Li; Zhu Jie

    2006-01-01

    In this paper, a new method for controlling projective synchronization in coupled chaotic systems is presented.The control method is based on a partially linear decomposition and negative feedback of state errors. Firstly, the synchronizability of the proposed projective synchronization control method is proved mathematically. Then, three different representative examples are discussed to verify the correctness and effectiveness of the proposed control method.

  2. Projective synchronization of chaotic systems with bidirectional nonlinear coupling

    Indian Academy of Sciences (India)

    Mohammada Ali Khan; Swarup Poria

    2013-09-01

    This paper presents a new scheme for constructing bidirectional nonlinear coupled chaotic systems which synchronize projectively. Conditions necessary for projective synchronization (PS) of two bidirectionally coupled chaotic systems are derived using Lyapunov stability theory. The proposed PS scheme is discussed by taking as examples the so-called unified chaotic model, the Lorenz–Stenflo system and the nonautonomous chaotic Van der Pol oscillator. Numerical simulation results are presented to show the efficiency of the proposed synchronization scheme.

  3. SWITCHING CONTROL:FROM SIMPLE RULES TO COMPLEX CHAOTIC SYSTEMS

    Institute of Scientific and Technical Information of China (English)

    L(U) Jinhu

    2003-01-01

    This paper reviews and introduces some simple switching piecewise-linear controllers, which can generate complex chaotic behaviors from simple switching systems. The mechanism of simple switching rules creating complex chaotic behaviors is further investigated.

  4. Complexity and synchronization in stochastic chaotic systems

    Science.gov (United States)

    Son Dang, Thai; Palit, Sanjay Kumar; Mukherjee, Sayan; Hoang, Thang Manh; Banerjee, Santo

    2016-02-01

    We investigate the complexity of a hyperchaotic dynamical system perturbed by noise and various nonlinear speech and music signals. The complexity is measured by the weighted recurrence entropy of the hyperchaotic and stochastic systems. The synchronization phenomenon between two stochastic systems with complex coupling is also investigated. These criteria are tested on chaotic and perturbed systems by mean conditional recurrence and normalized synchronization error. Numerical results including surface plots, normalized synchronization errors, complexity variations etc show the effectiveness of the proposed analysis.

  5. Parameter identification of time-delay chaotic system using chaotic ant swarm

    International Nuclear Information System (INIS)

    The identification problem of delay time as well as parameters of time-delay chaotic system is investigated in this paper. The identification problem is converted to that of parameter optimization by constructing suitable fitness function. A novel optimization method, called CAS (chaotic ant swarm), which simulates the chaotic behavior of single ant and the self-organization behavior of ant colony, is used to solve this optimization problem. Illustrative example demonstrates the effectiveness of the proposed method.

  6. CHAOTIC CONTROL OF NONLINEAR SYSTEMS BASED ON IMPROVED CORRELATIVITY

    Institute of Scientific and Technical Information of China (English)

    ZhouZiaoan; ZhangJihong

    2003-01-01

    Chaotic sequences are basically ergodic random esquences.By improving correlativity of a chaotic signal,the chaotic dynamic system can be controlled to converge to its equilibrium point and,more significantly,to its multi-periodic orbits.Mathematical theory analysis is carried out and some computer simulation results are provided to support such controllability of the chaotic Henon system and the discrete coupled map lattice.

  7. Cascade adaptive control of uncertain unified chaotic systems

    Institute of Scientific and Technical Information of China (English)

    Wei Wei; Li Dong-Hai; Wang Jing

    2011-01-01

    The chaos control of uncertain unified chaotic systems is considered. Cascade adaptive control approach with only one control input is presented to stabilize states of the uncertain unified chaotic system at the zero equilibrium point.Since an adaptive controller based on dynamic compensation mechanism is employed, the exact model of the unified chaotic system is not necessarily required.By choosing appropriate controller parameters, chaotic phenomenon can be suppressed and the response speed is tunable. Sufficient condition for the asymptotic stability of the approach is derived. Numerical simulation results confirm that the cascade adaptive control approach with only one control signal is valid in chaos control of uncertain unified chaotic systems.

  8. Frequency-Locking in Coupled Chaotic Systems

    Institute of Scientific and Technical Information of China (English)

    HU Bam-Bi; LIU Zong-Hua; ZHENG Zhi-Gang

    2001-01-01

    A novel approach is presented for measuring the phase synchronization (frequency-locking) of coupled N nonidentical oscillators, which can characterize frequency-locking for chaotic systems without well-defined phase by measuring the mean frequency. Numerical simulations confirm the existence of frequency-locking. The relations between the mean frequency and the coupling strength and the frequency mismatch are given. For the coupled hyperchaotic systems, the frequency-locking can be better characterized by more than one mean frequency curves.

  9. New robust chaotic system with exponential quadratic term

    Institute of Scientific and Technical Information of China (English)

    Bao Bo-Cheng; Li Chun-Biao; Xu Jian-Peing; Liu Zhong

    2008-01-01

    This paper proposes a new robust chaotic system of three-dimensional quadratic autonomous ordinary differential equations by introducing an exponential quadratic term.This system can display a double-scroll chaotic attractor with only two equilibria,and can be found to be robust chaotic in a very wide parameter domain with positive maximum Lyapunov exponent.Some basic dynamical properties and chaotic behaviour of novel attractor are studied.By numerical simulation,this paper verifies that the three-dimensional system can also evolve into periodic and chaotic behaviottrs by a constant controller.

  10. Novel implementation of memristive systems for data encryption and obfuscation

    Science.gov (United States)

    Du, Nan; Manjunath, Niveditha; Shuai, Yao; Bürger, Danilo; Skorupa, Ilona; Schüffny, René; Mayr, Christian; Basov, Dimitri N.; Di Ventra, Massimiliano; Schmidt, Oliver G.; Schmidt, Heidemarie

    2014-03-01

    With the rise of big data handling, new solutions are required to drive cryptographic algorithms for maintaining data security. Here, we exploit the nonvolatile, nonlinear resistance change in BiFeO3 memristors [Shuai et al., J. Appl. Phys. 109, 124117 (2011)] by applying a voltage for the generation of second and higher harmonics and develop a new memristor-based encoding system from it to encrypt and obfuscate data. It is found that a BiFeO3 memristor in high and low resistance state can be used to generate two clearly distinguishable sets of second and higher harmonics as recently predicted theoretically [Cohen et al., Appl. Phys. Lett. 100, 133109 (2012)]. The computed autocorrelation of encrypted data using higher harmonics generated by a BiFeO3 memristor shows that the encoded data distribute randomly.

  11. Hardware Realization of Chaos Based Symmetric Image Encryption

    KAUST Repository

    Barakat, Mohamed L.

    2012-06-01

    This thesis presents a novel work on hardware realization of symmetric image encryption utilizing chaos based continuous systems as pseudo random number generators. Digital implementation of chaotic systems results in serious degradations in the dynamics of the system. Such defects are illuminated through a new technique of generalized post proceeding with very low hardware cost. The thesis further discusses two encryption algorithms designed and implemented as a block cipher and a stream cipher. The security of both systems is thoroughly analyzed and the performance is compared with other reported systems showing a superior results. Both systems are realized on Xilinx Vetrix-4 FPGA with a hardware and throughput performance surpassing known encryption systems.

  12. Entanglement production in quantized chaotic systems

    Indian Academy of Sciences (India)

    Jayendra N Bandyopadhyay; Arul Lakshminarayan

    2005-04-01

    Quantum chaos is a subject whose major goal is to identify and to investigate different quantum signatures of classical chaos. Here we study entanglement production in coupled chaotic systems as a possible quantum indicator of classical chaos. We use coupled kicked tops as a model for our extensive numerical studies. We find that, in general, chaos in the system produces more entanglement. However, coupling strength between two subsystems is also a very important parameter for entanglement production. Here we show how chaos can lead to large entanglement which is universal and describable by random matrix theory (RMT). We also explain entanglement production in coupled strongly chaotic systems by deriving a formula based on RMT. This formula is valid for arbitrary coupling strengths, as well as for sufficiently long time. Here we investigate also the effect of chaos on the entanglement production for the mixed initial state. We find that many properties of the mixed-state entanglement production are qualitatively similar to the pure state entanglement production. We however still lack an analytical understanding of the mixed-state entanglement production in chaotic systems.

  13. Resonance eigenfunctions in chaotic scattering systems

    Indian Academy of Sciences (India)

    Martin Sieber

    2009-09-01

    We study the semiclassical structure of resonance eigenstates of open chaotic systems. We obtain semiclassical estimates for the weight of these states on different regions in phase space. These results imply that the long-lived right (left) eigenstates of the non-unitary propagator are concentrated in the semiclassical limit ħ → 0 on the backward (forward) trapped set of the classical dynamics. On this support the eigenstates display a self-similar behaviour which depends on the limiting decay rate.

  14. NEW SYMMETRIC ENCRYPTION SYSTEM BASED ON EVOLUTIONARY ALGORITHM

    Directory of Open Access Journals (Sweden)

    A. Mouloudi

    2015-12-01

    Full Text Available In this article, we present a new symmetric encryption system which is a combination of our ciphering evolutionary system SEC [1] and a new ciphering method called “fragmentation”. This latter allows the alteration of the appearance frequencies of characters from a given text. Our system has at its disposed two keys, the first one is generated by the evolutionary algorithm, the second one is generated after “fragmentation” part. Both of them are symmetric, session keys and strengthening the security of our system.

  15. ON IMAGE ENCRYPTION ALGORITHM BASED ON DISCRETE FOURIER TRANSFORMATION INTEGRATING WITH DOUBLING CHAOTIC MAP%基于离散傅里叶变换融合双混沌映射的图像加密算法研究

    Institute of Scientific and Technical Information of China (English)

    芮坤坤

    2014-01-01

    频域加密非常适用于大多数数字和光学图像处理体系,而空间域加密则适用于图像通信。为了充分利用在图像频率域和空间域加密的优势,进一步提高图像加密系统的安全性,提出基于离散的傅里叶变换和双混沌映射的图像加密算法,同时对图像的频率域和空间域进行加密。首先,利用二维离散的傅里叶变换将图像从空间域转换成频率域,并用改进的分段Tent映射分别对幅值和位相进行置乱处理;其次,将置乱后图像频率域进行傅里叶逆变换,转换成空间域,获得置乱加密图像;最后,利用改进的Ber-noulli移位映射对置乱加密图像进行扩散处理。在MATLAB仿真平台上,实验结果表明:该算法高度安全,密钥空间大,有较强的密钥敏感性能,有效地提高了抵御选择明文攻击的能力。%Frequency domain encryption very fits most of digital and optical image processing systems,while spatial domain encryption is applicable for image communications.In order to make full use of image encryption advantages in both frequency domain and spatial domain and further improve the security of image encryption system,we propose an image encryption algorithm which is based on discrete Fourier transformation and doubling chaotic map to encrypt frequency and spatial domains of image simultaneously.Firstly,the two-dimensional discrete Fourier transformation is committed to convert the image from the spatial domain to frequency domain,and the improved subsection Tent map is used to scramble the amplitude and phase of the frequency domain respectively;Secondly,the frequency domain of scrambled image is transformed into spatial domain with Fourier inverse transformation to get scrambling encryption image;Finally,the improved Bernoulli displacement map is applied to the scrambling encryption image for diffusion processing.The proposed algorithm is tested on MATLAB simulation platform

  16. Control uncertain continuous-time chaotic dynamical system

    Institute of Scientific and Technical Information of China (English)

    齐冬莲; 赵光宙

    2003-01-01

    The new chaos control method presented in this paper is useful for taking advantage of chaos. Based on sliding mode control theory, this paper provides a switching manifold controlling strategy of chaotic system, and also gives a kind of adaptive parameters estimated method to estimate the unknown systems' parameters by which chaotic dynamical system can be synchronized. Taking the Lorenz system as example, and with the help of this controlling strategy, we can synchronize chaotic systems with unknown parameters and different initial conditions.

  17. Chaotic attractor transforming control of hybrid Lorenz-Chen system

    Institute of Scientific and Technical Information of China (English)

    Qi Dong-Lian; Wang Qiao; Gu Hong

    2008-01-01

    Based on passive theory, this paper studies a hybrid chaotic dynamical system from the mathematics perspective to implement the control of system stabilization.According to the Jacobian matrix of the nonlinear system, the stabilization control region is gotten.The controller is designed to stabilize fast the minimum phase Lorenz-Chen chaotic system after equivalently transforming from chaotic system to passive system. The simulation results show that the system not only can be controlled at the different equilibria, but also can be transformed between the different chaotic attractors.

  18. Universal and nonuniversal properties of wave-chaotic scattering systems.

    Science.gov (United States)

    Yeh, Jen-Hao; Hart, James A; Bradshaw, Elliott; Antonsen, Thomas M; Ott, Edward; Anlage, Steven M

    2010-02-01

    Prediction of the statistics of scattering in typical wave-chaotic systems requires combining system-specific information with universal aspects of chaotic scattering as described by random matrix theory. This Rapid Communication shows that the average impedance matrix, which characterizes such system-specific properties, can be semiclassically calculated in terms of ray trajectories between ports. Theoretical predictions are compared with experimental results for a microwave billiard, demonstrating that the theory successfully uncovered universal statistics of wave-chaotic scattering systems.

  19. A novel image encryption scheme based on spatial chaos map

    Energy Technology Data Exchange (ETDEWEB)

    Sun Fuyan [College of Control Science and Engineering, Shandong University, Jinan 250061 (China)], E-mail: fuyan.sun@gmail.com; Liu Shutang [College of Control Science and Engineering, Shandong University, Jinan 250061 (China); Li Zhongqin [HeiLongJiang Institute of Science and Technology, Harbin 150027 (China); Lue Zongwang [Information and Communication College, Guilin University of Electronic and Technology, Guilin 541004 (China); Corporate Engineering Department, Johnson Electric Co. Ltd., Shenzhen 518125 (China)

    2008-11-15

    In recent years, the chaos-based cryptographic algorithms have suggested some new and efficient ways to develop secure image encryption techniques, but the drawbacks of small key space and weak security in one-dimensional chaotic cryptosystems are obvious. In this paper, spatial chaos system are used for high degree security image encryption while its speed is acceptable. The proposed algorithm is described in detail. The basic idea is to encrypt the image in space with spatial chaos map pixel by pixel, and then the pixels are confused in multiple directions of space. Using this method one cycle, the image becomes indistinguishable in space due to inherent properties of spatial chaotic systems. Several experimental results, key sensitivity tests, key space analysis, and statistical analysis show that the approach for image cryptosystems provides an efficient and secure way for real time image encryption and transmission from the cryptographic viewpoint.

  20. A novel image encryption scheme based on spatial chaos map

    International Nuclear Information System (INIS)

    In recent years, the chaos-based cryptographic algorithms have suggested some new and efficient ways to develop secure image encryption techniques, but the drawbacks of small key space and weak security in one-dimensional chaotic cryptosystems are obvious. In this paper, spatial chaos system are used for high degree security image encryption while its speed is acceptable. The proposed algorithm is described in detail. The basic idea is to encrypt the image in space with spatial chaos map pixel by pixel, and then the pixels are confused in multiple directions of space. Using this method one cycle, the image becomes indistinguishable in space due to inherent properties of spatial chaotic systems. Several experimental results, key sensitivity tests, key space analysis, and statistical analysis show that the approach for image cryptosystems provides an efficient and secure way for real time image encryption and transmission from the cryptographic viewpoint

  1. Optical image encryption topology.

    Science.gov (United States)

    Yong-Liang, Xiao; Xin, Zhou; Qiong-Hua, Wang; Sheng, Yuan; Yao-Yao, Chen

    2009-10-15

    Optical image encryption topology is proposed based on the principle of random-phase encoding. Various encryption topological units, involving peer-to-peer, ring, star, and tree topologies, can be realized by an optical 6f system. These topological units can be interconnected to constitute an optical image encryption network. The encryption and decryption can be performed in both digital and optical methods.

  2. Color Digital Image Encryption Using Wavelet Transform and Chaotic Sequence%彩色数字图像的小波变换和混沌序列加密

    Institute of Scientific and Technical Information of China (English)

    张定会; 许赛赛; 余日; 张建伟

    2011-01-01

    根据彩色数字图像的基本特点,运用数字图像加密和解密原理,将离散小波变换和离散混沌序列有机地结合起来,研究了彩色数字图像的小波变换和混沌序列的加密和解密方法;对原始图像进行加密实质是利用混沌序列对其低频小波系数进行加密,对加密图像进行解密实质是利用混沌序列对其低频小波系数进行解密}研究的彩色数字图像加解密方法,为彩色数字图像加密提供了一种有效可行的方法,不仅能够使加密彩色数字图像具有理想的加密效果,而且能够保证加密彩色数字图像足够的安全.%According to the basic characteristic of color digital image, using the encrypting and decrypting theorem of digital image, organically combining discrete wavelet transform with discrete chaotic sequence, the encryption and decryption of color digital image based on wavelet transform and chaotic sequence has been studied. The encryption of original images is to use chaotic sequences to encrypt its low frequency wavelet coefficients. The decryption of encrypted images is to use chaotic sequences to decrypt its low frequency wavelet coefficients. The encryption and decryption of color digital image studied by this paper provides an effective and feasibJe method for color digital image encryption, and not only can make the encrypted color digital image have perfect encryption effect, but also can ensure its sufficient security.

  3. Performance Analysis of Hash Encrypted DWT-OFDM and Hash Encrypted FFT-OFDM Systems

    Directory of Open Access Journals (Sweden)

    N.R.Raajan

    2013-04-01

    Full Text Available Orthogonal Frequency Division Multiplexing (OFDM, in the recent past is being preferably used in wireless communication because of its high data rate and its unique property of the transmitted symbols being mathematically orthogonal. This mathematical orthogonality allows signals with different frequencies to propagate in the same subcarrier unlike traditional Frequency Division Multiplexing Technique (FDM where each piece of information is propagated with a single carrier which saves the additional guard period there by giving robustness to the system from impairments due to frequencyfading caused by multipath propagation and Inter Symbol Interference(ISI. Through this paper it was inferred that adding security and authenticity(encryption followed cons though there were considerable amount of pros. Secured Hash Algorithm(SHA 1 conceals the data by furnishing an unrecognizable distinct hundred and sixty bits digest. This gave rise to reliable protection but eventuated increased Bit Error Rate(BER . The 160 bits hash sequences contributes to larger bit error rate emanating from the fact that greater number of bits results in greater probability of BER.

  4. Tracking control of chaotic dynamical systems with feedback linearization

    Institute of Scientific and Technical Information of China (English)

    QI Dong-lian; MA Guo-jin

    2005-01-01

    A new method was proposed for tracking the desired output of chaotic dynamical system using the feedback linearization and nonlinear extended statement observer method. The feedback linearization was used to convert the nonlinear chaotic system into linear system. The extended Luenberger-like statements observer was designed to reconstructing and observing the unmeasured statements when the tracking controller was designed. By this way, the chaotic system could be forced to track variable desired output, which could be a time variant function or an equilibrium points.Taken the Lorenz chaotic system as example, the simulation results show the validity of the conclusion and effectiveness of the algorithm.

  5. Design of a Web Interface for Fractional Chaotic Systems

    Directory of Open Access Journals (Sweden)

    Sezgin Kaçar

    2014-12-01

    Full Text Available There exists a great number of work related to chaotic systems investigated by many researchers, especially about Lorenz chaotic system. If the order of differentiation of variables are fractional, the systems are called fractional chaotic systems. In this work a web-based interface is designed for fractional composition of five different chaotic systems. The interface takes initial and fractional differentiation values and yields output signals and phase portraits. The paper first introduces design tools and then provides results obtained throughout the experiments.

  6. Targeting engineering synchronization in chaotic systems

    Science.gov (United States)

    Bhowmick, Sourav K.; Ghosh, Dibakar

    2016-07-01

    A method of targeting engineering synchronization states in two identical and mismatch chaotic systems is explained in detail. The method is proposed using linear feedback controller coupling for engineering synchronization such as mixed synchronization, linear and nonlinear generalized synchronization and targeting fixed point. The general form of coupling design to target any desire synchronization state under unidirectional coupling with the help of Lyapunov function stability theory is derived analytically. A scaling factor is introduced in the coupling definition to smooth control without any loss of synchrony. Numerical results are done on two mismatch Lorenz systems and two identical Sprott oscillators.

  7. ON FEEDBACK CONTROL OF DELAYED CHAOTIC SYSTEM

    Institute of Scientific and Technical Information of China (English)

    李丽香; 彭海朋; 卢辉斌; 关新平

    2001-01-01

    In this paper two different types of feedback control technique are discussed: the standard feedback control and the time-delay feedback control which have been successfully used in many control systems. In order to understand to what extent the two different types of control technique are useful in delayed chaotic systems, some analytic stabilization conditions for chaos control from the two types of control technique are derived based on Lyapunov stabilization arguments. Similarly, we discuss the tracking problem by applying the time-delay feedback control. Finally, numerical examples are provided.

  8. Circuit realization of the fractional-order unified chaotic system

    Institute of Scientific and Technical Information of China (English)

    Chen Xiang-Rong; Liu Chong-Xin; Wang Fa-Qiang

    2008-01-01

    This paper studies the chaotic behaviours of the fractional-order unified chaotic system.Based on the approximation method in frequency domain,it proposes an electronic circuit model of tree shape to realize the fractional-order operator.According to the tree shape model,an electronic circuit is designed to realize the 2.7-order unified chaotic system.Numerical simulations and circuit experiments have verified the existence of chaos in the fraction-order unified system.

  9. Artificial Cooperative Search algorithm for parameter identification of chaotic systems

    OpenAIRE

    Turgut, Oguz Emrah; Turgut, Mert Sinan; Çoban, Mustafa Turhan

    2015-01-01

     Parameter estimation of chaotic systems is a challenging and critical topic in nonlinear science. Problem at hand is multi-dimensional and highly nonlinear thereof conventional optimization methods generally fail to extract the unknown parameters of chaotic system. In this study, Artificial Cooperative Search algorithm is put into practice for successful parameter estimation of chaotic systems and compared the parameter estimation performance of Artificial Cooperative Search with Bat, Artifi...

  10. Adaptive generalized functional synchronization of Chaotic systems with unknown parameters

    Institute of Scientific and Technical Information of China (English)

    Wang Dong-Feng; Han Pu

    2008-01-01

    A universal adaptive generalized functional synchronization approach to any two different or identical chaotic systems with unknown parameters is proposed,based on a unified mathematical expression of a large class of chaotic system.Self-adaptive parameter law and control law are given in the form of a theorem.The synchronization between the three-dimensional R(o)ssler chaotic system and the four-dimensional Chen's hyper-chaotic system is studied as an example for illustration.The computer simulation results demonstrate the feasibility of the method proposed.

  11. Projective Synchronization in Time-Delayed Chaotic Systems

    Institute of Scientific and Technical Information of China (English)

    FENG Cun-Fang; ZHANG Yan; WANG Ying-Hai

    2006-01-01

    For the first time, we report on projective synchronization between two time delay chaotic systems with single time delays. It overcomes some limitations of the previous wort, where projective synchronization has been investigated only in finite-dimensional chaotic systems, so we can achieve projective synchronization in infinite-dimensional chaotic systems. We give a general method with which we can achieve projective synchronization in time-delayed chaotic systems. The method is illustrated using the famous delay-differential equations related to optical bistability. Numerical simulations fully support the analytical approach.

  12. Chaotic Synchronization of the Master Slave Chaotic Systems with Different Structures Based on BANG-BANG Control Principle

    Institute of Scientific and Technical Information of China (English)

    WANG Jian-Gen; ZHAO Yi

    2005-01-01

    @@ We propose a Bang-Bang control scheme that can synchronize master-slave chaotic systems. The chaotic systems considered here are structurally different from each other. Different from some control strategies reported previously, the scheme proposed here can be taken as a generalone that is independent of the chaotic system itself.

  13. Random digital encryption secure communication system

    Science.gov (United States)

    Doland, G. D. (Inventor)

    1982-01-01

    The design of a secure communication system is described. A product code, formed from two pseudorandom sequences of digital bits, is used to encipher or scramble data prior to transmission. The two pseudorandom sequences are periodically changed at intervals before they have had time to repeat. One of the two sequences is transmitted continuously with the scrambled data for synchronization. In the receiver portion of the system, the incoming signal is compared with one of two locally generated pseudorandom sequences until correspondence between the sequences is obtained. At this time, the two locally generated sequences are formed into a product code which deciphers the data from the incoming signal. Provision is made to ensure synchronization of the transmitting and receiving portions of the system.

  14. Linear generalized synchronization of continuous-time chaotic systems

    International Nuclear Information System (INIS)

    This paper develops a general approach for constructing a response system to implement linear generalized synchronization (GS) with the drive continuous-time chaotic system. Some sufficient conditions of global asymptotic linear GS between the drive and response continuous-time chaotic systems are attained from rigorously modern control theory. Finally, we take Chua's circuit as an example for illustration and verification

  15. Linear generalized synchronization of continuous-time chaotic systems

    CERN Document Server

    Lu Jun

    2003-01-01

    This paper develops a general approach for constructing a response system to implement linear generalized synchronization (GS) with the drive continuous-time chaotic system. Some sufficient conditions of global asymptotic linear GS between the drive and response continuous-time chaotic systems are attained from rigorously modern control theory. Finally, we take Chua's circuit as an example for illustration and verification.

  16. Adaptive Synchronization of Memristor-based Chaotic Neural Systems

    Directory of Open Access Journals (Sweden)

    Xiaofang Hu

    2014-11-01

    Full Text Available Chaotic neural networks consisting of a great number of chaotic neurons are able to reproduce the rich dynamics observed in biological nervous systems. In recent years, the memristor has attracted much interest in the efficient implementation of artificial synapses and neurons. This work addresses adaptive synchronization of a class of memristor-based neural chaotic systems using a novel adaptive backstepping approach. A systematic design procedure is presented. Simulation results have demonstrated the effectiveness of the proposed adaptive synchronization method and its potential in practical application of memristive chaotic oscillators in secure communication.

  17. Synchronization between integer-order chaotic systems and a class of fractional-order chaotic systems via sliding mode control.

    Science.gov (United States)

    Chen, Diyi; Zhang, Runfan; Sprott, J C; Chen, Haitao; Ma, Xiaoyi

    2012-06-01

    In this paper, we focus on the synchronization between integer-order chaotic systems and a class of fractional-order chaotic system using the stability theory of fractional-order systems. A new sliding mode method is proposed to accomplish this end for different initial conditions and number of dimensions. More importantly, the vector controller is one-dimensional less than the system. Furthermore, three examples are presented to illustrate the effectiveness of the proposed scheme, which are the synchronization between a fractional-order Chen chaotic system and an integer-order T chaotic system, the synchronization between a fractional-order hyperchaotic system based on Chen's system and an integer-order hyperchaotic system, and the synchronization between a fractional-order hyperchaotic system based on Chen's system and an integer-order Lorenz chaotic system. Finally, numerical results are presented and are in agreement with theoretical analysis.

  18. On closure parameter estimation in chaotic systems

    Directory of Open Access Journals (Sweden)

    J. Hakkarainen

    2012-02-01

    Full Text Available Many dynamical models, such as numerical weather prediction and climate models, contain so called closure parameters. These parameters usually appear in physical parameterizations of sub-grid scale processes, and they act as "tuning handles" of the models. Currently, the values of these parameters are specified mostly manually, but the increasing complexity of the models calls for more algorithmic ways to perform the tuning. Traditionally, parameters of dynamical systems are estimated by directly comparing the model simulations to observed data using, for instance, a least squares approach. However, if the models are chaotic, the classical approach can be ineffective, since small errors in the initial conditions can lead to large, unpredictable deviations from the observations. In this paper, we study numerical methods available for estimating closure parameters in chaotic models. We discuss three techniques: off-line likelihood calculations using filtering methods, the state augmentation method, and the approach that utilizes summary statistics from long model simulations. The properties of the methods are studied using a modified version of the Lorenz 95 system, where the effect of fast variables are described using a simple parameterization.

  19. Modified Projective Synchronization between Different Fractional-Order Systems Based on Open-Plus-Closed-Loop Control and Its Application in Image Encryption

    Directory of Open Access Journals (Sweden)

    Hongjuan Liu

    2014-01-01

    Full Text Available A new general and systematic coupling scheme is developed to achieve the modified projective synchronization (MPS of different fractional-order systems under parameter mismatch via the Open-Plus-Closed-Loop (OPCL control. Based on the stability theorem of linear fractional-order systems, some sufficient conditions for MPS are proposed. Two groups of numerical simulations on the incommensurate fraction-order system and commensurate fraction-order system are presented to justify the theoretical analysis. Due to the unpredictability of the scale factors and the use of fractional-order systems, the chaotic data from the MPS is selected to encrypt a plain image to obtain higher security. Simulation results show that our method is efficient with a large key space, high sensitivity to encryption keys, resistance to attack of differential attacks, and statistical analysis.

  20. Measuring-Basis Encrypted Quantum Key Distribution with Four-State Systems

    Institute of Scientific and Technical Information of China (English)

    CHEN Pan; LI Yan-Song; DENG Fu-Guo; LONG Gui-Lu

    2007-01-01

    A measuring-basis encrypted quantum key distribution scheme is proposed by using twelve nonorthogonal states in a four-state system and the measuring-basis encryption technique. In this scheme, two bits of classical information can be encoded on one four-state particle and the transmitted particles can be fully used.

  1. Impulsive Control for Fractional-Order Chaotic Systems

    Institute of Scientific and Technical Information of China (English)

    ZHONG Qi-Shui; BAO Jing-Fu; YU Yong-Bin; LIAO Xiao-Feng

    2008-01-01

    @@ We propose an impulsive control scheme for fractional-order chaotic systems. Based on the Takagi-Sugeno (T-S) fuzzy model and linear matrix inequalities (LMIs), some sufficient conditions are given to stabilize the fractional-order chaotic system via impulsive control. Numerical simulation shows the effectiveness of this approach.

  2. Adaptive tracking control for a class of uncertain chaotic systems

    Institute of Scientific and Technical Information of China (English)

    Chen Feng-Xiang; Wang Wei; Zhang Wei-Dong

    2007-01-01

    The paper is concerned with adaptive tracking problem for a class of chaotic system with time-varying uncertainty,but bounded by norm polynomial. Based on adaptive technique, it proposes a novel controller to asymptotically track the arbitrary desired bounded trajectory. Simulation on the Rossler chaotic system is performed and the result verifies the effectiveness of the proposed method.

  3. Chaotic Disintegration of the Inner Solar System

    CERN Document Server

    Batygin, Konstantin; Holman, Mathew J

    2014-01-01

    On timescales that greatly exceed an orbital period, typical planetary orbits evolve in a stochastic yet stable fashion. On even longer timescales, however, planetary orbits can spontaneously transition from bounded to unbound chaotic states. Large-scale instabilities associated with such behavior appear to play a dominant role in shaping the architectures of planetary systems, including our own. Here we show how such transitions are possible, focusing on the specific case of the long-term evolution of Mercury. We develop a simple analytical model for Mercury's dynamics and elucidate the origins of its short term stochastic behavior as well as of its sudden progression to unbounded chaos. Our model allows us to estimate the timescale on which this transition is likely to be triggered, i.e. the dynamical lifetime of the Solar System as we know it. The formulated theory is consistent with the results of numerical simulations and is broadly applicable to extrasolar planetary systems dominated by secular interact...

