Remote sensing images carry crucial ground information,often involving the spatial distribution and spatiotemporal changes of surface elements.To safeguard this sensitive data,image encryption technology is essential....Remote sensing images carry crucial ground information,often involving the spatial distribution and spatiotemporal changes of surface elements.To safeguard this sensitive data,image encryption technology is essential.In this paper,a novel Fibonacci sine exponential map is designed,the hyperchaotic performance of which is particularly suitable for image encryption algorithms.An encryption algorithm tailored for handling the multi-band attributes of remote sensing images is proposed.The algorithm combines a three-dimensional synchronized scrambled diffusion operation with chaos to efficiently encrypt multiple images.Moreover,the keys are processed using an elliptic curve cryptosystem,eliminating the need for an additional channel to transmit the keys,thus enhancing security.Experimental results and algorithm analysis demonstrate that the algorithm offers strong security and high efficiency,making it suitable for remote sensing image encryption tasks.展开更多
This paper explores a double quantum images representation(DNEQR)model that allows for simultaneous storage of two digital images in a quantum superposition state.Additionally,a new type of two-dimensional hyperchaoti...This paper explores a double quantum images representation(DNEQR)model that allows for simultaneous storage of two digital images in a quantum superposition state.Additionally,a new type of two-dimensional hyperchaotic system based on sine and logistic maps is investigated,offering a wider parameter space and better chaotic behavior compared to the sine and logistic maps.Based on the DNEQR model and the hyperchaotic system,a double quantum images encryption algorithm is proposed.Firstly,two classical plaintext images are transformed into quantum states using the DNEQR model.Then,the proposed hyperchaotic system is employed to iteratively generate pseudo-random sequences.These chaotic sequences are utilized to perform pixel value and position operations on the quantum image,resulting in changes to both pixel values and positions.Finally,the ciphertext image can be obtained by qubit-level diffusion using two XOR operations between the position-permutated image and the pseudo-random sequences.The corresponding quantum circuits are also given.Experimental results demonstrate that the proposed scheme ensures the security of the images during transmission,improves the encryption efficiency,and enhances anti-interference and anti-attack capabilities.展开更多
A novel color image encryption scheme is developed to enhance the security of encryption without increasing the complexity. Firstly, the plain color image is decomposed into three grayscale plain images, which are con...A novel color image encryption scheme is developed to enhance the security of encryption without increasing the complexity. Firstly, the plain color image is decomposed into three grayscale plain images, which are converted into the frequency domain coefficient matrices(FDCM) with discrete cosine transform(DCT) operation. After that, a twodimensional(2D) coupled chaotic system is developed and used to generate one group of embedded matrices and another group of encryption matrices, respectively. The embedded matrices are integrated with the FDCM to fulfill the frequency domain encryption, and then the inverse DCT processing is implemented to recover the spatial domain signal. Eventually,under the function of the encryption matrices and the proposed diagonal scrambling algorithm, the final color ciphertext is obtained. The experimental results show that the proposed method can not only ensure efficient encryption but also satisfy various sizes of image encryption. Besides, it has better performance than other similar techniques in statistical feature analysis, such as key space, key sensitivity, anti-differential attack, information entropy, noise attack, etc.展开更多
With the rapid development of digital information technology,images are increasingly used in various fields.To ensure the security of image data,prevent unauthorized tampering and leakage,maintain personal privacy,and...With the rapid development of digital information technology,images are increasingly used in various fields.To ensure the security of image data,prevent unauthorized tampering and leakage,maintain personal privacy,and protect intellectual property rights,this study proposes an innovative color image encryption algorithm.Initially,the Mersenne Twister algorithm is utilized to generate high-quality pseudo-random numbers,establishing a robust basis for subsequent operations.Subsequently,two distinct chaotic systems,the autonomous non-Hamiltonian chaotic system and the tentlogistic-cosine chaotic mapping,are employed to produce chaotic random sequences.These chaotic sequences are used to control the encoding and decoding process of the DNA,effectively scrambling the image pixels.Furthermore,the complexity of the encryption process is enhanced through improved Joseph block scrambling.Thorough experimental verification,research,and analysis,the average value of the information entropy test data reaches as high as 7.999.Additionally,the average value of the number of pixels change rate(NPCR)test data is 99.6101%,which closely approaches the ideal value of 99.6094%.This algorithm not only guarantees image quality but also substantially raises the difficulty of decryption.展开更多
