WorldWideScience

Sample records for chaotic encryption system

  1. Encryption in Chaotic Systems with Sinusoidal Excitations

    Directory of Open Access Journals (Sweden)

    G. Obregón-Pulido

    2014-01-01

    Full Text Available In this contribution an encryption method using a chaotic oscillator, excited by “n” sinusoidal signals, is presented. The chaotic oscillator is excited by a sum of “n” sinusoidal signals and a message. The objective is to encrypt such a message using the chaotic behavior and transmit it, and, as the chaotic system is perturbed by the sinusoidal signal, the transmission security could be increased due to the effect of such a perturbation. The procedure is based on the regulation theory and consider that the receiver knows the frequencies of the perturbing signal, with this considerations the algorithm estimates the excitation in such a way that the receiver can cancel out the perturbation and all the undesirable dynamics in order to produce only the message. In this way we consider that the security level is increased.

  2. Selective image encryption using a spatiotemporal chaotic system.

    Science.gov (United States)

    Xiang, Tao; Wong, Kwok-wo; Liao, Xiaofeng

    2007-06-01

    A universal selective image encryption algorithm, in which the spatiotemporal chaotic system is utilized, is proposed to encrypt gray-level images. In order to resolve the tradeoff between security and performance, the effectiveness of selective encryption is discussed based on simulation results. The scheme is then extended to encrypt RGB color images. Security analyses for both scenarios show that the proposed schemes achieve high security and efficiency. PMID:17614669

  3. Problems with a probabilistic encryption scheme based on chaotic systems

    OpenAIRE

    Li, SJ; Mou, XQ; Yang, BL; Ji, Z.; Zhang, JH

    2003-01-01

    Recently S. Papadimitriou et al. have proposed a new probabilistic encryption scheme based on chaotic systems. In this letter, we point out some problems with Papadimitriou et al.'s chaotic cryptosystem: (1) the size of the ciphertext and the plaintext cannot simultaneously ensure practical implementation and high security; (2) the estimated number of all possible virtual states is wrong; (3) the practical security to exhaustive attack is overestimated; (4) the fast encryption speed is depend...

  4. System for Information Encryption Implementing Several Chaotic Orbits

    Directory of Open Access Journals (Sweden)

    Jiménez-Rodríguez Maricela

    2015-07-01

    Full Text Available This article proposes a symmetric encryption algorithm that takes, as input value, the original information of length L, that when encoded, generates the ciphertext of greater length LM. A chaotic discrete system (logistic map is implemented to generate 3 different orbits: the first is used for applying a diffusion technique in order to mix the original data, the second orbit is combined with the mixed information and increases the length of L to LM, and with the third orbit, the confusion technique is implemented. The encryption algorithm was applied to encode an image which is then totally recovered by the keys used to encrypt and his respective, decrypt algorithm. The algorithm can encode any information, just dividing into 8 bits, it can cover the requirements for high level security, it uses 7 keys to encrypt and provides good encryption speed

  5. System for Information Encryption Implementing Several Chaotic Orbits

    OpenAIRE

    Jiménez-Rodríguez Maricela; Flores-Siordia Octavio; González-Novoa María Guadalupe

    2015-01-01

    This article proposes a symmetric encryption algorithm that takes, as input value, the original information of length L, that when encoded, generates the ciphertext of greater length LM. A chaotic discrete system (logistic map) is implemented to generate 3 different orbits: the first is used for applying a diffusion technique in order to mix the original data, the second orbit is combined with the mixed information and increases the length of L to LM, and with the third orbit, ...

  6. A New Study in Encryption Based on Fractional Order Chaotic System

    Institute of Scientific and Technical Information of China (English)

    Ming Yin; Li-Wei Wang

    2008-01-01

    In this paper, we introduce a novel approach to achieve the data encryption. The fractional order Lorenz chaotic system is used to generate the chaotic sequence and the characteristics of the chaotic sequence are studied. Some examples concerned with text and image encryption are also presented in the paper, which show exciting results by the approach weintroduced.

  7. Image encryption using high-dimension chaotic system

    Institute of Scientific and Technical Information of China (English)

    Sun Fu-Yan; Liu Shu-Tang; Lü Zong-Wang

    2007-01-01

    In recent years, the chaos based cryptographic algorithms have suggested some new and efficient ways to develop secure image encryption techniques. This paper proposes a new approach for image encryption based on a highdimensional chaotic map. The new scheme employs the Cat map to shuffle the positions, then to confuse the relationship between the cipher-image and the plain-image using the high-dimensional Lorenz chaotic map preprocessed. The results of experimental, statistical analysis and key space analysis show that the proposed image encryption scheme provides an efficient and secure way for real-time image encryption and transmission.

  8. An Anti-Cheating Visual Cryptography Scheme Based on Chaotic Encryption System

    Science.gov (United States)

    Han, Yanyan; Xu, Zhuolin; Ge, Xiaonan; He, Wencai

    By chaotic encryption system and introducing the trusted third party (TTP), in this paper, an anti-cheating visual cryptography scheme (VCS) is proposed. The scheme solved the problem of dishonest participants and improved the security of chaotic encryption system. Simulation results and analysis show that the recovery image is acceptable, the system can detect the cheating in participants effectively and with high security.

  9. Data transmission system with encryption by chaotic sequences

    Directory of Open Access Journals (Sweden)

    Politans’kyy R. L.

    2014-06-01

    Full Text Available Protection of transferable information in the telecommunication systems is possible by its imposition of coding sequence on a plaintext. Encryption of pseudorandom sequences can be performed by using generation algorithms which are implemented on the basis of the phenomenon of dynamical chaos, which is sensitive to changes in the initial conditions. One of the major problems encountered in the construction of secure communication systems is to provide synchronization between the receiving and transmitting parties of communication systems. Improvement of methods of hidden data transfer based on the systems with chaotic synchronization is the important task of research in the field of information and telecommunication systems based on chaos. This article shows an implementation of a data transmission system, encrypted by sequences, generated on the basis of one-dimensional discrete chaotic maps with ensuring synchronization of the transmitting and receiving sides of the system. In this system realization of synchronization is offered by a transmission through certain time domains of current value of xn generated by a logistic reflection. Xn transmission period depends on computer speed and distance between subscribers of the system. Its value is determined by transmitting a test message before the session. Infallible reception of test message indicates the optimal choice of a transmission period of the current value of xn. Selection period is done at the program level. For the construction of communication network modern software was used, in particular programming language Delphi 7.0. The work of the system is shown on the example of information transmission between the users of the system. The system operates in real time full duplex mode at any hardware implementation of Internet access. It is enough for the users of the system to specify IP address only.

  10. A novel hybrid color image encryption algorithm using two complex chaotic systems

    Science.gov (United States)

    Wang, Leyuan; Song, Hongjun; Liu, Ping

    2016-02-01

    Based on complex Chen and complex Lorenz systems, a novel color image encryption algorithm is proposed. The larger chaotic ranges and more complex behaviors of complex chaotic systems, which compared with real chaotic systems could additionally enhance the security and enlarge key space of color image encryption. The encryption algorithm is comprised of three step processes. In the permutation process, the pixels of plain image are scrambled via two-dimensional and one-dimensional permutation processes among RGB channels individually. In the diffusion process, the exclusive-or (XOR for short) operation is employed to conceal pixels information. Finally, the mixing RGB channels are used to achieve a multilevel encryption. The security analysis and experimental simulations demonstrate that the proposed algorithm is large enough to resist the brute-force attack and has excellent encryption performance.

  11. Image compression-encryption scheme based on hyper-chaotic system and 2D compressive sensing

    Science.gov (United States)

    Zhou, Nanrun; Pan, Shumin; Cheng, Shan; Zhou, Zhihong

    2016-08-01

    Most image encryption algorithms based on low-dimensional chaos systems bear security risks and suffer encryption data expansion when adopting nonlinear transformation directly. To overcome these weaknesses and reduce the possible transmission burden, an efficient image compression-encryption scheme based on hyper-chaotic system and 2D compressive sensing is proposed. The original image is measured by the measurement matrices in two directions to achieve compression and encryption simultaneously, and then the resulting image is re-encrypted by the cycle shift operation controlled by a hyper-chaotic system. Cycle shift operation can change the values of the pixels efficiently. The proposed cryptosystem decreases the volume of data to be transmitted and simplifies the keys distribution simultaneously as a nonlinear encryption system. Simulation results verify the validity and the reliability of the proposed algorithm with acceptable compression and security performance.

  12. A New Color Image Encryption Scheme Using CML and a Fractional-Order Chaotic System

    Science.gov (United States)

    Wu, Xiangjun; Li, Yang; Kurths, Jürgen

    2015-01-01

    The chaos-based image cryptosystems have been widely investigated in recent years to provide real-time encryption and transmission. In this paper, a novel color image encryption algorithm by using coupled-map lattices (CML) and a fractional-order chaotic system is proposed to enhance the security and robustness of the encryption algorithms with a permutation-diffusion structure. To make the encryption procedure more confusing and complex, an image division-shuffling process is put forward, where the plain-image is first divided into four sub-images, and then the position of the pixels in the whole image is shuffled. In order to generate initial conditions and parameters of two chaotic systems, a 280-bit long external secret key is employed. The key space analysis, various statistical analysis, information entropy analysis, differential analysis and key sensitivity analysis are introduced to test the security of the new image encryption algorithm. The cryptosystem speed is analyzed and tested as well. Experimental results confirm that, in comparison to other image encryption schemes, the new algorithm has higher security and is fast for practical image encryption. Moreover, an extensive tolerance analysis of some common image processing operations such as noise adding, cropping, JPEG compression, rotation, brightening and darkening, has been performed on the proposed image encryption technique. Corresponding results reveal that the proposed image encryption method has good robustness against some image processing operations and geometric attacks. PMID:25826602

  13. Encrypting three-dimensional information system based on integral imaging and multiple chaotic maps

    Science.gov (United States)

    Xing, Yan; Wang, Qiong-Hua; Xiong, Zhao-Long; Deng, Huan

    2016-02-01

    An encrypting three-dimensional (3-D) information system based on integral imaging (II) and multiple chaotic maps is proposed. In the encrypting process, the elemental image array (EIA) which represents spatial and angular information of the real 3-D scene is picked up by a microlens array. Subsequently, R, G, and B color components decomposed by the EIA are encrypted using multiple chaotic maps. Finally, these three encrypted components are interwoven to obtain the cipher information. The decryption process implements the reverse operation of the encryption process for retrieving the high-quality 3-D images. Since the encrypted EIA has the data redundancy property due to II, and all parameters of the pickup part are the secret keys of the encrypting system, the system sensitivity on the changes of the plaintext and secret keys can be significantly improved. Moreover, the algorithm based on multiple chaotic maps can effectively enhance the security. A preliminary experiment is carried out, and the experimental results verify the effectiveness, robustness, and security of the proposed system.

  14. Security Analysis of a Block Encryption Algorithm Based on Dynamic Sequences of Multiple Chaotic Systems

    Institute of Scientific and Technical Information of China (English)

    DU Mao-Kang; HE Bo; WANG Yong

    2011-01-01

    Recently, the cryptosystem based on chaos has attracted much attention. Wang and Yu (Commun. Nonlin. Sci. Numer. Simulat. 14(2009)574) proposed a block encryption algorithm based on dynamic sequences of multiple chaotic systems. We analyze the potential Saws in the algorithm. Then, a chosen-plaintext attack is presented. Some remedial measures are suggested to avoid the flaws effectively. Furthermore, an improved encryption algorithm is proposed to resist the attacks and to keep all the merits of the original cryptosystem.

  15. Data transmission system with encryption by chaotic sequences

    OpenAIRE

    Politans’kyy R. L.; Shpatar P. M.; Hres A. V.; Verigha A. D.

    2014-01-01

    Protection of transferable information in the telecommunication systems is possible by its imposition of coding sequence on a plaintext. Encryption of pseudorandom sequences can be performed by using generation algorithms which are implemented on the basis of the phenomenon of dynamical chaos, which is sensitive to changes in the initial conditions. One of the major problems encountered in the construction of secure communication systems is to provide synchronization between the receiving and...

  16. A Systematic Methodology for Multi-Images Encryption and Decryption Based on Single Chaotic System and FPGA Embedded Implementation

    OpenAIRE

    Hanzhong Zheng; Simin Yu; Xiangqian Xu

    2014-01-01

    A systematic methodology is developed for multi-images encryption and decryption and field programmable gate array (FPGA) embedded implementation by using single discrete time chaotic system. To overcome the traditional limitations that a chaotic system can only encrypt or decrypt one image, this paper initiates a new approach to design n-dimensional (n-D) discrete time chaotic controlled systems via some variables anticontrol, which can achieve multipath drive-response synchronization. To th...

  17. Encryption and decryption of information in chaotic communication systems governed by delay-differential equations

    International Nuclear Information System (INIS)

    We consider different ways for encryption and decryption of information in communication systems using chaotic signal of a time-delay system as a carrier. A method is proposed for extracting a hidden message in the case when the parameters of the chaotic transmitter are a priori unknown. For different configurations of the transmitter the procedure of information signal extraction from the transmitted signal is demonstrated using numerical data produced by nonlinear mixing of the chaotic signal of the Mackey-Glass system and frequency-modulated harmonic signal

  18. A New Study in Encryption Based on Fractional Order Chaotic System

    Institute of Scientific and Technical Information of China (English)

    Ming Yin; Li-Wei Wang

    2008-01-01

    In this paper, we introduce a novelapproach to achieve the data encryption. The fractionalorder Lorenz chaotic system is used to generate thechaotic sequence and the characteristics of the chaoticsequence are studied. Some examples concerned withtext and image eneryption are also presented in thepaper, which show exciting results by the approach weintroduced.

  19. Image encryption based on a delayed fractional-order chaotic logistic system

    Institute of Scientific and Technical Information of China (English)

    Wang Zhen; Huang Xia; Li Ning; Song Xiao-Na

    2012-01-01

    A new image encryption scheme is proposed based on a delayed fractional-order chaotic logistic system.In the process of generating a key stream,the time-varying delay and fractional derivative are embedded in the proposed scheme to improve the security.Such a scheme is described in detail with security analyses including correlation analysis,information entropy analysis,run statistic analysis,mean-variance gray value analysis,and key sensitivity analysis.Experimental results show that the newly proposed image encryption scheme possesses high security.

  20. Image encryption based on a delayed fractional-order chaotic logistic system

    International Nuclear Information System (INIS)

    A new image encryption scheme is proposed based on a delayed fractional-order chaotic logistic system. In the process of generating a key stream, the time-varying delay and fractional derivative are embedded in the proposed scheme to improve the security. Such a scheme is described in detail with security analyses including correlation analysis, information entropy analysis, run statistic analysis, mean-variance gray value analysis, and key sensitivity analysis. Experimental results show that the newly proposed image encryption scheme possesses high security. (general)

  1. A fast image encryption system based on chaotic maps with finite precision representation

    International Nuclear Information System (INIS)

    In this paper, a fast chaos-based image encryption system with stream cipher structure is proposed. In order to achieve a fast throughput and facilitate hardware realization, 32-bit precision representation with fixed point arithmetic is assumed. The major core of the encryption system is a pseudo-random keystream generator based on a cascade of chaotic maps, serving the purpose of sequence generation and random mixing. Unlike the other existing chaos-based pseudo-random number generators, the proposed keystream generator not only achieves a very fast throughput, but also passes the statistical tests of up-to-date test suite even under quantization. The overall design of the image encryption system is to be explained while detail cryptanalysis is given and compared with some existing schemes

  2. High security chaotic multiple access scheme for visible light communication systems with advanced encryption standard interleaving

    Science.gov (United States)

    Qiu, Junchao; Zhang, Lin; Li, Diyang; Liu, Xingcheng

    2016-06-01

    Chaotic sequences can be applied to realize multiple user access and improve the system security for a visible light communication (VLC) system. However, since the map patterns of chaotic sequences are usually well known, eavesdroppers can possibly derive the key parameters of chaotic sequences and subsequently retrieve the information. We design an advanced encryption standard (AES) interleaving aided multiple user access scheme to enhance the security of a chaotic code division multiple access-based visible light communication (C-CDMA-VLC) system. We propose to spread the information with chaotic sequences, and then the spread information is interleaved by an AES algorithm and transmitted over VLC channels. Since the computation complexity of performing inverse operations to deinterleave the information is high, the eavesdroppers in a high speed VLC system cannot retrieve the information in real time; thus, the system security will be enhanced. Moreover, we build a mathematical model for the AES-aided VLC system and derive the theoretical information leakage to analyze the system security. The simulations are performed over VLC channels, and the results demonstrate the effectiveness and high security of our presented AES interleaving aided chaotic CDMA-VLC system.

  3. A Systematic Methodology for Multi-Images Encryption and Decryption Based on Single Chaotic System and FPGA Embedded Implementation

    Directory of Open Access Journals (Sweden)

    Hanzhong Zheng

    2014-01-01

    Full Text Available A systematic methodology is developed for multi-images encryption and decryption and field programmable gate array (FPGA embedded implementation by using single discrete time chaotic system. To overcome the traditional limitations that a chaotic system can only encrypt or decrypt one image, this paper initiates a new approach to design n-dimensional (n-D discrete time chaotic controlled systems via some variables anticontrol, which can achieve multipath drive-response synchronization. To that end, the designed n-dimensional discrete time chaotic controlled systems are used for multi-images encryption and decryption. A generalized design principle and the corresponding implementation steps are also given. Based on the FPGA embedded hardware system working platform with XUP Virtex-II type, a chaotic secure communication system for three digital color images encryption and decryption by using a 7D discrete time chaotic system is designed, and the related system design and hardware implementation results are demonstrated, with the related mathematical problems analyzed.

  4. Security of public key encryption technique based on multiple chaotic systems

    International Nuclear Information System (INIS)

    Recently, a new public key encryption technique based on multiple chaotic systems has been proposed [B. Ranjan, Phys. Rev. Lett. 95 (2005) 098702]. This scheme employs m-chaotic systems and a set of linear functions for key exchange over an insecure channel. Security of the proposed algorithm grows as (NP)m, where N, P are the size of the key and the computational complexity of the linear functions respectively. In this Letter, the fundamental weakness of the cryptosystem is pointed out and a successful attack is described. Given the public keys and the initial vector, one can calculate the secret key based on Parseval's theorem. Both theoretical and experimental results show that the attacker can access to the secret key without difficulty. The lack of security discourages the use of such algorithm for practical applications

  5. A New Loss-Tolerant Image Encryption Scheme Based on Secret Sharing and Two Chaotic Systems

    OpenAIRE

    Li Li; Ahmed A. Abd El-Latif; Zhenfeng Shi and Xiamu Niu

    2012-01-01

    In this study, we propose an efficient loss-tolerant image encryption scheme that protects both confidentiality and loss-tolerance simultaneously in shadow images. In this scheme, we generate the key sequence based on two chaotic maps and then encrypt the image during the sharing phase based on Shamir’s method. Experimental results show a better performance of the proposed scheme for different images than other methods from human vision. Security analysis confirms a high probability to resist...

  6. Video encryption using chaotic masks in joint transform correlator

    International Nuclear Information System (INIS)

    A real-time optical video encryption technique using a chaotic map has been reported. In the proposed technique, each frame of video is encrypted using two different chaotic random phase masks in the joint transform correlator architecture. The different chaotic random phase masks can be obtained either by using different iteration levels or by using different seed values of the chaotic map. The use of different chaotic random phase masks makes the decryption process very complex for an unauthorized person. Optical, as well as digital, methods can be used for video encryption but the decryption is possible only digitally. To further enhance the security of the system, the key parameters of the chaotic map are encoded using RSA (Rivest–Shamir–Adleman) public key encryption. Numerical simulations are carried out to validate the proposed technique. (paper)

  7. Digital image encryption with chaotic map lattices

    Institute of Scientific and Technical Information of China (English)

    Sun Fu-Yan; Lü Zong-Wang

    2011-01-01

    This paper proposes a secure approach for encryption and decryption of digital images with chaotic map lattices.In the proposed encryption process, eight different types of operations are used to encrypt the pixels of an image and one of them will be used for particular pixels decided by the outcome of the chaotic map lattices. To make the cipher more robust against any attacks, the secret key is modified after encrypting each block of sixteen pixels of the image.The experimental results and security analysis show that the proposed image encryption scheme achieves high security and efficiency.

  8. A New Loss-Tolerant Image Encryption Scheme Based on Secret Sharing and Two Chaotic Systems

    Directory of Open Access Journals (Sweden)

    Li Li

    2012-04-01

    Full Text Available In this study, we propose an efficient loss-tolerant image encryption scheme that protects both confidentiality and loss-tolerance simultaneously in shadow images. In this scheme, we generate the key sequence based on two chaotic maps and then encrypt the image during the sharing phase based on Shamir’s method. Experimental results show a better performance of the proposed scheme for different images than other methods from human vision. Security analysis confirms a high probability to resist both brute-force and collusion attacks.

  9. Image Encryption Algorithm Based on Chaotic Economic Model

    OpenAIRE

    S. S. Askar; Karawia, A. A.; Ahmad Alshamrani

    2015-01-01

    In literature, chaotic economic systems have got much attention because of their complex dynamic behaviors such as bifurcation and chaos. Recently, a few researches on the usage of these systems in cryptographic algorithms have been conducted. In this paper, a new image encryption algorithm based on a chaotic economic map is proposed. An implementation of the proposed algorithm on a plain image based on the chaotic map is performed. The obtained results show that the proposed algorithm can su...

  10. Image Encryption Algorithm Based on Chaotic Economic Model

    Directory of Open Access Journals (Sweden)

    S. S. Askar

    2015-01-01

    Full Text Available In literature, chaotic economic systems have got much attention because of their complex dynamic behaviors such as bifurcation and chaos. Recently, a few researches on the usage of these systems in cryptographic algorithms have been conducted. In this paper, a new image encryption algorithm based on a chaotic economic map is proposed. An implementation of the proposed algorithm on a plain image based on the chaotic map is performed. The obtained results show that the proposed algorithm can successfully encrypt and decrypt the images with the same security keys. The security analysis is encouraging and shows that the encrypted images have good information entropy and very low correlation coefficients and the distribution of the gray values of the encrypted image has random-like behavior.

  11. 3D Chaotic Functions for Image Encryption

    Directory of Open Access Journals (Sweden)

    Pawan N. Khade

    2012-05-01

    Full Text Available This paper proposes the chaotic encryption algorithm based on 3D logistic map, 3D Chebyshev map, and 3D, 2D Arnolds cat map for color image encryption. Here the 2D Arnolds cat map is used for image pixel scrambling and 3D Arnolds cat map is used for R, G, and B component substitution. 3D Chebyshev map is used for key generation and 3D logistic map is used for image scrambling. The use of 3D chaotic functions in the encryption algorithm provide more security by using the, shuffling and substitution to the encrypted image. The Chebyshev map is used for public key encryption and distribution of generated private keys.

  12. Color image encryption based on Coupled Nonlinear Chaotic Map

    Energy Technology Data Exchange (ETDEWEB)

    Mazloom, Sahar [Faculty of Electrical, Computer and IT Engineering, Qazvin Islamic Azad University, Qazvin (Iran, Islamic Republic of)], E-mail: sahar.mazloom@gmail.com; Eftekhari-Moghadam, Amir Masud [Faculty of Electrical, Computer and IT Engineering, Qazvin Islamic Azad University, Qazvin (Iran, Islamic Republic of)], E-mail: eftekhari@qazviniau.ac.ir

    2009-11-15

    Image encryption is somehow different from text encryption due to some inherent features of image such as bulk data capacity and high correlation among pixels, which are generally difficult to handle by conventional methods. The desirable cryptographic properties of the chaotic maps such as sensitivity to initial conditions and random-like behavior have attracted the attention of cryptographers to develop new encryption algorithms. Therefore, recent researches of image encryption algorithms have been increasingly based on chaotic systems, though the drawbacks of small key space and weak security in one-dimensional chaotic cryptosystems are obvious. This paper proposes a Coupled Nonlinear Chaotic Map, called CNCM, and a novel chaos-based image encryption algorithm to encrypt color images by using CNCM. The chaotic cryptography technique which used in this paper is a symmetric key cryptography with a stream cipher structure. In order to increase the security of the proposed algorithm, 240 bit-long secret key is used to generate the initial conditions and parameters of the chaotic map by making some algebraic transformations to the key. These transformations as well as the nonlinearity and coupling structure of the CNCM have enhanced the cryptosystem security. For getting higher security and higher complexity, the current paper employs the image size and color components to cryptosystem, thereby significantly increasing the resistance to known/chosen-plaintext attacks. The results of several experimental, statistical analysis and key sensitivity tests show that the proposed image encryption scheme provides an efficient and secure way for real-time image encryption and transmission.

  13. Analyzing and improving a chaotic encryption method

    International Nuclear Information System (INIS)

    To resist the return map attack [Phys. Rev. Lett. 74 (1995) 1970] presented by Perez and Cerdeira, Shouliang Bu and Bing-Hong Wang proposed a simple method to improve the security of the chaotic encryption by modulating the chaotic carrier with an appropriately chosen scalar signal in [Chaos, Solitons and Fractals 19 (2004) 919]. They maintained that this modulating strategy not only preserved all appropriate information required for synchronizing chaotic systems but also destroyed the possibility of the phase space reconstruction of the sender dynamics such as a return map. However, a critical defect does exist in this scheme. This paper gives a zero-point autocorrelation method, which can recover the parameters of the scalar signal from the modulated signal. Consequently, the messages will be extracted from the demodulated chaotic carrier by using return map. Based on such a fact, an improved scheme is presented to obtain higher security, and the numerical simulation indicates the improvement of the synchronizing performance as well

  14. Analyzing and improving a chaotic encryption method

    Energy Technology Data Exchange (ETDEWEB)

    Wu Xiaogang E-mail: seanwoo@mail.hust.edu.cn; Hu Hanping; Zhang Baoliang

    2004-10-01

    To resist the return map attack [Phys. Rev. Lett. 74 (1995) 1970] presented by Perez and Cerdeira, Shouliang Bu and Bing-Hong Wang proposed a simple method to improve the security of the chaotic encryption by modulating the chaotic carrier with an appropriately chosen scalar signal in [Chaos, Solitons and Fractals 19 (2004) 919]. They maintained that this modulating strategy not only preserved all appropriate information required for synchronizing chaotic systems but also destroyed the possibility of the phase space reconstruction of the sender dynamics such as a return map. However, a critical defect does exist in this scheme. This paper gives a zero-point autocorrelation method, which can recover the parameters of the scalar signal from the modulated signal. Consequently, the messages will be extracted from the demodulated chaotic carrier by using return map. Based on such a fact, an improved scheme is presented to obtain higher security, and the numerical simulation indicates the improvement of the synchronizing performance as well.

  15. PERFORMANCE EVALUATION OF CHAOTIC ENCRYPTION TECHNIQUE

    Directory of Open Access Journals (Sweden)

    Ancy Mariam Babu

    2013-01-01

    Full Text Available Drastic growth in multimedia communication resulted to numerous security issues in the transmission of data. Moreover, the network used for the digital communication does not provide much security for the data transfer. During this time, tens of millions people using the internet options for essential communication and is being a tool for commercial field increased, So that security is an enormously important issue to deal with. We need to be protected confidentiality of data and provide secure connections for it. Hence we necessitate recognizing the different aspects of security and their applications. Many of these applications ranging from secure commerce, protecting passwords or pin and payments to private communications. As we know that, Cryptography is now becoming an essential aspect of the secure communication. Cryptography is the science of writing secret code with confident algorithm and key. The basic components of cryptography are encryption and decryption algorithms, digital signature and hashed message authentication code. We know that encryption is the synonym of cryptography. Different kinds of encryption are used in this modern era. Chaotic encryption is the type of the encryption which has adopted the concept of chaos. In this study, we are studying the history of cryptography until chaotic cryptography and analyzing the performance of chaotic encryption technique. The evaluation is performed in terms of encryption speed, the CPU utilization with time and the battery power consumption. The experimental results are specified the efficiency of the algorithms.

  16. Steps towards improving the security of chaotic encryption

    International Nuclear Information System (INIS)

    We present a method in which a chaotic signal is used to mask a message securely. It depends on separating the two tasks of synchronizing the chaotic oscillators and encrypting the message. A sporadic drive together with a function f of the ciphertext and response system variables is used to make extraction difficult. We give a choice of f that makes the method similar to a one-time pad, with pseudorandom numbers provided by the chaos

  17. Grayscale image encryption algorithm based on chaotic maps

    Institute of Scientific and Technical Information of China (English)

    李昌刚; 韩正之

    2003-01-01

    A new image encryption/decryption algorithm has been designed using discrete chaotic systems as aSP (Substitution and Permutation) network architecture often used in cryptosystems. It is composed of two mainmodules: substitution module and permutation module. Both analyses and numerical results imply that the algo-rithm has the desirable security and efficiency.

  18. Securing Images Using Chaotic-based Image Encryption Cryptosystem

    Directory of Open Access Journals (Sweden)

    Abdalwhab A. Alkher

    2016-03-01

    Full Text Available Given the rapid evolution in imaging and communication techniques, images become very important data transmitted over public networks type. Therefore, a fast and secure encryption system for high-resolution images is a tremendous demand. In this paper, a novel encryption system is proposed to secure images on the basis of Arnold Catmap. In the First, Arnold cat map system is used to scramble the positions of image pixels. Then, chaotic map is used to generate pseudorandom image for substitution. The statistical analysis was performed on the proposed encryption algorithm demonstrating superior confusion and deployment of its properties, which strongly resist statistical attacks. Coefficients of correlation between adjacent pixels showed that correlation between pixels of the encrypted image has significantly decreased. It is noted that the number of pixels of the image encoded drops significantly which indicates that the proposed system can thwart correlation attacks.

  19. A fast chaotic encryption scheme based on piecewise nonlinear chaotic maps

    International Nuclear Information System (INIS)

    In recent years, a growing number of discrete chaotic cryptographic algorithms have been proposed. However, most of them encounter some problems such as the lack of robustness and security. In this Letter, we introduce a new image encryption algorithm based on one-dimensional piecewise nonlinear chaotic maps. The system is a measurable dynamical system with an interesting property of being either ergodic or having stable period-one fixed point. They bifurcate from a stable single periodic state to chaotic one and vice versa without having usual period-doubling or period-n-tippling scenario. Also, we present the KS-entropy of this maps with respect to control parameter. This algorithm tries to improve the problem of failure of encryption such as small key space, encryption speed and level of security

  20. Double-image encryption based on Yang-Gu mixture amplitude-phase retrieval algorithm and high dimension chaotic system in gyrator domain

    Science.gov (United States)

    Sui, Liansheng; Liu, Benqing; Wang, Qiang; Li, Ye; Liang, Junli

    2015-11-01

    A double-image encryption scheme is proposed based on Yang-Gu mixture amplitude-phase retrieval algorithm and high dimension chaotic system in gyrator transform domain, in which three chaotic random sequences are generated by using Chen system. First, an enlarged image constituted with two plaintext images is scrambled by using the first two sequences, and then separated into two new interim images. Second, one interim image is converted to the private phase key with the help of the third sequence, which is modulated by a random phase key generated based on logistic map. Based on this private phase key, another interim image is converted to the ciphertext with white noise distribution in the Yang-Gu amplitude-phase retrieval process. In the process of encryption and decryption, the images both in spatial domain and gyrator domain are nonlinear and disorder by using high dimension chaotic system. Moreover, the ciphertext image is only a real-valued function which is more convenient for storing and transmitting, and the security of the proposed encryption scheme is enhanced greatly because of high sensitivity of initial values of Chen system and rotation angle of gyrator transform. Extensive cryptanalysis and simulation results have demonstrated the security, validity and feasibility of the propose encryption scheme.

  1. A novel chaotic encryption scheme based on arithmetic coding

    International Nuclear Information System (INIS)

    In this paper, under the combination of arithmetic coding and logistic map, a novel chaotic encryption scheme is presented. The plaintexts are encrypted and compressed by using an arithmetic coder whose mapping intervals are changed irregularly according to a keystream derived from chaotic map and plaintext. Performance and security of the scheme are also studied experimentally and theoretically in detail

  2. An Improved Piecewise Linear Chaotic Map Based Image Encryption Algorithm

    Science.gov (United States)

    Hu, Yuping; Wang, Zhijian

    2014-01-01

    An image encryption algorithm based on improved piecewise linear chaotic map (MPWLCM) model was proposed. The algorithm uses the MPWLCM to permute and diffuse plain image simultaneously. Due to the sensitivity to initial key values, system parameters, and ergodicity in chaotic system, two pseudorandom sequences are designed and used in the processes of permutation and diffusion. The order of processing pixels is not in accordance with the index of pixels, but it is from beginning or end alternately. The cipher feedback was introduced in diffusion process. Test results and security analysis show that not only the scheme can achieve good encryption results but also its key space is large enough to resist against brute attack. PMID:24592159

  3. Symmetric encryption algorithms using chaotic and non-chaotic generators: A review.

    Science.gov (United States)

    Radwan, Ahmed G; AbdElHaleem, Sherif H; Abd-El-Hafiz, Salwa K

    2016-03-01

    This paper summarizes the symmetric image encryption results of 27 different algorithms, which include substitution-only, permutation-only or both phases. The cores of these algorithms are based on several discrete chaotic maps (Arnold's cat map and a combination of three generalized maps), one continuous chaotic system (Lorenz) and two non-chaotic generators (fractals and chess-based algorithms). Each algorithm has been analyzed by the correlation coefficients between pixels (horizontal, vertical and diagonal), differential attack measures, Mean Square Error (MSE), entropy, sensitivity analyses and the 15 standard tests of the National Institute of Standards and Technology (NIST) SP-800-22 statistical suite. The analyzed algorithms include a set of new image encryption algorithms based on non-chaotic generators, either using substitution only (using fractals) and permutation only (chess-based) or both. Moreover, two different permutation scenarios are presented where the permutation-phase has or does not have a relationship with the input image through an ON/OFF switch. Different encryption-key lengths and complexities are provided from short to long key to persist brute-force attacks. In addition, sensitivities of those different techniques to a one bit change in the input parameters of the substitution key as well as the permutation key are assessed. Finally, a comparative discussion of this work versus many recent research with respect to the used generators, type of encryption, and analyses is presented to highlight the strengths and added contribution of this paper. PMID:26966561

  4. Symmetric encryption algorithms using chaotic and non-chaotic generators: A review

    Science.gov (United States)

    Radwan, Ahmed G.; AbdElHaleem, Sherif H.; Abd-El-Hafiz, Salwa K.

    2015-01-01

    This paper summarizes the symmetric image encryption results of 27 different algorithms, which include substitution-only, permutation-only or both phases. The cores of these algorithms are based on several discrete chaotic maps (Arnold’s cat map and a combination of three generalized maps), one continuous chaotic system (Lorenz) and two non-chaotic generators (fractals and chess-based algorithms). Each algorithm has been analyzed by the correlation coefficients between pixels (horizontal, vertical and diagonal), differential attack measures, Mean Square Error (MSE), entropy, sensitivity analyses and the 15 standard tests of the National Institute of Standards and Technology (NIST) SP-800-22 statistical suite. The analyzed algorithms include a set of new image encryption algorithms based on non-chaotic generators, either using substitution only (using fractals) and permutation only (chess-based) or both. Moreover, two different permutation scenarios are presented where the permutation-phase has or does not have a relationship with the input image through an ON/OFF switch. Different encryption-key lengths and complexities are provided from short to long key to persist brute-force attacks. In addition, sensitivities of those different techniques to a one bit change in the input parameters of the substitution key as well as the permutation key are assessed. Finally, a comparative discussion of this work versus many recent research with respect to the used generators, type of encryption, and analyses is presented to highlight the strengths and added contribution of this paper. PMID:26966561

  5. Security Improvement of an Image Encryption Based on mPixel-Chaotic-Shuffle and Pixel-Chaotic-Diffusion

    OpenAIRE

    Ahmad, Musheer; Alsharari, Hamed D.; Nizam, Munazza

    2014-01-01

    In this paper, we propose to improve the security performance of a recently proposed color image encryption algorithm which is based on multi-chaotic systems. The existing cryptosystem employed a pixel-chaotic-shuffle mechanism to encrypt images, in which the generation of shuffling sequences are independent to the plain-image/cipher-image. As a result, it fails to the chosen-plaintext and known-plaintext attacks. Moreover, the statistical features of the cryptosystem are not up to the standa...

  6. A fast chaotic block cipher for image encryption

    Science.gov (United States)

    Armand Eyebe Fouda, J. S.; Yves Effa, J.; Sabat, Samrat L.; Ali, Maaruf

    2014-03-01

    Image encryption schemes based on chaos usually involve real number arithmetic operations to generate the chaotic orbits from the chaotic system. These operations are time-consuming and are normally performed with high-end processors. To overcome this drawback, this paper proposes a one round encryption scheme for the fast generation of large permutation and diffusion keys based on the sorting of the solutions of the Linear Diophantine Equation (LDE) whose coefficients are integers and dynamically generated from any type of chaotic systems. The high security and low computational complexity are achieved not only by using large permutation based on the sorting of the solutions of LDE but also by generating only one permutation from the sorting of the solutions of the LDE, then by dynamically updating d number of integers (d>2) in the permutation. The performance of the proposed scheme is evaluated using various types of analysis such as entropy analysis, difference analysis, statistical analysis, key sensitivity analysis, key space analysis and speed analysis. The experimental results indicate that the proposed algorithm is secure and fast as compared to the two round encryption scheme.

  7. IMAGE ENCRYPTION TECHNIQUES USING CHAOTIC SCHEMES: A REVIEW

    Directory of Open Access Journals (Sweden)

    Monisha Sharma

    2010-06-01

    Full Text Available Cryptography is about communication in the presence of an adversary. It encompasses many problems like encryption, authentication, and key distribution to name a few. The field of modern cryptography providesa theoretical foundation based on which one can understand what exactly these problems are, how to evaluate protocols that purport to solve them and how to build protocols in whose security one can haveconfidence. Advanced digital technologies have made multimedia data widely available. Recently, multimedia applications become common in practice and thus security of multimedia data has become main concern.The basic issues pertaining to the problem of encryption has been discussed and also a survey on image encryption techniques based on chaotic schemes has been dealt in the present communication.The chaotic image encryption can be developed by using properties of chaos including deterministic dynamics, unpredictable behavior and non-linear transform. This concept leads to techniques that can simultaneously provide security functions and an overall visualcheck, which might be suitable in some applications. Digital images are widely used in various applications, that include military, legal and medical systems and these applications need to control access toimages and provide the means to verify integrity of images.

  8. Digital Image Encryption Based On Multiple Chaotic Maps

    Directory of Open Access Journals (Sweden)

    Amir Houshang Arab Avval

    2016-01-01

    Full Text Available A novel and robust chaos-based digital image encryption is proposed. The present paper presents a cipher block image encryption using multiple chaotic maps to lead increased security. An image block is encrypted by the block-based permutation process and cipher block encryption process. In the proposed scheme, secret key includes nineteen control and initial conditions parameter of the four chaotic maps and the calculated key space is 2883. The effectiveness and security of the proposed encryption scheme has been performed using the histograms, correlation coefficients, information entropy, differential analysis, key space analysis, etc. It can be concluded that the proposed image encryption technique is a suitable choice for practical applications.

  9. Chaotic trigonometric Haar wavelet with focus on image encryption

    OpenAIRE

    Ahadpour, Sodeif; Sadra, Yaser

    2014-01-01

    In this paper, after reviewing the main points of Haar wavelet transform and chaotic trigonometric maps, we introduce a new perspective of Haar wavelet transform. The essential idea of the paper is given linearity properties of the scaling function of the Haar wavelet. With regard to applications of Haar wavelet transform in image processing, we introduce chaotic trigonometric Haar wavelet transform to encrypt the plain images. In addition, the encrypted images based on a proposed algorithm w...

  10. 基于五维混沌系统的图像加密研究%Five-dimensional chaotic system based image encryption algorithm

    Institute of Scientific and Technical Information of China (English)

    高亮; 朱博; 孙鸣; 朱建良

    2011-01-01

    随着计算机技术、信息技术和通讯技术等高科技技术在近年来的迅猛发展,信息加密越来越受到人们的重视,提出了基于五维混沌系统用来实现图像加密的方法,并利用迭代次数和方式作为密码,实现了图像加密和解密,为信息加密提供了一种新方法.%With computer technology, information technology and communications technology, high technology, rapid development in recent years, more and more people pay close attention to information encryption. This paper, based on five-dimensional chaotic system realizes image encryption method, and means of using the number of iterations as the password, to realize the image encryption and decryption,the information provides a new method of encryption.

  11. Plaintext Related Image Encryption Scheme Using Chaotic Map

    Directory of Open Access Journals (Sweden)

    Yong Zhang

    2013-07-01

    Full Text Available A plaintext related image blocking encryption algorithm is proposed in this paper, which includes two kinds of operations on inner-block confusion and inter-block diffusion. Firstly, a float-point lookup table need to be generated by iterating chaotic system; Secondly, choose one of the entries in the look-up table as initial value of chaotic system, and iterate it to produce one secret code sequence for inner-block confusion; Thirdly, by using one pixel value of the former block to locate another entry in the look-up table, iterate it to yield another secret code sequence for inter-block diffusion; Finally, through two rounds of the block-by-block processes, the plain-image will be transformed into the cipher-image. The simulation results show that the proposed method has many good characters.

  12. Security analysis of image encryption based on two-dimensional chaotic maps and improved algorithm

    Institute of Scientific and Technical Information of China (English)

    Feng HUANG; Yong FENG

    2009-01-01

    The article proposes a new algorithm to improve the security of image encryption based on two-dimensional chaotic maps.Chaotic maps are often used in encrypting images.However,the encryption has periodic-ity,no diffusion,and at the same time,the real keys space of encryption are fewer than the theoretical keys space,which consequently results in potential security problems.Thus,this article puts forward several ways to solve the problems including adding diffusion mechanism,changing the design of keys and developing a composite encryption system.It designs an algorithm for the version B of the discretized baker map,which is one of the most prevalent chaotic maps,based on which a new image encryption is proposed to avoid the above problems.The simulation results show that the new encryption algorithm is valid and the result can be applied to other two-dimensional chaotic maps,such as the cat map.

  13. An Optimized Multikeying Chaotic Encryption for Real Time Applications

    Directory of Open Access Journals (Sweden)

    R. Tamijetchelvy

    2013-12-01

    Full Text Available In recent years, the availability of wireless technologies has become prominent solution for next generation wireless networks (NGWN. Hence the demand for secure communication is an important research issue. Cryptography is recognized as the best method of data protection against active and passive attacks. Therefore a novel chaotic cryptographic scheme is proposed for real time communication. Chaos signals are random behaviour, continuous and sensitive dependence on initial conditions. However, it has been shown that most of these chaotic methods have a low level of security because of single keying concept. In this paper an optimized fast encryption scheme based on chaotic signal with multi key is justified for video frame. Simulation results show that the proposed chaotic encryption scheme outperforms the existing scheme in terms of considerable reduction in encryption and decryption time. The security of the proposed scheme is also analysed by various cryptanalysis attacks.

  14. Image Encryption Based on Diffusion and Multiple Chaotic Maps

    CERN Document Server

    Sathishkumar, G A; Sriraam, Dr N; 10.5121/ijnsa.2011.3214

    2011-01-01

    In the recent world, security is a prime important issue, and encryption is one of the best alternative way to ensure security. More over, there are many image encryption schemes have been proposed, each one of them has its own strength and weakness. This paper presents a new algorithm for the image encryption/decryption scheme. This paper is devoted to provide a secured image encryption technique using multiple chaotic based circular mapping. In this paper, first, a pair of sub keys is given by using chaotic logistic maps. Second, the image is encrypted using logistic map sub key and in its transformation leads to diffusion process. Third, sub keys are generated by four different chaotic maps. Based on the initial conditions, each map may produce various random numbers from various orbits of the maps. Among those random numbers, a particular number and from a particular orbit are selected as a key for the encryption algorithm. Based on the key, a binary sequence is generated to control the encryption algorit...

  15. Improved Cryptanalysis of CMC Chaotic Image Encryption Scheme

    Directory of Open Access Journals (Sweden)

    Jiansheng Guo

    2010-12-01

    Full Text Available Recently, chaos has attracted much attention in the field of cryptography. To study the security with a known image of a symmetric image encryption scheme, the attack algorithm of equivalent key is given. We give the known image attacks under different other conditions to obtain the equivalent key. The concrete step and complexity of the attack algorithm is given. So the symmetric image encryption scheme based on 3D chaotic cat maps is not secure.

  16. A Parallel Encryption Algorithm Based on Piecewise Linear Chaotic Map

    Directory of Open Access Journals (Sweden)

    Xizhong Wang

    2013-01-01

    Full Text Available We introduce a parallel chaos-based encryption algorithm for taking advantage of multicore processors. The chaotic cryptosystem is generated by the piecewise linear chaotic map (PWLCM. The parallel algorithm is designed with a master/slave communication model with the Message Passing Interface (MPI. The algorithm is suitable not only for multicore processors but also for the single-processor architecture. The experimental results show that the chaos-based cryptosystem possesses good statistical properties. The parallel algorithm provides much better performance than the serial ones and would be useful to apply in encryption/decryption file with large size or multimedia.

  17. A novel chaotic encryption scheme based on pseudorandom bit padding

    CERN Document Server

    Sadra, Yaser; Fard, Zahra Arasteh

    2012-01-01

    Cryptography is always very important in data origin authentications, entity authentication, data integrity and confidentiality. In recent years, a variety of chaotic cryptographic schemes have been proposed. These schemes has typical structure which performed the permutation and the diffusion stages, alternatively. The random number generators are intransitive in cryptographic schemes and be used in the diffusion functions of the image encryption for diffused pixels of plain image. In this paper, we propose a chaotic encryption scheme based on pseudorandom bit padding that the bits be generated by a novel logistic pseudorandom image algorithm. To evaluate the security of the cipher image of this scheme, the key space analysis, the correlation of two adjacent pixels and differential attack were performed. This scheme tries to improve the problem of failure of encryption such as small key space and level of security.

  18. A novel chaotic encryption scheme based on pseudorandom bit padding

    Directory of Open Access Journals (Sweden)

    Sodeif Ahadpour

    2012-01-01

    Full Text Available Cryptography is always very important in data origin authentications, entity authentication, data integrity and confidentiality. In recent years, a variety of chaotic cryptographic schemes have been proposed. These schemes has typical structure which performed the permutation and the diffusion stages, alternatively. The random number generators are intransitive in cryptographic schemes and be used in the diffusion functions of the image encryption for diffused pixels of plain image. In this paper, we propose a chaotic encryption scheme based on pseudorandom bit padding that the bits be generated by a novel logistic pseudorandom image algorithm. To evaluate the security of the cipher image of this scheme, the key space analysis, the correlation of two adjacent pixels and differential attack were performed. This scheme tries to improve the problem of failure of encryption such as small key space and level of security.

  19. Observer-based chaos synchronization in the generalized chaotic Lorenz systems and its application to secure encryption

    Czech Academy of Sciences Publication Activity Database

    Čelikovský, Sergej; Lynnyk, Volodymyr; Šebek, Michael

    San Diego: Omnipress, 2006, s. 3783-3788. ISBN 1-4244-0171-2. [IEEE Conference on Decision and Control /45./. San Diego (US), 13.12.2006-15.12.2006] R&D Projects: GA ČR GA102/05/0011 Institutional research plan: CEZ:AV0Z10750506 Keywords : nonlinear systems * chaotic systems Subject RIV: BC - Control Systems Theory http://www.ieeecss.org/CAB/conferences/cdc2006/index.php

  20. A novel chaotic image encryption scheme using DNA sequence operations

    Science.gov (United States)

    Wang, Xing-Yuan; Zhang, Ying-Qian; Bao, Xue-Mei

    2015-10-01

    In this paper, we propose a novel image encryption scheme based on DNA (Deoxyribonucleic acid) sequence operations and chaotic system. Firstly, we perform bitwise exclusive OR operation on the pixels of the plain image using the pseudorandom sequences produced by the spatiotemporal chaos system, i.e., CML (coupled map lattice). Secondly, a DNA matrix is obtained by encoding the confused image using a kind of DNA encoding rule. Then we generate the new initial conditions of the CML according to this DNA matrix and the previous initial conditions, which can make the encryption result closely depend on every pixel of the plain image. Thirdly, the rows and columns of the DNA matrix are permuted. Then, the permuted DNA matrix is confused once again. At last, after decoding the confused DNA matrix using a kind of DNA decoding rule, we obtain the ciphered image. Experimental results and theoretical analysis show that the scheme is able to resist various attacks, so it has extraordinarily high security.

  1. Application of the Chaotic Ergodicity of Standard Map in Image Encryption and Watermarking

    OpenAIRE

    Ruisong Ye; Huiqing Huang

    2010-01-01

    Thanks to the exceptionally good properties in chaotic systems, such as sensitivity to initial conditions and control parameters, pseudo-randomness and ergodicity, chaos-based image encryption algorithms have been widely studied and developed in recent years. Standard map is chaotic so that it can be employed to shuffle the positions of image pixels to get a totally visual difference from the original images. This paper proposes two novel schemes to shuffle digital images. Different from the ...