  4. Chaotic Behavior in a Switched Dynamical System

    Directory of Open Access Journals (Sweden)

    Hassane Bouzahir

    2008-05-01

    Full Text Available We present a numerical study of an example of piecewise linear systems that constitute a class of hybrid systems. Precisely, we study the chaotic dynamics of the voltage-mode controlled buck converter circuit in an open loop. By considering the voltage input as a bifurcation parameter, we observe that the obtained simulations show that the buck converter is prone to have subharmonic behavior and chaos. We also present the corresponding bifurcation diagram. Our modeling techniques are based on the new French native modeler and simulator for hybrid systems called Scicos (Scilab connected object simulator which is a Scilab (scientific laboratory package. The followed approach takes into account the hybrid nature of the circuit.

  5. Chaotic Image Scrambling Algorithm Based on S-DES

    Energy Technology Data Exchange (ETDEWEB)

    Yu, X Y [College of Measurement-Control Tech and Communications Engineering, Harbin University of Science and Technology, Harbin, 150080 (China); Zhang, J [College of Measurement-Control Tech and Communications Engineering, Harbin University of Science and Technology, Harbin, 150080 (China); Ren, H E [Information and Computer Engineering College, Northeast Forestry University, Harbin, 150000 (China); Xu, G S [College of Measurement-Control Tech and Communications Engineering, Harbin University of Science and Technology, Harbin, 150080 (China); Luo, X Y [College of Measurement-Control Tech and Communications Engineering, Harbin University of Science and Technology, Harbin, 150080 (China)

    2006-10-15

    With the security requirement improvement of the image on the network, some typical image encryption methods can't meet the demands of encryption, such as Arnold cat map and Hilbert transformation. S-DES system can encrypt the input binary flow of image, but the fixed system structure and few keys will still bring some risks. However, the sensitivity of initial value that Logistic chaotic map can be well applied to the system of S-DES, which makes S-DES have larger random and key quantities. A dual image encryption algorithm based on S-DES and Logistic map is proposed. Through Matlab simulation experiments, the key quantities will attain 10{sup 17} and the encryption speed of one image doesn't exceed one second. Compared to traditional methods, it has some merits such as easy to understand, rapid encryption speed, large keys and sensitivity to initial value.

  6. Nonlinear Dynamics, Chaotic and Complex Systems

    Science.gov (United States)

    Infeld, E.; Zelazny, R.; Galkowski, A.

    2011-04-01

    Part I. Dynamic Systems Bifurcation Theory and Chaos: 1. Chaos in random dynamical systems V. M. Gunldach; 2. Controlling chaos using embedded unstable periodic orbits: the problem of optimal periodic orbits B. R. Hunt and E. Ott; 3. Chaotic tracer dynamics in open hydrodynamical flows G. Karolyi, A. Pentek, T. Tel and Z. Toroczkai; 4. Homoclinic chaos L. P. Shilnikov; Part II. Spatially Extended Systems: 5. Hydrodynamics of relativistic probability flows I. Bialynicki-Birula; 6. Waves in ionic reaction-diffusion-migration systems P. Hasal, V. Nevoral, I. Schreiber, H. Sevcikova, D. Snita, and M. Marek; 7. Anomalous scaling in turbulence: a field theoretical approach V. Lvov and I. Procaccia; 8. Abelian sandpile cellular automata M. Markosova; 9. Transport in an incompletely chaotic magnetic field F. Spineanu; Part III. Dynamical Chaos Quantum Physics and Foundations Of Statistical Mechanics: 10. Non-equilibrium statistical mechanics and ergodic theory L. A. Bunimovich; 11. Pseudochaos in statistical physics B. Chirikov; 12. Foundations of non-equilibrium statistical mechanics J. P. Dougherty; 13. Thermomechanical particle simulations W. G. Hoover, H. A. Posch, C. H. Dellago, O. Kum, C. G. Hoover, A. J. De Groot and B. L. Holian; 14. Quantum dynamics on a Markov background and irreversibility B. Pavlov; 15. Time chaos and the laws of nature I. Prigogine and D. J. Driebe; 16. Evolutionary Q and cognitive systems: dynamic entropies and predictability of evolutionary processes W. Ebeling; 17. Spatiotemporal chaos information processing in neural networks H. Szu; 18. Phase transitions and learning in neural networks C. Van den Broeck; 19. Synthesis of chaos A. Vanecek and S. Celikovsky; 20. Computational complexity of continuous problems H. Wozniakowski; Part IV. Complex Systems As An Interface Between Natural Sciences and Environmental Social and Economic Sciences: 21. Stochastic differential geometry in finance studies V. G. Makhankov; Part V. Conference Banquet

  7. Active control technique of fractional-order chaotic complex systems

    Science.gov (United States)

    Mahmoud, Gamal M.; Ahmed, Mansour E.; Abed-Elhameed, Tarek M.

    2016-06-01

    Several kinds of synchronization of fractional-order chaotic complex systems are challenging research topics of current interest since they appear in many applications in applied sciences. Our main goal in this paper is to introduce the definition of modified projective combination-combination synchronization (MPCCS) of some fractional-order chaotic complex systems. We show that our systems are chaotic by calculating their Lyapunov exponents. The fractional Lyapunov dimension of the chaotic solutions of these systems is computed. A scheme is introduced to calculate MPCCS of four different (or identical) chaotic complex systems using the active control technique. Special cases of this type, which are projective and anti C-C synchronization, are discussed. Some figures are plotted to show that MPCCS is achieved and its errors approach zero.

  8. Mutual stabilization of chaotic systems through entangled cupolets

    Science.gov (United States)

    Morena, Matthew Allan

    Recent experimental and theoretical work has detected signatures of chaotic behavior in nearly every physical science, including quantum entanglement. In some instances, chaos either plays a significant role or, as an underlying presence, explains perplexing observations. There are certain properties of chaotic systems which are consistently encountered and become focal points of the investigations. For instance, chaotic systems typically admit a dense set of unstable periodic orbits around an attractor. These orbits collectively provide a rich source of qualitative information about the associated system and their abundance has been utilized in a variety of applications. We begin this thesis by describing a control scheme that stabilizes the unstable periodic orbits of chaotic systems and we go on to discuss several properties of these orbits. This technique allows for the creation of thousands of periodic orbits, known as cupolets ( Chaotic Unstable Periodic Orbit-lets ). We then present several applications of cupolets for investigating chaotic systems. First, we demonstrate an effective technique that combines cupolets with algebraic graph theory in order to transition between their orbits. This also induces certainty into the control of nonlinear systems and effectively provides an efficient algorithm for the steering and targeting of chaotic systems. Next, we establish that many higher-order cupolets are amalgamations of simpler cupolets, possibly through bifurcations. From a sufficiently large set of cupolets, we obtain a hierarchal subset of fundamental cupolets from which other cupolets may be assembled and dynamical invariants approximated. We then construct an independent coordinate system aligned to the local dynamical geometry and that reveals the local stretching and folding dynamics which characterize chaotic behavior. This partitions the dynamical landscape into regions of high or low chaoticity, thereby supporting prediction capabilities. Finally

  9. CONVERTIBLE DRM SYSTEM BASED ON IDENTITY-BASED ENCRYPTION

    Directory of Open Access Journals (Sweden)

    Chou-Chen Yang

    2009-10-01

    Full Text Available With the rapid growth of the Internet, acquiring digital contents over the Internet has becomecommonplace. Most traditional items can be translated into digital form. That is to say the digitalcontents can be distributed easily and rapidly to users over the Internet. Unfortunately, situations ofpiracy are common and become more serious, since the digital contents can be copied and distributedeasily through Internet. Thus, Digital Rights Management (DRM is a popular tool used to protect digitalcontents with cryptographic technology. But there are many different DRM encryption formats that areadopted by different content providers, causing consumers can’t play their contents on devices withdifferent DRM format even though they bought it legally. In this paper, we employ identity-basedencryption to allow a conversion between different DRM systems. Through the conversion process, thedigital content can be used at different DRM systems and hold the legitimate use of the right.

  10. Generalized Synchronization of Lorenz Chaotic System with Star Network

    OpenAIRE

    Mohammad Ali Khan

    2012-01-01

    In this paper, we propose the theory for generalized synchronization (GS) of a chaotic star network. We derive sufficient conditions for generalized synchronization of any chaotic system on a star network. The relationship among the state variables at GS are completely known in our method. The effectiveness and feasibility of the synchronization strategy is confirmed and demonstrated by numerical simulation.

  11. Projective synchronization of chaotic systems via backstepping design

    Directory of Open Access Journals (Sweden)

    Anindita Tarai

    2012-08-01

    Full Text Available Chaos synchronization of discrete dynamical systems are investigated. An algorithm is proposed for projective synchronization of chaotic 2D Duffing map and chaotic Tinkerbell map. The control law was derived from the Lyapunov stability theory. The numerical simulation results are presented to verify the effectiveness of the proposed algorithm.

  12. Robust optimization with transiently chaotic dynamical systems

    Science.gov (United States)

    Sumi, R.; Molnár, B.; Ercsey-Ravasz, M.

    2014-05-01

    Efficiently solving hard optimization problems has been a strong motivation for progress in analog computing. In a recent study we presented a continuous-time dynamical system for solving the NP-complete Boolean satisfiability (SAT) problem, with a one-to-one correspondence between its stable attractors and the SAT solutions. While physical implementations could offer great efficiency, the transiently chaotic dynamics raises the question of operability in the presence of noise, unavoidable on analog devices. Here we show that the probability of finding solutions is robust to noise intensities well above those present on real hardware. We also developed a cellular neural network model realizable with analog circuits, which tolerates even larger noise intensities. These methods represent an opportunity for robust and efficient physical implementations.

  13. Steganographic optical image encryption system based on reversible data hiding and double random phase encoding

    Science.gov (United States)

    Chuang, Cheng-Hung; Chen, Yen-Lin

    2013-02-01

    This study presents a steganographic optical image encryption system based on reversible data hiding and double random phase encoding (DRPE) techniques. Conventional optical image encryption systems can securely transmit valuable images using an encryption method for possible application in optical transmission systems. The steganographic optical image encryption system based on the DRPE technique has been investigated to hide secret data in encrypted images. However, the DRPE techniques vulnerable to attacks and many of the data hiding methods in the DRPE system can distort the decrypted images. The proposed system, based on reversible data hiding, uses a JBIG2 compression scheme to achieve lossless decrypted image quality and perform a prior encryption process. Thus, the DRPE technique enables a more secured optical encryption process. The proposed method extracts and compresses the bit planes of the original image using the lossless JBIG2 technique. The secret data are embedded in the remaining storage space. The RSA algorithm can cipher the compressed binary bits and secret data for advanced security. Experimental results show that the proposed system achieves a high data embedding capacity and lossless reconstruction of the original images.

  14. Control of Unknown Chaotic Systems Based on Neural Predictive Control

    Institute of Scientific and Technical Information of China (English)

    LIDong-Mei; WANGZheng-Ou

    2003-01-01

    We introduce the predictive control into the control of chaotic system and propose a neural network control algorithm based on predictive control. The proposed control system stabilizes the chaotic motion in an unknown chaotic system onto the desired target trajectory. The proposed algorithm is simple and its convergence speed is much higher than existing similar algorithms. The control system can control hyperchaos. We analyze the stability of the control system and prove the convergence property of the neural controller. The theoretic derivation and simulations demonstrate the effectiveness of the algorithm.

  15. Passive control of Permanent Magnet Synchronous Motor chaotic systems

    Institute of Scientific and Technical Information of China (English)

    QI Dong-lian; WANG Jia-jun; ZHAO Guang-zhou

    2005-01-01

    Permanent Magnet Synchronous Motor model can exhibit a variety of chaotic phenomena under some choices of system parameters and external input. Based on the property of passive system, the essential conditions were studied, by which Permanent Magnet Synchronous Motor chaotic system could be equivalent to passive system. Using Lyapunov stability theory, the convergence condition deciding the system's characters was discussed. In the convergence condition area, the equivalent passive system could be globally asymptotically stabilized by smooth state feedback.

  16. High speed data encryption and decryption using stimulated Brillouin scattering effect in optical fiber

    Science.gov (United States)

    Yi, Lilin; Zhang, Tao; Hu, Weisheng

    2011-11-01

    A novel all-optical encryption/decryption method based on stimulated Brillouin scattering (SBS) effect in optical fiber is proposed for the first time. The operation principle is explained in detail and the encryption and decryption performance is experimentally evaluated. The encryption keys could be the SBS gain amplitude, bandwidth, central wavelength and spectral shape, which are configurable and flexibly controlled by the users. We experimentally demonstrate the SBS encryption/decryption process of a 10.86-Gb/s non-return-to-zero (NRZ) data by using both phase-modulated and current-dithered Brillouin pumps for proof-of-concept. Unlike the traditional optical encryption methods of chaotic communications and optical code-division-multiplexing access (OCDMA), the SBS based encryption/decryption technique can directly upgrade the current optical communication system to a secure communication system without changing the terminal transceivers, which is completely compatible with the current optical communication systems.

  17. Chaotic carrier pulse position modulation communication system and method

    Science.gov (United States)

    Abarbanel, Henry D. I.; Larson, Lawrence E.; Rulkov, Nikolai F.; Sushchik, Mikhail M.; Tsimring, Lev S.; Volkovskii, Alexander R.

    2001-01-01

    A chaotic carrier pulse position modulation communication system and method is disclosed. The system includes a transmitter and receiver having matched chaotic pulse regenerators. The chaotic pulse regenerator in the receiver produces a synchronized replica of a chaotic pulse train generated by the regenerator in the transmitter. The pulse train from the transmitter can therefore act as a carrier signal. Data is encoded by the transmitter through selectively altering the interpulse timing between pulses in the chaotic pulse train. The altered pulse train is transmitted as a pulse signal. The receiver can detect whether a particular interpulse interval in the pulse signal has been altered by reference to the synchronized replica it generates, and can therefore detect the data transmitted by the receiver. Preferably, the receiver predicts the earliest moment in time it can expect a next pulse after observation of at least two consecutive pulses. It then decodes the pulse signal beginning at a short time before expected arrival of a pulse.

  18. Hardware Realization of Chaos-based Symmetric Video Encryption

    KAUST Repository

    Ibrahim, Mohamad A.

    2013-05-01

    This thesis reports original work on hardware realization of symmetric video encryption using chaos-based continuous systems as pseudo-random number generators. The thesis also presents some of the serious degradations caused by digitally implementing chaotic systems. Subsequently, some techniques to eliminate such defects, including the ultimately adopted scheme are listed and explained in detail. Moreover, the thesis describes original work on the design of an encryption system to encrypt MPEG-2 video streams. Information about the MPEG-2 standard that fits this design context is presented. Then, the security of the proposed system is exhaustively analyzed and the performance is compared with other reported systems, showing superiority in performance and security. The thesis focuses more on the hardware and the circuit aspect of the system’s design. The system is realized on Xilinx Vetrix-4 FPGA with hardware parameters and throughput performance surpassing conventional encryption systems.

  19. The chaotic "sculpting" of the Solar System

    Science.gov (United States)

    Tsiganis, K.

    2006-01-01

    The orbits of the large celestial bodies in our Solar System are stable for very long times, as can be shown by numerical simulation. This gives the erroneous impression of perpetual stability of the system. It is only when we study the orbital distribution of the numerous minor bodies in the Solar System that we discover the rich variety of complex dynamical processes that have in fact shaped our system. During the last decade, enormous progress has been made, in understanding the evolution of the system over the last ~3.9 Gy. However, it also became clear that, in order to unveil its behaviour during the first ~700 million years of its lifetime, we have to find convincing explanations for observations that appear as details of its dynamical architecture. In the following we are going to show how the two best known - and up to now unexplained - observations in the Solar System, namely (i) the heavily cratered surface of the Moon and (ii) the elliptic (and not circular) motion of the planets, lead us to the discovery of the chaotic sculpting of the Solar System [1]-[3].

  20. Equilibrium points and bifurcation control of a chaotic system

    Institute of Scientific and Technical Information of China (English)

    Liang Cui-Xiang; Tang Jia-Shi

    2008-01-01

    Based on the Routh-Hurwitz criterion,this paper investigates the stability of a new chaotic system.State feedback controllers are designed to control the chaotic system to the unsteady equilibrium points and limit cycle.Theoretical analyses give the range of value of control parameters to stabilize the unsteady equilibrium points of the chaotic system and its critical parameter for generating Hopf bifurcation.Certain nP periodic orbits can be stabilized by parameter adjustment.Numerical simulations indicate that the method can effectively guide the system trajectories to unsteady equilibrium points and periodic orbits.

  1. Generalized Synchronization Between Different Fractional-Order Chaotic Systems

    Institute of Scientific and Technical Information of China (English)

    ZHOU Ping; CHENG Xue-Feng; ZHANG Nian-Ying

    2008-01-01

    In this paper, using scalar feedback controller and stability theory of fractional-order systems, a gener-alized synchronization method for different fractional-order chaotic systems is established. Simulation results show the effectiveness of the theoretical results.

  2. A Hyperchaotic Attractor Coined from Chaotic Lu System

    Institute of Scientific and Technical Information of China (English)

    BAO Bo-Cheng; LIU Zhong

    2008-01-01

    We report a new hyperchaotic attractor coined from the chaotic Lu system by using a state feedback controller. Theoretical analyses and simulation experiments are conducted to investigate the dynamical behaviour of the proposed hyperchaotic system.

  3. Chaotic synchronization for a class of fractional-order chaotic systems

    Institute of Scientific and Technical Information of China (English)

    Zhou Ping

    2007-01-01

    In this paper, a very simple synchronization method is presented for a class of fractional-order chaotic systems only via feedback control. The synchronization technique, based on the stability theory of fractional-order systems, is simple and theoretically rigorous.

  4. Ontic and epistemic descriptions of chaotic systems

    Science.gov (United States)

    Atmanspacher, Harald

    2000-05-01

    Traditional philosophical discourse draws a distinction between ontology and epistemology and generally enforces this distinction by keeping the two subject areas separated and unrelated. In addition, the relationship between the two areas is of central importance to physics and philosophy of physics. For instance, all kinds of measurement-related problems force us to consider both our knowledge of the states and observables of a system (epistemic perspective) and its states and observables independent of such knowledge (ontic perspective). This applies to quantum systems in particular. In this contribution we present an example which shows the importance of distinguishing between ontic and epistemic levels of description even for classical systems. Corresponding conceptions of ontic and epistemic states and their evolution will be introduced and discussed with respect to aspects of stability and information flow. These aspects show why the ontic/epistemic distinction is particularly important for systems exhibiting deterministic chaos. Moreover, this distinction provides some understanding of the relationships between determinism, causation, predictability, randomness, and stochasticity in chaotic systems.

  5. A new image encryption algorithm based on the fractional-order hyperchaotic Lorenz system

    Institute of Scientific and Technical Information of China (English)

    Wang Zhen; Huang Xia; Li Yu-Xia; Song Xiao-Na

    2013-01-01

    We propose a new image encryption algorithm on the basis of the fractional-order hyperchaotic Lorenz system.While in the process of generating a key stream,the system parameters and the derivative order are embedded in the proposed algorithm to enhance the security.Such an algorithm is detailed in terms of security analyses,including correlation analysis,information entropy analysis,run statistic analysis,mean-variance gray value analysis,and key sensitivity analysis.The experimental results demonstrate that the proposed image encryption scheme has the advantages of large key space and high security for practical image encryption.

  6. Spread spectrum communication system with chaotic frequency modulation

    Science.gov (United States)

    Volkovskii, A. R.; Tsimring, L. Sh.; Rulkov, N. F.; Langmore, I.

    2005-09-01

    A new spread spectrum communication system utilizing chaotic frequency modulation of sinusoidal signals is discussed. A single phase lock loop (PLL) system in the receiver is used both to synchronize the local chaotic oscillator and to recover the information signal. We study the dynamics of the synchronization process, stability of the PLL system, and evaluate the bit-error-rate performance of this chaos-based communication system.

  7. CHAOTIC DISINTEGRATION OF THE INNER SOLAR SYSTEM

    Energy Technology Data Exchange (ETDEWEB)

    Batygin, Konstantin [Division of Geological and Planetary Sciences, California Institute of Technology, 1200 East California Boulevard, Pasadena, CA 91125 (United States); Morbidelli, Alessandro [Department Lagrange, Observatoire de la Côte d' Azur, F-06304 Nice (France); Holman, Mathew J. [Harvard-Smithsonian Center for Astrophysics, 60 Garden Street, Cambridge, MA 02138 (United States)

    2015-02-01

    On timescales that greatly exceed an orbital period, typical planetary orbits evolve in a stochastic yet stable fashion. On even longer timescales, however, planetary orbits can spontaneously transition from bounded to unbound chaotic states. Large-scale instabilities associated with such behavior appear to play a dominant role in shaping the architectures of planetary systems, including our own. Here we show how such transitions are possible, focusing on the specific case of the long-term evolution of Mercury. We develop a simple analytical model for Mercury's dynamics and elucidate the origins of its short-term stochastic behavior as well as of its sudden progression to unbounded chaos. Our model allows us to estimate the timescale on which this transition is likely to be triggered, i.e., the dynamical lifetime of the solar system as we know it. The formulated theory is consistent with the results of numerical simulations and is broadly applicable to extrasolar planetary systems dominated by secular interactions. These results constitute a significant advancement in our understanding of the processes responsible for sculpting of the dynamical structures of generic planetary systems.

  8. Image Encryption Algorithm Based on Chaotic Mappings%基于混沌映射的图像加密算法

    Institute of Scientific and Technical Information of China (English)

    卢辉斌; 肖霞

    2011-01-01

    This paper designs a new kind of image encryption algorithm which uses two Logistic systems. The auxiliary key m is obtained by a certain line data of the changed image matrix. The initial values of two Logistic mappings are modified by the key in. The Logistic mappings are used to generate the encryption sequences which are used to encrypt with every pixel of the image. Theoretical analysis and simulation results show the new algorithm not only has better sensitivity and very uniform pixel-value distribution, but also is simple and easy to achieve.%提出一种基于混沌映射的图像加密算法,该算法对图像进行拉伸融合折叠变换,通过映射其矩阵的某行数据,得到修改Logistic 映射初值的关键密钥m,并由2个Logistic混沌映射相结合产生加密序列,将图像与该序列进行相应代数运算,从而获得加密图像.理论分析和实验结果表明,该算法对密钥具有较强的敏感性,且加密图的像素值分布较均匀.

  9. The Development of a Portable Hard Disk Encryption/Decryption System with a MEMS Coded Lock

    Directory of Open Access Journals (Sweden)

    Shengyong Li

    2009-11-01

    Full Text Available In this paper, a novel portable hard-disk encryption/decryption system with a MEMS coded lock is presented, which can authenticate the user and provide the key for the AES encryption/decryption module. The portable hard-disk encryption/decryption system is composed of the authentication module, the USB portable hard-disk interface card, the ATA protocol command decoder module, the data encryption/decryption module, the cipher key management module, the MEMS coded lock controlling circuit module, the MEMS coded lock and the hard disk. The ATA protocol circuit, the MEMS control circuit and AES encryption/decryption circuit are designed and realized by FPGA(Field Programmable Gate Array. The MEMS coded lock with two couplers and two groups of counter-meshing-gears (CMGs are fabricated by a LIGA-like process and precision engineering method. The whole prototype was fabricated and tested. The test results show that the user’s password could be correctly discriminated by the MEMS coded lock, and the AES encryption module could get the key from the MEMS coded lock. Moreover, the data in the hard-disk could be encrypted or decrypted, and the read-write speed of the dataflow could reach 17 MB/s in Ultra DMA mode.

  10. Open-loop frequency response for a chaotic masking system

    Institute of Scientific and Technical Information of China (English)

    Huang Xian-Gao; Yu Pei; Huang Wei

    2006-01-01

    In this paper, a new numerical simulation approach is proposed for the study of open-loop frequency response of a chaotic masking system. Using Chua's circuit and the Lorenz system as illustrative examples, we have shown that one can employ chaos synchronization to separate the feedback network from a chaotic masking system, and then use numerical simulation to obtain the open-loop synchronization response, the phase response, and the amplitude response of a chaotic masking system. Based on the analysis of the frequency response, we have also proved that changing the amplitude of the exciting (input) signal within normal working domain does not influence the frequency response of the chaotic masking system. The new numerical simulation method developed in this paper can be extended to consider the open-loop frequency response of other systems described by differential or difference equations.

  11. On the Performance of Symmetrical and Asymmetrical Encryption for Real-Time Video Conferencing System

    OpenAIRE

    Sureswaran Ramadass; Maryam Feily; Salah Noori

    2010-01-01

    Providing security for video conferencing systems is in fact a challenging issue due to the unique requirements of its real-time multimedia encryption. Modern cryptographic techniques can address the security objectives of multimedia conferencing system. The efficiency of a viable encryption scheme is evaluated using two critical performance metrics: Memory usage, and CPU usage. In this paper, two types of cryptosystems for video conferencing system were tested and evaluated. The first crypto...

  12. Passive control of chaotic system with multiple strange attractors

    Institute of Scientific and Technical Information of China (English)

    Song Yun-Zhong; Zhao Guang-Zhou; Qi Dong-Lian

    2006-01-01

    In this paper we present a new simple controller for a chaotic system, that is, the Newton-Leipnik equation with two strange attractors: the upper attractor (UA) and the lower attractor (LA). The controller design is based on the passive technique. The final structure of this controller for original stabilization has a simple nonlinear feedback form.Using a passive method, we prove the stability of a closed-loop system. Based on the controller derived from the passive principle, we investigate three different kinds of chaotic control of the system, separately: the original control forcing the chaotic motion to settle down to the origin from an arbitrary position of the phase space; the chaotic intra-attractor control for stabilizing the equilibrium points only belonging to the upper chaotic attractor or the lower chaotic one,and the inter-attractor control for compelling the chaotic oscillation from one basin to another one. Both theoretical analysis and simulation results verify the validity of the suggested method.

  13. Bluetooth Based Chaos Synchronization Using Particle Swarm Optimization and Its Applications to Image Encryption

    Science.gov (United States)

    Yau, Her-Terng; Hung, Tzu-Hsiang; Hsieh, Chia-Chun

    2012-01-01

    This study used the complex dynamic characteristics of chaotic systems and Bluetooth to explore the topic of wireless chaotic communication secrecy and develop a communication security system. The PID controller for chaos synchronization control was applied, and the optimum parameters of this PID controller were obtained using a Particle Swarm Optimization (PSO) algorithm. Bluetooth was used to realize wireless transmissions, and a chaotic wireless communication security system was developed in the design concept of a chaotic communication security system. The experimental results show that this scheme can be used successfully in image encryption. PMID:22969355

  14. Bluetooth Based Chaos Synchronization Using Particle Swarm Optimization and Its Applications to Image Encryption

    Directory of Open Access Journals (Sweden)

    Tzu-Hsiang Hung

    2012-06-01

    Full Text Available This study used the complex dynamic characteristics of chaotic systems and Bluetooth to explore the topic of wireless chaotic communication secrecy and develop a communication security system. The PID controller for chaos synchronization control was applied, and the optimum parameters of this PID controller were obtained using a Particle Swarm Optimization (PSO algorithm. Bluetooth was used to realize wireless transmissions, and a chaotic wireless communication security system was developed in the design concept of a chaotic communication security system. The experimental results show that this scheme can be used successfully in image encryption.

  15. Linear generalized synchronization of continuous-time chaotic systems

    Energy Technology Data Exchange (ETDEWEB)

    Lu Junguo E-mail: jglu@sjtu.edu.cn; Xi Yugeng

    2003-08-01

    This paper develops a general approach for constructing a response system to implement linear generalized synchronization (GS) with the drive continuous-time chaotic system. Some sufficient conditions of global asymptotic linear GS between the drive and response continuous-time chaotic systems are attained from rigorously modern control theory. Finally, we take Chua's circuit as an example for illustration and verification.

  16. A self-adapting image encryption algorithm based on spatiotemporal chaos and ergodic matrix

    Institute of Scientific and Technical Information of China (English)

    Luo Yu-Ling; Du Ming-Hui

    2013-01-01

    To ensure the security of a digital image,a new self-adapting encryption algorithm based on the spatiotemporal chaos and ergodic matrix is proposed in this paper.First,the plain-image is divided into different blocks of the same size,and each block is sorted in ascending order to obtain the corresponding standard ergodic matrix.Then each block is encrypted by the spatiotemporal chaotic system and shuffled according to the standard ergodic matrix.Finally,all modules are rearranged to acquire the final encrypted image.In particular,the plain-image information is used in the initial conditions of the spatiotemporal chaos and the ergodic matrices,so different plain-images will be encrypted to obtain different cipherimages.Theoretical analysis and simulation results indicate that the performance and security of the proposed encryption scheme can encrypt the image effectively and resist various typical attacks.

  17. Mixed basin boundary structures of chaotic systems

    International Nuclear Information System (INIS)

    Motivated by recent numerical observations on a four-dimensional continuous-time dynamical system, we consider different types of basin boundary structures for chaotic systems. These general structures are essentially mixtures of the previously known types of basin boundaries where the character of the boundary assumes features of the previously known boundary types at different points arbitrarily finely interspersed in the boundary. For example, we discuss situations where an everywhere continuous boundary that is otherwise smooth and differentiable at almost every point has an embedded uncountable, zero Lebesgue measure set of points at which the boundary curve is nondifferentiable. Although the nondifferentiable set is only of zero Lebesgue measure, the curve close-quote s fractal dimension may (depending on parameters) still be greater than one. In addition, we discuss bifurcations from such a mixed boundary to a 'pure' boundary that is a fractal nowhere differentiable curve or surface and to a pure nonfractal boundary that is everywhere smooth. copyright 1999 The American Physical Society

  18. Synchronization Between Two Different Switched Chaotic Systems By Switching Control

    Directory of Open Access Journals (Sweden)

    Du Li Ming

    2016-01-01

    Full Text Available This paper is concerned with the synchronization problem of two different switched chaotic systems, considering the general case that the master-slave switched chaotic systems have uncertainties. Two basic problems are considered: one is projective synchronization of switched chaotic systems under arbitrary switching; the other is projective synchronization of switched chaotic systems by design of switching when synchronization cannot achieved by using any subsystems alone. For the two problems, common Lyapunov function method and multiple Lyapunov function method are used respectively, an adaptive control scheme has been presented, some sufficient synchronization conditions are attainted, and the switching signal is designed. Finally, the numerical simulation is provide to show the effectiveness of our method.

  19. Improved decryption quality and security of a joint transform correlator-based encryption system

    Science.gov (United States)

    Vilardy, Juan M.; Millán, María S.; Pérez-Cabré, Elisabet

    2013-02-01

    Some image encryption systems based on modified double random phase encoding and joint transform correlator architecture produce low quality decrypted images and are vulnerable to a variety of attacks. In this work, we analyse the algorithm of some reported methods that optically implement the double random phase encryption in a joint transform correlator. We show that it is possible to significantly improve the quality of the decrypted image by introducing a simple nonlinear operation in the encrypted function that contains the joint power spectrum. This nonlinearity also makes the system more resistant to chosen-plaintext attacks. We additionally explore the system resistance against this type of attack when a variety of probability density functions are used to generate the two random phase masks of the encryption-decryption process. Numerical results are presented and discussed.

