期刊文献+
共找到4篇文章
< 1 >
每页显示 20 50 100
Logistic数字混沌序列性能分析 被引量:6
1
作者 周悦 朱灿焰 汪一鸣 《现代电子技术》 2006年第9期69-71,共3页
混沌作为一种非线性动态系统中的现象,受到了人们的重视,研究工作者纷纷探索他在通信中的可能应用。讨论了一种广泛研究的离散时间动态系统Logistic Map所产生的数字混沌序列,通过与m序列比较,分析了其白噪声统计特性,并用计算机进行仿... 混沌作为一种非线性动态系统中的现象,受到了人们的重视,研究工作者纷纷探索他在通信中的可能应用。讨论了一种广泛研究的离散时间动态系统Logistic Map所产生的数字混沌序列,通过与m序列比较,分析了其白噪声统计特性,并用计算机进行仿真,做了相应的实验数据分析。结果表明数字混沌序列具有较理想的自相关和互相关特性,且数目极大,是CDMA系统中扩频码的优选码型。 展开更多
关键词 数字混沌序列 相关特性 logistic—Map CDMA
在线阅读 下载PDF
Chaotic system and QR factorization based robust digital image watermarking algorithm 被引量:9
2
作者 宋伟 侯建军 +1 位作者 李赵红 黄亮 《Journal of Central South University》 SCIE EI CAS 2011年第1期116-124,共9页
In order to protect copyright of digital images,a new robust digital image watermarking algorithm based on chaotic system and QR factorization was proposed.The host images were firstly divided into blocks with same si... In order to protect copyright of digital images,a new robust digital image watermarking algorithm based on chaotic system and QR factorization was proposed.The host images were firstly divided into blocks with same size,then QR factorization was performed on each block.Pseudorandom circular chain(PCC) generated by logistic mapping(LM) was applied to select the embedding blocks for enhancing the security of the scheme.The first column coefficients in Q matrix of chosen blocks were modified to embed watermarks without causing noticeable artifacts.Watermark extraction procedure was performed without the original cover image.The experimental results demonstrate that the watermarked images have good visual quality and this scheme is better than the existing techniques,especially when the image is attacked by cropping,noise pollution and so on.Analysis and discussion on robustness and security issues were also presented. 展开更多
关键词 digital watermarking QR factorization pseudorandom circular chain logistic mapping
在线阅读 下载PDF
Worst-case tolerance analysis on array antenna based on chaos-genetic algorithm 被引量:2
3
作者 Hao Yuan Dan Songt +1 位作者 Qiangfeng Zhou Huaping Xu 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2012年第6期824-830,共7页
This paper studies the effect of amplitude-phase errors on the antenna performance. Via builting on a worst-case error tolerance model, a simple and practical worst error tolerance analysis based on the chaos-genetic ... This paper studies the effect of amplitude-phase errors on the antenna performance. Via builting on a worst-case error tolerance model, a simple and practical worst error tolerance analysis based on the chaos-genetic algorithm (CGA) is proposed. The proposed method utilizes chaos to optimize initial population for the genetic algorithm (GA) and introduces chaotic disturbance into the genetic mutation, thereby improving the ability of the GA to search for the global optimum. Numerical simulations demonstrate that the accuracy and stability of the worst-case analysis of the proposed approach are superior to the GA. And the proposed algorithm can be used easily for the error tolerant design of antenna arrays. 展开更多
关键词 genetic algorithm (GA) array antenna tolerance anal-ysis chaos disturbance logistic map
在线阅读 下载PDF
Permutation-substitution image encryption scheme based on a modified chaotic map in transform domain 被引量:1
4
作者 Ramadan Noha Ahmed HossamEldin H +1 位作者 El-khamy Said E Abd El-Samie Fathi E 《Journal of Central South University》 SCIE EI CAS CSCD 2017年第9期2049-2057,共9页
A new chaotic image encryption scheme based on permutation and substitution in the Fourier domain is presented.Fractional Fourier Transform(FRFT)is used before the encryption scheme to get a large degree of randomizat... A new chaotic image encryption scheme based on permutation and substitution in the Fourier domain is presented.Fractional Fourier Transform(FRFT)is used before the encryption scheme to get a large degree of randomization.The permutation is achieved by Baker map and the substitution by a key-related-to-plain-image algorithm based on the modified Logistic map.Modification of the Logistic map is developed to increase the space of the encryption key,and hence increase the security.The key of the encryption algorithm dependents on the plain image,and thus,the cipher image is sensitive to both the initial key and the plain image to resist known-plaintext and chosen plaintext attacks.The key space is large and hence the algorithm can effectively resist brute-force attacks.The proposed scheme is examined using different performance evaluation metrics and the results prove that the proposed scheme is highly secure,and it can effectively resist different attacks. 展开更多
关键词 Backer map chaotic encryption fractional Fourier transform (FRFT) modified logistic map
在线阅读 下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部