  2. A novel algorithm for image encryption based on mixture of chaotic maps

    Energy Technology Data Exchange (ETDEWEB)

    Behnia, S. [Department of Physics, IAU, Urmia (Iran, Islamic Republic of)], E-mail: s.behnia@iaurmia.ac.ir; Akhshani, A.; Mahmodi, H. [Department of Physics, IAU, Urmia (Iran, Islamic Republic of); Akhavan, A. [Department of Engineering, IAU, Urmia (Iran, Islamic Republic of)

    2008-01-15

    Chaos-based encryption appeared recently in the early 1990s as an original application of nonlinear dynamics in the chaotic regime. In this paper, an implementation of digital image encryption scheme based on the mixture of chaotic systems is reported. The chaotic cryptography technique used in this paper is a symmetric key cryptography. In this algorithm, a typical coupled map was mixed with a one-dimensional chaotic map and used for high degree security image encryption while its speed is acceptable. The proposed algorithm is described in detail, along with its security analysis and implementation. The experimental results based on mixture of chaotic maps approves the effectiveness of the proposed method and the implementation of the algorithm. This mixture application of chaotic maps shows advantages of large key space and high-level security. The ciphertext generated by this method is the same size as the plaintext and is suitable for practical use in the secure transmission of confidential information over the Internet.

  3. Image Encryption Based On Diffusion And Multiple Chaotic Maps

    Directory of Open Access Journals (Sweden)

    G.A.Sathishkumar

    2011-03-01

    Full Text Available In the recent world, security is a prime important issue, and encryption is one of the best alternative wayto ensure security. More over, there are many image encryption schemes have been proposed, each one ofthem has its own strength and weakness. This paper presents a new algorithm for the imageencryption/decryption scheme. This paper is devoted to provide a secured image encryption techniqueusing multiple chaotic based circular mapping. In this paper, first, a pair of sub keys is given by usingchaotic logistic maps. Second, the image is encrypted using logistic map sub key and in its transformationleads to diffusion process. Third, sub keys are generated by four different chaotic maps. Based on theinitial conditions, each map may produce various random numbers from various orbits of the maps.Among those random numbers, a particular number and from a particular orbit are selected as a key forthe encryption algorithm. Based on the key, a binary sequence is generated to control the encryptionalgorithm. The input image of 2-D is transformed into a 1- D array by using two different scanningpattern (raster and Zigzag and then divided into various sub blocks. Then the position permutation andvalue permutation is applied to each binary matrix based on multiple chaos maps. Finally the receiveruses the same sub keys to decrypt the encrypted images. The salient features of the proposed imageencryption method are loss-less, good peak signal –to noise ratio (PSNR, Symmetric key encryption, lesscross correlation, very large number of secret keys, and key-dependent pixel value replacement.

  4. Cryptanalysis of an ergodic chaotic encryption algorithm

    International Nuclear Information System (INIS)

    In this paper, we present the results for the security and the possible attacks on a new symmetric key encryption algorithm based on the ergodicity property of a logistic map. After analysis, we use mathematical induction to prove that the algorithm can be attacked by a chosen plaintext attack successfully and give an example to show how to attack it. According to the cryptanalysis of the original algorithm, we improve the original algorithm, and make a brief cryptanalysis. Compared with the original algorithm, the improved algorithm is able to resist a chosen plaintext attack and retain a considerable number of advantages of the original algorithm such as encryption speed, sensitive dependence on the key, strong anti-attack capability, and so on. (general)

  5. Integration of chaotic sequences uniformly distributedin a new image encryption algorithm

    Directory of Open Access Journals (Sweden)

    Nassiba Wafa Abderrahim

    2012-03-01

    Full Text Available In this paper we propose a new chaotic secret key cryptosystem, adapted for image encryption in continuous mode, which is based on the use of tow one-dimensional discrete chaotic systems: Bernoulli map and Tent map. The pseudorandom sequences generated by the two maps are characterized by independence of their states, uniformly distributed, so hear integration provides excellent properties of confusion and diffusion, and an important space for the secret key, because it consists of parameters and initial states of the chaotic maps. The security tests results of our cryptosystem are very satisfactory.

  6. CONSTRUCTION OF THE ENCRYPTION MATRIX BASED ON CHEBYSHEV CHAOTIC NEURAL NETWORKS

    Institute of Scientific and Technical Information of China (English)

    Zou Ajin; Wu Wei; Li Renfa; Li Yongjiang

    2012-01-01

    The paper proposes a novel algorithm to get the encryption matrix.Firstly,a chaotic sequence generated by Chebyshev chaotic neural networks is converted into a series of low-order integer matrices from which available encryption matrices are selected.Then,a higher order encryption matrix relating real world application is constructed by means of tensor production method based on selected encryption matrices.The results show that the proposed algorithm can produce a "one-time pad cipher" encryption matrix with high security; and the encryption results have good chaos and autocorrelation with the natural frequency of the plaintext being hidden and homogenized.

  7. A fast image encryption algorithm based on chaotic map

    Science.gov (United States)

    Liu, Wenhao; Sun, Kehui; Zhu, Congxu

    2016-09-01

    Derived from Sine map and iterative chaotic map with infinite collapse (ICMIC), a new two-dimensional Sine ICMIC modulation map (2D-SIMM) is proposed based on a close-loop modulation coupling (CMC) model, and its chaotic performance is analyzed by means of phase diagram, Lyapunov exponent spectrum and complexity. It shows that this map has good ergodicity, hyperchaotic behavior, large maximum Lyapunov exponent and high complexity. Based on this map, a fast image encryption algorithm is proposed. In this algorithm, the confusion and diffusion processes are combined for one stage. Chaotic shift transform (CST) is proposed to efficiently change the image pixel positions, and the row and column substitutions are applied to scramble the pixel values simultaneously. The simulation and analysis results show that this algorithm has high security, low time complexity, and the abilities of resisting statistical analysis, differential, brute-force, known-plaintext and chosen-plaintext attacks.

  8. Cryptanalysis and improvement of a digital image encryption method with chaotic map lattices

    Institute of Scientific and Technical Information of China (English)

    Wang Xing-Yuan; Liu Lin-Tao

    2013-01-01

    A digital image encryption scheme using chaotic map lattices has been proposed recently.In this paper,two fatal flaws of the cryptosystem are pointed out.According to these two drawbacks,cryptanalysts could recover the plaintext by applying the chosen plaintext attack.Therefore,the proposed cryptosystem is not secure enough to be used in the image transmission system.Experimental results show the feasibility of the attack.As a result,we make some improvements to the encryption scheme,which can completely resist our chosen plaintext attack.

  9. A novel color image encryption scheme using alternate chaotic mapping structure

    Science.gov (United States)

    Wang, Xingyuan; Zhao, Yuanyuan; Zhang, Huili; Guo, Kang

    2016-07-01

    This paper proposes an color image encryption algorithm using alternate chaotic mapping structure. Initially, we use the R, G and B components to form a matrix. Then one-dimension logistic and two-dimension logistic mapping is used to generate a chaotic matrix, then iterate two chaotic mappings alternately to permute the matrix. For every iteration, XOR operation is adopted to encrypt plain-image matrix, then make further transformation to diffuse the matrix. At last, the encrypted color image is obtained from the confused matrix. Theoretical analysis and experimental results has proved the cryptosystem is secure and practical, and it is suitable for encrypting color images.

  10. An improved image encryption algorithm based on chaotic maps

    Institute of Scientific and Technical Information of China (English)

    Xu Shu-Jiang; Wang Ji-Zhi; Yang Su-Xiang

    2008-01-01

    Recently,two chaotic image encryption schemes have been proposed,in which shuffling the positions and changing the grey values of image pixels are combined.This paper provides the chosen plaintext attack to recover the corresponding plaintext of a given ciphertext.Furthermore,it points out that the two schemes are not sufficiently sensitive to small changes of the plaintext.Based on the given analysis,it proposes an improved algorithm which includes two rounds of substitution and one round of permutation to strengthen the overall performance.

  11. An image encryption approach based on chaotic maps

    International Nuclear Information System (INIS)

    It is well-known that images are different from texts in many aspects, such as highly redundancy and correlation, the local structure and the characteristics of amplitude-frequency. As a result, the methods of conventional encryption cannot be applicable to images. In this paper, we improve the properties of confusion and diffusion in terms of discrete exponential chaotic maps, and design a key scheme for the resistance to statistic attack, differential attack and grey code attack. Experimental and theoretical results also show that our scheme is efficient and very secure

  12. A New Algorithm of Encryption and Decryption of Images Using Chaotic Mapping

    OpenAIRE

    Musheer Ahmad; M. Shamsher Alam

    2010-01-01

    The combination of chaotic theory and cryptography forms an important field of information security. In the past decade, chaos based image encryption is given much attention in the research of information security and a lot of image encryption algorithms based on chaotic maps have been proposed. Due to some inherent features of images like bulk data capacity and high data redundancy, the encryption of images is different from that of texts; therefore it is difficult to handle them by traditio...

  13. On the security of a chaotic encryption scheme: Problems with computerized chaos in finite computing precision

    OpenAIRE

    Li, SJ; Mou, XQ; Cai, YL; Ji, Z.; Zhang, JH

    2003-01-01

    Zhou et al. have proposed a chaotic encryption scheme, which is based on a kind of computerized piecewise linear chaotic map (PWLCM) realized in finite computing precision. In this paper, we point out that Zhou's encryption scheme is not secure enough from strict cryptographic viewpoint. The reason lies in the dynamical degradation of the computerized piecewise linear chaotic map employed by Zhou et al. The dynamical degradation of the computerized chaos induces many weak keys to cause large ...

  14. Secure Image Encryption Based On a Chua Chaotic Noise Generator

    Directory of Open Access Journals (Sweden)

    A. S. Andreatos

    2013-10-01

    Full Text Available This paper presents a secure image cryptography telecom system based on a Chua's circuit chaotic noise generator. A chaotic system based on synchronised Master–Slave Chua's circuits has been used as a chaotic true random number generator (CTRNG. Chaotic systems present unpredictable and complex behaviour. This characteristic, together with the dependence on the initial conditions as well as the tolerance of the circuit components, make CTRNGs ideal for cryptography. In the proposed system, the transmitter mixes an input image with chaotic noise produced by a CTRNG. Using thresholding techniques, the chaotic signal is converted to a true random bit sequence. The receiver must be able to reproduce exactly the same chaotic noise in order to subtract it from the received signal. This becomes possible with synchronisation between the two Chua's circuits: through the use of specific techniques, the trajectory of the Slave chaotic system can be bound to that of the Master circuit producing (almost identical behaviour. Additional blocks have been used in order to make the system highly parameterisable and robust against common attacks. The whole system is simulated in Matlab. Simulation results demonstrate satisfactory performance, as well as, robustness against cryptanalysis. The system works with both greyscale and colour jpg images.

  15. A New Algorithm of Encryption and Decryption of Images Using Chaotic Mapping

    Directory of Open Access Journals (Sweden)

    Musheer Ahmad

    2010-01-01

    Full Text Available The combination of chaotic theory and cryptography forms an important field of information security. In the past decade, chaos based image encryption is given much attention in the research of information security and a lot of image encryption algorithms based on chaotic maps have been proposed. Due to some inherent features of images like bulk data capacity and high data redundancy, the encryption of images is different from that of texts; therefore it is difficult to handle them by traditional encryption methods. In this communication, a new image encryption algorithm based on three different chaotic maps is proposed. In the proposed algorithm, the plain-image is first decomposed into 8x8 size blocks and then the block based shuffling of image is carried out using 2D Cat map. Further, the control parameters of shuffling are randomly generated by employing 2D coupled Logistic map. After that the shuffled image is encrypted using chaotic sequence generated by one-dimensional Logistic map. The experimental results show that the proposed algorithm can successfully encrypt/decrypt the images with same secret keys, and the algorithm has good encryption effect, large key space and high sensitivity to a small change in secret keys. Moreover, the simulation analysis also demonstrates that the encrypted images have good information entropy, very low correlation coefficients and the distribution of gray values of an encrypted image has random-like behavior.

  16. Multiple Chaotic Real-time Image Encryption System Based on DSP+FPGA%基于DSP+FPGA的多混沌实时视频图像加密系统

    Institute of Scientific and Technical Information of China (English)

    许艳

    2013-01-01

      Aiming at the security and privacy problems of videos/images in digital communications, a system design scheme for realize real-time videos/images encryption is proposed based on DSP+FPGA, and then the realization of multi-chaotic encryption algorithm based on the DSP+FPGA is introduced in detail. The experimental results show that the encryption algorithm can enhance the security of the videos/images transmission, and it is proved that the system can run with rather fast encryption speed for the real-time videos/images.%  针对视频图像在数字通信中存在着安全和隐私问题,提出了基于DSP+FPGA技术来实现实时视频图像加密的系统设计方案,并详细介绍了多混沌加密算法在DSP和FPGA上的实现。实验结果表明多混沌实时视频图像加密增强了视频图像传输的安全性,同时证明了本系统对实时视频图像能快速地进行加密。

  17. A Novel Chaotic Map and an Improved Chaos-Based Image Encryption Scheme

    Science.gov (United States)

    2014-01-01

    In this paper, we present a novel approach to create the new chaotic map and propose an improved image encryption scheme based on it. Compared with traditional classic one-dimensional chaotic maps like Logistic Map and Tent Map, this newly created chaotic map demonstrates many better chaotic properties for encryption, implied by a much larger maximal Lyapunov exponent. Furthermore, the new chaotic map and Arnold's Cat Map based image encryption method is designed and proved to be of solid robustness. The simulation results and security analysis indicate that such method not only can meet the requirement of imagine encryption, but also can result in a preferable effectiveness and security, which is usable for general applications. PMID:25143990

  18. Application of the Chaotic Ergodicity of Standard Map in Image Encryption and Watermarking

    Directory of Open Access Journals (Sweden)

    Ruisong Ye

    2010-11-01

    Full Text Available Thanks to the exceptionally good properties in chaotic systems, such as sensitivity to initial conditions and control parameters, pseudo-randomness and ergodicity, chaos-based image encryption algorithms have been widely studied and developed in recent years. Standard map is chaotic so that it can be employed to shuffle the positions of image pixels to get a totally visual difference from the original images. This paper proposes two novel schemes to shuffle digital images. Different from the conventional schemes based on Standard map, we disorder the pixel positions according to the orbits of the Standard map. The proposed shuffling schemes don’t need to discretize the Standard map and own more cipher leys compared with the conventional shuffling scheme based on the discretized Standard map. The shuffling schemes are applied to encrypt image and disorder the host image in watermarking scheme to enhance the robustness against attacks. Experimental results show that the proposed encryption scheme yields good secure effects. The watermarked images are robust against attacks as well.

  19. Grayscale image encryption using a hyperchaotic unstable dissipative system

    Czech Academy of Sciences Publication Activity Database

    Ontanon-García, L.J.; García-Martínez, M.; Campos-Cantón, E.; Čelikovský, Sergej

    London: IEEE, 2013, s. 508-512. ISBN 978-1-908320-16-2. [The 8th International Conference for Internet Technology and Secured Transactions (ICITST-2013). Londýn (GB), 09.12.2013-12.12.2013] R&D Projects: GA ČR(CZ) GAP103/12/1794 Institutional support: RVO:67985556 Keywords : Hyperchaos * piecewise linear systems * multi-scrolls * chaotic encryption * stream cypher encryption Subject RIV: BC - Control Systems Theory

  20. Dynamic video encryption algorithm for H.264/AVC based on a spatiotemporal chaos system.

    Science.gov (United States)

    Xu, Hui; Tong, Xiao-Jun; Zhang, Miao; Wang, Zhu; Li, Ling-Hao

    2016-06-01

    Video encryption schemes mostly employ the selective encryption method to encrypt parts of important and sensitive video information, aiming to ensure the real-time performance and encryption efficiency. The classic block cipher is not applicable to video encryption due to the high computational overhead. In this paper, we propose the encryption selection control module to encrypt video syntax elements dynamically which is controlled by the chaotic pseudorandom sequence. A novel spatiotemporal chaos system and binarization method is used to generate a key stream for encrypting the chosen syntax elements. The proposed scheme enhances the resistance against attacks through the dynamic encryption process and high-security stream cipher. Experimental results show that the proposed method exhibits high security and high efficiency with little effect on the compression ratio and time cost. PMID:27409446

  1. A novel bit-level image encryption algorithm based on chaotic maps

    Science.gov (United States)

    Xu, Lu; Li, Zhi; Li, Jian; Hua, Wei

    2016-03-01

    Recently, a number of chaos-based image encryption algorithms have been proposed at the pixel level, but little research at the bit level has been conducted. This paper presents a novel bit-level image encryption algorithm that is based on piecewise linear chaotic maps (PWLCM). First, the plain image is transformed into two binary sequences of the same size. Second, a new diffusion strategy is introduced to diffuse the two sequences mutually. Then, we swap the binary elements in the two sequences by the control of a chaotic map, which can permute the bits in one bitplane into any other bitplane. The proposed algorithm has excellent encryption performance with only one round. The simulation results and performance analysis show that the proposed algorithm is both secure and reliable for image encryption.

  2. A novel image block cryptosystem based on a spatiotemporal chaotic system and a chaotic neural network

    International Nuclear Information System (INIS)

    In this paper, we propose a novel block cryptographic scheme based on a spatiotemporal chaotic system and a chaotic neural network (CNN). The employed CNN comprises a 4-neuron layer called a chaotic neuron layer (CNL), where the spatiotemporal chaotic system participates in generating its weight matrix and other parameters. The spatiotemporal chaotic system used in our scheme is the typical coupled map lattice (CML), which can be easily implemented in parallel by hardware. A 160-bit-long binary sequence is used to generate the initial conditions of the CML. The decryption process is symmetric relative to the encryption process. Theoretical analysis and experimental results prove that the block cryptosystem is secure and practical, and suitable for image encryption. (general)

  3. A novel image block cryptosystem based on a spatiotemporal chaotic system and a chaotic neural network

    Science.gov (United States)

    Wang, Xing-Yuan; Bao, Xue-Mei

    2013-05-01

    In this paper, we propose a novel block cryptographic scheme based on a spatiotemporal chaotic system and a chaotic neural network (CNN). The employed CNN comprises a 4-neuron layer called a chaotic neuron layer (CNL), where the spatiotemporal chaotic system participates in generating its weight matrix and other parameters. The spatiotemporal chaotic system used in our scheme is the typical coupled map lattice (CML), which can be easily implemented in parallel by hardware. A 160-bit-long binary sequence is used to generate the initial conditions of the CML. The decryption process is symmetric relative to the encryption process. Theoretical analysis and experimental results prove that the block cryptosystem is secure and practical, and suitable for image encryption.

  4. A new image encryption algorithm based on logistic chaotic map with varying parameter

    OpenAIRE

    Liu, Lingfeng; Miao, Suoxia

    2016-01-01

    In this paper, we proposed a new image encryption algorithm based on parameter-varied logistic chaotic map and dynamical algorithm. The parameter-varied logistic map can cure the weaknesses of logistic map and resist the phase space reconstruction attack. We use the parameter-varied logistic map to shuffle the plain image, and then use a dynamical algorithm to encrypt the image. We carry out several experiments, including Histogram analysis, information entropy analysis, sensitivity analysis,...

  5. A novel chaotic based image encryption using a hybrid model of deoxyribonucleic acid and cellular automata

    Science.gov (United States)

    Enayatifar, Rasul; Sadaei, Hossein Javedani; Abdullah, Abdul Hanan; Lee, Malrey; Isnin, Ismail Fauzi

    2015-08-01

    Currently, there are many studies have conducted on developing security of the digital image in order to protect such data while they are sending on the internet. This work aims to propose a new approach based on a hybrid model of the Tinkerbell chaotic map, deoxyribonucleic acid (DNA) and cellular automata (CA). DNA rules, DNA sequence XOR operator and CA rules are used simultaneously to encrypt the plain-image pixels. To determine rule number in DNA sequence and also CA, a 2-dimension Tinkerbell chaotic map is employed. Experimental results and computer simulations, both confirm that the proposed scheme not only demonstrates outstanding encryption, but also resists various typical attacks.

  6. Multiple-image encryption with bit-plane decomposition and chaotic maps

    Science.gov (United States)

    Tang, Zhenjun; Song, Juan; Zhang, Xianquan; Sun, Ronghai

    2016-05-01

    Image encryption is an efficient technique of image content protection. In this work, we propose a useful image encryption algorithm for multiple grayscale images. The proposed algorithm decomposes input images into bit-planes, randomly swaps bit-blocks among different bit-planes, and conducts XOR operation between the scrambled images and secret matrix controlled by chaotic map. Finally, an encrypted PNG image is obtained by viewing four scrambled grayscale images as its red, green, blue and alpha components. Many simulations are done to illustrate efficiency of our algorithm.

  7. A new image encryption algorithm based on logistic chaotic map with varying parameter.

    Science.gov (United States)

    Liu, Lingfeng; Miao, Suoxia

    2016-01-01

    In this paper, we proposed a new image encryption algorithm based on parameter-varied logistic chaotic map and dynamical algorithm. The parameter-varied logistic map can cure the weaknesses of logistic map and resist the phase space reconstruction attack. We use the parameter-varied logistic map to shuffle the plain image, and then use a dynamical algorithm to encrypt the image. We carry out several experiments, including Histogram analysis, information entropy analysis, sensitivity analysis, key space analysis, correlation analysis and computational complexity to evaluate its performances. The experiment results show that this algorithm is with high security and can be competitive for image encryption. PMID:27066326

  8. Efficient image or video encryption based on spatiotemporal chaos system

    International Nuclear Information System (INIS)

    In this paper, an efficient image/video encryption scheme is constructed based on spatiotemporal chaos system. The chaotic lattices are used to generate pseudorandom sequences and then encrypt image blocks one by one. By iterating chaotic maps for certain times, the generated pseudorandom sequences obtain high initial-value sensitivity and good randomness. The pseudorandom-bits in each lattice are used to encrypt the Direct Current coefficient (DC) and the signs of the Alternating Current coefficients (ACs). Theoretical analysis and experimental results show that the scheme has good cryptographic security and perceptual security, and it does not affect the compression efficiency apparently. These properties make the scheme a suitable choice for practical applications.

  9. Synchronization of chaotic systems

    Energy Technology Data Exchange (ETDEWEB)

    Pecora, Louis M.; Carroll, Thomas L. [U.S. Naval Research Laboratory, Washington, District of Columbia 20375 (United States)

    2015-09-15

    We review some of the history and early work in the area of synchronization in chaotic systems. We start with our own discovery of the phenomenon, but go on to establish the historical timeline of this topic back to the earliest known paper. The topic of synchronization of chaotic systems has always been intriguing, since chaotic systems are known to resist synchronization because of their positive Lyapunov exponents. The convergence of the two systems to identical trajectories is a surprise. We show how people originally thought about this process and how the concept of synchronization changed over the years to a more geometric view using synchronization manifolds. We also show that building synchronizing systems leads naturally to engineering more complex systems whose constituents are chaotic, but which can be tuned to output various chaotic signals. We finally end up at a topic that is still in very active exploration today and that is synchronization of dynamical systems in networks of oscillators.

  10. Synchronization of chaotic systems

    Science.gov (United States)

    Pecora, Louis M.; Carroll, Thomas L.

    2015-09-01

    We review some of the history and early work in the area of synchronization in chaotic systems. We start with our own discovery of the phenomenon, but go on to establish the historical timeline of this topic back to the earliest known paper. The topic of synchronization of chaotic systems has always been intriguing, since chaotic systems are known to resist synchronization because of their positive Lyapunov exponents. The convergence of the two systems to identical trajectories is a surprise. We show how people originally thought about this process and how the concept of synchronization changed over the years to a more geometric view using synchronization manifolds. We also show that building synchronizing systems leads naturally to engineering more complex systems whose constituents are chaotic, but which can be tuned to output various chaotic signals. We finally end up at a topic that is still in very active exploration today and that is synchronization of dynamical systems in networks of oscillators.

  11. Chaotic Image Encryption Based on Running-Key Related to Plaintext

    Directory of Open Access Journals (Sweden)

    Cao Guanghui

    2014-01-01

    Full Text Available In the field of chaotic image encryption, the algorithm based on correlating key with plaintext has become a new developing direction. However, for this kind of algorithm, some shortcomings in resistance to reconstruction attack, efficient utilization of chaotic resource, and reducing dynamical degradation of digital chaos are found. In order to solve these problems and further enhance the security of encryption algorithm, based on disturbance and feedback mechanism, we present a new image encryption scheme. In the running-key generation stage, by successively disturbing chaotic stream with cipher-text, the relation of running-key to plaintext is established, reconstruction attack is avoided, effective use of chaotic resource is guaranteed, and dynamical degradation of digital chaos is minimized. In the image encryption stage, by introducing random-feedback mechanism, the difficulty of breaking this scheme is increased. Comparing with the-state-of-the-art algorithms, our scheme exhibits good properties such as large key space, long key period, and extreme sensitivity to the initial key and plaintext. Therefore, it can resist brute-force, reconstruction attack, and differential attack.

  12. Chaotic Image Encryption Based on Running-Key Related to Plaintext

    Science.gov (United States)

    Guanghui, Cao; Kai, Hu; Yizhi, Zhang; Jun, Zhou; Xing, Zhang

    2014-01-01

    In the field of chaotic image encryption, the algorithm based on correlating key with plaintext has become a new developing direction. However, for this kind of algorithm, some shortcomings in resistance to reconstruction attack, efficient utilization of chaotic resource, and reducing dynamical degradation of digital chaos are found. In order to solve these problems and further enhance the security of encryption algorithm, based on disturbance and feedback mechanism, we present a new image encryption scheme. In the running-key generation stage, by successively disturbing chaotic stream with cipher-text, the relation of running-key to plaintext is established, reconstruction attack is avoided, effective use of chaotic resource is guaranteed, and dynamical degradation of digital chaos is minimized. In the image encryption stage, by introducing random-feedback mechanism, the difficulty of breaking this scheme is increased. Comparing with the-state-of-the-art algorithms, our scheme exhibits good properties such as large key space, long key period, and extreme sensitivity to the initial key and plaintext. Therefore, it can resist brute-force, reconstruction attack, and differential attack. PMID:24711727

  13. Design of secure digital communication systems using chaotic modulation, cryptography and chaotic synchronization

    International Nuclear Information System (INIS)

    This paper presents a secure digital communication system based on chaotic modulation, cryptography, and chaotic synchronization techniques. The proposed system consists of a Chaotic Modulator (CM), a Chaotic Secure Transmitter (CST), a Chaotic Secure Receiver (CSR) and a Chaotic Demodulator (CDM). The CM module incorporates a chaotic system and a novel Chaotic Differential Peaks Keying (CDPK) modulation scheme to generate analog patterns corresponding to the input digital bits. The CST and CSR modules are designed such that a single scalar signal is transmitted in the public channel. Furthermore, by giving certain structural conditions of a particular class of chaotic system, the CST and the nonlinear observer-based CSR with an appropriate observer gain are constructed to synchronize with each other. These two slave systems are driven simultaneously by the transmitted signal and are designed to synchronize and generate appropriate cryptography keys for encryption and decryption purposes. In the CDM module, a nonlinear observer is designed to estimate the chaotic modulating system in the CM. A demodulation mechanism is then applied to decode the transmitted input digital bits. The effectiveness of the proposed scheme is demonstrated through the numerical simulation of an illustrative communication system. Synchronization between the chaotic circuits of the transmitter and receiver modules is guaranteed through the Lyapunov stability theorem. Finally, the security features of the proposed system in the event of attack by an intruder in either the time domain or the frequency domain are discussed

  14. Chaotic Image Encryption Algorithm by Correlating Keys with Plaintext

    Institute of Scientific and Technical Information of China (English)

    Zhu Congxu; Sun Kehui

    2012-01-01

    A novel image encryption scheme based on the modified skew tent map was proposed in this paper. In the key generating procedure, the algorithm generates a plaintext-dependent secret keys set. In the encryption process, the diffusion operation with cipher output feedback is introduced. Thus, cipher-irmge is sensitive to both initial keys and plaintext through only one round diffusion operation. The key space is large. As a resuk, the algorithm can effectively resist differential attacks, statistical attacks, brute-force attacks, known plaintext and chosen plaintext attacks. Perforrmnce test and security analysis demonstrates that this algorithm is eficient and reliable, with high potential to be adopted for secure comnmnications.

  15. Robust Secure and Blind Watermarking Based on DWT DCT Partial Multi Map Chaotic Encryption

    Directory of Open Access Journals (Sweden)

    Esam A. Hagras

    2011-12-01

    Full Text Available In this paper, a novel Commutative Watermarking and Partial Encryption (CWPE algorithm based onDiscrete Wavelet Transform and Discrete Cosine Transform (DWT-DCT for watermarking and Multi-MapWavelet Chaotic Encryption (MMW-CE is proposed. The original host image is first decomposed into foursub-bands using (DWT, each sub-band coefficients are relocated using Arnold transform to create a noiselikeversion, then apply partial encryption scheme using chaotic scrambled random number pattern bitwiseXOR with the scrambled horizontal coefficients only and the shuffled approximation coefficients aredivided into non-overlapping and equal sized blocks. Watermark embedding process is based on extractingthe (DCT middle frequencies of the encrypted approximation coefficients blocks. Comparison basedthreshold of the extracted DCT mid-band coefficients, watermark bits are embedded in the coefficients ofthe corresponding DCT middle frequencies. The experimental results show that the proposed algorithm isrobust against common signal processing attacks. The proposed algorithm is able to reduce encryption toone quarter of the image information. Statistical and differential analyses are performed to estimate thesecurity strength of the proposed algorithm. The results of the security analysis show that the proposedalgorithm provides a high security level for real time application.

  16. ROBUST SECURE AND BLIND WATERMARKING BASED ON DWT DCT PARTIAL MULTI MAP CHAOTIC ENCRYPTION

    Directory of Open Access Journals (Sweden)

    Esam A. Hagras

    2011-11-01

    Full Text Available In this paper, a novel Commutative Watermarking and Partial Encryption (CWPE algorithm based on Discrete Wavelet Transform and Discrete Cosine Transform (DWT-DCT for watermarking and Multi-Map Wavelet Chaotic Encryption (MMW-CE is proposed. The original host image is first decomposed into four sub-bands using (DWT, each sub-band coefficients are relocated using Arnold transform to create a noiselike version, then apply partial encryption scheme using chaotic scrambled random number pattern bitwise XOR with the scrambled horizontal coefficients only and the shuffled approximation coefficients are divided into non-overlapping and equal sized blocks. Watermark embedding process is based on extracting the (DCT middle frequencies of the encrypted approximation coefficients blocks. Comparison based threshold of the extracted DCT mid-band coefficients, watermark bits are embedded in the coefficients of the corresponding DCT middle frequencies. The experimental results show that the proposed algorithm is robust against common signal processing attacks. The proposed algorithm is able to reduce encryption to one quarter of the image information. Statistical and differential analyses are performed to estimate the security strength of the proposed algorithm. The results of the security analysis show that the proposed algorithm provides a high security level for real time application.

  17. A Novel 1D Hybrid Chaotic Map-Based Image Compression and Encryption Using Compressed Sensing and Fibonacci-Lucas Transform

    Directory of Open Access Journals (Sweden)

    Tongfeng Zhang

    2016-01-01

    Full Text Available A one-dimensional (1D hybrid chaotic system is constructed by three different 1D chaotic maps in parallel-then-cascade fashion. The proposed chaotic map has larger key space and exhibits better uniform distribution property in some parametric range compared with existing 1D chaotic map. Meanwhile, with the combination of compressive sensing (CS and Fibonacci-Lucas transform (FLT, a novel image compression and encryption scheme is proposed with the advantages of the 1D hybrid chaotic map. The whole encryption procedure includes compression by compressed sensing (CS, scrambling with FLT, and diffusion after linear scaling. Bernoulli measurement matrix in CS is generated by the proposed 1D hybrid chaotic map due to its excellent uniform distribution. To enhance the security and complexity, transform kernel of FLT varies in each permutation round according to the generated chaotic sequences. Further, the key streams used in the diffusion process depend on the chaotic map as well as plain image, which could resist chosen plaintext attack (CPA. Experimental results and security analyses demonstrate the validity of our scheme in terms of high security and robustness against noise attack and cropping attack.

  18. Ensemble of Chaotic and Naive Approaches for Performance Enhancement in Video Encryption

    Directory of Open Access Journals (Sweden)

    Jeyamala Chandrasekaran

    2015-01-01

    Full Text Available Owing to the growth of high performance network technologies, multimedia applications over the Internet are increasing exponentially. Applications like video conferencing, video-on-demand, and pay-per-view depend upon encryption algorithms for providing confidentiality. Video communication is characterized by distinct features such as large volume, high redundancy between adjacent frames, video codec compliance, syntax compliance, and application specific requirements. Naive approaches for video encryption encrypt the entire video stream with conventional text based cryptographic algorithms. Although naive approaches are the most secure for video encryption, the computational cost associated with them is very high. This research work aims at enhancing the speed of naive approaches through chaos based S-box design. Chaotic equations are popularly known for randomness, extreme sensitivity to initial conditions, and ergodicity. The proposed methodology employs two-dimensional discrete Henon map for (i generation of dynamic and key-dependent S-box that could be integrated with symmetric algorithms like Blowfish and Data Encryption Standard (DES and (ii generation of one-time keys for simple substitution ciphers. The proposed design is tested for randomness, nonlinearity, avalanche effect, bit independence criterion, and key sensitivity. Experimental results confirm that chaos based S-box design and key generation significantly reduce the computational cost of video encryption with no compromise in security.

  19. An Automatically Changing Feature Method based on Chaotic Encryption

    OpenAIRE

    Wang Li; Gang Luo; Lingyun Xiang

    2014-01-01

    In practical applications, in order to extract data from the stego, some data hiding encryption methods need to identify themselves. When performing data hiding, they embed some specific logo for self-identification. However, it is unavoidable to bring themselves the risk of exposure. Suppose each hidden method has a corresponding logo S and the attacker has a logo set Φ which consists of some hidden methods’ logos. Once he find the logo S which matches a l...

  20. A NEW TECHNIQUE BASED ON CHAOTIC STEGANOGRAPHY AND ENCRYPTION TEXT IN DCT DOMAIN FOR COLOR IMAGE

    Directory of Open Access Journals (Sweden)

    MELAD J. SAEED

    2013-10-01

    Full Text Available Image steganography is the art of hiding information into a cover image. This paper presents a new technique based on chaotic steganography and encryption text in DCT domain for color image, where DCT is used to transform original image (cover image from spatial domain to frequency domain. This technique used chaotic function in two phases; firstly; for encryption secret message, second; for embedding in DCT cover image. With this new technique, good results are obtained through satisfying the important properties of steganography such as: imperceptibility; improved by having mean square error (MSE, peak signal to noise ratio (PSNR and normalized correlation (NC, to phase and capacity; improved by encoding the secret message characters with variable length codes and embedding the secret message in one level of color image only.

  1. A New Image Encryption Scheme Based on Dynamic S-Boxes and Chaotic Maps

    Science.gov (United States)

    Rehman, Atique Ur; Khan, Jan Sher; Ahmad, Jawad; Hwang, Soeng Oun

    2016-03-01

    Substitution box is a unique and nonlinear core component of block ciphers. A better designing technique of substitution box can boost up the quality of ciphertexts. In this paper, a new encryption method based on dynamic substitution boxes is proposed via using two chaotic maps. To break the correlation in an original image, pixels values of the original plaintext image are permuted row- and column-wise through random sequences. The aforementioned random sequences are generated by 2-D Burgers chaotic map. For the generation of dynamic substitution boxes, Logistic chaotic map is employed. In the process of diffusion, the permuted image is divided into blocks and each block is substituted via different dynamic substitution boxes. In contrast to conventional encryption schemes, the proposed scheme does not undergo the fixed block cipher and hence the security level can be enhanced. Extensive security analysis including histogram test is applied on the proposed image encryption technique. All experimental results reveal that the proposed scheme has a high level of security and robustness for transmission of digital images on insecure communication channels.

  2. High-performance multimedia encryption system based on chaos.

    Science.gov (United States)

    Hasimoto-Beltrán, Rogelio

    2008-06-01

    Current chaotic encryption systems in the literature do not fulfill security and performance demands for real-time multimedia communications. To satisfy these demands, we propose a generalized symmetric cryptosystem based on N independently iterated chaotic maps (N-map array) periodically perturbed with a three-level perturbation scheme and a double feedback (global and local) to increase the system's robustness to attacks. The first- and second-level perturbations make cryptosystem extremely sensitive to changes in the plaintext data since the system's output itself (ciphertext global feedback) is used in the perturbation process. Third-level perturbation is a system reset, in which the system-key and chaotic maps are replaced for totally new values. An analysis of the proposed scheme regarding its vulnerability to attacks, statistical properties, and implementation performance is presented. To the best of our knowledge we provide a secure cryptosystem with one of the highest levels of performance for real-time multimedia communications. PMID:18601477

  3. The Research of Image Encryption Algorithm Based on Chaos Cellular Automata

    OpenAIRE

    Shuiping Zhang; Huijune Luo

    2012-01-01

    The Research presents an image encryption algorithm which bases on chaotic cellular automata. This algorithm makes use of features that extreme sensitivity of chaotic system to initial conditions, the cellular automaton with a high degree of parallel processing. The encryption algorithm uses two-dimensional chaotic system to Encrypt image, Then establish a cellular automaton model on the initial encrypted image. Encryption key of this algorithm is made up of the initial value by the two-dimen...

  4. A fractal-based image encryption system

    KAUST Repository

    Abd-El-Hafiz, S. K.

    2014-12-01

    This study introduces a novel image encryption system based on diffusion and confusion processes in which the image information is hidden inside the complex details of fractal images. A simplified encryption technique is, first, presented using a single-fractal image and statistical analysis is performed. A general encryption system utilising multiple fractal images is, then, introduced to improve the performance and increase the encryption key up to hundreds of bits. This improvement is achieved through several parameters: feedback delay, multiplexing and independent horizontal or vertical shifts. The effect of each parameter is studied separately and, then, they are combined to illustrate their influence on the encryption quality. The encryption quality is evaluated using different analysis techniques such as correlation coefficients, differential attack measures, histogram distributions, key sensitivity analysis and the National Institute of Standards and Technology (NIST) statistical test suite. The obtained results show great potential compared to other techniques.

  5. 基于FTP的图像混沌加密传输技术的实现%Implementation of transmitting chaotic-encrypted image based on FTP

    Institute of Scientific and Technical Information of China (English)

    刘新杰; 李黎明

    2014-01-01

    In order to accelerate the rate of chaotic-encrypted image transmission system and extend its field of application , this paper proposes a new method of transmitting chaotic-encrypted image: applying VSFTPD software to Mini 2440 ARM platform to setup a FTP server , and using FTP to convey the encrypted image files . The experiment result shows that this system can trans-fer chaotic-encrypted images rapidly and reliably .%为了提高混沌图像加密传输系统的传输速度并扩大应用范围,提出了一种实现混沌图像加密传输的新方法:利用 VSFTPD 软件在 Mini 2440 ARM 平台上构建 FTP 服务器,通过 FTP 实现混沌加密图像数据的传输。实验结果表明,该系统能够实现混沌加密图像的可靠快速传输。

  6. Multi-image encryption based on synchronization of chaotic lasers and iris authentication

    Science.gov (United States)

    Banerjee, Santo; Mukhopadhyay, Sumona; Rondoni, Lamberto

    2012-07-01

    A new technique of transmitting encrypted combinations of gray scaled and chromatic images using chaotic lasers derived from Maxwell-Bloch's equations has been proposed. This novel scheme utilizes the general method of solution of a set of linear equations to transmit similar sized heterogeneous images which are a combination of monochrome and chromatic images. The chaos encrypted gray scaled images are concatenated along the three color planes resulting in color images. These are then transmitted over a secure channel along with a cover image which is an iris scan. The entire cryptology is augmented with an iris-based authentication scheme. The secret messages are retrieved once the authentication is successful. The objective of our work is briefly outlined as (a) the biometric information is the iris which is encrypted before transmission, (b) the iris is used for personal identification and verifying for message integrity, (c) the information is transmitted securely which are colored images resulting from a combination of gray images, (d) each of the images transmitted are encrypted through chaos based cryptography, (e) these encrypted multiple images are then coupled with the iris through linear combination of images before being communicated over the network. The several layers of encryption together with the ergodicity and randomness of chaos render enough confusion and diffusion properties which guarantee a fool-proof approach in achieving secure communication as demonstrated by exhaustive statistical methods. The result is vital from the perspective of opening a fundamental new dimension in multiplexing and simultaneous transmission of several monochromatic and chromatic images along with biometry based authentication and cryptography.

  7. Digital Chaotic Synchronized Communication System

    Directory of Open Access Journals (Sweden)

    L. Magafas

    2009-01-01

    Full Text Available The experimental study of a secure chaotic synchronized communication system is presented. The synchronization betweentwo digital chaotic oscillators, serving as a transmitter-receiver scheme, is studied. The oscillators exhibit rich chaotic behaviorand are unidirectionally coupled, forming a master-slave topology. Both the input information signal and the transmittedchaotic signal are digital ones.

  8. Image encryption schemes for JPEG and GIF formats based on 3D baker with compound chaotic sequence generator

    OpenAIRE

    Ji, Shiyu; Tong, Xiaojun; Zhang, Miao

    2012-01-01

    This paper proposed several methods to transplant the compound chaotic image encryption scheme with permutation based on 3D baker into image formats as Joint Photographic Experts Group (JPEG) and Graphics Interchange Format (GIF). The new method averts the lossy Discrete Cosine Transform and quantization and can encrypt and decrypt JPEG images lossless. Our proposed method for GIF keeps the property of animation successfully. The security test results indicate the proposed methods have high s...

  9. A new chaotic cryptosystem

    Energy Technology Data Exchange (ETDEWEB)

    Wei Jun [Department of Computer Science and Engineering, Chongqing University, Chongqing 400044 (China); Zhunyi Medical College, Zhunyi 563000, Guizhou (China); Liao Xiaofeng [Department of Computer Science and Engineering, Chongqing University, Chongqing 400044 (China)]. E-mail: xfliao@cqu.edu.cn; Wong, Kwok-wo [Department of Computer Engineering and Information Technology, City University of Hong Kong (China); Xiang Tao [Department of Computer Science and Engineering, Chongqing University, Chongqing 400044 (China)

    2006-12-15

    Based on the study of some previously proposed chaotic encryption algorithms, we found that it is dangerous to mix chaotic state or iteration number of the chaotic system with ciphertext. In this paper, a new chaotic cryptosystem is proposed. Instead of simply mixing the chaotic signal of the proposed chaotic cryptosystem with the ciphertext, a noise-like variable is utilized to govern the encryption and decryption processes. This adds statistical sense to the new cryptosystem. Numerical simulations show that the new cryptosystem is practical whenever efficiency, ciphertext length or security is concerned.

  10. A new chaotic cryptosystem

    International Nuclear Information System (INIS)

    Based on the study of some previously proposed chaotic encryption algorithms, we found that it is dangerous to mix chaotic state or iteration number of the chaotic system with ciphertext. In this paper, a new chaotic cryptosystem is proposed. Instead of simply mixing the chaotic signal of the proposed chaotic cryptosystem with the ciphertext, a noise-like variable is utilized to govern the encryption and decryption processes. This adds statistical sense to the new cryptosystem. Numerical simulations show that the new cryptosystem is practical whenever efficiency, ciphertext length or security is concerned

  11. Design of Image Security System Based on Chaotic Maps Group

    Directory of Open Access Journals (Sweden)

    Feng Huang

    2011-12-01

    Full Text Available Images are used more and more widely in people’s life today. The image security becomes an important issue. Some encryption technologies are used to ensure the security of images. In them, the SCAN patterns are the one of effective tools to protect image. It generates very large number of scanning patterns of image. Then it shuffles the positions of image pixels by the patterns. The idea of chaotic maps group is similar to SCAN patterns. The paper designs a new image security system based on chaotic maps group. It takes the different maps of chaotic maps as patterns. The key represents different chaotic map patterns. Simulation shows that the image security system has a fast encryption speed and large enough key space, which mean high security. The design solve the limit between the keys and the size of image when encrypt image by chaotic map. At the same time it also solves the problem of the size of image required by SCAN pattern.

  12. Synchronization of identical chaotic systems through external chaotic driving

    International Nuclear Information System (INIS)

    In recent years, the study of synchronization of identical chaotic systems subjected to a common fluctuating random driving signal has drawn considerable interest. In this communication, we report that it is possible to achieve synchronization between two identical chaotic systems, which are not coupled directly but subjected to an external chaotic signal. The external chaotic signal may be obtained from any chaotic system identical or non-identical to both identical chaotic systems. Results of numerical simulations on well known Roessler and jerk dynamical systems have been presented. (author)

  13. Research on medical image encryption in telemedicine systems.

    Science.gov (United States)

    Dai, Yin; Wang, Huanzhen; Zhou, Zixia; Jin, Ziyi

    2016-04-29

    Recently, advances in computers and high-speed communication tools have led to enhancements in remote medical consultation research. Laws in some localities require hospitals to encrypt patient information (including images of the patient) before transferring the data over a network. Therefore, developing suitable encryption algorithms is quite important for modern medicine. This paper demonstrates a digital image encryption algorithm based on chaotic mapping, which uses the no-period and no-convergence properties of a chaotic sequence to create image chaos and pixel averaging. Then, the chaotic sequence is used to encrypt the image, thereby improving data security. With this method, the security of data and images can be improved. PMID:27163302

  14. Generalized function projective synchronization of chaotic systems for secure communication

    OpenAIRE

    Xu Xiaohui

    2011-01-01

    Abstract By using the generalized function projective synchronization (GFPS) method, in this paper, a new scheme for secure information transmission is proposed. The Liu system is employed to encrypt the information signal. In the transmitter, the original information signal is modulated into the system parameter of the chaotic systems. In the receiver, we assume that the parameter of receiver system is uncertain. Based on the Lyapunov stability theory, the controllers and corresponding param...

  15. Leaking Chaotic Systems

    CERN Document Server

    Altmann, Eduardo G; Tél, Tamás

    2013-01-01

    There are numerous physical situations in which a hole or leak is introduced in an otherwise closed chaotic system. The leak can have a natural origin, it can mimic measurement devices, and it can also be used to reveal dynamical properties of the closed system. In this paper we provide an unified treatment of leaking systems and we review applications to different physical problems, both in the classical and quantum pictures. Our treatment is based on the transient chaos theory of open systems, which is essential because real leaks have finite size and therefore estimations based on the closed system differ essentially from observations. The field of applications reviewed is very broad, ranging from planetary astronomy and hydrodynamical flows, to plasma physics and quantum fidelity. The theory is expanded and adapted to the case of partial leaks (partial absorption/transmission) with applications to room acoustics and optical microcavities in mind. Simulations in the lima .con family of billiards illustrate...

  16. Design a New Image Encryption using Fuzzy Integral Permutation with Coupled Chaotic Maps

    Directory of Open Access Journals (Sweden)

    Yasaman Hashemi

    2013-01-01

    Full Text Available This article introduces a novel image encryption algorithm based on DNA addition combining and coupled two-dimensional piecewise nonlinear chaotic map. This algorithm consists of two parts. In the first part of the algorithm, a DNA sequence matrix is obtained by encoding each color component, and is divided into some equal blocks and then the generated sequence of Sugeno integral fuzzy and the DNA sequence addition operation is used to add these blocks. Next, the DNA sequence matrix from the previous step is decoded and the complement operation to the result of the added matrix is performed by using Sugeno fuzzy integral. In the second part of the algorithm, the three modified color components are encrypted in a coupling fashion in such a way to strengthen the cryptosystem security. It is observed that the histogram, the correlation and avalanche criterion, can satisfy security and performance requirements (Avalanche criterion > 0.49916283. The experimental results obtained for the CVG-UGR image databases reveal the fact that the proposed algorithm is suitable for practical use to protect the security of digital image information over the Internet.

  17. Parameters identification of chaotic system by chaotic gravitational search algorithm

    International Nuclear Information System (INIS)

    In this paper, for the parameter identification problem of chaotic system, a chaotic gravitational search algorithm (CGSA) is proposed. At first, an iterative chaotic map with infinite collapses is introduced and chaotic local search (CLS) is designed, then CLS and basic gravitational search are combined in the procedure frame. The CGSA is composed of coarse gravitational search and fine chaotic local search, while chaotic search seeks the optimal solution further, based on the current best solution found by the coarse gravitational search. In order to show the effectiveness of CGSA, both offline and online parameter identifications of Lorenz system are conducted in comparative experiments, while the performances of CGSA are compared with GA, PSO and GSA. The results demonstrate the effectiveness and efficiency of CGSA in solving the problem of parameter identification of chaotic system, and the improvement to GSA has been verified.