  20. Impulsive Control of Memristive Chaotic Systems with Impulsive Time Window

    Directory of Open Access Journals (Sweden)

    FuLi Chen

    2015-01-01

    Full Text Available The problem of impulsive control for memristor-based chaotic circuit systems with impulsive time windows is investigated. Based on comparison principle, several novel criteria which guarantee the asymptotic stabilization of the memristor-based chaotic circuit systems are obtained. In comparison with previous results, the present results are easily verified. Numerical simulations are given to further illustrate the effectiveness of the theoretical results.

  1. Pattern formations in chaotic spatio-temporal systems

    Indian Academy of Sciences (India)

    Ying Zhang; Shihong Wang; Jinhua Xiao; Hilda A Cerdeira; S Chen; Gang Hu

    2005-06-01

    Pattern formations in chaotic spatio-temporal systems modelled by coupled chaotic oscillators are investigated. We focus on various symmetry breakings and different kinds of chaos synchronization–desynchronization transitions, which lead to certain types of spontaneous spatial orderings and the emergence of some typical ordered patterns, such as rotating wave patterns with splay phase ordering (orientational symmetry breaking) and partially synchronous standing wave patterns with in-phase ordering (translational symmetry breaking). General pictures of the global behaviors of pattern formations and transitions in coupled chaotic oscillators are provided.

  2. Blind adaptive identification of FIR channel in chaotic communication systems

    Institute of Scientific and Technical Information of China (English)

    Wang Bao-Yun; Tommy W.S.Chow; K.T.Ng

    2004-01-01

    In this paper we study the problem of blind channel identification in chaotic communications. An adaptive algorithm is proposed, which exploits the boundness property of chaotic signals. Compared with the EKF-based approach, the proposed algorithm achieves a great complexity gain but at the expense of a slight accuracy degradation.However, our approach enjoys the important advantage that it does not require the a priori information such as nonlinearity of chaotic dynamics and the variances of measurement noise and the coefficient model noise. In addition,our approach is applicable to the ARMA system.

  3. Orbits' statistics in chaotic dynamical systems

    International Nuclear Information System (INIS)

    This paper shows how the measurement of the stochasticity degree of a finite sequence of real numbers, published by Kolmogorov in Italian in a journal of insurances' statistics, can be usefully applied to measure the objective stochasticity degree of sequences, originating from dynamical systems theory and from number theory. Namely, whenever the value of Kolmogorov's stochasticity parameter of a given sequence of numbers is too small (or too big), one may conclude that the conjecture describing this sequence as a sample of independent values of a random variables is highly improbable. Kolmogorov used this strategy fighting (in a paper in 'Doklady', 1940) against Lysenko, who had tried to disprove the classical genetics' law of Mendel experimentally. Calculating his stochasticity parameter value for the numbers from Lysenko's experiment reports, Kolmogorov deduced, that, while these numbers were different from the exact fulfilment of Mendel's 3 : 1 law, any smaller deviation would be a manifestation of the report's number falsification. The calculation of the values of the stochasticity parameter would be useful for many other generators of pseudorandom numbers and for many other chaotically looking statistics, including even the prime numbers distribution (discussed in this paper as an example). (open problem)

  4. Wigner function statistics in classically chaotic systems

    CERN Document Server

    Horvat, M; Horvat, Martin; Prosen, Tomaz

    2003-01-01

    We have studied statistical properties of the values of the Wigner function W(x) of 1D quantum maps on compact 2D phase space of finite area V. For this purpose we have defined a Wigner function probability distribution P(w) = (1/V) int delta(w-W(x)) dx, which has, by definition, fixed first and second moment. In particular, we concentrate on relaxation of time evolving quantum state in terms of W(x), starting from a coherent state. We have shown that for a classically chaotic quantum counterpart the distribution P(w) in the semi-classical limit becomes a Gaussian distribution that is fully determined by the first two moments. Numerical simulations have been performed for the quantum sawtooth map and the quantized kicked top. In a quantum system with Hilbert space dimension N (similar 1/hbar) the transition of P(w) to a Gaussian distribution was observed at times t proportional to log N. In addition, it has been shown that the statistics of Wigner functions of propagator eigenstates is Gaussian as well in the...

  5. Efficiency of Monte Carlo sampling in chaotic systems.

    Science.gov (United States)

    Leitão, Jorge C; Lopes, J M Viana Parente; Altmann, Eduardo G

    2014-11-01

    In this paper we investigate how the complexity of chaotic phase spaces affect the efficiency of importance sampling Monte Carlo simulations. We focus on flat-histogram simulations of the distribution of finite-time Lyapunov exponent in a simple chaotic system and obtain analytically that the computational effort: (i) scales polynomially with the finite time, a tremendous improvement over the exponential scaling obtained in uniform sampling simulations; and (ii) the polynomial scaling is suboptimal, a phenomenon known as critical slowing down. We show that critical slowing down appears because of the limited possibilities to issue a local proposal in the Monte Carlo procedure when it is applied to chaotic systems. These results show how generic properties of chaotic systems limit the efficiency of Monte Carlo simulations.

  6. Adaptive Control of the Chaotic System via Singular System Approach

    Directory of Open Access Journals (Sweden)

    Yudong Li

    2014-01-01

    Full Text Available This paper deals with the control problem of the chaotic system subject to disturbance. The sliding mode surface is designed by singular system approach, and sufficient condition for convergence is given. Then, the adaptive sliding mode controller is designed to make the state arrive at the sliding mode surface in finite time. Finally, Lorenz system is considered as an example to show the effectiveness of the proposed method.

  7. Chaotic diffusion in the Gliese-876 planetary system

    Science.gov (United States)

    Martí, J. G.; Cincotta, P. M.; Beaugé, C.

    2016-07-01

    Chaotic diffusion is supposed to be responsible for orbital instabilities in planetary systems after the dissipation of the protoplanetary disc, and a natural consequence of irregular motion. In this paper, we show that resonant multiplanetary systems, despite being highly chaotic, not necessarily exhibit significant diffusion in phase space, and may still survive virtually unchanged over time-scales comparable to their age. Using the GJ-876 system as an example, we analyse the chaotic diffusion of the outermost (and less massive) planet. We construct a set of stability maps in the surrounding regions of the Laplace resonance. We numerically integrate ensembles of close initial conditions, compute Poincaré maps and estimate the chaotic diffusion present in this system. Our results show that, the Laplace resonance contains two different regions: an inner domain characterized by low chaoticity and slow diffusion, and an outer one displaying larger values of dynamical indicators. In the outer resonant domain, the stochastic borders of the Laplace resonance seem to prevent the complete destruction of the system. We characterize the diffusion for small ensembles along the parameters of the outermost planet. Finally, we perform a stability analysis of the inherent chaotic, albeit stable Laplace resonance, by linking the behaviour of the resonant variables of the configurations to the different sub-structures inside the three-body resonance.

  8. Reconstruction of time-delay systems from chaotic time series.

    Science.gov (United States)

    Bezruchko, B P; Karavaev, A S; Ponomarenko, V I; Prokhorov, M D

    2001-11-01

    We propose a method that allows one to estimate the parameters of model scalar time-delay differential equations from time series. The method is based on a statistical analysis of time intervals between extrema in the time series. We verify our method by using it for the reconstruction of time-delay differential equations from their chaotic solutions and for modeling experimental systems with delay-induced dynamics from their chaotic time series.

  9. CHAOTIC DATA COMMUNICATION SYSTEM DESIGN BY USING RAMAN AMPLIFIER

    OpenAIRE

    Remzi YILDIRIM; ÇELEBİ, Fatih V.

    2010-01-01

    ABSTRACT In this study, an 80 km. long fiber-optic data communication system is designed by using Raman amplifier. Chaotic communication technique is used contrary to regular data communication principles. The  components of the chaotic signal are the optical noise by AWGN (Additive White Gaussian Noise,AWGN) technique and ONA (Optical Noise Adder,ONA) in addition to the modulated signal which is obtained by using external optical modulator. Non-return to zero (NRZ) technique is selected...

  10. Chaotic Dynamical Behaviour in Soliton Solutions for a New (2+1)-Dimensional Long Dispersive Wave System

    Institute of Scientific and Technical Information of China (English)

    张解放; 郑春龙; 孟剑平; 方建平

    2003-01-01

    With the help of variable separation approach, a quite general excitation of a new (2+l)-dimensional long dispersive wave system is derived. The chaotic behaviour, such as chaotic line soliton patterns, chaotic dromion patterns, chaotic-period patterns, and chaotic-chaotic patterns, in some new localized excitations are found by selecting appropriate functions.

  11. Cryptanalysis of "an improvement over an image encryption method based on total shuffling"

    Science.gov (United States)

    Akhavan, A.; Samsudin, A.; Akhshani, A.

    2015-09-01

    In the past two decades, several image encryption algorithms based on chaotic systems had been proposed. Many of the proposed algorithms are meant to improve other chaos based and conventional cryptographic algorithms. Whereas, many of the proposed improvement methods suffer from serious security problems. In this paper, the security of the recently proposed improvement method for a chaos-based image encryption algorithm is analyzed. The results indicate the weakness of the analyzed algorithm against chosen plain-text.

  12. Chaos Synchronization on Parameters Adaptive Control for Chen Chaotic System

    Institute of Scientific and Technical Information of China (English)

    ZHOU Ping

    2003-01-01

    Chaos synchronization of Chen chaotic system for parameters unknown is discussed in this paper using a scalar output. Using the concept of conditional Lyapunov exponents, the negativity of all Lyapunov exponents shows the synchronization of transmitter systems with receiver systems even though system parametes are not known to receiver systems.

  13. Realization of fractional-order Liu chaotic system by circuit

    Institute of Scientific and Technical Information of China (English)

    Lu Jun-Jie; Liu Chong-Xin

    2007-01-01

    In this paper, chaotic behaviours in the fractional-order Liu system are studied. Based on the approximation theory of fractional-order operator, circuits are designed to simulate the fractional- order Liu system with q = 0.1 - 0.9 in a step of 0.1, and an experiment has demonstrated the 2.7-order Liu system. The simulation results prove that the chaos exists indeed in the fractional-order Liu system with an order as low as 0.3. The experimental results prove that the fractional-order chaotic system can be realized by using hardware devices, which lays the foundation for its practical applications.

  14. Increased-order generalized synchronization of chaotic and hyperchaotic systems

    Indian Academy of Sciences (India)

    K S Ojo; S T Ogunjo; A N Njah; I A Fuwape

    2015-01-01

    This paper presents increased-order generalized synchronization (GS) of chaotic and hyperchaotic systems with different order based on active control technique. By this technique, we design suitable control functions to achieve GS between (i) a new three-dimensional (3D) chaotic system and four-dimensional (4D) hyperchaotic Lorenz system and (ii) four-dimensional hyperchaotic Lorenz system and five-dimensional (5D) hyperchaotic Lorenz system. The corresponding numerical simulation results are presented to verify the effectiveness of this technique.

  15. Control of Unknown Chaotic Systems Based on Neural Predictive Control

    Institute of Scientific and Technical Information of China (English)

    LI Dong-Mei; WANG Zheng-Ou

    2003-01-01

    We introduce the predictive control into the control of chaotic system and propose a neural networkcontrol algorithm based on predictive control. The proposed control system stabilizes the chaotic motion in an unknownchaotic system onto the desired target trajectory. The proposed algorithm is simple and its convergence speed is muchhigher than existing similar algorithms. The control system can control hyperchaos. We analyze the stability of thecontrol system and prove the convergence property of the neural controller. The theoretic derivation and simulationsdemonstrate the effectiveness of the algorithm.

  16. A novel one equilibrium hyper-chaotic system generated upon Lü attractor

    International Nuclear Information System (INIS)

    By introducing an additional state feedback into a three-dimensional autonomous chaotic attractor Lü system, this paper presents a novel four-dimensional continuous autonomous hyper-chaotic system which has only one equilibrium. There are only 8 terms in all four equations of the new hyper-chaotic system, which may be less than any other four-dimensional continuous autonomous hyper-chaotic systems generated by three-dimensional (3D) continuous autonomous chaotic systems. The hyper-chaotic system undergoes Hopf bifurcation when parameter c varies, and becomes the 3D modified Lü system when parameter k varies. Although the hyper-chaotic system does not undergo Hopf bifurcation when parameter k varies, many dynamic behaviours such as periodic attractor, quasi periodic attractor, chaotic attractor and hyper-chaotic attractor can be observed. A circuit is also designed when parameter k varies and the results of the circuit experiment are in good agreement with those of simulation. (general)

  17. Noise Separation from the Weak Signal Chaotic Detection System

    Directory of Open Access Journals (Sweden)

    Hanjie Gu

    2014-11-01

    Full Text Available The traditional weak signal chaotic detection system still restricts some technical issues in the situation of the signal with noise, such as poor denoising ability and low detection precision. In this paper, we propose a novel weak signal chaotic detection system based on an improved wavelet transform algorithm. First, the traditional wavelet transform algorithm domain variables have been transformed and discretized to eliminate the redundant transform. Then, based on the discrete optimization, the wavelet coefficients have been optimized by threshold compromise strategy. The improved wavelet transform algorithm is applied in the weak signal chaotic detection system. The noise signal after finite discrete processing is treated as a perturbation of cycle power and put into a chaotic system for detecting weak signal under the noise conditions. The simulation experiments show that the proposed improved wavelet transform algorithm has a better denoising effect than the traditional wavelet transform algorithm. Moreover, the improved algorithm shows better accuracy and higher robustness in the weak signal chaotic detection system.

  18. Optimal Control for a Class of Chaotic Systems

    Directory of Open Access Journals (Sweden)

    Jianxiong Zhang

    2012-01-01

    Full Text Available This paper proposes the optimal control methods for a class of chaotic systems via state feedback. By converting the chaotic systems to the form of uncertain piecewise linear systems, we can obtain the optimal controller minimizing the upper bound on cost function by virtue of the robust optimal control method of piecewise linear systems, which is cast as an optimization problem under constraints of bilinear matrix inequalities (BMIs. In addition, the lower bound on cost function can be achieved by solving a semidefinite programming (SDP. Finally, numerical examples are given to illustrate the results.

  19. PERFORMANCE OF A NEW DECODING METHOD USED IN OPEN-LOOP ALL-OPTICAL CHAOTIC COMMUNICATION SYSTEM

    Institute of Scientific and Technical Information of China (English)

    Liu Huijie; Feng Jiuchao

    2011-01-01

    A new decoding method with decoder is used in open-loop all-optical chaotic communication system under strong injection condition.The performance of the new decoding method is numerically investigated by comparing it with the common decoding method without decoder.For new decoding method,two cases are analyzed,including whether or not the output of the decoder is adjusted by its input to receiver.The results indicate the decoding quality can be improved by adjusting for the new decoding method.Meanwhile,the injection strength of decoder can be restricted in a certain range.The adjusted new decoding method with decoder can achieve better decoding quality than decoding method without decoder when the bit rate of message is under 5 Gb/s.However,a stronger injection for receiver is needed.Moreover,the new decoding method can broaden the range of injection strength acceptable for good decoding quality.Different message encryption techniques are tested,and the result is similar to that of the common decoding method,indicative of the fact that the message encoded by using Chaotic Modulation (CM) can be best recovered by the new decoding method owning to the essence of this encryption technique.

  20. ADAPTIVE SYNCHRONIZATION OF UNCERTAIN LI AND T CHAOTIC SYSTEMS

    Directory of Open Access Journals (Sweden)

    Dr. V. SUNDARAPANDIAN,

    2011-05-01

    Full Text Available In this paper, we use adaptive control method to derive new results for the global chaos synchronization of identical uncertain Li systems (2009, identical uncertain T systems (2008 and non-identical Li and uncertain T systems. In adaptive synchronization of identical chaotic systems, the parameters of the master and slave systems are unknown and we devise feedback control laws using estimates of the system parameters. In adaptive synchronization of non-identical chaotic systems, the parameters of the master system are known, but the parameters of the slave systems are unknown and we devise feedback control laws using the estimates of the parameters of the slave system. Our adaptive synchronization results derived in this paper for uncertain Li and T systems are established using Lyapunov stability theory. Since the Lyapunov exponents are not required for these calculations, the adaptive control method is very effective and convenient to synchronize identical and non-identical Li and T chaotic systems. Numerical simulations are given to demonstrate the effectiveness of the proposed adaptive synchronization schemes for the global chaos synchronization of the uncertain chaotic systems addressed in this paper.

  1. A joint encryption/watermarking system for verifying the reliability of medical images.

    Science.gov (United States)

    Bouslimi, Dalel; Coatrieux, Gouenou; Cozic, Michel; Roux, Christian

    2012-09-01

    In this paper, we propose a joint encryption/water-marking system for the purpose of protecting medical images. This system is based on an approach which combines a substitutive watermarking algorithm, the quantization index modulation, with an encryption algorithm: a stream cipher algorithm (e.g., the RC4) or a block cipher algorithm (e.g., the AES in cipher block chaining (CBC) mode of operation). Our objective is to give access to the outcomes of the image integrity and of its origin even though the image is stored encrypted. If watermarking and encryption are conducted jointly at the protection stage, watermark extraction and decryption can be applied independently. The security analysis of our scheme and experimental results achieved on 8-bit depth ultrasound images as well as on 16-bit encoded positron emission tomography images demonstrate the capability of our system to securely make available security attributes in both spatial and encrypted domains while minimizing image distortion. Furthermore, by making use of the AES block cipher in CBC mode, the proposed system is compliant with or transparent to the DICOM standard.

  2. Compact Global Chaotic Attractors of Discrete Control Systems

    Directory of Open Access Journals (Sweden)

    Cheban David

    2014-01-01

    Full Text Available The paper is dedicated to the study of the problem of existence of compact global chaotic attractors of discrete control systems and to the description of its structure. We consider so called switched systems with discrete time xn+1 = fv(n(xn, where v: Z+ → {1; 2; : : : ;m}. If m≥2 we give sufficient conditions (the family M := {f1; f2; : : : ; fm} of functions is contracting in the extended sense for the existence of a compact global chaotic attractor. We study this problem in the framework of non-autonomous dynamical systems (cocycles

  3. Active synchronization between two different chaotic dynamical system

    Energy Technology Data Exchange (ETDEWEB)

    Maheri, M. [Institute for Mathematical Research, 43400 UPM, Serdang, Selengor (Malaysia); Arifin, N. Md; Ismail, F. [Department of Mathematics, 43400 UPM, Serdang, Selengor (Malaysia)

    2015-05-15

    In this paper we investigate on the synchronization problem between two different chaotic dynamical system based on the Lyapunov stability theorem by using nonlinear control functions. Active control schemes are used for synchronization Liu system as drive and Rossler system as response. Numerical simulation by using Maple software are used to show effectiveness of the proposed schemes.

  4. A novel four-wing non-equilibrium chaotic system and its circuit implementation

    Indian Academy of Sciences (India)

    Lin Yuan; Wang Chunhua; He Haizhen; Zhou Li Li

    2016-04-01

    In this paper, we construct a novel, 4D smooth autonomous system. Compared to the existing chaotic systems, the most attractive point is that this system does not display any equilibria, but can still exhibit four-wing chaotic attractors. The proposed system is investigated through numerical simulations and analyses including time phase portraits, Lyapunov exponents, bifurcation diagram, and Poincaré maps. There is little difference between this chaotic system withoutequilibria and other chaotic systems with equilibria shown by phase portraits and Lyapunov exponents. But the bifurcation diagram shows that the chaotic systems without equilibria do not have characteristics such as pitchfork bifurcation, Hopf bifurcation etc. which are common to the normal chaotic systems. The Poincaré maps show that this system is a four-wing chaotic system with more complicated dynamics. Moreover, the physical existence of the four-wing chaotic attractor without equilibria is verified by an electronic circuit.

  5. Hybrid synchronization of two independent chaotic systems on complex network

    Indian Academy of Sciences (India)

    NIAN FUZHONG; LIU WEILONG

    2016-06-01

    The real network nodes are always interfered by other messages. So, how to realize the hybrid synchronization of two independent chaotic systems based on the complex network is very important. To solve this problem, two other problems should be considered. One is how the same network node of the complex network was affected by different information sources. Another is how to achieve hybrid synchronization on the network. In this paper, the theoretical analysis andnumerical simulation on various complex networks are implemented. The results indicate that the hybrid synchronization of two independent chaotic systems is feasible.

  6. Synchronization of an uncertain chaotic system via recurrent neural networks

    Institute of Scientific and Technical Information of China (English)

    谭文; 王耀南

    2005-01-01

    Incorporating distributed recurrent networks with high-order connections between neurons, the identification and synchronization problem of an unknown chaotic system in the presence of unmodelled dynamics is investigated. Based on the Lyapunov stability theory, the weights learning algorithm for the recurrent high-order neural network model is presented. Also, analytical results concerning the stability properties of the scheme are obtained. Then adaptive control law for eliminating synchronization error of uncertain chaotic plant is developed via Lyapunov methodology.The proposed scheme is applied to model and synchronize an unknown Rossler system.

  7. Fuzzy Control of Chaotic System with Genetic Algorithm

    Institute of Scientific and Technical Information of China (English)

    FANG Jian-an; GUO Zhao-xia; SHAO Shi-huang

    2002-01-01

    A novel approach to control the unpredictable behavior of chaotic systems is presented. The control algorithm is based on fuzzy logic control technique combined with genetic algorithm. The use of fuzzy logic allows for the implementation of human "rule-of-thumb" approach to decision making by employing linguistic variables. An improved Genetic Algorithm (GA) is used to learn to optimally select the fuzzy membership functions of the linguistic labels in the condition portion of each rule,and to automatically generate fuzzy control actions under each condition. Simulation results show that such an approach for the control of chaotic systems is both effective and robust.

  8. Loss of lag synchronization in coupled chaotic systems

    DEFF Research Database (Denmark)

    Sosnovtseva, Olga; Balanov, A G; Vadivasova, T E;

    1999-01-01

    Lag synchronization denotes a particular form of synchronization in which the amplitudes of two interacting, nonidentical chaotic oscillators are correlated but there is a characteristic time delay between them. We study transitions to and between different forms of synchronization...... for the attractors defined as "in-phase" and "out-of-phase" and investigate the processes by which lag synchronization is lost in two coupled Rössler systems. With a small frequency mismatch between the two systems, these processes are related to the occurrence of a peculiar form of basin structure as more and more...... periodic orbits embedded into the synchronized chaotic state become unstable in a transverse direction....

  9. Loss of lag synchronization in coupled chaotic systems

    DEFF Research Database (Denmark)

    Sosnovtseva, O.V.; Balanov, A.G.; Vadivasova, T.E.;

    1999-01-01

    Lag synchronization denotes a particular form of synchronization in which the amplitudes of two interacting, nonidentical chaotic oscillators are correlated but there is a characteristic time delay between them. We study transitions to and between different forms of synchronization...... for the attractors defined as "in-phase" and "out-of-phase" and investigate the processes by which lag synchronization is lost in two coupled Rossler systems. With a small frequency mismatch between the two systems, these processes are related to the occurrence of a peculiar form of basin structure as more and more...... periodic orbits embedded into the synchronized chaotic state become unstable in a transverse direction....

  10. Design of output feedback controller for a unified chaotic system

    Institute of Scientific and Technical Information of China (English)

    Li Wen-Lin; Chen Xiu-Qin; Shen Zhi-Ping

    2008-01-01

    In this paper,the synchronization of a unified chaotic system is investigated by the use of output feedback controllers;a two-input single-output feedback controller and single-input single-output feedback controller are presented to synchronize the unified chaotic system when the states are not all measurable.Compared with the existing results,the controllers designed in this paper have some advantages such as small feedback gain,simple structure and less conservation.Finally,numerical simulations results are provided to demonstrate the validity and effectiveness of the proposed method.

  11. Security enhanced optical encryption system by random phase key and permutation key.

    Science.gov (United States)

    He, Mingzhao; Tan, Qiaofeng; Cao, Liangcai; He, Qingsheng; Jin, Guofan

    2009-12-01

    Conventional double random phase encoding (DRPE) encrypts plaintext to white noise-like ciphertext which may attract attention of eavesdroppers, and recent research reported that DRPE is vulnerable to various attacks. Here we propose a security enhanced optical encryption system that can hide the existence of secret information by watermarking. The plaintext is encrypted using iterative fractional Fourier transform with random phase key, and ciphertext is randomly permuted with permutation key before watermarking. Cryptanalysis shows that linearity of the security system has been broken and the permutation key prevent the attacker from accessing the ciphertext in various attacks. A series of simulations have shown the effectiveness of this system and the security strength is enhanced for invisibility, nonlinearity and resistance against attacks. PMID:20052170

  12. Design and analysis of agricultural information transmission based on mixed chaotic encryption%基于混合混沌信息加密的农业信息传输的设计与分析

    Institute of Scientific and Technical Information of China (English)

    曲明哲

    2012-01-01

    Studyed the importance of information security during agricultural information transmission, based on the study of present situation of the chaotic cryptograph, designeda new compound chaotic sequence combination to meet the needs of encrypted information because it's complexity and effectiveness were improved with original chaotic nature, and this model was designed, simulated and tested. The output characteristics of the chaotic sequence generated by this model were analyzed and discussed from theoretical design and experimental result, so that the design could be better applied in the actual application.%文章研究了在农业信息传输过程中确保信息安全的重要性,根据混沌密码研究的现状提出一种新的复合混沌密钥设计,使其能在保留原混沌性质的基础上复杂性、有效性能进一步提高,更好的满足信息加密的需要.对加密模型模块进行设计、仿真、测试,对输出序列进行分析,从理论设计及实验分析上讨论由该模块产生的混沌序列的输出特性,使该设计能在实际中得到更好的应用.

  13. A universal projective synchronization of general autonomous chaotic system

    Indian Academy of Sciences (India)

    Fuzhong Nian; Zingyuan Wang; Ming Li; Ge Guo

    2012-12-01

    This paper investigates the generalized projective synchronization in general autonomous chaotic system. A universal controller is designed and the effectiveness is verified via theoretical analysis and numerical simulations. The controller design is irrelevant to concrete system structure and initial values. It has strong robustness and broad application perspective.

  14. Chaotic behaviour of a predator-prey system

    NARCIS (Netherlands)

    Kooi, B.W.; Boer, M.P.

    2003-01-01

    Generally a predator-prey system is modelled by two ordinary differential equations which describe the rate of changes of the biomasses. Since such a system is two-dimensional no chaotic behaviour can occur. In the popular Rosenzweig-MacArthur model, which replaced the Lotka-Volterra model, a stable

  15. Synchronization between two different chaotic systems with nonlinear feedback control

    Institute of Scientific and Technical Information of China (English)

    Lü Ling; Guo Zhi-An; Zhang Chao

    2007-01-01

    This paper presents chaos synchronization between two different chaotic systems by using a nonlinear controller, in which the nonlinear functions of the system are used as a nonlinear feedback term. The feedback controller is designed on the basis of stability theory, and the area of feedback gain is determined. The artificial simulation results show that this control method is commendably effective and feasible.

  16. Chaotic Motion in a Harmonically Excited Soliton System

    Institute of Scientific and Technical Information of China (English)

    YU Jun; ZHANG Wei-Jun; GAO Xiao-Ming

    2006-01-01

    The influence of a soliton system under an external harmonic excitation is considered. We take the compound KdV-Burgers equation as an example, and investigate numerically the chaotic behavior of the system with a periodic forcing. Different routes to chaos such as period doubling, quasi-periodic routes, and the shapes of strange maps.

  17. A Chaos-Based Encryption Scheme for DCT Precoded OFDM-Based Visible Light Communication Systems

    Directory of Open Access Journals (Sweden)

    Zhongpeng Wang

    2016-01-01

    Full Text Available This paper proposes a physical encryption scheme for discrete cosine transform (DCT precoded OFDM-based visible light communication systems by employing chaos scrambling. In the proposed encryption scheme, the Logistic map is adopted for the chaos mapping. The chaos scrambling strategy can allocate the two scrambling sequences to the real (I and imaginary (Q parts of OFDM frames according to the initial condition, which enhance the confidentiality of the physical layer. The simulation experimental results prove the efficiency of the proposed encryption method for DCT precoded OFDM-based VLC systems. The experimental results show that the proposed security scheme can protect the DCT precoded OFDM-based VLC from eavesdropper, while keeping the advantage of the DCT precoding technique, which can reduce the PAPR and improve the BER performance of OFDM-based VLC.

  18. Using wavefront coding technique as an optical encryption system: reliability analysis and vulnerabilities assessment

    Science.gov (United States)

    Konnik, Mikhail V.

    2012-04-01

    Wavefront coding paradigm can be used not only for compensation of aberrations and depth-of-field improvement but also for an optical encryption. An optical convolution of the image with the PSF occurs when a diffractive optical element (DOE) with a known point spread function (PSF) is placed in the optical path. In this case, an optically encoded image is registered instead of the true image. Decoding of the registered image can be performed using standard digital deconvolution methods. In such class of optical-digital systems, the PSF of the DOE is used as an encryption key. Therefore, a reliability and cryptographic resistance of such an encryption method depends on the size and complexity of the PSF used for optical encoding. This paper gives a preliminary analysis on reliability and possible vulnerabilities of such an encryption method. Experimental results on brute-force attack on the optically encrypted images are presented. Reliability estimation of optical coding based on wavefront coding paradigm is evaluated. An analysis of possible vulnerabilities is provided.

  19. Fully Digital Chaotic Differential Equation-based Systems And Methods

    KAUST Repository

    Radwan, Ahmed Gomaa Ahmed

    2012-09-06

    Various embodiments are provided for fully digital chaotic differential equation-based systems and methods. In one embodiment, among others, a digital circuit includes digital state registers and one or more digital logic modules configured to obtain a first value from two or more of the digital state registers; determine a second value based upon the obtained first values and a chaotic differential equation; and provide the second value to set a state of one of the plurality of digital state registers. In another embodiment, a digital circuit includes digital state registers, digital logic modules configured to obtain outputs from a subset of the digital shift registers and to provide the input based upon a chaotic differential equation for setting a state of at least one of the subset of digital shift registers, and a digital clock configured to provide a clock signal for operating the digital shift registers.

  20. State Prediction of Chaotic System Based on ANN Model

    Institute of Scientific and Technical Information of China (English)

    YUE Yi-hong; HAN Wen-xiu

    2002-01-01

    The choice of time delay and embedding dimension is very important to the phase space reconstruction of any chaotic time series. In this paper, we determine optimal time delay by computing autocorrelation function of time series. Optimal embedding dimension is given by means of the relation between embedding dimension and correlation dimension of chaotic time series. Based on the methods above,we choose ANN model to appoximate the given true system. At the same time, a new algorithm is applied to determine the network weights. At the end of this paper, the theory above is demonstrated through the research of time series generated by Logistic map.

  1. Adaptive projective synchronization between different chaotic systems with parametric uncertainties and external disturbances

    Indian Academy of Sciences (India)

    Mayank Srivastava; Saurabh K Agrawal; Subir Das

    2013-09-01

    The article deals with adaptive projective synchronization between two different chaotic systems with parametric uncertainties and external disturbances. Based on Lyapunov stability theory, the projective synchronization between a pair of different chaotic systems with fully unknown parameters are derived. An adaptive control law and a parameter update rule for uncertain parameters are designed such that the chaotic response system controls the chaotic drive system. Numerical simulation results are performed to explain the effectiveness and feasibility of the techniques.

