首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 15 毫秒
1.
基于混沌参数调制的数字通信方式   总被引:13,自引:0,他引:13  
纪飚  陆佶人 《通信学报》1999,20(11):50-54
提出一种基于混沌参数调制的数字通信方式。即将一个由非线性映射所产生的混沌序列作为载波,将待发送的有用信号(数字信号)作为调制信号,对非线性映射的某一参数在其混沌区域内进行调制。在接收端,利用混沌序列的发生规则从接收信号中提取混沌载波,并经过简单的信号处理运算恢复出原来的有用信号。分析和计算机模拟表明,本文所提出的这种混沌通信系统具有一定的保密性且实现方便、性能可靠  相似文献   

2.
A chaos shift-keying modulation scheme in which the transmitter and the receiver are nonlinear time-delayed feedback systems is described. The change in the chaotic dynamics is discussed when different parameters are used to encode digital signals. The time-delay parameter is shown to assure the best conditions for data recovery  相似文献   

3.
Private Message Transmission by Common Driving of Two Chaotic Lasers   总被引:1,自引:0,他引:1  
In this paper, we numerically demonstrate private data transmission using twin semiconductor lasers in which chaotic dynamics and synchronization are achieved by optical injection into the laser pair of a common, chaotic driving-signal, generated by a third laser subject to delayed optical feedback. This laser is selected with different parameters with respect to the twin pair, so that the emissions of the synchronized, matched lasers are highly correlated, whereas their correlation with the driver is low. The digital message modulates the emission of the transmitter, as in a standard CM scheme. Message recovery is then obtained by subtracting, from the transmitted chaos-masked message, the chaos, locally generated by the synchronized receiver laser. Simulations have been performed with the Lang–Kobayashi model, keeping into account both laser and photodetector noise. Private transmission has been demonstrated by investigating the effect of the parameter mismatch, between transmitter and receiver, on synchronization and message recovery.   相似文献   

4.
首先研究了非相干光反馈同步系统内部参数失配对系统同步性能的影响,并与相干光反馈的完全同步系统以及广义同步系统进行了比较,其次研究了非相干光反馈采用三种不同的信号调制解调方式(CSK,CMS,ACM),对三种不同频率(250 MHz,2.5GHz和12.5GHz)的信号进行了调制解调。通过MATLAB仿真实验可知,非相干光反馈混沌同步系统相对于相干光反馈完全同步系统更易于实现,同时保留了一定的对参数失配的敏感特性,从而确保了该系统比相干光反馈广义同步具有更高的安全性;在信号解调时,CSK只能解调出250MHz信号,CMS能解调出2.5GHz信号,ACM能够解调出高达12.5GHz的信号。  相似文献   

5.
该文研究应用粒子滤波器实现混沌通信的问题。组合信号建模技术,提出了一种基于粒子滤波器的实现方法。在发送端,采用加性混沌掩盖或乘性混沌掩盖将信息符号调制在混沌信号上;在接收端,应用粒子滤波器估计信息符号,进而实现混沌通信。仿真结果表明,当信息符号为二进制编码和M进制编码时,基于两种混沌掩盖的通信方案,粒子滤波器均能较好地从噪声混沌信号中恢复信息的编码值;与无先导卡尔曼滤波器相比,前者具有较低的误码率。此外,对比两种混沌通信方案,基于粒子滤波器的加性混沌掩盖通信系统在较高的Eb/N0下的通信性能接近BPSK,具有较低的误码率。  相似文献   

6.
In this paper, a new Markov-jump-system (MJS)-based secure chaotic communication technique is proposed. An MJS evolves by switching from one state evolution model to another according to a finite state Markov chain. The transmitter in the proposed communication system is an MJS consisting of multiple transmission maps, that is, the transmitter switches from one chaotic map to another during the transmission of data. This switching feature makes it difficult to identify and follow the transmission without knowing the transmitter parameters, i.e., to eavesdrop, thereby increasing the security offered by the inherently secure chaotic communication system. If the chaotic maps used at the transmitter, and the corresponding Markov transition probability matrix of the MJS are known to the (authorized) receiver, then a multiple model estimator can be used to track the MJS transmitter. In this paper, the use of the interacting multiple model (IMM) estimator is proposed as part of the receiver to follow the switching transmitter. The effectiveness of the IMM-estimator-based receiver to follow the switching transmitter is evaluated by means of simulations. A new modulation technique that uses the MJS transmitter is also introduced. Further, it is shown that the same receiver framework, when used as a receiver for chaotic parameter modulation, provides significant performance improvement in terms of bit-error rate compared to a receiver that uses extended Kalman filter. In addition, the seemingly more complex IMM-estimator-based receiver is shown to significantly reduce the computational complexity per transmitted bit, thus resulting in increased data rate.  相似文献   

7.
In this letter, we numerically show that chaos shift-keying (CSK) encryption can be achieved by using a single receiver, thus providing a better performance when comparing with the traditional CSK scheme based on two receivers. We analyze the rate equation model for two unidirectionally coupled single-mode external-cavity semiconductor lasers operating in a chaotic regime. The message is encoded in the emitter by slightly varying its injection current. We find that under appropriate conditions, the receiver laser synchronizes to the chaotic emitter, filtering the encoded message and allowing message extraction  相似文献   