  18. Eigenfunctions in chaotic quantum systems

    Energy Technology Data Exchange (ETDEWEB)

    Baecker, Arnd

    2007-07-01

    The structure of wavefunctions of quantum systems strongly depends on the underlying classical dynamics. In this text a selection of articles on eigenfunctions in systems with fully chaotic dynamics and systems with a mixed phase space is summarized. Of particular interest are statistical properties like amplitude distribution and spatial autocorrelation function and the implication of eigenfunction structures on transport properties. For systems with a mixed phase space the separation into regular and chaotic states does not always hold away from the semiclassical limit, such that chaotic states may completely penetrate into the region of the regular island. The consequences of this flooding are discussed and universal aspects highlighted. (orig.)

  19. Eigenfunctions in chaotic quantum systems

    International Nuclear Information System (INIS)

    The structure of wavefunctions of quantum systems strongly depends on the underlying classical dynamics. In this text a selection of articles on eigenfunctions in systems with fully chaotic dynamics and systems with a mixed phase space is summarized. Of particular interest are statistical properties like amplitude distribution and spatial autocorrelation function and the implication of eigenfunction structures on transport properties. For systems with a mixed phase space the separation into regular and chaotic states does not always hold away from the semiclassical limit, such that chaotic states may completely penetrate into the region of the regular island. The consequences of this flooding are discussed and universal aspects highlighted. (orig.)

  20. Synchronization and an application of a novel fractional order King Cobra chaotic system

    International Nuclear Information System (INIS)

    In this paper, we design a new three dimensional King Cobra face shaped fractional order chaotic system. The multi-scale synchronization scheme of two fractional order chaotic systems is described. The necessary conditions for the multi-scale synchronization of two identical fractional order King Cobra chaotic systems are derived through feedback control. A new cryptosystem is proposed for an image encryption and decryption by using synchronized fractional order King Cobra chaotic systems with the supports of multiple cryptographic assumptions. The security of the proposed cryptosystem is analyzed by the well known algebraic attacks. Numerical simulations are given to show the effectiveness of the proposed theoretical results

  1. Synchronization and an application of a novel fractional order King Cobra chaotic system

    Energy Technology Data Exchange (ETDEWEB)

    Muthukumar, P., E-mail: muthukumardgl@gmail.com; Balasubramaniam, P., E-mail: balugru@gmail.com [Department of Mathematics, Gandhigram Rural Institute‐Deemed University, Gandhigram 624 302, Tamilnadu (India); Ratnavelu, K., E-mail: kuru052001@gmail.com [Faculty of Science, Institute of Mathematical Sciences, University of Malaya, 50603 Kuala Lumpur (Malaysia)

    2014-09-01

    In this paper, we design a new three dimensional King Cobra face shaped fractional order chaotic system. The multi-scale synchronization scheme of two fractional order chaotic systems is described. The necessary conditions for the multi-scale synchronization of two identical fractional order King Cobra chaotic systems are derived through feedback control. A new cryptosystem is proposed for an image encryption and decryption by using synchronized fractional order King Cobra chaotic systems with the supports of multiple cryptographic assumptions. The security of the proposed cryptosystem is analyzed by the well known algebraic attacks. Numerical simulations are given to show the effectiveness of the proposed theoretical results.

  2. Leaking chaotic systems

    Science.gov (United States)

    Altmann, Eduardo G.; Portela, Jefferson S. E.; Tél, Tamás

    2013-04-01

    There are numerous physical situations in which a hole or leak is introduced in an otherwise closed chaotic system. The leak can have a natural origin, it can mimic measurement devices, and it can also be used to reveal dynamical properties of the closed system. A unified treatment of leaking systems is provided and applications to different physical problems, in both the classical and quantum pictures, are reviewed. The treatment is based on the transient chaos theory of open systems, which is essential because real leaks have finite size and therefore estimations based on the closed system differ essentially from observations. The field of applications reviewed is very broad, ranging from planetary astronomy and hydrodynamical flows to plasma physics and quantum fidelity. The theory is expanded and adapted to the case of partial leaks (partial absorption and/or transmission) with applications to room acoustics and optical microcavities in mind. Simulations in the limaçon family of billiards illustrate the main text. Regarding billiard dynamics, it is emphasized that a correct discrete-time representation can be given only in terms of the so-called true-time maps, while traditional Poincaré maps lead to erroneous results. Perron-Frobenius-type operators are generalized so that they describe true-time maps with partial leaks.

  3. Correlation control theory of chaotic laser systems

    International Nuclear Information System (INIS)

    A novel control theory of chaotic systems is studied. The correlation functions are calculated and used as feedback signals of the chaotic lasers. Computer experiments have shown that in this way the chaotic systems can be controlled to have time-independent output when the external control parameters are in chaotic domain. (author)

  4. Chaotic behaviour of deterministic systems

    International Nuclear Information System (INIS)

    In these Proceedings many dissipative as well as conservative systems are discussed. In some cases one would like to understand chaotic behavior in order to avoid it, e.g. for certain applications of mechanical and electrical engineering, celestial mechanics (satellite orbits), population dynamics, the storage rings of high energy physics, hydrodynamics, plasma physics (fusion), biophysics, etc. In other cases one would like to obtain chaotic behavior, e.g. for certain applications of classical (and quantum) statistical mechanics, hydrodynamics (turbulence), chemical kinetics, etc. Many diverse and notorious problems of Nonlinear Dynamics exist in one or another of those fields. The basic mathematical tools used in the study of chaotic behavior are introduced in the opening lecture. Chaotic behavior in conservative systems is discussed. For the simplest class of dissipative systems, 'Mappings of the Interval', a well developed theory is treated. More complicated dissipative systems with many degrees of freedom can often be reduced thanks to Bifurcation theory. The mathematical basis for chaotic behavior in difference- and differential equations is treated in detail. Finally, the lectures on full fledged real turbulence, show us how many outstanding problems still remain to be explained from first principles. Nevertheless it is exciting to detect progress on these old problems of chaotic behavior and see some agreement with experiment. (Auth.)

  5. An Efficient Image Encryption Scheme Based on a Peter De Jong Chaotic Map and a RC4 Stream Cipher

    Science.gov (United States)

    Hanchinamani, Gururaj; Kulkarni, Linganagouda

    2015-09-01

    Security is a vital issue in communication and storage of the images and encryption is one of the ways to ensure the security. This paper proposes an efficient image encryption scheme based on a Peter De Jong chaotic map and a RC4 stream cipher. A Peter De Jong map is employed to determine the initial keys for the RC4 stream generator and also during permutation stage. The RC4 stream generator is utilized to generate the pseudo random numbers for the pixel value rotation and diffusion operations. Each encryption round is comprised of three stages: permutation, pixel value rotation and diffusion. The permutation is based on scrambling the rows and columns, in addition, circular rotations of the rows and columns in alternate orientations. The second stage circularly rotates each and every pixel value by utilizing M × N pseudo random numbers. The last stage carries out the diffusion twice by scanning the image in two different ways. Each of the two diffusions accomplishes the diffusion in two orientations (forward and backward) with two previously diffused pixels and two pseudo random numbers. The security and performance of the proposed method is assessed thoroughly by using key space, statistical, differential, entropy and performance analysis. Moreover, two rounds of the call to the encrypt function provide the sufficient security. The experimental results show that the proposed encryption scheme is computationally fast with high security.

  6. A secure image encryption method based on dynamic harmony search (DHS) combined with chaotic map

    Science.gov (United States)

    Mirzaei Talarposhti, Khadijeh; Khaki Jamei, Mehrzad

    2016-06-01

    In recent years, there has been increasing interest in the security of digital images. This study focuses on the gray scale image encryption using dynamic harmony search (DHS). In this research, first, a chaotic map is used to create cipher images, and then the maximum entropy and minimum correlation coefficient is obtained by applying a harmony search algorithm on them. This process is divided into two steps. In the first step, the diffusion of a plain image using DHS to maximize the entropy as a fitness function will be performed. However, in the second step, a horizontal and vertical permutation will be applied on the best cipher image, which is obtained in the previous step. Additionally, DHS has been used to minimize the correlation coefficient as a fitness function in the second step. The simulation results have shown that by using the proposed method, the maximum entropy and the minimum correlation coefficient, which are approximately 7.9998 and 0.0001, respectively, have been obtained.

  7. Parameters identification of chaotic systems via chaotic ant swarm

    International Nuclear Information System (INIS)

    Through the construction of a suitable fitness function, the problem of parameters estimation of the chaotic system is converted to that of parameters optimization. In this paper, an optimization method, called CAS (chaotic ant swarm), is developed to solve the problem of searching for the optimal. Finally numerical simulations are provided to show the effectiveness and feasibility of the developed method

  8. Modeling of deterministic chaotic systems

    International Nuclear Information System (INIS)

    The success of deterministic modeling of a physical system relies on whether the solution of the model would approximate the dynamics of the actual system. When the system is chaotic, situations can arise where periodic orbits embedded in the chaotic set have distinct number of unstable directions and, as a consequence, no model of the system produces reasonably long trajectories that are realized by nature. We argue and present physical examples indicating that, in such a case, though the model is deterministic and low dimensional, statistical quantities can still be reliably computed. copyright 1999 The American Physical Society

  9. Compound Synchronization of Four Chaotic Complex Systems

    Directory of Open Access Journals (Sweden)

    Junwei Sun

    2015-01-01

    Full Text Available The chaotic complex system is designed from the start of the chaotic real system. Dynamical properties of a chaotic complex system in complex space are investigated. In this paper, a compound synchronization scheme is achieved for four chaotic complex systems. According to Lyapunov stability theory and the adaptive control method, four chaotic complex systems are considered and the corresponding controllers are designed to realize the compound synchronization scheme. Four novel design chaotic complex systems are given as an example to verify the validity and feasibility of the proposed control scheme.

  10. Steganography and encrypting based on immunochemical systems.

    Science.gov (United States)

    Kim, Kyung-Woo; Bocharova, Vera; Halámek, Jan; Oh, Min-Kyu; Katz, Evgeny

    2011-05-01

    Steganography and encrypting were demonstrated with immuno-specific systems. IgG-proteins were used as invisible ink developed with complementary antibodies labeled with enzymes producing color spots. The information security was achieved by mixing the target protein-antigens used for the text encoding with masking proteins of similar composition but having different bioaffinity. Two different texts were simultaneously encoded by using two different encoding proteins in a mixture. Various encrypting techniques were exemplified with the immuno-systems used for the steganography. Future use of the developed approach for information protection and watermark-technology was proposed. Scaling down the encoded text to a micro-size is feasible with the use of nanotechnology. PMID:21449025

  11. Chaotic Synchronzation System and Electrocardiogram

    Institute of Scientific and Technical Information of China (English)

    LiuqingPei; XinlaiDai; 等

    1997-01-01

    A mathematical model of chaotic synchronization of the heart-blood flow coupling dynamics is propsed,which is based on a seven dimension nonlinear dynamical system constructed by three subsystems of the sinoatrial node natural pacemaker,the cardiac relaxation oscillator and the dynamics of blood-fluid in heart chambers.The existence and robustness of the self-chaotic synchronization of the system are demonstrated by both methods of theoretical analysis and numerical simulation.The spectrum of Lyapunov exponent,the Lyapunov dimension and the Kolmogorov entropy are estimated when the system was undergoing the state of self-chaotic synchronization evolution.The time waveform of the dynamical variable,which represents the membrane potential of the cardiac integrative cell,shows a shape which is similar to that of the normal electrocardiogram(ECG) of humans,thus implying that the model possesses physiological significance functionally.

  12. NES++: number system for encryption based privacy preserving speaker verification

    Science.gov (United States)

    Xu, Lei; Feng, Tao; Zhao, Xi; Shi, Weidong

    2014-05-01

    As speech based operation becomes a main hand-free interaction solution between human and mobile devices (i.e., smartphones, Google Glass), privacy preserving speaker verification receives much attention nowadays. Privacy preserving speaker verification can be achieved through many different ways, such as fuzzy vault and encryption. Encryption based solutions are promising as cryptography is based on solid mathematic foundations and the security properties can be easily analyzed in a well established framework. Most current asymmetric encryption schemes work on finite algebraic structures, such as finite group and finite fields. However, the encryption scheme for privacy preserving speaker verification must handle floating point numbers. This gap must be filled to make the overall scheme practical. In this paper, we propose a number system that meets the requirements of both speaker verification and the encryption scheme used in the process. It also supports addition homomorphic property of Pailliers encryption, which is crucial for privacy preserving speaker verification. As asymmetric encryption is expensive, we propose a method of packing several numbers into one plain-text and the computation overhead is greatly reduced. To evaluate the performance of this method, we implement Pailliers encryption scheme over proposed number system and the packing technique. Our findings show that the proposed solution can fulfill the gap between speaker verification and encryption scheme very well, and the packing technique improves the overall performance. Furthermore, our solution is a building block of encryption based privacy preserving speaker verification, the privacy protection and accuracy rate are not affected.

  13. Triple Encrypted Holographic Storage and Digital Holographic System

    Institute of Scientific and Technical Information of China (English)

    ZHU Yi-Chao; ZHANG Jia-Sen; GONG Qi-Huang

    2008-01-01

    We propose a triple encrypted holographic memory containing a digital holographic system. The original image is encrypted using double random phase encryption and stored in a LiNbO3:Fe crystal with shift-multiplexing. Both the reference beams of the memory and the digital holographic system are random phase encoded. We theoretically and experimentally demonstrate the encryption and decryption of multiple images and the results show high quality and good fault tolerance. The total key length of this system is larger than 4.7×1033.

  14. Triple Encrypted Holographic Storage and Digital Holographic System

    International Nuclear Information System (INIS)

    We propose a triple encrypted holographic memory containing a digital holographic system. The original image is encrypted using double random phase encryption and stored in a LiNbO3:Fe crystal with shift-multiplexing. Both the reference beams of the memory and the digital holographic system are random phase encoded. We theoretically and experimentally demonstrate the encryption and decryption of multiple images and the results show high quality and good fault tolerance. The total key length of this system is larger than 4.7 × 1033. (fundamental areas of phenomenology (including applications))

  15. Advances and applications in chaotic systems

    CERN Document Server

    Volos, Christos

    2016-01-01

    This book reports on the latest advances and applications of chaotic systems. It consists of 25 contributed chapters by experts who are specialized in the various topics addressed in this book. The chapters cover a broad range of topics of chaotic systems such as chaos, hyperchaos, jerk systems, hyperjerk systems, conservative and dissipative systems, circulant chaotic systems, multi-scroll chaotic systems, finance chaotic system, highly chaotic systems, chaos control, chaos synchronization, circuit realization and applications of chaos theory in secure communications, mobile robot, memristors, cellular neural networks, etc. Special importance was given to chapters offering practical solutions, modeling and novel control methods for the recent research problems in chaos theory. This book will serve as a reference book for graduate students and researchers with a basic knowledge of chaos theory and control systems. The resulting design procedures on the chaotic systems are emphasized using MATLAB software.

  16. Broadcast encryption: paving the road to practical content protection systems

    Science.gov (United States)

    Deen, G.; Ponceleon, D.; Leake, Donald, Jr.

    2009-02-01

    Broadcast encryption is a well established alternative to public key encryption for use in content protection systems. It offers significant performance benefits, as well as useful features such a one-to-many delivery, dynamic membership in the authorized receivers group, and provides anonymous access to content, permitting content protection systems to preserve privacy for consumers. Broadcast encryption has been successfully deployed to users for protection of commercial content on digital media such as flash memory devices and optical media for both standard-definition and high-definition content. In this paper, we present the Advanced Secure Content Cluster Technology which applies broadcast encryption to content protection for home media networks

  17. A new reduced-order observer for the synchronization of nonlinear chaotic systems: An application to secure communications

    International Nuclear Information System (INIS)

    This paper deals with the master-slave synchronization scheme for partially known nonlinear chaotic systems, where the unknown dynamics is considered as the master system and we propose the slave system structure which estimates the unknown states. It introduced a new reduced order observer, using the concept of Algebraic Observability; we applied the results to a Sundarapandian chaotic system, and by means of some numerical simulations we show the effectiveness of the suggested approach. Finally, the proposed observer is utilized for encryption, where encryption key is the master system and decryption key is the slave system

  18. A new reduced-order observer for the synchronization of nonlinear chaotic systems: An application to secure communications

    Energy Technology Data Exchange (ETDEWEB)

    Castro-Ramírez, Joel, E-mail: ingcastro.7@gmail.com [Universidad Politécnica de Tlaxcala Av. Universidad Politecnica de Tlaxcala No.1, San Pedro Xalcaltzinco, Tepeyanco, Tlaxcala, C.P. 90180 (Mexico); Martínez-Guerra, Rafael, E-mail: rguerra@ctrl.cinvestav.mx [Departamento de Control Automático CINVESTAV-IPN, A.P. 14-740, D.F., México C.P. 07360 (Mexico); Cruz-Victoria, Juan Crescenciano, E-mail: juancrescenciano.cruz@uptlax.edu.mx [Universidad Politécnica de Tlaxcala Av. Universidad Politécnica de Tlaxcala No.1, San Pedro Xalcaltzinco, Tepeyanco, Tlaxcala, C.P. 90180 (Mexico)

    2015-10-15

    This paper deals with the master-slave synchronization scheme for partially known nonlinear chaotic systems, where the unknown dynamics is considered as the master system and we propose the slave system structure which estimates the unknown states. It introduced a new reduced order observer, using the concept of Algebraic Observability; we applied the results to a Sundarapandian chaotic system, and by means of some numerical simulations we show the effectiveness of the suggested approach. Finally, the proposed observer is utilized for encryption, where encryption key is the master system and decryption key is the slave system.

  19. The Extensive Bit-level Encryption System (EBES)

    OpenAIRE

    Satyaki Roy

    2013-01-01

    In the present work, the Extensive Bit-level Encryption System (EBES), a bit-level encryption mechanism has been introduced. It is a symmetric key cryptographic technique that combines advanced randomization of bits and serial bitwise feedback generation modules. After repeated testing with a variety of test inputs, frequency analysis, it would be safe to conclude that the algorithm is free from standard cryptographic attacks. It can effectively encrypt short messages and passwords.

  20. Chaotic Synchronization Theory Video Encryption Technology Research%混沌同步理论视频加密技术研究

    Institute of Scientific and Technical Information of China (English)

    曾凡培

    2012-01-01

    加密技术一直是国内外研究热点问题.本文利用混沌同步理论对视频图像进行加密处理,采用混沌理论中的Logistic映射序列密码加密系统进行加密.实验结果说明了采用该方法能够有效地对视频图像进行加密.%encryption technology has been a research hotspot issues, this paper uses chaotic synchronization theory on video image encryption processing, using chaos theory in the Logistic mapping sequence cipher encryption encryption, the experimental results show the method can effective video image encryption.

  1. 基于混沌序列的数字彩色图像加密算法%Encryption Algorithm for Digital Color Image Based on Chaotic Sequences

    Institute of Scientific and Technical Information of China (English)

    何松林

    2011-01-01

    The new encryption algorithm for digital color image is proposed. The image can be encrypted through encryption matrixes generated with Logistic chaotic sequences to exclusive OR(XOR) color matrixes many times. The R, G and B components of the color image can be treated randomly and encrypted image becomes more uniform. Because the chaotic sequences are extremely sensitive to the parameters and the initial values, even ifthe encryption algorithm is open. Without the right key, the useful information can not be got. The encryption key length is effectively enlarged by using multiple sets of parameter of the branch and initial value as the encryption key. The experiments confirm its validity.%提出用Logistic混沌序列产生多个加密矩阵与基色矩阵进行多次异或的方法,对彩色图像的RGB分量进行随机化处理,使加密后的图像均匀.由于混沌序列对参数和初始值的极端敏感性,即使加密算法被公开,没有正确的密钥也无法得到有用信息.因此采用多组分支参数和初始值作为密钥,使密钥长度有效增加.实验结果证明了该算法是有效的.

  2. Design of Image Security System Based on Chaotic Maps Group

    OpenAIRE

    Feng Huang; Xilong Qu

    2011-01-01

    Images are used more and more widely in people’s life today. The image security becomes an important issue. Some encryption technologies are used to ensure the security of images. In them, the SCAN patterns are the one of effective tools to protect image. It generates very large number of scanning patterns of image. Then it shuffles the positions of image pixels by the patterns. The idea of chaotic maps group is similar to SCAN patterns. The paper designs a new image security system bas...

  3. Signal and reference wave dually encrypted digital holographic system

    Institute of Scientific and Technical Information of China (English)

    ZHU YiChao; ZHANG JiaSen; GONG QiHuang

    2008-01-01

    We propose a secure digital holographic system with signal and reference waves dually encrypted. Two random phase masks are used to encrypt the images in the input and the Fourier planes. The reference beam is phase encoded by another random phase mask. The encrypted image and the key are recorded by a CCD camera. The data can be processed or transferred directly by computer. We theoretically and experimentally demonstrate encryption and decryption of multiple images and the results show a high quality and good fault tolerance.

  4. Cryptosystems based on chaotic dynamics

    Energy Technology Data Exchange (ETDEWEB)

    McNees, R.A.; Protopopescu, V.; Santoro, R.T.; Tolliver, J.S.

    1993-08-01

    An encryption scheme based on chaotic dynamics is presented. This scheme makes use of the efficient and reproducible generation of cryptographically secure pseudo random numbers from chaotic maps. The result is a system which encrypts quickly and possesses a large keyspace, even in small precision implementations. This system offers an excellent solution to several problems including the dissemination of key material, over the air rekeying, and other situations requiring the secure management of information.

  5. CifrarFS – Encrypted File System Using FUSE

    Directory of Open Access Journals (Sweden)

    Anagha Kulkarni

    2009-10-01

    Full Text Available This paper describes a file system that enables transparent encryption and decryption of files by using advanced, standard cryptographic algorithm, Data Encryption Standard (DES [1]. Any individual, including super user, or program, that doesn't possess the appropriate passphrase for the directory which contains encrypted files cannot read the encrypted data. Encrypted files can be protected even from those who gain physical possession of the computer on which files reside [2]. ‘CifrarFS’, an encrypted file system using ‘File system in USEr space (FUSE’ maintains all the files in a specific directory in an encrypted form and decrypts them on demand. It encodes the file name while storing but decodes it while viewed from the mount point. We propose an idea of watermark in every encrypted file that is validated before decryption and also log all the operations on ‘CifrarFS’. It is a stackable file system that operates on top of ext3. It does not need root privileges.

  6. Communications with chaotic optoelectronic systems cryptography and multiplexing

    Science.gov (United States)

    Rontani, Damien

    With the rapid development of optical communications and the increasing amount of data exchanged, it has become utterly important to provide effective architectures to protect sensitive data. The use of chaotic optoelectronic devices has already demonstrated great potential in terms of additional computational security at the physical layer of the optical network. However, the determination of the security level and the lack of a multi-user framework are two hurdles which have prevented their deployment on a large scale. In this thesis, we propose to address these two issues. First, we investigate the security of a widely used chaotic generator, the external cavity semiconductor laser (ECSL). This is a time-delay system known for providing complex and high-dimensional chaos, but with a low level of security regarding the identification of its most critical parameter, the time delay. We perform a detailed analysis of the in uence of the ECSL parameters to devise how higher levels of security can be achieved and provide a physical interpretation of their origin. Second, we devise new architectures to multiplex optical chaotic signals and realize multi-user communications at high bit rates. We propose two different approaches exploiting known chaotic optoelectronic devices. The first one uses mutually coupled ECSL and extends typical chaos-based encryption strategies, such as chaos-shift keying (CSK) and chaos modulation (CMo). The second one uses an electro-optical oscillator (EOO) with multiple delayed feedback loops and aims first at transposing coded-division multiple access (CDMA) and then at developing novel strategies of encryption and decryption, when the time-delays of each feedback loop are time-dependent.

  7. Robust synchronization of chaotic systems via feedback

    Energy Technology Data Exchange (ETDEWEB)

    Femat, Ricardo [IPICYT, San Luis Potosi (Mexico). Dept. de Matematicas Aplicadas; Solis-Perales, Gualberto [Universidad de Guadalajara, Centro Univ. de Ciencias Exactas e Ingenierias (Mexico). Div. de Electronica y Computacion

    2008-07-01

    This volume includes the results derived during last ten years about both suppression and synchronization of chaotic -continuous time- systems. Along this time, the concept was to study how the intrinsic properties of dynamical systems can be exploited to suppress and to synchronize the chaotic behaviour and what synchronization phenomena can be found under feedback interconnection. A compilation of these findings is described in this book. This book shows a perspective on synchronization of chaotic systems. (orig.)

  8. Quantum Image Encryption Algorithm Based on Quantum Image XOR Operations

    Science.gov (United States)

    Gong, Li-Hua; He, Xiang-Tao; Cheng, Shan; Hua, Tian-Xiang; Zhou, Nan-Run

    2016-07-01

    A novel encryption algorithm for quantum images based on quantum image XOR operations is designed. The quantum image XOR operations are designed by using the hyper-chaotic sequences generated with the Chen's hyper-chaotic system to control the control-NOT operation, which is used to encode gray-level information. The initial conditions of the Chen's hyper-chaotic system are the keys, which guarantee the security of the proposed quantum image encryption algorithm. Numerical simulations and theoretical analyses demonstrate that the proposed quantum image encryption algorithm has larger key space, higher key sensitivity, stronger resistance of statistical analysis and lower computational complexity than its classical counterparts.

  9. Amplitude death in steadily forced chaotic systems

    Institute of Scientific and Technical Information of China (English)

    Feng Guo-Lin; He Wen-Ping

    2007-01-01

    Steady forcing can induce the amplitude death in chaotic systems, which generally exists in coupled dynamic systems. Using the Lorenz system as a typical example, this paper investigates the dynamic behaviours of the chaotic system with steady forcing numerically, and finds that amplitude death can occur as the strength of the steady forcing goes beyond a critical constant.

  10. A Novel Bit-level Image Encryption Method Based on Chaotic Map and Dynamic Grouping

    Institute of Scientific and Technical Information of China (English)

    张国基; 沈彦

    2012-01-01

    In this paper,a novel bit-level image encryption method based on dynamic grouping is proposed.In the proposed method,the plain-image is divided into several groups randomly,then permutation-diffusion process on bit level is carried out.The keystream generated by logistic map is related to the plain-image,which confuses the relationship between the plain-image and the cipher-image.The computer simulation results of statistical analysis,information entropy analysis and sensitivity analysis show that the proposed encryption method is secure and reliable enough to be used for communication application.

  11. An image encryption scheme based on the MLNCML system using DNA sequences

    Science.gov (United States)

    Zhang, Ying-Qian; Wang, Xing-Yuan; Liu, Jia; Chi, Ze-Lin

    2016-07-01

    We propose a new image scheme based on the spatiotemporal chaos of the Mixed Linear-Nonlinear Coupled Map Lattices (MLNCML). This spatiotemporal chaotic system has more cryptographic features in dynamics than the system of Coupled Map Lattices (CML). In the proposed scheme, we employ the strategy of DNA computing and one time pad encryption policy, which can enhance the sensitivity to the plaintext and resist differential attack, brute-force attack, statistical attack and plaintext attack. Simulation results and theoretical analysis indicate that the proposed scheme has superior high security.

  12. System for processing an encrypted instruction stream in hardware

    Energy Technology Data Exchange (ETDEWEB)

    Griswold, Richard L.; Nickless, William K.; Conrad, Ryan C.

    2016-04-12

    A system and method of processing an encrypted instruction stream in hardware is disclosed. Main memory stores the encrypted instruction stream and unencrypted data. A central processing unit (CPU) is operatively coupled to the main memory. A decryptor is operatively coupled to the main memory and located within the CPU. The decryptor decrypts the encrypted instruction stream upon receipt of an instruction fetch signal from a CPU core. Unencrypted data is passed through to the CPU core without decryption upon receipt of a data fetch signal.

  13. Generalized function projective synchronization of chaotic systems for secure communication

    Directory of Open Access Journals (Sweden)

    Xu Xiaohui

    2011-01-01

    Full Text Available Abstract By using the generalized function projective synchronization (GFPS method, in this paper, a new scheme for secure information transmission is proposed. The Liu system is employed to encrypt the information signal. In the transmitter, the original information signal is modulated into the system parameter of the chaotic systems. In the receiver, we assume that the parameter of receiver system is uncertain. Based on the Lyapunov stability theory, the controllers and corresponding parameter update rule are constructed to achieve GFPS between the transmitter and receiver system with uncertain parameters, and identify unknown parameters. The original information signal can be recovered successfully through some simple operations by the estimated parameter. Furthermore, by means of the proposed method, the original information signal can be extracted accurately in the presence of additional noise in communication channel. Numerical results have verified the effectiveness and feasibility of presented method. Mathematics subject classification (2010 68M10, 34C28, 93A30, 93C40

  14. Generalized function projective synchronization of chaotic systems for secure communication

    Science.gov (United States)

    Xu, Xiaohui

    2011-12-01

    By using the generalized function projective synchronization (GFPS) method, in this paper, a new scheme for secure information transmission is proposed. The Liu system is employed to encrypt the information signal. In the transmitter, the original information signal is modulated into the system parameter of the chaotic systems. In the receiver, we assume that the parameter of receiver system is uncertain. Based on the Lyapunov stability theory, the controllers and corresponding parameter update rule are constructed to achieve GFPS between the transmitter and receiver system with uncertain parameters, and identify unknown parameters. The original information signal can be recovered successfully through some simple operations by the estimated parameter. Furthermore, by means of the proposed method, the original information signal can be extracted accurately in the presence of additional noise in communication channel. Numerical results have verified the effectiveness and feasibility of presented method. Mathematics subject classification (2010) 68M10, 34C28, 93A30, 93C40

  15. Extended Logistic Chaotic Sequence and Its Performance Analysis

    Institute of Scientific and Technical Information of China (English)

    ZHANG Xuefeng; FAN Jiulun

    2007-01-01

    In order to improve performance and security of image encryption algorithm effectively based on chaotic sequences, an extended chaotic sequence generating method is presented based on logistic chaotic system using Bernstein form Bezier curve generating algorithm. In order to test the pseudorandom performance of the extended chaotic sequence, we also analyze random performance, autocorrelation performance, and balance performance of the extended chaotic sequence. Simulation results show that the extended chaotic sequence generated using our method is pseudorandom and its correlation performance and balance performance are good. As an application, we apply the extended chaotic sequence in image encryption algorithm, the simulation results show that the performance of the encrypted image using our method is better than that using logistic chaotic sequence.

  16. Repetitive learning control of continuous chaotic systems

    International Nuclear Information System (INIS)

    Combining a shift method and the repetitive learning strategy, a repetitive learning controller is proposed to stabilize unstable periodic orbits (UPOs) within chaotic attractors in the sense of least mean square. If nonlinear parts in chaotic systems satisfy Lipschitz condition, the proposed controller can be simplified into a simple proportional repetitive learning controller

  17. Inventive Cubic Symmetric Encryption System for Multimedia

    Directory of Open Access Journals (Sweden)

    Ali M Alshahrani

    2015-01-01

    Full Text Available Cryptography is a security technique that must be applied in both communication sides to pro- tect the data during its transmission through the n etwork from all kinds of attack. On the sender side, the original data will be changed into differ ent symbols or shapes by using a known key; this is called encryption. On the other communicati on side, the decryption process will be done and the data will be returned to its former shape b y using the agreed key. The importance of cryptography is to fulfil the communication securit y requirements. Real time applications (RTA are vulnerable for the moment because of their big size. However, some of the current algo- rithms are not really appropriate for use with thes e kinds of information. In this paper, a novel symmetric block cipher cryptography algorithm has b een illustrated and discussed. The system uses an 8x8x8 cube, and each cell contains a pair o f binary inputs. The cube can provide a huge number of combinations that can produce a very stro ng algorithm and a long key size. Due to the lightweight and fast technique used in this ide a, it is expected to be extremely rapid com- pared to the majority of current algorithms, such a s DES and AES.

  18. Synchronization Techniques for Chaotic Communication Systems

    CERN Document Server

    Jovic, Branislav

    2011-01-01

    Since the early 1990s, when synchronization of chaotic communication systems became a popular research subject, a vast number of scientific papers have been published. However, most of today's books on chaotic communication systems deal exclusively with the systems where perfect synchronization is assumed, an assumption which separates theoretical from practical, real world, systems. This book is the first of its kind dealing exclusively with the synchronization techniques for chaotic communication systems. It describes a number of novel robust synchronization techniques, which there is a lack

  19. Digital Image Encryption Algorithm Design Based on Genetic Hyperchaos

    OpenAIRE

    Wang, Jian

    2016-01-01

    In view of the present chaotic image encryption algorithm based on scrambling (diffusion is vulnerable to choosing plaintext (ciphertext) attack in the process of pixel position scrambling), we put forward a image encryption algorithm based on genetic super chaotic system. The algorithm, by introducing clear feedback to the process of scrambling, makes the scrambling effect related to the initial chaos sequence and the clear text itself; it has realized the image features and the organic fusi...

  20. Compression and Encryption of ECG Signal Using Wavelet and Chaotically Huffman Code in Telemedicine Application.

    Science.gov (United States)

    Raeiatibanadkooki, Mahsa; Quchani, Saeed Rahati; KhalilZade, MohammadMahdi; Bahaadinbeigy, Kambiz

    2016-03-01

    In mobile health care monitoring, compression is an essential tool for solving storage and transmission problems. The important issue is able to recover the original signal from the compressed signal. The main purpose of this paper is compressing the ECG signal with no loss of essential data and also encrypting the signal to keep it confidential from everyone, except for physicians. In this paper, mobile processors are used and there is no need for any computers to serve this purpose. After initial preprocessing such as removal of the baseline noise, Gaussian noise, peak detection and determination of heart rate, the ECG signal is compressed. In compression stage, after 3 steps of wavelet transform (db04), thresholding techniques are used. Then, Huffman coding with chaos for compression and encryption of the ECG signal are used. The compression rates of proposed algorithm is 97.72 %. Then, the ECG signals are sent to a telemedicine center to acquire specialist diagnosis by TCP/IP protocol. PMID:26779641

  1. Effect of noise on coupled chaotic systems

    CERN Document Server

    Roy, M F; Roy, Manojit

    1997-01-01

    Effect of noise in inducing order on various chaotically evolving systems is reviewed, with special emphasis on systems consisting of coupled chaotic elements. In many situations it is observed that the uncoupled elements when driven by identical noise, show synchronization phenomena where chaotic trajectories exponentially converge towards a single noisy trajectory, independent of the initial conditions. In a random neural network, with infinite range coupling, chaos is suppressed due to noise and the system evolves towards a fixed point. Spatiotemporal stochastic resonance phenomenon has been observed in a square array of coupled threshold devices where a temporal characteristic of the system resonates at a given noise strength. In a chaotically evolving coupled map lattice with logistic map as local dynamics and driven by identical noise at each site, we report that the number of structures (a structure is a group of neighbouring lattice sites for whom values of the variable follow certain predefined patte...

  2. The Research of Image Encryption Algorithm Based on Chaos Cellular Automata

    Directory of Open Access Journals (Sweden)

    Shuiping Zhang

    2012-02-01

    Full Text Available The Research presents an image encryption algorithm which bases on chaotic cellular automata. This algorithm makes use of features that extreme sensitivity of chaotic system to initial conditions, the cellular automaton with a high degree of parallel processing. The encryption algorithm uses two-dimensional chaotic system to Encrypt image, Then establish a cellular automaton model on the initial encrypted image. Encryption key of this algorithm is made up of the initial value by the two-dimensional chaotic systems, parameters, two-dimensional cellular automata local evolution rules f and iterations n. Experimental results shows that the algorithm has features that high efficiency, better security, sensitivity to the key and so on.

  3. Dispersion compensation in an open-loop all-optical chaotic communication system

    International Nuclear Information System (INIS)

    The optical chaotic communication system using open-loop fiber transmission is studied under strong injection conditions. The optical chaotic communication system with open-loop configuration is studied using fiber transmission under strong injection conditions. The performances of fiber links composed of two types of fiber segments in different dispersion compensation maps are compared by testing the quality of the recovered message with different bit rates and encrypted by chaotic modulation (CM) or chaotic shift keying (CSK). The result indicates that the performance of the pre-compensation map is always worst. Two types of symmetrical maps are identical whatever the encryption method and bit-rate of message are. For the transmitting and the recovering of message of lower bit rate (1 Gb/s), the post-compensation map is the best scheme. However, for the message of higher bit rate (2.5 Gb/s), the parameters in communication system need to be modified properly in order to adapt to the high-speed application. Meanwhile, two types of symmetrical maps are the best scheme. In addition, the CM method is superior to the CSK method for high-speed applications. It is in accordance with the result in a back-to-back configuration system. (general)

  4. A chaotic communication system of improved performance based on the Derivative-free nonlinear Kalman filter

    Science.gov (United States)

    Rigatos, Gerasimos

    2016-07-01

    The Derivative-free nonlinear Kalman Filter is used for developing a communication system that is based on a chaotic modulator such as the Duffing system. In the transmitter's side, the source of information undergoes modulation (encryption) in which a chaotic signal generated by the Duffing system is the carrier. The modulated signal is transmitted through a communication channel and at the receiver's side demodulation takes place, after exploiting the estimation provided about the state vector of the chaotic oscillator by the Derivative-free nonlinear Kalman Filter. Evaluation tests confirm that the proposed filtering method has improved performance over the Extended Kalman Filter and reduces significantly the rate of transmission errors. Moreover, it is shown that the proposed Derivative-free nonlinear Kalman Filter can work within a dual Kalman Filtering scheme, for performing simultaneously transmitter-receiver synchronisation and estimation of unknown coefficients of the communication channel.

  5. Fuzzy system identification via chaotic ant swarm

    International Nuclear Information System (INIS)

    In this paper, we introduce a chaotic optimization method, called CAS (chaotic ant swarm), to solve the problem of designing a fuzzy system to identify dynamical systems. The position vector of each ant in the CAS algorithm corresponds to the parameter vector of the selected fuzzy system. At each learning time step, the CAS algorithm is iterated to give the optimal parameters of fuzzy systems based on the fitness theory. Then the corresponding CAS-designed fuzzy system is built and applied to the identification of the unknown nonlinear dynamical systems. Numerical simulation results are provided to show the effectiveness and feasibility of the developed CAS-designed fuzzy system.

  6. Hyperchaotic encryption based on multi-scroll piecewise linear Systems

    Czech Academy of Sciences Publication Activity Database

    García-Martínez, M.; Ontanon-García, L.J.; Campos-Cantón, E.; Čelikovský, Sergej

    2015-01-01

    Roč. 270, č. 1 (2015), s. 413-424. ISSN 0096-3003 R&D Projects: GA ČR GA13-20433S Institutional support: RVO:67985556 Keywords : Hyperchaotic encryption * Piecewise linear systems * Stream cipher * Pseudo-random bit generator * Chaos theory * Multi-scrollattractors Subject RIV: BC - Control Systems Theory Impact factor: 1.551, year: 2014

  7. Digital color image encoding and decoding using a novel chaotic random generator

    International Nuclear Information System (INIS)

    This paper proposes a novel chaotic system, in which variables are treated as encryption keys in order to achieve secure transmission of digital color images. Since the dynamic response of chaotic system is highly sensitive to the initial values of a system and to the variation of a parameter, and chaotic trajectory is so unpredictable, we use elements of variables as encryption keys and apply these to computer internet communication of digital color images. As a result, we obtain much higher communication security. We adopt one statistic method involving correlation coefficient γ and FIPS PUB 140-1 to test on the distribution of distinguished elements of variables for continuous-time chaotic system, and accordingly select optimal encryption keys to use in secure communication of digital color images. At the transmitter end, we conduct RGB level decomposition on digital color images, and encrypt them with chaotic keys, and finally transmit them through computer internet. The same encryption keys are used to decrypt and recover the original images at the receiver end. Even if the encrypted images are stolen in the public channel, an intruder is not able to decrypt and recover the original images because of the lack of adequate encryption keys. Empirical example shows that the chaotic system and encryption keys applied in the encryption, transmission, decryption, and recovery of digital color images can achieve higher communication security and best recovered images

  8. Digital color image encoding and decoding using a novel chaotic random generator

    Energy Technology Data Exchange (ETDEWEB)

    Nien, H.H. [Department of Electrical Engineering, Chienkuo Technology University, Changhua 500, Taiwan (China); Huang, C.K. [Department of Electrical Engineering, Chienkuo Technology University, Changhua 500, Taiwan (China)]. E-mail: hcg@cc.ctu.edu.tw; Changchien, S.K. [Department of Electrical Engineering, Chienkuo Technology University, Changhua 500, Taiwan (China); Shieh, H.W. [Department of Electrical Engineering, Chienkuo Technology University, Changhua 500, Taiwan (China); Chen, C.T. [Department of Electrical Engineering, Chienkuo Technology University, Changhua 500, Taiwan (China); Tuan, Y.Y. [Department of Electrical Engineering, Chienkuo Technology University, Changhua 500, Taiwan (China)

    2007-05-15

    This paper proposes a novel chaotic system, in which variables are treated as encryption keys in order to achieve secure transmission of digital color images. Since the dynamic response of chaotic system is highly sensitive to the initial values of a system and to the variation of a parameter, and chaotic trajectory is so unpredictable, we use elements of variables as encryption keys and apply these to computer internet communication of digital color images. As a result, we obtain much higher communication security. We adopt one statistic method involving correlation coefficient {gamma} and FIPS PUB 140-1 to test on the distribution of distinguished elements of variables for continuous-time chaotic system, and accordingly select optimal encryption keys to use in secure communication of digital color images. At the transmitter end, we conduct RGB level decomposition on digital color images, and encrypt them with chaotic keys, and finally transmit them through computer internet. The same encryption keys are used to decrypt and recover the original images at the receiver end. Even if the encrypted images are stolen in the public channel, an intruder is not able to decrypt and recover the original images because of the lack of adequate encryption keys. Empirical example shows that the chaotic system and encryption keys applied in the encryption, transmission, decryption, and recovery of digital color images can achieve higher communication security and best recovered images.

  9. Controlled transitions between cupolets of chaotic systems

    Energy Technology Data Exchange (ETDEWEB)

    Morena, Matthew A., E-mail: matthew.morena@wildcats.unh.edu; Short, Kevin M.; Cooke, Erica E. [Integrated Applied Mathematics Program, University of New Hampshire, Durham, New Hampshire 03824 (United States)

    2014-03-15

    We present an efficient control scheme that stabilizes the unstable periodic orbits of a chaotic system. The resulting orbits are known as cupolets and collectively provide an important skeleton for the dynamical system. Cupolets exhibit the interesting property that a given sequence of controls will uniquely identify a cupolet, regardless of the system's initial state. This makes it possible to transition between cupolets, and thus unstable periodic orbits, simply by switching control sequences. We demonstrate that although these transitions require minimal controls, they may also involve significant chaotic transients unless carefully controlled. As a result, we present an effective technique that relies on Dijkstra's shortest path algorithm from algebraic graph theory to minimize the transients and also to induce certainty into the control of nonlinear systems, effectively providing an efficient algorithm for the steering and targeting of chaotic systems.

  10. Controlled transitions between cupolets of chaotic systems

    Science.gov (United States)

    Morena, Matthew A.; Short, Kevin M.; Cooke, Erica E.

    2014-03-01

    We present an efficient control scheme that stabilizes the unstable periodic orbits of a chaotic system. The resulting orbits are known as cupolets and collectively provide an important skeleton for the dynamical system. Cupolets exhibit the interesting property that a given sequence of controls will uniquely identify a cupolet, regardless of the system's initial state. This makes it possible to transition between cupolets, and thus unstable periodic orbits, simply by switching control sequences. We demonstrate that although these transitions require minimal controls, they may also involve significant chaotic transients unless carefully controlled. As a result, we present an effective technique that relies on Dijkstra's shortest path algorithm from algebraic graph theory to minimize the transients and also to induce certainty into the control of nonlinear systems, effectively providing an efficient algorithm for the steering and targeting of chaotic systems.

  11. Urey Prize Lecture - Chaotic dynamics in the solar system

    Science.gov (United States)

    Wisdom, Jack

    1987-01-01

    Attention is given to solar system cases in which chaotic solutions of Newton's equations are important, as in chaotic rotation and orbital evolution. Hyperion is noted to be tumbling chaotically; chaotic orbital evolution is suggested to be of fundamental importance to an accounting for the Kirkwood gaps in asteroid distribution and for the phase space boundary of the chaotic zone at the 3/1 mean-motion commensurability with Jupiter. In addition, chaotic trajectories in the 2/1 chaotic zone reach very high eccentricities by a route that carries them to high inclinations temporarily.

  12. An Image Encryption Scheme Based on Hyperchaotic Rabinovich and Exponential Chaos Maps

    Directory of Open Access Journals (Sweden)

    Xiaojun Tong

    2015-01-01

    Full Text Available This paper proposes a new four-dimensional hyperchaotic map based on the Rabinovich system to realize chaotic encryption in higher dimension and improve the security. The chaotic sequences generated by Runge-Kutta method are combined with the chaotic sequences generated by an exponential chaos map to generate key sequences. The key sequences are used for image encryption. The security test results indicate that the new hyperchaotic system has high security and complexity. The comparison between the new hyperchaotic system and the several low-dimensional chaotic systems shows that the proposed system performs more efficiently.

  13. Formulation of statistical mechanics for chaotic systems

    Indian Academy of Sciences (India)

    Vishnu M Bannur; Ramesh Babu Thayyullathil

    2009-02-01

    We formulate the statistical mechanics of chaotic system with few degrees of freedom and investigated the quartic oscillator system using microcanonical and canonical ensembles. Results of statistical mechanics are numerically verified by considering the dynamical evolution of quartic oscillator system with two degrees of freedom.

  14. Subsampling technique to enhance the decoded output of JTC encrypting system

    Science.gov (United States)

    Barrera, John Fredy; Rueda, Edgar; Ríos, Carlos; Tebaldi, Myrian; Bolognini, Nestor; Torroba, Roberto

    2011-08-01

    Optical systems have physical restrictions that impose limits in the finest spatial feature that can be processed. In this work we combine a subsampling procedure with a multiplexing technique to overtake the limit on the information that is processed in a JTC encryption system. In the process the object is divided in subsamples and each subsample is encrypted separately. Then the encrypted subsamples are multiplexed. The encryption of the subsamples is performed in a real optical JTC encrypting system. The multiplexing and the decryption process are carried out by means of a virtual optical system. Experimental results are presented to show the validity of the proposal.

  15. Fuzzy adaptive synchronization of uncertain chaotic systems

    International Nuclear Information System (INIS)

    This Letter presents an adaptive approach for synchronization of Takagi-Sugeno (T-S) fuzzy chaotic systems. Since the parameters of chaotic system are assumed unknown, the adaptive law is derived to estimate the unknown parameters and its stability is guaranteed by Lyapunov stability theory. The control law to be designed consists of two parts: one part that can stabilize the synchronization error dynamics and the other part that estimates the unknown parameters. Numerical examples are given to demonstrate the validity of the proposed adaptive synchronization approach

  16. Generalized Synchronization of Diverse Structure Chaotic Systems

    Institute of Scientific and Technical Information of China (English)

    KADIR Abdurahman; WANG Xing-Yuan; ZHAO Yu-Zhang

    2011-01-01

    @@ Generalized synchronization between two diverse structures of chaotic systems possesses significance in the research of synchronization.We propose an approach based on the Lyapunov stability theory to study it.This method can be used widely.Numerical examples are given to demonstrate the effectiveness of this approach.%Generalized synchronization between two diverse structures of chaotic systems possesses significance in the research of synchronization. We propose an approach based on the Lyapunov stability theory to study it. This method can be used widely. Numerical examples are given to demonstrate the effectiveness of this approach.

  17. A method of improving the properties of digital chaotic system

    International Nuclear Information System (INIS)

    To weaken the degradation phenomenon of digital chaotic systems with finite computing precision, the paper brings forward a varying parameter compensation method (VPCM) on the basis of the Lyapunov number. According to the differential mean-value theorem, the proposed method employs the varying parameter and Lyapunov number to improve the properties of digital chaotic systems with finite computing precision. Results of the experiments demonstrate that: the method prolongs the cycle length greatly, the digital chaotic systems achieve ergodicity in finite precision, and the distribution of digital chaotic sequences (DCSs) approximates that of real chaotic sequences (RCSs). This method can be applied to the fields of chaotic cryptography and broad spectrum communications

  18. Several types of the chaotic mapping image encryption algorithm%几类混沌映射图像加密算法的比较

    Institute of Scientific and Technical Information of China (English)

    薛香莲

    2015-01-01

    对图像信息安全技术进行了研究,报告了现阶段图像加密的相关现状,分析了基于混沌理论的图像加密的主要方法,提出分别用一维混沌映射Logistic、二维混沌映射2DLogistic以及Chen超混沌映射对图像进行位置和值置乱来实现图像加密,并从实验仿真结果、密钥空间、密钥灵敏性、灰度直方图、置乱程度以及加密时间等方面来比较以上三种混沌理论作用于图像加密中的各自优缺点。%Studied the image information security technology,the report related to the status quo of the current image encryption,analyzed the main method of image encryption based on chaos theory,put forward respectively in one-dimensional chaotic map Logistic,2 dlogistic two-dimensional chaos mapping and hyperchaos mapping for the position and value of Chen to behave in such a way to realize image encryption, and from the experimental simulation results,the key space,key sensitivity,gray histogram,scrambling degree and the encryption time and so on to compare the above three kinds of chaos theory applied to image encryption in the respective advantages and disadvantages.

