In this paper we introduce two sequences of operator functions and their dualfunctions: fk(t) = (flogt)k-(t-1)k/log^k+2t (k = 1,2,...), gk(t) = (t-1)k-logkt /log^k+1t (k = 1,2,...) and fk(t)tklog^k...In this paper we introduce two sequences of operator functions and their dualfunctions: fk(t) = (flogt)k-(t-1)k/log^k+2t (k = 1,2,...), gk(t) = (t-1)k-logkt /log^k+1t (k = 1,2,...) and fk(t)tklog^k+1t/(tlogt)k-(t-1)^k(k=1,2…),gk(t)=t^klog^k+1t/(t-1)^k-log^kt(k=1,2…)defined onWe find that they are all operator monotone functions with respect to the strictly chaoticorder and some ordinary orders among positive invertible operators. Indeed, we extend theresults of the operator monotone function tlogt-t+1/log^2t which is widely used in the theory of heat transfer of the heat engineering and fluid mechanics[1].展开更多
A simple generation approach for chaotic sequences with Gauss probability distribution is proposed. Theoretical analysis and simulation based on Logistic chaotic model show that the approach is feasible and effective....A simple generation approach for chaotic sequences with Gauss probability distribution is proposed. Theoretical analysis and simulation based on Logistic chaotic model show that the approach is feasible and effective. The distribution characteristics of the novel chaotic sequence are comparable to that of the standard normal distribution. Its mean and variance can be changed to the desired values. The novel sequences have also good randomness. The applications for radar mask jamming are analyzed.展开更多
The feasibility of the hybrid chaotic sequences as the spreading codes in code divided multiple access(CDMA) system is analyzed. The design and realization of the digital hybrid chaotic sequence generator by very high...The feasibility of the hybrid chaotic sequences as the spreading codes in code divided multiple access(CDMA) system is analyzed. The design and realization of the digital hybrid chaotic sequence generator by very high speed integrated circuit hardware description language(VHDL) are described. A valid hazard canceledl method is presented. Computer simulations show that the stable digital sequence waveforms can be produced. The correlations of the digital hybrid chaotic sequences are compared with those of m-sequences. The results show that the correlations of the digital hybrid chaotic sequences are almost as good as those of m-sequences. The works in this paper explored a road for the practical applications of chaos.展开更多
针对正交频分复用(Orthogonal Frequency Division Multiplexing,OFDM)通信系统中存在的信息安全传输问题,提出了一种双重混沌加密安全传输方案。第一重加密为利用混沌加密矩阵对信号星座图进行置乱,其中混沌加密矩阵由复合离散混沌序...针对正交频分复用(Orthogonal Frequency Division Multiplexing,OFDM)通信系统中存在的信息安全传输问题,提出了一种双重混沌加密安全传输方案。第一重加密为利用混沌加密矩阵对信号星座图进行置乱,其中混沌加密矩阵由复合离散混沌序列作用到三层神经网络得到;第二重加密为利用复合离散混沌序列控制相位旋转因子对经过离散傅里叶逆变换后的信号进行相位旋转。仿真结果表明,采用所提出的双重加密方案进行传输,合作接收方的误码率低于不采用加密的OFDM系统和只采用第一重加密方案的OFDM系统,非合作方的误码率始终保持在0.5左右,密钥空间为2^(311),使系统具有较好的安全性能。展开更多
Based on the Fisher–Yatess scrambling and DNA coding technology, a chaotical image encryption method is proposed. First, the SHA-3 algorithm is used to calculate the hash value of the initial password, which is used ...Based on the Fisher–Yatess scrambling and DNA coding technology, a chaotical image encryption method is proposed. First, the SHA-3 algorithm is used to calculate the hash value of the initial password, which is used as the initial value of the chaotic system. Second, the chaotic sequence and Fisher–Yatess scrambling are used to scramble the plaintext,and a sorting scrambling algorithm is used for secondary scrambling. Then, the chaotic sequence and DNA coding rules are used to change the plaintext pixel values, which makes the ciphertext more random and resistant to attacks, and thus ensures that the encrypted ciphertext is more secure. Finally, we add plaintext statistics for pixel-level diffusion to ensure plaintext sensitivity. The experimental results and security analysis show that the new algorithm has a good encryption effect and speed, and can also resist common attacks.展开更多
