共查询到20条相似文献,搜索用时 125 毫秒
1.
2.
3.
一种基于蔡氏电路的混沌扩频序列 总被引:1,自引:0,他引:1
本文从混沌序列具有的伪随机特性入手,利用蔡氏电路建立了一个混沌序列发生器,实验统计分析证明可以利用蔡氏电路产生一种较理想的混沌伪随机序列;通过对以混沌伪随机序列为基础得到的混沌扩频序列的特性分析,表明基于蔡氏电路的混沌扩频序列适合于扩频通信中的应用。 相似文献
4.
5.
为产生随机性能良好的伪随机序列,提出了一个新的变结构混沌系统。该混沌系统在一个开关函数控制下其系统结构随时间随机地转换,所产生的混沌信号是两个不同的混沌信号的混合,具有良好的复杂性。基于该变结构混沌系统设计了一种伪随机序列发生器,采用NIST标准和STS-2.0b测试套件对其产生的伪随机序列进行了统计性能测试,测试结果表明该伪随机序列发生器具有良好的随机性,可应用于计算机、通信、信息加密等领域中。 相似文献
6.
一种新的混沌伪随机序列生成方式 总被引:20,自引:0,他引:20
利用构造的Hybrid混沌映射,通过周期性改变混沌迭代初值来产生混沌伪随机序列。理论和统计分析可知,该混沌序列的各项特性均满足伪随机序列的要求,产生方法简单,具有较高的安全性和保密性,是一类很有应用前景的伪随机加密序列。 相似文献
7.
8.
自提出了基于广义混沌映射切换的混沌同步保密通信方法以来,这种通过混沌映射切换来改变混沌系统结构,以此产生伪随机序列的方法被频繁引用.但这种方法产生的序列的综合性能却一直未能得到有力的证明,而且尚存在不能充分保证序列周期足够长的致命弱点.本文对这种变结构混沌序列产生方法作了动力学分析,并通过数值仿真对该方法产生的序列做了统计性能分析和抗预测性能研究.为了解决周期问题,本文在变结构混沌序列基础上引入了m序列扰动.结果表明这种改进的变结构混沌序列具有典型的混沌特性,而且产生序列的周期,相空间分布,线性复杂度,相关性以及抗预测性等方面的性能明显优于基于单一混沌系统的序列. 相似文献
9.
序列密码利用伪随机序列来加密消息序列,伪随机序列的线性复杂度是序列密码安全性的重要度量之一。本文用序列的生成函数研究G(f)序列的线性复杂度分布以及所对应线性复杂度的序列周期,得到了几个对密码设计和分析有意义的结果。 相似文献
10.
11.
本文根据符号动力学,利用混沌系统构造了一族相互独立的Bernoulli序列作为扩频序列,给出了获得q元Bernoulli序列的一种设计准则测度熵等于logq。 相似文献
12.
R. V. Belyaev G. M. Vorontsov V. Ya. Kislov V. V. Kolesov S. V. Krupenin A. M. Popov V. I. Ryabenkov 《Journal of Communications Technology and Electronics》2006,51(9):1052-1063
Discrete chaotic signals with a high information capacity are developed and studied on the basis of nonlinear chaotic dynamic systems. The structural and fractal complexity of pseudorandom integer and binary sequences is analyzed. A model digital spread-spectrum radio channel is used to show experimentally that the chaotic algorithms developed can be applied efficiently in various radio facilities, such as telecommunications, radar, and navigation systems. A technique is developed for forming a reproducible irregular fractal structure involved in frequency-independent fractal antennas with a given fractal dimension. An integer chaotic algorithm with retardation is employed to generate a pseudorandom sequence. 相似文献
13.
Addabbo T. Alioto M. Fort A. Rocchi S. Vignoli V. 《Circuits and Systems II: Express Briefs, IEEE Transactions on》2006,53(5):329-333
In this brief, a family of discretized one-dimensional chaotic maps derived from the Sawtooth map is analyzed to evaluate its suitability for the integrated implementation of low-complexity digital pseudorandom bit generators (PRBGs). The proposed PRBGs, classifiable as nonlinear congruential generators, are investigated in terms of period length, statistical properties of the generated sequences, hardware complexity, and are compared with traditional PRBGs. 相似文献
14.
In this paper, a new five-dimensional fractional-order chaotic system based on two nonlinear functions is constructed. The rich dynamical behaviors of the system are analyzed by phase diagram, bifurcation diagram and Lyapunov exponents spectrum. In addition, the complexity of the fractional-order system is analyzed through Spectral Entropy (SE) and Permutation Entropy (PE) algorithms. Meanwhile the phenomenon of coexisting infinite attractors is analyzed. Of particular concern is that the phenomenon of multi-state transition and intermittent oscillation chaos is found in this new chaotic system. Furthermore, the system is implemented on the DSP platform. To the best of the knowledge, these rich dynamical characteristics and complicated phenomena are of great reference value in chaotic image encryption and other fields. 相似文献
15.
A family of new complex number chaotic maps based image encryption algorithm is proposed in the paper. A family of maps is constructed and proved to be chaotic in the complex number field, and its characteristics are analyzed. Two maps are selected from the chaotic maps family and are utilized to construct pseudorandom keystream sequence. In the proposed encryption algorithm, the pseudorandom keystream sequences are used to scramble and diffuse the plain image data and two entropy coding methods are used to reduce the correlation among the signals. Both theoretical analysis and experimental tests show that the proposed algorithm is secure and efficient. 相似文献
16.
17.
Muhammad Khurram Khan Khaled Alghathbar Jiashu Zhang 《Telecommunication Systems》2011,47(3-4):227-234
With the large-scale proliferation of biometric systems, privacy and irrevocability issues of their data have become a hot research issue. Recently, some researchers proposed a couple of schemes to generate BioHash, e.g. PalmHash, however, in this paper, we point out that the previous schemes are costly in terms of computational complexity and possession of USB tokens to generate pseudorandom numbers. To overcome the problems, we propose a novel chaotic FaceHashing scheme which preserves privacy of a biometric user. The presented scheme does not need users to posses USB tokens in generating pseudorandom sequences, which is a cost-effective solution. Besides, our scheme minimizes the system complexity with simple operations to attain the FaceHash. Experimental results show that the proposed scheme is efficient, secure, and revocable in case FaceHash is theft or compromised. 相似文献
18.
混沌二进制序列构成的安全性研究 总被引:3,自引:0,他引:3
由混沌映射驱动得到的伪随机二进制序列应确保有足够的比特安全性。信息有规律地泄漏,会导致有可能利用有限长度的输出序列完全地破译混沌驱动序列,并恢复有限长度的初始密钥,重建全部的输出序列。 相似文献
19.