  2. Digital Image Encryption Algorithm Design Based on Genetic Hyperchaos

    Directory of Open Access Journals (Sweden)

    Jian Wang

    2016-01-01

    Full Text Available In view of the present chaotic image encryption algorithm based on scrambling (diffusion is vulnerable to choosing plaintext (ciphertext attack in the process of pixel position scrambling, we put forward a image encryption algorithm based on genetic super chaotic system. The algorithm, by introducing clear feedback to the process of scrambling, makes the scrambling effect related to the initial chaos sequence and the clear text itself; it has realized the image features and the organic fusion of encryption algorithm. By introduction in the process of diffusion to encrypt plaintext feedback mechanism, it improves sensitivity of plaintext, algorithm selection plaintext, and ciphertext attack resistance. At the same time, it also makes full use of the characteristics of image information. Finally, experimental simulation and theoretical analysis show that our proposed algorithm can not only effectively resist plaintext (ciphertext attack, statistical attack, and information entropy attack but also effectively improve the efficiency of image encryption, which is a relatively secure and effective way of image communication.

  3. Color image encryption based on gyrator transform and Arnold transform

    Science.gov (United States)

    Sui, Liansheng; Gao, Bo

    2013-06-01

    A color image encryption scheme using gyrator transform and Arnold transform is proposed, which has two security levels. In the first level, the color image is separated into three components: red, green and blue, which are normalized and scrambled using the Arnold transform. The green component is combined with the first random phase mask and transformed to an interim using the gyrator transform. The first random phase mask is generated with the sum of the blue component and a logistic map. Similarly, the red component is combined with the second random phase mask and transformed to three-channel-related data. The second random phase mask is generated with the sum of the phase of the interim and an asymmetrical tent map. In the second level, the three-channel-related data are scrambled again and combined with the third random phase mask generated with the sum of the previous chaotic maps, and then encrypted into a gray scale ciphertext. The encryption result has stationary white noise distribution and camouflage property to some extent. In the process of encryption and decryption, the rotation angle of gyrator transform, the iterative numbers of Arnold transform, the parameters of the chaotic map and generated accompanied phase function serve as encryption keys, and hence enhance the security of the system. Simulation results and security analysis are presented to confirm the security, validity and feasibility of the proposed scheme.

  4. Hardware realization of chaos based block cipher for image encryption

    KAUST Repository

    Barakat, Mohamed L.

    2011-12-01

    Unlike stream ciphers, block ciphers are very essential for parallel processing applications. In this paper, the first hardware realization of chaotic-based block cipher is proposed for image encryption applications. The proposed system is tested for known cryptanalysis attacks and for different block sizes. When implemented on Virtex-IV, system performance showed high throughput and utilized small area. Passing successfully in all tests, our system proved to be secure with all block sizes. © 2011 IEEE.

  5. Tracking Control and Synchronization for Two-Dimension Discrete Chaotic Systems

    Institute of Scientific and Technical Information of China (English)

    2002-01-01

    The popular method of tracking control and synchronization for two-dimension discrete chaotic systems is put forward in this paper, and the chaotic system track arbitrarily reference signal is realized. This method is applied to two chaotic systems, and one can get good control result.

  6. Synchronization in driven chaotic systems: Diagnostics and bifurcations

    DEFF Research Database (Denmark)

    Vadivasova, T.E.; Balanov, A.G.; Sosnovtseva, O.V.;

    1999-01-01

    We investigate generic aspects of chaos synchronization in an externally forced Rössler system. By comparing different diagnostic methods, we show the existence of a well-defined cut-off of synchronization associated with the transition from weak to fully developed chaos. Two types of chaotic beh...

  7. Chaotic Dynamics and Transport in Classical and Quantum Systems

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2003-07-01

    The aim of this summer school is to provide a set of extended and pedagogical lectures, on the major present-day topics in dynamical systems and statistical mechanics including applications. Some articles are dedicated to chaotic transport in plasma turbulence and to quantum chaos. This document gathers the summaries of some presentations.

  8. Intrinsic Chaoticity in Stable Classical Systems and Quantum Fluctuations

    CERN Document Server

    De Martino, S; Illuminati, F

    1997-01-01

    We postulate the existence of a universal Keplerian tremor for any stable classical complex system on every scale. Deriving the characteristic unit of action $\\alpha$ for each classical interaction, we obtain in all cases $\\alpha connected to an intrinsic chaoticity needed to assure stability of matter. Introducing temperature, we provide further consistency checks corroborating our hypothesis.

  9. Multiscality in the Dynamics of Coupled Chaotic Systems

    DEFF Research Database (Denmark)

    Pavlov, A.N.; Sosnovtseva, Olga; Ziganshin, A.R.;

    2002-01-01

    We investigate the scaling features of complex motions in systems of two coupled chaotic oscillators by means of the wavelet-transform modulus maxima method and the detrended fluctuation analysis. We show that the transition from asynchronous to synchronous dynamics typically reduces the degree o...

  10. Linearly Coupled Synchronization of the New Chaotic Systems

    Institute of Scientific and Technical Information of China (English)

    LU Jun-an; ZHOU Jin; LI Yi-tian

    2005-01-01

    This paper investigates synchronization within the new systems, which we denote as Liu system in this paper. New stability criteria for synchronization of linearly coupled Liu systems are attained using the Lyapunov method. Some sufficient conditions for synchronization are concluded through rigorous mathematical theory, which can be further applied to more chaotic systems. Moreover, numerical simulations are given to show the effectiveness of our synchronization criterions.

  11. Nonlinear Filtering Preserves Chaotic Synchronization via Master-Slave System

    Directory of Open Access Journals (Sweden)

    J. S. González-Salas

    2013-01-01

    Full Text Available We present a study on a class of interconnected nonlinear systems and give some criteria for them to behave like a filter. Some chaotic systems present this kind of interconnected nonlinear structure, which enables the synchronization of a master-slave system. Interconnected nonlinear filters have been defined in terms of interconnected nonlinear systems. Furthermore, their behaviors have been studied numerically and theoretically on different input signals.

  12. Chaotic Motion in the Solar System and Beyond

    Science.gov (United States)

    Lissauer, Jack; DeVincenzi, Donald (Technical Monitor)

    2001-01-01

    The motion of planetary bodies is the archetypal clockwork system. Indeed, clocks and calendars were developed to keep track of the relative motions of the Earth, the Sun and the Moon. However, studies over the past few decades imply that this predictable regularity does not extend to small bodies, nor does it apply to the precise trajectories of the planets themselves over long timescale.s. Various examples of chaotic motion within our Solar System and, extrasolar planetary systems will be discussed.

  13. Encryption for digital content

    CERN Document Server

    Kiayias, Aggelos

    2010-01-01

    Encryption for Digital Content is an area in cryptography that is widely used in commercial productions (e.g., Blu-Ray and HD-DVDs). This book provides a comprehensive mathematical treatment of combinatorial encryption techniques used in digital content distribution systems and related attack models. A complete description of broadcast encryption with various revocation and tracing functionalities is included. ""Encryption for Digital Content"" introduces the subset cover framework (currently used in AACS, Blu-Ray and HD-DVDs,) and tracking/revocation mechanisms in various attack models. Pirat

  14. Hybrid optical-digital encryption system based on wavefront coding paradigm

    Science.gov (United States)

    Konnik, Mikhail V.

    2012-04-01

    The wavefront coding is a widely used in the optical systems to compensate aberrations and increase the depth of field. This paper presents experimental results on application of the wavefront coding paradigm for data encryption. We use a synthesised diffractive optical element (DOE) to deliberately introduce a phase distortion during the images registration process to encode the acquired image. In this case, an optical convolution of the input image with the point spread function (PSF) of the DOE is registered. The encryption is performed optically, and is therefore is fast and secure. Since the introduced distortion is the same across the image, the decryption is performed digitally using deconvolution methods. However, due to noise and finite accuracy of a photosensor, the reconstructed image is degraded but still readable. The experimental results, which are presented in this paper, indicate that the proposed hybrid optical-digital system can be implemented as a portable device using inexpensive off-the-shelf components. We present the results of optical encryption and digital restoration with quantitative estimations of the images quality. Details of hardware optical implementation of the hybrid optical-digital encryption system are discussed.

  15. Multilevel Image Encryption

    OpenAIRE

    S Rakesh; Kaller, Ajitkumar A; Shadakshari, B. C.; Annappa, B.

    2012-01-01

    With the fast evolution of digital data exchange and increased usage of multi media images, it is essential to protect the confidential image data from unauthorized access. In natural images the values and position of the neighbouring pixels are strongly correlated. The method proposed in this paper, breaks this correlation increasing entropy of the position and entropy of pixel values using block shuffling and encryption by chaotic sequence respectively. The plain-image is initially row wise...

  16. Pitchfork bifurcation and circuit implementation of a novel Chen hyper-chaotic system

    Institute of Scientific and Technical Information of China (English)

    Dong En-Zeng; Chen Zeng-Qiang; Chen Zai-Ping; Ni Jian-Yun

    2012-01-01

    In this paper,a novel four dimensional hyper-chaotic system is coined based on the Chen system,which contains two quadratic terms and five system parameters.The proposed system can generate a hyper-chaotic attractor in wide parameters regions.By using the center manifold theorem and the local bifurcation theory,a pitchfork bifurcation is demonstrated to arise at the zero equilibrium point.Numerical analysis demonstrates that the hyper-chaotic system can generate complex dynamical behaviors,e.g.,a direct transition from quasi-periodic behavior to hyper-chaotic behavior.Finally,an electronic circuit is designed to implement the hyper-chaotic system,the experimental results are consist with the numerical simulations,which verifies the existence of the hyper-chaotic attractor.Due to the complex dynamic behaviors,this new hyper-chaotic system is useful in the secure communication.

  17. On "Universal" Correlations in Disordered and Chaotic Systems

    OpenAIRE

    Zakrzewski, Jakub

    1995-01-01

    Numerical study of the parametric motion of energy levels in a model system built on Random Matrix Theory is presented. The correlation function of levels' slopes (the so called velocity correlation function) is determined numerically and compared with its limiting analytic form when available. A simple analytic form of the velocity correlation function is proposed which very well reproduces numerical data. The results should be directly applicable in studies of chaotic or mesoscopic systems.

  18. A Retrospection of Chaotic Phenomena in Electrical Systems

    Directory of Open Access Journals (Sweden)

    Umesh Kumar

    1998-01-01

    Full Text Available In the last decade new phenomena have been observed in all areas of non linear dynamics, principal among these being ‘Chaotic phenomena’. Chaos has been reported virtually from every scientific discipline. This paper summarizes a study of the chaotic phenomena in electrical systems and attempts to translate the mathematical ideas and techniques into language that engineers and applied scientists can use to study ‘Chaos’. Towards this end, the paper has summarized the study of chaos in several examples like Chua’s circuit family; Folded Torus circuit; non-autonomous circuits; switched capacitor circuits and hyper-chaos circuits. As observed in power systems, control systems and digital filters, chaos has been exhibited and shown on examples.

  19. Chaotic oscillations and cycles in multi-trophic ecological systems.

    Science.gov (United States)

    Stone, Lewi; He, Daihai

    2007-09-21

    A set of multi-trophic population models are described, all of which yield an interesting form of chaotic dynamics-namely, the populations cycle in a periodic fashion, yet the peak abundance within each cycle is erratic and irregular over time. Since there are many ecological and biological systems that are characterized with this same form of "uniform phase-growth and chaotic amplitude (UPCA)," these models should be useful in a range of applications. We discuss their relevance to the well-known Canadian hare-lynx system, and other small mammal foodwebs which together comprise wildlife's unusual "four and ten year cycle." The dynamics of the model equations are analysed and an explanation is given as to the source of the UPCA dynamics in the new class of foodweb systems presented, and in others found in the literature. PMID:17602706

  20. Improvement of Networked Control Systems Performance Using a New Encryption Algorithm

    Directory of Open Access Journals (Sweden)

    Seyed Ali Mesbahifard

    2014-07-01

    Full Text Available Networked control systems are control systems which controllers and plants are connected via telecommunication network. One of the most important challenges in networked control systems is the problem of network time delay. Increasing of time delay may affect on control system performance extremely. Other important issue in networked control systems is the security problems. Since it is possible that unknown people access to network especially Internet, the probability of terrible attacks such as deception attacks is greater, therefore presentation of methods which could decrease time delay and increase system immunity are desired. In this paper a symmetric encryption with low data volume against deception attacks is proposed. This method has high security and low time delay rather than the other encryption algorithms and could improve the control system performance against deception attacks.

  1. Design and Implementation of a Wireless Speech Chaotic Secure Communication System%一种无线语音混沌保密通信系统的设计与实现

    Institute of Scientific and Technical Information of China (English)

    徐礼国; 禹思敏

    2011-01-01

    In order to implement wireless transmission and decryption playback of the encrypted chaotic speech signals,based on the system hardware platform which is consisted of DSP chip TMS320VC5509A, radio frequency chip nRF24L01 and audio codec chip TLV320AIC23, the Euler algorithm is used to discretize the continuous Lorenz chaotic system for genetating chaotic digital sequences, which are used for encryption and decryption.The experiment of wireless transmission is performed on the encrypted speech signals, and the receiver can decrypt the encrypted speech signals.The witeless chaotic secure communication of speech signals is achieved.%为了实现对混沌加密语音信号的无线传输和解密回放,在由DSP芯片TMS320VC5509A、无线射频芯片nRF24L01和音频编解码芯片TLV320AIC23构成的系统硬件平台上,采用Euler算法对连续Lorenz混沌系统进行离散化处理,产生出用于加密和解密的混沌数字序列.对加密后的语音信号进行了无线传输的实验,接收端能够将收到的加密语音信号解密回放,实现了语音信号的无线混沌保密通信.

  2. Complete chaotic synchronization in mutually coupled time-delay systems.

    Science.gov (United States)

    Landsman, Alexandra S; Schwartz, Ira B

    2007-02-01

    Complete chaotic synchronization of end lasers has been observed in a line of mutually coupled, time-delayed system of three lasers, with no direct communication between the end lasers. The present paper uses ideas from generalized synchronization to explain the complete synchronization in the presence of long coupling delays, applied to a model of mutually coupled semiconductor lasers in a line. These ideas significantly simplify the analysis by casting the stability in terms of the local dynamics of each laser. The variational equations near the synchronization manifold are analyzed, and used to derive the synchronization condition that is a function of parameters. The results explain and predict the dependence of synchronization on various parameters, such as time delays, strength of coupling and dissipation. The ideas can be applied to understand complete synchronization in other chaotic systems with coupling delays and no direct communication between synchronized subsystems.

  3. The Robustness Optimization of Parameter Estimation in Chaotic Control Systems

    Directory of Open Access Journals (Sweden)

    Zhen Xu

    2014-10-01

    Full Text Available Standard particle swarm optimization algorithm has problems of bad adaption and weak robustness in the parameter estimation model of chaotic control systems. In light of this situation, this paper puts forward a new estimation model based on improved particle swarm optimization algorithm. It firstly constrains the search space of the population with Tent and Logistic double mapping to regulate the initialized population size, optimizes the fitness value by evolutionary state identification strategy so as to avoid its premature convergence, optimizes the inertia weight by the nonlinear decrease strategy to reach better global and local optimal solution, and then optimizes the iteration of particle swarm optimization algorithm with the hybridization concept from genetic algorithm. Finally, this paper applies it into the parameter estimation of chaotic systems control. Simulation results show that the proposed parameter estimation model shows higher accuracy, anti-noise ability and robustness compared with the model based on standard particle swarm optimization algorithm.

  4. Chaotic time series. Part II. System Identification and Prediction

    Directory of Open Access Journals (Sweden)

    Bjørn Lillekjendlie

    1994-10-01

    Full Text Available This paper is the second in a series of two, and describes the current state of the art in modeling and prediction of chaotic time series. Sample data from deterministic non-linear systems may look stochastic when analysed with linear methods. However, the deterministic structure may be uncovered and non-linear models constructed that allow improved prediction. We give the background for such methods from a geometrical point of view, and briefly describe the following types of methods: global polynomials, local polynomials, multilayer perceptrons and semi-local methods including radial basis functions. Some illustrative examples from known chaotic systems are presented, emphasising the increase in prediction error with time. We compare some of the algorithms with respect to prediction accuracy and storage requirements, and list applications of these methods to real data from widely different areas.

  5. A Devaney Chaotic System Which Is Neither Distributively nor Topologically Chaotic

    Institute of Scientific and Technical Information of China (English)

    Chen Zhi-zhi; Liao Li; Wang Wei

    2013-01-01

    Weiss proved that Devaney chaos does not imply topological chaos and Oprocha pointed out that Devaney chaos does not imply distributional chaos. In this paper, by constructing a simple example which is Devaney chaotic but neither distributively nor topologically chaotic, we give a unified proof for the results of Weiss and Oprocha.

  6. Generation and control of multi-scroll chaotic attractors in fractional order systems

    International Nuclear Information System (INIS)

    The objective of this paper is twofold: on one hand we demonstrate the generation of multi-scroll attractors in fractional order chaotic systems. Then, we design state feedback controllers to eliminate chaos from the system trajectories. It is demonstrated that modifying the underlying nonlinearity of the fractional chaotic system results in the birth of multiple chaotic attractors, thus forming the so called multi-scroll attractors. The presence of chaotic behavior is evidenced by a positive largest Lyapunov exponent computed for the output time series. We investigate generation and control of multi-scroll attractors in two different models, both of which are fractional order and chaotic: an electronic oscillator, and a mechanical 'jerk' model. The current findings extend previously reported results on generation of n-scroll attractors from the domain of integer order to the domain of fractional order chaotic systems, and addresses the issue of controlling such chaotic behaviors. Our investigations are validated through numerical simulations

  7. Electro-optic intensity chaotic system with varying parameters

    Energy Technology Data Exchange (ETDEWEB)

    Hu, Hanping; Su, Wei; Liu, Lingfeng, E-mail: vatanoilcy@163.com; Yu, Zhiliang

    2014-01-10

    We propose a kind of chaotic system based on electro-optical oscillator with varying parameters, the results show that the system can enter chaos with a low gain, and can hide the delay time effectively. Furthermore, the system is more complex than the general one (with higher Lyapunov exponents and dimension). The system can achieve synchronous communication with information rate 10 Gbit/s, in 400 km optical fiber transmission distance. Furthermore, we find the system is more sensitive than the conventional system when the delay time is mismatched.

  8. Preference of Chaotic Synchronization in a Coupled Laser System

    Institute of Scientific and Technical Information of China (English)

    ZHOU Yun; ZHU Shi-Qun; WU Liang

    2005-01-01

    In a coupled laser system, the dynamics of the receiving laser is investigated when two separate transmitting lasers are injected into the receiving laser with different coupling strengths. It is shown that the phenomenon of preference of chaotic synchronization appears under appropriate coupling conditions. The receiving laser will entrain the pulses of either one or both transmitting lasers when the coupling is strong while it keeps its own dynamics when the coupling is weak.

  9. A kind of fuzzy control for chaotic systems

    Institute of Scientific and Technical Information of China (English)

    WANG Hong-wei; MA Guang-fu

    2007-01-01

    With a T-S fuzzy dynamic model approximating to a non-linear system, the nonlinear system can be decomposed into some local linear models. A variable structure controller based on Lyapunov theories is designed to guarantee the global stability of the T-S fuzzy model. The controlling problems of a nonlinear system can be solved by means of consisting of linear system variable structure control and fuzzy control. The validity of the control method based on the simulating result of two kinds of chaotic systems is shown here.

  10. Global bifurcations in fractional-order chaotic systems with an extended generalized cell mapping method.

    Science.gov (United States)

    Liu, Xiaojun; Hong, Ling; Jiang, Jun

    2016-08-01

    Global bifurcations include sudden changes in chaotic sets due to crises. There are three types of crises defined by Grebogi et al. [Physica D 7, 181 (1983)]: boundary crisis, interior crisis, and metamorphosis. In this paper, by means of the extended generalized cell mapping (EGCM), boundary and interior crises of a fractional-order Duffing system are studied as one of the system parameters or the fractional derivative order is varied. It is found that a crisis can be generally defined as a collision between a chaotic basic set and a basic set, either periodic or chaotic, to cause a sudden discontinuous change in chaotic sets. Here chaotic sets involve three different kinds: a chaotic attractor, a chaotic saddle on a fractal basin boundary, and a chaotic saddle in the interior of a basin and disjoint from the attractor. A boundary crisis results from the collision of a periodic (or chaotic) attractor with a chaotic (or regular) saddle in the fractal (or smooth) boundary. In such a case, the attractor, together with its basin of attraction, is suddenly destroyed as the control parameter passes through a critical value, leaving behind a chaotic saddle in the place of the original attractor and saddle after the crisis. An interior crisis happens when an unstable chaotic set in the basin of attraction collides with a periodic attractor, which causes the appearance of a new chaotic attractor, while the original attractor and the unstable chaotic set are converted to the part of the chaotic attractor after the crisis. These results further demonstrate that the EGCM is a powerful tool to reveal the mechanism of crises in fractional-order systems.

  11. THRIVE: threshold homomorphic encryption based secure and privacy preserving biometric verification system

    Science.gov (United States)

    Karabat, Cagatay; Kiraz, Mehmet Sabir; Erdogan, Hakan; Savas, Erkay

    2015-12-01

    In this paper, we introduce a new biometric verification and template protection system which we call THRIVE. The system includes novel enrollment and authentication protocols based on threshold homomorphic encryption where a private key is shared between a user and a verifier. In the THRIVE system, only encrypted binary biometric templates are stored in a database and verification is performed via homomorphically randomized templates, thus, original templates are never revealed during authentication. Due to the underlying threshold homomorphic encryption scheme, a malicious database owner cannot perform full decryption on encrypted templates of the users in the database. In addition, security of the THRIVE system is enhanced using a two-factor authentication scheme involving user's private key and biometric data. Using simulation-based techniques, the proposed system is proven secure in the malicious model. The proposed system is suitable for applications where the user does not want to reveal her biometrics to the verifier in plain form, but needs to prove her identity by using biometrics. The system can be used with any biometric modality where a feature extraction method yields a fixed size binary template and a query template is verified when its Hamming distance to the database template is less than a threshold. The overall connection time for the proposed THRIVE system is estimated to be 336 ms on average for 256-bit biometric templates on a desktop PC running with quad core 3.2 GHz CPUs at 10 Mbit/s up/down link connection speed. Consequently, the proposed system can be efficiently used in real-life applications.

  12. Robust Blind Adaptive Channel Equalization in Chaotic Communication Systems

    Institute of Scientific and Technical Information of China (English)

    ZHANG Jia-Shu

    2006-01-01

    Based on the bounded property and statistics of chaotic signal and the idea of set-membership identification,we propose a set-membership generalized least mean square (SM-GLMS) algorithm with variable step size for blind adaptive channel equalization in chaotic communication systems. The steady state performance of the proposed SM-GLMS algorithm is analysed, and comparison with an extended Kalman filter (EKF)-based adaptive algorithm and variable gain least mean square (VG-LMS) algorithm is performed for blind adaptive channel equalization. Simulations show that the proposed SM-GLMS algorithm can provide more significant steady state performance improvement than the EKF-based adaptive algorithm and VG-LMS algorithm.

  13. Quantifying Volume Changing Perturbations in a Wave Chaotic System

    CERN Document Server

    Taddese, Biniyam Tesfaye; Moglie, Franco; Antonsen, Thomas M; Ott, Edward; Anlage, Steven M

    2012-01-01

    A sensor was developed to quantitatively measure perturbations which change the volume of a wave chaotic cavity while leaving its shape intact. The sensors work in the time domain by using either scattering fidelity of the transmitted signals or the classical analog of the Loschmidt echo. The sensors were tested experimentally by inducing volume changing perturbations to a one cubic meter pseudo-integrable, real-world cavity. Perturbations which caused a volume change that is as small as 54 parts in a million were quantitatively measured. These results were obtained by using electromagnetic waves with a wavelength of about $5cm$, therefore, the sensor is sensitive to extreme sub-wavelength changes of the boundaries of a cavity. The experimental results were compared with Finite Difference Time Domain (FDTD) simulation results, and good agreement was found. Furthermore, the sensor was tested using a frequency domain approach on a numerical model of the star graph, which is a representative wave chaotic system....

  14. A NEW SLIDING MODE CONTROL FOR A CLASS OF UNCERTAIN TIME-DELAY CHAOTIC SYSTEMS

    Institute of Scientific and Technical Information of China (English)

    LI LI-XIANG; PENG HAI-PENG; GUAN BAO-ZHU; XU JIN-MING

    2001-01-01

    We propose a new sliding mode control scheme for a class of uncertain time-delay chaotic systems. It is shown that a linear time invariant system with the desired system dynamics is used as a reference model for the output of a time-delay chaotic system to track. A sliding mode controller is then designed to drive the output of the time-delay chaotic system to track the desired linear system. On the sliding mode, the output of the controlled time-delay chaotic system can behave like the desired linear system. A simulation example is given in support of the proposed control scheme.

  15. Construction and Verification of a Simple Smooth Chaotic System

    Institute of Scientific and Technical Information of China (English)

    2007-01-01

    This article introduces a new chaotic system of three-dimensional quadratic autonomous ordinary differential equations, which can display different attractors with two unstable equilibrium points and four unstable equilibrium points respectively. Dynamical properties of this system are then studied. Furthermore, by applying the undetermined coefficient method, heteroclinic orbit of (S)hil'nikov's type in this system is found and the convergence of the series expansions of this heteroclinic orbit are proved in this article. The (S)hil'nikov's theorem guarantees that this system has Smale horseshoes and the horseshoe chaos.

  16. Circuit Implementation and Antisynchronization of an Improved Lorenz Chaotic System

    Directory of Open Access Journals (Sweden)

    Li Xiong

    2016-01-01

    Full Text Available An improved Lorenz chaotic system is proposed, making it into a circuit which is easy to be implemented by using some basic electronic components. The antisynchronization error systems can be asymptotically stabilized at the origin with three different methods which are proposed to control the improved Lorenz system. Theoretical analyses and simulation results are given to demonstrate the feasibility and effectiveness of these proposed schemes. Then the hardware circuit for the proposed Lorenz system is implemented by repeated optimization design. Experimental results show that the circuit has good comprehensive performance.

  17. Impulsive control for synchronization of nonlinear R(o)ssler chaotic systems

    Institute of Scientific and Technical Information of China (English)

    Li Yang; Liao Xiao-Feng; Li Chuan-Dong; Chen Guo

    2006-01-01

    This paper reports that an impulsive control theory for synchronization of nonlinear R(o)ssler chaotic systems is developed. A new framework for impulsive synchronization between such chaotic systems is presented, which makes the synchronization error system a linear impulsive control system. Therefore, it is easy to derive the impulsive synchronization law. The proposed impulsive control scheme is illustrated by nonlinear R(o)ssler chaotic systems and the simulation results demonstrate the effectiveness of the method.

  18. Chaos enhanced differential evolution in the task of evolutionary control of selected set of discrete chaotic systems.

    Science.gov (United States)

    Senkerik, Roman; Zelinka, Ivan; Pluhacek, Michal; Davendra, Donald; Oplatková Kominkova, Zuzana

    2014-01-01

    Evolutionary technique differential evolution (DE) is used for the evolutionary tuning of controller parameters for the stabilization of set of different chaotic systems. The novelty of the approach is that the selected controlled discrete dissipative chaotic system is used also as the chaotic pseudorandom number generator to drive the mutation and crossover process in the DE. The idea was to utilize the hidden chaotic dynamics in pseudorandom sequences given by chaotic map to help differential evolution algorithm search for the best controller settings for the very same chaotic system. The optimizations were performed for three different chaotic systems, two types of case studies and developed cost functions.

  19. Chaos Enhanced Differential Evolution in the Task of Evolutionary Control of Selected Set of Discrete Chaotic Systems

    Directory of Open Access Journals (Sweden)

    Roman Senkerik

    2014-01-01

    Full Text Available Evolutionary technique differential evolution (DE is used for the evolutionary tuning of controller parameters for the stabilization of set of different chaotic systems. The novelty of the approach is that the selected controlled discrete dissipative chaotic system is used also as the chaotic pseudorandom number generator to drive the mutation and crossover process in the DE. The idea was to utilize the hidden chaotic dynamics in pseudorandom sequences given by chaotic map to help differential evolution algorithm search for the best controller settings for the very same chaotic system. The optimizations were performed for three different chaotic systems, two types of case studies and developed cost functions.

  20. A New Feigenbaum-Like Chaotic 3D System

    Directory of Open Access Journals (Sweden)

    Huitao Zhao

    2014-01-01

    Full Text Available Based on Sprott N system, a new three-dimensional autonomous system is reported. It is demonstrated to be chaotic in the sense of having positive largest Lyapunov exponent and fractional dimension. To further understand the complex dynamics of the system, some basic properties such as Lyapunov exponents, bifurcation diagram, Poincaré mapping, and period-doubling route to chaos are analyzed with careful numerical simulations. The obtained results also show that the period-doubling sequence of bifurcations leads to a Feigenbaum-like strange attractor.

  1. Synchronization of Discrete-Time Chaotic Systems in Bandlimited Channels

    Directory of Open Access Journals (Sweden)

    Marcio Eisencraft

    2009-01-01

    Full Text Available Over the last couple of decades, many methods for synchronizing chaotic systems have been proposed with communications applications in view. Yet their performance has proved disappointing in face of the nonideal character of usual channels linking transmitter and receiver, that is, due to both noise and signal propagation distortion. Here we consider a discrete-time master-slave system that synchronizes despite channel bandwidth limitations and an allied communication system. Synchronization is achieved introducing a digital filter that limits the spectral content of the feedback loop responsible for producing the transmitted signal.

  2. Fourier's law for quasi-one-dimensional chaotic quantum systems

    Science.gov (United States)

    Seligman, Thomas H.; Weidenmüller, Hans A.

    2011-05-01

    We derive Fourier's law for a completely coherent quasi-one-dimensional chaotic quantum system coupled locally to two heat baths at different temperatures. We solve the master equation to first order in the temperature difference. We show that the heat conductance can be expressed as a thermodynamic equilibrium coefficient taken at some intermediate temperature. We use that expression to show that for temperatures large compared to the mean level spacing of the system, the heat conductance is inversely proportional to the level density and, thus, inversely proportional to the length of the system.

  3. Adaptive control of uncertain time-delay chaotic systems

    Institute of Scientific and Technical Information of China (English)

    Zhuhong ZHANG

    2005-01-01

    This work investigates adaptive control of a large class of uncertain me-delay chaotic systems (UTCSs) with unknown general perturbation terms bounded by a polynomial ( unknown gains). Associated with the different cases of known and unknown system matrices, two corresponding adaptive controllers are proposed to stabilize unstable fixed points of the systems by means of Lyapunov stability theory and linear matrix inequalities (LMI) which can be solved easily by convex optimization algorithms. Two examples are used for examining the effectiveness of the proposed methods.