This paper proposes a novel approach for generating a multi-scroll chaotic system. Together with the theoretical design and numerical simulations, three different types of attractor are available, governed by construc...This paper proposes a novel approach for generating a multi-scroll chaotic system. Together with the theoretical design and numerical simulations, three different types of attractor are available, governed by constructing triangular wave, sawtooth wave and hysteresis sequence. The presented new multi-scroll chaotic system is different from the classical multi-scroll chaotic Chua system in dimensionless state equations, nonlinear functions and maximum Lyapunov exponents. In addition, the basic dynamical behaviours, including equilibrium points, eigenvalues, eigenvectors, eigenplanes, bifurcation diagrams and Lyapunov exponents, are further investigated. The success of the design is illustrated by both numerical simulations and circuit experiments.展开更多
The algorithm is an image encryption algorithm based on the improved baker transformation and chaotic substitution box(S-box). It mainly uses the initial values and parameters of a one-dimensional logistic chaotic sys...The algorithm is an image encryption algorithm based on the improved baker transformation and chaotic substitution box(S-box). It mainly uses the initial values and parameters of a one-dimensional logistic chaotic system as an encryption key. Specifically, in the image scrambling stage, the algorithm primarily uses an improved baker transform method to process the image. In the image diffusion stage, the algorithm first uses the chaotic S-box method to process the encryption key. Secondly, an exclusive OR(XOR) operation is performed on the image and the encryption key to initially diffuse the image. Finally, the image is again diffused using the method of ortho XOR. Simulation analysis shows that the algorithm can achieve good encryption effect, simple and easy implementation, and good security. In the digital image communication transmission, it has good practical value.展开更多
文摘In this paper we introduce two sequences of operator functions and their dualfunctions: fk(t) = (flogt)k-(t-1)k/log^k+2t (k = 1,2,...), gk(t) = (t-1)k-logkt /log^k+1t (k = 1,2,...) and fk(t)tklog^k+1t/(tlogt)k-(t-1)^k(k=1,2…),gk(t)=t^klog^k+1t/(t-1)^k-log^kt(k=1,2…)defined onWe find that they are all operator monotone functions with respect to the strictly chaoticorder and some ordinary orders among positive invertible operators. Indeed, we extend theresults of the operator monotone function tlogt-t+1/log^2t which is widely used in the theory of heat transfer of the heat engineering and fluid mechanics[1].
基金This work was supported by the NEW Laboratory Funding under Grant No.w090403.
文摘A simple generation approach for chaotic sequences with Gauss probability distribution is proposed. Theoretical analysis and simulation based on Logistic chaotic model show that the approach is feasible and effective. The distribution characteristics of the novel chaotic sequence are comparable to that of the standard normal distribution. Its mean and variance can be changed to the desired values. The novel sequences have also good randomness. The applications for radar mask jamming are analyzed.
文摘The feasibility of the hybrid chaotic sequences as the spreading codes in code divided multiple access(CDMA) system is analyzed. The design and realization of the digital hybrid chaotic sequence generator by very high speed integrated circuit hardware description language(VHDL) are described. A valid hazard canceledl method is presented. Computer simulations show that the stable digital sequence waveforms can be produced. The correlations of the digital hybrid chaotic sequences are compared with those of m-sequences. The results show that the correlations of the digital hybrid chaotic sequences are almost as good as those of m-sequences. The works in this paper explored a road for the practical applications of chaos.