An inductive digital voice communication system used in shaft is studied. This system digitizes the voice signal by using CVSD (continuously varying slop delta), scramble/unscramble technology and partial response cod...An inductive digital voice communication system used in shaft is studied. This system digitizes the voice signal by using CVSD (continuously varying slop delta), scramble/unscramble technology and partial response coding technology. By using these technology, the anti-jamming ability of the system and the communicatiou quality can be improved.This system adapts to the worst conditions of the shaft.展开更多
A multi-dimensional conductive heterojunction structure,composited by TiO2,SnO2,and Ti3C2TX MXene,is facilely designed and applied as electron transport layer in efficient and stable planar perovskite solar cells.Base...A multi-dimensional conductive heterojunction structure,composited by TiO2,SnO2,and Ti3C2TX MXene,is facilely designed and applied as electron transport layer in efficient and stable planar perovskite solar cells.Based on an oxygen vacancy scramble effect,the zero-dimensional anatase TiO2 quantum dots,surrounding on two-dimensional conductive Ti3C2TX sheets,are in situ rooted on three-dimensional SnO2 nanoparticles,constructing nanoscale TiO2/SnO2 heterojunctions.The fabrication is implemented in a controlled lowtemperature anneal method in air and then in N2 atmospheres.With the optimal MXene content,the optical property,the crystallinity of perovskite layer,and internal interfaces are all facilitated,contributing more amount of carrier with effective and rapid transferring in device.The champion power conversion efficiency of resultant perovskite solar cells achieves 19.14%,yet that of counterpart is just 16.83%.In addition,it can also maintain almost 85%of its initial performance for more than 45 days in 30–40%humidity air;comparatively,the counterpart declines to just below 75%of its initial performance.展开更多
Based on the Fisher–Yatess scrambling and DNA coding technology, a chaotical image encryption method is proposed. First, the SHA-3 algorithm is used to calculate the hash value of the initial password, which is used ...Based on the Fisher–Yatess scrambling and DNA coding technology, a chaotical image encryption method is proposed. First, the SHA-3 algorithm is used to calculate the hash value of the initial password, which is used as the initial value of the chaotic system. Second, the chaotic sequence and Fisher–Yatess scrambling are used to scramble the plaintext,and a sorting scrambling algorithm is used for secondary scrambling. Then, the chaotic sequence and DNA coding rules are used to change the plaintext pixel values, which makes the ciphertext more random and resistant to attacks, and thus ensures that the encrypted ciphertext is more secure. Finally, we add plaintext statistics for pixel-level diffusion to ensure plaintext sensitivity. The experimental results and security analysis show that the new algorithm has a good encryption effect and speed, and can also resist common attacks.展开更多
In non-orthogonal multiple access(NMA) system, signal transmitter and receiver are jointly optimized, so that multiple layers ofdata from more than one user can be simultaneously delivered in the same resource. To mee...In non-orthogonal multiple access(NMA) system, signal transmitter and receiver are jointly optimized, so that multiple layers ofdata from more than one user can be simultaneously delivered in the same resource. To meet the 5G requirements on the numberof connections and spectral efficiency, uplink NMA is becoming an important candidate technology and has been extensively stud-ied in 3GPP. A number of uplink NMA schemes from different industrial companies have been proposed in recent 3GPP meet-ings. In terms of their basic technique principles, this paper classifies these NMA schemes into three categories, namely: scram-bling based NMA schemes, interleaving based NMA schemes, and spreading based NMA schemes. Moreover, the key characteris-tics of these schemes are summarized, and the detailed introduction of each scheme is provided according to the comprehensivesurvey of the latest progress in 3GPP 5G standardization work.展开更多
基金supported by the National Natural Science Foundation of China(Grant No.91948303)。
文摘Remote sensing images carry crucial ground information,often involving the spatial distribution and spatiotemporal changes of surface elements.To safeguard this sensitive data,image encryption technology is essential.In this paper,a novel Fibonacci sine exponential map is designed,the hyperchaotic performance of which is particularly suitable for image encryption algorithms.An encryption algorithm tailored for handling the multi-band attributes of remote sensing images is proposed.The algorithm combines a three-dimensional synchronized scrambled diffusion operation with chaos to efficiently encrypt multiple images.Moreover,the keys are processed using an elliptic curve cryptosystem,eliminating the need for an additional channel to transmit the keys,thus enhancing security.Experimental results and algorithm analysis demonstrate that the algorithm offers strong security and high efficiency,making it suitable for remote sensing image encryption tasks.
