首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 15 毫秒
1.
采用反馈线性化对统一混沌系统进行同步控制.并用Matlab进行了数值仿真,仿真结果表明这一方法对统一混沌系统同步控制的有效性和快速性,并设计了相应的混沌键控通信系统.  相似文献   

2.
介绍了脉冲混沌同步的基本原理,提出了基于脉冲同步的一般化混沌保密通信系统。针对该系统存在的传输时间帧拥堵问题,提出一种“信息感应”脉冲同步系统。该系统中有用信息被嵌入在发射端的同步脉冲里,在接收端再通过这些脉冲被感应出来,解决了时间帧拥堵的问题。  相似文献   

3.
In multimedia communication, significance of the images for data representation is noteworthy. In this context, secure transmission of images over open channel has become a challenging task. Creation of different strategies in improving the secure image transmission always has a demand. The proposed work suggests an RGB image encryption with the confluence of attractors and hardware triggered key image in which confusion and diffusion were accomplished by Lorenz, Lü and Cellular Automata attractors. The uniqueness of proposed encryption scheme is a key image generation module through cascaded Ring Oscillator circuit which creates M?×?N key image for diffusion of pixels. Facilitating the authenticated networked access to key image generation hardware enables the secure server-client architecture for a variety of secure image transfer applications. The proposed approach is a hardware – software codesign which possesses a good keyspace, improved key sensitivity and satisfies the various statistical parameters thus offering substantial resistance to differential, occlusion and chosen plaintext attacks on RGB images.  相似文献   

4.
本文基于无刷式直流电机的混沌模型,利用状态观测器实现了发送端与接收端的同步,并且用该混沌模型和状态观测器所产生的数字序列实现待传输语音特征参量的加解密操作,识别结果验证了该混沌保密通信系统的有效性,并且传输语音特征参量的方法也提高了该系统的安全性。  相似文献   

5.
研究了具有连续时延双神经元系统的双向耦合混沌同步问题及在扩展频谱保密通信中的应用。利用Krasovskii-Lyapunov理论,给出了系统同步的一个充分条件,通过选择合适的耦合参数可以保证全局混沌同步。给出了使用混沌掩码技术在扩展频谱保密通信中的应用实例。  相似文献   

6.
一种混沌系统的设计及其在图像保密变换中的应用   总被引:6,自引:0,他引:6  
提出了一种四分段一维线性混沌系统的设计及其混沌序列应用于图像保密变换中的方法。考察了基本混沌系统的数学性质,该混沌系统生成的混沌序列具有良好的统计特性。在基本映射的基础上设计出多重迭代混沌系统,通过随机改变混沌的迭代次数、分段的斜率以及改变混沌的初始值和参数,提高混沌序列的复杂度,增加了混沌系统的安全性。随后应用混沌序列结合本文提出的图像保密变换方法对图像进行加密解密。  相似文献   

7.
Multimedia Tools and Applications - Currently we are facing a wide interest in multimedia security and copyright protection due to the explosion of data exchange in the Internet and the extensive...  相似文献   

8.
TI DSKplus Board在房间声回授通道特性测量中的应用   总被引:2,自引:0,他引:2  
介绍一种新的测量房间声回授通道特性的实验方法。用TI(Texas Instruments)公司提供的DSKplus Board开发套件,实现数据的实时发送和采集,并把采集的数据送入主机保存,以备主机进行房间声回波通道特性的分析计算。  相似文献   

9.
As one of the most popular real-time services on the Internet, Voice over internet protocol (VoIP) has attracted researchers’ attention in the information security field for its characters of real-time and high flow. To protect data security, a new covert VoIP communications system was proposed in this study to realize secure communications by hiding secret information in VoIP streams. In the proposed algorithm, secret data were divided into blocks after being encrypted with a block cipher, and then each block of secret data was embedded into VoIP streaming packets randomly using a chaotic mapping. The symmetric key was distributed through an efficient and secure channel, and the message digest was implemented to protect the integrity of secret data. The experimental data were collected by comparing audio data between the sender and the receiver. The experimental results indicated that data embedding had little impact on the quality of speech. Besides, statistical analysis could not detect the secret data embedded in VoIP streams using the block cipher and random numbers generated from chaotic mapping. The proposed covert VoIP communications system not only achieved high quality of VoIP and prevented detection of statistical analysis, but also provided integrity for secret data.  相似文献   

10.
The main contribution of this paper is to propose a nonlinear robust controller to synchronize general chaotic systems, such that the controller does not need the information of the chaotic system’s model. Following this purpose, in this paper, two methods are proposed to synchronize general forms of chaotic systems with application in secure communication. The first method uses radial basis function neural network (RBFNN) as a controller. All the parameters of the RBFNN are derived and optimized via particle swarm optimization (PSO) algorithm and genetic algorithm (GA). In order to increase the robustness of the controller, in the second method, an integral term is added to the RBF neural network gives an integral RBFNN (IRBFNN). The coefficients of the integral term and the parameters of IRBFNN are also derived and optimized via PSO and GA. The proposed methods are applied to the famous Lorenz chaotic system for secure communication. The performance and control effort of the proposed methods are compared with the recently proposed PID controller optimized via GA. Simulation results show the superiority of the proposed methods in comparison to the recent one in improving synchronization while using smaller control effort.  相似文献   