  19. A Chaotic Attractor in Delayed Memristive System

    Directory of Open Access Journals (Sweden)

    Lidan Wang

    2012-01-01

    Full Text Available Over the last three decades, theoretical design and circuitry implementation of various chaotic generators by simple electronic circuits have been a key subject of nonlinear science. In 2008, the successful development of memristor brings new activity for this research. Memristor is a new nanometre-scale passive circuit element, which possesses memory and nonlinear characteristics. This makes it have a unique charm to attract many researchers’ interests. In this paper, memristor, for the first time, is introduced in a delayed system to design a signal generator to produce chaotic behaviour. By replacing the nonlinear function with memristors in parallel, the memristor oscillator exhibits a chaotic attractor. The simulated results demonstrate that the performance is well predicted by the mathematical analysis and supports the viability of the design.

  20. Chaotic Turing pattern formation in spatiotemporal systems

    Institute of Scientific and Technical Information of China (English)

    XIAO Jing-hua; LI Hai-hong; YANG Jun-zhong; HU Gang

    2006-01-01

    The problem of Turing pattern formation has attracted much attention in nonlinear science as well as physics,chemistry and biology.So far spatially ordered Turing patterns have been observed in stationary and oscillatory media only.In this paper we find that spatially ordered Turing patterns exist in chaotic extended systems.And chaotic Turing patterns are strikingly rich and surprisingly beautiful with their space structures.These findings are in sharp contrast with the intuition of pseudo-randomness of chaos.The richness and beauty of the chaotic Turing patterns are attributed to a large variety of symmetry properties realized by various types of self-organizations of partial chaos synchronizations.

  1. Adaptive modified function projective synchronization of multiple time-delayed chaotic Rossler system

    International Nuclear Information System (INIS)

    In this Letter we consider modified function projective synchronization of unidirectionally coupled multiple time-delayed Rossler chaotic systems using adaptive controls. Recently, delay differential equations have attracted much attention in the field of nonlinear dynamics. The high complexity of the multiple time-delayed systems can provide a new architecture for enhancing message security in chaos based encryption systems. Adaptive control can be used for synchronization when the parameters of the system are unknown. Based on Lyapunov stability theory, the adaptive control law and the parameter update law are derived to make the state of two chaotic systems are function projective synchronized. Numerical simulations are presented to demonstrate the effectiveness of the proposed adaptive controllers.

  2. Controlling projective synchronization in coupled chaotic systems

    Institute of Scientific and Technical Information of China (English)

    Zou Yan-Li; Zhu Jie

    2006-01-01

    In this paper, a new method for controlling projective synchronization in coupled chaotic systems is presented.The control method is based on a partially linear decomposition and negative feedback of state errors. Firstly, the synchronizability of the proposed projective synchronization control method is proved mathematically. Then, three different representative examples are discussed to verify the correctness and effectiveness of the proposed control method.

  3. Projective synchronization of chaotic systems with bidirectional nonlinear coupling

    Indian Academy of Sciences (India)

    Mohammada Ali Khan; Swarup Poria

    2013-09-01

    This paper presents a new scheme for constructing bidirectional nonlinear coupled chaotic systems which synchronize projectively. Conditions necessary for projective synchronization (PS) of two bidirectionally coupled chaotic systems are derived using Lyapunov stability theory. The proposed PS scheme is discussed by taking as examples the so-called unified chaotic model, the Lorenz–Stenflo system and the nonautonomous chaotic Van der Pol oscillator. Numerical simulation results are presented to show the efficiency of the proposed synchronization scheme.

  4. Chaotic invasive weed optimization algorithm with application to parameter estimation of chaotic systems

    International Nuclear Information System (INIS)

    Highlights: ► A new meta-heuristic optimization algorithm. ► Integration of invasive weed optimization and chaotic search methods. ► A novel parameter identification scheme for chaotic systems. - Abstract: This paper introduces a novel hybrid optimization algorithm by taking advantage of the stochastic properties of chaotic search and the invasive weed optimization (IWO) method. In order to deal with the weaknesses associated with the conventional method, the proposed chaotic invasive weed optimization (CIWO) algorithm is presented which incorporates the capabilities of chaotic search methods. The functionality of the proposed optimization algorithm is investigated through several benchmark multi-dimensional functions. Furthermore, an identification technique for chaotic systems based on the CIWO algorithm is outlined and validated by several examples. The results established upon the proposed scheme are also supplemented which demonstrate superior performance with respect to other conventional methods.

  5. Parameter identification of time-delay chaotic system using chaotic ant swarm

    International Nuclear Information System (INIS)

    The identification problem of delay time as well as parameters of time-delay chaotic system is investigated in this paper. The identification problem is converted to that of parameter optimization by constructing suitable fitness function. A novel optimization method, called CAS (chaotic ant swarm), which simulates the chaotic behavior of single ant and the self-organization behavior of ant colony, is used to solve this optimization problem. Illustrative example demonstrates the effectiveness of the proposed method.

  6. Synchronization of the chaotic secure communication system with output state delay

    International Nuclear Information System (INIS)

    In this paper, we utilize a proper Lyapunov function and Lyapunov theorem, combined with LMIs method, in order to design a controller L, which ensures the synchronization between the transmission and the reception ends of the chaotic secure communication system with time-delay of output state. Meanwhile, for the purpose of increasing communication security, we encrypt and decrypt the original to-be-transmitted message with the techniques of n-shift cipher and public key. The result of simulation shows that the proposed method is able to synchronize the transmission and the reception ends of the system, and moreover, to recover the original message at the reception end. Therefore, the method proposed in this paper is effective and feasible to apply in the chaotic secure communication system.

  7. Synchronization of the chaotic secure communication system with output state delay

    Energy Technology Data Exchange (ETDEWEB)

    Changchien, S.-K. [Department of Electrical Engineering, Chienkuo Technology University, Changhua 500, Taiwan (China)], E-mail: ccsk@ctu.edu.tw; Huang, C.-K.; Nien, H.-H.; Shieh, H.-W. [Department of Electrical Engineering, Chienkuo Technology University, Changhua 500, Taiwan (China)

    2009-02-28

    In this paper, we utilize a proper Lyapunov function and Lyapunov theorem, combined with LMIs method, in order to design a controller L, which ensures the synchronization between the transmission and the reception ends of the chaotic secure communication system with time-delay of output state. Meanwhile, for the purpose of increasing communication security, we encrypt and decrypt the original to-be-transmitted message with the techniques of n-shift cipher and public key. The result of simulation shows that the proposed method is able to synchronize the transmission and the reception ends of the system, and moreover, to recover the original message at the reception end. Therefore, the method proposed in this paper is effective and feasible to apply in the chaotic secure communication system.

  8. Testing System Encryption-Decryption Method to RSA Security Documents

    International Nuclear Information System (INIS)

    A model of document protection which was tested as one of the instruments, especially text document. The principle of the document protection was how the system was able to protect the document storage and transfer processes. Firstly, the text-formed document was encrypted; therefore, the document cannot be read for the text was transformed into random letters. The letter-randomized text was then unfolded by the description in order that the document owner was able to read it. In the recent research, the method adopted was RSA method, in which it used complicated mathematics calculation and equipped with initial protection key (with either private key or public key), thus, it was more difficult to be attacked by hackers. The system was developed by using the software of Borland Delphi 7. The results indicated that the system was capable to save and transfer the document, both via internet and intranet in the form of encrypted letter and put it back to the initial form of document by way of description. The research also tested for encrypted and decrypted process for various memory size documents. (author)

  9. Novel implementation of memristive systems for data encryption and obfuscation

    Science.gov (United States)

    Du, Nan; Manjunath, Niveditha; Shuai, Yao; Bürger, Danilo; Skorupa, Ilona; Schüffny, René; Mayr, Christian; Basov, Dimitri N.; Di Ventra, Massimiliano; Schmidt, Oliver G.; Schmidt, Heidemarie

    2014-03-01

    With the rise of big data handling, new solutions are required to drive cryptographic algorithms for maintaining data security. Here, we exploit the nonvolatile, nonlinear resistance change in BiFeO3 memristors [Shuai et al., J. Appl. Phys. 109, 124117 (2011)] by applying a voltage for the generation of second and higher harmonics and develop a new memristor-based encoding system from it to encrypt and obfuscate data. It is found that a BiFeO3 memristor in high and low resistance state can be used to generate two clearly distinguishable sets of second and higher harmonics as recently predicted theoretically [Cohen et al., Appl. Phys. Lett. 100, 133109 (2012)]. The computed autocorrelation of encrypted data using higher harmonics generated by a BiFeO3 memristor shows that the encoded data distribute randomly.

  10. Hardware Realization of Chaos Based Symmetric Image Encryption

    KAUST Repository

    Barakat, Mohamed L.

    2012-06-01

    This thesis presents a novel work on hardware realization of symmetric image encryption utilizing chaos based continuous systems as pseudo random number generators. Digital implementation of chaotic systems results in serious degradations in the dynamics of the system. Such defects are illuminated through a new technique of generalized post proceeding with very low hardware cost. The thesis further discusses two encryption algorithms designed and implemented as a block cipher and a stream cipher. The security of both systems is thoroughly analyzed and the performance is compared with other reported systems showing a superior results. Both systems are realized on Xilinx Vetrix-4 FPGA with a hardware and throughput performance surpassing known encryption systems.

  11. Bayesian optimization for tuning chaotic systems

    Directory of Open Access Journals (Sweden)

    M. Abbas

    2014-08-01

    Full Text Available In this work, we consider the Bayesian optimization (BO approach for tuning parameters of complex chaotic systems. Such problems arise, for instance, in tuning the sub-grid scale parameterizations in weather and climate models. For such problems, the tuning procedure is generally based on a performance metric which measures how well the tuned model fits the data. This tuning is often a computationally expensive task. We show that BO, as a tool for finding the extrema of computationally expensive objective functions, is suitable for such tuning tasks. In the experiments, we consider tuning parameters of two systems: a simplified atmospheric model and a low-dimensional chaotic system. We show that BO is able to tune parameters of both the systems with a low number of objective function evaluations and without the need of any gradient information.

  12. Estimating parameters of chaotic systems under noise-induced synchronization

    International Nuclear Information System (INIS)

    Kim et al. introduced in 2002 [Kim CM, Rim S, Kye WH. Sequential synchronization of chaotic systems with an application to communication. Phys Rev Lett 2002;88:014103] a hierarchically structured communication scheme based on sequential synchronization, a modification of noise-induced synchronization (NIS). We propose in this paper an approach that can estimate the parameters of chaotic systems under NIS. In this approach, a dimensionally-expanded parameter estimating system is first constructed according to the original chaotic system. By feeding chaotic transmitted signal and external driving signal, the parameter estimating system can be synchronized with the original chaotic system. Consequently, parameters would be estimated. Numerical simulation shows that this approach can estimate all the parameters of chaotic systems under two feeding modes, which implies the potential weakness of the chaotic communication scheme under NIS or sequential synchronization.

  13. Estimating parameters of chaotic systems under noise-induced synchronization

    Energy Technology Data Exchange (ETDEWEB)

    Wu Xiaogang [Institute of PR and AI, Huazhong University of Science and Technology, Wuhan 430074 (China)], E-mail: seanwoo@mail.hust.edu.cn; Wang Zuxi [Institute of PR and AI, Huazhong University of Science and Technology, Wuhan 430074 (China)

    2009-01-30

    Kim et al. introduced in 2002 [Kim CM, Rim S, Kye WH. Sequential synchronization of chaotic systems with an application to communication. Phys Rev Lett 2002;88:014103] a hierarchically structured communication scheme based on sequential synchronization, a modification of noise-induced synchronization (NIS). We propose in this paper an approach that can estimate the parameters of chaotic systems under NIS. In this approach, a dimensionally-expanded parameter estimating system is first constructed according to the original chaotic system. By feeding chaotic transmitted signal and external driving signal, the parameter estimating system can be synchronized with the original chaotic system. Consequently, parameters would be estimated. Numerical simulation shows that this approach can estimate all the parameters of chaotic systems under two feeding modes, which implies the potential weakness of the chaotic communication scheme under NIS or sequential synchronization.

  14. Frequency-Locking in Coupled Chaotic Systems

    Institute of Scientific and Technical Information of China (English)

    HU Bam-Bi; LIU Zong-Hua; ZHENG Zhi-Gang

    2001-01-01

    A novel approach is presented for measuring the phase synchronization (frequency-locking) of coupled N nonidentical oscillators, which can characterize frequency-locking for chaotic systems without well-defined phase by measuring the mean frequency. Numerical simulations confirm the existence of frequency-locking. The relations between the mean frequency and the coupling strength and the frequency mismatch are given. For the coupled hyperchaotic systems, the frequency-locking can be better characterized by more than one mean frequency curves.

  15. Symplectic synchronization of different chaotic systems

    International Nuclear Information System (INIS)

    In this paper, a new symplectic synchronization of chaotic systems is studied. Traditional generalized synchronizations are special cases of the symplectic synchronization. A sufficient condition is given for the asymptotical stability of the null solution of an error dynamics. The symplectic synchronization may be applied to the design of secure communication. Finally, numerical results are studied for a Quantum-CNN oscillators synchronized with a Roessler system in three different cases.

  16. NEW SYMMETRIC ENCRYPTION SYSTEM BASED ON EVOLUTIONARY ALGORITHM

    Directory of Open Access Journals (Sweden)

    A. Mouloudi

    2015-12-01

    Full Text Available In this article, we present a new symmetric encryption system which is a combination of our ciphering evolutionary system SEC [1] and a new ciphering method called “fragmentation”. This latter allows the alteration of the appearance frequencies of characters from a given text. Our system has at its disposed two keys, the first one is generated by the evolutionary algorithm, the second one is generated after “fragmentation” part. Both of them are symmetric, session keys and strengthening the security of our system.

  17. Entanglement production in quantized chaotic systems

    Indian Academy of Sciences (India)

    Jayendra N Bandyopadhyay; Arul Lakshminarayan

    2005-04-01

    Quantum chaos is a subject whose major goal is to identify and to investigate different quantum signatures of classical chaos. Here we study entanglement production in coupled chaotic systems as a possible quantum indicator of classical chaos. We use coupled kicked tops as a model for our extensive numerical studies. We find that, in general, chaos in the system produces more entanglement. However, coupling strength between two subsystems is also a very important parameter for entanglement production. Here we show how chaos can lead to large entanglement which is universal and describable by random matrix theory (RMT). We also explain entanglement production in coupled strongly chaotic systems by deriving a formula based on RMT. This formula is valid for arbitrary coupling strengths, as well as for sufficiently long time. Here we investigate also the effect of chaos on the entanglement production for the mixed initial state. We find that many properties of the mixed-state entanglement production are qualitatively similar to the pure state entanglement production. We however still lack an analytical understanding of the mixed-state entanglement production in chaotic systems.

  18. ON IMAGE ENCRYPTION ALGORITHM BASED ON DISCRETE FOURIER TRANSFORMATION INTEGRATING WITH DOUBLING CHAOTIC MAP%基于离散傅里叶变换融合双混沌映射的图像加密算法研究

    Institute of Scientific and Technical Information of China (English)

    芮坤坤

    2014-01-01

    频域加密非常适用于大多数数字和光学图像处理体系,而空间域加密则适用于图像通信。为了充分利用在图像频率域和空间域加密的优势,进一步提高图像加密系统的安全性,提出基于离散的傅里叶变换和双混沌映射的图像加密算法,同时对图像的频率域和空间域进行加密。首先,利用二维离散的傅里叶变换将图像从空间域转换成频率域,并用改进的分段Tent映射分别对幅值和位相进行置乱处理;其次,将置乱后图像频率域进行傅里叶逆变换,转换成空间域,获得置乱加密图像;最后,利用改进的Ber-noulli移位映射对置乱加密图像进行扩散处理。在MATLAB仿真平台上,实验结果表明:该算法高度安全,密钥空间大,有较强的密钥敏感性能,有效地提高了抵御选择明文攻击的能力。%Frequency domain encryption very fits most of digital and optical image processing systems,while spatial domain encryption is applicable for image communications.In order to make full use of image encryption advantages in both frequency domain and spatial domain and further improve the security of image encryption system,we propose an image encryption algorithm which is based on discrete Fourier transformation and doubling chaotic map to encrypt frequency and spatial domains of image simultaneously.Firstly,the two-dimensional discrete Fourier transformation is committed to convert the image from the spatial domain to frequency domain,and the improved subsection Tent map is used to scramble the amplitude and phase of the frequency domain respectively;Secondly,the frequency domain of scrambled image is transformed into spatial domain with Fourier inverse transformation to get scrambling encryption image;Finally,the improved Bernoulli displacement map is applied to the scrambling encryption image for diffusion processing.The proposed algorithm is tested on MATLAB simulation platform

  19. Resonance eigenfunctions in chaotic scattering systems

    Indian Academy of Sciences (India)

    Martin Sieber

    2009-09-01

    We study the semiclassical structure of resonance eigenstates of open chaotic systems. We obtain semiclassical estimates for the weight of these states on different regions in phase space. These results imply that the long-lived right (left) eigenstates of the non-unitary propagator are concentrated in the semiclassical limit ħ → 0 on the backward (forward) trapped set of the classical dynamics. On this support the eigenstates display a self-similar behaviour which depends on the limiting decay rate.

  20. Control of chaotic transport in Hamiltonian systems

    OpenAIRE

    Ciraolo, Guido; Chandre, Cristel; Lima, Ricardo; Vittot, Michel; Pettini, Marco; Figarella, Charles; Ghendrih, Philippe

    2003-01-01

    It is shown that a relevant control of Hamiltonian chaos is possible through suitable small perturbations whose form can be explicitly computed. In particular, it is possible to control (reduce) the chaotic diffusion in the phase space of a Hamiltonian system with 1.5 degrees of freedom which models the diffusion of charged test particles in a ``turbulent'' electric field across the confining magnetic field in controlled thermonuclear fusion devices. Though still far from practical applicatio...

  1. A novel image encryption scheme based on spatial chaos map

    Energy Technology Data Exchange (ETDEWEB)

    Sun Fuyan [College of Control Science and Engineering, Shandong University, Jinan 250061 (China)], E-mail: fuyan.sun@gmail.com; Liu Shutang [College of Control Science and Engineering, Shandong University, Jinan 250061 (China); Li Zhongqin [HeiLongJiang Institute of Science and Technology, Harbin 150027 (China); Lue Zongwang [Information and Communication College, Guilin University of Electronic and Technology, Guilin 541004 (China); Corporate Engineering Department, Johnson Electric Co. Ltd., Shenzhen 518125 (China)

    2008-11-15

    In recent years, the chaos-based cryptographic algorithms have suggested some new and efficient ways to develop secure image encryption techniques, but the drawbacks of small key space and weak security in one-dimensional chaotic cryptosystems are obvious. In this paper, spatial chaos system are used for high degree security image encryption while its speed is acceptable. The proposed algorithm is described in detail. The basic idea is to encrypt the image in space with spatial chaos map pixel by pixel, and then the pixels are confused in multiple directions of space. Using this method one cycle, the image becomes indistinguishable in space due to inherent properties of spatial chaotic systems. Several experimental results, key sensitivity tests, key space analysis, and statistical analysis show that the approach for image cryptosystems provides an efficient and secure way for real time image encryption and transmission from the cryptographic viewpoint.

  2. A novel image encryption scheme based on spatial chaos map

    International Nuclear Information System (INIS)

    In recent years, the chaos-based cryptographic algorithms have suggested some new and efficient ways to develop secure image encryption techniques, but the drawbacks of small key space and weak security in one-dimensional chaotic cryptosystems are obvious. In this paper, spatial chaos system are used for high degree security image encryption while its speed is acceptable. The proposed algorithm is described in detail. The basic idea is to encrypt the image in space with spatial chaos map pixel by pixel, and then the pixels are confused in multiple directions of space. Using this method one cycle, the image becomes indistinguishable in space due to inherent properties of spatial chaotic systems. Several experimental results, key sensitivity tests, key space analysis, and statistical analysis show that the approach for image cryptosystems provides an efficient and secure way for real time image encryption and transmission from the cryptographic viewpoint

  3. Chaotic attractor transforming control of hybrid Lorenz-Chen system

    Institute of Scientific and Technical Information of China (English)

    Qi Dong-Lian; Wang Qiao; Gu Hong

    2008-01-01

    Based on passive theory, this paper studies a hybrid chaotic dynamical system from the mathematics perspective to implement the control of system stabilization.According to the Jacobian matrix of the nonlinear system, the stabilization control region is gotten.The controller is designed to stabilize fast the minimum phase Lorenz-Chen chaotic system after equivalently transforming from chaotic system to passive system. The simulation results show that the system not only can be controlled at the different equilibria, but also can be transformed between the different chaotic attractors.

  4. Color Digital Image Encryption Using Wavelet Transform and Chaotic Sequence%彩色数字图像的小波变换和混沌序列加密

    Institute of Scientific and Technical Information of China (English)

    张定会; 许赛赛; 余日; 张建伟

    2011-01-01

    根据彩色数字图像的基本特点,运用数字图像加密和解密原理,将离散小波变换和离散混沌序列有机地结合起来,研究了彩色数字图像的小波变换和混沌序列的加密和解密方法;对原始图像进行加密实质是利用混沌序列对其低频小波系数进行加密,对加密图像进行解密实质是利用混沌序列对其低频小波系数进行解密}研究的彩色数字图像加解密方法,为彩色数字图像加密提供了一种有效可行的方法,不仅能够使加密彩色数字图像具有理想的加密效果,而且能够保证加密彩色数字图像足够的安全.%According to the basic characteristic of color digital image, using the encrypting and decrypting theorem of digital image, organically combining discrete wavelet transform with discrete chaotic sequence, the encryption and decryption of color digital image based on wavelet transform and chaotic sequence has been studied. The encryption of original images is to use chaotic sequences to encrypt its low frequency wavelet coefficients. The decryption of encrypted images is to use chaotic sequences to decrypt its low frequency wavelet coefficients. The encryption and decryption of color digital image studied by this paper provides an effective and feasibJe method for color digital image encryption, and not only can make the encrypted color digital image have perfect encryption effect, but also can ensure its sufficient security.

  5. An Optical Encryption and Decryption Method and System

    DEFF Research Database (Denmark)

    2000-01-01

    The invention relates to securing of information utilising optical imaging technologies and more specifically to phase encryption and decryption of images. An image is encrypted into a mask having a plurality of mask resolution elements (Xm, Ym) by encoding the image using e.g. a phase mask with an...... encoded phase value phi (Xm, Ym) and an encoded amplitude value a (Xm, Ym), and by further encrypting the mask (using e.g. a spatial light modulator) by addition of an encrypting phase value phi c (Xm, Ym) to the encoded phase value phi (Xm, Ym) and by multiplication of an encrypting amplitude value ac...

  6. Random digital encryption secure communication system

    Science.gov (United States)

    Doland, G. D. (Inventor)

    1982-01-01

    The design of a secure communication system is described. A product code, formed from two pseudorandom sequences of digital bits, is used to encipher or scramble data prior to transmission. The two pseudorandom sequences are periodically changed at intervals before they have had time to repeat. One of the two sequences is transmitted continuously with the scrambled data for synchronization. In the receiver portion of the system, the incoming signal is compared with one of two locally generated pseudorandom sequences until correspondence between the sequences is obtained. At this time, the two locally generated sequences are formed into a product code which deciphers the data from the incoming signal. Provision is made to ensure synchronization of the transmitting and receiving portions of the system.

  7. Targeting engineering synchronization in chaotic systems

    Science.gov (United States)

    Bhowmick, Sourav K.; Ghosh, Dibakar

    2016-07-01

    A method of targeting engineering synchronization states in two identical and mismatch chaotic systems is explained in detail. The method is proposed using linear feedback controller coupling for engineering synchronization such as mixed synchronization, linear and nonlinear generalized synchronization and targeting fixed point. The general form of coupling design to target any desire synchronization state under unidirectional coupling with the help of Lyapunov function stability theory is derived analytically. A scaling factor is introduced in the coupling definition to smooth control without any loss of synchrony. Numerical results are done on two mismatch Lorenz systems and two identical Sprott oscillators.

  8. ON FEEDBACK CONTROL OF DELAYED CHAOTIC SYSTEM

    Institute of Scientific and Technical Information of China (English)

    李丽香; 彭海朋; 卢辉斌; 关新平

    2001-01-01

    In this paper two different types of feedback control technique are discussed: the standard feedback control and the time-delay feedback control which have been successfully used in many control systems. In order to understand to what extent the two different types of control technique are useful in delayed chaotic systems, some analytic stabilization conditions for chaos control from the two types of control technique are derived based on Lyapunov stabilization arguments. Similarly, we discuss the tracking problem by applying the time-delay feedback control. Finally, numerical examples are provided.

  9. Artificial Cooperative Search algorithm for parameter identification of chaotic systems

    OpenAIRE

    Turgut, Oguz Emrah; Turgut, Mert Sinan; Çoban, Mustafa Turhan

    2015-01-01

     Parameter estimation of chaotic systems is a challenging and critical topic in nonlinear science. Problem at hand is multi-dimensional and highly nonlinear thereof conventional optimization methods generally fail to extract the unknown parameters of chaotic system. In this study, Artificial Cooperative Search algorithm is put into practice for successful parameter estimation of chaotic systems and compared the parameter estimation performance of Artificial Cooperative Search with Bat, Artifi...

  10. Channel coding and modulation based on chaotic systems

    OpenAIRE

    Kozic, Slobodan; Hasler, Martin

    2007-01-01

    In this thesis, a new class of codes on graphs based on chaotic dynamical systems are proposed. In particular, trellis coded modulation and iteratively decodable codes on graphs are studied. The codes are designed by controlling symbolic dynamics of chaotic systems and using linear convolutional codes. The relation between symbolic dynamics of chaotic systems and trellis aspects to minimum distance properties of coded modulations is explained. Our arguments are supported by computer simulatio...

  11. Efficient methodology for implementation of Encrypted File System in User Space

    CERN Document Server

    Kumar, Dr Shishir; Jasra, Sameer Kumar; Jain, Akshay Kumar

    2009-01-01

    The Encrypted File System (EFS) pushes encryption services into the file system itself. EFS supports secure storage at the system level through a standard UNIX file system interface to encrypted files. User can associate a cryptographic key with the directories they wish to protect. Files in these directories (as well as their pathname components) are transparently encrypted and decrypted with the specified key without further user intervention; clear text is never stored on a disk or sent to a remote file server. EFS can use any available file system for its underlying storage without modifications, including remote file servers such as NFS. System management functions, such as file backup, work in a normal manner and without knowledge of the key. Performance is an important factor to users since encryption can be time consuming. This paper describes the design and implementation of EFS in user space using faster cryptographic algorithms on UNIX Operating system. Implementing EFS in user space makes it porta...

  12. Projective Synchronization in Time-Delayed Chaotic Systems

    Institute of Scientific and Technical Information of China (English)

    FENG Cun-Fang; ZHANG Yan; WANG Ying-Hai

    2006-01-01

    For the first time, we report on projective synchronization between two time delay chaotic systems with single time delays. It overcomes some limitations of the previous wort, where projective synchronization has been investigated only in finite-dimensional chaotic systems, so we can achieve projective synchronization in infinite-dimensional chaotic systems. We give a general method with which we can achieve projective synchronization in time-delayed chaotic systems. The method is illustrated using the famous delay-differential equations related to optical bistability. Numerical simulations fully support the analytical approach.

  13. Chaotic Synchronization of the Master Slave Chaotic Systems with Different Structures Based on BANG-BANG Control Principle

    Institute of Scientific and Technical Information of China (English)

    WANG Jian-Gen; ZHAO Yi

    2005-01-01

    @@ We propose a Bang-Bang control scheme that can synchronize master-slave chaotic systems. The chaotic systems considered here are structurally different from each other. Different from some control strategies reported previously, the scheme proposed here can be taken as a generalone that is independent of the chaotic system itself.

  14. Stochastic resonance in deterministic chaotic systems

    International Nuclear Information System (INIS)

    We propose a mechanism which produces periodic variations of the degree of predictability in dynamical systems. It is shown that even in the absence of noise when the control parameter changes periodically in time, below and above the threshold for the onset of chaos, stochastic resonance effects appear. As a result one has an alternation of chaotic and regular, i.e. predictable, evolutions in an almost periodic way, so that the Lyapunov exponent is positive but some time correlations do not decay. (author)

  15. Control of chaotic transport in Hamiltonian systems

    International Nuclear Information System (INIS)

    It is shown that a relevant control of Hamiltonian chaos is possible through suitable small perturbations whose form can be explicitly computed. In particular, it is possible to control (reduce) the chaotic diffusion in the phase space of a Hamiltonian system with 1.5 degrees of freedom which models the diffusion of charged test particles in a 'turbulent' electric field across the confining magnetic field in controlled thermonuclear fusion devices. Though still far from practical applications, this result suggests that some strategy to control turbulent transport in magnetized plasmas, in particular tokamaks, is conceivable. (author)

  16. Phase synchronization of coupled chaotic multiple time scales systems

    International Nuclear Information System (INIS)

    The brushless dc motor (BLDCM) with multi-time scales is an electric machine. By coupled BLDCM, it is discovered that chaotic routes of the uncoupled systems influence synchronous result of coupled identical and nonidentical chaotic systems. Another multi-time scales form, Hindmarsh-Rose (HR) neurons, when the chaotic parameter is selected only in the range of the period-doubling route to chaos, phase synchronization can be predicted via Laypunov exponent. Finally, Laypunov exponent however cannot be used as a criterion for phase synchronization of coupled chaotic systems with either single or multi-time scales in our study

  17. Encryption and validation of multiple signals for optical identification systems

    International Nuclear Information System (INIS)

    Multifactor encryption-authentication technique reinforces optical security by allowing the simultaneous A N D-verification of more than one primary image. Instead of basing the identification on a unique signature or piece of information, our goal is to authenticate a given person, object, vehicle by the simultaneous recognition of several factors. Some of them are intrinsic to the person and object or vehicle under control. Other factors, act as keys of the authentication step. Such a system is proposed for situations such as the access control to restricted areas, where the demand of security is high. The multifactor identification method involves double random-phase encoding, fully phase-based encryption and a combined nonlinear joint transform correlator and a classical 4f-correlator for simultaneous recognition and authentication of multiple images. The encoded signal fulfils the general requirements of invisible content, extreme difficulty in counterfeiting and real-time automatic verification. Four reference double-phase encoded images are compared with the retrieved input images obtained in situ from the person or the vehicle whose authentication is wanted and from a database. A recognition step based on the correlation between the signatures and the stored references determines the authentication or rejection of the person and object under surveillance

  18. Modified Projective Synchronization between Different Fractional-Order Systems Based on Open-Plus-Closed-Loop Control and Its Application in Image Encryption

    Directory of Open Access Journals (Sweden)

    Hongjuan Liu

    2014-01-01

    Full Text Available A new general and systematic coupling scheme is developed to achieve the modified projective synchronization (MPS of different fractional-order systems under parameter mismatch via the Open-Plus-Closed-Loop (OPCL control. Based on the stability theorem of linear fractional-order systems, some sufficient conditions for MPS are proposed. Two groups of numerical simulations on the incommensurate fraction-order system and commensurate fraction-order system are presented to justify the theoretical analysis. Due to the unpredictability of the scale factors and the use of fractional-order systems, the chaotic data from the MPS is selected to encrypt a plain image to obtain higher security. Simulation results show that our method is efficient with a large key space, high sensitivity to encryption keys, resistance to attack of differential attacks, and statistical analysis.

  19. Linear generalized synchronization of continuous-time chaotic systems

    International Nuclear Information System (INIS)

    This paper develops a general approach for constructing a response system to implement linear generalized synchronization (GS) with the drive continuous-time chaotic system. Some sufficient conditions of global asymptotic linear GS between the drive and response continuous-time chaotic systems are attained from rigorously modern control theory. Finally, we take Chua's circuit as an example for illustration and verification

  20. Linear generalized synchronization of continuous-time chaotic systems

    CERN Document Server

    Lu Jun

    2003-01-01

    This paper develops a general approach for constructing a response system to implement linear generalized synchronization (GS) with the drive continuous-time chaotic system. Some sufficient conditions of global asymptotic linear GS between the drive and response continuous-time chaotic systems are attained from rigorously modern control theory. Finally, we take Chua's circuit as an example for illustration and verification.

  1. Synchronization of bidirectionally coupled chaotic Chen's system with delay

    International Nuclear Information System (INIS)

    This paper presents synchronization scheme for time-delayed linearly bidirectionally coupled chaotic Chen's system. The method is based on linear stability analysis of hyperbolic fixed point. Here we derive a generic condition of global chaos synchronization for time-delayed chaotic Chen's system with linearly bidirectional coupling. The behavior of the system with and without coupling are demonstrated by numerical simulation.

  2. Adaptive Synchronization of Memristor-based Chaotic Neural Systems

    Directory of Open Access Journals (Sweden)

    Xiaofang Hu

    2014-11-01

    Full Text Available Chaotic neural networks consisting of a great number of chaotic neurons are able to reproduce the rich dynamics observed in biological nervous systems. In recent years, the memristor has attracted much interest in the efficient implementation of artificial synapses and neurons. This work addresses adaptive synchronization of a class of memristor-based neural chaotic systems using a novel adaptive backstepping approach. A systematic design procedure is presented. Simulation results have demonstrated the effectiveness of the proposed adaptive synchronization method and its potential in practical application of memristive chaotic oscillators in secure communication.

  3. Transmission of Information with Chaotic Signals

    Science.gov (United States)

    Argüelles, A.; Estrada, H.

    2003-08-01

    We present a numerical simulation for a transmission of information by applying the synchronization phenomenon[1] of two identical chaotic Lorenz's systems. This system offers the possibility to encrypt information [2]. The numerical method yields to an excellent recovering of voice signals. We also analyze the effect over the recovered signal due to relative variations of the system value of the parameters.

  4. On closure parameter estimation in chaotic systems

    Directory of Open Access Journals (Sweden)

    J. Hakkarainen

    2012-02-01

    Full Text Available Many dynamical models, such as numerical weather prediction and climate models, contain so called closure parameters. These parameters usually appear in physical parameterizations of sub-grid scale processes, and they act as "tuning handles" of the models. Currently, the values of these parameters are specified mostly manually, but the increasing complexity of the models calls for more algorithmic ways to perform the tuning. Traditionally, parameters of dynamical systems are estimated by directly comparing the model simulations to observed data using, for instance, a least squares approach. However, if the models are chaotic, the classical approach can be ineffective, since small errors in the initial conditions can lead to large, unpredictable deviations from the observations. In this paper, we study numerical methods available for estimating closure parameters in chaotic models. We discuss three techniques: off-line likelihood calculations using filtering methods, the state augmentation method, and the approach that utilizes summary statistics from long model simulations. The properties of the methods are studied using a modified version of the Lorenz 95 system, where the effect of fast variables are described using a simple parameterization.

  5. Digital signal transmission with cascaded heterogeneous chaotic systems

    Science.gov (United States)

    Murali, K.

    2001-01-01

    A new chaos based secure communication scheme is proposed to transmit digital signals by combining the concepts of chaotic-switching and chaotic-modulation approaches. In this scheme two heterogeneous chaotic circuits are used both at the transmitter and receiver modules. First a binary message signal is scrambled by two chaotic attractors produced by a set of chaotic systems (No. 1) of the drive module. The so produced small amplitude scrambled chaotic signal is further directly injected or modulated by different chaotic system (No. 2) within the drive module. Then the chaotic signal generated by this second chaotic system No. 2 is transmitted to the response module through the channel. An appropriate feedback loop is constructed in the response module to achieve synchronization among the variables of the drive and response modules and the binary information signal is recovered by using the synchronization error followed by low-pass filtering and thresholding. Simulation results are reported in which the quality of the recovered signal is higher and the encoding of the information signal is potentially secure. The effect of perturbing factors like channel noise and nonidentity of parameters are also considered.

  6. Chaotic Image Scrambling Algorithm Based on S-DES

    Energy Technology Data Exchange (ETDEWEB)

    Yu, X Y [College of Measurement-Control Tech and Communications Engineering, Harbin University of Science and Technology, Harbin, 150080 (China); Zhang, J [College of Measurement-Control Tech and Communications Engineering, Harbin University of Science and Technology, Harbin, 150080 (China); Ren, H E [Information and Computer Engineering College, Northeast Forestry University, Harbin, 150000 (China); Xu, G S [College of Measurement-Control Tech and Communications Engineering, Harbin University of Science and Technology, Harbin, 150080 (China); Luo, X Y [College of Measurement-Control Tech and Communications Engineering, Harbin University of Science and Technology, Harbin, 150080 (China)

    2006-10-15

    With the security requirement improvement of the image on the network, some typical image encryption methods can't meet the demands of encryption, such as Arnold cat map and Hilbert transformation. S-DES system can encrypt the input binary flow of image, but the fixed system structure and few keys will still bring some risks. However, the sensitivity of initial value that Logistic chaotic map can be well applied to the system of S-DES, which makes S-DES have larger random and key quantities. A dual image encryption algorithm based on S-DES and Logistic map is proposed. Through Matlab simulation experiments, the key quantities will attain 10{sup 17} and the encryption speed of one image doesn't exceed one second. Compared to traditional methods, it has some merits such as easy to understand, rapid encryption speed, large keys and sensitivity to initial value.

  7. Wigner function statistics in classically chaotic systems

    International Nuclear Information System (INIS)

    We have studied statistical properties of the values of the Wigner function W(x) of 1D quantum maps on compact 2D phase space of finite area V. For this purpose we have defined a Wigner function probability distribution P(w) = (1/V) ∫ δ(w - W(x))dx, which has, by definition, fixed first and second moments. In particular, we concentrate on relaxation of time-evolving quantum states in terms of W(x), starting from a coherent state. We have shown that for a classically chaotic quantum counterpart the distribution P(w) in the semiclassical limit becomes a Gaussian distribution that is fully determined by the first two moments. Numerical simulations have been performed for the quantum sawtooth map and the quantized kicked top. In a quantum system with Hilbert space dimension N(∼1/h-bar ) the transition of P(w) to a Gaussian distribution was observed at times t ∝ log N. In addition, it has been shown that the statistics of Wigner functions of propagator eigenstates is Gaussian as well in the classically fully chaotic regime. We have also studied the structure of the nodal cells of the Wigner function, in particular the distribution of intersection points between the zero manifold and arbitrary straight lines

  8. Adaptive tracking control for a class of uncertain chaotic systems

    Institute of Scientific and Technical Information of China (English)

    Chen Feng-Xiang; Wang Wei; Zhang Wei-Dong

    2007-01-01

    The paper is concerned with adaptive tracking problem for a class of chaotic system with time-varying uncertainty,but bounded by norm polynomial. Based on adaptive technique, it proposes a novel controller to asymptotically track the arbitrary desired bounded trajectory. Simulation on the Rossler chaotic system is performed and the result verifies the effectiveness of the proposed method.

  9. Impulsive Control for Fractional-Order Chaotic Systems

    Institute of Scientific and Technical Information of China (English)

    ZHONG Qi-Shui; BAO Jing-Fu; YU Yong-Bin; LIAO Xiao-Feng

    2008-01-01

    @@ We propose an impulsive control scheme for fractional-order chaotic systems. Based on the Takagi-Sugeno (T-S) fuzzy model and linear matrix inequalities (LMIs), some sufficient conditions are given to stabilize the fractional-order chaotic system via impulsive control. Numerical simulation shows the effectiveness of this approach.

  10. Chaotic Disintegration of the Inner Solar System

    CERN Document Server

    Batygin, Konstantin; Holman, Mathew J

    2014-01-01

    On timescales that greatly exceed an orbital period, typical planetary orbits evolve in a stochastic yet stable fashion. On even longer timescales, however, planetary orbits can spontaneously transition from bounded to unbound chaotic states. Large-scale instabilities associated with such behavior appear to play a dominant role in shaping the architectures of planetary systems, including our own. Here we show how such transitions are possible, focusing on the specific case of the long-term evolution of Mercury. We develop a simple analytical model for Mercury's dynamics and elucidate the origins of its short term stochastic behavior as well as of its sudden progression to unbounded chaos. Our model allows us to estimate the timescale on which this transition is likely to be triggered, i.e. the dynamical lifetime of the Solar System as we know it. The formulated theory is consistent with the results of numerical simulations and is broadly applicable to extrasolar planetary systems dominated by secular interact...

  11. Chaotic Behavior in a Switched Dynamical System

    Directory of Open Access Journals (Sweden)

    Hassane Bouzahir

    2008-05-01

    Full Text Available We present a numerical study of an example of piecewise linear systems that constitute a class of hybrid systems. Precisely, we study the chaotic dynamics of the voltage-mode controlled buck converter circuit in an open loop. By considering the voltage input as a bifurcation parameter, we observe that the obtained simulations show that the buck converter is prone to have subharmonic behavior and chaos. We also present the corresponding bifurcation diagram. Our modeling techniques are based on the new French native modeler and simulator for hybrid systems called Scicos (Scilab connected object simulator which is a Scilab (scientific laboratory package. The followed approach takes into account the hybrid nature of the circuit.

  12. CONVERTIBLE DRM SYSTEM BASED ON IDENTITY-BASED ENCRYPTION

    Directory of Open Access Journals (Sweden)

    Chou-Chen Yang

    2009-10-01

    Full Text Available With the rapid growth of the Internet, acquiring digital contents over the Internet has becomecommonplace. Most traditional items can be translated into digital form. That is to say the digitalcontents can be distributed easily and rapidly to users over the Internet. Unfortunately, situations ofpiracy are common and become more serious, since the digital contents can be copied and distributedeasily through Internet. Thus, Digital Rights Management (DRM is a popular tool used to protect digitalcontents with cryptographic technology. But there are many different DRM encryption formats that areadopted by different content providers, causing consumers can’t play their contents on devices withdifferent DRM format even though they bought it legally. In this paper, we employ identity-basedencryption to allow a conversion between different DRM systems. Through the conversion process, thedigital content can be used at different DRM systems and hold the legitimate use of the right.

  13. Nonlinear Dynamics, Chaotic and Complex Systems

    Science.gov (United States)

    Infeld, E.; Zelazny, R.; Galkowski, A.

    2011-04-01

    Part I. Dynamic Systems Bifurcation Theory and Chaos: 1. Chaos in random dynamical systems V. M. Gunldach; 2. Controlling chaos using embedded unstable periodic orbits: the problem of optimal periodic orbits B. R. Hunt and E. Ott; 3. Chaotic tracer dynamics in open hydrodynamical flows G. Karolyi, A. Pentek, T. Tel and Z. Toroczkai; 4. Homoclinic chaos L. P. Shilnikov; Part II. Spatially Extended Systems: 5. Hydrodynamics of relativistic probability flows I. Bialynicki-Birula; 6. Waves in ionic reaction-diffusion-migration systems P. Hasal, V. Nevoral, I. Schreiber, H. Sevcikova, D. Snita, and M. Marek; 7. Anomalous scaling in turbulence: a field theoretical approach V. Lvov and I. Procaccia; 8. Abelian sandpile cellular automata M. Markosova; 9. Transport in an incompletely chaotic magnetic field F. Spineanu; Part III. Dynamical Chaos Quantum Physics and Foundations Of Statistical Mechanics: 10. Non-equilibrium statistical mechanics and ergodic theory L. A. Bunimovich; 11. Pseudochaos in statistical physics B. Chirikov; 12. Foundations of non-equilibrium statistical mechanics J. P. Dougherty; 13. Thermomechanical particle simulations W. G. Hoover, H. A. Posch, C. H. Dellago, O. Kum, C. G. Hoover, A. J. De Groot and B. L. Holian; 14. Quantum dynamics on a Markov background and irreversibility B. Pavlov; 15. Time chaos and the laws of nature I. Prigogine and D. J. Driebe; 16. Evolutionary Q and cognitive systems: dynamic entropies and predictability of evolutionary processes W. Ebeling; 17. Spatiotemporal chaos information processing in neural networks H. Szu; 18. Phase transitions and learning in neural networks C. Van den Broeck; 19. Synthesis of chaos A. Vanecek and S. Celikovsky; 20. Computational complexity of continuous problems H. Wozniakowski; Part IV. Complex Systems As An Interface Between Natural Sciences and Environmental Social and Economic Sciences: 21. Stochastic differential geometry in finance studies V. G. Makhankov; Part V. Conference Banquet

  14. A Modified Location-Dependent Image Encryption for Mobile Information System

    Directory of Open Access Journals (Sweden)

    Prasad Reddy.P.V.G.D

    2010-05-01

    Full Text Available The wide spread use of WLAN (Wireless LAN and the popularity of mobile devices increases the frequency of data transmission among mobile users. In such scenario, a need for Secure Communication arises. Secure communication is possible through encryption of data. A lot of encryption techniques have evolved over time. However, most of the data encryption techniques are location-independent. Data encrypted with such techniques can be decrypted anywhere. The encryption technology cannot restrict the location of data decryption. GPS-based encryption (or geoencryption is an innovative technique that uses GPS-technology to encode location information into the encryption keys to provide location based security. In this paper a location-dependent approach is proposed for mobile information system. The mobile client transmits a target latitude/longitude coordinate and an LDEA key is obtained for data encryption to information server. The client can only decrypt the ciphertext when the coordinate acquired form GPS receiver matches with the target coordinate. For improved security, a random key (R-key is incorporated in addition to the LDEA key. The proposed method is applied for images.

  15. Active control technique of fractional-order chaotic complex systems

    Science.gov (United States)

    Mahmoud, Gamal M.; Ahmed, Mansour E.; Abed-Elhameed, Tarek M.

    2016-06-01

    Several kinds of synchronization of fractional-order chaotic complex systems are challenging research topics of current interest since they appear in many applications in applied sciences. Our main goal in this paper is to introduce the definition of modified projective combination-combination synchronization (MPCCS) of some fractional-order chaotic complex systems. We show that our systems are chaotic by calculating their Lyapunov exponents. The fractional Lyapunov dimension of the chaotic solutions of these systems is computed. A scheme is introduced to calculate MPCCS of four different (or identical) chaotic complex systems using the active control technique. Special cases of this type, which are projective and anti C-C synchronization, are discussed. Some figures are plotted to show that MPCCS is achieved and its errors approach zero.

  16. Chaotic Diffusion in the Gliese-876 Planetary System

    CERN Document Server

    Martí, J G; Beaugé, C

    2016-01-01

    Chaotic diffusion is supposed to be responsible for orbital instabilities in planetary systems after the dissipation of the protoplanetary disk, and a natural consequence of irregular motion. In this paper we show that resonant multi-planetary systems, despite being highly chaotic, not necessarily exhibit significant diffusion in phase space, and may still survive virtually unchanged over timescales comparable to their age.Using the GJ-876 system as an example, we analyze the chaotic diffusion of the outermost (and less massive) planet. We construct a set of stability maps in the surrounding regions of the Laplace resonance. We numerically integrate ensembles of close initial conditions, compute Poincar\\'e maps and estimate the chaotic diffusion present in this system. Our results show that, the Laplace resonance contains two different regions: an inner domain characterized by low chaoticity and slow diffusion, and an outer one displaying larger values of dynamical indicators. In the outer resonant domain, th...

  17. Mutual stabilization of chaotic systems through entangled cupolets

    Science.gov (United States)

    Morena, Matthew Allan

    Recent experimental and theoretical work has detected signatures of chaotic behavior in nearly every physical science, including quantum entanglement. In some instances, chaos either plays a significant role or, as an underlying presence, explains perplexing observations. There are certain properties of chaotic systems which are consistently encountered and become focal points of the investigations. For instance, chaotic systems typically admit a dense set of unstable periodic orbits around an attractor. These orbits collectively provide a rich source of qualitative information about the associated system and their abundance has been utilized in a variety of applications. We begin this thesis by describing a control scheme that stabilizes the unstable periodic orbits of chaotic systems and we go on to discuss several properties of these orbits. This technique allows for the creation of thousands of periodic orbits, known as cupolets ( Chaotic Unstable Periodic Orbit-lets ). We then present several applications of cupolets for investigating chaotic systems. First, we demonstrate an effective technique that combines cupolets with algebraic graph theory in order to transition between their orbits. This also induces certainty into the control of nonlinear systems and effectively provides an efficient algorithm for the steering and targeting of chaotic systems. Next, we establish that many higher-order cupolets are amalgamations of simpler cupolets, possibly through bifurcations. From a sufficiently large set of cupolets, we obtain a hierarchal subset of fundamental cupolets from which other cupolets may be assembled and dynamical invariants approximated. We then construct an independent coordinate system aligned to the local dynamical geometry and that reveals the local stretching and folding dynamics which characterize chaotic behavior. This partitions the dynamical landscape into regions of high or low chaoticity, thereby supporting prediction capabilities. Finally

  18. Partial synchronization and spontaneous spatial ordering in coupled chaotic systems

    International Nuclear Information System (INIS)

    A model of many symmetrically and locally coupled chaotic oscillators is studied. Partial chaotic synchronizations associated with spontaneous spatial ordering are demonstrated. Very rich patterns of the system are revealed, based on partial synchronization analysis. The stabilities of different partially synchronous spatiotemporal structures and some novel dynamical behaviors of these states are discussed both numerically and analytically. (author)

  19. Generalized Synchronization of Lorenz Chaotic System with Star Network

    OpenAIRE

    Mohammad Ali Khan

    2012-01-01

    In this paper, we propose the theory for generalized synchronization (GS) of a chaotic star network. We derive sufficient conditions for generalized synchronization of any chaotic system on a star network. The relationship among the state variables at GS are completely known in our method. The effectiveness and feasibility of the synchronization strategy is confirmed and demonstrated by numerical simulation.