8.
Like the conventional two-user interference channel, the cognitive interference channel consists of two transmitters whose signals interfere at two receivers. It is assumed that there is a common message (message 1) known to both transmitters, and an additional independent message (message 2) known only to the cognitive transmitter (transmitter 2). The cognitive receiver (receiver 2) needs to decode messages 1 and 2, while the noncognitive receiver (receiver 1) should decode only message 1. Furthermore, message 2 is assumed to be a confidential message which needs to be kept as secret as possible from receiver 1, which is viewed as an eavesdropper with regard to message 2. The level of secrecy is measured by the equivocation rate. In this paper, a single-letter expression for the capacity-equivocation region of the discrete memoryless cognitive interference channel is obtained. The capacity-equivocation region for the Gaussian cognitive interference channel is also obtained explicitly. Moreover, particularizing the capacity-equivocation region to the case without a secrecy constraint, the capacity region for the two-user cognitive interference channel is obtained, by providing a converse theorem.   相似文献   

9.
We propose a secure optical communication system based on the principles of generalized and complete chaotic synchronization. A transmitter and a receiver both composed by two chaotic external-cavity semiconductor lasers are coupled in a master-slave configuration to provide generalized synchronization, while the master lasers in the transmitter and in the receiver are completely synchronized through the synchronization channel via an optical fiber. A message is added to the transmitter slave laser and sent to the receiver through the information channel to be compared with the output of the receiver slave laser. The system is robust to a small mismatch of the laser parameters or of the coupling between the master and slave lasers, unavoidable in a real system, and can even enable a good communication up to a 5 Gb/s transmission rate using the chaos masking encryption method, when the master laseres are coupled bidirectionally.   相似文献   

10.
Chaotic optical communication at 2.5 Gb/s is experimentally investigated using three major encoding and decoding schemes, namely chaos shift keying (CSK), chaos masking (CMS), and additive chaos modulation (ACM). The effects of message encoding and decoding on the chaotic dynamics, the chaos synchronization, and the chaotic communication performance are compared among the three schemes. In the schemes of CSK and ACM, it is found that a small amount of message injected into the chaotic dynamics can increase the complexity of the chaotic state dramatically. In the CMS scheme, the chaotic dynamics are found not to be influenced by the encoded message. The synchronization quality deteriorates dramatically with an increase in the message strength in CSK and CMS. The ACM scheme is found to have the best synchronization quality among the three schemes when there is an encoded message. Message recovery is demonstrated for each of the three schemes. The ACM scheme is found to have the best communication performance.  相似文献   

11.
In this paper, we numerically demonstrate secure data transmission, using synchronized “twin” semiconductor lasers working in the chaotic regime, which represent the transmitter and receiver of a cryptographic scheme, compatible with free-space optics technology for line-of-sight communication links. Chaotic dynamics and synchronization are obtained by current injection into the laser pair of a common, chaotic driving-signal. Results of simulations are reported for the configuration in which the chaotic driving-current is obtained by photodetection of the emission of a third laser (driver), chaotic by delayed optical feedback in a short cavity scheme, selected with different parameters with respect to the laser pair. The emissions of the synchronized, matched lasers are highly correlated, whereas their correlation with the driver is low. The digital message modulates the pumping current of the transmitter. Message recovery is performed by subtracting the chaos, locally generated by the synchronized receiver laser, from the signal obtained by photodetection (at the receiver side) of the chaos-masked message transmitted in free space. Simulations have been performed with the Lang-Kobayashi model, keeping into account both attenuation of the optical signal in a line-of-sight configuration, and noise. Security has been investigated and demonstrated by considering the effect, on synchronization and message recovery, of the parameter mismatch between transmitter and receiver.   相似文献   

12.
群组签密既能实现群组签名,又能实现群组加密,但是现有的群组签密方案的发送者和接收者基本上在同一个密码系统中,不能满足现实环境的需求,而且基本上采用的是公钥加密技术,公钥加密技术在加密长消息时效率较低。因此该文提出由基于身份的密码体制(IBC)到无证书密码体制(CLC)的异构密码系统的混合群组签密方案。在该方案中,私钥生成器(PKG)和密钥生成中心(KGC)能够分别在IBC密码体制和CLC密码体制中产生自己的系统主密钥;而且群组成员只有协作才能解签密,提高了方案的安全性;同时在无需更换群组公钥和其他成员私钥的情况下,用户可以动态地加入该群组。所提方案采用了混合签密,具有可加密任意长消息的能力。在随机预言模型下,证明了该文方案在计算Diffie-hellman困难问题下具有保密性和不可伪造性。通过理论和数值实验分析表明该方案具有更高的效率和可行性。  相似文献   