11.
In this paper, optical fiber chaotic secure communication is proposed bycoupling chaotic laser synchronous system with optical fiber propagation channel.Feedback synchronous system of chaotic semiconductor lasers is presented andsynchronous error and decoding formulae are demonstrated. Synchronization betweentwo chaotic laser systems with distributed feedback semiconductor lasers at wavelengthof 1.31 μm is simulatively achieved with almost zero synchronous error. Parametermismatch, synchronous transient response and noise effect on the system are studied.Robustness of synchronization and anti-perturbation can increase by increasing thefeedback coefficient of the system. Influence of group-velocity-dispersion and self-phasemodulation of optical fiber on chaotic laser signal and synchronization are analyzed, and itis found that group-velocity-dispersion affects pulse shape, synchronization and decoding,and limits optical fiber propagation distances, and self-phase modulation does not affectpulse shape, w  相似文献   

12.
建立了径向基函数混沌神经网络模型以及径向基函数混沌神经元模型,分析其产生混沌后收敛的原因,通过撤销模拟退火策略使过程无法收敛,从而构建出永久保持混沌状态的混沌神经元动力系统,分析了该系统的时间序列指标,证明其永久保持混沌状态的可行性;将该系统应用于灰度图像的加密解密,阐述了其原理及算法;分析了该算法的抗穷举能力,考察了原图像与加密图像的直方图,由此说明了该算法的抗统计分析的能力。  相似文献   

13.
针对一类时滞Ikeda混沌系统,利用Lyapunov稳定和微分不等式,研究了其指数同步问题。基于线性矩阵不等式理论得到了指数同步的充分条件,给出了指数同步控制器的设计方法,利用混沌掩盖将该同步方法应用于保密通信。仿真表明,该方案具有同步速度快、鲁棒性良好等优良性能。  相似文献   

14.
In this paper, the presence of transmission delay and sampling delay in chaos-based secure communication systems by employing impulsive synchronization is studied. A time delayed impulsive differential system with delayed impulses, modeling the synchronization error between the driving and response schemes employed in such communication systems, is presented. The equi-attractivity property of the error dynamics is investigated and the sufficient conditions leading to this property are obtained. A set of upper bounds on the delay terms involved in the system are also obtained, and a numerical example is given. A communication security scheme employing hyperchaotic systems possessing continuous driving, impulsive driving and delay is proposed and simulation results are given to demonstrate the performance of the scheme.  相似文献   

15.
一种新的图像保密通信系统设计   总被引:1,自引:0,他引:1  
提出了一种新型的图像保密通信技术,利用混沌序列对初值敏感性、伪随机性的特点,在发送端采用了Logistic映射序列对图像像素值置乱加密和Arnold变换对像素位置置乱加密相结合的方法,进行二次加密.接收端对收到的信号进行相应的图像解密,恢复出原始图像,实现对图像复合和串接加密,发挥各自的优点,使其通信系统具有恢复精度和保密度高、破译难度大、执行速度快的特点,以提高保密通信的安全性.计算机仿真结果表明该方案的有效性.  相似文献   

16.

With the exponential increase in energy demands (commercial as well as residential), the traditional grid infrastructure significantly shifted to intelligent ICT-based Smart Grid (SG) infrastructure. In the SG environment, only efficient energy management may not be sufficient as the SG dynamics have significant impacts on multimedia communications such as video surveillance of the technical/non-technical losses of energy and many more. The inevitable energy losses can be identified by process and analyze the massive amount of heterogeneous data, i.e., Big Data (BD) generated through smart devices such as sensors, Smart Meters (SMs), and others. The key challenges in analyzing multimedia BD are computational complexity, operational integration complexity, data security, and privacy. To overcome the aforementioned issues, this paper proposes a blockchain-based data analytics scheme called ChoIce, which offers secure data collection, analysis, and decision support for the SG systems. It works in two phases; (i) secure data collection over Ethereum and (ii) BD analytics and decision-making using deep learning (DL). The robust and secure data analytics, efficient network management, and high-performance computing for BD are crucial towards the optimization of SG operation. The performance of ChoIce is evaluated considering parameters such as the data storage cost, multimedia communication latency, and prediction accuracy. Thus, the results of ChoIce shows that it outperforms in contrast to other state-of-the-art approaches.

  相似文献   

17.
郑卜之 《计算机应用》2012,32(Z1):158-160
通过分析风电场存在的安全需求,提出了风电场远程安全通信方案,设计了一个基于WT-KEY的安全通信体系架构.设计了用户接口模块、硬件加密函数库和基于MatrixSSL实现TLS的安全通信策略.采用TLS安全通信协议改进WT-KEY,阐明了其系统通信过程中的信息交互过程.  相似文献   

18.
王瑞兵  姚洪兴 《微计算机信息》2007,23(30):103-104,199
本文以当前的研究热点复杂网络为背景.用Lyapunov稳定性理论和矩阵变换研究了网络中互相耦合的三个节点的混沌同步,提出了一种全局混沌同步方案,并在同步的基础上研究了节点之间的保密通信,最后利用Matlab软件进行数值仿真.仿真结果表明了该方法的有效性.  相似文献   

19.
Polar码是一种能够达到香农限且编译码复杂度低的基于信道极化理论的信道编码方法。本文简单介绍了极化码在窃听信道中的构造方法。同时为非退化窃听模型,提出利用多次反馈来扩大等效主信道和窃听信道之间的差距,通过反馈实现非退化向退化的等效转变。仿真结果表明在二进制对称窃听信道下,所提出的基于多次反馈的传输方案误码率性能明显优于一次反馈,保证了信息可以更好地进行安全可靠地传输。  相似文献   

20.
提出了一种新型Chen-Mobius通信系统,并简要介绍了该系统基于DE2平台的FPGA设计、功能仿真和硬件实现。  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号