  4. Chaotic dynamics in N-body systems

    NARCIS (Netherlands)

    Boekholt, Tjarda Coenraad Nico

    2015-01-01

    Ever since Isaac Newton in 1687 posed the N-body problem, astronomers have been looking for its solutions in order to understand the evolution of dynamical systems, such as our own solar system, star clusters and galaxies. The main difficulty is that small errors grow exponentially, so that numerica

  5. Chaotic Phenomena in Technical Control Systems

    DEFF Research Database (Denmark)

    Mosekilde, Erik

    1997-01-01

    The paper discusses a number of examples of technical control systems that can exhibit deterministic chaos and other forms of complex nonlinear behavior. These examples include thermostatically regulated radiators, closely placed refrigirators, and industrial cooling compressors. The paper contin...

  6. Experimental optical encryption system based on a single-lens imaging architecture combined with a phase retrieval algorithm

    International Nuclear Information System (INIS)

    We propose, and experimentally demonstrate, a single-lens imaging system as a compact encoding architecture by using a hybrid protocol for data processing. The encryption process consists of coherent light illuminating a random phase mask attached to an input image (the data), then the outgoing complex field propagates until reaching a second random phase mask next to a lens: encrypted data is obtained at some output plane after the lens. We demonstrate the feasibility of this proposal, and highlight the advantages of using tridimensional speckle as a secure random carrier instead of a standard ciphertext recording—holographic-based encryption techniques. Moreover, we expose the compact system benefits compared to conventional encrypting architectures in terms of energy loss and tolerance against classical attacks applicable to any linear cryptosystem. Experimental results validate our approach. (paper)

  7. Hybrid Dislocated Control and General Hybrid Projective Dislocated Synchronization for Memristor Chaotic Oscillator System

    Directory of Open Access Journals (Sweden)

    Junwei Sun

    2014-01-01

    Full Text Available Some important dynamical properties of the memristor chaotic oscillator system have been studied in the paper. A novel hybrid dislocated control method and a general hybrid projective dislocated synchronization scheme have been realized for memristor chaotic oscillator system. The paper firstly presents hybrid dislocated control method for stabilizing chaos to the unstable equilibrium point. Based on the Lyapunov stability theorem, general hybrid projective dislocated synchronization has been studied for the drive memristor chaotic oscillator system and the same response memristor chaotic oscillator system. For the different dimensions, the memristor chaotic oscillator system and the other chaotic system have realized general hybrid projective dislocated synchronization. Numerical simulations are given to show the effectiveness of these methods.

  8. A Novel Image Encryption Algorithm Based on DNA Encoding and Spatiotemporal Chaos

    Directory of Open Access Journals (Sweden)

    Chunyan Song

    2015-10-01

    Full Text Available DNA computing based image encryption is a new, promising field. In this paper, we propose a novel image encryption scheme based on DNA encoding and spatiotemporal chaos. In particular, after the plain image is primarily diffused with the bitwise Exclusive-OR operation, the DNA mapping rule is introduced to encode the diffused image. In order to enhance the encryption, the spatiotemporal chaotic system is used to confuse the rows and columns of the DNA encoded image. The experiments demonstrate that the proposed encryption algorithm is of high key sensitivity and large key space, and it can resist brute-force attack, entropy attack, differential attack, chosen-plaintext attack, known-plaintext attack and statistical attack.

  9. Chaotic diffusion in the Solar System

    OpenAIRE

    Laskar, Jacques

    2008-01-01

    A statistical analysis is performed over more than 1001 different integrations of the secular equations of the Solar system over 5 Gyr. With this secular system, the probability of the eccentricity of Mercury to reach 0.6 in 5 Gyr is about 1 to 2 %. In order to compare with (Ito and Tanikawa, 2002), we have performed the same analysis without general relativity, and obtained even more orbits of large eccentricity for Mercury. We have performed as well a direct integration of the planetary orb...

  10. Instantaneous frequencies of a chaotic system

    Indian Academy of Sciences (India)

    C Chandre; T Uzer

    2005-03-01

    The structure and geometry of high-dimensional, complex dynamical systems is usually hidden under a profusion of numerical data. We show that time–frequency analysis allows one to analyze these data regardless of the number of degrees of freedom. Our method takes snapshots of the system in terms of its instantaneous frequencies defined as ridges of the time–frequency landscape. Using the wavelet transform of a single trajectory, it can characterize key dynamical properties like the extent of chaos, resonance transitions and trappings.

  11. A new three-dimensional chaotic system and its modified generalized projective synchronization

    Institute of Scientific and Technical Information of China (English)

    Dai Hao; Jia Li-Xin; Hui Meng; Si Gang-Quan

    2011-01-01

    Based on the Chen chaotic system, this paper constructs a new three-dimensional chaotic system with higher order nonlinear term and studies the basic dynamic behaviours of the system. The modified generalized projective synchronization has been observed in the coupled new three-dimensional chaotic system with unknown parameters.Furthermore, based on Lyapunov stability theory, it obtains the control laws and adaptive laws of parameters to make modified generalized projective synchronization of the coupled new three-dimensional chaotic systems. Numerical simulation results are presented to illustrate the effectiveness of this method.

  12. NUMERICAL ANALYSIS OF A CHAOTIC SYSTEM

    Institute of Scientific and Technical Information of China (English)

    任志坚

    2001-01-01

    This paper further proves that a single spiral strange attractor can be observed in an extremely simple autonomous electrical circuit by computer simulation. It is of third order and has only one nonlinear element: a three-segment piecewise linear resistor. The digital analyses show that the strange attractor has peculiar features compared with other third-order differential systems.

  13. Chaotic systems in complex phase space

    CERN Document Server

    Bender, Carl M; Hook, Daniel W; Weir, David J

    2008-01-01

    This paper examines numerically the complex classical trajectories of the kicked rotor and the double pendulum. Both of these systems exhibit a transition to chaos, and this feature is studied in complex phase space. Additionally, it is shown that the short-time and long-time behaviors of these two PT-symmetric dynamical models in complex phase space exhibit strong qualitative similarities.

  14. Chaotic mechanics in systems with impacts and friction

    CERN Document Server

    Blazejczyk-Okolewska, Barbara; Kapitaniak, Tomasz; Wojewoda, Jerzy

    1999-01-01

    This book is devoted to the theory of chaotic oscillations in mechanical systems. Detailed descriptions of the basic types of nonlinearity - impacts and dry friction - are presented. The properties of such behavior are discussed, and the numerical and experimental results obtained by the authors are presented.The dynamic properties of systems described here can be useful in the proper design and use of mechanics where such behavior still creates problems.This book will be very useful for anyone with a fundamental knowledge of nonlinear mechanics who is beginning research in the field.

  15. Characterization of a periodically driven chaotic dynamical system

    CERN Document Server

    Crisanti, A; Lacorata, G; Purini, R; Crisanti, A

    1996-01-01

    We discuss how to characterize the behavior of a chaotic dynamical system depending on a parameter that varies periodically in time. In particular, we study the predictability time, the correlations and the mean responses, by defining a local--in--time version of these quantities. In systems where the time scale related to the time periodic variation of the parameter is much larger than the ``internal'' time scale, one has that the local quantities strongly depend on the phase of the cycle. In this case, the standard global quantities can give misleading information.

  16. Low-power Implementation of an Encryption/Decryption System with Asynchronous Techniques

    Directory of Open Access Journals (Sweden)

    Nikos Sklavos

    2002-01-01

    Full Text Available An asynchronous VLSI implementation of the International Data Encryption Algorithm (IDEA is presented in this paper. In order to evaluate the asynchronous design a synchronous version of the algorithm was also designed. VHDL hardware description language was used in order to describe the algorithm. By using Synopsys commercial available tools the VHDL code was synthesized. After placing and routing both designs were fabricated with 0.6 μm CMOS technology. With a system clock of up to 8 MHz and a power supply of 5 V the two chips were tested and evaluated comparing with the software implementation of the IDEA algorithm. This new approach proves efficiently the lowest power consumption of the asynchronous implementation compared to the existing synchronous. Therefore, the asynchronous chip performs efficiently in Wireless Encryption Protocols and high speed networks.

  17. An optical authentication system based on encryption technique and multimodal biometrics

    Science.gov (United States)

    Yuan, Sheng; Zhang, Tong; Zhou, Xin; Liu, Xuemei; Liu, Mingtang

    2013-12-01

    A major concern nowadays for a biometric credential management system is its potential vulnerability to protect its information sources. To prevent a genuine user's templates from both internal and external threats, a novel and simple method combined optical encryption with multimodal biometric authentication technique is proposed. In this method, the standard biometric templates are generated real-timely by the verification keys owned by legal user so that they are unnecessary to be stored in a database. Compared with the traditional recognition algorithms, storage space and matching time are greatly saved. In addition, the verification keys are difficult to be forged due to the utilization of optical encryption technique. Although the verification keys are lost or stolen, they are useless for others in absence of the legal owner's biometric. A series of numerical simulations are performed to demonstrate the feasibility and performance of this method.

  18. An Improved Cuckoo Search Optimization Algorithm for the Problem of Chaotic Systems Parameter Estimation

    OpenAIRE

    Jun Wang; Bihua Zhou; Shudao Zhou

    2016-01-01

    This paper proposes an improved cuckoo search (ICS) algorithm to establish the parameters of chaotic systems. In order to improve the optimization capability of the basic cuckoo search (CS) algorithm, the orthogonal design and simulated annealing operation are incorporated in the CS algorithm to enhance the exploitation search ability. Then the proposed algorithm is used to establish parameters of the Lorenz chaotic system and Chen chaotic system under the noiseless and noise condition, resp...

  19. Realization of generalized synchronization between different chaotic systems via scalar controller

    Institute of Scientific and Technical Information of China (English)

    2007-01-01

    In this paper, a very simple generalized synchronization method between different chaotic systems is presented.Only a scalar controller is used in this method. The method of obtaining the scalar controller from chaotic systems is established. The sufficient and necessary condition of generalized synchronization is obtained from a rigorous theory,and the sufficient and necessary condition of generalized synchronization is irrelative to chaotic system itself. Theoretical analyses and simulation results show that the method established in this paper is effective.

  20. The equal combination synchronization of a class of chaotic systems with discontinuous output

    Energy Technology Data Exchange (ETDEWEB)

    Luo, Runzi; Zeng, Yanhui [Department of Mathematics, Nanchang University, Nanchang 330031 (China)

    2015-11-15

    This paper investigates the equal combination synchronization of a class of chaotic systems. The chaotic systems are assumed that only the output state variable is available and the output may be discontinuous state variable. By constructing proper observers, some novel criteria for the equal combination synchronization are proposed. The Lorenz chaotic system is taken as an example to demonstrate the efficiency of the proposed approach.

  1. Chaotic systems in complex phase space

    Indian Academy of Sciences (India)

    Carl M Bender; Joshua Feinberg; Daniel W Hook; David J Weir

    2009-09-01

    This paper examines numerically the complex classical trajectories of the kicked rotor and the double pendulum. Both of these systems exhibit a transition to chaos, and this feature is studied in complex phase space. Additionally, it is shown that the short-time and long-time behaviours of these two $\\mathcal{PT}$ -symmetric dynamical models in complex phase space exhibit strong qualitative similarities.

  2. Hybrid TS fuzzy modelling and simulation for chaotic Lorenz system

    Institute of Scientific and Technical Information of China (English)

    Li De-Quan

    2006-01-01

    The projection of the chaotic attractor observed from the Lorenz system in the X-Z plane is like a butterfly, hence the classical Lorenz system is widely known as the butterfly attractor, and has served as a prototype model for studying chaotic behaviour since it was coined. In this work we take one step further to investigate some fundamental dynamic behaviours of a novel hybrid Takagi-Sugeno (TS) fuzzy Lorenz-type system, which is essentially derived from the delta-operator-based TS fuzzy modelling for complex nonlinear systems, and contains the original Lorenz system of continuous-time TS fuzzy form as a special case. By simply and appropriately tuning the additional parametric perturbations in the two-rule hybrid TS fuzzy Lorenz-type system, complex (two-wing) butterfly attractors observed from this system in the three dimensional (3D) X-Y-Z space are created, which have not yet been reported in the literature, and the forming mechanism of the compound structures have been numerically investigated.

  3. On entanglement spreading in chaotic systems

    CERN Document Server

    Mezei, Márk

    2016-01-01

    We discuss the time dependence of subsystem entropies in interacting quantum systems. As a model for the time dependence, we suggest that the entropy is as large as possible given two constraints: one follows from the existence of an emergent light cone, and the other is a conjecture associated to the "entanglement velocity" $v_E$. We compare this model to new holographic and spin chain computations, and to an operator growth picture. Finally, we introduce a second way of computing the emergent light cone speed in holographic theories that provides a boundary dynamics explanation for a special case of entanglement wedge subregion duality in AdS/CFT.

  4. Chaotic diffusion in the Solar System

    CERN Document Server

    Laskar, Jacques

    2008-01-01

    A statistical analysis is performed over more than 1001 different integrations of the secular equations of the Solar system over 5 Gyr. With this secular system, the probability of the eccentricity of Mercury to reach 0.6 in 5 Gyr is about 1 to 2 %. In order to compare with (Ito and Tanikawa, 2002), we have performed the same analysis without general relativity, and obtained even more orbits of large eccentricity for Mercury. We have performed as well a direct integration of the planetary orbits, without averaging, for a dynamical model that do not include the Moon or general relativity with 10 very close initial conditions over 3 Gyr. The statistics obtained with this reduced set are comparable to the statistics of the secular equations, and in particular we obtain two trajectories for which the eccentricity of Mercury increases beyond 0.8 in less than 1.3 Gyr and 2.8 Gyr respectively. These strong instabilities in the orbital motion of Mecury results from secular resonance beween the perihelion of Jupiter a...

  5. A Study on Design of Database Encrypting System%数据库加密系统设计研究

    Institute of Scientific and Technical Information of China (English)

    周婕; 李斌

    2011-01-01

    从增强数据库安全性出发,对数据库加密的层次、原理、算法和密钥管理等关键技术进行了分析研究,并研究了如何设计数据库加密系统,提出了一种数据库加密系统设计方案,给出了具体的设计模型并说明了各个功能模块的主要作用和实现方法,最后讨论了该加密系统对数据库的影响.%For the sake of enhancing the security of database, the article firstly analyzes the key technologies of encrypting database such as encrypting levels, encrypting principle, arithmetic, key management and so on.It also investigates into how to design a database encrypting system.Secondly, it puts forward a scheme of designing a database encrypting system.Then it puts forward the idiographic designing model and illuminates the main function and realization method of each module Lastly, it discusses the influence of the database encrypting system to the database.

  6. Hybrid chaotic sequence for QS-CDMA system with RAKE receiver

    Institute of Scientific and Technical Information of China (English)

    饶妮妮; 许晓晶; 李少谦

    2004-01-01

    A class of the hybrid chaotic sequences is presented. The generator of the sequences is given and realized by the digital method. The hybrid chaotic sequences exhibit good random properties that are very important for the performance of QS-CDMA system with RAKE receiver. The performance of the system is analyzed when the hybrid chaotic sequences are used as spreading codes in a QS-CDMA system with RAKE receiver and compared with those obtained for m-sequences and logistic sequences. The results show that the hybrid chaotic sequences are a class of very promising spreading codes for QS-CDMA system.

  7. Simultaneous Synchronization and Anti-Synchronization of Two Identical New 4D Chaotic Systems

    Institute of Scientific and Technical Information of China (English)

    GUO Rong-Wei

    2011-01-01

    We investigate the synchronization and anti-synchronization of the new 4D chaotic system and propose a same adaptive controller in the form which not only synchronizes, but also anti-synchronizes two identical new 4D chaotic systems. Numerical simulations verify the correctness and the effectiveness of the proposed theoretical results.%@@ We investigate the synchronization and anti-synchronization of the new 4D chaotic system and propose a same adaptive controller in the form which not only synchronizes, but also anti-synchronizes two identical new 4D chaotic systems.Numerical simulations verify the correctness and the effectiveness of the proposed theoretical results.

  8. Robust fuzzy control for chaotic dynamics in Lorenz systems with uncertainties

    Institute of Scientific and Technical Information of China (English)

    Wang Yao-Nan; Tan Wen; Duan Feng

    2006-01-01

    This paper deals with the robust fuzzy control for chaotic systems in the presence of parametric uncertainties. An uncertain Takagi-Sugeno fuzzy model for a Lorenz chaotic system is first constructed. Then a robust fuzzy state feedback control scheme ensures the control for stable operations under bounded parametric uncertainties. For a chaotic system with known uncertainty bounds, a robust fuzzy regulator is designed by choosing the control parameters satisfying the linear matrix inequality. To verify the validity and effectiveness of the proposed controller design method, an analysis technique is suggested and applied to the control of an uncertain Lorenz chaotic system.

  9. Chaotic memristor

    OpenAIRE

    Driscoll, T; Pershin, Y. V.; Basov, D. N.; Di Ventra, M.

    2011-01-01

    We suggest and experimentally demonstrate a chaotic memory resistor (memristor). The core of our approach is to use a resistive system whose equations of motion for its internal state variables are similar to those describing a particle in a multi-well potential. Using a memristor emulator, the chaotic memristor is realized and its chaotic properties are measured. A Poincar\\'{e} plot showing chaos is presented for a simple nonautonomous circuit involving only a voltage source directly connect...

  10. Perfect synchronization of chaotic systems: a controllability perspective

    Institute of Scientific and Technical Information of China (English)

    Sun Ming-Xuan; He Xiong-Xiong; Yu Li

    2006-01-01

    This paper presents a synchronization method, motivated from the constructive controllability analysis, for two identical chaotic systems. This technique is applied to achieve perfect synchronization for Lorenz systems and coupled dynamo systems. It turns out that states of the drive system and the response system are synchronized within finite time, and the reaching time is independent of initial conditions, which can be specified in advance. In addition to the simultaneous synchronization, the response system is synchronized un-simultaneously to the drive system with different reaching time for each state. The performance of the resulting system is analytically quantified in the face of initial condition error, and with numerical experiments the proposed method is demonstrated to perform well.

  11. A chaotic system with a single unstable node

    Energy Technology Data Exchange (ETDEWEB)

    Sprott, J.C. [Department of Physics, University of Wisconsin, Madison, WI 53706 (United States); Jafari, Sajad, E-mail: sajadjafari@aut.ac.ir [Biomedical Engineering Department, Amirkabir University of Technology, Tehran 15875-4413 (Iran, Islamic Republic of); Pham, Viet-Thanh [School of Electronics and Telecommunications, Hanoi University of Science and Technology, 01 Dai Co Viet, Hanoi (Viet Nam); Hosseini, Zahra Sadat [Biomedical Engineering Department, Amirkabir University of Technology, Tehran 15875-4413 (Iran, Islamic Republic of)

    2015-09-25

    This paper describes an unusual example of a three-dimensional dissipative chaotic flow with quadratic nonlinearities in which the only equilibrium is an unstable node. The region of parameter space with bounded solutions is relatively small as is the basin of attraction, which accounts for the difficulty of its discovery. Furthermore, for some values of the parameters, the system has an attracting torus, which is uncommon in three-dimensional systems, and this torus can coexist with a strange attractor or with a limit cycle. The limit cycle and strange attractor exhibit symmetry breaking and attractor merging. All the attractors appear to be hidden in that they cannot be found by starting with initial conditions in the vicinity of the equilibrium, and thus they represent a new type of hidden attractor with important and potentially problematic engineering consequences. - Highlights: • An unusual example of a three-dimensional dissipative chaotic flow is introduced. • In this system the only equilibrium is an unstable node. • For some values of the parameters, the system has an attracting torus. • This torus can coexist with a strange attractor or with a limit cycle. • These properties are uncommon in three-dimensional systems.

  12. New Image Scrambling Hiding Algorithm Based on Chaotic Proliferation Encryption%基于混沌扩散加密的图像置乱隐藏算法

    Institute of Scientific and Technical Information of China (English)

    牛永洁; 赵耀锋

    2013-01-01

    In recent years,digital image information hiding technology has been the hot research topics in digital image information hiding.Digital images as carriers of information hiding are not different from traditional encryption methods,the use of information hiding generated by images with the confusing can stand attacks from a malicious person.The combination of two-dimensional logistic encryption algorithm and digital image hiding algorithm uses a large space and image scrambling hidden characteristics.Although the expense of encryption is not efficiency,security and hidden are better,and it is more suitable for practical application,fully embodies the proliferation of encryption,enhances the ability of scrambling algorithm.The security analysis proves that the algorithm is of enough key space and good hideaway effect.%数字图像信息隐藏技术是近年信息隐藏技术中的热点研究课题,以数字图像作为载体的信息隐藏与传统加密方法不同,利用图像所具有的迷惑性产生的隐藏信息更能经受起恶意者的攻击.本文基于混沌扩散构建图像置乱隐藏算法,利用混沌加密密钥空间大和图像置乱隐藏性能好的双重特点,虽然牺牲一部分扩散加密效率,但安全性和隐藏性更好,更适合实际应用,充分体现了加密扩散性,增强了算法置乱能力.实验证明,该算法具有密钥空间大、隐藏效果好等特点.

  13. A chaotic neural network mimicking an olfactory system and its application on image recognition

    Institute of Scientific and Technical Information of China (English)

    WANG Le; LI Guang; LI Xu; GUO Hong-ji; Walter J. Freeman

    2004-01-01

    Based on the research of a biological olfactory system, a novel chaotic neural network model - K set model has been established. This chaotic neural network not only simulates the real brain activity of an olfactory system, but also presents a novel chaotic concept for signal processing and pattern recognition. The characteristics of the K set models are investigated and show that a KⅢ model can be used for image pattern classification.

  14. Linear generalized synchronization of chaotic systems with uncertain parameters

    Institute of Scientific and Technical Information of China (English)

    Jia Zhen

    2008-01-01

    A more general form of projective synchronization,so called linear generalized synchronization(LGS)is proposed,which includes the generalized projective synchronization(GPS)and the hybrid projective synchronization(HPS)as its special cases.Based on the adaptive technique and Lyapunov stability theory,a general method for achieving the LGS between two chaotic or hyperchaotic systems with uncertain parameters in any scaling matrix is presented.Some numerical simulations are provided to show the effectiveness and feasibility of the proposed synchronization method.

  15. Chaotic Patterns in Lotka-Volterra Systems with Behavioral Adaptation

    Science.gov (United States)

    Lacitignola, D.; Tebaldi, C.

    2006-03-01

    We study the properties of a n2-dimensional Lotka-Volterra system describing competition among species with behaviorally adaptive abilities, in which one species is made ecologically differentiated with respect to the others by carrying capacity and intrinsic growth rate. The case in which one species has a carrying capacity higher than the others is considered here. Stability of equilibria and time-dependent regimes have been investigated in the case of four species: an interesting example of chaotic window and period-adding sequences is presented and discussed.

  16. Chaotic Music Generation System Using Music Conductor Gesture

    OpenAIRE

    Chen, Shuai; Maeda, Yoichiro; TAKAHASHI, Yasutake

    2013-01-01

    In the research of interactive music generation,we propose a music generation method, that thecomputer generates the music, under the recognitionof human music conductor’s gestures.In this research,the generated music is tuned by the recognized gesturesfor the parameters of the network of chaotic elementsin real time. The music conductor’s hand motionsare detected by Microsoft Kinect in this system.Music theories are embedded in the algorithm, as a result,the generated music will be richer. F...

  17. The n-level spectral correlations for chaotic systems

    Energy Technology Data Exchange (ETDEWEB)

    Nagao, Taro [Graduate School of Mathematics, Nagoya University, Chikusa-ku, Nagoya 464-8602 (Japan); Mueller, Sebastian [Department of Mathematics, University of Bristol, Bristol BS8 1TW (United Kingdom)

    2009-09-18

    We study the n-level spectral correlation functions of classically chaotic quantum systems without time-reversal symmetry. According to Bohigas, Giannoni and Schmit's universality conjecture, it is expected that the correlation functions are in agreement with the prediction of the circular unitary ensemble (CUE) of random matrices. A semiclassical resummation formalism allows us to express the correlation functions as sums over pseudo-orbits. Using an extended version of the diagonal approximation on the pseudo-orbit sums, we derive the n-level correlation functions identical to the n x n determinantal correlation functions of the CUE.

  18. Nonlinear time reversal in a wave chaotic system.

    Science.gov (United States)

    Frazier, Matthew; Taddese, Biniyam; Antonsen, Thomas; Anlage, Steven M

    2013-02-01

    Exploiting the time-reversal invariance and reciprocal properties of the lossless wave equation enables elegantly simple solutions to complex wave-scattering problems and is embodied in the time-reversal mirror. Here we demonstrate the implementation of an electromagnetic time-reversal mirror in a wave chaotic system containing a discrete nonlinearity. We demonstrate that the time-reversed nonlinear excitations reconstruct exclusively upon the source of the nonlinearity. As an example of its utility, we demonstrate a new form of secure communication and point out other applications.

  19. Breaking down the barriers of using strong authentication and encryption in resource constrained embedded systems

    Science.gov (United States)

    Knobler, Ron; Scheffel, Peter; Jackson, Scott; Gaj, Kris; Kaps, Jens Peter

    2013-05-01

    Various embedded systems, such as unattended ground sensors (UGS), are deployed in dangerous areas, where they are subject to compromise. Since numerous systems contain a network of devices that communicate with each other (often times with commercial off the shelf [COTS] radios), an adversary is able to intercept messages between system devices, which jeopardizes sensitive information transmitted by the system (e.g. location of system devices). Secret key algorithms such as AES are a very common means to encrypt all system messages to a sufficient security level, for which lightweight implementations exist for even very resource constrained devices. However, all system devices must use the appropriate key to encrypt and decrypt messages from each other. While traditional public key algorithms (PKAs), such as RSA and Elliptic Curve Cryptography (ECC), provide a sufficiently secure means to provide authentication and a means to exchange keys, these traditional PKAs are not suitable for very resource constrained embedded systems or systems which contain low reliability communication links (e.g. mesh networks), especially as the size of the network increases. Therefore, most UGS and other embedded systems resort to pre-placed keys (PPKs) or other naïve schemes which greatly reduce the security and effectiveness of the overall cryptographic approach. McQ has teamed with the Cryptographic Engineering Research Group (CERG) at George Mason University (GMU) to develop an approach using revolutionary cryptographic techniques that provides both authentication and encryption, but on resource constrained embedded devices, without the burden of large amounts of key distribution or storage.

  20. Passive control of Permanent Magnet Synchronous Motor chaotic system based on state observer

    Institute of Scientific and Technical Information of China (English)

    QI Dong-lian; WANG Qiao

    2006-01-01

    Passive system theory was applied to propose a new passive control method with nonlinear observer of the Permanent Magnet Synchronous Motor chaotic system. Through constructing a Lyapunov function, the subsystem of the Permanent Magnet Synchronous Motor chaotic system could be proved to be globally stable at the equilibrium point. Then a controller with smooth state feedback is designed so that the Permanent Magnet Synchronous Motor chaotic system can be equivalent to a passive system.To get the state variables of the controller, the nonlinear observer is also studied. It is found that the outputs of the nonlinear observer can approximate the state variables of the Permanent Magnet Synchronous Motor chaotic system if the system's nonlinear function is a globally Lipschitz function. Simulation results showed that the equivalent passive system of Permanent Magnet Synchronous Motor chaotic system could be globally asymptotically stabilized by smooth state feedback in the observed parameter convergence condition area.

  1. Global Chaos Synchronization between Two New Different Chaotic Systems via Active Control

    Institute of Scientific and Technical Information of China (English)

    SUN Feng-Yun

    2006-01-01

    We present chaos synchronization between two new different chaotic systems by using active control.The proposed controller ensures that the states of the controlled chaotic response system asymptotically synchronizes the states of the drive system.Numerical simulations are shown to verify the result.

  2. Hierarchical fractal Weyl laws for chaotic resonance states in open mixed systems.

    Science.gov (United States)

    Körber, M J; Michler, M; Bäcker, A; Ketzmerick, R

    2013-09-13

    In open chaotic systems the number of long-lived resonance states obeys a fractal Weyl law, which depends on the fractal dimension of the chaotic saddle. We study the generic case of a mixed phase space with regular and chaotic dynamics. We find a hierarchy of fractal Weyl laws, one for each region of the hierarchical decomposition of the chaotic phase-space component. This is based on our observation of hierarchical resonance states localizing on these regions. Numerically this is verified for the standard map and a hierarchical model system.

  3. On the application of the multistage Laplace Adomian decomposition method to the chaotic Chen system

    Directory of Open Access Journals (Sweden)

    Saheed O. Ajibola

    2012-11-01

    Full Text Available In this paper, Laplace Adomian Decomposition Method (LADM and the Multistage Laplace Adomian Decomposition Method (MLADM were applied to obtain solutions to the Chen system for the non-chaotic and chaotic case. The study shows that the LADM only gives reliable results for t <<1. Comparison between the MLADM and the classical fourth-order Runge-Kutta (RK4 solutions shows that the MLADM performs well with high accuracy. The study shows that MLADM is a powerful and promising tool for solving nonlinear systems of ODEs of chaotic and non-chaotic nature.

  4. Chaos pass filter: Linear response of synchronized chaotic systems

    Science.gov (United States)

    Zeeb, Steffen; Kestler, Johannes; Kanter, Ido; Kinzel, Wolfgang

    2013-04-01

    The linear response of synchronized time-delayed chaotic systems to small external perturbations, i.e., the phenomenon of chaos pass filter, is investigated for iterated maps. The distribution of distances, i.e., the deviations between two synchronized chaotic units due to external perturbations on the transferred signal, is used as a measure of the linear response. It is calculated numerically and, for some special cases, analytically. Depending on the model parameters this distribution has power law tails in the region of synchronization leading to diverging moments of distances. This is a consequence of multiplicative and additive noise in the corresponding linear equations due to chaos and external perturbations. The linear response can also be quantified by the bit error rate of a transmitted binary message which perturbs the synchronized system. The bit error rate is given by an integral over the distribution of distances and is calculated analytically and numerically. It displays a complex nonmonotonic behavior in the region of synchronization. For special cases the distribution of distances has a fractal structure leading to a devil's staircase for the bit error rate as a function of coupling strength. The response to small harmonic perturbations shows resonances related to coupling and feedback delay times. A bidirectionally coupled chain of three units can completely filter out the perturbation. Thus the second moment and the bit error rate become zero.

  5. Generalized Projective Synchronization Between R(o)ssler System and New Unified Chaotic System

    Institute of Scientific and Technical Information of China (English)

    LI Xin; CHEN Yong

    2007-01-01

    Based on symbolic computation system Maple and Lyapunov stability theory, an active control method is used to projectively synchronize two different chaotic systems - Lorenz-Chen-Lü system (LCL) and R(o)ssler system,which belong to different dynamic systems. In this paper, we achieve generalized projective synchronization between the two different chaotic systems by directing the scaling factor onto the desired value arbitrarily. To illustrate our result,numerical simulations are used to perform the process of the synchronization and successfully put the orbits of drive system (LCL) and orbits of the response system (R(o)asler system) in the same plot for understanding intuitively.