13.
A comparative study of three data-encoding techniques in optical chaotic communication systems is reported. The chaotic carrier is generated by a semiconductor laser subjected to optical feedback and the data are encoded on it by chaotic modulation (CM), chaotic masking (CMS), or chaotic shift keying (CSK) methods. In all cases, the receiver-which is directly connected to the transmitter-consists of a semiconductor laser similar to that of the transmitter subjected to the same optical feedback. The performance of this back to back configuration is numerically tested by calculating the Q-factor of the eye diagram of the received data for different bit rates from 1 to 20 Gb/s. The CM scheme appears to have the best performance relative to the CMS and CSK scheme, before and after filtering the residual high-frequency oscillations remaining due to nonperfect synchronization between the transmitter and receiver. Moreover, in all encoding methods, a decrease in the Q-factor is observed when the repetition bit-rate of the encoding message increases. In order to achieve as high Q-factor values as possible, a well-synchronized chaotic master-slave system is required.  相似文献   

14.
A conference key distribution system   总被引:5,自引:0,他引:5  
Encryption is used in a communication system to safeguard information in the transmitted messages from anyone other than the intended receiver(s). To perform the encryption and decryption the transmitter and receiver(s) ought to have matching encryption and decryption keys. A clever way to generate these keys is to use the public key distribution system invented by Diffie and Hellman. That system, however, admits only one pair of communication stations to share a particular pair of encryption and decryption keys, The public key distribution system is generalized to a conference key distribution system (CKDS) which admits any group of stations to share the same encryption and decryption keys. The analysis reveals two important aspects of any conference key distribution system. One is the multitap resistance, which is a measure of the information security in the communication system. The other is the separation of the problem into two parts: the choice of a suitable symmetric function of the private keys and the choice of a suitable one-way mapping thereof. We have also shown how to use CKDS in connection with public key ciphers and an authorization scheme.  相似文献   

15.
A numerical analysis of an optical chaotic transmission system, based on the synchronization of two chaotic lasers, in a master-slave closed loop configuration is presented. At the transmitter, the master chaotic wave is superposed on the information message; at the receiver, the message is recovered by subtracting the synchronized slave chaotic wave from the received signal. The performances are analyzed in terms of the Q-factor, considering two different message modulation formats: the nonreturn-to-zero and the Manchester coding. The Manchester coding shows enhanced performances due to the shift of the signal spectrum to higher frequencies.  相似文献   

16.
In this paper, synchronization of chaotic Lur’e systems using sampled-data control is applied to the secure communication problem. The message is transmitted and masked by the techniques of n-cipher and a public key obtained by the chaotic Lur’e system. The decryption of the transmitted encrypted message to recover the original message at the receiver can be achieved by synchronizing the transmitter and receiver chaotic systems. Sampled-data feedback control is used for synchronization, and a sufficient condition for obtaining feedback gain is derived in terms of linear matrix inequalities using a discontinuous Lyapunov functional. The secure communication system is simulated via Matlab along with the Chua system to show the effectiveness of the proposed result.  相似文献   

17.
In this letter, a performance analysis of a dualbranch switched diversity system operating on statistically independent and identically distributed Nakagami-m flat-fading channels is presented. An adaptive coded modulation (ACM) scheme is employed to increase the spectral efficiency of the system. The ACM scheme consists of a set of multidimensional trellis codes originally designed for additive white Gaussian noise channels, where the codes are based on quadrature amplitude modulation (QAM) signal constellations of varying size. The performance is evaluated by assuming perfect channel knowledge at both transmitter and receiver and instantaneous feedback of channel state information, conveyed from the receiver to the transmitter on an error-free feedback channel. The optimal switching threshold of the switched diversity combiner, maximizing the average spectral efficiency, is identified for spatially uncorrelated antenna branches.  相似文献   

18.
Demultiplexing chaos from multimode semiconductor lasers   总被引:3,自引:0,他引:3  
We show numerically that the injection of two chaotic modes of a multimode semiconductor laser with optical feedback into two single-mode stand-alone semiconductor lasers leads to chaotic synchronization between the respective intensities. The effect of parameter mismatch between the transmitter and receiver lasers is examined, and it is concluded that the observed synchronization is a consequence of injection locking. Under these conditions, the possibility of using this demultiplexing scheme for message transmission is examined.  相似文献   

19.
一种新的混沌调制和线性解调方法   总被引:1,自引:0,他引:1  
卢元元  胡庆彬  丘水生 《电子学报》2002,30(10):1508-1510
提出一种新的用于保密通信的混沌调制和线性解调方法.发送端和接收端各有一个相同的混沌电路,将有用信号接入发送端混沌电路的线性子电路,使其对该混沌电路进行调制.调制后的混沌信号传送到接收端的混沌电路,检测该电路中某一电流或电压变量,经线性滤波器解调可恢复原始有用信号.基于这一调制、解调方法的混沌通信系统保密性强且电路简单.对两个混沌保密通信系统的仿真实验取得了满意的结果.  相似文献   

20.
The security of the symmetric probabilistic encryption scheme based on chaotic attractors of neural networks is analyzed and discussed. Firstly, the key uniqueness is proved by analyzing the rotation transform matrix to avoid the attack of the equivalent key. Secondly, the distributed uniformity of the numbers "0" and "1" in the corresponding attracting domain for every chaotic attractor is analyzed by the statistics method. It is testified that the distributed uniformity can be kept if the syna...  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号