基金Project supported by the Open Fund of Anhui Key Laboratory of Mine Intelligent Equipment and Technology (Grant No.ZKSYS202204)the Talent Introduction Fund of Anhui University of Science and Technology (Grant No.2021yjrc34)the Scientific Research Fund of Anhui Provincial Education Department (Grant No.KJ2020A0301)。
文摘This paper explores a double quantum images representation(DNEQR)model that allows for simultaneous storage of two digital images in a quantum superposition state.Additionally,a new type of two-dimensional hyperchaotic system based on sine and logistic maps is investigated,offering a wider parameter space and better chaotic behavior compared to the sine and logistic maps.Based on the DNEQR model and the hyperchaotic system,a double quantum images encryption algorithm is proposed.Firstly,two classical plaintext images are transformed into quantum states using the DNEQR model.Then,the proposed hyperchaotic system is employed to iteratively generate pseudo-random sequences.These chaotic sequences are utilized to perform pixel value and position operations on the quantum image,resulting in changes to both pixel values and positions.Finally,the ciphertext image can be obtained by qubit-level diffusion using two XOR operations between the position-permutated image and the pseudo-random sequences.The corresponding quantum circuits are also given.Experimental results demonstrate that the proposed scheme ensures the security of the images during transmission,improves the encryption efficiency,and enhances anti-interference and anti-attack capabilities.
基金Project supported by the National Natural Science Foundation of China(Grant Nos.62105004 and 52174141)the College Student Innovation and Entrepreneurship Fund Project(Grant No.202210361053)+1 种基金Anhui Mining Machinery and Electrical Equipment Coordination Innovation Center,Anhui University of Science&Technology(Grant No.KSJD202304)the Anhui Province Digital Agricultural Engineering Technology Research Center Open Project(Grant No.AHSZNYGC-ZXKF021)。
文摘A novel color image encryption scheme is developed to enhance the security of encryption without increasing the complexity. Firstly, the plain color image is decomposed into three grayscale plain images, which are converted into the frequency domain coefficient matrices(FDCM) with discrete cosine transform(DCT) operation. After that, a twodimensional(2D) coupled chaotic system is developed and used to generate one group of embedded matrices and another group of encryption matrices, respectively. The embedded matrices are integrated with the FDCM to fulfill the frequency domain encryption, and then the inverse DCT processing is implemented to recover the spatial domain signal. Eventually,under the function of the encryption matrices and the proposed diagonal scrambling algorithm, the final color ciphertext is obtained. The experimental results show that the proposed method can not only ensure efficient encryption but also satisfy various sizes of image encryption. Besides, it has better performance than other similar techniques in statistical feature analysis, such as key space, key sensitivity, anti-differential attack, information entropy, noise attack, etc.
基金supported by the Open Fund of Advanced Cryptography and System Security Key Laboratory of Sichuan Province(Grant No.SKLACSS-202208)the Natural Science Foundation of Chongqing(Grant No.CSTB2023NSCQLZX0139)the National Natural Science Foundation of China(Grant No.61772295).
文摘With the rapid development of digital information technology,images are increasingly used in various fields.To ensure the security of image data,prevent unauthorized tampering and leakage,maintain personal privacy,and protect intellectual property rights,this study proposes an innovative color image encryption algorithm.Initially,the Mersenne Twister algorithm is utilized to generate high-quality pseudo-random numbers,establishing a robust basis for subsequent operations.Subsequently,two distinct chaotic systems,the autonomous non-Hamiltonian chaotic system and the tentlogistic-cosine chaotic mapping,are employed to produce chaotic random sequences.These chaotic sequences are used to control the encoding and decoding process of the DNA,effectively scrambling the image pixels.Furthermore,the complexity of the encryption process is enhanced through improved Joseph block scrambling.Thorough experimental verification,research,and analysis,the average value of the information entropy test data reaches as high as 7.999.Additionally,the average value of the number of pixels change rate(NPCR)test data is 99.6101%,which closely approaches the ideal value of 99.6094%.This algorithm not only guarantees image quality but also substantially raises the difficulty of decryption.