  6. Joint transform correlator optical encryption system: Extensions of the recorded encrypted signal and its inverse Fourier transform

    Science.gov (United States)

    Galizzi, Gustavo E.; Cuadrado-Laborde, Christian

    2015-10-01

    In this work we study the joint transform correlator setup, finding two analytical expressions for the extensions of the joint power spectrum and its inverse Fourier transform. We found that an optimum efficiency is reached, when the bandwidth of the key code is equal to the sum of the bandwidths of the image plus the random phase mask (RPM). The quality of the decryption is also affected by the ratio between the bandwidths of the RPM and the input image, being better as this ratio increases. In addition, the effect on the decrypted image when the detection area is lower than the encrypted signal extension was analyzed. We illustrate these results through several numerical examples.

  7. Cross-section fluctuations in chaotic scattering systems

    Science.gov (United States)

    Ericson, Torleif E. O.; Dietz, Barbara; Richter, Achim

    2016-10-01

    Exact analytical expressions for the cross-section correlation functions of chaotic scattering systems have hitherto been derived only under special conditions. The objective of the present article is to provide expressions that are applicable beyond these restrictions. The derivation is based on a statistical model of Breit-Wigner type for chaotic scattering amplitudes which has been shown to describe the exact analytical results for the scattering (S )-matrix correlation functions accurately. Our results are given in the energy and in the time representations and apply in the whole range from isolated to overlapping resonances. The S -matrix contributions to the cross-section correlations are obtained in terms of explicit irreducible and reducible correlation functions. Consequently, the model can be used for a detailed exploration of the key features of the cross-section correlations and the underlying physical mechanisms. In the region of isolated resonances, the cross-section correlations contain a dominant contribution from the self-correlation term. For narrow states the self-correlations originate predominantly from widely spaced states with exceptionally large partial width. In the asymptotic region of well-overlapping resonances, the cross-section autocorrelation functions are given in terms of the S -matrix autocorrelation functions. For inelastic correlations, in particular, the Ericson fluctuations rapidly dominate in that region. Agreement with known analytical and experimental results is excellent.

  8. High-dimensional chaotic and attractor systems a comprehensive introduction

    CERN Document Server

    Ivancevic, Vladimir G

    2007-01-01

    This is a graduate–level monographic textbook devoted to understanding, prediction and control of high–dimensional chaotic and attractor systems of real life. The objective of the book is to provide the serious reader with a serious scientific tool that will enable the actual performance of competitive research in high–dimensional chaotic and attractor dynamics. The book has nine Chapters. The first Chapter gives a textbook-like introduction into the low-dimensional attractors and chaos. This Chapter has an inspirational character, similar to other books on nonlinear dynamics and deterministic chaos. The second Chapter deals with Smale’s topological transformations of stretching, squeezing and folding (of the system’s phase–space), developed for the purpose of chaos theory. The third Chapter is devoted to Poincaré's 3-body problem and basic techniques of chaos control, mostly of Ott-Grebogi-Yorke type. The fourth Chapter is a review of both Landau’s and topological phase transition theory, as w...

  9. SLYRB measures: natural invariant measures for chaotic systems

    Science.gov (United States)

    Hunt, Brian R.; Kennedy, Judy A.; Li, Tien-Yien; Nusse, Helena E.

    2002-08-01

    In many applications it is useful to consider not only the set that constitutes an attractor but also (if it exists) the asymptotic distribution of a typical trajectory converging to the attractor. Indeed, in the physics literature such a distribution is often assumed to exist. When it exists, it is called a “natural invariant measure”. The results by Lasota and Yorke, and by Sinai, Ruelle and Bowen represent two approaches both of which establish the existence of an invariant measure. The goal of this paper is to relate the “Lasota-Yorke measure” for chaotic attractors in one-dimensional maps and the “Sinai-Ruelle-Bowen measure” for chaotic attractors in higher-dimensional dynamical systems. We introduce the notion of “ SLYRB measure”. (We pronounce the term “SLYRB” as a single word “slurb”.) The SRB concept of measure can be motivated by asking how a trajectory from a typical initial point is distributed asymptotically. Similarly the SLYRB concept of measure can be motivated by asking what the average distribution is for trajectories of a large collection of initial points in some region not necessarily restricted to a single basin. The latter is analogous to ask where all the rain drops from a rain storm go and the former asks about where a single rain drop goes, perhaps winding up distributed throughout a particular lake.

  10. Study of new chaotic flows on a family of 3-dimensional systems with quadratic nonlinearities

    International Nuclear Information System (INIS)

    Based on a wider systematic search on a family of 3-dimensional systems with quadratic nonlinearities, three new simple chaotic systems were found. One of them has the unusual feature of having a stable equilibrium point, and it is the simplest one of other chaotic flows with this property. The others have some interesting special properties

  11. Nonlinear feedback synchronisation control between fractional-order and integer-order chaotic systems

    Institute of Scientific and Technical Information of China (English)

    Jia Li-Xin; Dai Hao; Hui Meng

    2010-01-01

    This paper focuses on the synchronisation between fractional-order and integer-order chaotic systems.Based on Lyapunov stability theory and numerical differentiation,a nonlinear feedback controller is obtained to achieve the synchronisation between fractional-order and integer-order chaotic systems.Numerical simulation results are presented to illustrate the effectiveness of this method.

  12. A novel four-wing chaotic attractor generated from a three-dimensional quadratic autonomous system

    International Nuclear Information System (INIS)

    This paper presents a new 3D quadratic autonomous chaotic system which contains five system parameters and three quadratic cross-product terms, and the system can generate a single four-wing chaotic attractor with wide parameter ranges. Through theoretical analysis, the Hopf bifurcation processes are proved to arise at certain equilibrium points. Numerical bifurcation analysis shows that the system has many interesting complex dynamical behaviours; the system trajectory can evolve to a chaotic attractor from a periodic orbit or a fixed point as the proper parameter varies. Finally, an analog electronic circuit is designed to physically realize the chaotic system; the existence of four-wing chaotic attractor is verified by the analog circuit realization. (general)

  13. A novel four-wing chaotic attractor generated from a three-dimensional quadratic autonomous system

    Institute of Scientific and Technical Information of China (English)

    Dong En-Zeng; Chen Zai-Ping; Chen Zeng-Qiang; Yuan Zhu-Zhi

    2009-01-01

    This paper presents a new 3D quadratic autonomous chaotic system which contains five system parameters and three quadratic cross-product terms, and the system can generate a single four-wing chaotic attractor with wide parameter ranges. Through theoretical analysis, the Hopf bifurcation processes are proved to arise at certain equilibrium points. Numerical bifurcation analysis shows that the system has many interesting complex dynamical behaviours; the system trajectory can evolve to a chaotic attractor from a periodic orbit or a fixed point as the proper parameter varies.Finally, an analog electronic circuit is designed to physically realize the chaotic system; the existence of four-wing chaotic attractor is verified by the analog circuit realization.

  14. Chaotic oscillator detection system about weak signals in spot welding

    Institute of Scientific and Technical Information of China (English)

    Kai-lei SONG; Zhen LUO; Feng YE; Xin-xin TANG; Shu-xian YUAN

    2009-01-01

    Spot welding is an efficient and shortcut processing method used in plate, and its quality detection is very important. However, there are many factors affecting the spot welding quality. Because of the low precision of traditional detection methods, spot welding has seldom been used in the aerospace industry which requires high welding quality. In this article, we give a new weak signal detection model based on chaotic oscillators. Using Melnikov methods and Lyapunov exponent, we can determine the critical values when the system enters in and out of chaos. Through lots of numerical simulations, it can be found that the lowest value of the weak sinusoidal signal the system can detect reach 10-11, and its signal-to-noise ratio (SNR) is = 126 dB. Compared with other detection methods, chaos oscillator detection system not only has a lower threshold value, but also is easy to implement in practice. This model thus has good application prospects.

  15. A general method for synchronizing an integer-order chaotic system and a fractional-order chaotic system

    Institute of Scientific and Technical Information of China (English)

    Si Gang-Quan; Sun Zhi-Yong; Zhang Yan-Bin

    2011-01-01

    This paper investigates the synchronization between integer-order and fractional-order chaotic systems.By introducing fractional-order operators into the controllers,the addressed problem is transformed into a synchronization one among integer-order systems.A novel general method is presented in the paper with rigorous proof.Based on this method,effective controllers are designed for the synchronization between Lorenz systems with an integer order and a fractional order,and for the synchronization between an integer-order Chen system and a fractional-order Liu system.Numerical results,which agree well with the theoretical analyses,are also given to show the effectiveness of this method.

  16. 基于Arnold变换及混沌加密的遥感影像机密信息隐藏研究%Study on Hidden Confidential Information of Remote Sensing Images Based on Arnold Transformation and Chaotic Encryption

    Institute of Scientific and Technical Information of China (English)

    段晓颖; 王阿川

    2011-01-01

    目前数字水印技术已经相当成熟,但是鲜见关于遥感影像机密信息隐藏技术的报道。遥感影像中有些机密信息对没有权限的用户是不可见的,因此我们需要使用信息隐藏技术将其中的机密信息隐藏起来。本文提出了一种基于Arnold变换及混沌加密的机密信息隐藏算法,该算法首先使用Amold变换和混沌加密技术对机密信息进行加密处理,然后采用基于DWT变换的信息隐藏算法将机密信息隐藏到伪遥感影像中。实验结果表明本算法对遥感影像机密信息可进行有效的隐藏,保护了机密信息的安全,由此可以看出信息隐藏技术在遥感影像机密信息安全方面有很重要的作用。%Currently, digital watermarking technology is quite mature, but the reports on the confidential information hiding technology of remote sensing images are rare. Some confidential information of remote sensing images is invisible to the users without permission, so therefore, we need to use information hiding technology to hide confidential information. A hiding algorithm of confidential information based on Arnold transformation and chaotic eneryption technology is presented The algorithm first uses Arnold transformation and chaotic encryption technology to encrypt confidential information and then uses the information hiding algorithm based on DWT transformation to hide the confidential information in the pseudo - remote sensing images. The experimental results show that the confidential information of remote sensing images can be effectively hidden by the algorithm which protects the security of the confidential information, so hiding confidential information in remote sensing images plays an important role in information security.

  17. Parameter Identification and Synchronization of Uncertain Chaotic Systems Based on Sliding Mode Observer

    Directory of Open Access Journals (Sweden)

    Li-lian Huang

    2013-01-01

    Full Text Available The synchronization of nonlinear uncertain chaotic systems is investigated. We propose a sliding mode state observer scheme which combines the sliding mode control with observer theory and apply it into the uncertain chaotic system with unknown parameters and bounded interference. Based on Lyapunov stability theory, the constraints of synchronization and proof are given. This method not only can realize the synchronization of chaotic systems, but also identify the unknown parameters and obtain the correct parameter estimation. Otherwise, the synchronization of chaotic systems with unknown parameters and bounded external disturbances is robust by the design of the sliding surface. Finally, numerical simulations on Liu chaotic system with unknown parameters and disturbances are carried out. Simulation results show that this synchronization and parameter identification has been totally achieved and the effectiveness is verified very well.

  18. Security Encryption Scheme for Communication of Web Based Control Systems

    Science.gov (United States)

    Robles, Rosslin John; Kim, Tai-Hoon

    A control system is a device or set of devices to manage, command, direct or regulate the behavior of other devices or systems. The trend in most systems is that they are connected through the Internet. Traditional Supervisory Control and Data Acquisition Systems (SCADA) is connected only in a limited private network Since the internet Supervisory Control and Data Acquisition Systems (SCADA) facility has brought a lot of advantages in terms of control, data viewing and generation. Along with these advantages, are security issues regarding web SCADA, operators are pushed to connect Control Systems through the internet. Because of this, many issues regarding security surfaced. In this paper, we discuss web SCADA and the issues regarding security. As a countermeasure, a web SCADA security solution using crossed-crypto-scheme is proposed to be used in the communication of SCADA components.

  19. Spatial chaos-based image encryption design

    Institute of Scientific and Technical Information of China (English)

    LIU ShuTang; SUN FuYan

    2009-01-01

    In recent years, the chaos based cryptographic algorithms have suggested some new and efficient ways to develop secure image encryption techniques, but the drawbacks of small key space and weak security in one-dimensional chaotic cryptosystems are obvious. In this paper, permutation and sub-stitution methods are incorporated to present a stronger image encryption algorithm. Spatial chaotic maps are used to realize the position permutation, and to confuse the relationship between the ci-pher-image and the plain-image. The experimental results demonstrate that the suggested encryption scheme of image has the advantages of large key space and high security; moreover, the distribution of grey values of the encrypted image has a random-like behavior.

  20. Spatial chaos-based image encryption design

    Institute of Scientific and Technical Information of China (English)

    2009-01-01

    In recent years, the chaos based cryptographic algorithms have suggested some new and efficient ways to develop secure image encryption techniques, but the drawbacks of small key space and weak security in one-dimensional chaotic cryptosystems are obvious. In this paper, permutation and sub- stitution methods are incorporated to present a stronger image encryption algorithm. Spatial chaotic maps are used to realize the position permutation, and to confuse the relationship between the ci- pher-image and the plain-image. The experimental results demonstrate that the suggested encryption scheme of image has the advantages of large key space and high security; moreover, the distribution of grey values of the encrypted image has a random-like behavior.

  1. Fault Tolerant Approach for Data Encryption and Digital Signature Based on ECC System

    Institute of Scientific and Technical Information of China (English)

    ZENG Yong; MA Jian-feng

    2005-01-01

    An integrated fault tolerant approach for data encryption and digital signature based on elliptic curve cryptography is proposed. This approach allows the receiver to verify the sender's identity and can simultaneously deal with error detection and data correction. Up to three errors in our approach can be detected and corrected. This approach has at least the same security as that based on RSA system, but smaller keys to achieve the same level of security. Our approach is more efficient than the known ones and more suited for limited environments like personal digital assistants (PDAs), mobile phones and smart cards without RSA co- processors.

  2. Novel four-dimensional autonomous chaotic system generating one-, two-, three- and four-wing attractors

    International Nuclear Information System (INIS)

    In this paper, we propose a novel four-dimensional autonomous chaotic system. Of particular interest is that this novel system can generate one-, two, three- and four-wing chaotic attractors with the variation of a single parameter, and the multi-wing type of the chaotic attractors can be displayed in all directions. The system is simple with a large positive Lyapunov exponent and can exhibit some interesting and complicated dynamical behaviours. Basic dynamical properties of the four-dimensional chaotic system, such as equilibrium points, the Poincaré map, the bifurcation diagram and the Lyapunov exponents are investigated by using either theoretical analysis or numerical method. Finally, a circuit is designed for the implementation of the multi-wing chaotic attractors. The electronic workbench observations are in good agreement with the numerical simulation results. (general)

  3. An observer based asymptotic trajectory control using a scalar state for chaotic systems

    Institute of Scientific and Technical Information of China (English)

    Yu Dong-Chuan; Xia Lin-Hua; Wang Dong-Qing

    2006-01-01

    A state-observer based full-state asymptotic trajectory control (OFST3 method requiring a scalar state is presented to asymptotically drive all the states of chaotic systems to arbitrary desired trajectories. It is no surprise that OFSTC can obtain good tracking performance as desired due to using a state-observer. Significantly OFSTC requires only a scalar state of chaotic systems. A sinusoidal wave and two chaotic variables were taken as illustrative tracking trajectories to validate that using OFSTC can make all the states of a unified chaotic system track the desired trajectories with high tracking accuracy and in a finite time. It is noted that this is the first time that the state-observer of chaotic systems is designed on the basis of Kharitonov's Theorem.

  4. CAPS satellite spread spectrum communication blind multi-user detecting system based on chaotic sequences

    Institute of Scientific and Technical Information of China (English)

    2009-01-01

    Multiple Path Interference (MPI) and Multiple Access Interference (MAI) are important factors that affect the performance of Chinese Area Positioning System (CAPS). These problems can be solved by using spreading sequences with ideal properties and multi-user detectors. Chaotic sequences based on Chebyshev map are studied and the satellite communication system model is set up to investigate the application of chaotic sequences for CAPS in this paper. Simulation results show that chaotic sequences have desirable correlation properties and it is easy to generate a large number of chaotic sequences with good security. It has great practical value to apply chaotic sequences to CAPS together with multi-user detecting technology and the system performance can be improved greatly.

  5. CAPS satellite spread spectrum communication blind multi-user detecting system based on chaotic sequences

    Institute of Scientific and Technical Information of China (English)

    LEI LiHua; SHI HuLi; MA GuanYi

    2009-01-01

    Multiple Path Interference (MPI) and Multiple Access Interference (MAI) are Important factors that affect the performance of Chinese Area Positioning System (CAPS),These problems can be solved by using spreading sequences with ideal properties and multi-user detectors.Chaotic sequences based on Chebyshev map are studied and the satellite communication system model is set up to investigate the application of chaotic sequences for CAPS in this paper,Simulation results show that chaotic sequences have desirable correlation properties and it is easy to generate a large number of chaotic sequences with good security.It has great practical value to apply chaotic sequences to CAPS together with multi-user detecting technology and the system performance can be improved greatly.

  6. Study on Super-Twisting synchronization control of chaotic system based on U model

    Directory of Open Access Journals (Sweden)

    Jianhua ZHANG

    2016-06-01

    Full Text Available A U model based Super-Twisting synchronization control method for chaotic systems is proposed. The chaos control of chaotic systems is prescribed, then, based on the current research status of chaotic systems and some useful research results in nonlinear system design, some new methods for chaos control and synchronization are provided, and the controller is designed to achieve the finite time chaos synchronization. The numerical simulations are carried out for Lorenz system and Chen system, and the result proves the effectiveness of the method.

  7. Study on phase synchronization of stochastic chaotic system

    Institute of Scientific and Technical Information of China (English)

    Yang Xiao-Li; Xu Wei

    2008-01-01

    This paper detects and characterizes the diverse roles played by bounded noise in chaotic phase synchronization (CPS) of weakly coupled nonlinear stochastic systems. Analysis of a paradigmatic model of two bidirectional coupled three-level food chains is carried out by various statistical measures such as Shannon entropy and mutual information. The results indicate that inside the synchronous regime, CPS is considerably reduced under the influence of bounded noise; near the onset of phase synchronization, temporal phase locking is diversely changed with the increase of noise, i.e., either weak or strong noise also degrades the degree of CPS, while intermediate noise enhances CPS remarkably, and an optimal noise intensity is detected that maximizes the enhancement.

  8. Structure of amplitude correlations in open chaotic systems

    Science.gov (United States)

    Ericson, Torleif E. O.

    2013-02-01

    The Verbaarschot-Weidenmüller-Zirnbauer (VWZ) model is believed to correctly represent the correlations of two S-matrix elements for an open quantum chaotic system, but the solution has considerable complexity and is presently only accessed numerically. Here a procedure is developed to deduce its features over the full range of the parameter space in a transparent and simple analytical form preserving accuracy to a considerable degree. The bulk of the VWZ correlations are described by the Gorin-Seligman expression for the two-amplitude correlations of the Ericson-Gorin-Seligman model. The structure of the remaining correction factors for correlation functions is discussed with special emphasis of the rôle of the level correlation hole both for inelastic and elastic correlations.

  9. Decoherence in chaotic and integrable systems: a random matrix approach

    Science.gov (United States)

    Gorin, T.; Seligman, T. H.

    2003-03-01

    We study the influence of chaos and order on entanglement and decoherence. In view of applications in quantum computing and teleportation which should be able to work with arbitrarily complicated states, we pay particular attention to the behavior of random states. While studies with coherent states indicate that chaos accelerates decoherence and entanglement, we find that there is practically no difference between the chaotic and the integrable case, as far as random states are concerned. In the present studies we use unitary time evolution of the total system, and partial traces to emulate decoherence. Random matrix models are a natural choice to describe the dynamics of random states. The invariant aspects of chaos and order are then reflected in the different spectral statistics. We develop random matrix models for the evolution of entanglement for a large variety of situations, discussing the strong coupling case in full detail.

  10. Decoherence in chaotic and integrable systems: a random matrix approach

    Energy Technology Data Exchange (ETDEWEB)

    Gorin, T.; Seligman, T.H

    2003-03-17

    We study the influence of chaos and order on entanglement and decoherence. In view of applications in quantum computing and teleportation which should be able to work with arbitrarily complicated states, we pay particular attention to the behavior of random states. While studies with coherent states indicate that chaos accelerates decoherence and entanglement, we find that there is practically no difference between the chaotic and the integrable case, as far as random states are concerned. In the present studies we use unitary time evolution of the total system, and partial traces to emulate decoherence. Random matrix models are a natural choice to describe the dynamics of random states. The invariant aspects of chaos and order are then reflected in the different spectral statistics. We develop random matrix models for the evolution of entanglement for a large variety of situations, discussing the strong coupling case in full detail.

  11. Analysis of chaotic FM system synchronization for bistatic radar

    Science.gov (United States)

    Pappu, Chandra S.; Verdin, Berenice; Flores, Benjamin C.; Boehm, James; Debroux, Patrick

    2015-05-01

    We propose a scheme for bistatic radar that uses a chaotic system to generate a wideband FM signal that is reconstructed at the receiver via a conventional phase lock loop. The setup for the bistatic radar includes a 3 state variable drive oscillator at the transmitter and a response oscillator at the receiver. The challenge is in synchronizing the response oscillator of the radar receiver utilizing a scaled version of the transmitted signal sr(t, x) = αst(t, x) where x is one of three driver oscillator state variables and α is the scaling factor that accounts for antenna gain, system losses, and space propagation. For FM, we also assume that the instantaneous frequency of the received signal, xs, is a scaled version of the Lorenz variable x. Since this additional scaling factor may not be known a priori, the response oscillator must be able to accept the scaled version of x as an input. Thus, to achieve synchronization we utilize a generalized projective synchronization technique that introduces a controller term -μe where μ is a control factor and e is the difference between the response state variable xs and a scaled x. Since demodulation of sr(t) is required to reconstruct the chaotic state variable x, the phase lock loop imposes a limit on the minimum error e. We verify through simulations that, once synchronization is achieved, the short-time correlation of x and xs is high and that the self-noise in the correlation is negligible over long periods of time.

  12. Efficient and Generic Construction of Certification-Based Encryption in the Standard Model Based on the NIZK Proof System

    Directory of Open Access Journals (Sweden)

    Yang Lu

    2012-02-01

    Full Text Available Certificate-based encryption (CBE is a new public key encryption paradigm which combines traditional PKI-based public-key encryption (PKE and identity-based encryption (IBE, and preserves some of their most attractive features. CBE provides an efficient implicit certificate mechanism and allows a periodical update of certificate status. It eliminates third-party queries for the certificate status and simplifies the certificate revocation problem in the traditional PKI, while it solves the key escrow problem and the key distribution problem inherent in IBE. In this paper, we propose a new generic construction of CBE schemes from PKE and IBE, and prove it to be CCA-secure in the standard model. In our construction, we use an efficient one-time simulation-sound adaptive NIZK proof system as the security enhancing building block to guarantee the CCA-security of the generated CBE schemes. When compared to the previous method, the security requirements of the primitive encryption schemes in our construction are much weaker and the performance of the generated CBE schemes from our construction is much more efficient.

  13. Adaptive Increasing-Order Synchronization and Anti-Synchronization of Chaotic Systems with Uncertain Parameters

    Institute of Scientific and Technical Information of China (English)

    M. Mossa Al-sawalha; M. S. M. Noorani

    2011-01-01

    We elaborate the concept of increasing-order synchronization and anti-synchronization of chaotic systems via an adaptive control scheme and modulation parameters. It is shown that the dynamical evolution of a third-order chaotic system can be synchronized and anti-synchronized with a fourth-order chaotic system even though their parameters are unknown. Theoretical analysis and numerical simulations are carried out to verify the results.%We elaborate the concept of increasing-order synchronization and anti-synchronization of chaotic systems via an adaptive control scheme and modulation parameters.It is shown that the dynamical evolution of a third-order chaotic system can be synchronized and anti-synchronized with a fourth-order chaotic system even though their parameters are unknown.Theoretical analysis and numerical simulations are carried out to verify the results.As the problems of synchronization and antisynchronization of chaos are interesting,nontraditional and indeed very challenging,[1] a wide variety of approaches have been proposed for chaos synchronization and anti-synchronization.[2-4] In this Letter,another type of synchronization,namely increasingorder synchronization in different chaotic systems with different orders based on parameter identification,is investigated.Such a problem exists widely in the study of cognitive processes and biological systems.[5

  14. Stegano-Crypto Hiding Encrypted Data in Encrypted Image Using Advanced Encryption Standard and Lossy Algorithm

    OpenAIRE

    Ari Shawakat Tahir

    2015-01-01

    The Steganography is an art and science of hiding information by embedding messages within other, seemingly harmless messages and lots of researches are working in it. Proposed system is using AES Algorithm and Lossy technique to overcome the limitation of previous work and increasing the process’s speed. The sender uses AES Algorithm to encrypt message and image, then using LSB technique to hide encrypted data in encrypted message. The receive get the original data using the keys that had be...

  15. Parametric Control on Fractional-Order Response for Lü Chaotic System

    KAUST Repository

    Moaddy, K

    2013-04-10

    This paper discusses the influence of the fractional order parameter on conventional chaotic systems. These fractional-order parameters increase the system degree of freedom allowing it to enter new domains and thus it can be used as a control for such dynamical systems. This paper investigates the behaviour of the equally-fractional-order Lü chaotic system when changing the fractional-order parameter and determines the fractional-order ranges for chaotic behaviour. Five different parameter values and six fractional-order cases are discussed through this paper. Unlike the conventional parameters, as the fractional-order increases the system response begins with stability, passing by chaotic behaviour then reaches periodic response. As the system parameter α increases, a shift in the fractional order is required to maintain chaotic response.Therefore, the range of chaotic response can be expanded or minimized by controlling the fractional-order parameter. The non-standard finite difference method is used to solve the fractional-order Lü chaotic system numerically to validate these responses.

  16. Hybrid internal model control and proportional control of chaotic dynamical systems

    Institute of Scientific and Technical Information of China (English)

    QI Dong-lian(齐冬莲); YAO Liang-bin(姚良宾)

    2004-01-01

    A new chaos control method is proposed to take advantage of chaos or avoid it. The hybrid Internal Model Control and Proportional Control learning scheme are introduced. In order to gain the desired robust performance and ensure the system's stability, Adaptive Momentum Algorithms are also developed. Through properly designing the neural network plant model and neural network controller, the chaotic dynamical systems are controlled while the parameters of the BP neural network are modified. Taking the Lorenz chaotic system as example, the results show that chaotic dynamical systems can be stabilized at the desired orbits by this control strategy.

  17. Lag synchronization of chaotic systems with time-delayed linear terms via impulsive control

    Indian Academy of Sciences (India)

    Ranchao Wu; Dongxu Cao

    2013-11-01

    In this paper, the lag synchronization of chaotic systems with time-delayed linear terms via impulsive control is investigated. Based on the stability theory of impulsive delayed differential equations, some sufficient conditions are obtained guaranteeing the synchronized behaviours between two delayed chaotic systems. Numerical simulations on time-delayed Lorenz and hyperchaotic Chen systems are also carried out to show the effectiveness of the proposed scheme. Note that under the scheme the chaotic system is controlled only at discrete time instants, and so it reduces the control cost in real applications.

  18. Adaptive control and synchronization of a fractional-order chaotic system

    Indian Academy of Sciences (India)

    Chunlai Li; Yaonan Tong

    2013-04-01

    In this paper, the chaotic dynamics of a three-dimensional fractional-order chaotic system is investigated. The lowest order for exhibiting chaos in the fractional-order system is obtained. Adaptive schemes are proposed for control and synchronization of the fractional-order chaotic system based on the stability theory of fractional-order dynamic systems. The presented schemes, which contain only a single-state variable, are simple and flexible. Numerical simulations are used to demonstrate the feasibility of the presented methods.

  19. Bidirectional Partial Generalized Synchronization in Chaotic and Hyperchaotic Systems via a New Scheme

    Institute of Scientific and Technical Information of China (English)

    WANG Qi

    2006-01-01

    In this paper, a bidirectional partial generalized (lag, complete, and anticipated) synchronization of a class of continuous-time systems is defined. Then based on the active control idea, a new systematic and concrete scheme is developed to achieve bidirectional partial generalized (lag, complete, and anticipated) synchronization between two chaotic systems or between chaotic and hyperchaotic systems. With the help of symbolic-numerical computation,we choose the modified Chua system, Lorenz system, and the hyperchaotic Tamasevicius-Namajunas-Cenys system to illustrate the proposed scheme. Numerical simulations are used to verify the effectiveness of the proposed scheme. It is interesting that partialchaos synchronization not only can take place between two chaotic systems, but also can take place between chaotic and hyperchaotic systems. The proposed scheme can also be extended to research bidirectional partial generalized (lag, complete, and anticipated) synchronization between other dynamical systems.

  20. A new theorem to synchronization of unified chaotic systems via adaptive control

    Institute of Scientific and Technical Information of China (English)

    Lequan Min; Jianyi Jing

    2003-01-01

    Chaos synchronization has been applied in secure communication, chemical reaction, biological systems, and information processing. A new theorem to synchronization of unified chaotic systems via adaptive control is proposed. The consutructive theorem provides the design scheme for adaptive controller such that a respond system can synchronize with respect to an uncertain drive system. One example for discontinuous chaotic system is proposed to illustrate the effectiveness and feasibility.

  1. Phase-only optical encryption

    DEFF Research Database (Denmark)

    Mogensen, P.C.; Glückstad, J.

    2000-01-01

    We have implemented a phase-only optical encryption and decryption system with a readout based on the generalized phase-contrast method. The experimental system has been implemented with Liquid-crystal spatial light modulators to generate binary phase-encrypted masks and a decrypting key. A phase...

  2. Synchronization of the time—varying parameter chaotic system and its application to secure communication

    Institute of Scientific and Technical Information of China (English)

    Mujing; TaoChao; DuGong-Huan

    2003-01-01

    In this paper we propose and investigate the synchronization of a new chaotic model with time-varying parameters and apply it to improve the security of chaotic communication. In this model, the chaotic system is modulated by both the message and the varying parameters. The varying parameters distort the phase space so heavily that they prevent the carrier from being broken by nonlinear dynamic forecasting method. Theory and simulation experiments with speech signal communication indicate that the receiver can gain a perfect synchronization with the transmitter, and the intruder cannot break down this communication system. We also discuss the robustness of the new communication system.

  3. Synchronization of the time-varying parameter chaotic system and its application to secure communication

    Institute of Scientific and Technical Information of China (English)

    牟静; 陶超; 杜功焕

    2003-01-01

    In this paper we propose and investigate the synchronization of a new chaotic model with time-varying parameters and apply it to improve the security of chaotic communication. In this model, the chaotic system is modulated by both the message and the varying parameters. The varying parameters distort the phase space so heavily that they prevent the carrier from being broken by nonlinear dynamic forecasting method. Theory and simulation experiments with speech signal communication indicate that the receiver can gain a perfect synchronization with the transmitter, and the intruder cannot break down this communication system. We also discuss the robustness of the new communication system.

  4. Semiconductor lasers driven by self-sustained chaotic electronic oscillators and applications to optical chaos cryptography.