  20. Robust optimization with transiently chaotic dynamical systems

    Science.gov (United States)

    Sumi, R.; Molnár, B.; Ercsey-Ravasz, M.

    2014-05-01

    Efficiently solving hard optimization problems has been a strong motivation for progress in analog computing. In a recent study we presented a continuous-time dynamical system for solving the NP-complete Boolean satisfiability (SAT) problem, with a one-to-one correspondence between its stable attractors and the SAT solutions. While physical implementations could offer great efficiency, the transiently chaotic dynamics raises the question of operability in the presence of noise, unavoidable on analog devices. Here we show that the probability of finding solutions is robust to noise intensities well above those present on real hardware. We also developed a cellular neural network model realizable with analog circuits, which tolerates even larger noise intensities. These methods represent an opportunity for robust and efficient physical implementations.

  1. Hardware Realization of Chaos-based Symmetric Video Encryption

    KAUST Repository

    Ibrahim, Mohamad A.

    2013-05-01

    This thesis reports original work on hardware realization of symmetric video encryption using chaos-based continuous systems as pseudo-random number generators. The thesis also presents some of the serious degradations caused by digitally implementing chaotic systems. Subsequently, some techniques to eliminate such defects, including the ultimately adopted scheme are listed and explained in detail. Moreover, the thesis describes original work on the design of an encryption system to encrypt MPEG-2 video streams. Information about the MPEG-2 standard that fits this design context is presented. Then, the security of the proposed system is exhaustively analyzed and the performance is compared with other reported systems, showing superiority in performance and security. The thesis focuses more on the hardware and the circuit aspect of the system’s design. The system is realized on Xilinx Vetrix-4 FPGA with hardware parameters and throughput performance surpassing conventional encryption systems.

  2. Control of Unknown Chaotic Systems Based on Neural Predictive Control

    Institute of Scientific and Technical Information of China (English)

    LIDong-Mei; WANGZheng-Ou

    2003-01-01

    We introduce the predictive control into the control of chaotic system and propose a neural network control algorithm based on predictive control. The proposed control system stabilizes the chaotic motion in an unknown chaotic system onto the desired target trajectory. The proposed algorithm is simple and its convergence speed is much higher than existing similar algorithms. The control system can control hyperchaos. We analyze the stability of the control system and prove the convergence property of the neural controller. The theoretic derivation and simulations demonstrate the effectiveness of the algorithm.

  3. A new image encryption algorithm based on the fractional-order hyperchaotic Lorenz system

    Institute of Scientific and Technical Information of China (English)

    Wang Zhen; Huang Xia; Li Yu-Xia; Song Xiao-Na

    2013-01-01

    We propose a new image encryption algorithm on the basis of the fractional-order hyperchaotic Lorenz system.While in the process of generating a key stream,the system parameters and the derivative order are embedded in the proposed algorithm to enhance the security.Such an algorithm is detailed in terms of security analyses,including correlation analysis,information entropy analysis,run statistic analysis,mean-variance gray value analysis,and key sensitivity analysis.The experimental results demonstrate that the proposed image encryption scheme has the advantages of large key space and high security for practical image encryption.

  4. Modeling of digital information optical encryption system with spatially incoherent illumination

    Science.gov (United States)

    Bondareva, Alyona P.; Cheremkhin, Pavel A.; Krasnov, Vitaly V.; Rodin, Vladislav G.; Starikov, Rostislav S.; Starikov, Sergey N.

    2015-10-01

    State of the art micromirror DMD spatial light modulators (SLM) offer unprecedented framerate up to 30000 frames per second. This, in conjunction with high speed digital camera, should allow to build high speed optical encryption system. Results of modeling of digital information optical encryption system with spatially incoherent illumination are presented. Input information is displayed with first SLM, encryption element - with second SLM. Factors taken into account are: resolution of SLMs and camera, holograms reconstruction noise, camera noise and signal sampling. Results of numerical simulation demonstrate high speed (several gigabytes per second), low bit error rate and high crypto-strength.

  5. Equilibrium points and bifurcation control of a chaotic system

    Institute of Scientific and Technical Information of China (English)

    Liang Cui-Xiang; Tang Jia-Shi

    2008-01-01

    Based on the Routh-Hurwitz criterion,this paper investigates the stability of a new chaotic system.State feedback controllers are designed to control the chaotic system to the unsteady equilibrium points and limit cycle.Theoretical analyses give the range of value of control parameters to stabilize the unsteady equilibrium points of the chaotic system and its critical parameter for generating Hopf bifurcation.Certain nP periodic orbits can be stabilized by parameter adjustment.Numerical simulations indicate that the method can effectively guide the system trajectories to unsteady equilibrium points and periodic orbits.

  6. Chaotic filter bank for computer cryptography

    International Nuclear Information System (INIS)

    A chaotic filter bank for computer cryptography is proposed. By encrypting and decrypting signals via a chaotic filter bank, the following advantages are enjoyed: (1) one can embed signals in different frequency bands by employing different chaotic functions; (2) the number of chaotic generators to be employed and their corresponding functions can be selected and designed in a flexible manner because perfect reconstruction does not depend on the invertibility, causality, linearity and time invariance of the corresponding chaotic functions; (3) the ratios of the subband signal powers to the chaotic subband signal powers can be easily changed by the designers and perfect reconstruction is still guaranteed no matter how small these ratios are; (4) the proposed cryptographical system can be easily adapted in the international multimedia standards, such as JPEG 2000 and MPEG4

  7. The Development of a Portable Hard Disk Encryption/Decryption System with a MEMS Coded Lock

    Directory of Open Access Journals (Sweden)

    Shengyong Li

    2009-11-01

    Full Text Available In this paper, a novel portable hard-disk encryption/decryption system with a MEMS coded lock is presented, which can authenticate the user and provide the key for the AES encryption/decryption module. The portable hard-disk encryption/decryption system is composed of the authentication module, the USB portable hard-disk interface card, the ATA protocol command decoder module, the data encryption/decryption module, the cipher key management module, the MEMS coded lock controlling circuit module, the MEMS coded lock and the hard disk. The ATA protocol circuit, the MEMS control circuit and AES encryption/decryption circuit are designed and realized by FPGA(Field Programmable Gate Array. The MEMS coded lock with two couplers and two groups of counter-meshing-gears (CMGs are fabricated by a LIGA-like process and precision engineering method. The whole prototype was fabricated and tested. The test results show that the user’s password could be correctly discriminated by the MEMS coded lock, and the AES encryption module could get the key from the MEMS coded lock. Moreover, the data in the hard-disk could be encrypted or decrypted, and the read-write speed of the dataflow could reach 17 MB/s in Ultra DMA mode.

  8. Chaotic synchronization for a class of fractional-order chaotic systems

    Institute of Scientific and Technical Information of China (English)

    Zhou Ping

    2007-01-01

    In this paper, a very simple synchronization method is presented for a class of fractional-order chaotic systems only via feedback control. The synchronization technique, based on the stability theory of fractional-order systems, is simple and theoretically rigorous.

  9. Ontic and epistemic descriptions of chaotic systems

    Science.gov (United States)

    Atmanspacher, Harald

    2000-05-01

    Traditional philosophical discourse draws a distinction between ontology and epistemology and generally enforces this distinction by keeping the two subject areas separated and unrelated. In addition, the relationship between the two areas is of central importance to physics and philosophy of physics. For instance, all kinds of measurement-related problems force us to consider both our knowledge of the states and observables of a system (epistemic perspective) and its states and observables independent of such knowledge (ontic perspective). This applies to quantum systems in particular. In this contribution we present an example which shows the importance of distinguishing between ontic and epistemic levels of description even for classical systems. Corresponding conceptions of ontic and epistemic states and their evolution will be introduced and discussed with respect to aspects of stability and information flow. These aspects show why the ontic/epistemic distinction is particularly important for systems exhibiting deterministic chaos. Moreover, this distinction provides some understanding of the relationships between determinism, causation, predictability, randomness, and stochasticity in chaotic systems.

  10. An optical CDMA system based on chaotic sequences

    Science.gov (United States)

    Liu, Xiao-lei; En, De; Wang, Li-guo

    2014-03-01

    In this paper, a coherent asynchronous optical code division multiple access (OCDMA) system is proposed, whose encoder/decoder is an all-optical generator. This all-optical generator can generate analog and bipolar chaotic sequences satisfying the logistic maps. The formula of bit error rate (BER) is derived, and the relationship of BER and the number of simultaneous transmissions is analyzed. Due to the good property of correlation, this coherent OCDMA system based on these bipolar chaotic sequences can support a large number of simultaneous users, which shows that these chaotic sequences are suitable for asynchronous OCDMA system.

  11. A self-adapting image encryption algorithm based on spatiotemporal chaos and ergodic matrix

    Institute of Scientific and Technical Information of China (English)

    Luo Yu-Ling; Du Ming-Hui

    2013-01-01

    To ensure the security of a digital image,a new self-adapting encryption algorithm based on the spatiotemporal chaos and ergodic matrix is proposed in this paper.First,the plain-image is divided into different blocks of the same size,and each block is sorted in ascending order to obtain the corresponding standard ergodic matrix.Then each block is encrypted by the spatiotemporal chaotic system and shuffled according to the standard ergodic matrix.Finally,all modules are rearranged to acquire the final encrypted image.In particular,the plain-image information is used in the initial conditions of the spatiotemporal chaos and the ergodic matrices,so different plain-images will be encrypted to obtain different cipherimages.Theoretical analysis and simulation results indicate that the performance and security of the proposed encryption scheme can encrypt the image effectively and resist various typical attacks.

  12. CHAOTIC DISINTEGRATION OF THE INNER SOLAR SYSTEM

    International Nuclear Information System (INIS)

    On timescales that greatly exceed an orbital period, typical planetary orbits evolve in a stochastic yet stable fashion. On even longer timescales, however, planetary orbits can spontaneously transition from bounded to unbound chaotic states. Large-scale instabilities associated with such behavior appear to play a dominant role in shaping the architectures of planetary systems, including our own. Here we show how such transitions are possible, focusing on the specific case of the long-term evolution of Mercury. We develop a simple analytical model for Mercury's dynamics and elucidate the origins of its short-term stochastic behavior as well as of its sudden progression to unbounded chaos. Our model allows us to estimate the timescale on which this transition is likely to be triggered, i.e., the dynamical lifetime of the solar system as we know it. The formulated theory is consistent with the results of numerical simulations and is broadly applicable to extrasolar planetary systems dominated by secular interactions. These results constitute a significant advancement in our understanding of the processes responsible for sculpting of the dynamical structures of generic planetary systems

  13. CHAOTIC DISINTEGRATION OF THE INNER SOLAR SYSTEM

    Energy Technology Data Exchange (ETDEWEB)

    Batygin, Konstantin [Division of Geological and Planetary Sciences, California Institute of Technology, 1200 East California Boulevard, Pasadena, CA 91125 (United States); Morbidelli, Alessandro [Department Lagrange, Observatoire de la Côte d' Azur, F-06304 Nice (France); Holman, Mathew J. [Harvard-Smithsonian Center for Astrophysics, 60 Garden Street, Cambridge, MA 02138 (United States)

    2015-02-01

    On timescales that greatly exceed an orbital period, typical planetary orbits evolve in a stochastic yet stable fashion. On even longer timescales, however, planetary orbits can spontaneously transition from bounded to unbound chaotic states. Large-scale instabilities associated with such behavior appear to play a dominant role in shaping the architectures of planetary systems, including our own. Here we show how such transitions are possible, focusing on the specific case of the long-term evolution of Mercury. We develop a simple analytical model for Mercury's dynamics and elucidate the origins of its short-term stochastic behavior as well as of its sudden progression to unbounded chaos. Our model allows us to estimate the timescale on which this transition is likely to be triggered, i.e., the dynamical lifetime of the solar system as we know it. The formulated theory is consistent with the results of numerical simulations and is broadly applicable to extrasolar planetary systems dominated by secular interactions. These results constitute a significant advancement in our understanding of the processes responsible for sculpting of the dynamical structures of generic planetary systems.

  14. Bluetooth Based Chaos Synchronization Using Particle Swarm Optimization and Its Applications to Image Encryption

    Science.gov (United States)

    Yau, Her-Terng; Hung, Tzu-Hsiang; Hsieh, Chia-Chun

    2012-01-01

    This study used the complex dynamic characteristics of chaotic systems and Bluetooth to explore the topic of wireless chaotic communication secrecy and develop a communication security system. The PID controller for chaos synchronization control was applied, and the optimum parameters of this PID controller were obtained using a Particle Swarm Optimization (PSO) algorithm. Bluetooth was used to realize wireless transmissions, and a chaotic wireless communication security system was developed in the design concept of a chaotic communication security system. The experimental results show that this scheme can be used successfully in image encryption. PMID:22969355

  15. Bluetooth Based Chaos Synchronization Using Particle Swarm Optimization and Its Applications to Image Encryption

    Directory of Open Access Journals (Sweden)

    Tzu-Hsiang Hung

    2012-06-01

    Full Text Available This study used the complex dynamic characteristics of chaotic systems and Bluetooth to explore the topic of wireless chaotic communication secrecy and develop a communication security system. The PID controller for chaos synchronization control was applied, and the optimum parameters of this PID controller were obtained using a Particle Swarm Optimization (PSO algorithm. Bluetooth was used to realize wireless transmissions, and a chaotic wireless communication security system was developed in the design concept of a chaotic communication security system. The experimental results show that this scheme can be used successfully in image encryption.

  16. Open-loop frequency response for a chaotic masking system

    Institute of Scientific and Technical Information of China (English)

    Huang Xian-Gao; Yu Pei; Huang Wei

    2006-01-01

    In this paper, a new numerical simulation approach is proposed for the study of open-loop frequency response of a chaotic masking system. Using Chua's circuit and the Lorenz system as illustrative examples, we have shown that one can employ chaos synchronization to separate the feedback network from a chaotic masking system, and then use numerical simulation to obtain the open-loop synchronization response, the phase response, and the amplitude response of a chaotic masking system. Based on the analysis of the frequency response, we have also proved that changing the amplitude of the exciting (input) signal within normal working domain does not influence the frequency response of the chaotic masking system. The new numerical simulation method developed in this paper can be extended to consider the open-loop frequency response of other systems described by differential or difference equations.

  17. Linear generalized synchronization of continuous-time chaotic systems

    Energy Technology Data Exchange (ETDEWEB)

    Lu Junguo E-mail: jglu@sjtu.edu.cn; Xi Yugeng

    2003-08-01

    This paper develops a general approach for constructing a response system to implement linear generalized synchronization (GS) with the drive continuous-time chaotic system. Some sufficient conditions of global asymptotic linear GS between the drive and response continuous-time chaotic systems are attained from rigorously modern control theory. Finally, we take Chua's circuit as an example for illustration and verification.

  18. Application of observer-based chaotic synchronization and identifiability to original CSK model for secure information transmission

    OpenAIRE

    Garasym, Oleg; Taralova, Ina; Lozi, René

    2015-01-01

    Received (to be inserted by publisher) Modified Lozi system is analyzed as chaotic PRNG and synchronized via observers. The objective of the study is to investigate chaotic-based encryption method that preserves CSK model advantages, but improves the security level. CSK model have been discussed to message encryp-tion because it implies better resistance against noise, but there are many evidences of the model weaknesses. The investigation provides the original CSK model analyses of secure me...

  19. Clustering of periodic orbits in chaotic systems

    International Nuclear Information System (INIS)

    In the framework of the semiclassical approach, the universal spectral correlations in Hamiltonian systems with classical chaotic dynamics can be attributed to the systematic correlations between the actions of periodic orbits which (up to the switch in the momentum direction) pass through approximately the same points of the phase space. By considering symbolic dynamics of the system one can introduce a natural ultrametric distance between periodic orbits and organize them into clusters of orbits approaching each other in the phase space. We study the distribution of cluster sizes for the baker's map in the asymptotic limit of long trajectories. This problem is equivalent to the one of counting degeneracies in the length spectrum of the de Bruijn graphs. Based on this fact, we derive the probability Pk that k randomly chosen periodic orbits belong to the same cluster. Furthermore, we find asymptotic behaviour of the largest cluster size |Cmax| and derive the probability P(t) that a random periodic orbit belongs to a cluster smaller than t|Cmax|, t ∈ [0, 1]. (paper)

  20. Mixed basin boundary structures of chaotic systems

    International Nuclear Information System (INIS)

    Motivated by recent numerical observations on a four-dimensional continuous-time dynamical system, we consider different types of basin boundary structures for chaotic systems. These general structures are essentially mixtures of the previously known types of basin boundaries where the character of the boundary assumes features of the previously known boundary types at different points arbitrarily finely interspersed in the boundary. For example, we discuss situations where an everywhere continuous boundary that is otherwise smooth and differentiable at almost every point has an embedded uncountable, zero Lebesgue measure set of points at which the boundary curve is nondifferentiable. Although the nondifferentiable set is only of zero Lebesgue measure, the curve close-quote s fractal dimension may (depending on parameters) still be greater than one. In addition, we discuss bifurcations from such a mixed boundary to a 'pure' boundary that is a fractal nowhere differentiable curve or surface and to a pure nonfractal boundary that is everywhere smooth. copyright 1999 The American Physical Society

  1. Generalized formulation of an encryption system based on a joint transform correlator and fractional Fourier transform

    International Nuclear Information System (INIS)

    We propose a generalization of the encryption system based on double random phase encoding (DRPE) and a joint transform correlator (JTC), from the Fourier domain to the fractional Fourier domain (FrFD) by using the fractional Fourier operators, such as the fractional Fourier transform (FrFT), fractional traslation, fractional convolution and fractional correlation. Image encryption systems based on a JTC architecture in the FrFD usually produce low quality decrypted images. In this work, we present two approaches to improve the quality of the decrypted images, which are based on nonlinear processing applied to the encrypted function (that contains the joint fractional power spectrum, JFPS) and the nonzero-order JTC in the FrFD. When the two approaches are combined, the quality of the decrypted image is higher. In addition to the advantages introduced by the implementation of the DRPE using a JTC, we demonstrate that the proposed encryption system in the FrFD preserves the shift-invariance property of the JTC-based encryption system in the Fourier domain, with respect to the lateral displacement of both the key random mask in the decryption process and the retrieval of the primary image. The feasibility of this encryption system is verified and analyzed by computer simulations. (paper)

  2. Synchronization Between Two Different Switched Chaotic Systems By Switching Control

    Directory of Open Access Journals (Sweden)

    Du Li Ming

    2016-01-01

    Full Text Available This paper is concerned with the synchronization problem of two different switched chaotic systems, considering the general case that the master-slave switched chaotic systems have uncertainties. Two basic problems are considered: one is projective synchronization of switched chaotic systems under arbitrary switching; the other is projective synchronization of switched chaotic systems by design of switching when synchronization cannot achieved by using any subsystems alone. For the two problems, common Lyapunov function method and multiple Lyapunov function method are used respectively, an adaptive control scheme has been presented, some sufficient synchronization conditions are attainted, and the switching signal is designed. Finally, the numerical simulation is provide to show the effectiveness of our method.

  3. Two novel synchronization criterions for a unified chaotic system

    International Nuclear Information System (INIS)

    Two novel synchronization criterions are proposed in this paper. It includes drive-response synchronization and adaptive synchronization schemes. Moreover, these synchronization criterions can be applied to a large class of chaotic systems and are very useful for secure communication

  4. Estimating parameters of chaotic systems synchronized by external driving signal

    Energy Technology Data Exchange (ETDEWEB)

    Wu Xiaogang [Institute of PR and AI, Huazhong University of Science and Technology, Wuhan 430074 (China)]. E-mail: seanwoo@mail.hust.edu.cn; Wang Zuxi [Institute of PR and AI, Huazhong University of Science and Technology, Wuhan 430074 (China)

    2007-07-15

    Noise-induced synchronization (NIS) has evoked great research interests recently. Two uncoupled identical chaotic systems can achieve complete synchronization (CS) by feeding a common noise with appropriate intensity. Actually, NIS belongs to the category of external feedback control (EFC). The significance of applying EFC in secure communication lies in fact that the trajectory of chaotic systems is disturbed so strongly by external driving signal that phase space reconstruction attack fails. In this paper, however, we propose an approach that can accurately estimate the parameters of the chaotic systems synchronized by external driving signal through chaotic transmitted signal, driving signal and their derivatives. Numerical simulation indicates that this approach can estimate system parameters and external coupling strength under two driving modes in a very rapid manner, which implies that EFC is not superior to other methods in secure communication.

  5. Estimating parameters of chaotic systems synchronized by external driving signal

    International Nuclear Information System (INIS)

    Noise-induced synchronization (NIS) has evoked great research interests recently. Two uncoupled identical chaotic systems can achieve complete synchronization (CS) by feeding a common noise with appropriate intensity. Actually, NIS belongs to the category of external feedback control (EFC). The significance of applying EFC in secure communication lies in fact that the trajectory of chaotic systems is disturbed so strongly by external driving signal that phase space reconstruction attack fails. In this paper, however, we propose an approach that can accurately estimate the parameters of the chaotic systems synchronized by external driving signal through chaotic transmitted signal, driving signal and their derivatives. Numerical simulation indicates that this approach can estimate system parameters and external coupling strength under two driving modes in a very rapid manner, which implies that EFC is not superior to other methods in secure communication

  6. Impulsive Control of Memristive Chaotic Systems with Impulsive Time Window

    Directory of Open Access Journals (Sweden)

    FuLi Chen

    2015-01-01

    Full Text Available The problem of impulsive control for memristor-based chaotic circuit systems with impulsive time windows is investigated. Based on comparison principle, several novel criteria which guarantee the asymptotic stabilization of the memristor-based chaotic circuit systems are obtained. In comparison with previous results, the present results are easily verified. Numerical simulations are given to further illustrate the effectiveness of the theoretical results.

  7. Pattern formations in chaotic spatio-temporal systems

    Indian Academy of Sciences (India)

    Ying Zhang; Shihong Wang; Jinhua Xiao; Hilda A Cerdeira; S Chen; Gang Hu

    2005-06-01

    Pattern formations in chaotic spatio-temporal systems modelled by coupled chaotic oscillators are investigated. We focus on various symmetry breakings and different kinds of chaos synchronization–desynchronization transitions, which lead to certain types of spontaneous spatial orderings and the emergence of some typical ordered patterns, such as rotating wave patterns with splay phase ordering (orientational symmetry breaking) and partially synchronous standing wave patterns with in-phase ordering (translational symmetry breaking). General pictures of the global behaviors of pattern formations and transitions in coupled chaotic oscillators are provided.

  8. Blind adaptive identification of FIR channel in chaotic communication systems

    Institute of Scientific and Technical Information of China (English)

    Wang Bao-Yun; Tommy W.S.Chow; K.T.Ng

    2004-01-01

    In this paper we study the problem of blind channel identification in chaotic communications. An adaptive algorithm is proposed, which exploits the boundness property of chaotic signals. Compared with the EKF-based approach, the proposed algorithm achieves a great complexity gain but at the expense of a slight accuracy degradation.However, our approach enjoys the important advantage that it does not require the a priori information such as nonlinearity of chaotic dynamics and the variances of measurement noise and the coefficient model noise. In addition,our approach is applicable to the ARMA system.

  9. Wigner function statistics in classically chaotic systems

    CERN Document Server

    Horvat, M; Horvat, Martin; Prosen, Tomaz

    2003-01-01

    We have studied statistical properties of the values of the Wigner function W(x) of 1D quantum maps on compact 2D phase space of finite area V. For this purpose we have defined a Wigner function probability distribution P(w) = (1/V) int delta(w-W(x)) dx, which has, by definition, fixed first and second moment. In particular, we concentrate on relaxation of time evolving quantum state in terms of W(x), starting from a coherent state. We have shown that for a classically chaotic quantum counterpart the distribution P(w) in the semi-classical limit becomes a Gaussian distribution that is fully determined by the first two moments. Numerical simulations have been performed for the quantum sawtooth map and the quantized kicked top. In a quantum system with Hilbert space dimension N (similar 1/hbar) the transition of P(w) to a Gaussian distribution was observed at times t proportional to log N. In addition, it has been shown that the statistics of Wigner functions of propagator eigenstates is Gaussian as well in the...

  10. Orbits' statistics in chaotic dynamical systems

    International Nuclear Information System (INIS)

    This paper shows how the measurement of the stochasticity degree of a finite sequence of real numbers, published by Kolmogorov in Italian in a journal of insurances' statistics, can be usefully applied to measure the objective stochasticity degree of sequences, originating from dynamical systems theory and from number theory. Namely, whenever the value of Kolmogorov's stochasticity parameter of a given sequence of numbers is too small (or too big), one may conclude that the conjecture describing this sequence as a sample of independent values of a random variables is highly improbable. Kolmogorov used this strategy fighting (in a paper in 'Doklady', 1940) against Lysenko, who had tried to disprove the classical genetics' law of Mendel experimentally. Calculating his stochasticity parameter value for the numbers from Lysenko's experiment reports, Kolmogorov deduced, that, while these numbers were different from the exact fulfilment of Mendel's 3 : 1 law, any smaller deviation would be a manifestation of the report's number falsification. The calculation of the values of the stochasticity parameter would be useful for many other generators of pseudorandom numbers and for many other chaotically looking statistics, including even the prime numbers distribution (discussed in this paper as an example). (open problem)

  11. Adaptive Control of the Chaotic System via Singular System Approach

    OpenAIRE

    Yudong Li; Tianyu Zhang; Yujun Zhang

    2014-01-01

    This paper deals with the control problem of the chaotic system subject to disturbance. The sliding mode surface is designed by singular system approach, and sufficient condition for convergence is given. Then, the adaptive sliding mode controller is designed to make the state arrive at the sliding mode surface in finite time. Finally, Lorenz system is considered as an example to show the effectiveness of the proposed method.

  12. Adaptive Control of the Chaotic System via Singular System Approach

    Directory of Open Access Journals (Sweden)

    Yudong Li

    2014-01-01

    Full Text Available This paper deals with the control problem of the chaotic system subject to disturbance. The sliding mode surface is designed by singular system approach, and sufficient condition for convergence is given. Then, the adaptive sliding mode controller is designed to make the state arrive at the sliding mode surface in finite time. Finally, Lorenz system is considered as an example to show the effectiveness of the proposed method.

  13. Chaotic diffusion in the Gliese-876 planetary system

    Science.gov (United States)

    Martí, J. G.; Cincotta, P. M.; Beaugé, C.

    2016-07-01

    Chaotic diffusion is supposed to be responsible for orbital instabilities in planetary systems after the dissipation of the protoplanetary disc, and a natural consequence of irregular motion. In this paper, we show that resonant multiplanetary systems, despite being highly chaotic, not necessarily exhibit significant diffusion in phase space, and may still survive virtually unchanged over time-scales comparable to their age. Using the GJ-876 system as an example, we analyse the chaotic diffusion of the outermost (and less massive) planet. We construct a set of stability maps in the surrounding regions of the Laplace resonance. We numerically integrate ensembles of close initial conditions, compute Poincaré maps and estimate the chaotic diffusion present in this system. Our results show that, the Laplace resonance contains two different regions: an inner domain characterized by low chaoticity and slow diffusion, and an outer one displaying larger values of dynamical indicators. In the outer resonant domain, the stochastic borders of the Laplace resonance seem to prevent the complete destruction of the system. We characterize the diffusion for small ensembles along the parameters of the outermost planet. Finally, we perform a stability analysis of the inherent chaotic, albeit stable Laplace resonance, by linking the behaviour of the resonant variables of the configurations to the different sub-structures inside the three-body resonance.

  14. Chaotic Diffusion in the Gliese-876 Planetary System

    Science.gov (United States)

    Martí, J. G.; Cincotta, P. M.; Beaugé, C.

    2016-05-01

    Chaotic diffusion is supposed to be responsible for orbital instabilities in planetary systems after the dissipation of the protoplanetary disk, and a natural consequence of irregular motion. In this paper we show that resonant multi-planetary systems, despite being highly chaotic, not necessarily exhibit significant diffusion in phase space, and may still survive virtually unchanged over timescales comparable to their age.Using the GJ-876 system as an example, we analyze the chaotic diffusion of the outermost (and less massive) planet. We construct a set of stability maps in the surrounding regions of the Laplace resonance. We numerically integrate ensembles of close initial conditions, compute Poincaré maps and estimate the chaotic diffusion present in this system. Our results show that, the Laplace resonance contains two different regions: an inner domain characterized by low chaoticity and slow diffusion, and an outer one displaying larger values of dynamical indicators. In the outer resonant domain, the stochastic borders of the Laplace resonance seem to prevent the complete destruction of the system. We characterize the diffusion for small ensembles along the parameters of the outermost planet. Finally, we perform a stability analysis of the inherent chaotic, albeit stable Laplace resonance, by linking the behavior of the resonant variables of the configurations to the different sub-structures inside the three-body resonance.

  15. Practical System for Querying Encrypted Data on the Cloud

    Directory of Open Access Journals (Sweden)

    Parul Upadhyaya

    2013-04-01

    Full Text Available This paper proposes, compares and analyses query optimization techniques to securely query encrypted databases. Such querying capability is becoming increasingly relevant as individuals and enterprises move their data to the cloud. The schemes discussed delve into various design issues like speed, scalability and efficiency that are encountered in the context querying encrypted data that is on the cloud. We determine the exact differences in terms of the nature, scenario and behavior amongst the different approaches in between the existing probable solution and our solution that can be applied to the querying problem.

  16. CHAOTIC DATA COMMUNICATION SYSTEM DESIGN BY USING RAMAN AMPLIFIER

    OpenAIRE

    Remzi YILDIRIM; ÇELEBİ, Fatih V.

    2010-01-01

    ABSTRACT In this study, an 80 km. long fiber-optic data communication system is designed by using Raman amplifier. Chaotic communication technique is used contrary to regular data communication principles. The  components of the chaotic signal are the optical noise by AWGN (Additive White Gaussian Noise,AWGN) technique and ONA (Optical Noise Adder,ONA) in addition to the modulated signal which is obtained by using external optical modulator. Non-return to zero (NRZ) technique is selected...

  17. A Color image encryption scheme based on Generalized Synchronization Theorem

    Directory of Open Access Journals (Sweden)

    Han shuangshuang

    2013-07-01

    Full Text Available Base on a generalized synchronization theorem (GCS for discrete chaotic system, this paper introduces a new 6-dimensional generalized chaos synchronization system based on 3D-Lorenz map. Numerical simulation showed that two pair variables of the synchronization system achieve generalized synchronization via a transform H.Combining with the 2-Dimension non equilateral Arnold transformation, a color image encryption scheme was designed. Analyzing the key sensitivity, key space, histogram, information entropy and correlation of adjacent pixels, it showed that the scheme have sound encryption and decryption effects. Numerical simulations reveal that the scheme is effective in commercial network communication for its strong anti-interference ability.

  18. Chaotic Genetic Algorithm based on Lorenz Chaotic System for Optimization Problems

    OpenAIRE

    Reza Ebrahimzadeh; Mahdi Jampour

    2013-01-01

    Very recently evolutionary optimization algorithms use the Genetic Algorithm to improve the result of Optimization problems. Several processes of the Genetic Algorithm are based on 'Random', that is fundamental to evolutionary algorithms, but important defections in the Genetic Algorithm are local convergence and high tolerances in the results, they have happened for randomness reason. In this paper we have prepared pseudo random numbers by Lorenz chaotic system for operators of Genetic Algor...

  19. Realization of fractional-order Liu chaotic system by circuit

    Institute of Scientific and Technical Information of China (English)

    Lu Jun-Jie; Liu Chong-Xin

    2007-01-01

    In this paper, chaotic behaviours in the fractional-order Liu system are studied. Based on the approximation theory of fractional-order operator, circuits are designed to simulate the fractional- order Liu system with q = 0.1 - 0.9 in a step of 0.1, and an experiment has demonstrated the 2.7-order Liu system. The simulation results prove that the chaos exists indeed in the fractional-order Liu system with an order as low as 0.3. The experimental results prove that the fractional-order chaotic system can be realized by using hardware devices, which lays the foundation for its practical applications.

  20. Control of Unknown Chaotic Systems Based on Neural Predictive Control

    Institute of Scientific and Technical Information of China (English)

    LI Dong-Mei; WANG Zheng-Ou

    2003-01-01

    We introduce the predictive control into the control of chaotic system and propose a neural networkcontrol algorithm based on predictive control. The proposed control system stabilizes the chaotic motion in an unknownchaotic system onto the desired target trajectory. The proposed algorithm is simple and its convergence speed is muchhigher than existing similar algorithms. The control system can control hyperchaos. We analyze the stability of thecontrol system and prove the convergence property of the neural controller. The theoretic derivation and simulationsdemonstrate the effectiveness of the algorithm.

  1. Increased-order generalized synchronization of chaotic and hyperchaotic systems

    Indian Academy of Sciences (India)

    K S Ojo; S T Ogunjo; A N Njah; I A Fuwape

    2015-01-01

    This paper presents increased-order generalized synchronization (GS) of chaotic and hyperchaotic systems with different order based on active control technique. By this technique, we design suitable control functions to achieve GS between (i) a new three-dimensional (3D) chaotic system and four-dimensional (4D) hyperchaotic Lorenz system and (ii) four-dimensional hyperchaotic Lorenz system and five-dimensional (5D) hyperchaotic Lorenz system. The corresponding numerical simulation results are presented to verify the effectiveness of this technique.

  2. A novel one equilibrium hyper-chaotic system generated upon Lü attractor

    International Nuclear Information System (INIS)

    By introducing an additional state feedback into a three-dimensional autonomous chaotic attractor Lü system, this paper presents a novel four-dimensional continuous autonomous hyper-chaotic system which has only one equilibrium. There are only 8 terms in all four equations of the new hyper-chaotic system, which may be less than any other four-dimensional continuous autonomous hyper-chaotic systems generated by three-dimensional (3D) continuous autonomous chaotic systems. The hyper-chaotic system undergoes Hopf bifurcation when parameter c varies, and becomes the 3D modified Lü system when parameter k varies. Although the hyper-chaotic system does not undergo Hopf bifurcation when parameter k varies, many dynamic behaviours such as periodic attractor, quasi periodic attractor, chaotic attractor and hyper-chaotic attractor can be observed. A circuit is also designed when parameter k varies and the results of the circuit experiment are in good agreement with those of simulation. (general)

  3. A joint encryption/watermarking system for verifying the reliability of medical images.

    Science.gov (United States)

    Bouslimi, Dalel; Coatrieux, Gouenou; Cozic, Michel; Roux, Christian

    2012-09-01

    In this paper, we propose a joint encryption/water-marking system for the purpose of protecting medical images. This system is based on an approach which combines a substitutive watermarking algorithm, the quantization index modulation, with an encryption algorithm: a stream cipher algorithm (e.g., the RC4) or a block cipher algorithm (e.g., the AES in cipher block chaining (CBC) mode of operation). Our objective is to give access to the outcomes of the image integrity and of its origin even though the image is stored encrypted. If watermarking and encryption are conducted jointly at the protection stage, watermark extraction and decryption can be applied independently. The security analysis of our scheme and experimental results achieved on 8-bit depth ultrasound images as well as on 16-bit encoded positron emission tomography images demonstrate the capability of our system to securely make available security attributes in both spatial and encrypted domains while minimizing image distortion. Furthermore, by making use of the AES block cipher in CBC mode, the proposed system is compliant with or transparent to the DICOM standard. PMID:22801525

  4. Adaptive synchronization between chaotic dynamical systems of different order

    International Nuclear Information System (INIS)

    This Letter discusses the synchronization between two chaotic dynamical systems of different order, using an adaptive control scheme. The problem is closely related to the synchronization of strictly different chaotic systems. We show that the dynamical evolution of a fourth-order system can be synchronized with the canonical projections of a third-order system. In this sense, it may be said that the synchronization is achieved in reduced order, where by order we means the number of first order differential equations. The mathematical stability analysis is derived from the Lyapunov stability theory. Numerical simulations are presented to show the effectiveness and feasibility of the proposed scheme

  5. Adaptive synchronization between two different chaotic systems with unknown parameters

    International Nuclear Information System (INIS)

    A unified mathematical expression describing a class of chaotic systems is presented, for which the problem of adaptive synchronization between two different chaotic systems with unknown parameters has been studied. Based on Lyapunov stability theory, an adaptive synchronization controller is designed and analytic expression of the controller and the adaptive laws of parameters are developed. The adaptive synchronizations between Lorenz and Chen systems, a modified Chua's circuit and Roessler systems are taken as two illustrative examples to show the effectiveness of the proposed method

  6. Pinning Control in a System of Mobile Chaotic Oscillators

    Science.gov (United States)

    Dariani, Reza; Buscarino, Arturo; Fortuna, Luigi; Frasca, Mattia

    2011-09-01

    In this paper, pinning control in a system of moving agents (each one associated to a chaotic dynamical system) has been investigated. In particular, we have studied and compared two different strategies for pinning control and discussed the not trivial relation between synchronization and control of the chaotic agents. Our results show how system parameters like agent density are critical in order to reach a synchronous behavior of the agents as well as to reach global control of the system by only pinning a reduced set of agents.

  7. Generalized projective synchronization of chaotic systems via adaptive learning control

    International Nuclear Information System (INIS)

    In this paper, a learning control approach is applied to the generalized projective synchronisation (GPS) of different chaotic systems with unknown periodically time-varying parameters. Using the Lyapunov–Krasovskii functional stability theory, a differential-difference mixed parametric learning law and an adaptive learning control law are constructed to make the states of two different chaotic systems asymptotically synchronised. The scheme is successfully applied to the generalized projective synchronisation between the Lorenz system and Chen system. Moreover, numerical simulations results are used to verify the effectiveness of the proposed scheme. (general)

  8. Security enhanced optical encryption system by random phase key and permutation key.

    Science.gov (United States)

    He, Mingzhao; Tan, Qiaofeng; Cao, Liangcai; He, Qingsheng; Jin, Guofan

    2009-12-01

    Conventional double random phase encoding (DRPE) encrypts plaintext to white noise-like ciphertext which may attract attention of eavesdroppers, and recent research reported that DRPE is vulnerable to various attacks. Here we propose a security enhanced optical encryption system that can hide the existence of secret information by watermarking. The plaintext is encrypted using iterative fractional Fourier transform with random phase key, and ciphertext is randomly permuted with permutation key before watermarking. Cryptanalysis shows that linearity of the security system has been broken and the permutation key prevent the attacker from accessing the ciphertext in various attacks. A series of simulations have shown the effectiveness of this system and the security strength is enhanced for invisibility, nonlinearity and resistance against attacks. PMID:20052170

  9. Improved decryption quality and security of a joint transform correlator-based encryption system

    International Nuclear Information System (INIS)

    Some image encryption systems based on modified double random phase encoding and joint transform correlator architecture produce low quality decrypted images and are vulnerable to a variety of attacks. In this work, we analyse the algorithm of some reported methods that optically implement the double random phase encryption in a joint transform correlator. We show that it is possible to significantly improve the quality of the decrypted image by introducing a simple nonlinear operation in the encrypted function that contains the joint power spectrum. This nonlinearity also makes the system more resistant to chosen-plaintext attacks. We additionally explore the system resistance against this type of attack when a variety of probability density functions are used to generate the two random phase masks of the encryption–decryption process. Numerical results are presented and discussed. (paper)

  10. ADAPTIVE SYNCHRONIZATION OF UNCERTAIN LI AND T CHAOTIC SYSTEMS

    Directory of Open Access Journals (Sweden)

    Dr. V. SUNDARAPANDIAN,

    2011-05-01

    Full Text Available In this paper, we use adaptive control method to derive new results for the global chaos synchronization of identical uncertain Li systems (2009, identical uncertain T systems (2008 and non-identical Li and uncertain T systems. In adaptive synchronization of identical chaotic systems, the parameters of the master and slave systems are unknown and we devise feedback control laws using estimates of the system parameters. In adaptive synchronization of non-identical chaotic systems, the parameters of the master system are known, but the parameters of the slave systems are unknown and we devise feedback control laws using the estimates of the parameters of the slave system. Our adaptive synchronization results derived in this paper for uncertain Li and T systems are established using Lyapunov stability theory. Since the Lyapunov exponents are not required for these calculations, the adaptive control method is very effective and convenient to synchronize identical and non-identical Li and T chaotic systems. Numerical simulations are given to demonstrate the effectiveness of the proposed adaptive synchronization schemes for the global chaos synchronization of the uncertain chaotic systems addressed in this paper.

  11. Active synchronization between two different chaotic dynamical system

    Energy Technology Data Exchange (ETDEWEB)

    Maheri, M. [Institute for Mathematical Research, 43400 UPM, Serdang, Selengor (Malaysia); Arifin, N. Md; Ismail, F. [Department of Mathematics, 43400 UPM, Serdang, Selengor (Malaysia)

    2015-05-15

    In this paper we investigate on the synchronization problem between two different chaotic dynamical system based on the Lyapunov stability theorem by using nonlinear control functions. Active control schemes are used for synchronization Liu system as drive and Rossler system as response. Numerical simulation by using Maple software are used to show effectiveness of the proposed schemes.

  12. Fuzzy Control of Chaotic System with Genetic Algorithm

    Institute of Scientific and Technical Information of China (English)

    FANG Jian-an; GUO Zhao-xia; SHAO Shi-huang

    2002-01-01

    A novel approach to control the unpredictable behavior of chaotic systems is presented. The control algorithm is based on fuzzy logic control technique combined with genetic algorithm. The use of fuzzy logic allows for the implementation of human "rule-of-thumb" approach to decision making by employing linguistic variables. An improved Genetic Algorithm (GA) is used to learn to optimally select the fuzzy membership functions of the linguistic labels in the condition portion of each rule,and to automatically generate fuzzy control actions under each condition. Simulation results show that such an approach for the control of chaotic systems is both effective and robust.

  13. Directing orbits of chaotic systems by particle swarm optimization

    International Nuclear Information System (INIS)

    This paper applies a novel evolutionary computation algorithm named particle swarm optimization (PSO) to direct the orbits of discrete chaotic dynamical systems towards desired target region within a short time by adding only small bounded perturbations, which could be formulated as a multi-modal numerical optimization problem with high dimension. Moreover, the synchronization of chaotic systems is also studied, which can be dealt with as an online problem of directing orbits. Numerical simulations based on Henon Map demonstrate the effectiveness and efficiency of PSO, and the effects of some parameters are also investigated

  14. Hybrid synchronization of two independent chaotic systems on complex network

    Indian Academy of Sciences (India)

    NIAN FUZHONG; LIU WEILONG

    2016-06-01

    The real network nodes are always interfered by other messages. So, how to realize the hybrid synchronization of two independent chaotic systems based on the complex network is very important. To solve this problem, two other problems should be considered. One is how the same network node of the complex network was affected by different information sources. Another is how to achieve hybrid synchronization on the network. In this paper, the theoretical analysis andnumerical simulation on various complex networks are implemented. The results indicate that the hybrid synchronization of two independent chaotic systems is feasible.

  15. Design of output feedback controller for a unified chaotic system

    Institute of Scientific and Technical Information of China (English)

    Li Wen-Lin; Chen Xiu-Qin; Shen Zhi-Ping

    2008-01-01

    In this paper,the synchronization of a unified chaotic system is investigated by the use of output feedback controllers;a two-input single-output feedback controller and single-input single-output feedback controller are presented to synchronize the unified chaotic system when the states are not all measurable.Compared with the existing results,the controllers designed in this paper have some advantages such as small feedback gain,simple structure and less conservation.Finally,numerical simulations results are provided to demonstrate the validity and effectiveness of the proposed method.

  16. Synchronization of uncertain chaotic systems using a single transmission channel

    Energy Technology Data Exchange (ETDEWEB)

    Feng Yong [Department of Electrical Engineering, Harbin Institute of Technology, Harbin 150001 (China); School of Electrical and Computer Engineering, Royal Melbourne Institute of Technology, Melbourne, VIC 3001 (Australia)], E-mail: feng.yong@ems.rmit.edu.au; Yu Xinghuo [School of Electrical and Computer Engineering, Royal Melbourne Institute of Technology, Melbourne, VIC 3001 (Australia)], E-mail: x.yu@rmit.edu.au; Sun Lixia [College of Electrical Engineering, Hohai University, Nanjing 210098 (China)], E-mail: sunlixia@hit.edu.cn

    2008-02-15

    This paper proposes a robust sliding mode observer for synchronization of uncertain chaotic systems with multi-nonlinearities. A new control strategy is proposed for the construction of the robust sliding mode observer, which can avoid the strict conditions in the design process of Walcott-Zak observer. A new method of multi-dimensional signal transmission via single transmission channel is proposed and applied to chaos synchronization of uncertain chaotic systems with multi-nonlinearities. The simulation results are presented to validate the method.

  17. Synchronization of uncertain chaotic systems using a single transmission channel

    International Nuclear Information System (INIS)

    This paper proposes a robust sliding mode observer for synchronization of uncertain chaotic systems with multi-nonlinearities. A new control strategy is proposed for the construction of the robust sliding mode observer, which can avoid the strict conditions in the design process of Walcott-Zak observer. A new method of multi-dimensional signal transmission via single transmission channel is proposed and applied to chaos synchronization of uncertain chaotic systems with multi-nonlinearities. The simulation results are presented to validate the method

  18. A novel four-wing non-equilibrium chaotic system and its circuit implementation

    Indian Academy of Sciences (India)

    Lin Yuan; Wang Chunhua; He Haizhen; Zhou Li Li

    2016-04-01

    In this paper, we construct a novel, 4D smooth autonomous system. Compared to the existing chaotic systems, the most attractive point is that this system does not display any equilibria, but can still exhibit four-wing chaotic attractors. The proposed system is investigated through numerical simulations and analyses including time phase portraits, Lyapunov exponents, bifurcation diagram, and Poincaré maps. There is little difference between this chaotic system withoutequilibria and other chaotic systems with equilibria shown by phase portraits and Lyapunov exponents. But the bifurcation diagram shows that the chaotic systems without equilibria do not have characteristics such as pitchfork bifurcation, Hopf bifurcation etc. which are common to the normal chaotic systems. The Poincaré maps show that this system is a four-wing chaotic system with more complicated dynamics. Moreover, the physical existence of the four-wing chaotic attractor without equilibria is verified by an electronic circuit.

  19. Chaotic behaviour of a predator-prey system

    NARCIS (Netherlands)

    Kooi, B.W.; Boer, M.P.

    2003-01-01

    Generally a predator-prey system is modelled by two ordinary differential equations which describe the rate of changes of the biomasses. Since such a system is two-dimensional no chaotic behaviour can occur. In the popular Rosenzweig-MacArthur model, which replaced the Lotka-Volterra model, a stable

  20. A universal projective synchronization of general autonomous chaotic system

    Indian Academy of Sciences (India)

    Fuzhong Nian; Zingyuan Wang; Ming Li; Ge Guo

    2012-12-01

    This paper investigates the generalized projective synchronization in general autonomous chaotic system. A universal controller is designed and the effectiveness is verified via theoretical analysis and numerical simulations. The controller design is irrelevant to concrete system structure and initial values. It has strong robustness and broad application perspective.

  1. Synchronization between two different chaotic systems with nonlinear feedback control

    Institute of Scientific and Technical Information of China (English)

    Lü Ling; Guo Zhi-An; Zhang Chao

    2007-01-01

    This paper presents chaos synchronization between two different chaotic systems by using a nonlinear controller, in which the nonlinear functions of the system are used as a nonlinear feedback term. The feedback controller is designed on the basis of stability theory, and the area of feedback gain is determined. The artificial simulation results show that this control method is commendably effective and feasible.

  2. Chaotic Motion in a Harmonically Excited Soliton System

    Institute of Scientific and Technical Information of China (English)

    YU Jun; ZHANG Wei-Jun; GAO Xiao-Ming

    2006-01-01

    The influence of a soliton system under an external harmonic excitation is considered. We take the compound KdV-Burgers equation as an example, and investigate numerically the chaotic behavior of the system with a periodic forcing. Different routes to chaos such as period doubling, quasi-periodic routes, and the shapes of strange maps.

  3. Digital Image Encryption Algorithm Design Based on Genetic Hyperchaos

    Directory of Open Access Journals (Sweden)

    Jian Wang

    2016-01-01

    Full Text Available In view of the present chaotic image encryption algorithm based on scrambling (diffusion is vulnerable to choosing plaintext (ciphertext attack in the process of pixel position scrambling, we put forward a image encryption algorithm based on genetic super chaotic system. The algorithm, by introducing clear feedback to the process of scrambling, makes the scrambling effect related to the initial chaos sequence and the clear text itself; it has realized the image features and the organic fusion of encryption algorithm. By introduction in the process of diffusion to encrypt plaintext feedback mechanism, it improves sensitivity of plaintext, algorithm selection plaintext, and ciphertext attack resistance. At the same time, it also makes full use of the characteristics of image information. Finally, experimental simulation and theoretical analysis show that our proposed algorithm can not only effectively resist plaintext (ciphertext attack, statistical attack, and information entropy attack but also effectively improve the efficiency of image encryption, which is a relatively secure and effective way of image communication.