文摘针对正交频分复用(Orthogonal Frequency Division Multiplexing,OFDM)通信系统中存在的信息安全传输问题,提出了一种双重混沌加密安全传输方案。第一重加密为利用混沌加密矩阵对信号星座图进行置乱,其中混沌加密矩阵由复合离散混沌序列作用到三层神经网络得到;第二重加密为利用复合离散混沌序列控制相位旋转因子对经过离散傅里叶逆变换后的信号进行相位旋转。仿真结果表明,采用所提出的双重加密方案进行传输,合作接收方的误码率低于不采用加密的OFDM系统和只采用第一重加密方案的OFDM系统,非合作方的误码率始终保持在0.5左右,密钥空间为2^(311),使系统具有较好的安全性能。
基金Project supported by the National Natural Science Foundation of China(Grant Nos.61173183,61672124,61370145,and 11501064)the Password Theory Project of the 13th Five-Year Plan National Cryptography Development Fund,China(Grant No.MMJJ20170203)+1 种基金the China Postdoctoral Science Foundation(Grant No.2016M590850)the Scientific and Technological Research Program of Chongqing Municipal Education Commission,China(Grant No.KJ1500605)
文摘Based on the Fisher–Yatess scrambling and DNA coding technology, a chaotical image encryption method is proposed. First, the SHA-3 algorithm is used to calculate the hash value of the initial password, which is used as the initial value of the chaotic system. Second, the chaotic sequence and Fisher–Yatess scrambling are used to scramble the plaintext,and a sorting scrambling algorithm is used for secondary scrambling. Then, the chaotic sequence and DNA coding rules are used to change the plaintext pixel values, which makes the ciphertext more random and resistant to attacks, and thus ensures that the encrypted ciphertext is more secure. Finally, we add plaintext statistics for pixel-level diffusion to ensure plaintext sensitivity. The experimental results and security analysis show that the new algorithm has a good encryption effect and speed, and can also resist common attacks.
基金Project supported by the National Natural Science Foundation of China (Grant Nos 60572073 and 60871025)the Natural Science Foundation of Guangdong Province,China (Grant Nos 8151009001000060,5001818 and 8351009001000002)
文摘This paper proposes a novel approach for generating a multi-scroll chaotic system. Together with the theoretical design and numerical simulations, three different types of attractor are available, governed by constructing triangular wave, sawtooth wave and hysteresis sequence. The presented new multi-scroll chaotic system is different from the classical multi-scroll chaotic Chua system in dimensionless state equations, nonlinear functions and maximum Lyapunov exponents. In addition, the basic dynamical behaviours, including equilibrium points, eigenvalues, eigenvectors, eigenplanes, bifurcation diagrams and Lyapunov exponents, are further investigated. The success of the design is illustrated by both numerical simulations and circuit experiments.
基金supported by the National Natural Science Foundation of China (Grant No. 61672124)the Password Theory Project of the 13th Five-Year Plan National Cryptography Development Fund,China (Grant No. MMJJ20170203)+3 种基金the Liaoning Provincial Science and Technology Innovation Leading Talents Program Project,China (Grant No. XLYC1802013)the Key Research and Development Projects of Liaoning Province,China (Grant No. 2019020105-JH2/103)the Jinan City ‘20 universities’ Funding Projects Introducing Innovation Team Program,China (Grant No. 2019GXRC031)the “Double First-rate”Construction Project (“Innovation Project”),China (Grant No. SSCXXM013)。
文摘The algorithm is an image encryption algorithm based on the improved baker transformation and chaotic substitution box(S-box). It mainly uses the initial values and parameters of a one-dimensional logistic chaotic system as an encryption key. Specifically, in the image scrambling stage, the algorithm primarily uses an improved baker transform method to process the image. In the image diffusion stage, the algorithm first uses the chaotic S-box method to process the encryption key. Secondly, an exclusive OR(XOR) operation is performed on the image and the encryption key to initially diffuse the image. Finally, the image is again diffused using the method of ortho XOR. Simulation analysis shows that the algorithm can achieve good encryption effect, simple and easy implementation, and good security. In the digital image communication transmission, it has good practical value.