    Science.gov (United States)

    Kingni, Sifeu Takougang; Mbé, Jimmi Hervé Talla; Woafo, Paul

    2012-09-01

    In this work, we numerically study the dynamics of vertical cavity surface emitting laser (VCSEL) firstly when it is driven by Chua's oscillator, secondly in case where it is driven by a broad frequency spectral bandwidth chaotic oscillator developed by Nana et al. [Commun. Nonlinear Sci. Numer. Simul. 14, 2266 (2009)]. We demonstrated that the VCSEL generated robust chaotic dynamics compared to the ones found in VCSEL subject to a sinusoidally modulated current and therefore it is more suitable for chaos encryption techniques. The synchronization characteristics and the communication performances of unidirectional coupled VCSEL driven by the broad frequency spectral bandwidth chaotic oscillators are investigated numerically. The results show that high-quality synchronization and transmission of messages can be realized for suitable system parameters. Chaos shift keying method is successfully applied to encrypt a message at a high bitrate.

  5. Study on the chaotic behavior of mining rock seepage system

    Institute of Scientific and Technical Information of China (English)

    Wan Shiwen; Xu Jinhai; Li Chong

    2011-01-01

    One dimensional non-steady,non-Darcy flow of water in a rock stratum was reduced into a system described by six ordinary differential equations involving five controlling parameters.Through response computations and time series analysis,chaotic behavior in the reduced system was discussed in details.Firstly,the dynamical response of the reduced system under a set of parameters was calculated,and the power spectrum of the attractor was obtained through fast Lagrangian transformation; then the phase space was reconstructed by fixing embedding dimension to be 6 and delay time to range from 1 to 20,and the correlation dimension of the attractor was calculated based on the curves under the coordinates of logarithm of correlation integral vs.logarithm of covering radius; and lastly,the Lyapunov indices of the attractor were calculated by using Gram-Schmit's orthogonalization method.The results show that the power spectrum of the attractor is continuous; the correlation dimension of the attractor is equal to 2.36; among the Lyapunov indices,LE1,LE2,LE3 are positive,LE5,LE6 are negative,and LE4 fluctuates near zero.All the analysis indicates that there may exist chaos in the system of non-steady,non-Darcy flow.

  6. Synchronisation of chaotic systems using a novel sampled-data fuzzy controller

    Institute of Scientific and Technical Information of China (English)

    Feng Yi-Fu; Zhang Qing-Ling

    2011-01-01

    This paper presents the synchronisation of chaotic systems using a sampled-data fuzzy controller and is meaningful for many physical real-life applications. Firstly, a Takagi-Sugeno (T-S) fuzzy model is employed to represent the chaotic systems that contain some nonlinear terms, then a type of fuzzy sampled-data controller is proposed and an error system formed by the response and drive chaotic system. Secondly, relaxed LMI-based synchronisation conditions are derived by using a new paraneter-dependent Lyapunov-Krasovskii functional and relaxed stabilisation techniques for the underlying error system. The derived LMI-based conditions are used to aid the design of a sampled-data fuzzy controller to achieve the synchronisation of chaotic systems. Finally, a numerical example is provided to illustrate the effectiveness of the proposed results.

  7. Fuzzy Modeling, Tracking Control and Synchronization of the Rossler's Chaotic System

    Institute of Scientific and Technical Information of China (English)

    方建安; 范丹丹

    2004-01-01

    In this paper, a novel method to model, track control and synchronize the Rossler's chaotic system is proposed. The fuzzy logical system is used so that the fuzzy inference rule is transferred into a type of variable coef ficient nonlinear ordinary differential equation. Consequently the model of the chaotic system is obtained. Then a fuzzy tracking control and a fuzzy synchronization for chaotic systems is proposed as well. First, a known tracking control for the Rossler's system is used in this paper. We represent the Rossler's chaotic and control systems into fuzzy inference rules. Then the variable coefficient nonlinear ordinary differential equation is also got. Simulation results show that such an approach is effective and has a high precision.

  8. Generalized reduced-order synchronization of chaotic system based on fast slide mode

    Institute of Scientific and Technical Information of China (English)

    Gao Tie-Gang; Chen Zeng-Qiang; Yuan Zhu-Zhi

    2005-01-01

    A new kind of generalized reduced-order synchronization of different chaotic systems is proposed in this paper.It is shown that dynamical evolution of third-order oscillator can be synchronized with the canonical projection of a fourth-order chaotic system generated through nonsingular states transformation from a cell neural net chaotic system.In this sense, it is said that generalized synchronization is achieved in reduced-order. The synchronization discussed here expands the scope of reduced-order synchronization studied in relevant literatures. In this way, we can achieve generalized reduced-order synchronization between many famous chaotic systems such as the second-order D(u)ffing system and the third-order Lorenz system by designing a fast slide mode controller. Simulation results are provided to verify the operation of the designed synchronization.

  9. Generalized Projective Synchronization of Fractional Order Chaotic Systems with Different Dimensions

    Institute of Scientific and Technical Information of China (English)

    WANG Sha; YU Yong-Guang

    2012-01-01

    The generalized projective synchronization of different dimensional fractional order chaotic systems is investigated. According to the stability theory of linear fractional order systems, a sufficient condition to realize synchronization is obtained. The fractional order chaotic and hyperchaotic systems are applied to achieve synchronization in both reduced and increased dimensions. The corresponding numerical results coincide with theoretical analysis.%The generalized projective synchronization of different dimensional fractional order chaotic systems is investigated.According to the stability theory of linear fractional order systems,a sufficient condition to realize synchronization is obtained.The fractional order chaotic and hyperchaotic systems are applied to achieve synchronization in both reduced and increased dimensions.The corresponding numerical results coincide with theoretical analysis.

  10. Hopf Bifurcation Analysis and Chaos Control of a Chaotic System without ilnikov Orbits

    Directory of Open Access Journals (Sweden)

    Na Li

    2015-01-01

    Full Text Available This paper mainly investigates the dynamical behaviors of a chaotic system without ilnikov orbits by the normal form theory. Both the stability of the equilibria and the existence of local Hopf bifurcation are proved in view of analyzing the associated characteristic equation. Meanwhile, the direction and the period of bifurcating periodic solutions are determined. Regarding the delay as a parameter, we discuss the effect of time delay on the dynamics of chaotic system with delayed feedback control. Finally, numerical simulations indicate that chaotic oscillation is converted into a steady state when the delay passes through a certain critical value.

  11. Numerical detection of unstable periodic orbits in continuous-time dynamical systems with chaotic behaviors

    Directory of Open Access Journals (Sweden)

    Y. Saiki

    2007-09-01

    Full Text Available An infinite number of unstable periodic orbits (UPOs are embedded in a chaotic system which models some complex phenomenon. Several algorithms which extract UPOs numerically from continuous-time chaotic systems have been proposed. In this article the damped Newton-Raphson-Mees algorithm is reviewed, and some important techniques and remarks concerning the practical numerical computations are exemplified by employing the Lorenz system.

  12. Chaotic anti-control for the bounded linear continuous-time system

    Institute of Scientific and Technical Information of China (English)

    2008-01-01

    With regard to the bounded linear continuous-time system,a universal chaotic anti-controlling method was presented on the basis of tracking control.A tracking controller is designed to such an extent that it can track any chaotic reference input,thus making it possible to chaotify the linear system.The controller is identical in structure for different controlled linear systems.Computer simulations proved the effectiveness of the proposed method.

  13. Chaotic Behavior in a Flexible Assembly Line of a Manufacturing System

    OpenAIRE

    Sajid, M; F. Almufadi; Jahanzaib, M.

    2015-01-01

    The purpose of the present work is to study the chaotic behavior in a flexible assembly line of a manufacturing system. A flexible assembly line can accommodate a variety of product types. Result analysis is performed to obtain time persistent data. The behavior of the system is observed for Work-In-Process, as assembling systems are sensitive during processing. It is found that the average Lyapunov exponent is positive in the considered case, and thus chaotic behavior may be present in flexi...

  14. Increasing-order Projective Synchronization of Chaotic Systems with Time Delay

    Institute of Scientific and Technical Information of China (English)

    MIAO Qing-Ying; FANG Jian-An; TANG Yang; DONG Ai-Hua

    2009-01-01

    This work is concerned with lag projective synchronization of chaotic systems with increasing order. The systems under consideration have unknown parameters and different structures. Combining the adaptive control method and feedback control technique, we design a suitable controller and parameter update law to achieve lag synchronization of chaotic systems with increasing order. The result is rigorously proved by the Lyapunov stability theorem. Moreover, corresponding simulation results are given to verify the effectiveness of the proposed methods.

  15. Chaotic anti-control for the bounded linear continuous-time system

    Institute of Scientific and Technical Information of China (English)

    Li Jianfen; Lin Hui; Li Nong

    2008-01-01

    With regard to the bounded linear continuous-time system, a universal chaotic anti-controlling method was presented on the basis of tracking control. A tracking controller is designed to such an extent that it can track any chaotic reference input, thus making it possible to chaotify the linear system. The controller is identical in structure for different controlled linear systems. Computer simulations proved the effectiveness of the proposed method.

  16. Chaotic system for the detection of periodic signals under the background of strong noise

    Institute of Scientific and Technical Information of China (English)

    2003-01-01

    We propose a method to study the chaotic system for the detection of periodic signals in the presence of strong background noise. The numerical experiments indicate that the chaotic system constructed from the modified Duffing-Holmes equation is sensitive to the weak periodic signal mixed with noise, and it has certain immunity to noise. The signal to noise ratio for the system can reach to about -91 dB.

  17. Chaotic Visual Cryptosystem Using Empirical Mode Decomposition Algorithm for Clinical EEG Signals.

    Science.gov (United States)

    Lin, Chin-Feng

    2016-03-01

    This paper, proposes a chaotic visual cryptosystem using an empirical mode decomposition (EMD) algorithm for clinical electroencephalography (EEG) signals. The basic design concept is to integrate two-dimensional (2D) chaos-based encryption scramblers, the EMD algorithm, and a 2D block interleaver method to achieve a robust and unpredictable visual encryption mechanism. Energy-intrinsic mode function (IMF) distribution features of the clinical EEG signal are developed for chaotic encryption parameters. The maximum and second maximum energy ratios of the IMFs of a clinical EEG signal to its refereed total energy are used for the starting points of chaotic logistic map types of encrypted chaotic signals in the x and y vectors, respectively. The minimum and second minimum energy ratios of the IMFs of a clinical EEG signal to its refereed total energy are used for the security level parameters of chaotic logistic map types of encrypted chaotic signals in the x and y vectors, respectively. Three EEG database, and seventeen clinical EEG signals were tested, and the average r and mse values are 0.0201 and 4.2626 × 10(-29), respectively, for the original and chaotically-encrypted through EMD clinical EEG signals. The chaotically-encrypted signal cannot be recovered if there is an error in the input parameters, for example, an initial point error of 0.000001 %. The encryption effects of the proposed chaotic EMD visual encryption mechanism are excellent.

  18. The open-plus-closed loop (OPCL) method for chaotic systems with multiple strange attractors

    Institute of Scientific and Technical Information of China (English)

    Song Yun-Zhong

    2007-01-01

    Based on the open-plus-closed-loop (OPCL) control method a systematic and comprehensive controller is presented in this paper for a chaotic system, that is, the Newton-Leipnik equation with two strange attractors: the upper attractor(UA) and the lower attractor (LA). Results show that the final structure of the suggested controller for stabilization has a simple linear feedback form. To keep the integrity of the suggested approach, the globality proof of the basins of entrainment is also provided. In virtue of the OPCL technique, three different kinds of chaotic controls of the system are investigated, separately: the original control forcing the chaotic motion to settle down to the origin from an arbitrary position of the phase space; the chaotic intra-attractor control for stabilizing the equilibrium points only belonging to the upper chaotic attractor or the lower chaotic one; and the inter-attractor control for compelling the chaotic oscillation from one basin to another one. Both theoretical analysis and simulation results verify the validity of the proposed means.

  19. Chaotic System Identification Based on a Fuzzy Wiener Model with Particle Swarm Optimization

    Institute of Scientific and Technical Information of China (English)

    LI Yong; TANG Ying-Gan

    2010-01-01

    @@ A fuzzy Wiener model is proposed to identify chaotic systems.The proposed fuzzy Wiener model consists of two parts,one is a linear dynamic subsystem and the other is a static nonlinear part,which is represented by the Takagi-Sugeno fuzzy model Identification of chaotic systems is converted to find optimal parameters of the fuzzy Wiener model by minimizing the state error between the original chaotic system and the fuzzy Wiener model.Particle swarm optimization algorithm,a global optimizer,is used to search the optimal parameter of the fuzzy Wiener model.The proposed method can identify the parameters of the linear part and nonlinear part simultaneously.Numerical simulations for Henón and Lozi chaotic system identification show the effectiveness of the proposed method.

  20. Runge-Kutta model-based nonlinear observer for synchronization and control of chaotic systems.

    Science.gov (United States)

    Beyhan, Selami

    2013-07-01

    This paper proposes a novel nonlinear gradient-based observer for synchronization and observer-based control of chaotic systems. The model is based on a Runge-Kutta model of the chaotic system where the evolution of the states or parameters is derived based on the error-square minimization. The stability and convergence conditions of observer and control methods are analyzed using a Lyapunov stability approach. In numerical simulations, the proposed observer and well-known sliding-mode observer are compared for the synchronization of a Lü chaotic system and observer-based stabilization of a Chen chaotic system. The noisy case for synchronization and parameter uncertainty case for stabilization are also considered for both observer-based methods.

  1. Attractors of relaxation discrete-time systems with chaotic dynamics on a fast time scale.

    Science.gov (United States)

    Maslennikov, Oleg V; Nekorkin, Vladimir I

    2016-07-01

    In this work, a new type of relaxation systems is considered. Their prominent feature is that they comprise two distinct epochs, one is slow regular motion and another is fast chaotic motion. Unlike traditionally studied slow-fast systems that have smooth manifolds of slow motions in the phase space and fast trajectories between them, in this new type one observes, apart the same geometric objects, areas of transient chaos. Alternating periods of slow regular motions and fast chaotic ones as well as transitions between them result in a specific chaotic attractor with chaos on a fast time scale. We formulate basic properties of such attractors in the framework of discrete-time systems and consider several examples. Finally, we provide an important application of such systems, the neuronal electrical activity in the form of chaotic spike-burst oscillations.

  2. Chaotic behaviour of nonlinear coupled reaction–diffusion system in four-dimensional space

    Indian Academy of Sciences (India)

    Li Zhang; Shutang Liu; Chenglong Yu

    2014-06-01

    In recent years, nonlinear coupled reaction–diffusion (CRD) system has been widely investigated by coupled map lattice method. Previously, nonlinear behaviour was observed dynamically when one or two of the three variables in the discrete system change. In this paper, we consider the chaotic behaviour when three variables change, which is called as four-dimensional chaos. When two parameters in the discrete system are unknown, we first give the existing condition of the chaos in four-dimensional space by the generalized definitions of spatial periodic orbits and spatial chaos. In addition, the chaotic behaviour will vary with the parameters. Then we propose a generalized Lyapunov exponent in four-dimensional space to characterize the different effects of parameters on the chaotic behaviour, which has not been studied in detail. In order to verify the chaotic behaviour of the system and the different effects clearly, we simulate the dynamical behaviour in two- and three-dimensional spaces.

  3. NOISE-INDUCED CHAOTIC MOTIONS IN HAMILTONIAN SYSTEMS WITH SLOW-VARYING PARAMETERS

    Institute of Scientific and Technical Information of China (English)

    王双连; 郭乙木; 甘春标

    2001-01-01

    This paper studies chaotic motions in quasi-integrable Hamiltonian systems with slow-varying parameters under both harmonic and noise excitations.Based on the dynamic theory and some assumptions of excited noises, an extended form of the stochastic Melnikov method is presented. Using this extended method, the homoclinic bifurcations and chaotic behavior of a nonlinear Hamiltonian system with weak feed-back control under both harmonic and Gaussian white noise excitations are analyzed in detail. It is shown that the addition of stochastic excitations can make the parameter threshold value for the occurrence of chaotic motions vary in a wider region. Therefore, chaotic motions may arise easily in the system. By the Monte-Carlo method, the numerical results for the time-history and the maximum Lyapunov exponents of an example system are finally given to illustrate that the presented method is effective.

  4. Attractors of relaxation discrete-time systems with chaotic dynamics on a fast time scale

    Science.gov (United States)

    Maslennikov, Oleg V.; Nekorkin, Vladimir I.

    2016-07-01

    In this work, a new type of relaxation systems is considered. Their prominent feature is that they comprise two distinct epochs, one is slow regular motion and another is fast chaotic motion. Unlike traditionally studied slow-fast systems that have smooth manifolds of slow motions in the phase space and fast trajectories between them, in this new type one observes, apart the same geometric objects, areas of transient chaos. Alternating periods of slow regular motions and fast chaotic ones as well as transitions between them result in a specific chaotic attractor with chaos on a fast time scale. We formulate basic properties of such attractors in the framework of discrete-time systems and consider several examples. Finally, we provide an important application of such systems, the neuronal electrical activity in the form of chaotic spike-burst oscillations.

  5. Dynamic Reconstruction-Based Fuzzy Neural Network Method for Fault Detection in Chaotic System

    Institute of Scientific and Technical Information of China (English)

    YANG Hongying; YE Hao; WANG Guizeng

    2008-01-01

    This paper presents a method for detecting weak fault signals in chaotic systems based on the chaotic dynamics reconstruction technique and the fuzzy neural system (FNS). The Grassberger-Procaccia algorithm and least squares regression were used to calculate the correlation dimension for the model order estimate. Based on the model order, an appropriately structured FNS model was designed to predict system faults. Through reasonable analysis of predicted errors, the disturbed signal can be extracted efficiently and correctly from the chaotic background. Satisfactory results were obtained by using several kinds of simula-tive faults which were extracted from the practical chaotic fault systems. Experimental results demonstra tethat the proposed approach has good prediction accuracy and can deal with data having a -40 dB signal to noise ratio (SNR). The low SNR requirement makes the approach a powerful tool for early fault detection.

  6. Runge-Kutta model-based nonlinear observer for synchronization and control of chaotic systems.

    Science.gov (United States)

    Beyhan, Selami

    2013-07-01

    This paper proposes a novel nonlinear gradient-based observer for synchronization and observer-based control of chaotic systems. The model is based on a Runge-Kutta model of the chaotic system where the evolution of the states or parameters is derived based on the error-square minimization. The stability and convergence conditions of observer and control methods are analyzed using a Lyapunov stability approach. In numerical simulations, the proposed observer and well-known sliding-mode observer are compared for the synchronization of a Lü chaotic system and observer-based stabilization of a Chen chaotic system. The noisy case for synchronization and parameter uncertainty case for stabilization are also considered for both observer-based methods. PMID:23672740

  7. Application of Multistage Homotopy Perturbation Method to the Chaotic Genesio System

    Directory of Open Access Journals (Sweden)

    M. S. H. Chowdhury

    2012-01-01

    Full Text Available Finding accurate solution of chaotic system by using efficient existing numerical methods is very hard for its complex dynamical behaviors. In this paper, the multistage homotopy-perturbation method (MHPM is applied to the Chaotic Genesio system. The MHPM is a simple reliable modification based on an adaptation of the standard homotopy-perturbation method (HPM. The HPM is treated as an algorithm in a sequence of intervals for finding accurate approximate solutions to the Chaotic Genesio system. Numerical comparisons between the MHPM and the classical fourth-order Runge-Kutta (RK4 solutions are made. The results reveal that the new technique is a promising tool for the nonlinear chaotic systems of ordinary differential equations.

  8. Noise amplification by chaotic dynamics in a delayed feedback laser system and its application to nondeterministic random bit generation.

    Science.gov (United States)

    Sunada, Satoshi; Harayama, Takahisa; Davis, Peter; Tsuzuki, Ken; Arai, Ken-Ichi; Yoshimura, Kazuyuki; Uchida, Atsushi

    2012-12-01

    We present an experimental method for directly observing the amplification of microscopic intrinsic noise in a high-dimensional chaotic laser system, a laser with delayed feedback. In the experiment, the chaotic laser system is repeatedly switched from a stable lasing state to a chaotic state, and the time evolution of an ensemble of chaotic states starting from the same initial state is measured. It is experimentally demonstrated that intrinsic noises amplified by the chaotic dynamics are transformed into macroscopic fluctuating signals, and the probability density of the output light intensity actually converges to a natural invariant probability density in a strongly chaotic regime. Moreover, with the experimental method, we discuss the application of the chaotic laser systems to physical random bit generators. It is experimentally shown that the convergence to the invariant density plays an important role in nondeterministic random bit generation, which could be desirable for future ultimate secure communication systems.

  9. Synchronization of Different Fractional Order Time-Delay Chaotic Systems Using Active Control

    Directory of Open Access Journals (Sweden)

    Jianeng Tang

    2014-01-01

    Full Text Available Chaos synchronization of different fractional order time-delay chaotic systems is considered. Based on the Laplace transform theory, the conditions for achieving synchronization of different fractional order time-delay chaotic systems are analyzed by use of active control technique. Then numerical simulations are provided to verify the effectiveness and feasibility of the developed method. At last, effects of the fraction order and the time delay on synchronization are further researched.

  10. Adaptive lag synchronization and parameter identification of fractional order chaotic systems

    Institute of Scientific and Technical Information of China (English)

    Zhang Ruo-Xun; Yang Shi-Ping

    2011-01-01

    This paper proposes a simple scheme for the lag synchronization and the parameter identification of fractional order chaotic systems based on the new stability theory. The lag synchronization is achieved and the unknown parameters are identified by using the adaptive lag laws. Moreover,the scheme is analytical and is simple to implement in practice.The well-known fractional order chaotic Lii system is used to illustrate the validity of this theoretic method.

  11. Hybrid Dislocated Control and General Hybrid Projective Dislocated Synchronization for Memristor Chaotic Oscillator System

    OpenAIRE

    Junwei Sun; Chun Huang; Guangzhao Cui

    2014-01-01

    Some important dynamical properties of the memristor chaotic oscillator system have been studied in the paper. A novel hybrid dislocated control method and a general hybrid projective dislocated synchronization scheme have been realized for memristor chaotic oscillator system. The paper firstly presents hybrid dislocated control method for stabilizing chaos to the unstable equilibrium point. Based on the Lyapunov stability theorem, general hybrid projective dislocated synchronization has been...

  12. Adaptive generalized projective synchronization of two different chaotic systems with unknown parameters

    Institute of Scientific and Technical Information of China (English)

    Zhang Ruo-Xun; Yang Shi-Ping

    2008-01-01

    This paper presents a general method of the generalized projective synchronization and the parameter identification between two different chaotic systems with unknown parameters.This approach is based on Lyapunov stability theory,and employs a combination of feedback control and adaptive control.With this method one can achieve the generalized projective synchronization and realize the parameter identifications between almost all chaotic (hyperchaotic) systems with unknown parameters.Numerical simulations results are presented to demonstrate the effectiveness of the method.

  13. Generalized Gaussian wave packet dynamics: Integrable and chaotic systems.

    Science.gov (United States)

    Pal, Harinder; Vyas, Manan; Tomsovic, Steven

    2016-01-01

    The ultimate semiclassical wave packet propagation technique is a complex, time-dependent Wentzel-Kramers-Brillouin method known as generalized Gaussian wave packet dynamics (GGWPD). It requires overcoming many technical difficulties in order to be carried out fully in practice. In its place roughly twenty years ago, linearized wave packet dynamics was generalized to methods that include sets of off-center, real trajectories for both classically integrable and chaotic dynamical systems that completely capture the dynamical transport. The connections between those methods and GGWPD are developed in a way that enables a far more practical implementation of GGWPD. The generally complex saddle-point trajectories at its foundation are found using a multidimensional Newton-Raphson root search method that begins with the set of off-center, real trajectories. This is possible because there is a one-to-one correspondence. The neighboring trajectories associated with each off-center, real trajectory form a path that crosses a unique saddle; there are exceptions that are straightforward to identify. The method is applied to the kicked rotor to demonstrate the accuracy improvement as a function of ℏ that comes with using the saddle-point trajectories.

  14. Generalized Gaussian wave packet dynamics: Integrable and chaotic systems.

    Science.gov (United States)

    Pal, Harinder; Vyas, Manan; Tomsovic, Steven

    2016-01-01

    The ultimate semiclassical wave packet propagation technique is a complex, time-dependent Wentzel-Kramers-Brillouin method known as generalized Gaussian wave packet dynamics (GGWPD). It requires overcoming many technical difficulties in order to be carried out fully in practice. In its place roughly twenty years ago, linearized wave packet dynamics was generalized to methods that include sets of off-center, real trajectories for both classically integrable and chaotic dynamical systems that completely capture the dynamical transport. The connections between those methods and GGWPD are developed in a way that enables a far more practical implementation of GGWPD. The generally complex saddle-point trajectories at its foundation are found using a multidimensional Newton-Raphson root search method that begins with the set of off-center, real trajectories. This is possible because there is a one-to-one correspondence. The neighboring trajectories associated with each off-center, real trajectory form a path that crosses a unique saddle; there are exceptions that are straightforward to identify. The method is applied to the kicked rotor to demonstrate the accuracy improvement as a function of ℏ that comes with using the saddle-point trajectories. PMID:26871079

  15. Validating the physical model of a chaotic system by topological analysis.

    Science.gov (United States)

    Used, Javier; Martín, Juan Carlos

    2013-05-01

    Topological analysis is employed for the first time to our knowledge as a method of validation for a physical model describing a chaotic system. Topological analysis theory provides both a way to characterize the topological structure of chaotic attractors by means of a set of integer numbers and a method to obtain this set departing from a time series generated by the chaotic system. The validation method proposed here consists of comparing the topological structure of chaotic attractors obtained from time series generated on the one hand by an experimental system and on the other hand by the numerical model under test. This procedure has been applied to an erbium-doped fiber laser subject to pump power sine-wave modulation.

  16. Chattering-free fuzzy sliding-mode control strategy for uncertain chaotic systems

    International Nuclear Information System (INIS)

    This paper proposes a chattering-free fuzzy sliding-mode control (FSMC) strategy for uncertain chaotic systems. A fuzzy logic control is used to replace the discontinuous sign function of the reaching law in traditional sliding-mode control (SMC), and hence a control input without chattering is obtained in the chaotic systems with uncertainties. Base on the Lyapunov stability theory, we address the design schemes of integration fuzzy sliding-mode control, where the reaching law is proposed by a set of linguistic rules and the control input is chattering free. The Genesio chaotic system is used to test the proposed control strategy and the simulation results show the FSMC not only can control the uncertain chaotic behaviors to a desired state without oscillator very fast, but also the switching function is smooth without chattering. This result implies that this strategy is feasible and effective for chaos control

  17. Bounds for a new chaotic system and its application in chaos synchronization

    Science.gov (United States)

    Zhang, Fuchen; Shu, Yonglu; Yang, Hongliang

    2011-03-01

    This paper has investigated the localization problem of compact invariant sets of a new chaotic system with the help of the iteration theorem and the first order extremum theorem. If there are more iterations, then the estimation for the bound of the system will be more accurate, because the shape of the chaotic attractor is irregular. We establish that all compact invariant sets of this system are located in the intersection of a ball with two frusta and we also compute its parameters. It is a great advantage that we can attain a smaller bound of the chaotic attractor compared with the classical method. One numerical example illustrating a localization of a chaotic attractor is presented as well.

  18. Pi_1-Statements, Chaotic Systems and the Church-Turing Thesis

    CERN Document Server

    Calude, Cristian S; Svozil, Karl

    2010-01-01

    Proving that a dynamical system is chaotic is an important problem in chaos theory. In this note we show that to every Pi_1-statement one can associate a dynamical system such that proving in Zermelo-Fraenkel set theory with the Axiom of Choice (ZFC), the chaoticity of the dynamical system is equivalent to proving this statement in ZFC. Fermat's last theorem, the Riemann hypothesis and the four color theorem are examples of Pi_1-statements. By applying a computational method to Pi_1-statements we evaluate the complexity of proving the chaoticity of some dynamical systems. We show that there are dynamical systems for which the ZFC proofs of their chaoticity are arbitrarily complex according to the above complexity measure. Also, there are infinitely many chaotic systems for which ZFC cannot prove their chaoticity. The techniques are related to (i) the construction of a Poincare box as a classical physical random number generator (akin to a quantum Born box), and (ii) the conceivable capability of classical phy...

  19. Multiple-image encryption using polarized light encoding and the optical interference principle in the Fresnel-transform domain.

    Science.gov (United States)

    Wang, Qu; Guo, Qing; Zhou, Jinyun

    2013-12-20

    We propose a multiple-image encryption scheme, based on polarized light encoding and the interference principle of phase-only masks (POMs), in the Fresnel-transform (FrT) domain. In this scheme, each secret image is converted into an intensity image by polarized light encoding, where a random key image and a pixilated polarizer with random angles are employed as keys. The intensity encrypted images produced by different secret images are convolved together and then inverse Fresnel-transformed. Phase and amplitude truncations are used to generate the asymmetric decryption keys. The phase-truncated inverse FrT spectrum is sent into an interference-based encryption (IBE) system to analytically obtain two POMs. To reduce the transmission and storage load on the keys, the chaotic mapping method is employed to generate random distributions of keys for encryption and decryption. One can recover all secret images successfully only if the corresponding decryption keys, the mechanism of FrTs, and correct chaotic conditions are known. The inherent silhouette problem can be thoroughly resolved by polarized light encoding in this proposal, without using any time-consuming iterative methods. The entire encryption and decryption process can be realized digitally, or in combination with optical means. Numerical simulation results are presented to verify the effectiveness and performance of the proposed scheme.

  20. ANALYSIS AND APPLIED STUDY OF DYNAMIC CHARACTERISTICS OF CHAOTIC REPELLER IN COMPLICATED SYSTEM

    Institute of Scientific and Technical Information of China (English)

    MA Jun-hai; REN Biao; CHEN Yu-shu

    2005-01-01

    Fractal characters and fractal dimension of time series created by repeller in complicated system were studied and the time series were reconstructed by applying the theory of phase space reconstruction for chaotic time series. The influence of zero-mean treatment, Fourier filter on prediction for time series were studied. The choice of prediction sample affects the relative error and the prediction length which were also under good concern. The results show that the model provided here are practical for the modeling and prediction of time series created by chaotic repellers. Zero-mean treatment has changed prediction result quantitatively for chaotic repeller sample data. But using Fourier filter may decrease the prediction precision. This is theoretical and practical for study on chaotic repeller in complicated system.

  1. Theoretical model of optical fiber secure communication system with chaotic multiple-quantum-well lasers

    Institute of Scientific and Technical Information of China (English)

    2007-01-01

    Chaotic synchronization of injected multiple-quantum-well lasers of optical fiber system and a theoretical model of optical fiber chaotic secure communication system are presented by coupling a chaotic multiple-quantum-well laser synchronization system and a fiber channel. A new chaotic encoding method of chaos phase shift keying On/Off is proposed for optical fiber secure communications. Chaotic synchronization is achieved numerically in long-haul fiber system at wavelength 1.55μm. The effect of the nonlinear-phase of fiber is analyzed on chaotic signal and synchronization. A sinusoidal signal of 0.2 GHz frequency is simulated numerically with chaos masking in long-haul fiber analog communication at wavelength 1.55μm while a digital signal of 0.5 Gbit/s bit rate is simulated numerically with c1 haos masking and a rate of 0.05 Gbit/s are also simulated numerically with chaos shift keying and chaos phase shift keying On/Off in long-haul fiber digital communications at wavelength 1.55μm

  2. Chaos communication based on synchronization of discrete-time chaotic systems

    Institute of Scientific and Technical Information of China (English)

    Lu Jun-Guo; Xi Yu-Geng

    2005-01-01

    A novel chaos communication method is proposed based on synchronization of discrete-time chaotic systems. This method uses a full-order state observer to achieve synchronization and secure communication between the transmitter and the receiver. Further, we present a multiple-access chaotic digital communication method by combining the observer with the on-line least square method. Simulation results are also given for illustration.