  4. Hardware realization of chaos based block cipher for image encryption

    KAUST Repository

    Barakat, Mohamed L.

    2011-12-01

    Unlike stream ciphers, block ciphers are very essential for parallel processing applications. In this paper, the first hardware realization of chaotic-based block cipher is proposed for image encryption applications. The proposed system is tested for known cryptanalysis attacks and for different block sizes. When implemented on Virtex-IV, system performance showed high throughput and utilized small area. Passing successfully in all tests, our system proved to be secure with all block sizes. © 2011 IEEE.

  5. A Color image encryption scheme based on Generalized Synchronization Theorem

    OpenAIRE

    Han shuangshuang

    2013-01-01

    Base on a generalized synchronization theorem (GCS) for discrete chaotic system, this paper introduces a new 6-dimensional generalized chaos synchronization system based on 3D-Lorenz map. Numerical simulation showed that two pair variables of the synchronization system achieve generalized synchronization via a transform H.Combining with the 2-Dimension non equilateral Arnold transformation, a color image encryption scheme was designed. Analyzing the key sensitivity, key space, histogram, info...

  6. Fully Digital Chaotic Differential Equation-based Systems And Methods

    KAUST Repository

    Radwan, Ahmed Gomaa Ahmed

    2012-09-06

    Various embodiments are provided for fully digital chaotic differential equation-based systems and methods. In one embodiment, among others, a digital circuit includes digital state registers and one or more digital logic modules configured to obtain a first value from two or more of the digital state registers; determine a second value based upon the obtained first values and a chaotic differential equation; and provide the second value to set a state of one of the plurality of digital state registers. In another embodiment, a digital circuit includes digital state registers, digital logic modules configured to obtain outputs from a subset of the digital shift registers and to provide the input based upon a chaotic differential equation for setting a state of at least one of the subset of digital shift registers, and a digital clock configured to provide a clock signal for operating the digital shift registers.

  7. Identification of chaotic systems with hidden variables (modified Bock's algorithm)

    International Nuclear Information System (INIS)

    We address the problem of estimating parameters of chaotic dynamical systems from a time series in a situation when some of state variables are not observed and/or the data are very noisy. Using specially developed quantitative criteria, we compare performance of the original multiple shooting approach (Bock's algorithm) and its modified version. The latter is shown to be significantly superior for long chaotic time series. In particular, it allows to obtain accurate estimates for much worse starting guesses for the estimated parameters

  8. Adaptive projective synchronization between different chaotic systems with parametric uncertainties and external disturbances

    Indian Academy of Sciences (India)

    Mayank Srivastava; Saurabh K Agrawal; Subir Das

    2013-09-01

    The article deals with adaptive projective synchronization between two different chaotic systems with parametric uncertainties and external disturbances. Based on Lyapunov stability theory, the projective synchronization between a pair of different chaotic systems with fully unknown parameters are derived. An adaptive control law and a parameter update rule for uncertain parameters are designed such that the chaotic response system controls the chaotic drive system. Numerical simulation results are performed to explain the effectiveness and feasibility of the techniques.

  9. Chaotic Dynamics and Transport in Classical and Quantum Systems

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2003-07-01

    The aim of this summer school is to provide a set of extended and pedagogical lectures, on the major present-day topics in dynamical systems and statistical mechanics including applications. Some articles are dedicated to chaotic transport in plasma turbulence and to quantum chaos. This document gathers the summaries of some presentations.

  10. Synchronization in driven chaotic systems: Diagnostics and bifurcations

    DEFF Research Database (Denmark)

    Vadivasova, T.E.; Balanov, A.G.; Sosnovtseva, O.V.; Postnov, D.E.; Mosekilde, Erik

    We investigate generic aspects of chaos synchronization in an externally forced Rössler system. By comparing different diagnostic methods, we show the existence of a well-defined cut-off of synchronization associated with the transition from weak to fully developed chaos. Two types of chaotic...

  11. Multiscality in the Dynamics of Coupled Chaotic Systems

    DEFF Research Database (Denmark)

    Pavlov, A.N.; Sosnovtseva, Olga; Ziganshin, A.R.; Holstein-Rathlou, N.H.; Mosekilde, Erik

    We investigate the scaling features of complex motions in systems of two coupled chaotic oscillators by means of the wavelet-transform modulus maxima method and the detrended fluctuation analysis. We show that the transition from asynchronous to synchronous dynamics typically reduces the degree of...

  12. Synchronization in driven chaotic systems: Diagnostics and bifurcations

    DEFF Research Database (Denmark)

    Vadivasova, T.E.; Balanov, A.G.; Sosnovtseva, O.V.; Postnov, D.E.; Mosekilde, Erik

    We investigate generic aspects of chaos synchronization in an externally forced Rössler system. By comparing different diagnostic methods, we show the existence of a well-defined cut-off of synchronization associated with the transition from weak to fully developed chaos. Two types of chaotic beh...... behavior, differing by the number of vanishing Lyapunov exponents, are observed outside the synchronization regime....

  13. Intrinsic Chaoticity in Stable Classical Systems and Quantum Fluctuations

    CERN Document Server

    De Martino, S; Illuminati, F

    1997-01-01

    We postulate the existence of a universal Keplerian tremor for any stable classical complex system on every scale. Deriving the characteristic unit of action $\\alpha$ for each classical interaction, we obtain in all cases $\\alpha connected to an intrinsic chaoticity needed to assure stability of matter. Introducing temperature, we provide further consistency checks corroborating our hypothesis.

  14. Chaotic Dynamics and Transport in Classical and Quantum Systems

    International Nuclear Information System (INIS)

    The aim of this summer school is to provide a set of extended and pedagogical lectures, on the major present-day topics in dynamical systems and statistical mechanics including applications. Some articles are dedicated to chaotic transport in plasma turbulence and to quantum chaos. This document gathers the summaries of some presentations

  15. Stochastic versus chaotic dynamics in a deterministic system

    International Nuclear Information System (INIS)

    The authors analyze a dynamical system whose time evolution depends on an externally controlled model parameter. The authors observe that the introduction of state-dependent perturbations induces a variety of phenomena which can have either a chaotic or stochastic nature. They analyze the sensitivity of the dynamics and the underlying attractors to the strength, frequency, and time correlations of the external perturbations

  16. Multiscality in the Dynamics of Coupled Chaotic Systems

    DEFF Research Database (Denmark)

    Pavlov, A.N.; Sosnovtseva, Olga; Ziganshin, A.R.;

    2002-01-01

    We investigate the scaling features of complex motions in systems of two coupled chaotic oscillators by means of the wavelet-transform modulus maxima method and the detrended fluctuation analysis. We show that the transition from asynchronous to synchronous dynamics typically reduces the degree o...

  17. Encryption for digital content

    CERN Document Server

    Kiayias, Aggelos

    2010-01-01

    Encryption for Digital Content is an area in cryptography that is widely used in commercial productions (e.g., Blu-Ray and HD-DVDs). This book provides a comprehensive mathematical treatment of combinatorial encryption techniques used in digital content distribution systems and related attack models. A complete description of broadcast encryption with various revocation and tracing functionalities is included. ""Encryption for Digital Content"" introduces the subset cover framework (currently used in AACS, Blu-Ray and HD-DVDs,) and tracking/revocation mechanisms in various attack models. Pirat

  18. Nonlinear Filtering Preserves Chaotic Synchronization via Master-Slave System

    OpenAIRE

    J. S. González-Salas; E. Campos-Cantón; Ordaz-Salazar, F. C.; Jiménez-López, E.

    2013-01-01

    We present a study on a class of interconnected nonlinear systems and give some criteria for them to behave like a filter. Some chaotic systems present this kind of interconnected nonlinear structure, which enables the synchronization of a master-slave system. Interconnected nonlinear filters have been defined in terms of interconnected nonlinear systems. Furthermore, their behaviors have been studied numerically and theoretically on different input signals.

  19. Nonlinear Filtering Preserves Chaotic Synchronization via Master-Slave System

    Directory of Open Access Journals (Sweden)

    J. S. González-Salas

    2013-01-01

    Full Text Available We present a study on a class of interconnected nonlinear systems and give some criteria for them to behave like a filter. Some chaotic systems present this kind of interconnected nonlinear structure, which enables the synchronization of a master-slave system. Interconnected nonlinear filters have been defined in terms of interconnected nonlinear systems. Furthermore, their behaviors have been studied numerically and theoretically on different input signals.

  20. Hybrid optical-digital encryption system based on wavefront coding paradigm

    Science.gov (United States)

    Konnik, Mikhail V.

    2012-04-01

    The wavefront coding is a widely used in the optical systems to compensate aberrations and increase the depth of field. This paper presents experimental results on application of the wavefront coding paradigm for data encryption. We use a synthesised diffractive optical element (DOE) to deliberately introduce a phase distortion during the images registration process to encode the acquired image. In this case, an optical convolution of the input image with the point spread function (PSF) of the DOE is registered. The encryption is performed optically, and is therefore is fast and secure. Since the introduced distortion is the same across the image, the decryption is performed digitally using deconvolution methods. However, due to noise and finite accuracy of a photosensor, the reconstructed image is degraded but still readable. The experimental results, which are presented in this paper, indicate that the proposed hybrid optical-digital system can be implemented as a portable device using inexpensive off-the-shelf components. We present the results of optical encryption and digital restoration with quantitative estimations of the images quality. Details of hardware optical implementation of the hybrid optical-digital encryption system are discussed.

  1. Multilevel Image Encryption

    OpenAIRE

    S Rakesh; Kaller, Ajitkumar A; Shadakshari, B. C.; Annappa, B.

    2012-01-01

    With the fast evolution of digital data exchange and increased usage of multi media images, it is essential to protect the confidential image data from unauthorized access. In natural images the values and position of the neighbouring pixels are strongly correlated. The method proposed in this paper, breaks this correlation increasing entropy of the position and entropy of pixel values using block shuffling and encryption by chaotic sequence respectively. The plain-image is initially row wise...

  2. The synchronization for time-delay of linearly bidirectional coupled chaotic system

    International Nuclear Information System (INIS)

    Based on Lyapunov stability theory and matrix measure, this paper presents a new generic criterion of global chaotic synchronization for bidirectional coupled chaotic system with time-delay. A new chaotic system with four-scroll attractor is chosen as an example to verify the effectiveness of the criterion. Numerical simulation are shown for demonstration

  3. Contraction theory based adaptive synchronization of chaotic systems

    International Nuclear Information System (INIS)

    Contraction theory based stability analysis exploits the incremental behavior of trajectories of a system with respect to each other. Application of contraction theory provides an alternative way for stability analysis of nonlinear systems. This paper considers the design of a control law for synchronization of certain class of chaotic systems based on backstepping technique. The controller is selected so as to make the error dynamics between the two systems contracting. Synchronization problem with and without uncertainty in system parameters is discussed and necessary stability proofs are worked out using contraction theory. Suitable adaptation laws for unknown parameters are proposed based on the contraction principle. The numerical simulations verify the synchronization of the chaotic systems. Also parameter estimates converge to their true values with the proposed adaptation laws.

  4. Output synchronization of chaotic systems under nonvanishing perturbations

    Energy Technology Data Exchange (ETDEWEB)

    Lopez-Mancilla, Didier [Departamento de Ciencias Exactas y Tecnologicas, Centro Universitario de los Lagos, Universidad de Guadalajara (CULagos-UdeG), Enrique Diaz de Leon s/n, 47460 Lagos de Moreno, Jal. (Mexico)], E-mail: didier@uabc.mx; Cruz-Hernandez, Cesar [Electronics and Telecommunications Department, Scientific Research and Advanced Studies of Ensenada (CICESE), Km. 107, Carretera Tijuana-Ensenada, 22860 Ensenada, B.C. (Mexico)], E-mail: ccruz@cicese.mx

    2008-08-15

    In this paper, an analysis for chaos synchronization under nonvanishing perturbations is presented. In particular, we use model-matching approach from nonlinear control theory for output synchronization of identical and nonidentical chaotic systems under nonvanishing perturbations in a master-slave configuration. We show that the proposed approach is indeed suitable to synchronize a class of perturbed slaves with a chaotic master system; that is the synchronization error trajectories remain bounded if the perturbations satisfy some conditions. In order to illustrate this robustness synchronization property, we present two cases of study: (i) for identical systems, a pair of coupled Roessler systems, the first like a master and the other like a perturbed slave, and (ii) for nonidentical systems, a Chua's circuit driving a Roessler/slave system with a perturbed control law, in both cases a quantitative analysis on the perturbation is included.

  5. Function Vector Synchronization of Uncertain Chaotic Systems with Parameters Variable

    OpenAIRE

    Wei Xiang; Heng Liu; Ning Li; Hui Lv

    2012-01-01

    In this study, a state variable Function Vector Synchronization (FVS) of two non-identical chaotic systems with both varying parameters and delay is investigated. Based on feedback principle and Lyapunov stability theory, the adaptive fuzzy controller is constructed. The synchronization for the state variable function vector of systems can be reached by using the proposed controller. The control is robust for varying parameters and disturbance of systems. Compared with the traditional synchro...

  6. Communicating via robust synchronization of chaotic lasers

    Energy Technology Data Exchange (ETDEWEB)

    Lopez-Gutierrez, R.M. [Engineering Faculty, Baja California Autonomous University (UABC), Km. 103 Carret. Tij-Ens., 22860 Ensenada, B.C. (Mexico); Posadas-Castillo, C. [Engineering Faculty, Baja California Autonomous University (UABC), Km. 103 Carret. Tij-Ens., 22860 Ensenada, B.C. (Mexico); FIME, Autonomous University of Nuevo Leon (UANL), Pedro de Alba, S.N., Cd. Universitaria, San Nicolas de los Garza, NL (Mexico); Lopez-Mancilla, D. [Departamento de Ciencias Exactas y Tecnologicas, Centro Universitario de los Lagos, Universidad de Guadalajara (CULagos-UdeG), Enrique Diaz de Leon s/n, 47460 Lagos de Moreno, Jal. (Mexico); Cruz-Hernandez, C. [Electronics and Telecommunications Department, Scientific Research and Advanced Studies of Ensenada (CICESE), Km. 107 Carret. Tij-Ens., 22860 Ensenada, B.C. (Mexico)], E-mail: ccruz@cicese.mx

    2009-10-15

    In this paper, the robust synchronization problem for coupled chaotic Nd:YAG lasers is addressed. We resort to complex systems theory to achieve chaos synchronization. Based on stability theory, it is shown that the state trajectories of the perturbed error synchronization are ultimately bounded, provided the unperturbed synchronization error system is exponentially stable, and some conditions on the bounds of the perturbation terms are satisfied. So that, encoding, transmission, and decoding in chaotic optical communications are presented. We analyze the transmission and recovery of encrypted information when parameter mismatches are considered. Computer simulations are provided to show the effectiveness of this robustness synchronization property, we present the encrypted transmission of image messages, and we show that, the transmitted image is faithfully recovered.

  7. Communicating via robust synchronization of chaotic lasers

    International Nuclear Information System (INIS)

    In this paper, the robust synchronization problem for coupled chaotic Nd:YAG lasers is addressed. We resort to complex systems theory to achieve chaos synchronization. Based on stability theory, it is shown that the state trajectories of the perturbed error synchronization are ultimately bounded, provided the unperturbed synchronization error system is exponentially stable, and some conditions on the bounds of the perturbation terms are satisfied. So that, encoding, transmission, and decoding in chaotic optical communications are presented. We analyze the transmission and recovery of encrypted information when parameter mismatches are considered. Computer simulations are provided to show the effectiveness of this robustness synchronization property, we present the encrypted transmission of image messages, and we show that, the transmitted image is faithfully recovered.

  8. Improvement of Networked Control Systems Performance Using a New Encryption Algorithm

    Directory of Open Access Journals (Sweden)

    Seyed Ali Mesbahifard

    2014-07-01

    Full Text Available Networked control systems are control systems which controllers and plants are connected via telecommunication network. One of the most important challenges in networked control systems is the problem of network time delay. Increasing of time delay may affect on control system performance extremely. Other important issue in networked control systems is the security problems. Since it is possible that unknown people access to network especially Internet, the probability of terrible attacks such as deception attacks is greater, therefore presentation of methods which could decrease time delay and increase system immunity are desired. In this paper a symmetric encryption with low data volume against deception attacks is proposed. This method has high security and low time delay rather than the other encryption algorithms and could improve the control system performance against deception attacks.

  9. Communicating with noise: How chaos and noise combine to generate secure encryption keys

    Science.gov (United States)

    Minai, Ali A.; Pandian, T. Durai

    1998-09-01

    An approach for the secure transmission of encrypted messages using chaos and noise is presented in this paper. The method is based on the synchronization of certain types of chaotic oscillators in response to a common noise input. This allows two distant oscillators to generate identical output which can be used as a key for encryption and decryption of a message signal. The noiselike synchronizing input—which contains no message information—is communicated to identical oscillators in the transmitter and the receiver over a public channel. The encrypted message is also sent over a public channel, while the key is never transmitted at all. The chaotic nature of the oscillators which generate the key and the randomness of the signal driving the process combine to make the recovery of the key by an eavesdropper extremely difficult. We evaluate system performance with respect to security and robustness and show that a robust and secure system can be obtained.

  10. On "Universal" Correlations in Disordered and Chaotic Systems

    OpenAIRE

    Zakrzewski, Jakub

    1995-01-01

    Numerical study of the parametric motion of energy levels in a model system built on Random Matrix Theory is presented. The correlation function of levels' slopes (the so called velocity correlation function) is determined numerically and compared with its limiting analytic form when available. A simple analytic form of the velocity correlation function is proposed which very well reproduces numerical data. The results should be directly applicable in studies of chaotic or mesoscopic systems.

  11. Design and Implementation of a Wireless Speech Chaotic Secure Communication System%一种无线语音混沌保密通信系统的设计与实现

    Institute of Scientific and Technical Information of China (English)

    徐礼国; 禹思敏

    2011-01-01

    In order to implement wireless transmission and decryption playback of the encrypted chaotic speech signals,based on the system hardware platform which is consisted of DSP chip TMS320VC5509A, radio frequency chip nRF24L01 and audio codec chip TLV320AIC23, the Euler algorithm is used to discretize the continuous Lorenz chaotic system for genetating chaotic digital sequences, which are used for encryption and decryption.The experiment of wireless transmission is performed on the encrypted speech signals, and the receiver can decrypt the encrypted speech signals.The witeless chaotic secure communication of speech signals is achieved.%为了实现对混沌加密语音信号的无线传输和解密回放,在由DSP芯片TMS320VC5509A、无线射频芯片nRF24L01和音频编解码芯片TLV320AIC23构成的系统硬件平台上,采用Euler算法对连续Lorenz混沌系统进行离散化处理,产生出用于加密和解密的混沌数字序列.对加密后的语音信号进行了无线传输的实验,接收端能够将收到的加密语音信号解密回放,实现了语音信号的无线混沌保密通信.

  12. Intelligent Controller for Synchronization New Three Dimensional Chaotic System

    Directory of Open Access Journals (Sweden)

    Alireza Sahab

    2014-07-01

    Full Text Available One of the most important phenomena of some systems is chaos which is caused by nonlinear dynamics. In this paper, the new 3 dimensional chaotic system is first investigated and then utilized an intelligent controller based on brain emotional learning (BELBIC, this new chaotic system is synchronized. The BELBIC consists of reward signal which accepts positive values. Improper selection of the parameters causes an improper behavior which may cause serious problems such as instability of the system. It is needed to optimize these parameters. Genetic Algorithm (GA, Cuckoo Optimization Algorithm (COA, Particle Swarm Optimization Algorithm (PSO and Imperialist Competitive Algorithm (ICA are used to compute the optimal parameters for the reward signal of BELBIC. These algorithms can select appropriate and optimal values for the parameters. These minimize the Cost Function, so the optimal values for the parameters will be founded. Selected cost function is defined to minimizing the least square errors. Cost function enforces the system errors to decay to zero rapidly. Numerical simulation will show that this method much better, faster and more effective than previous methods can be new 3D chaotic system mode to bring synchronized.

  13. A Retrospection of Chaotic Phenomena in Electrical Systems

    Directory of Open Access Journals (Sweden)

    Umesh Kumar

    1998-01-01

    Full Text Available In the last decade new phenomena have been observed in all areas of non linear dynamics, principal among these being ‘Chaotic phenomena’. Chaos has been reported virtually from every scientific discipline. This paper summarizes a study of the chaotic phenomena in electrical systems and attempts to translate the mathematical ideas and techniques into language that engineers and applied scientists can use to study ‘Chaos’. Towards this end, the paper has summarized the study of chaos in several examples like Chua’s circuit family; Folded Torus circuit; non-autonomous circuits; switched capacitor circuits and hyper-chaos circuits. As observed in power systems, control systems and digital filters, chaos has been exhibited and shown on examples.

  14. Parameter estimation for chaotic systems by particle swarm optimization

    International Nuclear Information System (INIS)

    Parameter estimation for chaotic systems is an important issue in nonlinear science and has attracted increasing interests from various research fields, which could be essentially formulated as a multi-dimensional optimization problem. As a novel evolutionary computation technique, particle swarm optimization (PSO) has attracted much attention and wide applications, owing to its simple concept, easy implementation and quick convergence. However, to the best of our knowledge, there is no published work on PSO for estimating parameters of chaotic systems. In this paper, a PSO approach is applied to estimate the parameters of Lorenz system. Numerical simulation and the comparisons demonstrate the effectiveness and robustness of PSO. Moreover, the effect of population size on the optimization performances is investigated as well

  15. Spectral statistics of chaotic many-body systems

    Science.gov (United States)

    Dubertrand, Rémy; Müller, Sebastian

    2016-03-01

    We derive a trace formula that expresses the level density of chaotic many-body systems as a smooth term plus a sum over contributions associated to solutions of the nonlinear Schrödinger (or Gross-Pitaevski) equation. Our formula applies to bosonic systems with discretised positions, such as the Bose-Hubbard model, in the semiclassical limit as well as in the limit where the number of particles is taken to infinity. We use the trace formula to investigate the spectral statistics of these systems, by studying interference between solutions of the nonlinear Schrödinger equation. We show that in the limits taken the statistics of fully chaotic many-particle systems becomes universal and agrees with predictions from the Wigner-Dyson ensembles of random matrix theory. The conditions for Wigner-Dyson statistics involve a gap in the spectrum of the Frobenius-Perron operator, leaving the possibility of different statistics for systems with weaker chaotic properties.

  16. THRIVE: threshold homomorphic encryption based secure and privacy preserving biometric verification system

    Science.gov (United States)

    Karabat, Cagatay; Kiraz, Mehmet Sabir; Erdogan, Hakan; Savas, Erkay

    2015-12-01

    In this paper, we introduce a new biometric verification and template protection system which we call THRIVE. The system includes novel enrollment and authentication protocols based on threshold homomorphic encryption where a private key is shared between a user and a verifier. In the THRIVE system, only encrypted binary biometric templates are stored in a database and verification is performed via homomorphically randomized templates, thus, original templates are never revealed during authentication. Due to the underlying threshold homomorphic encryption scheme, a malicious database owner cannot perform full decryption on encrypted templates of the users in the database. In addition, security of the THRIVE system is enhanced using a two-factor authentication scheme involving user's private key and biometric data. Using simulation-based techniques, the proposed system is proven secure in the malicious model. The proposed system is suitable for applications where the user does not want to reveal her biometrics to the verifier in plain form, but needs to prove her identity by using biometrics. The system can be used with any biometric modality where a feature extraction method yields a fixed size binary template and a query template is verified when its Hamming distance to the database template is less than a threshold. The overall connection time for the proposed THRIVE system is estimated to be 336 ms on average for 256-bit biometric templates on a desktop PC running with quad core 3.2 GHz CPUs at 10 Mbit/s up/down link connection speed. Consequently, the proposed system can be efficiently used in real-life applications.

  17. Complete chaotic synchronization in mutually coupled time-delay systems.

    Science.gov (United States)

    Landsman, Alexandra S; Schwartz, Ira B

    2007-02-01

    Complete chaotic synchronization of end lasers has been observed in a line of mutually coupled, time-delayed system of three lasers, with no direct communication between the end lasers. The present paper uses ideas from generalized synchronization to explain the complete synchronization in the presence of long coupling delays, applied to a model of mutually coupled semiconductor lasers in a line. These ideas significantly simplify the analysis by casting the stability in terms of the local dynamics of each laser. The variational equations near the synchronization manifold are analyzed, and used to derive the synchronization condition that is a function of parameters. The results explain and predict the dependence of synchronization on various parameters, such as time delays, strength of coupling and dissipation. The ideas can be applied to understand complete synchronization in other chaotic systems with coupling delays and no direct communication between synchronized subsystems. PMID:17358399

  18. Chaotic time series. Part II. System Identification and Prediction

    Directory of Open Access Journals (Sweden)

    Bjørn Lillekjendlie

    1994-10-01

    Full Text Available This paper is the second in a series of two, and describes the current state of the art in modeling and prediction of chaotic time series. Sample data from deterministic non-linear systems may look stochastic when analysed with linear methods. However, the deterministic structure may be uncovered and non-linear models constructed that allow improved prediction. We give the background for such methods from a geometrical point of view, and briefly describe the following types of methods: global polynomials, local polynomials, multilayer perceptrons and semi-local methods including radial basis functions. Some illustrative examples from known chaotic systems are presented, emphasising the increase in prediction error with time. We compare some of the algorithms with respect to prediction accuracy and storage requirements, and list applications of these methods to real data from widely different areas.

  19. The Robustness Optimization of Parameter Estimation in Chaotic Control Systems

    Directory of Open Access Journals (Sweden)

    Zhen Xu

    2014-10-01

    Full Text Available Standard particle swarm optimization algorithm has problems of bad adaption and weak robustness in the parameter estimation model of chaotic control systems. In light of this situation, this paper puts forward a new estimation model based on improved particle swarm optimization algorithm. It firstly constrains the search space of the population with Tent and Logistic double mapping to regulate the initialized population size, optimizes the fitness value by evolutionary state identification strategy so as to avoid its premature convergence, optimizes the inertia weight by the nonlinear decrease strategy to reach better global and local optimal solution, and then optimizes the iteration of particle swarm optimization algorithm with the hybridization concept from genetic algorithm. Finally, this paper applies it into the parameter estimation of chaotic systems control. Simulation results show that the proposed parameter estimation model shows higher accuracy, anti-noise ability and robustness compared with the model based on standard particle swarm optimization algorithm.

  20. Electro-optic intensity chaotic system with varying parameters

    Science.gov (United States)

    Hu, Hanping; Su, Wei; Liu, Lingfeng; Yu, Zhiliang

    2014-01-01

    We propose a kind of chaotic system based on electro-optical oscillator with varying parameters, the results show that the system can enter chaos with a low gain, and can hide the delay time effectively. Furthermore, the system is more complex than the general one (with higher Lyapunov exponents and dimension). The system can achieve synchronous communication with information rate 10 Gbit/s, in 400 km optical fiber transmission distance. Furthermore, we find the system is more sensitive than the conventional system when the delay time is mismatched.

  1. Synchronization of complex chaotic systems in series expansion form

    International Nuclear Information System (INIS)

    This paper studies the synchronization of complex chaotic systems in series expansion form by Lyapunov asymptotical stability theorem. A sufficient condition is given for the asymptotical stability of an error dynamics, and is applied to guiding the design of the secure communication. Finally, numerical results are studied for the Quantum-CNN oscillators synchronizing with unidirectional/bidirectional linear coupling to show the effectiveness of the proposed synchronization strategy

  2. Synchronization of complex chaotic systems in series expansion form

    Energy Technology Data Exchange (ETDEWEB)

    Ge Zhengming [Department of Mechanical Engineering, National Chiao Tung University, 1001 Ta Hsueh Road, Hsinchu 300, Taiwan (China)]. E-mail: zmg@cc.nctu.edu.tw; Yang Chenghsiung [Department of Mechanical Engineering, National Chiao Tung University, 1001 Ta Hsueh Road, Hsinchu 300, Taiwan (China)

    2007-12-15

    This paper studies the synchronization of complex chaotic systems in series expansion form by Lyapunov asymptotical stability theorem. A sufficient condition is given for the asymptotical stability of an error dynamics, and is applied to guiding the design of the secure communication. Finally, numerical results are studied for the Quantum-CNN oscillators synchronizing with unidirectional/bidirectional linear coupling to show the effectiveness of the proposed synchronization strategy.

  3. Preference of Chaotic Synchronization in a Coupled Laser System

    Institute of Scientific and Technical Information of China (English)

    ZHOU Yun; ZHU Shi-Qun; WU Liang

    2005-01-01

    In a coupled laser system, the dynamics of the receiving laser is investigated when two separate transmitting lasers are injected into the receiving laser with different coupling strengths. It is shown that the phenomenon of preference of chaotic synchronization appears under appropriate coupling conditions. The receiving laser will entrain the pulses of either one or both transmitting lasers when the coupling is strong while it keeps its own dynamics when the coupling is weak.

  4. Generation and control of multi-scroll chaotic attractors in fractional order systems

    International Nuclear Information System (INIS)

    The objective of this paper is twofold: on one hand we demonstrate the generation of multi-scroll attractors in fractional order chaotic systems. Then, we design state feedback controllers to eliminate chaos from the system trajectories. It is demonstrated that modifying the underlying nonlinearity of the fractional chaotic system results in the birth of multiple chaotic attractors, thus forming the so called multi-scroll attractors. The presence of chaotic behavior is evidenced by a positive largest Lyapunov exponent computed for the output time series. We investigate generation and control of multi-scroll attractors in two different models, both of which are fractional order and chaotic: an electronic oscillator, and a mechanical 'jerk' model. The current findings extend previously reported results on generation of n-scroll attractors from the domain of integer order to the domain of fractional order chaotic systems, and addresses the issue of controlling such chaotic behaviors. Our investigations are validated through numerical simulations

  5. A kind of fuzzy control for chaotic systems

    Institute of Scientific and Technical Information of China (English)

    WANG Hong-wei; MA Guang-fu

    2007-01-01

    With a T-S fuzzy dynamic model approximating to a non-linear system, the nonlinear system can be decomposed into some local linear models. A variable structure controller based on Lyapunov theories is designed to guarantee the global stability of the T-S fuzzy model. The controlling problems of a nonlinear system can be solved by means of consisting of linear system variable structure control and fuzzy control. The validity of the control method based on the simulating result of two kinds of chaotic systems is shown here.

  6. Robust Blind Adaptive Channel Equalization in Chaotic Communication Systems

    Institute of Scientific and Technical Information of China (English)

    ZHANG Jia-Shu

    2006-01-01

    Based on the bounded property and statistics of chaotic signal and the idea of set-membership identification,we propose a set-membership generalized least mean square (SM-GLMS) algorithm with variable step size for blind adaptive channel equalization in chaotic communication systems. The steady state performance of the proposed SM-GLMS algorithm is analysed, and comparison with an extended Kalman filter (EKF)-based adaptive algorithm and variable gain least mean square (VG-LMS) algorithm is performed for blind adaptive channel equalization. Simulations show that the proposed SM-GLMS algorithm can provide more significant steady state performance improvement than the EKF-based adaptive algorithm and VG-LMS algorithm.

  7. A Modified Location-Dependent Image Encryption for Mobile Information System

    OpenAIRE

    Prasad Reddy P.V.G.D; K.R.Sudha; P Sanyasi Naidu

    2010-01-01

    The wide spread use of WLAN (Wireless LAN) and the popularity of mobile devices increases the frequency of data transmission among mobile users. In such scenario, a need for Secure Communication arises. Secure communication is possible through encryption of data. A lot of encryption techniques have evolved over time. However, most of the data encryption techniques are location-independent. Data encrypted with such techniques can be decrypted anywhere. The encryption technology cannot restrict...

  8. Analysis and adaptive control of a novel 3-D conservative no-equilibrium chaotic system

    Directory of Open Access Journals (Sweden)

    Vaidyanathan Sundarapandian

    2015-09-01

    Full Text Available First, this paper announces a seven-term novel 3-D conservative chaotic system with four quadratic nonlinearities. The conservative chaotic systems are characterized by the important property that they are volume conserving. The phase portraits of the novel conservative chaotic system are displayed and the mathematical properties are discussed. An important property of the proposed novel chaotic system is that it has no equilibrium point. Hence, it displays hidden chaotic attractors. The Lyapunov exponents of the novel conservative chaotic system are obtained as L1 = 0.0395,L2 = 0 and L3 = −0.0395. The Kaplan-Yorke dimension of the novel conservative chaotic system is DKY =3. Next, an adaptive controller is designed to globally stabilize the novel conservative chaotic system with unknown parameters. Moreover, an adaptive controller is also designed to achieve global chaos synchronization of the identical conservative chaotic systems with unknown parameters. MATLAB simulations have been depicted to illustrate the phase portraits of the novel conservative chaotic system and also the adaptive control results.

  9. A NEW SLIDING MODE CONTROL FOR A CLASS OF UNCERTAIN TIME-DELAY CHAOTIC SYSTEMS

    Institute of Scientific and Technical Information of China (English)

    LI LI-XIANG; PENG HAI-PENG; GUAN BAO-ZHU; XU JIN-MING

    2001-01-01

    We propose a new sliding mode control scheme for a class of uncertain time-delay chaotic systems. It is shown that a linear time invariant system with the desired system dynamics is used as a reference model for the output of a time-delay chaotic system to track. A sliding mode controller is then designed to drive the output of the time-delay chaotic system to track the desired linear system. On the sliding mode, the output of the controlled time-delay chaotic system can behave like the desired linear system. A simulation example is given in support of the proposed control scheme.

  10. Experimental optical encryption system based on a single-lens imaging architecture combined with a phase retrieval algorithm

    International Nuclear Information System (INIS)

    We propose, and experimentally demonstrate, a single-lens imaging system as a compact encoding architecture by using a hybrid protocol for data processing. The encryption process consists of coherent light illuminating a random phase mask attached to an input image (the data), then the outgoing complex field propagates until reaching a second random phase mask next to a lens: encrypted data is obtained at some output plane after the lens. We demonstrate the feasibility of this proposal, and highlight the advantages of using tridimensional speckle as a secure random carrier instead of a standard ciphertext recording—holographic-based encryption techniques. Moreover, we expose the compact system benefits compared to conventional encrypting architectures in terms of energy loss and tolerance against classical attacks applicable to any linear cryptosystem. Experimental results validate our approach. (paper)

  11. Chaos Enhanced Differential Evolution in the Task of Evolutionary Control of Selected Set of Discrete Chaotic Systems

    Directory of Open Access Journals (Sweden)

    Roman Senkerik

    2014-01-01

    Full Text Available Evolutionary technique differential evolution (DE is used for the evolutionary tuning of controller parameters for the stabilization of set of different chaotic systems. The novelty of the approach is that the selected controlled discrete dissipative chaotic system is used also as the chaotic pseudorandom number generator to drive the mutation and crossover process in the DE. The idea was to utilize the hidden chaotic dynamics in pseudorandom sequences given by chaotic map to help differential evolution algorithm search for the best controller settings for the very same chaotic system. The optimizations were performed for three different chaotic systems, two types of case studies and developed cost functions.

  12. A Novel Image Encryption Algorithm Based on DNA Encoding and Spatiotemporal Chaos

    Directory of Open Access Journals (Sweden)

    Chunyan Song

    2015-10-01

    Full Text Available DNA computing based image encryption is a new, promising field. In this paper, we propose a novel image encryption scheme based on DNA encoding and spatiotemporal chaos. In particular, after the plain image is primarily diffused with the bitwise Exclusive-OR operation, the DNA mapping rule is introduced to encode the diffused image. In order to enhance the encryption, the spatiotemporal chaotic system is used to confuse the rows and columns of the DNA encoded image. The experiments demonstrate that the proposed encryption algorithm is of high key sensitivity and large key space, and it can resist brute-force attack, entropy attack, differential attack, chosen-plaintext attack, known-plaintext attack and statistical attack.

  13. An optical authentication system based on encryption technique and multimodal biometrics

    Science.gov (United States)

    Yuan, Sheng; Zhang, Tong; Zhou, Xin; Liu, Xuemei; Liu, Mingtang

    2013-12-01

    A major concern nowadays for a biometric credential management system is its potential vulnerability to protect its information sources. To prevent a genuine user's templates from both internal and external threats, a novel and simple method combined optical encryption with multimodal biometric authentication technique is proposed. In this method, the standard biometric templates are generated real-timely by the verification keys owned by legal user so that they are unnecessary to be stored in a database. Compared with the traditional recognition algorithms, storage space and matching time are greatly saved. In addition, the verification keys are difficult to be forged due to the utilization of optical encryption technique. Although the verification keys are lost or stolen, they are useless for others in absence of the legal owner's biometric. A series of numerical simulations are performed to demonstrate the feasibility and performance of this method.

  14. Low-power Implementation of an Encryption/Decryption System with Asynchronous Techniques

    Directory of Open Access Journals (Sweden)

    Nikos Sklavos

    2002-01-01

    Full Text Available An asynchronous VLSI implementation of the International Data Encryption Algorithm (IDEA is presented in this paper. In order to evaluate the asynchronous design a synchronous version of the algorithm was also designed. VHDL hardware description language was used in order to describe the algorithm. By using Synopsys commercial available tools the VHDL code was synthesized. After placing and routing both designs were fabricated with 0.6 μm CMOS technology. With a system clock of up to 8 MHz and a power supply of 5 V the two chips were tested and evaluated comparing with the software implementation of the IDEA algorithm. This new approach proves efficiently the lowest power consumption of the asynchronous implementation compared to the existing synchronous. Therefore, the asynchronous chip performs efficiently in Wireless Encryption Protocols and high speed networks.

  15. An Information-Theoretic Analysis of the Security of Communication Systems Employing the Encoding-Encryption Paradigm

    OpenAIRE

    Oggier, Frederique; Mihaljevic, Miodrag J.

    2010-01-01

    This paper proposes a generic approach for providing enhanced security to communication systems which encode their data for reliability before encrypting it through a stream cipher for security. We call this counter-intuitive technique the {\\em encoding-encryption} paradigm, and use as motivating example the standard for mobile telephony GSM. The enhanced security is based on a dedicated homophonic or wire-tap channel coding that introduces pure randomness, combined with the randomness of the...

  16. Chaotic dynamics in N-body systems

    NARCIS (Netherlands)

    Boekholt, Tjarda Coenraad Nico

    2015-01-01

    Ever since Isaac Newton in 1687 posed the N-body problem, astronomers have been looking for its solutions in order to understand the evolution of dynamical systems, such as our own solar system, star clusters and galaxies. The main difficulty is that small errors grow exponentially, so that numerica

  17. Modified chaotic shift keying using indirect coupled chaotic synchronization for secure digital communication

    OpenAIRE

    Kharel, Rupak; Busawon, Krishna; Ghassemlooy, Zabih

    2010-01-01

    In this paper, a modified chaotic shift keying method is proposed to transmit digital bits securely over a communication channel. The scheme is based upon encrypting the digital bits 0 and 1 into infinite levels by applying the keystream such that there is no recognisable pattern in the encoded transmitted signal. The encoded transmitting signal generated is shown to resist popular attack method therefore realizing a secure and trustworthy digital communication system.

  18. Adaptive control of uncertain time-delay chaotic systems

    Institute of Scientific and Technical Information of China (English)

    Zhuhong ZHANG

    2005-01-01

    This work investigates adaptive control of a large class of uncertain me-delay chaotic systems (UTCSs) with unknown general perturbation terms bounded by a polynomial ( unknown gains). Associated with the different cases of known and unknown system matrices, two corresponding adaptive controllers are proposed to stabilize unstable fixed points of the systems by means of Lyapunov stability theory and linear matrix inequalities (LMI) which can be solved easily by convex optimization algorithms. Two examples are used for examining the effectiveness of the proposed methods.

  19. Synchronization of Discrete-Time Chaotic Systems in Bandlimited Channels

    Directory of Open Access Journals (Sweden)

    Marcio Eisencraft

    2009-01-01

    Full Text Available Over the last couple of decades, many methods for synchronizing chaotic systems have been proposed with communications applications in view. Yet their performance has proved disappointing in face of the nonideal character of usual channels linking transmitter and receiver, that is, due to both noise and signal propagation distortion. Here we consider a discrete-time master-slave system that synchronizes despite channel bandwidth limitations and an allied communication system. Synchronization is achieved introducing a digital filter that limits the spectral content of the feedback loop responsible for producing the transmitted signal.

  20. Communications by synchronization of spatially symmetric chaotic systems

    Science.gov (United States)

    González-Miranda, J. M.

    1999-01-01

    A scheme for transmission of information based on synchronization of low-dimensional chaotic systems by unidirectional coupling is presented. It is based on the fact that systems that exhibit certain phase-space symmetries may present as many generalized synchronization states as the order of the symmetries that are present [J.M. González-Miranda, Phys. Rev. E 53 (1996) 5656]. The multistability of this type of systems is used in this work to design a secure communication scheme, where security is based on the use of a key in the receiver to decode the message.

  1. Chaotic Phenomena in Technical Control Systems

    DEFF Research Database (Denmark)

    Mosekilde, Erik

    The paper discusses a number of examples of technical control systems that can exhibit deterministic chaos and other forms of complex nonlinear behavior. These examples include thermostatically regulated radiators, closely placed refrigirators, and industrial cooling compressors. The paper...

  2. Hybrid Dislocated Control and General Hybrid Projective Dislocated Synchronization for Memristor Chaotic Oscillator System

    Directory of Open Access Journals (Sweden)

    Junwei Sun

    2014-01-01

    Full Text Available Some important dynamical properties of the memristor chaotic oscillator system have been studied in the paper. A novel hybrid dislocated control method and a general hybrid projective dislocated synchronization scheme have been realized for memristor chaotic oscillator system. The paper firstly presents hybrid dislocated control method for stabilizing chaos to the unstable equilibrium point. Based on the Lyapunov stability theorem, general hybrid projective dislocated synchronization has been studied for the drive memristor chaotic oscillator system and the same response memristor chaotic oscillator system. For the different dimensions, the memristor chaotic oscillator system and the other chaotic system have realized general hybrid projective dislocated synchronization. Numerical simulations are given to show the effectiveness of these methods.

  3. Instantaneous frequencies of a chaotic system

    Indian Academy of Sciences (India)

    C Chandre; T Uzer

    2005-03-01

    The structure and geometry of high-dimensional, complex dynamical systems is usually hidden under a profusion of numerical data. We show that time–frequency analysis allows one to analyze these data regardless of the number of degrees of freedom. Our method takes snapshots of the system in terms of its instantaneous frequencies defined as ridges of the time–frequency landscape. Using the wavelet transform of a single trajectory, it can characterize key dynamical properties like the extent of chaos, resonance transitions and trappings.

  4. A new three-dimensional chaotic system and its modified generalized projective synchronization

    Institute of Scientific and Technical Information of China (English)

    Dai Hao; Jia Li-Xin; Hui Meng; Si Gang-Quan

    2011-01-01

    Based on the Chen chaotic system, this paper constructs a new three-dimensional chaotic system with higher order nonlinear term and studies the basic dynamic behaviours of the system. The modified generalized projective synchronization has been observed in the coupled new three-dimensional chaotic system with unknown parameters.Furthermore, based on Lyapunov stability theory, it obtains the control laws and adaptive laws of parameters to make modified generalized projective synchronization of the coupled new three-dimensional chaotic systems. Numerical simulation results are presented to illustrate the effectiveness of this method.

  5. A simple method to simultaneously achieve synchronization and anti-synchronization in chaotic systems

    International Nuclear Information System (INIS)

    In this paper, a novel adaptive control approach is presented to simultaneously achieve synchronization and anti-synchronization in partially linear chaotic systems. Through appropriately separating state vectors of such systems, synchronization and anti-synchronization could be simultaneously realized in different subspaces, which may be strictly proven theoretically. Simulation results for a Lorenz chaotic system and a new hyper-chaotic system are provided to illustrate the effectiveness of the proposed method. Finally, a new secure communication scheme based on such a synchronization phenomenon of the hyper-chaotic system is demonstrated. Numerical results show success in transmitting a periodic signal with high security. (general)

  6. Chaotic mechanics in systems with impacts and friction

    CERN Document Server

    Blazejczyk-Okolewska, Barbara; Kapitaniak, Tomasz; Wojewoda, Jerzy

    1999-01-01

    This book is devoted to the theory of chaotic oscillations in mechanical systems. Detailed descriptions of the basic types of nonlinearity - impacts and dry friction - are presented. The properties of such behavior are discussed, and the numerical and experimental results obtained by the authors are presented.The dynamic properties of systems described here can be useful in the proper design and use of mechanics where such behavior still creates problems.This book will be very useful for anyone with a fundamental knowledge of nonlinear mechanics who is beginning research in the field.

  7. Characterization of a periodically driven chaotic dynamical system

    CERN Document Server

    Crisanti, A; Lacorata, G; Purini, R; Crisanti, A

    1996-01-01

    We discuss how to characterize the behavior of a chaotic dynamical system depending on a parameter that varies periodically in time. In particular, we study the predictability time, the correlations and the mean responses, by defining a local--in--time version of these quantities. In systems where the time scale related to the time periodic variation of the parameter is much larger than the ``internal'' time scale, one has that the local quantities strongly depend on the phase of the cycle. In this case, the standard global quantities can give misleading information.

  8. Chaotic systems in complex phase space

    Indian Academy of Sciences (India)

    Carl M Bender; Joshua Feinberg; Daniel W Hook; David J Weir

    2009-09-01

    This paper examines numerically the complex classical trajectories of the kicked rotor and the double pendulum. Both of these systems exhibit a transition to chaos, and this feature is studied in complex phase space. Additionally, it is shown that the short-time and long-time behaviours of these two $\\mathcal{PT}$ -symmetric dynamical models in complex phase space exhibit strong qualitative similarities.

  9. An Improved Cuckoo Search Optimization Algorithm for the Problem of Chaotic Systems Parameter Estimation

    OpenAIRE

    Jun Wang; Bihua Zhou; Shudao Zhou

    2016-01-01

    This paper proposes an improved cuckoo search (ICS) algorithm to establish the parameters of chaotic systems. In order to improve the optimization capability of the basic cuckoo search (CS) algorithm, the orthogonal design and simulated annealing operation are incorporated in the CS algorithm to enhance the exploitation search ability. Then the proposed algorithm is used to establish parameters of the Lorenz chaotic system and Chen chaotic system under the noiseless and noise condition, resp...

  10. Simple Encryption/Decryption Application

    Directory of Open Access Journals (Sweden)

    Majdi Al-qdah

    2007-06-01

    Full Text Available This paper presents an Encryption/Decryption application that is able to work with any type of file; for example: image files, data files, documentation files…etc. The method of encryption is simple enough yet powerful enough to fit the needs of students and staff in a small institution. The application uses simple key generation method of random number generation and combination. The final encryption is a binary one performed through rotation of bits and XOR operation applied on each block of data in any file using a symmetric decimal key. The key generation and Encryption are all done by the system itself after clicking the encryption button with transparency to the user. The same encryption key is also used to decrypt the encrypted binary file.

  11. On entanglement spreading in chaotic systems

    CERN Document Server

    Mezei, Márk

    2016-01-01

    We discuss the time dependence of subsystem entropies in interacting quantum systems. As a model for the time dependence, we suggest that the entropy is as large as possible given two constraints: one follows from the existence of an emergent light cone, and the other is a conjecture associated to the "entanglement velocity" $v_E$. We compare this model to new holographic and spin chain computations, and to an operator growth picture. Finally, we introduce a second way of computing the emergent light cone speed in holographic theories that provides a boundary dynamics explanation for a special case of entanglement wedge subregion duality in AdS/CFT.

  12. Chaotic signal reconstruction with application to noise radar system

    OpenAIRE

    Liu Lidong; Hu Jinfeng; He Zishu; Han Chunlin; Li Huiyong; Li Jun

    2011-01-01

    Abstract Chaotic signals are potentially attractive in engineering applications, most of which require an accurate estimation of the actual chaotic signal from a noisy background. In this article, we present an improved symbolic dynamics-based method (ISDM) for accurate estimating the initial condition of chaotic signal corrupted by noise. Then, a new method, called piecewise estimation method (PEM), for chaotic signal reconstruction based on ISDM is proposed. The reconstruction performance u...

  13. Applications of modularized circuit designs in a new hyper-chaotic system circuit implementation

    International Nuclear Information System (INIS)

    Modularized circuit designs for chaotic systems are introduced in this paper. Especially, a typical improved modularized design strategy is proposed and applied to a new hyper-chaotic system circuit implementation. In this paper, the detailed design procedures are described. Multisim simulations and physical experiments are conducted, and the simulation results are compared with Matlab simulation results for different system parameter pairs. These results are consistent with each other and they verify the existence of the hyper-chaotic attractor for this new hyper-chaotic system. (paper)

  14. Chaotic memristor

    OpenAIRE

    Driscoll, T; Pershin, Y. V.; Basov, D. N.; Di Ventra, M.