文摘An inductive digital voice communication system used in shaft is studied. This system digitizes the voice signal by using CVSD (continuously varying slop delta), scramble/unscramble technology and partial response coding technology. By using these technology, the anti-jamming ability of the system and the communicatiou quality can be improved.This system adapts to the worst conditions of the shaft.
基金supported by the Science & Technology Project of Anhui Province (16030701091)the Natural Science Research Project of Anhui Provincial Education Department (KJ2019A0030)+2 种基金the Support Project of Outstanding Young Talents in Anhui Provincial Universities (gxyqZD2018006)the National Natural Science Foundation of China(11704002, 31701323)the Anhui Provincial Natural Science Foundation (1908085QF251,1808085MF185)
文摘A multi-dimensional conductive heterojunction structure,composited by TiO2,SnO2,and Ti3C2TX MXene,is facilely designed and applied as electron transport layer in efficient and stable planar perovskite solar cells.Based on an oxygen vacancy scramble effect,the zero-dimensional anatase TiO2 quantum dots,surrounding on two-dimensional conductive Ti3C2TX sheets,are in situ rooted on three-dimensional SnO2 nanoparticles,constructing nanoscale TiO2/SnO2 heterojunctions.The fabrication is implemented in a controlled lowtemperature anneal method in air and then in N2 atmospheres.With the optimal MXene content,the optical property,the crystallinity of perovskite layer,and internal interfaces are all facilitated,contributing more amount of carrier with effective and rapid transferring in device.The champion power conversion efficiency of resultant perovskite solar cells achieves 19.14%,yet that of counterpart is just 16.83%.In addition,it can also maintain almost 85%of its initial performance for more than 45 days in 30–40%humidity air;comparatively,the counterpart declines to just below 75%of its initial performance.
基金Project supported by the National Natural Science Foundation of China(Grant Nos.61173183,61672124,61370145,and 11501064)the Password Theory Project of the 13th Five-Year Plan National Cryptography Development Fund,China(Grant No.MMJJ20170203)+1 种基金the China Postdoctoral Science Foundation(Grant No.2016M590850)the Scientific and Technological Research Program of Chongqing Municipal Education Commission,China(Grant No.KJ1500605)
文摘Based on the Fisher–Yatess scrambling and DNA coding technology, a chaotical image encryption method is proposed. First, the SHA-3 algorithm is used to calculate the hash value of the initial password, which is used as the initial value of the chaotic system. Second, the chaotic sequence and Fisher–Yatess scrambling are used to scramble the plaintext,and a sorting scrambling algorithm is used for secondary scrambling. Then, the chaotic sequence and DNA coding rules are used to change the plaintext pixel values, which makes the ciphertext more random and resistant to attacks, and thus ensures that the encrypted ciphertext is more secure. Finally, we add plaintext statistics for pixel-level diffusion to ensure plaintext sensitivity. The experimental results and security analysis show that the new algorithm has a good encryption effect and speed, and can also resist common attacks.
文摘In non-orthogonal multiple access(NMA) system, signal transmitter and receiver are jointly optimized, so that multiple layers ofdata from more than one user can be simultaneously delivered in the same resource. To meet the 5G requirements on the numberof connections and spectral efficiency, uplink NMA is becoming an important candidate technology and has been extensively stud-ied in 3GPP. A number of uplink NMA schemes from different industrial companies have been proposed in recent 3GPP meet-ings. In terms of their basic technique principles, this paper classifies these NMA schemes into three categories, namely: scram-bling based NMA schemes, interleaving based NMA schemes, and spreading based NMA schemes. Moreover, the key characteris-tics of these schemes are summarized, and the detailed introduction of each scheme is provided according to the comprehensivesurvey of the latest progress in 3GPP 5G standardization work.