  3. A simple asymptotic trajectory control of full states of a unified chaotic system

    Institute of Scientific and Technical Information of China (English)

    Yu Dong-Chuan; Wu Ai-Guo; Wang Dong-Qing

    2006-01-01

    A simple full-state asymptotic trajectory control (FSATC) scheme is proposed to asymptotically drive full states of a unified chaotic system (UCS) to arbitrary desired trajectories. The FSATC uses only information, I.e. One state of the UCS. A sinusoidal wave and two chaotic variables are taken as illustrative tracking trajectories to verify that using the proposed FSATC can make full UCS states track desired trajectories with high tracking accuracy in a finite time.

  4. Research on Fusion Encryption Technology of Blended Security Network%混合公安网络中融合加密技术的研究

    Institute of Scientific and Technical Information of China (English)

    杨虹

    2014-01-01

    公安网络系统单纯采用一种加密技术无法确保混合公安网络系统的安全,弊端明显。分析了对称加密和非对称加密技术,提出一种混合公安网络中融合加密技术,先采用二者结合的混合加密方法,对混合公安网络进行初始加密,再通过基于超混沌映射的数据融合加密算法,对混合公安网络进行再次加密,采用Chen超混沌系统形成四条混沌序列,对这四条混沌序列进行取小数部分、矩阵相乘及取索引值等变形处理,分别利用变形后的混沌序列对原始数据和密钥进行位置置乱处理,用交换位平面和按位取反处理扰乱数据值,通过加运算获取加密数据。实验结果说明,所提融合加密技术具有较高的加密效率和质量。%Pure public security network system adopts a kind of encryption technology can not ensure the safety of the pub-lic security network system is obvious. Symmetric encryption and asymmetric encryption technology is analyzed, and put forward a kind of mixed public security network encryption technology in the fusion, using a combination of hybrid encryp-tion method, first on the public security network for the initial encryption, again through the encryption algorithm based on hyperchaos of mapping data fusion, the public security network for hybrid encryption, again by Chen hyperchaos system form the four chaotic sequence, of these four chaotic sequence to fetch the decimal part, matrix multiplication, and take the deformation processing, such as index value respectively using chaotic sequence after deformation was carried out on the original data and the key position scrambling to deal with, in exchange of a plane and take the bitwise treatment disrupt the data values, by adding operation for encrypted data. The experimental results indicate that the proposed fusion encryption technology has high encryption efficiency and quality.

  5. A General Response System Control Method Based on Backstepping Design for Synchronization of Continuous Scalar Chaotic Signal

    Institute of Scientific and Technical Information of China (English)

    WANG Jing; GAO Jin-Feng; MA Xi-Kui; LIANG Zhan-Hong

    2006-01-01

    @@ A general response system control method for synchronization of continuous scalar chaotic signal is presented. The proposed canonical general response system can cover most of the well-known chaotic systems. Conversely, each of these chaotic systems can also be used to construct the general response system. Furthermore, a novel controller of the proposed response system is designed based on backstepping technique, with which the output of the general response system and the given continuous chaotic signal can synchronize perfectly. Two numerical examples are given to illustrate the effectiveness of the proposed control method.

  6. A Chaotic Block Cipher for Real-Time Multimedia

    Directory of Open Access Journals (Sweden)

    M. Venkatesulu

    2012-01-01

    Full Text Available Problem statement: The widespread use of image, audio and video data makes media content protection increasingly necessary and important. We propose a naive approach which treats the multimedia signal to be protected as a text and use proposed encryption design to encrypt the whole data stream. Upon reception, the entire cipher text data stream would be decrypted and playback can be performed at the client end with an initial time delay. Approach: We introduce a block cipher algorithm, which encrypts and decrypts a block size of 512 bits regardless of the file format. In this, a permutation algorithm using a chaotic system is employed to provide the shuffler function. A shuffler operator is defined using the shuffler function. A random key generator generates key sequences and the scheme employs key-dependant transformations based on distance in the shuffling operator. The process of encryption/decryption is governed by the shuffler function, shuffler operator and the pseudorandom key. Results: The basic operation used is logical XOR and so the algorithm has a very high encryption/decryption speed. The execution time shows the proposed scheme is faster than the existing cryptographic schemes. Conclusion: The proposal of the algorithm is to manage the tradeoffs between the speed and security and hence appropriate for real-time image and video communication applications.

  7. STUDY ON PREDICTION METHODS FOR DYNAMIC SYSTEMS OF NONLINEAR CHAOTIC TIME SERIES

    Institute of Scientific and Technical Information of China (English)

    马军海; 陈予恕; 辛宝贵

    2004-01-01

    The prediction methods for nonlinear dynamic systems which are decided by chaotic time series are mainly studied as well as structures of nonlinear self-related chaotic models and their dimensions.By combining neural networks and wavelet theories,the structures of wavelet transform neural networks were studied and also a wavelet neural networks learning method was given.Based on wavelet networks,a new method for parameter identification was suggested,which can be used selectively to extract different scales of frequency and time in time series in order to realize prediction of tendencies or details of original time series.Through pre-treatment and comparison of results before and after the treatment,several useful conclusions are reached:High accurate identification can be guaranteed by applying wavelet networks to identify parameters of self-related chaotic models and more valid prediction of the chaotic time series including noise can be achieved accordingly.

  8. Adaptive robust control of chaotic oscillations in power system with excitation limits

    Institute of Scientific and Technical Information of China (English)

    Wei Du-Qu; Luo Xiao-Shu

    2007-01-01

    With system parameters falling into a certain area, power system with excitation limits experiences complicated chaotic oscillations which threaten the secure and stable operation of power system. In this paper, to control these unwanted chaotic oscillations, a straightforward adaptive chaos controller based on Lyapunov asymptotical stability theory is designed. Since the presented controller does not need to change the controlled system structure and not to use any information of system except the system state variables, the designed controller is simple and desirable.Simulation results show that the proposed control law is very effective. This work is helpful to maintain the power system's security operation.

  9. Hardware stream cipher with controllable chaos generator for colour image encryption

    KAUST Repository

    Barakat, Mohamed L.

    2014-01-01

    This study presents hardware realisation of chaos-based stream cipher utilised for image encryption applications. A third-order chaotic system with signum non-linearity is implemented and a new post processing technique is proposed to eliminate the bias from the original chaotic sequence. The proposed stream cipher utilises the processed chaotic output to mask and diffuse input pixels through several stages of XORing and bit permutations. The performance of the cipher is tested with several input images and compared with previously reported systems showing superior security and higher hardware efficiency. The system is experimentally verified on XilinxVirtex 4 field programmable gate array (FPGA) achieving small area utilisation and a throughput of 3.62 Gb/s. © The Institution of Engineering and Technology 2013.

  10. The Research of Mobile phone Entrance Guard System Model based on the Encryption Two-dimensional Code

    Directory of Open Access Journals (Sweden)

    Chu Jianli

    2013-09-01

    Full Text Available This article designs a new mobile-phone entrance guard system, uses the encryption two-dimensional code for identity authentication. Different from other similar products in the market, this system does not rely on specialized mobile phone card or NFC (near field communication module. It can be directly realized through mobile-phone software, and it can be operated simple and safer. This article designs the whole system model, includes structure, function and workflow. It also analyzes and researches the main algorithms used in the system, which include security policy algorithm, encryption two-dimensional code algorithm and image recognition algorithm. Finally, it provides the solution method for the problem in the experimental simulation. It also evaluated and summarized the experimental results.

  11. Dynamic encryption method

    DEFF Research Database (Denmark)

    2013-01-01

    Disclosed is a method of transmitting a data set using encryption, wherein the method comprises the steps of: selecting a first encryption technique, wherein said first encryption technique comprises a first encryption algorithm for encrypting plain data into cipher data, and a first decryption...

  12. Extreme multistability in a memristor-based multi-scroll hyper-chaotic system.

    Science.gov (United States)

    Yuan, Fang; Wang, Guangyi; Wang, Xiaowei

    2016-07-01

    In this paper, a new memristor-based multi-scroll hyper-chaotic system is designed. The proposed memristor-based system possesses multiple complex dynamic behaviors compared with other chaotic systems. Various coexisting attractors and hidden coexisting attractors are observed in this system, which means extreme multistability arises. Besides, by adjusting parameters of the system, this chaotic system can perform single-scroll attractors, double-scroll attractors, and four-scroll attractors. Basic dynamic characteristics of the system are investigated, including equilibrium points and stability, bifurcation diagrams, Lyapunov exponents, and so on. In addition, the presented system is also realized by an analog circuit to confirm the correction of the numerical simulations.

  13. Extreme multistability in a memristor-based multi-scroll hyper-chaotic system

    Science.gov (United States)

    Yuan, Fang; Wang, Guangyi; Wang, Xiaowei

    2016-07-01

    In this paper, a new memristor-based multi-scroll hyper-chaotic system is designed. The proposed memristor-based system possesses multiple complex dynamic behaviors compared with other chaotic systems. Various coexisting attractors and hidden coexisting attractors are observed in this system, which means extreme multistability arises. Besides, by adjusting parameters of the system, this chaotic system can perform single-scroll attractors, double-scroll attractors, and four-scroll attractors. Basic dynamic characteristics of the system are investigated, including equilibrium points and stability, bifurcation diagrams, Lyapunov exponents, and so on. In addition, the presented system is also realized by an analog circuit to confirm the correction of the numerical simulations.

  14. The generation of a hyperchaotic system based on a three-dimensional autonomous chaotic system

    Institute of Scientific and Technical Information of China (English)

    Wang Jie-Zhi; Chen Zeng-Qiang; Yuan Zhu-Zhi

    2006-01-01

    This paper reports a new four-dimensional hyperchaotic system obtained by adding a controller to a threedimensional autonomous chaotic system. The new system has two parameters, and each equation of the system has one quadratic cross-product term. Some basic properties of the new system are analysed. The different dynamic behaviours of the new system are studied when the system parameter a or b is varied. The system is hyperchaotic in several different regions of the parameter b. Especially, the two positive Lyapunov exponents are both larger, and the hyperchaotic region is also larger when this system is hyperchaotic in the case of varying a. The hyperchaotic system is analysed by

  15. Composite encryption algorithm based on combing chaos control with choosing rule%基于混沌控制的选择复合加密算法

    Institute of Scientific and Technical Information of China (English)

    王阳; 吴成茂; 梁睿

    2012-01-01

    为了提高图像信息的安全性,提出一种混沌技术和像素扩散加密相结合的图像加密新算法。利用Runge-Kutta方法求解四维混沌系统并经非线性处理产生混沌序列,用以控制图像扩散加密方式并获得多种扩散加密方法相融合的复合加密算法。对图像加密结果的相邻像素相关性、密钥敏感性、抗差分攻击等性能所进行的分析研究以及相关实验结果均表明,所提新算法具有可行性,且安全性能较高。%In order to enhance the security of image information, a New Image Encryption Algorithm based on combination of chaos control with pixel diffusion encryption is proposed. Firstly, Runge-Kutta method is used to solve fourth-dimension chaotic systems, and obtains a chaotic integer sequence by means of non-linear processing. Secondly, image diffusion encryption is controlled by combining the chaotic integer sequence with choosing rule, and obtained the composite encryption algorithm which includes a variety of diffusion encryption methods. In the end, anayze the correlations between pixels, the sensitivity of keys, against differential cryptanalysis of the image encryption results. Experimental results show that, the image encryption algorithm proposed in the paper is feasible and has high safety performance.

  16. Exponential H∞ synchronization and state estimation for chaotic systems via a unified model.

    Science.gov (United States)

    Liu, Meiqin; Zhang, Senlin; Fan, Zhen; Zheng, Shiyou; Sheng, Weihua

    2013-07-01

    In this paper, H∞ synchronization and state estimation problems are considered for different types of chaotic systems. A unified model consisting of a linear dynamic system and a bounded static nonlinear operator is employed to describe these chaotic systems, such as Hopfield neural networks, cellular neural networks, Chua's circuits, unified chaotic systems, Qi systems, chaotic recurrent multilayer perceptrons, etc. Based on the H∞ performance analysis of this unified model using the linear matrix inequality approach, novel state feedback controllers are established not only to guarantee exponentially stable synchronization between two unified models with different initial conditions but also to reduce the effect of external disturbance on the synchronization error to a minimal H∞ norm constraint. The state estimation problem is then studied for the same unified model, where the purpose is to design a state estimator to estimate its states through available output measurements so that the exponential stability of the estimation error dynamic systems is guaranteed and the influence of noise on the estimation error is limited to the lowest level. The parameters of these controllers and filters are obtained by solving the eigenvalue problem. Most chaotic systems can be transformed into this unified model, and H∞ synchronization controllers and state estimators for these systems are designed in a unified way. Three numerical examples are provided to show the usefulness of the proposed H∞ synchronization and state estimation conditions.

  17. Analysis and control for a new chaotic system via piecewise linear feedback

    Energy Technology Data Exchange (ETDEWEB)

    Zhang Jianxiong [Institute of Systems Engineering, Tianjin University, Tianjin 300072 (China)], E-mail: jxzhang@tju.edu.cn; Tang Wansheng [Institute of Systems Engineering, Tianjin University, Tianjin 300072 (China)

    2009-11-30

    This paper presents a new three-dimensional chaotic system containing two system parameters and a nonlinear term in the form of arc-hyperbolic sine function. The complicated dynamics are studied by virtue of theoretical analysis, numerical simulation and Lyapunov exponents spectrum. The system proposed is converted to an uncertain piecewise linear system. Then, based on piecewise quadratic Lyapunov function technique, the global control of the new chaotic system with {alpha}-stability constraint via piecewise linear state feedback is studied, where the optimal controller maximizing the decay rate {alpha} can be obtained by solving an optimization problem under bilinear matrix inequalities (BMIs) constraints.

  18. A novel hyperchaos evolved from three dimensional modified Lorenz chaotic system

    Institute of Scientific and Technical Information of China (English)

    Wang Fan-Zhen; Chen Zeng-Qiang; Wu Wen-Juan; Yuan Zhu-Zhi

    2007-01-01

    This paper reports a new four-dimensional continuous autonomous hyperchaos generated from the Lorenz chaotic system by introducing a nonlinear state feedback controller. Some basic properties of the system are investigated by means of Lyapunov exponent spectrum and bifurcation diagrams. By numerical simulating, this paper verifies that the four-dimensional system can evolve into periodic, quasi-periodic, chaotic and hyperchaotic behaviours. And the new dynamical system is hyperchaotic in a large region. In comparison with other known hyperchaos, the two positive Lyapunov exponents of the new system are relatively more larger. Thus it has more complex degree.

  19. Dynamical analysis and circuit simulation of a new three-dimensional chaotic system

    International Nuclear Information System (INIS)

    This paper reports a new three-dimensional autonomous chaotic system. It contains six control parameters and three nonlinear terms. Two cross-product terms are respectively in two equations. And one square term is in the third equation. Basic dynamic properties of the new system are investigated by means of theoretical analysis, numerical simulation, sensitivity to initial, power spectrum, Lyapunov exponent, and Poincaré diagrams. The dynamic properties affected by variable parameters are also analysed. Finally, the chaotic system is simulated by circuit. The results verify the existence and implementation of the system. (general)

  20. The adaptive synchronization of fractional-order Liu chaotic system with unknown parameters

    Indian Academy of Sciences (India)

    NOURIAN ADELEH; BALOCHIAN SAEED

    2016-06-01

    In this paper, the chaos control and the synchronization of two fractional-order Liu chaotic systems with unknown parameters are studied. According to the Lyapunov stabilization theory and the adaptive control theorem, the adaptive control rule is obtained for the described error dynamic stabilization. Using the adaptive rule and a proper Lyapunov candidate function, the unknown coefficients of the system are estimated and the stabilization of the synchronizer system is demonstrated. Finally, the numerical simulation illustrates the efficiency of the proposed method in synchronizing two chaotic systems.

  1. Parameter self-adaptive synchronization control for a kind of financial chaotic systems

    Institute of Scientific and Technical Information of China (English)

    PU Xing-cheng; WANG Hai-ying

    2009-01-01

    A parameter adaptive control approach was applied to a kind of financial chaotic systems. According to Lyapunov stability theorem, synchronization of two financial chaotic systems with different certain parameters or the same uncertain parameters were implemented through designing proper control functions and using parameters self-adaptive control principle. The sufficient synchronization conditions of the two financial systems were obtained. Under the situation of the same uncertain parameters, the synchronization system has simpler controller and better performance. Numerical simulations show the effectiveness of the method.

  2. Extracting messages masked by chaotic signals of time-delay systems.

    Science.gov (United States)

    Zhou, C; Lai, C H

    1999-07-01

    We show how to extract messages masked by a chaotic signal of a time-delay system with very high dimensions and many positive Lyapunov exponents. Using a special embedding coordinate, the infinite-dimensional phase space of the time-delay system is projected onto a special three-dimensional space, which enables us to identify the time delay of the system from the transmitted signal and reconstruct the chaotic dynamics to unmask the hidden message successfully. The message extraction procedure is illustrated by simulations with the Mackey-Glass time-delay system for two types of masking schemes and different kinds of messages.

  3. Image encryption a communication perspective

    CERN Document Server

    Abd El-Samie, Fathi E; Elashry, Ibrahim F; Shahieen, Mai H; Faragallah, Osama S; El-Rabaie, El-Sayed M; Alshebeili, Saleh A

    2013-01-01

    Presenting encryption algorithms with diverse characteristics, Image Encryption: A Communication Perspective examines image encryption algorithms for the purpose of secure wireless communication. It considers two directions for image encryption: permutation-based approaches encryption and substitution-based approaches.Covering the spectrum of image encryption principles and techniques, the book compares image encryption with permutation- and diffusion-based approaches. It explores number theory-based encryption algorithms such as the Data Encryption Standard, the Advanced Encryption Standard,

  4. Sensitivity analysis on chaotic dynamical system by Non-Intrusive Least Square Shadowing (NILSS)

    CERN Document Server

    Ni, Angxiu

    2016-01-01

    This paper develops the tangent Non-Intrusive Least Square Shadowing (NILSS) method, which computes sensitivity for chaotic dynamical systems. In NILSS, a tangent solution is represented as a linear combination of a inhomogeneous tangent solution and some homogeneous tangent solutions. Then we solve a least square problem under this new representation. As a result, this new variant is easier to implement with existing solvers. For chaotic systems with large degrees of freedom but low dimensional attractors, NILSS has low computation cost. NILSS is applied to two chaotic PDE systems: the Lorenz 63 system, and a CFD simulation of a backward-facing step. The results show that NILSS computes the correct derivative with a lower cost than the conventional Least Square Shadowing method and the conventional finite difference method.

  5. Exponential networked synchronization of master-slave chaotic systems with time-varying communication topologies

    Science.gov (United States)

    Yang, Dong-Sheng; Liu, Zhen-Wei; Zhao, Yan; Liu, Zhao-Bing

    2012-04-01

    The networked synchronization problem of a class of master-slave chaotic systems with time-varying communication topologies is investigated in this paper. Based on algebraic graph theory and matrix theory, a simple linear state feedback controller is designed to synchronize the master chaotic system and the slave chaotic systems with a time-varying communication topology connection. The exponential stability of the closed-loop networked synchronization error system is guaranteed by applying Lyapunov stability theory. The derived novel criteria are in the form of linear matrix inequalities (LMIs), which are easy to examine and tremendously reduce the computation burden from the feedback matrices. This paper provides an alternative networked secure communication scheme which can be extended conveniently. An illustrative example is given to demonstrate the effectiveness of the proposed networked synchronization method.

  6. Exponential networked synchronization of master-slave chaotic systems with time-varying communication topologies

    Institute of Scientific and Technical Information of China (English)

    Yang Dong-Sheng; Liu Zhen-Wei; Zhao Yan; Liu Zhao-Bing

    2012-01-01

    The networked synchronization problem of a class of master-slave chaotic systems with time-varying communication topologies is investigated in this paper. Based on algebraic graph theory and matrix theory,a simple linear state feedback controller is designed to synchronize the master chaotic system and the slave chaotic systems with a timevarying communication topology connection.The exponential stability of the closed-loop networked synchronization error system is guaranteed by applying Lyapunov stability theory.The derived novel criteria are in the form of linear matrix inequalities (LMIs),which are easy to examine and tremendously reduce the computation burden from the feedback matrices.This paper provides an alternative networked secure communication scheme which can be extended conveniently.An illustrative example is given to demonstrate the effectiveness of the proposed networked synchronization method.

  7. Robust synchronization of chaotic non-autonomous systems using adaptive-feedback control

    Energy Technology Data Exchange (ETDEWEB)

    Lei Youming [Department of Applied Mathematics, Northwestern Polytechnical University, Xi' an 710072 (China)]. E-mail: leiyouming@nwpu.edu.cn; Xu Wei [Department of Applied Mathematics, Northwestern Polytechnical University, Xi' an 710072 (China); Shen Jianwei [Department of Applied Mathematics, Northwestern Polytechnical University, Xi' an 710072 (China)

    2007-01-15

    In this paper, we apply the simple adaptive-feedback control scheme to synchronize a class of chaotic non-autonomous systems. Based on the invariance principle of differential equations, some generic sufficient conditions for global asymptotic synchronization are obtained. Unlike the usual linear feedback, the variable feedback strength is automatically adapted to completely synchronize two identical systems and simple to implement in practice. As illustrative examples, synchronization of two parametrically excited chaotic pendulums and that of two 4D new systems are considered here. Numerical simulations show the proposed method is effective and robust against the effect of noise.

  8. Estimating the globally attractive set and positively invariant set of a unified chaotic system

    Institute of Scientific and Technical Information of China (English)

    SHU Yong-lu; ZHANG Yong-hao

    2008-01-01

    By constructing two suitable generalized Lyapunov functions, we derived a generalized ellipsoidal estimate of the globally attractive set and positively invariant set of the unified chaotic system with the parameters a=1/29 and 1/29system and a unified chaotic system, Journal of Mathematical Analysis and Applications, 2006, 323(2): 844-853]. The theoretical results obtained in this paper will find wide application in chaos control and synchronization.

  9. Chaotic Behavior in a Flexible Assembly Line of a Manufacturing System

    Directory of Open Access Journals (Sweden)

    M. Sajid

    2015-12-01

    Full Text Available The purpose of the present work is to study the chaotic behavior in a flexible assembly line of a manufacturing system. A flexible assembly line can accommodate a variety of product types. Result analysis is performed to obtain time persistent data. The behavior of the system is observed for Work-In-Process, as assembling systems are sensitive during processing. It is found that the average Lyapunov exponent is positive in the considered case, and thus chaotic behavior may be present in flexible assembly lines.

  10. Generalized projective synchronization of a class of chaotic (hyperchaotic) systems with uncertain parameters

    Institute of Scientific and Technical Information of China (English)

    Jia Zhen; Lu Jun-An; Deng Guang-Ming; Zhang Qun-Jiao

    2007-01-01

    In this paper is investigated the generalized projective synchronization of a class of chaotic (or hyperchaotic) systems, in which certain parameters can be separated from uncertain parameters. Based on the adaptive technique, the globally generalized projective synchronization of two identical chaotic (hyperchaotic) systems is achieved by designing a novel nonlinear controller. Furthermore, the parameter identification is realized simultaneously. A sufficient condition for the globally projective synchronization is obtained. Finally, by taking the hyperchaotic Lü system as example, some numerical simulations are provided to demonstrate the effectiveness and feasibility of the proposed technique.

  11. Parameter identification and synchronization of an uncertain Chen chaotic system via adaptive control

    Institute of Scientific and Technical Information of China (English)

    陈士华; 赵立民; 刘杰

    2002-01-01

    A systematic design process of adaptive synchronization and parameter identification of an uncertain Chen chaotic system is provided. With this new and effective method, parameter identification and synchronization of the Chen system, with all the system parameters unknown, can be achieved simultaneously. Theoretical proof and numerical simulation demonstrate the effectiveness and feasibility of the proposed method.

  12. Expedience of application of MIMO systems of digital communication for complex chaotic signal transmission

    OpenAIRE

    Vasyuta, K. S.; Zakharchenko, I. V.; Ozerov, S. V.

    2015-01-01

    The paper discusses the expediency of using MIMO digital systems for transmission of chaotic signals as a way of partial solution of electromagnetic compatibility of perspective broadband communication systems with an existing class of narrow-band radio-technical systems.

  13. Chaotic dynamics of the fractional-order Ikeda delay system and its synchronization

    Institute of Scientific and Technical Information of China (English)

    Lu Jun-Guo

    2006-01-01

    In this paper we numerically investigate the chaotic behaviours of the fractional-order Ikeda delay system. The results show that chaos exists in the fractional-order Ikeda delay system with order less than 1. The lowest order for chaos to be able to appear in this system is found to be 0.1. Master

  14. An Improved Cuckoo Search Optimization Algorithm for the Problem of Chaotic Systems Parameter Estimation.

    Science.gov (United States)

    Wang, Jun; Zhou, Bihua; Zhou, Shudao

    2016-01-01

    This paper proposes an improved cuckoo search (ICS) algorithm to establish the parameters of chaotic systems. In order to improve the optimization capability of the basic cuckoo search (CS) algorithm, the orthogonal design and simulated annealing operation are incorporated in the CS algorithm to enhance the exploitation search ability. Then the proposed algorithm is used to establish parameters of the Lorenz chaotic system and Chen chaotic system under the noiseless and noise condition, respectively. The numerical results demonstrate that the algorithm can estimate parameters with high accuracy and reliability. Finally, the results are compared with the CS algorithm, genetic algorithm, and particle swarm optimization algorithm, and the compared results demonstrate the method is energy-efficient and superior. PMID:26880874

  15. An Improved Cuckoo Search Optimization Algorithm for the Problem of Chaotic Systems Parameter Estimation

    Directory of Open Access Journals (Sweden)

    Jun Wang

    2016-01-01

    Full Text Available This paper proposes an improved cuckoo search (ICS algorithm to establish the parameters of chaotic systems. In order to improve the optimization capability of the basic cuckoo search (CS algorithm, the orthogonal design and simulated annealing operation are incorporated in the CS algorithm to enhance the exploitation search ability. Then the proposed algorithm is used to establish parameters of the Lorenz chaotic system and Chen chaotic system under the noiseless and noise condition, respectively. The numerical results demonstrate that the algorithm can estimate parameters with high accuracy and reliability. Finally, the results are compared with the CS algorithm, genetic algorithm, and particle swarm optimization algorithm, and the compared results demonstrate the method is energy-efficient and superior.

  16. An Improved Cuckoo Search Optimization Algorithm for the Problem of Chaotic Systems Parameter Estimation.

    Science.gov (United States)

    Wang, Jun; Zhou, Bihua; Zhou, Shudao

    2016-01-01

    This paper proposes an improved cuckoo search (ICS) algorithm to establish the parameters of chaotic systems. In order to improve the optimization capability of the basic cuckoo search (CS) algorithm, the orthogonal design and simulated annealing operation are incorporated in the CS algorithm to enhance the exploitation search ability. Then the proposed algorithm is used to establish parameters of the Lorenz chaotic system and Chen chaotic system under the noiseless and noise condition, respectively. The numerical results demonstrate that the algorithm can estimate parameters with high accuracy and reliability. Finally, the results are compared with the CS algorithm, genetic algorithm, and particle swarm optimization algorithm, and the compared results demonstrate the method is energy-efficient and superior.

  17. Experimental verification of chaotic control of an underactuated tethered satellite system

    Science.gov (United States)

    Pang, Zhaojun; Jin, Dongping

    2016-03-01

    This paper studies chaotic control of a tethered satellite system (TSS) driven only by a momentum-exchange device during its attitude adjustment. In dealing with such the underactuated system, an extended time-delay autosynchronization (ETDAS) is employed to stabilize the chaotic motion to a periodic motion. To obtain the control domains of the ETDAS method, a stability analysis of the controlled tethered satellite system in elliptical orbit is implemented. According to the principle of dynamic similarity, then, ground-based experiment setups are proposed and designed to emulate the in-plane motions of the TSS. Representative experiments are presented to demonstrate the effectiveness of the ETDAS scheme in controlling the chaotic motion of the underactuated TSS.

  18. Sliding mode control for synchronization of chaotic systems with structure or parameters mismatching

    Institute of Scientific and Technical Information of China (English)

    LI Xiao-run; ZHAO Liao-ying; ZHAO Guang-zhou

    2005-01-01

    This paper deals with the synchronization of chaotic systems with structure or parameters difference. Nonlinear differential geometry theory was applied to transform the chaotic discrepancy system into canonical form. A feedback control for synchronizing two chaotic systems is proposed based on sliding mode control design. To make this controller physically realizable,an extended state observer is used to estimate the error between the transmitter and receiver. Two illustrative examples were carried out: (1) The Chua oscillator was used to show that synchronization was achieved and the message signal was recovered in spite of parametric variations; (2) Two second-order driven oscillators were presented to show that the synchronization can be achieved and that the message can be recovered in spite of the strictly different model.

  19. Parameter estimation of fractional-order chaotic systems by using quantum parallel particle swarm optimization algorithm.

    Directory of Open Access Journals (Sweden)

    Yu Huang

    Full Text Available Parameter estimation for fractional-order chaotic systems is an important issue in fractional-order chaotic control and synchronization and could be essentially formulated as a multidimensional optimization problem. A novel algorithm called quantum parallel particle swarm optimization (QPPSO is proposed to solve the parameter estimation for fractional-order chaotic systems. The parallel characteristic of quantum computing is used in QPPSO. This characteristic increases the calculation of each generation exponentially. The behavior of particles in quantum space is restrained by the quantum evolution equation, which consists of the current rotation angle, individual optimal quantum rotation angle, and global optimal quantum rotation angle. Numerical simulation based on several typical fractional-order systems and comparisons with some typical existing algorithms show the effectiveness and efficiency of the proposed algorithm.

  20. Engineering applications of fpgas chaotic systems, artificial neural networks, random number generators, and secure communication systems

    CERN Document Server

    Tlelo-Cuautle, Esteban; de la Fraga, Luis Gerardo

    2016-01-01

    This book offers readers a clear guide to implementing engineering applications with FPGAs, from the mathematical description to the hardware synthesis, including discussion of VHDL programming and co-simulation issues. Coverage includes FPGA realizations such as: chaos generators that are described from their mathematical models; artificial neural networks (ANNs) to predict chaotic time series, for which a discussion of different ANN topologies is included, with different learning techniques and activation functions; random number generators (RNGs) that are realized using different chaos generators, and discussions of their maximum Lyapunov exponent values and entropies. Finally, optimized chaotic oscillators are synchronized and realized to implement a secure communication system that processes black and white and grey-scale images. In each application, readers will find VHDL programming guidelines and computer arithmetic issues, along with co-simulation examples with Active-HDL and Simulink. Readers will b...