    2011-01-01

    We suggest and experimentally demonstrate a chaotic memory resistor (memristor). The core of our approach is to use a resistive system whose equations of motion for its internal state variables are similar to those describing a particle in a multi-well potential. Using a memristor emulator, the chaotic memristor is realized and its chaotic properties are measured. A Poincar\\'{e} plot showing chaos is presented for a simple nonautonomous circuit involving only a voltage source directly connect...

  15. Breaking down the barriers of using strong authentication and encryption in resource constrained embedded systems

    Science.gov (United States)

    Knobler, Ron; Scheffel, Peter; Jackson, Scott; Gaj, Kris; Kaps, Jens Peter

    2013-05-01

    Various embedded systems, such as unattended ground sensors (UGS), are deployed in dangerous areas, where they are subject to compromise. Since numerous systems contain a network of devices that communicate with each other (often times with commercial off the shelf [COTS] radios), an adversary is able to intercept messages between system devices, which jeopardizes sensitive information transmitted by the system (e.g. location of system devices). Secret key algorithms such as AES are a very common means to encrypt all system messages to a sufficient security level, for which lightweight implementations exist for even very resource constrained devices. However, all system devices must use the appropriate key to encrypt and decrypt messages from each other. While traditional public key algorithms (PKAs), such as RSA and Elliptic Curve Cryptography (ECC), provide a sufficiently secure means to provide authentication and a means to exchange keys, these traditional PKAs are not suitable for very resource constrained embedded systems or systems which contain low reliability communication links (e.g. mesh networks), especially as the size of the network increases. Therefore, most UGS and other embedded systems resort to pre-placed keys (PPKs) or other naïve schemes which greatly reduce the security and effectiveness of the overall cryptographic approach. McQ has teamed with the Cryptographic Engineering Research Group (CERG) at George Mason University (GMU) to develop an approach using revolutionary cryptographic techniques that provides both authentication and encryption, but on resource constrained embedded devices, without the burden of large amounts of key distribution or storage.

  16. Perfect synchronization of chaotic systems: a controllability perspective

    Institute of Scientific and Technical Information of China (English)

    Sun Ming-Xuan; He Xiong-Xiong; Yu Li

    2006-01-01

    This paper presents a synchronization method, motivated from the constructive controllability analysis, for two identical chaotic systems. This technique is applied to achieve perfect synchronization for Lorenz systems and coupled dynamo systems. It turns out that states of the drive system and the response system are synchronized within finite time, and the reaching time is independent of initial conditions, which can be specified in advance. In addition to the simultaneous synchronization, the response system is synchronized un-simultaneously to the drive system with different reaching time for each state. The performance of the resulting system is analytically quantified in the face of initial condition error, and with numerical experiments the proposed method is demonstrated to perform well.

  17. A chaotic system with a single unstable node

    Energy Technology Data Exchange (ETDEWEB)

    Sprott, J.C. [Department of Physics, University of Wisconsin, Madison, WI 53706 (United States); Jafari, Sajad, E-mail: sajadjafari@aut.ac.ir [Biomedical Engineering Department, Amirkabir University of Technology, Tehran 15875-4413 (Iran, Islamic Republic of); Pham, Viet-Thanh [School of Electronics and Telecommunications, Hanoi University of Science and Technology, 01 Dai Co Viet, Hanoi (Viet Nam); Hosseini, Zahra Sadat [Biomedical Engineering Department, Amirkabir University of Technology, Tehran 15875-4413 (Iran, Islamic Republic of)

    2015-09-25

    This paper describes an unusual example of a three-dimensional dissipative chaotic flow with quadratic nonlinearities in which the only equilibrium is an unstable node. The region of parameter space with bounded solutions is relatively small as is the basin of attraction, which accounts for the difficulty of its discovery. Furthermore, for some values of the parameters, the system has an attracting torus, which is uncommon in three-dimensional systems, and this torus can coexist with a strange attractor or with a limit cycle. The limit cycle and strange attractor exhibit symmetry breaking and attractor merging. All the attractors appear to be hidden in that they cannot be found by starting with initial conditions in the vicinity of the equilibrium, and thus they represent a new type of hidden attractor with important and potentially problematic engineering consequences. - Highlights: • An unusual example of a three-dimensional dissipative chaotic flow is introduced. • In this system the only equilibrium is an unstable node. • For some values of the parameters, the system has an attracting torus. • This torus can coexist with a strange attractor or with a limit cycle. • These properties are uncommon in three-dimensional systems.

  18. Chaotic Patterns in Lotka-Volterra Systems with Behavioral Adaptation

    Science.gov (United States)

    Lacitignola, D.; Tebaldi, C.

    2006-03-01

    We study the properties of a n2-dimensional Lotka-Volterra system describing competition among species with behaviorally adaptive abilities, in which one species is made ecologically differentiated with respect to the others by carrying capacity and intrinsic growth rate. The case in which one species has a carrying capacity higher than the others is considered here. Stability of equilibria and time-dependent regimes have been investigated in the case of four species: an interesting example of chaotic window and period-adding sequences is presented and discussed.

  19. Linear generalized synchronization of chaotic systems with uncertain parameters

    Institute of Scientific and Technical Information of China (English)

    Jia Zhen

    2008-01-01

    A more general form of projective synchronization,so called linear generalized synchronization(LGS)is proposed,which includes the generalized projective synchronization(GPS)and the hybrid projective synchronization(HPS)as its special cases.Based on the adaptive technique and Lyapunov stability theory,a general method for achieving the LGS between two chaotic or hyperchaotic systems with uncertain parameters in any scaling matrix is presented.Some numerical simulations are provided to show the effectiveness and feasibility of the proposed synchronization method.

  20. Chaotic Music Generation System Using Music Conductor Gesture

    OpenAIRE

    Chen, Shuai; Maeda, Yoichiro; TAKAHASHI, Yasutake

    2013-01-01

    In the research of interactive music generation,we propose a music generation method, that thecomputer generates the music, under the recognitionof human music conductor’s gestures.In this research,the generated music is tuned by the recognized gesturesfor the parameters of the network of chaotic elementsin real time. The music conductor’s hand motionsare detected by Microsoft Kinect in this system.Music theories are embedded in the algorithm, as a result,the generated music will be richer. F...

  1. Controlling a Chaotic System through Control Parameter Self-Modulation

    International Nuclear Information System (INIS)

    A method for obtaining active control of a chaotic system based on the modulation of a control parameter by adding to it a small perturbation proportional to one output signal is proposed. From a theoretical point of view, chaos can be stabilized in the framework of this method because small modifications of the vector field controlling the dynamics are allowed, and thus some of the previously oxi sting unstable periodic trajectories can be made stable. The method is much inspired on recent treatments of some related problems, and i t is compared with them. One of its most attractive features is that is should be very easy to implement it on real experiments. The method is tested on a system of ordinary differential equations model ling the coupling of two se If - oscillating electronic circuits (van der Pol oscillators). Some brief comments are made on the no possibility that it could be applied to complex spatio-temporal systems where multiple chaotic structures can coexist for some values of the control parameters. (Author) 28 refs

  2. A semiclassical reversibility paradox in simple chaotic systems.

    Science.gov (United States)

    Tomsovic, Steven

    2016-06-13

    Using semiclassical methods, it is possible to construct very accurate approximations in the short-wavelength limit of quantum dynamics that rely exclusively on classical dynamical input. For systems whose classical realization is strongly chaotic, there is an exceedingly short logarithmic Ehrenfest time scale, beyond which the quantum and classical dynamics of a system necessarily diverge, and yet the semiclassical construction remains valid far beyond that time. This fact leads to a paradox if one ponders the reversibility and predictability properties of quantum and classical mechanics. They behave very differently relative to each other, with classical dynamics being essentially irreversible/unpredictable, whereas quantum dynamics is reversible/stable. This begs the question: 'How can an accurate approximation to a reversible/stable dynamics be constructed from an irreversible/unpredictable one?' The resolution of this incongruity depends on a couple of key ingredients: a well-known, inherent, one-way structural stability of chaotic systems; and an overlap integral not being amenable to the saddle point method. PMID:27140974

  3. Joint transform correlator optical encryption system: Extensions of the recorded encrypted signal and its inverse Fourier transform

    Science.gov (United States)

    Galizzi, Gustavo E.; Cuadrado-Laborde, Christian

    2015-10-01

    In this work we study the joint transform correlator setup, finding two analytical expressions for the extensions of the joint power spectrum and its inverse Fourier transform. We found that an optimum efficiency is reached, when the bandwidth of the key code is equal to the sum of the bandwidths of the image plus the random phase mask (RPM). The quality of the decryption is also affected by the ratio between the bandwidths of the RPM and the input image, being better as this ratio increases. In addition, the effect on the decrypted image when the detection area is lower than the encrypted signal extension was analyzed. We illustrate these results through several numerical examples.

  4. A unified approach for impulsive lag synchronization of chaotic systems with time delay

    International Nuclear Information System (INIS)

    In this paper, we propose a unified approach for impulsive lag-synchronization of a class of chaotic systems with time delay by employing the stability theory of impulsive delayed differential equations. Three well-known delayed chaotic systems are presented to illustrate our results. Also, the estimates of the stable regions for these systems are given, respectively

  5. System using data compression and hashing adapted for use for multimedia encryption

    Science.gov (United States)

    Coffland, Douglas R.

    2011-07-12

    A system and method is disclosed for multimedia encryption. Within the system of the present invention, a data compression module receives and compresses a media signal into a compressed data stream. A data acquisition module receives and selects a set of data from the compressed data stream. And, a hashing module receives and hashes the set of data into a keyword. The method of the present invention includes the steps of compressing a media signal into a compressed data stream; selecting a set of data from the compressed data stream; and hashing the set of data into a keyword.

  6. Experimental observation of strange non-chaotic attractors in a driven excitable system

    International Nuclear Information System (INIS)

    We report the observation of strange non-chaotic attractors in an electrochemical cell. The system parameters were chosen such that the system observable (anodic current) exhibits fixed point behavior or period one oscillations. These autonomous dynamics were thereafter subjected to external quasiperiodic forcing. Systematically varying the characteristics (frequency and amplitude) of the superimposed external signal; quasiperiodic, chaotic and strange non-chaotic behaviors in the anodic current were generated. The inception of strange non-chaotic attractors was verified using standard diagnostic techniques

  7. On the application of the multistage Laplace Adomian decomposition method to the chaotic Chen system

    Directory of Open Access Journals (Sweden)

    Saheed O. Ajibola

    2012-11-01

    Full Text Available In this paper, Laplace Adomian Decomposition Method (LADM and the Multistage Laplace Adomian Decomposition Method (MLADM were applied to obtain solutions to the Chen system for the non-chaotic and chaotic case. The study shows that the LADM only gives reliable results for t <<1. Comparison between the MLADM and the classical fourth-order Runge-Kutta (RK4 solutions shows that the MLADM performs well with high accuracy. The study shows that MLADM is a powerful and promising tool for solving nonlinear systems of ODEs of chaotic and non-chaotic nature.

  8. Security Encryption Scheme for Communication of Web Based Control Systems

    Science.gov (United States)

    Robles, Rosslin John; Kim, Tai-Hoon

    A control system is a device or set of devices to manage, command, direct or regulate the behavior of other devices or systems. The trend in most systems is that they are connected through the Internet. Traditional Supervisory Control and Data Acquisition Systems (SCADA) is connected only in a limited private network Since the internet Supervisory Control and Data Acquisition Systems (SCADA) facility has brought a lot of advantages in terms of control, data viewing and generation. Along with these advantages, are security issues regarding web SCADA, operators are pushed to connect Control Systems through the internet. Because of this, many issues regarding security surfaced. In this paper, we discuss web SCADA and the issues regarding security. As a countermeasure, a web SCADA security solution using crossed-crypto-scheme is proposed to be used in the communication of SCADA components.

  9. SLYRB measures: natural invariant measures for chaotic systems

    Science.gov (United States)

    Hunt, Brian R.; Kennedy, Judy A.; Li, Tien-Yien; Nusse, Helena E.

    2002-08-01

    In many applications it is useful to consider not only the set that constitutes an attractor but also (if it exists) the asymptotic distribution of a typical trajectory converging to the attractor. Indeed, in the physics literature such a distribution is often assumed to exist. When it exists, it is called a “natural invariant measure”. The results by Lasota and Yorke, and by Sinai, Ruelle and Bowen represent two approaches both of which establish the existence of an invariant measure. The goal of this paper is to relate the “Lasota-Yorke measure” for chaotic attractors in one-dimensional maps and the “Sinai-Ruelle-Bowen measure” for chaotic attractors in higher-dimensional dynamical systems. We introduce the notion of “ SLYRB measure”. (We pronounce the term “SLYRB” as a single word “slurb”.) The SRB concept of measure can be motivated by asking how a trajectory from a typical initial point is distributed asymptotically. Similarly the SLYRB concept of measure can be motivated by asking what the average distribution is for trajectories of a large collection of initial points in some region not necessarily restricted to a single basin. The latter is analogous to ask where all the rain drops from a rain storm go and the former asks about where a single rain drop goes, perhaps winding up distributed throughout a particular lake.

  10. Nonlinear feedback synchronisation control between fractional-order and integer-order chaotic systems

    Institute of Scientific and Technical Information of China (English)

    Jia Li-Xin; Dai Hao; Hui Meng

    2010-01-01

    This paper focuses on the synchronisation between fractional-order and integer-order chaotic systems.Based on Lyapunov stability theory and numerical differentiation,a nonlinear feedback controller is obtained to achieve the synchronisation between fractional-order and integer-order chaotic systems.Numerical simulation results are presented to illustrate the effectiveness of this method.

  11. Study of new chaotic flows on a family of 3-dimensional systems with quadratic nonlinearities

    International Nuclear Information System (INIS)

    Based on a wider systematic search on a family of 3-dimensional systems with quadratic nonlinearities, three new simple chaotic systems were found. One of them has the unusual feature of having a stable equilibrium point, and it is the simplest one of other chaotic flows with this property. The others have some interesting special properties

  12. Fault Tolerant Approach for Data Encryption and Digital Signature Based on ECC System

    Institute of Scientific and Technical Information of China (English)

    ZENG Yong; MA Jian-feng

    2005-01-01

    An integrated fault tolerant approach for data encryption and digital signature based on elliptic curve cryptography is proposed. This approach allows the receiver to verify the sender's identity and can simultaneously deal with error detection and data correction. Up to three errors in our approach can be detected and corrected. This approach has at least the same security as that based on RSA system, but smaller keys to achieve the same level of security. Our approach is more efficient than the known ones and more suited for limited environments like personal digital assistants (PDAs), mobile phones and smart cards without RSA co- processors.

  13. A novel four-wing chaotic attractor generated from a three-dimensional quadratic autonomous system

    International Nuclear Information System (INIS)

    This paper presents a new 3D quadratic autonomous chaotic system which contains five system parameters and three quadratic cross-product terms, and the system can generate a single four-wing chaotic attractor with wide parameter ranges. Through theoretical analysis, the Hopf bifurcation processes are proved to arise at certain equilibrium points. Numerical bifurcation analysis shows that the system has many interesting complex dynamical behaviours; the system trajectory can evolve to a chaotic attractor from a periodic orbit or a fixed point as the proper parameter varies. Finally, an analog electronic circuit is designed to physically realize the chaotic system; the existence of four-wing chaotic attractor is verified by the analog circuit realization. (general)

  14. A novel four-wing chaotic attractor generated from a three-dimensional quadratic autonomous system

    Institute of Scientific and Technical Information of China (English)

    Dong En-Zeng; Chen Zai-Ping; Chen Zeng-Qiang; Yuan Zhu-Zhi

    2009-01-01

    This paper presents a new 3D quadratic autonomous chaotic system which contains five system parameters and three quadratic cross-product terms, and the system can generate a single four-wing chaotic attractor with wide parameter ranges. Through theoretical analysis, the Hopf bifurcation processes are proved to arise at certain equilibrium points. Numerical bifurcation analysis shows that the system has many interesting complex dynamical behaviours; the system trajectory can evolve to a chaotic attractor from a periodic orbit or a fixed point as the proper parameter varies.Finally, an analog electronic circuit is designed to physically realize the chaotic system; the existence of four-wing chaotic attractor is verified by the analog circuit realization.

  15. Spatial chaos-based image encryption design

    Institute of Scientific and Technical Information of China (English)

    2009-01-01

    In recent years, the chaos based cryptographic algorithms have suggested some new and efficient ways to develop secure image encryption techniques, but the drawbacks of small key space and weak security in one-dimensional chaotic cryptosystems are obvious. In this paper, permutation and sub- stitution methods are incorporated to present a stronger image encryption algorithm. Spatial chaotic maps are used to realize the position permutation, and to confuse the relationship between the ci- pher-image and the plain-image. The experimental results demonstrate that the suggested encryption scheme of image has the advantages of large key space and high security; moreover, the distribution of grey values of the encrypted image has a random-like behavior.

  16. Spatial chaos-based image encryption design

    Institute of Scientific and Technical Information of China (English)

    LIU ShuTang; SUN FuYan

    2009-01-01

    In recent years, the chaos based cryptographic algorithms have suggested some new and efficient ways to develop secure image encryption techniques, but the drawbacks of small key space and weak security in one-dimensional chaotic cryptosystems are obvious. In this paper, permutation and sub-stitution methods are incorporated to present a stronger image encryption algorithm. Spatial chaotic maps are used to realize the position permutation, and to confuse the relationship between the ci-pher-image and the plain-image. The experimental results demonstrate that the suggested encryption scheme of image has the advantages of large key space and high security; moreover, the distribution of grey values of the encrypted image has a random-like behavior.

  17. A general method for synchronizing an integer-order chaotic system and a fractional-order chaotic system

    Institute of Scientific and Technical Information of China (English)

    Si Gang-Quan; Sun Zhi-Yong; Zhang Yan-Bin

    2011-01-01

    This paper investigates the synchronization between integer-order and fractional-order chaotic systems.By introducing fractional-order operators into the controllers,the addressed problem is transformed into a synchronization one among integer-order systems.A novel general method is presented in the paper with rigorous proof.Based on this method,effective controllers are designed for the synchronization between Lorenz systems with an integer order and a fractional order,and for the synchronization between an integer-order Chen system and a fractional-order Liu system.Numerical results,which agree well with the theoretical analyses,are also given to show the effectiveness of this method.

  18. Parameter Identification and Synchronization of Uncertain Chaotic Systems Based on Sliding Mode Observer

    Directory of Open Access Journals (Sweden)

    Li-lian Huang

    2013-01-01

    Full Text Available The synchronization of nonlinear uncertain chaotic systems is investigated. We propose a sliding mode state observer scheme which combines the sliding mode control with observer theory and apply it into the uncertain chaotic system with unknown parameters and bounded interference. Based on Lyapunov stability theory, the constraints of synchronization and proof are given. This method not only can realize the synchronization of chaotic systems, but also identify the unknown parameters and obtain the correct parameter estimation. Otherwise, the synchronization of chaotic systems with unknown parameters and bounded external disturbances is robust by the design of the sliding surface. Finally, numerical simulations on Liu chaotic system with unknown parameters and disturbances are carried out. Simulation results show that this synchronization and parameter identification has been totally achieved and the effectiveness is verified very well.

  19. Lifetime of chaotic attractors in a multidimensional laser system

    International Nuclear Information System (INIS)

    We study the lifetimes of chaotic attractors at crises in a multidimensional laser system. This system describes the CO2 laser with modulated losses and is known as the four-level model. The critical exponents which are related to the lifetimes of the attractors are estimated in terms of the corresponding eigenvalues and the measured characteristic lifetime in the model. The critical exponents in this model and those of its center manifold version are in good agreement. We conjecture that generically in the four-level model the critical exponents are close to 1/2 at crises. In addition, we compare predictions of a simpler and popular model known as the two-level model with those of the above mentioned models. (author). 21 refs, 2 figs, 3 tabs

  20. Novel four-dimensional autonomous chaotic system generating one-, two-, three- and four-wing attractors

    International Nuclear Information System (INIS)

    In this paper, we propose a novel four-dimensional autonomous chaotic system. Of particular interest is that this novel system can generate one-, two, three- and four-wing chaotic attractors with the variation of a single parameter, and the multi-wing type of the chaotic attractors can be displayed in all directions. The system is simple with a large positive Lyapunov exponent and can exhibit some interesting and complicated dynamical behaviours. Basic dynamical properties of the four-dimensional chaotic system, such as equilibrium points, the Poincaré map, the bifurcation diagram and the Lyapunov exponents are investigated by using either theoretical analysis or numerical method. Finally, a circuit is designed for the implementation of the multi-wing chaotic attractors. The electronic workbench observations are in good agreement with the numerical simulation results. (general)

  1. Hybrid dislocated control and general hybrid projective dislocated synchronization for the modified Lue chaotic system

    International Nuclear Information System (INIS)

    This paper introduces a modified Lue chaotic system, and some basic dynamical properties are studied. Based on these properties, we present hybrid dislocated control method for stabilizing chaos to unstable equilibrium and limit cycle. In addition, based on the Lyapunov stability theorem, general hybrid projective dislocated synchronization (GHPDS) is proposed, which includes complete dislocated synchronization, dislocated anti-synchronization and projective dislocated synchronization as its special item. The drive and response systems discussed in this paper can be strictly different dynamical systems (including different dimensional systems). As examples, the modified Lue chaotic system, Chen chaotic system and hyperchaotic Chen system are discussed. Numerical simulations are given to show the effectiveness of these methods.

  2. Efficient and Generic Construction of Certification-Based Encryption in the Standard Model Based on the NIZK Proof System

    Directory of Open Access Journals (Sweden)

    Yang Lu

    2012-02-01

    Full Text Available Certificate-based encryption (CBE is a new public key encryption paradigm which combines traditional PKI-based public-key encryption (PKE and identity-based encryption (IBE, and preserves some of their most attractive features. CBE provides an efficient implicit certificate mechanism and allows a periodical update of certificate status. It eliminates third-party queries for the certificate status and simplifies the certificate revocation problem in the traditional PKI, while it solves the key escrow problem and the key distribution problem inherent in IBE. In this paper, we propose a new generic construction of CBE schemes from PKE and IBE, and prove it to be CCA-secure in the standard model. In our construction, we use an efficient one-time simulation-sound adaptive NIZK proof system as the security enhancing building block to guarantee the CCA-security of the generated CBE schemes. When compared to the previous method, the security requirements of the primitive encryption schemes in our construction are much weaker and the performance of the generated CBE schemes from our construction is much more efficient.

  3. Stegano-Crypto Hiding Encrypted Data in Encrypted Image Using Advanced Encryption Standard and Lossy Algorithm

    OpenAIRE

    Ari Shawakat Tahir

    2015-01-01

    The Steganography is an art and science of hiding information by embedding messages within other, seemingly harmless messages and lots of researches are working in it. Proposed system is using AES Algorithm and Lossy technique to overcome the limitation of previous work and increasing the process’s speed. The sender uses AES Algorithm to encrypt message and image, then using LSB technique to hide encrypted data in encrypted message. The receive get the original data using the keys that had be...

  4. CAPS satellite spread spectrum communication blind multi-user detecting system based on chaotic sequences

    Institute of Scientific and Technical Information of China (English)

    LEI LiHua; SHI HuLi; MA GuanYi

    2009-01-01

    Multiple Path Interference (MPI) and Multiple Access Interference (MAI) are Important factors that affect the performance of Chinese Area Positioning System (CAPS),These problems can be solved by using spreading sequences with ideal properties and multi-user detectors.Chaotic sequences based on Chebyshev map are studied and the satellite communication system model is set up to investigate the application of chaotic sequences for CAPS in this paper,Simulation results show that chaotic sequences have desirable correlation properties and it is easy to generate a large number of chaotic sequences with good security.It has great practical value to apply chaotic sequences to CAPS together with multi-user detecting technology and the system performance can be improved greatly.

  5. Adaptive H∞ synchronization of chaotic systems via linear and nonlinear feedback control

    International Nuclear Information System (INIS)

    Adaptive H∞ synchronization of chaotic systems via linear and nonlinear feedback control is investigated. The chaotic systems are redesigned by using the generalized Hamiltonian systems and observer approach. Based on Lyapunov's stability theory, linear and nonlinear feedback control of adaptive H∞ synchronization is established in order to not only guarantee stable synchronization of both master and slave systems but also reduce the effect of external disturbance on an H∞-norm constraint. Adaptive H∞ synchronization of chaotic systems via three kinds of control is investigated with applications to Lorenz and Chen systems. Numerical simulations are also given to identify the effectiveness of the theoretical analysis. (general)

  6. Adaptive observer based synchronization of a class of uncertain chaotic systems

    International Nuclear Information System (INIS)

    This study addresses the adaptive synchronization of a class of uncertain chaotic systems in the drive-response framework. For a class of uncertain chaotic systems with unknown parameters and external disturbances, a robust adaptive observer based response system is constructed to synchronize the uncertain chaotic system. Lyapunov stability theory and Barbalat lemma ensure the global synchronization between the drive and response systems even if Lipschitz constants on function matrices and bounds on uncertainties are unknown. Numerical simulation of the Genesio-Tesi system verifies the effectiveness of the proposed method. (author)

  7. A chaotic stream cipher and the usage in video protection

    International Nuclear Information System (INIS)

    In this paper, a chaotic stream cipher is constructed and used to encrypt video data selectively. The stream cipher based on a discrete piecewise linear chaotic map satisfies the security requirement of cipher design. The video encryption scheme based on the stream cipher is secure in perception, efficient and format compliant, which is suitable for practical video protection. The video encryption scheme's performances prove the stream cipher's practicability

  8. Loss of lag synchronization in coupled chaotic systems

    DEFF Research Database (Denmark)

    Sosnovtseva, O.V.; Balanov, A.G.; Vadivasova, T.E.; Astakhov, V. V.; Mosekilde, Erik

    1999-01-01

    Lag synchronization denotes a particular form of synchronization in which the amplitudes of two interacting, nonidentical chaotic oscillators are correlated but there is a characteristic time delay between them. We study transitions to and between different forms of synchronization for the...... periodic orbits embedded into the synchronized chaotic state become unstable in a transverse direction....

  9. Loss of lag synchronization in coupled chaotic systems

    DEFF Research Database (Denmark)

    Sosnovtseva, Olga; Balanov, A G; Vadivasova, T E; Astakhov, V V; Mosekilde, Erik

    Lag synchronization denotes a particular form of synchronization in which the amplitudes of two interacting, nonidentical chaotic oscillators are correlated but there is a characteristic time delay between them. We study transitions to and between different forms of synchronization for the...... periodic orbits embedded into the synchronized chaotic state become unstable in a transverse direction....

  10. Localization in chaotic systems with a single-channel opening.

    Science.gov (United States)

    Lippolis, Domenico; Ryu, Jung-Wan; Kim, Sang Wook

    2015-07-01

    We introduce a single-channel opening in a random Hamiltonian and a quantized chaotic map: localization on the opening occurs as a sensible deviation of the wave-function statistics from the predictions of random matrix theory, even in the semiclassical limit. Increasing the coupling to the open channel in the quantum model, we observe a similar picture to resonance trapping, made of a few fast-decaying states, whose left (right) eigenfunctions are entirely localized on the (preimage of the) opening, and plentiful long-lived states, whose probability density is instead suppressed at the opening. For the latter, we derive and test a linear relation between the wave-function intensities and the decay rates, similar to the Breit-Wigner law. We then analyze the statistics of the eigenfunctions of the corresponding (discretized) classical propagator, finding a similar behavior to the quantum system only in the weak-coupling regime. PMID:26274261

  11. Synchronization and anti-synchronization of Lu and Bhalekar–Gejji chaotic systems using nonlinear active control

    International Nuclear Information System (INIS)

    This paper aims at synchronization and anti-synchronization between Lu chaotic system, a member of unified chaotic system, and recently developed Bhalekar–Gejji chaotic system, a system which cannot be derived from the member of unified chaotic system. These synchronization and anti-synchronization have been achieved by using nonlinear active control since the parameters of both the systems are known. Lyapunov stability theory is used and required condition is derived to ensure the stability of error dynamics. Controller is designed by using the sum of relevant variables in chaotic systems. Simulation results suggest that proposed scheme is working satisfactorily

  12. Hopf bifurcation analysis and circuit implementation for a novel four-wing hyper-chaotic system

    International Nuclear Information System (INIS)

    In the paper, a novel four-wing hyper-chaotic system is proposed and analyzed. A rare dynamic phenomenon is found that this new system with one equilibrium generates a four-wing-hyper-chaotic attractor as parameter varies. The system has rich and complex dynamical behaviors, and it is investigated in terms of Lyapunov exponents, bifurcation diagrams, Poincaré maps, frequency spectrum, and numerical simulations. In addition, the theoretical analysis shows that the system undergoes a Hopf bifurcation as one parameter varies, which is illustrated by the numerical simulation. Finally, an analog circuit is designed to implement this hyper-chaotic system. (general)

  13. Fuzzy model-based adaptive synchronization of time-delayed chaotic systems

    International Nuclear Information System (INIS)

    In this paper, fuzzy model-based synchronization of a class of first order chaotic systems described by delayed-differential equations is addressed. To design the fuzzy controller, the chaotic system is modeled by Takagi-Sugeno fuzzy system considering the properties of the nonlinear part of the system. Assuming that the parameters of the chaotic system are unknown, an adaptive law is derived to estimate these unknown parameters, and the stability of error dynamics is guaranteed by Lyapunov theory. Numerical examples are given to demonstrate the validity of the proposed adaptive synchronization approach.

  14. Phase-only optical encryption

    DEFF Research Database (Denmark)

    Mogensen, P.C.; Glückstad, J.

    2000-01-01

    We have implemented a phase-only optical encryption and decryption system with a readout based on the generalized phase-contrast method. The experimental system has been implemented with Liquid-crystal spatial light modulators to generate binary phase-encrypted masks and a decrypting key. A phase...

  15. Adaptive Increasing-Order Synchronization and Anti-Synchronization of Chaotic Systems with Uncertain Parameters

    Institute of Scientific and Technical Information of China (English)

    M. Mossa Al-sawalha; M. S. M. Noorani

    2011-01-01

    We elaborate the concept of increasing-order synchronization and anti-synchronization of chaotic systems via an adaptive control scheme and modulation parameters. It is shown that the dynamical evolution of a third-order chaotic system can be synchronized and anti-synchronized with a fourth-order chaotic system even though their parameters are unknown. Theoretical analysis and numerical simulations are carried out to verify the results.%We elaborate the concept of increasing-order synchronization and anti-synchronization of chaotic systems via an adaptive control scheme and modulation parameters.It is shown that the dynamical evolution of a third-order chaotic system can be synchronized and anti-synchronized with a fourth-order chaotic system even though their parameters are unknown.Theoretical analysis and numerical simulations are carried out to verify the results.As the problems of synchronization and antisynchronization of chaos are interesting,nontraditional and indeed very challenging,[1] a wide variety of approaches have been proposed for chaos synchronization and anti-synchronization.[2-4] In this Letter,another type of synchronization,namely increasingorder synchronization in different chaotic systems with different orders based on parameter identification,is investigated.Such a problem exists widely in the study of cognitive processes and biological systems.[5

  16. A one-time one-key encryption algorithm based on the ergodicity of chaos

    International Nuclear Information System (INIS)

    In this paper, we propose a new one-time one-key encryption algorithm based on the ergodicity of a skew tent chaotic map. We divide the chaotic trajectory into sub-intervals and map them to integers, and use this scheme to encrypt plaintext and obtain ciphertext. In this algorithm, the plaintext information in the key is used, so different plaintexts or different total numbers of plaintext letters will encrypt different ciphertexts. Simulation results show that the performance and the security of the proposed encryption algorithm can encrypt plaintext effectively and resist various typical attacks. (general)

  17. Parametric Control on Fractional-Order Response for Lü Chaotic System

    KAUST Repository

    Moaddy, K

    2013-04-10

    This paper discusses the influence of the fractional order parameter on conventional chaotic systems. These fractional-order parameters increase the system degree of freedom allowing it to enter new domains and thus it can be used as a control for such dynamical systems. This paper investigates the behaviour of the equally-fractional-order Lü chaotic system when changing the fractional-order parameter and determines the fractional-order ranges for chaotic behaviour. Five different parameter values and six fractional-order cases are discussed through this paper. Unlike the conventional parameters, as the fractional-order increases the system response begins with stability, passing by chaotic behaviour then reaches periodic response. As the system parameter α increases, a shift in the fractional order is required to maintain chaotic response.Therefore, the range of chaotic response can be expanded or minimized by controlling the fractional-order parameter. The non-standard finite difference method is used to solve the fractional-order Lü chaotic system numerically to validate these responses.

  18. Adaptive control and synchronization of a fractional-order chaotic system

    Indian Academy of Sciences (India)

    Chunlai Li; Yaonan Tong

    2013-04-01

    In this paper, the chaotic dynamics of a three-dimensional fractional-order chaotic system is investigated. The lowest order for exhibiting chaos in the fractional-order system is obtained. Adaptive schemes are proposed for control and synchronization of the fractional-order chaotic system based on the stability theory of fractional-order dynamic systems. The presented schemes, which contain only a single-state variable, are simple and flexible. Numerical simulations are used to demonstrate the feasibility of the presented methods.

  19. Lag synchronization of chaotic systems with time-delayed linear terms via impulsive control

    Indian Academy of Sciences (India)

    Ranchao Wu; Dongxu Cao

    2013-11-01

    In this paper, the lag synchronization of chaotic systems with time-delayed linear terms via impulsive control is investigated. Based on the stability theory of impulsive delayed differential equations, some sufficient conditions are obtained guaranteeing the synchronized behaviours between two delayed chaotic systems. Numerical simulations on time-delayed Lorenz and hyperchaotic Chen systems are also carried out to show the effectiveness of the proposed scheme. Note that under the scheme the chaotic system is controlled only at discrete time instants, and so it reduces the control cost in real applications.

  20. Synchronisation of fractional-order time delayed chaotic systems with ring connection

    Science.gov (United States)

    He, S.; Sun, K.; Wang, H.

    2016-02-01

    In this paper, synchronisation of fractional-order time delayed chaotic systems in ring networks is investigated. Based on Lyapunov stability theory, a new generic synchronisation criterion for N-coupled chaotic systems with time delay is proposed. The synchronisation scheme is applied to N-coupled fractional-order time delayed simplified Lorenz systems, and the Adomian decomposition method (ADM) is developed for solving these chaotic systems. Performance analysis of the synchronisation network is carried out. Numerical experiments demonstrate that synchronisation realises in both state variables and intermediate variables, which verifies the effectiveness of the proposed method.

  1. Adaptive control of chaotic systems with stochastic time varying unknown parameters

    International Nuclear Information System (INIS)

    In this paper based on the Lyapunov stability theorem, an adaptive control scheme is proposed for stabilizing the unstable periodic orbits (UPO) of chaotic systems. It is assumed that the chaotic system has some linearly dependent unknown parameters which are stochastically time varying. The stochastic parameters are modeled through the Weiner process derivative. To demonstrate the effectiveness of the proposed technique it has been applied to the Lorenz, Chen and Rossler dynamical systems, as some case studies. Simulation results indicate that the proposed adaptive controller has a high performance in stabilizing the UPO of chaotic systems in noisy environment

  2. Chaos control and global synchronization of Liu chaotic systems using linear balanced feedback control

    International Nuclear Information System (INIS)

    Liu chaotic systems exhibit two- or four-scroll attractors and are observed in a variety of engineering phenomena, including rigid body motion, brushless DC motor system and so forth. This study applies the Lyapunov stability theorem to identify the sufficient conditions for the asymptotic stability of the equilibrium points of Liu chaotic systems. A linear balanced feedback gain control method is then employed to design a controller to achieve the global synchronization of two identical four-scroll Liu chaotic systems. The feasibility and effectiveness of the proposed chaos stability and synchronization schemes are verified via numerical simulations.

  3. Bidirectional Partial Generalized Synchronization in Chaotic and Hyperchaotic Systems via a New Scheme

    Institute of Scientific and Technical Information of China (English)

    WANG Qi

    2006-01-01

    In this paper, a bidirectional partial generalized (lag, complete, and anticipated) synchronization of a class of continuous-time systems is defined. Then based on the active control idea, a new systematic and concrete scheme is developed to achieve bidirectional partial generalized (lag, complete, and anticipated) synchronization between two chaotic systems or between chaotic and hyperchaotic systems. With the help of symbolic-numerical computation,we choose the modified Chua system, Lorenz system, and the hyperchaotic Tamasevicius-Namajunas-Cenys system to illustrate the proposed scheme. Numerical simulations are used to verify the effectiveness of the proposed scheme. It is interesting that partialchaos synchronization not only can take place between two chaotic systems, but also can take place between chaotic and hyperchaotic systems. The proposed scheme can also be extended to research bidirectional partial generalized (lag, complete, and anticipated) synchronization between other dynamical systems.

  4. Chaotic secure content-based hidden transmission of biometric templates

    International Nuclear Information System (INIS)

    The large-scale proliferation of biometric verification systems creates a demand for effective and reliable security and privacy of its data. Like passwords and PIN codes, biometric data is also not secret and if it is compromised, the integrity of the whole verification system could be at high risk. To address these issues, this paper presents a novel chaotic secure content-based hidden transmission scheme of biometric data. Encryption and data hiding techniques are used to improve the security and secrecy of the transmitted templates. Secret keys are generated by the biometric image and used as the parameter value and initial condition of the chaotic map, and each transaction session has different secret keys to protect from the attacks. Two chaotic maps are incorporated for the encryption to resolve the finite word length effect and to improve the system's resistance against attacks. Encryption is applied on the biometric templates before hiding into the cover/host images to make them secure, and then templates are hidden into the cover image. Experimental results show that the security, performance, and accuracy of the presented scheme are encouraging comparable with other methods found in the current literature

  5. A new theorem to synchronization of unified chaotic systems via adaptive control

    Institute of Scientific and Technical Information of China (English)

    Lequan Min; Jianyi Jing

    2003-01-01

    Chaos synchronization has been applied in secure communication, chemical reaction, biological systems, and information processing. A new theorem to synchronization of unified chaotic systems via adaptive control is proposed. The consutructive theorem provides the design scheme for adaptive controller such that a respond system can synchronize with respect to an uncertain drive system. One example for discontinuous chaotic system is proposed to illustrate the effectiveness and feasibility.

  6. Robust Exponential Converge Controller Design for a Unified Chaotic System with Structured Uncertainties via LMI

    Directory of Open Access Journals (Sweden)

    Her-Terng Yau

    2010-01-01

    Full Text Available This paper focuses on the chaos control problem of the unified chaotic systems with structured uncertainties. Applying Schur-complement and some matrix manipulation techniques, the controlled uncertain unified chaotic system is then transformed into the linear matrix inequality (LMI form. Based on Lyapunov stability theory and linear matrix inequality (LMI formulation, a simple linear feedback control law is obtained to enforce the prespecified exponential decay dynamics of the uncertain unified chaotic system. Numerical results validate the effectiveness of the proposed robust control scheme.

  7. Robust networked H∞ synchronization of nonidentical chaotic Lur'e systems

    International Nuclear Information System (INIS)

    We mainly investigate the robust networked H∞ synchronization problem of nonidentical chaotic Lur'e systems. In the design of the synchronization scheme, some network characteristics, such as nonuniform sampling, transmission-induced delays, and data packet dropouts, are considered. The parameters of master—slave chaotic Lur'e systems often allow differences. The sufficient condition in terms of linear matrix inequality (LMI) is obtained to guarantee the dissipative synchronization of nonidentical chaotic Lur'e systems in network environments. A numerical example is given to illustrate the validity of the proposed method. (general)

  8. Study on the chaotic behavior of mining rock seepage system

    Institute of Scientific and Technical Information of China (English)

    Wan Shiwen; Xu Jinhai; Li Chong

    2011-01-01

    One dimensional non-steady,non-Darcy flow of water in a rock stratum was reduced into a system described by six ordinary differential equations involving five controlling parameters.Through response computations and time series analysis,chaotic behavior in the reduced system was discussed in details.Firstly,the dynamical response of the reduced system under a set of parameters was calculated,and the power spectrum of the attractor was obtained through fast Lagrangian transformation; then the phase space was reconstructed by fixing embedding dimension to be 6 and delay time to range from 1 to 20,and the correlation dimension of the attractor was calculated based on the curves under the coordinates of logarithm of correlation integral vs.logarithm of covering radius; and lastly,the Lyapunov indices of the attractor were calculated by using Gram-Schmit's orthogonalization method.The results show that the power spectrum of the attractor is continuous; the correlation dimension of the attractor is equal to 2.36; among the Lyapunov indices,LE1,LE2,LE3 are positive,LE5,LE6 are negative,and LE4 fluctuates near zero.All the analysis indicates that there may exist chaos in the system of non-steady,non-Darcy flow.

  9. Chaotic signal reconstruction with application to noise radar system

    Science.gov (United States)

    Liu, Lidong; Hu, Jinfeng; He, Zishu; Han, Chunlin; Li, Huiyong; Li, Jun

    2011-12-01

    Chaotic signals are potentially attractive in engineering applications, most of which require an accurate estimation of the actual chaotic signal from a noisy background. In this article, we present an improved symbolic dynamics-based method (ISDM) for accurate estimating the initial condition of chaotic signal corrupted by noise. Then, a new method, called piecewise estimation method (PEM), for chaotic signal reconstruction based on ISDM is proposed. The reconstruction performance using PEM is much better than that using the existing initial condition estimation methods. Next, PEM is applied in a noncoherent reception noise radar scheme and an improved noncoherent reception scheme is given. The simulation results show that the improved noncoherent scheme has better correlation performance and range resolution especially at low signal-to-noise ratios (SNRs).

  10. Chaotic signal reconstruction with application to noise radar system

    Directory of Open Access Journals (Sweden)

    Liu Lidong

    2011-01-01

    Full Text Available Abstract Chaotic signals are potentially attractive in engineering applications, most of which require an accurate estimation of the actual chaotic signal from a noisy background. In this article, we present an improved symbolic dynamics-based method (ISDM for accurate estimating the initial condition of chaotic signal corrupted by noise. Then, a new method, called piecewise estimation method (PEM, for chaotic signal reconstruction based on ISDM is proposed. The reconstruction performance using PEM is much better than that using the existing initial condition estimation methods. Next, PEM is applied in a noncoherent reception noise radar scheme and an improved noncoherent reception scheme is given. The simulation results show that the improved noncoherent scheme has better correlation performance and range resolution especially at low signal-to-noise ratios (SNRs.

  11. Generalized Projective Synchronization of Fractional Order Chaotic Systems with Different Dimensions

    Institute of Scientific and Technical Information of China (English)

    WANG Sha; YU Yong-Guang

    2012-01-01

    The generalized projective synchronization of different dimensional fractional order chaotic systems is investigated. According to the stability theory of linear fractional order systems, a sufficient condition to realize synchronization is obtained. The fractional order chaotic and hyperchaotic systems are applied to achieve synchronization in both reduced and increased dimensions. The corresponding numerical results coincide with theoretical analysis.%The generalized projective synchronization of different dimensional fractional order chaotic systems is investigated.According to the stability theory of linear fractional order systems,a sufficient condition to realize synchronization is obtained.The fractional order chaotic and hyperchaotic systems are applied to achieve synchronization in both reduced and increased dimensions.The corresponding numerical results coincide with theoretical analysis.

  12. Chosen-plaintext attack on a joint transform correlator encrypting system

    Science.gov (United States)

    Barrera, John Fredy; Vargas, Carlos; Tebaldi, Myrian; Torroba, Roberto

    2010-10-01

    We demonstrate that optical encryption methods based on the joint transform correlator architecture are vulnerable to chosen-plaintext attack. An unauthorized user, who introduces three chosen plaintexts in the accessible encryption machine, can obtain the security key code mask. In this contribution, we also propose an alternative method to eliminate ambiguities that allows obtaining the right decrypting key.

  13. Dynamic encryption method

    DEFF Research Database (Denmark)

    2013-01-01

    Disclosed is a method of transmitting a data set using encryption, wherein the method comprises the steps of: selecting a first encryption technique, wherein said first encryption technique comprises a first encryption algorithm for encrypting plain data into cipher data, and a first decryption...... algorithm for on provision of a specific key, decrypting cipher data and reproduce plain data; encrypting the first data package comprising plain data, using a first encryption program implementing the first encryption algorithm of said first encryption technique, creating a first encrypted data package...

  14. A controllability approach to the control of a class of chaotic systems

    International Nuclear Information System (INIS)

    In this paper the exponential control problem for a class of chaotic systems with affine dependence on the control is addressed and solved by the controllability approach. It is shown that the controllability approach in conjunction with Lyapunov Direct Method yields a promising way of controlling chaotic dynamics. The proposed strategy is an input-output control scheme which comprises a state estimator and an exponential linearizing feedback. The proposed output feedback controller allows chaos suppression and can be applied to a large class of chaotic systems. Explicit expression of the control time is given. Computer simulations confirm the feasibility of the proposed approach. (author)

  15. Hopf Bifurcation Analysis and Chaos Control of a Chaotic System without ilnikov Orbits

    Directory of Open Access Journals (Sweden)

    Na Li

    2015-01-01

    Full Text Available This paper mainly investigates the dynamical behaviors of a chaotic system without ilnikov orbits by the normal form theory. Both the stability of the equilibria and the existence of local Hopf bifurcation are proved in view of analyzing the associated characteristic equation. Meanwhile, the direction and the period of bifurcating periodic solutions are determined. Regarding the delay as a parameter, we discuss the effect of time delay on the dynamics of chaotic system with delayed feedback control. Finally, numerical simulations indicate that chaotic oscillation is converted into a steady state when the delay passes through a certain critical value.

  16. Pseudo random number generator based on the generalized Lorenz chaotic system

    Czech Academy of Sciences Publication Activity Database

    Lynnyk, Volodymyr; Sakamoto, N.; Čelikovský, Sergej

    Tokyo: IFAC, 2015, s. 257-261. ISSN 1474-6670. [The 4th IFAC Conference on Analysis and Control of Chaotic Systems. Tokyo (JP), 26.08.2015-28.08.2015] R&D Projects: GA ČR GA13-20433S Institutional support: RVO:67985556 Keywords : Chaos * chaotic behaviour * random number generators * pseudo random sequences * generalized Lorenz system Subject RIV: BC - Control Systems Theory

  17. Increasing-order Projective Synchronization of Chaotic Systems with Time Delay

    Institute of Scientific and Technical Information of China (English)

    MIAO Qing-Ying; FANG Jian-An; TANG Yang; DONG Ai-Hua

    2009-01-01

    This work is concerned with lag projective synchronization of chaotic systems with increasing order. The systems under consideration have unknown parameters and different structures. Combining the adaptive control method and feedback control technique, we design a suitable controller and parameter update law to achieve lag synchronization of chaotic systems with increasing order. The result is rigorously proved by the Lyapunov stability theorem. Moreover, corresponding simulation results are given to verify the effectiveness of the proposed methods.

  18. Increasing-order Projective Synchronization of Chaotic Systems with Time Delay

    International Nuclear Information System (INIS)

    This work is concerned with lag projective synchronization of chaotic systems with increasing order. The systems under consideration have unknown parameters and different structures. Combining the adaptive control method and feedback control technique, we design a suitable controller and parameter update law to achieve lag synchronization of chaotic systems with increasing order. The result is rigorously proved by the Lyapunov stability theorem. Moreover, corresponding simulation results are given to verify the effectiveness of the proposed methods. (general)

  19. Chaotic anti-control for the bounded linear continuous-time system

    Institute of Scientific and Technical Information of China (English)

    Li Jianfen; Lin Hui; Li Nong

    2008-01-01

    With regard to the bounded linear continuous-time system, a universal chaotic anti-controlling method was presented on the basis of tracking control. A tracking controller is designed to such an extent that it can track any chaotic reference input, thus making it possible to chaotify the linear system. The controller is identical in structure for different controlled linear systems. Computer simulations proved the effectiveness of the proposed method.

  20. Chaotic Behavior in a Flexible Assembly Line of a Manufacturing System

    OpenAIRE

    Sajid, M; F. Almufadi; Jahanzaib, M.

    2015-01-01

    The purpose of the present work is to study the chaotic behavior in a flexible assembly line of a manufacturing system. A flexible assembly line can accommodate a variety of product types. Result analysis is performed to obtain time persistent data. The behavior of the system is observed for Work-In-Process, as assembling systems are sensitive during processing. It is found that the average Lyapunov exponent is positive in the considered case, and thus chaotic behavior may be present in flexi...

  1. Numerical detection of unstable periodic orbits in continuous-time dynamical systems with chaotic behaviors

    Directory of Open Access Journals (Sweden)

    Y. Saiki

    2007-09-01

    Full Text Available An infinite number of unstable periodic orbits (UPOs are embedded in a chaotic system which models some complex phenomenon. Several algorithms which extract UPOs numerically from continuous-time chaotic systems have been proposed. In this article the damped Newton-Raphson-Mees algorithm is reviewed, and some important techniques and remarks concerning the practical numerical computations are exemplified by employing the Lorenz system.

  2. Control of fractional chaotic and hyperchaotic systems based on a fractional order controller

    International Nuclear Information System (INIS)

    We present a new fractional-order controller based on the Lyapunov stability theory and propose a control method which can control fractional chaotic and hyperchaotic systems whether systems are commensurate or incommensurate. The proposed control method is universal, simple, and theoretically rigorous. Numerical simulations are given for several fractional chaotic and hyperchaotic systems to verify the effectiveness and the universality of the proposed control method. (general)

  3. Adaptive fuzzy observer based synchronization design and secure communications of chaotic systems

    International Nuclear Information System (INIS)

    This paper proposes a synchronization design scheme based on an alternative indirect adaptive fuzzy observer and its application to secure communication of chaotic systems. It is assumed that their states are unmeasurable and their parameters are unknown. Chaotic systems and the structure of the fuzzy observer are represented by the Takagi-Sugeno fuzzy model. Using Lyapunov stability theory, an adaptive law is derived to estimate the unknown parameters and the stability of the proposed system is guaranteed. Through this process, the asymptotic synchronization of chaotic systems is achieved. The proposed observer is applied to secure communications of chaotic systems and some numerical simulation results show the validity of theoretical derivations and the performance of the proposed observer

  4. The open-plus-closed loop (OPCL) method for chaotic systems with multiple strange attractors

    Institute of Scientific and Technical Information of China (English)

    Song Yun-Zhong

    2007-01-01

    Based on the open-plus-closed-loop (OPCL) control method a systematic and comprehensive controller is presented in this paper for a chaotic system, that is, the Newton-Leipnik equation with two strange attractors: the upper attractor(UA) and the lower attractor (LA). Results show that the final structure of the suggested controller for stabilization has a simple linear feedback form. To keep the integrity of the suggested approach, the globality proof of the basins of entrainment is also provided. In virtue of the OPCL technique, three different kinds of chaotic controls of the system are investigated, separately: the original control forcing the chaotic motion to settle down to the origin from an arbitrary position of the phase space; the chaotic intra-attractor control for stabilizing the equilibrium points only belonging to the upper chaotic attractor or the lower chaotic one; and the inter-attractor control for compelling the chaotic oscillation from one basin to another one. Both theoretical analysis and simulation results verify the validity of the proposed means.

  5. Photodissociation in Quantum Chaotic Systems: Random Matrix Theory of Cross-Section Fluctuations

    OpenAIRE

    Fyodorov, Yan V.; Alhassid, Yoram

    1998-01-01

    Using the random matrix description of open quantum chaotic systems we calculate in closed form the universal autocorrelation function and the probability distribution of the total photodissociation cross section in the regime of quantum chaos.

  6. Phase space reconstruction of chaotic dynamical system based on wavelet decomposition

    International Nuclear Information System (INIS)

    In view of the disadvantages of the traditional phase space reconstruction method, this paper presents the method of phase space reconstruction based on the wavelet decomposition and indicates that the wavelet decomposition of chaotic dynamical system is essentially a projection of chaotic attractor on the axes of space opened by the wavelet filter vectors, which corresponds to the time-delayed embedding method of phase space reconstruction proposed by Packard and Takens. The experimental results show that, the structure of dynamical trajectory of chaotic system on the wavelet space is much similar to the original system, and the nonlinear invariants such as correlation dimension, Lyapunov exponent and Kolmogorov entropy are still reserved. It demonstrates that wavelet decomposition is effective for characterizing chaotic dynamical system. (general)

  7. Runge-Kutta model-based nonlinear observer for synchronization and control of chaotic systems.

    Science.gov (United States)

    Beyhan, Selami

    2013-07-01

    This paper proposes a novel nonlinear gradient-based observer for synchronization and observer-based control of chaotic systems. The model is based on a Runge-Kutta model of the chaotic system where the evolution of the states or parameters is derived based on the error-square minimization. The stability and convergence conditions of observer and control methods are analyzed using a Lyapunov stability approach. In numerical simulations, the proposed observer and well-known sliding-mode observer are compared for the synchronization of a Lü chaotic system and observer-based stabilization of a Chen chaotic system. The noisy case for synchronization and parameter uncertainty case for stabilization are also considered for both observer-based methods. PMID:23672740

  8. Application of Multistage Homotopy Perturbation Method to the Chaotic Genesio System

    Directory of Open Access Journals (Sweden)

    M. S. H. Chowdhury

    2012-01-01

    Full Text Available Finding accurate solution of chaotic system by using efficient existing numerical methods is very hard for its complex dynamical behaviors. In this paper, the multistage homotopy-perturbation method (MHPM is applied to the Chaotic Genesio system. The MHPM is a simple reliable modification based on an adaptation of the standard homotopy-perturbation method (HPM. The HPM is treated as an algorithm in a sequence of intervals for finding accurate approximate solutions to the Chaotic Genesio system. Numerical comparisons between the MHPM and the classical fourth-order Runge-Kutta (RK4 solutions are made. The results reveal that the new technique is a promising tool for the nonlinear chaotic systems of ordinary differential equations.

  9. Chaotic behaviour of nonlinear coupled reaction–diffusion system in four-dimensional space

    Indian Academy of Sciences (India)

    Li Zhang; Shutang Liu; Chenglong Yu

    2014-06-01

    In recent years, nonlinear coupled reaction–diffusion (CRD) system has been widely investigated by coupled map lattice method. Previously, nonlinear behaviour was observed dynamically when one or two of the three variables in the discrete system change. In this paper, we consider the chaotic behaviour when three variables change, which is called as four-dimensional chaos. When two parameters in the discrete system are unknown, we first give the existing condition of the chaos in four-dimensional space by the generalized definitions of spatial periodic orbits and spatial chaos. In addition, the chaotic behaviour will vary with the parameters. Then we propose a generalized Lyapunov exponent in four-dimensional space to characterize the different effects of parameters on the chaotic behaviour, which has not been studied in detail. In order to verify the chaotic behaviour of the system and the different effects clearly, we simulate the dynamical behaviour in two- and three-dimensional spaces.

  10. Attractors of relaxation discrete-time systems with chaotic dynamics on a fast time scale

    Science.gov (United States)

    Maslennikov, Oleg V.; Nekorkin, Vladimir I.

    2016-07-01

    In this work, a new type of relaxation systems is considered. Their prominent feature is that they comprise two distinct epochs, one is slow regular motion and another is fast chaotic motion. Unlike traditionally studied slow-fast systems that have smooth manifolds of slow motions in the phase space and fast trajectories between them, in this new type one observes, apart the same geometric objects, areas of transient chaos. Alternating periods of slow regular motions and fast chaotic ones as well as transitions between them result in a specific chaotic attractor with chaos on a fast time scale. We formulate basic properties of such attractors in the framework of discrete-time systems and consider several examples. Finally, we provide an important application of such systems, the neuronal electrical activity in the form of chaotic spike-burst oscillations.

  11. NOISE-INDUCED CHAOTIC MOTIONS IN HAMILTONIAN SYSTEMS WITH SLOW-VARYING PARAMETERS

    Institute of Scientific and Technical Information of China (English)

    王双连; 郭乙木; 甘春标

    2001-01-01

    This paper studies chaotic motions in quasi-integrable Hamiltonian systems with slow-varying parameters under both harmonic and noise excitations.Based on the dynamic theory and some assumptions of excited noises, an extended form of the stochastic Melnikov method is presented. Using this extended method, the homoclinic bifurcations and chaotic behavior of a nonlinear Hamiltonian system with weak feed-back control under both harmonic and Gaussian white noise excitations are analyzed in detail. It is shown that the addition of stochastic excitations can make the parameter threshold value for the occurrence of chaotic motions vary in a wider region. Therefore, chaotic motions may arise easily in the system. By the Monte-Carlo method, the numerical results for the time-history and the maximum Lyapunov exponents of an example system are finally given to illustrate that the presented method is effective.

  12. Message Embedded Synchronization for the Generalized Lorenz System and Its Use for Chaotic Masking

    Czech Academy of Sciences Publication Activity Database

    Čelikovský, Sergej; Lynnyk, Volodymyr

    Vol. 210. Cham: Springer, 2013, s. 313-322 ISBN 978-3-319-00541-6. ISSN 2194-5357. [Nostradamus 2013. Ostrava (CZ), 03.06.2013-05.06.2013] R&D Projects: GA ČR GA13-20433S Institutional support: RVO:67985556 Keywords : chaos synchronization * secury encryption Subject RIV: BC - Control System s Theory

  13. Adaptive lag synchronization and parameter identification of fractional order chaotic systems

    Institute of Scientific and Technical Information of China (English)

    Zhang Ruo-Xun; Yang Shi-Ping

    2011-01-01

    This paper proposes a simple scheme for the lag synchronization and the parameter identification of fractional order chaotic systems based on the new stability theory. The lag synchronization is achieved and the unknown parameters are identified by using the adaptive lag laws. Moreover,the scheme is analytical and is simple to implement in practice.The well-known fractional order chaotic Lii system is used to illustrate the validity of this theoretic method.

  14. Adaptive generalized projective synchronization of two different chaotic systems with unknown parameters

    Institute of Scientific and Technical Information of China (English)

    Zhang Ruo-Xun; Yang Shi-Ping

    2008-01-01

    This paper presents a general method of the generalized projective synchronization and the parameter identification between two different chaotic systems with unknown parameters.This approach is based on Lyapunov stability theory,and employs a combination of feedback control and adaptive control.With this method one can achieve the generalized projective synchronization and realize the parameter identifications between almost all chaotic (hyperchaotic) systems with unknown parameters.Numerical simulations results are presented to demonstrate the effectiveness of the method.

  15. Hybrid Dislocated Control and General Hybrid Projective Dislocated Synchronization for Memristor Chaotic Oscillator System

    OpenAIRE

    Junwei Sun; Chun Huang; Guangzhao Cui

    2014-01-01

    Some important dynamical properties of the memristor chaotic oscillator system have been studied in the paper. A novel hybrid dislocated control method and a general hybrid projective dislocated synchronization scheme have been realized for memristor chaotic oscillator system. The paper firstly presents hybrid dislocated control method for stabilizing chaos to the unstable equilibrium point. Based on the Lyapunov stability theorem, general hybrid projective dislocated synchronization has been...

  16. Efficient sensitivity analysis method for chaotic dynamical systems

    Science.gov (United States)

    Liao, Haitao

    2016-05-01

    The direct differentiation and improved least squares shadowing methods are both developed for accurately and efficiently calculating the sensitivity coefficients of time averaged quantities for chaotic dynamical systems. The key idea is to recast the time averaged integration term in the form of differential equation before applying the sensitivity analysis method. An additional constraint-based equation which forms the augmented equations of motion is proposed to calculate the time averaged integration variable and the sensitivity coefficients are obtained as a result of solving the augmented differential equations. The application of the least squares shadowing formulation to the augmented equations results in an explicit expression for the sensitivity coefficient which is dependent on the final state of the Lagrange multipliers. The LU factorization technique to calculate the Lagrange multipliers leads to a better performance for the convergence problem and the computational expense. Numerical experiments on a set of problems selected from the literature are presented to illustrate the developed methods. The numerical results demonstrate the correctness and effectiveness of the present approaches and some short impulsive sensitivity coefficients are observed by using the direct differentiation sensitivity analysis method.

  17. Generalized Gaussian wave packet dynamics: Integrable and chaotic systems.

    Science.gov (United States)

    Pal, Harinder; Vyas, Manan; Tomsovic, Steven

    2016-01-01

    The ultimate semiclassical wave packet propagation technique is a complex, time-dependent Wentzel-Kramers-Brillouin method known as generalized Gaussian wave packet dynamics (GGWPD). It requires overcoming many technical difficulties in order to be carried out fully in practice. In its place roughly twenty years ago, linearized wave packet dynamics was generalized to methods that include sets of off-center, real trajectories for both classically integrable and chaotic dynamical systems that completely capture the dynamical transport. The connections between those methods and GGWPD are developed in a way that enables a far more practical implementation of GGWPD. The generally complex saddle-point trajectories at its foundation are found using a multidimensional Newton-Raphson root search method that begins with the set of off-center, real trajectories. This is possible because there is a one-to-one correspondence. The neighboring trajectories associated with each off-center, real trajectory form a path that crosses a unique saddle; there are exceptions that are straightforward to identify. The method is applied to the kicked rotor to demonstrate the accuracy improvement as a function of ℏ that comes with using the saddle-point trajectories. PMID:26871079

  18. Chattering-free fuzzy sliding-mode control strategy for uncertain chaotic systems

    International Nuclear Information System (INIS)

    This paper proposes a chattering-free fuzzy sliding-mode control (FSMC) strategy for uncertain chaotic systems. A fuzzy logic control is used to replace the discontinuous sign function of the reaching law in traditional sliding-mode control (SMC), and hence a control input without chattering is obtained in the chaotic systems with uncertainties. Base on the Lyapunov stability theory, we address the design schemes of integration fuzzy sliding-mode control, where the reaching law is proposed by a set of linguistic rules and the control input is chattering free. The Genesio chaotic system is used to test the proposed control strategy and the simulation results show the FSMC not only can control the uncertain chaotic behaviors to a desired state without oscillator very fast, but also the switching function is smooth without chattering. This result implies that this strategy is feasible and effective for chaos control

  19. The Route from Synchronization to Desynchronization of Chaotic Operating Circuits and Systems

    Science.gov (United States)

    Stavrinides, Stavros G.; Anagnostopoulos, Antonios N.

    In a world of an ever increasing information-trafficking, ultra wideband information transmission, as well as security are main issues. Chaotic oscillators inherently possess these two properties. Consequently, chaotic transmitter-receiver synchronization emerges as a key-topic in networked communication. The issues of synchronization robustness and synchronization stability are of great importance, if one means to turn in advantage properties of chaotic operating circuits and systems. As a result, not only synchronization accomplishment but also the ways a system desynchronizes is of great importance, if not crucial; however, these are not, usually, thoroughly studied. In this contribution a short overview of experimental work dedicated to the ways chaotic-synchronized communication systems desynchronize, is provided.

  20. Bounds for a new chaotic system and its application in chaos synchronization

    Science.gov (United States)

    Zhang, Fuchen; Shu, Yonglu; Yang, Hongliang

    2011-03-01

    This paper has investigated the localization problem of compact invariant sets of a new chaotic system with the help of the iteration theorem and the first order extremum theorem. If there are more iterations, then the estimation for the bound of the system will be more accurate, because the shape of the chaotic attractor is irregular. We establish that all compact invariant sets of this system are located in the intersection of a ball with two frusta and we also compute its parameters. It is a great advantage that we can attain a smaller bound of the chaotic attractor compared with the classical method. One numerical example illustrating a localization of a chaotic attractor is presented as well.

  1. Pi_1-Statements, Chaotic Systems and the Church-Turing Thesis

    CERN Document Server

    Calude, Cristian S; Svozil, Karl

    2010-01-01

    Proving that a dynamical system is chaotic is an important problem in chaos theory. In this note we show that to every Pi_1-statement one can associate a dynamical system such that proving in Zermelo-Fraenkel set theory with the Axiom of Choice (ZFC), the chaoticity of the dynamical system is equivalent to proving this statement in ZFC. Fermat's last theorem, the Riemann hypothesis and the four color theorem are examples of Pi_1-statements. By applying a computational method to Pi_1-statements we evaluate the complexity of proving the chaoticity of some dynamical systems. We show that there are dynamical systems for which the ZFC proofs of their chaoticity are arbitrarily complex according to the above complexity measure. Also, there are infinitely many chaotic systems for which ZFC cannot prove their chaoticity. The techniques are related to (i) the construction of a Poincare box as a classical physical random number generator (akin to a quantum Born box), and (ii) the conceivable capability of classical phy...

  2. The nonholonomic and chaotic nature of a rolling isolation system

    Science.gov (United States)

    Harvey, P. Scott; Gavin, Henri P.

    2013-07-01

    This paper presents the modeling of a rolling isolation platform used to protect objects from the hazards of horizontal shaking. The platform is built from four pairs of recessed steel bowls: four concave-up, attached to a shaking floor via a steel frame, and four concave-down, attached to the isolated object via a steel frame. Four steel ball-bearings, located between these bowls, allow the bottom- and top-frames to roll with respect to one another. In order for the four ball-bearings to remain in contact with the bowls during times of large angular rotation, the top-frame is assumed to conform to a saddle shape. The kinematics of the rolling contact impose a set of eight nonholonomic constraints to the translational and rotational dynamics of the platform center. The nonholonomic equations of state are found from the fundamental form of Lagrange's equation, which incorporates velocity constraints via Lagrange multipliers. A viscous damping model calibrated to experimental free-responses depends upon the mass of the isolated object. Precise photogrammetric measurements of a sample of these steel bowls provide the data required to calibrate the potential energy function for this system. It is shown that for the non-quadratic potential energy function of this particular system, free response trajectories are strongly sensitive to slight perturbations in initial conditions, and that the system is, in fact, chaotic. Even in the absence of any mass or stiffness eccentricity, translational and rotational motions are nonlinearly coupled through the constraint of slip-free rolling. Uni-axial models cannot be used to predict responses of these systems.

  3. Improving performance of DS-CDMA systems using chaotic complex Bernoulli spreading codes

    Science.gov (United States)

    Farzan Sabahi, Mohammad; Dehghanfard, Ali

    2014-12-01

    The most important goal of spreading spectrum communication system is to protect communication signals against interference and exploitation of information by unintended listeners. In fact, low probability of detection and low probability of intercept are two important parameters to increase the performance of the system. In Direct Sequence Code Division Multiple Access (DS-CDMA) systems, these properties are achieved by multiplying the data information in spreading sequences. Chaotic sequences, with their particular properties, have numerous applications in constructing spreading codes. Using one-dimensional Bernoulli chaotic sequence as spreading code is proposed in literature previously. The main feature of this sequence is its negative auto-correlation at lag of 1, which with proper design, leads to increase in efficiency of the communication system based on these codes. On the other hand, employing the complex chaotic sequences as spreading sequence also has been discussed in several papers. In this paper, use of two-dimensional Bernoulli chaotic sequences is proposed as spreading codes. The performance of a multi-user synchronous and asynchronous DS-CDMA system will be evaluated by applying these sequences under Additive White Gaussian Noise (AWGN) and fading channel. Simulation results indicate improvement of the performance in comparison with conventional spreading codes like Gold codes as well as similar complex chaotic spreading sequences. Similar to one-dimensional Bernoulli chaotic sequences, the proposed sequences also have negative auto-correlation. Besides, construction of complex sequences with lower average cross-correlation is possible with the proposed method.

  4. ANALYSIS AND APPLIED STUDY OF DYNAMIC CHARACTERISTICS OF CHAOTIC REPELLER IN COMPLICATED SYSTEM

    Institute of Scientific and Technical Information of China (English)

    MA Jun-hai; REN Biao; CHEN Yu-shu

    2005-01-01

    Fractal characters and fractal dimension of time series created by repeller in complicated system were studied and the time series were reconstructed by applying the theory of phase space reconstruction for chaotic time series. The influence of zero-mean treatment, Fourier filter on prediction for time series were studied. The choice of prediction sample affects the relative error and the prediction length which were also under good concern. The results show that the model provided here are practical for the modeling and prediction of time series created by chaotic repellers. Zero-mean treatment has changed prediction result quantitatively for chaotic repeller sample data. But using Fourier filter may decrease the prediction precision. This is theoretical and practical for study on chaotic repeller in complicated system.

  5. Theoretical model of optical fiber secure communication system with chaotic multiple-quantum-well lasers

    Institute of Scientific and Technical Information of China (English)

    2007-01-01

    Chaotic synchronization of injected multiple-quantum-well lasers of optical fiber system and a theoretical model of optical fiber chaotic secure communication system are presented by coupling a chaotic multiple-quantum-well laser synchronization system and a fiber channel. A new chaotic encoding method of chaos phase shift keying On/Off is proposed for optical fiber secure communications. Chaotic synchronization is achieved numerically in long-haul fiber system at wavelength 1.55μm. The effect of the nonlinear-phase of fiber is analyzed on chaotic signal and synchronization. A sinusoidal signal of 0.2 GHz frequency is simulated numerically with chaos masking in long-haul fiber analog communication at wavelength 1.55μm while a digital signal of 0.5 Gbit/s bit rate is simulated numerically with c1 haos masking and a rate of 0.05 Gbit/s are also simulated numerically with chaos shift keying and chaos phase shift keying On/Off in long-haul fiber digital communications at wavelength 1.55μm

  6. A Chaotic Block Cipher for Real-Time Multimedia

    Directory of Open Access Journals (Sweden)

    M. Venkatesulu

    2012-01-01

    Full Text Available Problem statement: The widespread use of image, audio and video data makes media content protection increasingly necessary and important. We propose a naive approach which treats the multimedia signal to be protected as a text and use proposed encryption design to encrypt the whole data stream. Upon reception, the entire cipher text data stream would be decrypted and playback can be performed at the client end with an initial time delay. Approach: We introduce a block cipher algorithm, which encrypts and decrypts a block size of 512 bits regardless of the file format. In this, a permutation algorithm using a chaotic system is employed to provide the shuffler function. A shuffler operator is defined using the shuffler function. A random key generator generates key sequences and the scheme employs key-dependant transformations based on distance in the shuffling operator. The process of encryption/decryption is governed by the shuffler function, shuffler operator and the pseudorandom key. Results: The basic operation used is logical XOR and so the algorithm has a very high encryption/decryption speed. The execution time shows the proposed scheme is faster than the existing cryptographic schemes. Conclusion: The proposal of the algorithm is to manage the tradeoffs between the speed and security and hence appropriate for real-time image and video communication applications.

  7. The Research of Mobile phone Entrance Guard System Model based on the Encryption Two-dimensional Code

    Directory of Open Access Journals (Sweden)

    Chu Jianli

    2013-09-01

    Full Text Available This article designs a new mobile-phone entrance guard system, uses the encryption two-dimensional code for identity authentication. Different from other similar products in the market, this system does not rely on specialized mobile phone card or NFC (near field communication module. It can be directly realized through mobile-phone software, and it can be operated simple and safer. This article designs the whole system model, includes structure, function and workflow. It also analyzes and researches the main algorithms used in the system, which include security policy algorithm, encryption two-dimensional code algorithm and image recognition algorithm. Finally, it provides the solution method for the problem in the experimental simulation. It also evaluated and summarized the experimental results.

  8. A General Response System Control Method Based on Backstepping Design for Synchronization of Continuous Scalar Chaotic Signal

    Institute of Scientific and Technical Information of China (English)

    WANG Jing; GAO Jin-Feng; MA Xi-Kui; LIANG Zhan-Hong

    2006-01-01

    @@ A general response system control method for synchronization of continuous scalar chaotic signal is presented. The proposed canonical general response system can cover most of the well-known chaotic systems. Conversely, each of these chaotic systems can also be used to construct the general response system. Furthermore, a novel controller of the proposed response system is designed based on backstepping technique, with which the output of the general response system and the given continuous chaotic signal can synchronize perfectly. Two numerical examples are given to illustrate the effectiveness of the proposed control method.

  9. Hardware stream cipher with controllable chaos generator for colour image encryption

    KAUST Repository

    Barakat, Mohamed L.

    2014-01-01

    This study presents hardware realisation of chaos-based stream cipher utilised for image encryption applications. A third-order chaotic system with signum non-linearity is implemented and a new post processing technique is proposed to eliminate the bias from the original chaotic sequence. The proposed stream cipher utilises the processed chaotic output to mask and diffuse input pixels through several stages of XORing and bit permutations. The performance of the cipher is tested with several input images and compared with previously reported systems showing superior security and higher hardware efficiency. The system is experimentally verified on XilinxVirtex 4 field programmable gate array (FPGA) achieving small area utilisation and a throughput of 3.62 Gb/s. © The Institution of Engineering and Technology 2013.

  10. Composite encryption algorithm based on combing chaos control with choosing rule%基于混沌控制的选择复合加密算法

    Institute of Scientific and Technical Information of China (English)

    王阳; 吴成茂; 梁睿

    2012-01-01

    为了提高图像信息的安全性,提出一种混沌技术和像素扩散加密相结合的图像加密新算法。利用Runge-Kutta方法求解四维混沌系统并经非线性处理产生混沌序列,用以控制图像扩散加密方式并获得多种扩散加密方法相融合的复合加密算法。对图像加密结果的相邻像素相关性、密钥敏感性、抗差分攻击等性能所进行的分析研究以及相关实验结果均表明,所提新算法具有可行性,且安全性能较高。%In order to enhance the security of image information, a New Image Encryption Algorithm based on combination of chaos control with pixel diffusion encryption is proposed. Firstly, Runge-Kutta method is used to solve fourth-dimension chaotic systems, and obtains a chaotic integer sequence by means of non-linear processing. Secondly, image diffusion encryption is controlled by combining the chaotic integer sequence with choosing rule, and obtained the composite encryption algorithm which includes a variety of diffusion encryption methods. In the end, anayze the correlations between pixels, the sensitivity of keys, against differential cryptanalysis of the image encryption results. Experimental results show that, the image encryption algorithm proposed in the paper is feasible and has high safety performance.

  11. STUDY ON PREDICTION METHODS FOR DYNAMIC SYSTEMS OF NONLINEAR CHAOTIC TIME SERIES

    Institute of Scientific and Technical Information of China (English)

    马军海; 陈予恕; 辛宝贵

    2004-01-01

    The prediction methods for nonlinear dynamic systems which are decided by chaotic time series are mainly studied as well as structures of nonlinear self-related chaotic models and their dimensions.By combining neural networks and wavelet theories,the structures of wavelet transform neural networks were studied and also a wavelet neural networks learning method was given.Based on wavelet networks,a new method for parameter identification was suggested,which can be used selectively to extract different scales of frequency and time in time series in order to realize prediction of tendencies or details of original time series.Through pre-treatment and comparison of results before and after the treatment,several useful conclusions are reached:High accurate identification can be guaranteed by applying wavelet networks to identify parameters of self-related chaotic models and more valid prediction of the chaotic time series including noise can be achieved accordingly.

  12. Chaotic matter shock wave of an open system

    International Nuclear Information System (INIS)

    We investigate a one-dimensional open Bose-Einstein condensate with attractive interaction, by considering the effect of feeding from nonequilibrium thermal cloud and applying the time-periodic inverted-harmonic potential. Using the direct perturbation method and the exact shock wave solution of the stationary Gross—Pitaevskii equation, we obtain the chaotic perturbed solution and the Melnikov chaotic regions. Based on the analytical and the numerical methods, the influence of the feeding strength on the chaotic motion is revealed. It is shown that the chaotic regions could be enlarged by reducing the feeding strength and the increase of feeding strength plays a role in suppressing chaos. In the case of “nonpropagated” shock wave with fixed boundary, the number of condensed atoms increases faster as the feeding strength increases. However, for the free boundary the metastable shock wave with fixed front density oscillates its front position and atomic number aperiodically, and their amplitudes decay with the increase of the feeding strength. (general)

  13. OCML-based colour image encryption

    International Nuclear Information System (INIS)

    The chaos-based cryptographic algorithms have suggested some new ways to develop efficient image-encryption schemes. While most of these schemes are based on low-dimensional chaotic maps, it has been proposed recently to use high-dimensional chaos namely spatiotemporal chaos, which is modelled by one-way coupled-map lattices (OCML). Owing to their hyperchaotic behaviour, such systems are assumed to enhance the cryptosystem security. In this paper, we propose an OCML-based colour image encryption scheme with a stream cipher structure. We use a 192-bit-long external key to generate the initial conditions and the parameters of the OCML. We have made several tests to check the security of the proposed cryptosystem namely, statistical tests including histogram analysis, calculus of the correlation coefficients of adjacent pixels, security test against differential attack including calculus of the number of pixel change rate (NPCR) and unified average changing intensity (UACI), and entropy calculus. The cryptosystem speed is analyzed and tested as well.

  14. OCML-based colour image encryption

    Energy Technology Data Exchange (ETDEWEB)

    Rhouma, Rhouma [6' tel, Ecole Superieure de Telecommunications (Sup' com), BP Numero 50, 6014 Mtorech, Gabes (Tunisia)], E-mail: rhoouma@yahoo.fr; Meherzi, Soumaya [6' tel, Ecole Superieure de Telecommunications (Sup' com), BP Numero 50, 6014 Mtorech, Gabes (Tunisia); LSS/SUPELEC/CNRS, Plateau de Moulon, 91192 Gif-sur-Yvette, Cedex (France)], E-mail: mehrzi@lss.supelec.fr; Belghith, Safya [6' tel, Ecole Superieure de Telecommunications (Sup' com), BP Numero 50, 6014 Mtorech, Gabes (Tunisia)], E-mail: safya.belghith@enit.rnu.tn

    2009-04-15

    The chaos-based cryptographic algorithms have suggested some new ways to develop efficient image-encryption schemes. While most of these schemes are based on low-dimensional chaotic maps, it has been proposed recently to use high-dimensional chaos namely spatiotemporal chaos, which is modelled by one-way coupled-map lattices (OCML). Owing to their hyperchaotic behaviour, such systems are assumed to enhance the cryptosystem security. In this paper, we propose an OCML-based colour image encryption scheme with a stream cipher structure. We use a 192-bit-long external key to generate the initial conditions and the parameters of the OCML. We have made several tests to check the security of the proposed cryptosystem namely, statistical tests including histogram analysis, calculus of the correlation coefficients of adjacent pixels, security test against differential attack including calculus of the number of pixel change rate (NPCR) and unified average changing intensity (UACI), and entropy calculus. The cryptosystem speed is analyzed and tested as well.

  15. Adaptive robust control of chaotic oscillations in power system with excitation limits

    Institute of Scientific and Technical Information of China (English)

    Wei Du-Qu; Luo Xiao-Shu

    2007-01-01

    With system parameters falling into a certain area, power system with excitation limits experiences complicated chaotic oscillations which threaten the secure and stable operation of power system. In this paper, to control these unwanted chaotic oscillations, a straightforward adaptive chaos controller based on Lyapunov asymptotical stability theory is designed. Since the presented controller does not need to change the controlled system structure and not to use any information of system except the system state variables, the designed controller is simple and desirable.Simulation results show that the proposed control law is very effective. This work is helpful to maintain the power system's security operation.

  16. Multi-machine power system stabilizers design using chaotic optimization algorithm

    International Nuclear Information System (INIS)

    In this paper, a multiobjective design of the multi-machine power system stabilizers (PSSs) using chaotic optimization algorithm (COA) is proposed. Chaotic optimization algorithms, which have the features of easy implementation, short execution time and robust mechanisms of escaping from the local optimum, is a promising tool for the engineering applications. The PSSs parameters tuning problem is converted to an optimization problem which is solved by a chaotic optimization algorithm based on Lozi map. Since chaotic mapping enjoys certainty, ergodicity and the stochastic property, the proposed chaotic optimization problem introduces chaos mapping using Lozi map chaotic sequences which increases its convergence rate and resulting precision. Two different objective functions are proposed in this study for the PSSs design problem. The first objective function is the eigenvalues based comprising the damping factor, and the damping ratio of the lightly damped electro-mechanical modes, while the second is the time domain-based multi-objective function. The robustness of the proposed COA-based PSSs (COAPSS) is verified on a multi-machine power system under different operating conditions and disturbances. The results of the proposed COAPSS are demonstrated through eigenvalue analysis, nonlinear time-domain simulation and some performance indices. In addition, the potential and superiority of the proposed method over the classical approach and genetic algorithm is demonstrated.

  17. Extreme multistability in a memristor-based multi-scroll hyper-chaotic system

    Science.gov (United States)

    Yuan, Fang; Wang, Guangyi; Wang, Xiaowei

    2016-07-01

    In this paper, a new memristor-based multi-scroll hyper-chaotic system is designed. The proposed memristor-based system possesses multiple complex dynamic behaviors compared with other chaotic systems. Various coexisting attractors and hidden coexisting attractors are observed in this system, which means extreme multistability arises. Besides, by adjusting parameters of the system, this chaotic system can perform single-scroll attractors, double-scroll attractors, and four-scroll attractors. Basic dynamic characteristics of the system are investigated, including equilibrium points and stability, bifurcation diagrams, Lyapunov exponents, and so on. In addition, the presented system is also realized by an analog circuit to confirm the correction of the numerical simulations.

  18. The generation of a hyperchaotic system based on a three-dimensional autonomous chaotic system

    Institute of Scientific and Technical Information of China (English)

    Wang Jie-Zhi; Chen Zeng-Qiang; Yuan Zhu-Zhi

    2006-01-01

    This paper reports a new four-dimensional hyperchaotic system obtained by adding a controller to a threedimensional autonomous chaotic system. The new system has two parameters, and each equation of the system has one quadratic cross-product term. Some basic properties of the new system are analysed. The different dynamic behaviours of the new system are studied when the system parameter a or b is varied. The system is hyperchaotic in several different regions of the parameter b. Especially, the two positive Lyapunov exponents are both larger, and the hyperchaotic region is also larger when this system is hyperchaotic in the case of varying a. The hyperchaotic system is analysed by

  19. A new secured transmission scheme based on chaotic synchronization via smooth adaptive unknown-input observers

    Science.gov (United States)

    Dimassi, Habib; Loría, Antonio; Belghith, Safya

    2012-09-01

    We present a new scheme for the secured transmission of information based on master-slave synchronization of chaotic systems, using unknown-input observers. Our approach improves upon state-of-the-art schemes by being compatible with information of relatively large amplitude while improving security against intruders through an intricate encryption system. In addition, our approach is robust to channel noise. The main idea is to separate the encryption and synchronization operations by using two cascaded chaotic systems in the transmitter. Technically, the scheme is based on smooth adaptive unknown-input observers; these have the advantage to estimate the (master) states and to reconstruct the unknown inputs simultaneously. The performance of the communication system is illustrated in numerical simulation.

  20. Image encryption a communication perspective

    CERN Document Server

    Abd El-Samie, Fathi E; Elashry, Ibrahim F; Shahieen, Mai H; Faragallah, Osama S; El-Rabaie, El-Sayed M; Alshebeili, Saleh A

    2013-01-01

    Presenting encryption algorithms with diverse characteristics, Image Encryption: A Communication Perspective examines image encryption algorithms for the purpose of secure wireless communication. It considers two directions for image encryption: permutation-based approaches encryption and substitution-based approaches.Covering the spectrum of image encryption principles and techniques, the book compares image encryption with permutation- and diffusion-based approaches. It explores number theory-based encryption algorithms such as the Data Encryption Standard, the Advanced Encryption Standard,

  1. A novel hyperchaos evolved from three dimensional modified Lorenz chaotic system

    Institute of Scientific and Technical Information of China (English)

    Wang Fan-Zhen; Chen Zeng-Qiang; Wu Wen-Juan; Yuan Zhu-Zhi

    2007-01-01

    This paper reports a new four-dimensional continuous autonomous hyperchaos generated from the Lorenz chaotic system by introducing a nonlinear state feedback controller. Some basic properties of the system are investigated by means of Lyapunov exponent spectrum and bifurcation diagrams. By numerical simulating, this paper verifies that the four-dimensional system can evolve into periodic, quasi-periodic, chaotic and hyperchaotic behaviours. And the new dynamical system is hyperchaotic in a large region. In comparison with other known hyperchaos, the two positive Lyapunov exponents of the new system are relatively more larger. Thus it has more complex degree.

  2. Parameter estimation for chaotic systems with a Drift Particle Swarm Optimization method

    International Nuclear Information System (INIS)

    Inspired by the motion of electrons in metal conductors in an electric field, we propose a variant of Particle Swarm Optimization (PSO), called Drift Particle Swarm Optimization (DPSO) algorithm, and apply it in estimating the unknown parameters of chaotic dynamic systems. The principle and procedure of DPSO are presented, and the algorithm is used to identify Lorenz system and Chen system. The experiment results show that for the given parameter configurations, DPSO can identify the parameters of the systems accurately and effectively, and it may be a promising tool for chaotic system identification as well as other numerical optimization problems in physics.

  3. An Information-Theoretic Analysis of the Security of Communication Systems Employing the Encoding-Encryption Paradigm

    CERN Document Server

    Oggier, Frederique

    2010-01-01

    This paper proposes a generic approach for providing enhanced security to communication systems which encode their data for reliability before encrypting it through a stream cipher for security. We call this counter-intuitive technique the {\\em encoding-encryption} paradigm, and use as motivating example the standard for mobile telephony GSM. The enhanced security is based on a dedicated homophonic or wire-tap channel coding that introduces pure randomness, combined with the randomness of the noise occurring over the communication channel. Security evaluation regarding recovery of the secret key employed in the keystream generator is done through an information theoretical approach. We show that with the aid of a dedicated wire-tap encoder, the amount of uncertainty that the adversary must face about the secret key given all the information he could gather during different passive or active attacks he can mount, is a decreasing function of the sample available for cryptanalysis. This means that the wire-tap e...

  4. PC synchronization of a class of chaotic systems via event-triggered control

    International Nuclear Information System (INIS)

    The PC synchronization of a class of chaotic systems is investigated in this paper. The drive system is assumed to have only one state variable available. By constructing proper observers, some novel criteria for PC synchronization are proposed via event-triggered control scheme. The Lü system and Chen system are taken as examples to demonstrate the efficiency of the proposed approach. (general)

  5. Parameter self-adaptive synchronization control for a kind of financial chaotic systems

    Institute of Scientific and Technical Information of China (English)

    PU Xing-cheng; WANG Hai-ying

    2009-01-01

    A parameter adaptive control approach was applied to a kind of financial chaotic systems. According to Lyapunov stability theorem, synchronization of two financial chaotic systems with different certain parameters or the same uncertain parameters were implemented through designing proper control functions and using parameters self-adaptive control principle. The sufficient synchronization conditions of the two financial systems were obtained. Under the situation of the same uncertain parameters, the synchronization system has simpler controller and better performance. Numerical simulations show the effectiveness of the method.

  6. The adaptive synchronization of fractional-order Liu chaotic system with unknown parameters

    Indian Academy of Sciences (India)

    NOURIAN ADELEH; BALOCHIAN SAEED

    2016-06-01

    In this paper, the chaos control and the synchronization of two fractional-order Liu chaotic systems with unknown parameters are studied. According to the Lyapunov stabilization theory and the adaptive control theorem, the adaptive control rule is obtained for the described error dynamic stabilization. Using the adaptive rule and a proper Lyapunov candidate function, the unknown coefficients of the system are estimated and the stabilization of the synchronizer system is demonstrated. Finally, the numerical simulation illustrates the efficiency of the proposed method in synchronizing two chaotic systems.

  7. Dynamical analysis and circuit simulation of a new three-dimensional chaotic system

    International Nuclear Information System (INIS)

    This paper reports a new three-dimensional autonomous chaotic system. It contains six control parameters and three nonlinear terms. Two cross-product terms are respectively in two equations. And one square term is in the third equation. Basic dynamic properties of the new system are investigated by means of theoretical analysis, numerical simulation, sensitivity to initial, power spectrum, Lyapunov exponent, and Poincaré diagrams. The dynamic properties affected by variable parameters are also analysed. Finally, the chaotic system is simulated by circuit. The results verify the existence and implementation of the system. (general)

  8. Isochronal synchronization of time delay and delay-coupled chaotic systems

    Science.gov (United States)

    Grzybowski, J. M. V.; Macau, E. E. N.; Yoneyama, T.

    2011-04-01

    This paper studies the problem of isochronal synchronization of time-delay chaotic systems featuring also coupling delay. Based on the Lyapunov-Krasovskii stability theory, sufficient conditions are derived for the stability of isochronal synchronization between a pair of identical chaotic systems. Such criteria permit the proper design of stable proportional linear feedback controller, more specifically, the design of adequate proportional feedback gain matrices. The proposed criteria are suited to systems with (i) intrinsic delay, (ii) coupling delay or (iii) both. Numerical simulations of the synchronization of delay-coupled systems are presented as examples of the application of the criteria.

  9. Output-synchronization for the Different-order Uncertain Chaotic Systems via Fuzzy Sliding Control

    Directory of Open Access Journals (Sweden)

    Ning Li

    2015-07-01

    Full Text Available In this study, the synchronization of the outputs for the uncertain chaotic systems with different-orders is presented. An adaptive fuzzy system has been used to approximate the uncertain nonlinear terms. The adaptive fuzzy control strategy is estimated to guarantee output-synchronization of the master-slave chaotic systems based on sliding control theorem. By using a dynamic compensator, the performance of the closed-loop systems in sliding mode is improved. The proposed controller can ensure synchronous error converges to zero. Simulation results are provided to illustrate the effectiveness of the proposed method

  10. Transmission of digital chaotic and information-bearing signals in optical communication systems

    Science.gov (United States)

    Gonzalez-Marcos, Ana P.; Martin-Pereda, Jose A.

    1999-12-01

    A new proposal to have secure communications in a system is reported. The basis is the use of a synchronized digital chaotic systems, sending the information signal added to an initial chaos. The received signal is analyzed by another chaos generator located at the receiver and, by a logic boolean function of the chaotic and the received signals, the original information is recovered. One of the most important facts of this system is that the bandwidth needed by the system remain the same with and without chaos.

  11. Exponential networked synchronization of master-slave chaotic systems with time-varying communication topologies

    Science.gov (United States)

    Yang, Dong-Sheng; Liu, Zhen-Wei; Zhao, Yan; Liu, Zhao-Bing

    2012-04-01

    The networked synchronization problem of a class of master-slave chaotic systems with time-varying communication topologies is investigated in this paper. Based on algebraic graph theory and matrix theory, a simple linear state feedback controller is designed to synchronize the master chaotic system and the slave chaotic systems with a time-varying communication topology connection. The exponential stability of the closed-loop networked synchronization error system is guaranteed by applying Lyapunov stability theory. The derived novel criteria are in the form of linear matrix inequalities (LMIs), which are easy to examine and tremendously reduce the computation burden from the feedback matrices. This paper provides an alternative networked secure communication scheme which can be extended conveniently. An illustrative example is given to demonstrate the effectiveness of the proposed networked synchronization method.

  12. Exponential networked synchronization of master-slave chaotic systems with time-varying communication topologies

    Institute of Scientific and Technical Information of China (English)

    Yang Dong-Sheng; Liu Zhen-Wei; Zhao Yan; Liu Zhao-Bing

    2012-01-01

    The networked synchronization problem of a class of master-slave chaotic systems with time-varying communication topologies is investigated in this paper. Based on algebraic graph theory and matrix theory,a simple linear state feedback controller is designed to synchronize the master chaotic system and the slave chaotic systems with a timevarying communication topology connection.The exponential stability of the closed-loop networked synchronization error system is guaranteed by applying Lyapunov stability theory.The derived novel criteria are in the form of linear matrix inequalities (LMIs),which are easy to examine and tremendously reduce the computation burden from the feedback matrices.This paper provides an alternative networked secure communication scheme which can be extended conveniently.An illustrative example is given to demonstrate the effectiveness of the proposed networked synchronization method.

  13. Exponential networked synchronization of master-slave chaotic systems with time-varying communication topologies

    International Nuclear Information System (INIS)

    The networked synchronization problem of a class of master-slave chaotic systems with time-varying communication topologies is investigated in this paper. Based on algebraic graph theory and matrix theory, a simple linear state feedback controller is designed to synchronize the master chaotic system and the slave chaotic systems with a time-varying communication topology connection. The exponential stability of the closed-loop networked synchronization error system is guaranteed by applying Lyapunov stability theory. The derived novel criteria are in the form of linear matrix inequalities (LMIs), which are easy to examine and tremendously reduce the computation burden from the feedback matrices. This paper provides an alternative networked secure communication scheme which can be extended conveniently. An illustrative example is given to demonstrate the effectiveness of the proposed networked synchronization method. (general)

  14. Parameter identification of commensurate fractional-order chaotic system via differential evolution

    International Nuclear Information System (INIS)

    Chaos can be observed in fractional-order nonlinear systems with appropriate orders. The knowledge about the parameters and orders are the basis of the control and synchronization of fractional-order chaotic systems. In this Letter, the problem of parameter identification of commensurate fractional-order chaotic systems is investigated. By treating the orders as additional parameters, the parameters and orders are identified together through minimizing an objective function. Differential evolution algorithm, a powerful and robust evolutionary algorithm, is applied to search the optimal solution of the objective function. Numerical simulations and comparisons with genetic algorithm (GA) demonstrate the effectiveness of the proposed method. -- Highlights: ► We study the parameter identification problem of fractional order chaotic system. ► The orders and the parameters can be identified simultaneously. ► Numerical results verify the effectiveness of the proposed method.

  15. Data Security Using Private Key Encryption System Based on Arithmetic Coding

    Directory of Open Access Journals (Sweden)

    Ajit Singh

    2011-05-01

    Full Text Available Problem faced by today’s communicators is not only security but also the speed of communication and size of content.In the present paper, a scheme has been proposed which uses the concept of compressionand data encryption. In first phase the focus has been made on data compression and cryptography. In the next phase we have emphasized on compression cryptosystem. Finally, proposed technique has been discussed which used the concept of data compression and encryption. In this first data is compressed to reduce the size of the data and increase the data transfer rate. Thereafter compress data is encrypted to provide security. Hence our proposed technique is effective that can reduce data size, increase data transfer rate and provide the security during communication.

  16. Quantum computing on encrypted data

    Science.gov (United States)

    Fisher, K. A. G.; Broadbent, A.; Shalm, L. K.; Yan, Z.; Lavoie, J.; Prevedel, R.; Jennewein, T.; Resch, K. J.

    2014-01-01

    The ability to perform computations on encrypted data is a powerful tool for protecting privacy. Recently, protocols to achieve this on classical computing systems have been found. Here, we present an efficient solution to the quantum analogue of this problem that enables arbitrary quantum computations to be carried out on encrypted quantum data. We prove that an untrusted server can implement a universal set of quantum gates on encrypted quantum bits (qubits) without learning any information about the inputs, while the client, knowing the decryption key, can easily decrypt the results of the computation. We experimentally demonstrate, using single photons and linear optics, the encryption and decryption scheme on a set of gates sufficient for arbitrary quantum computations. As our protocol requires few extra resources compared with other schemes it can be easily incorporated into the design of future quantum servers. These results will play a key role in enabling the development of secure distributed quantum systems.

  17. 基于RSA的数字图像加密算法%An Encryption Algorithm for Digital Image Based on RSA System

    Institute of Scientific and Technical Information of China (English)

    杨昔阳; 李志伟

    2009-01-01

    It proposes a novel encryption method for digital image based on an Arnold scrambling transform, a chaos encryption algorithm and RSA encryption system. The parameters of the Arnold transform and chaos encryption algorithm are encrypted by RSA system and stored in LSB of an image to ensure the security in transmission. The example in this paper shows that the proposed method is an efficient way to encrypt a digital image.%提出一种基于RSA公钥、Arnold置乱变换和混沌加密算法相结合的公开密钥数字图像加密体制,利用客户的公钥对Arnold置乱变换和混沌序列初值进行RSA加密,确保了只有合法用户才能获取置乱参数信息并将图像复原.RSA对参数的加密信息隐藏于图像LSB中,无需另外传递密文,运算简单,具有良好的加密与隐藏效果.

  18. Adaptive robust PID controller design based on a sliding mode for uncertain chaotic systems

    International Nuclear Information System (INIS)

    A robust adaptive PID controller design motivated from the sliding mode control is proposed for a class of uncertain chaotic systems in this paper. Three PID control gains, K p, K i, and K d, are adjustable parameters and will be updated online with an adequate adaptation mechanism to minimize a previously designed sliding condition. By introducing a supervisory controller, the stability of the closed-loop PID control system under with the plant uncertainty and external disturbance can be guaranteed. Finally, a well-known Duffing-Holmes chaotic system is used as an illustrative to show the effectiveness of the proposed robust adaptive PID controller

  19. Physical layer security in CO-OFDM transmission system using chaotic scrambling

    Science.gov (United States)

    Liu, Bo; Zhang, Lijia; Xin, Xiangjun; Yu, Jianjun

    2013-03-01

    This paper proposes a novel method for the optical OFDM system to improve the physical layer security based on chaotic scrambling. The 1-D Logistic map is adopted for chaos mapping. The chaotic scrambling algorithm can dynamically change the scrambling matrices according to the secure key, which further enhances the confidentiality of the physical layer. The experiment with Logistic mapped chaos scrambling is also given to demonstrate the efficiency of security algorithm. Meanwhile, the benchmark performance of the optical OFDM system is experimentally investigated in terms of the bit error rate (BER). The analysis indicates that the system can be robust against eavesdropping.

  20. Frontiers in the study of chaotic dynamical systems with open problems

    CERN Document Server

    Zeraoulia, Elhadj

    2011-01-01

    This collection of review articles is devoted to new developments in the study of chaotic dynamical systems with some open problems and challenges. The papers, written by many of the leading experts in the field, cover both the experimental and theoretical aspects of the subject. This edited volume presents a variety of fascinating topics of current interest and problems arising in the study of both discrete and continuous time chaotic dynamical systems. Exciting new techniques stemming from the area of nonlinear dynamical systems theory are currently being developed to meet these challenges.