首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 500 毫秒
1.
A digital watermark is a visible, or preferably invisible, identification code that is permanently embedded in digital media, to prove owner authentication and provide protection for documents. Given the interest in watermark generation using chaotic functions a detailed study of one chaotic function for this purpose is performed. In this paper, we present an approach for the generation of watermarks using the logistic map. Using this function, in conjunction with seed management, it is possible to generate chaotic sequences that may be used to create highpass or lowpass digital watermarks. In this paper we provide a detailed study on the generation of optically detectable watermarks and we provide some guidelines on successful chaotic watermark generation using the logistic map, and show using a recently published scheme, how care must be taken in the selection of the function seed.  相似文献   

2.
Digital watermarking is an ever increasing and important discipline, especially in the modern electronically-driven world. Watermarking aims to embed a piece of information into digital documents which their owner can use to prove that the document is theirs, at a later stage. In this paper, performance analysis of watermarking schemes is performed on white noise sequences and chaotic sequences for the purpose of watermark generation. Pseudorandom sequences are compared with chaotic sequences generated from the chaotic skew tent map. In particular, analysis is performed on highpass signals generated from both these watermark generation schemes, along with analysis on lowpass watermarks and white noise watermarks. This analysis focuses on the watermarked images after they have been subjected to common image distortion attacks. It is shown that signals generated from highpass chaotic signals have superior performance than highpass noise signals, in the presence of such attacks. It is also shown that watermarks generated from lowpass chaotic signals have superior performance over the other signal types analysed.  相似文献   

3.
The nature of the fixed points of the compound logistic map is researched and the boundary equation of the first bifurcation of the map in the parameter space is given out. Using the quantitative criterion and rule of chaotic system, the paper reveal the general features of the compound logistic map transforming from regularity to chaos, the following conclusions are shown: (1) chaotic patterns of the map may emerge out of double-periodic bifurcation and (2) the chaotic crisis phenomena and the reverse bifurcation are found. At the same time, we analyze the orbit of critical point of the compound logistic map and put forward the definition of Mandelbrot–Julia set of compound logistic map. We generalize the Welstead and Cromer’s periodic scanning technology and using this technology construct a series of Mandelbrot–Julia sets of compound logistic map. We investigate the symmetry of Mandelbrot–Julia set and study the topological inflexibility of distributing of period region in the Mandelbrot set, and finds that Mandelbrot set contain abundant information of structure of Julia sets by founding the whole portray of Julia sets based on Mandelbrot set qualitatively.  相似文献   

4.
In order to solve the model of short-term cascaded hydroelectric system scheduling, a novel chaotic particle swarm optimization (CPSO) algorithm using improved logistic map is introduced, which uses the water discharge as the decision variables combined with the death penalty function. According to the principle of maximum power generation, the proposed approach makes use of the ergodicity, symmetry and stochastic property of improved logistic chaotic map for enhancing the performance of particle swarm optimization (PSO) algorithm. The new hybrid method has been examined and tested on two test functions and a practical cascaded hydroelectric system. The experimental results show that the effectiveness and robustness of the proposed CPSO algorithm in comparison with other traditional algorithms.  相似文献   

5.
The non-linearity caused by the application of digital control may lead to transient chaotic behaviour. In the present paper, we analyse a simple model of a digitally controlled mechanical system with dry friction, which may perform transient chaotic vibrations. As a consequence of the digital effects, the behaviour of this system can be described by a 1D piecewise linear map. The fractal dimension of the so-called chaotic repeller set is calculated and the results are used for the quick estimation of the mean lifetime of chaotic transients.  相似文献   

6.
We consider a family of one-dimensional continuous piecewise smooth maps with monotone increasing and monotone decreasing branches. It is associated with a credit cycle model introduced by Matsuyama, under the assumption of the Cobb-Douglas production function. We offer a detailed analysis of the dynamics of this family. In particular, using the skew tent map as a border collision normal form we obtain the conditions of abrupt transition from an attracting fixed point to an attracting cycle or a chaotic attractor (cyclic chaotic intervals). These conditions allow us to describe the bifurcation structure of the parameter space of the map in a neighborhood of the boundary related to the border collision bifurcation of the fixed point. Particular attention is devoted to codimension-two bifurcation points. Moreover, the described bifurcation structure confirms that the chaotic attractors of the considered map are robust, that is, persistent under parameter perturbations.  相似文献   

7.
8.
In this paper a new one-dimensional discrete chaotic map based on the composition of permutations is presented. Proposed map is defined over finite set and represents fully digital approach which is significantly different from previous ones. Dynamical properties of special case of proposed map are analyzed. Analyzed map does not have fixed points and exhibits chaotic behavior.  相似文献   

9.
In this paper, under the combination of arithmetic coding and logistic map, a novel chaotic encryption scheme is presented. The plaintexts are encrypted and compressed by using an arithmetic coder whose mapping intervals are changed irregularly according to a keystream derived from chaotic map and plaintext. Performance and security of the scheme are also studied experimentally and theoretically in detail.  相似文献   

10.
Chaotic systems would degrade owing to finite computing precisions, and such degradation often seriously affects the performance of digital chaos-based applications. In this paper, a chaotification method is proposed to solve the dynamical degradation of digital chaotic systems based on a hybrid structure, where a continuous chaotic system is applied to control the digital chaotic system, and a unidirectional coupling controller that combines a linear external state control with a modular function is designed. Moreover, we proof rigorously that a class of digital chaotic systems can be driven to be chaotic in the sense that the system is sensitive to initial conditions. Different from the existing remedies, this method can recover the dynamical properties of system, and even make some properties better than those of the original chaotic system. Thus, this new approach can be applied to the fields of chaotic cryptography and secure communication.  相似文献   

11.
This paper proposes a new robust chaotic algorithm for digital image steganography based on a 3-dimensional chaotic cat map and lifted discrete wavelet transforms. The irregular outputs of the cat map are used to embed a secret message in a digital cover image. Discrete wavelet transforms are used to provide robustness. Sweldens’ lifting scheme is applied to ensure integer-to-integer transforms, thus improving the robustness of the algorithm. The suggested scheme is fast, efficient and flexible. Empirical results are presented to showcase the satisfactory performance of our proposed steganographic scheme in terms of its effectiveness (imperceptibility and security) and feasibility. Comparison with some existing transform domain steganographic schemes is also presented.  相似文献   

12.
Hash functions play important role in the information security era. Although there are different methods to design these functions, in recent years chaos theory has emerged as a strong solution in this area. Chaotic hash functions use one-dimensional maps such as logistic and tent, or employ complex multi-dimensional maps which are typically insecure or slow and most of them has been successfully attacked. In this paper, we propose a new chaotic system and employ it to design a secure and fast hash function. The improved security factor has roots in the hyper sensitivity of the proposed chaotic map while properties like speed and security can be parameterized. On the other hand, the proposed hash function has a dynamic random array of functions and can be implemented by a parallel architecture. This data-level parallel architecture makes it fast to generate the hash value. Statistical simulations show success of the proposed hashing scheme. Cryptanalysis of proposed function, such as key sensitivity, meet-in-the-middle attack, collision, preimage resistance and high level attacks, proves security of the proposed function.  相似文献   

13.
The application of digital control may lead to so-called transient chaotic behaviour. In the present paper, we analyse a simple model of a digitally controlled mechanical system, which may create such vibrations. As a consequence of the digital effects, i.e., the sampling and the round-off error, the behaviour of this system can be described by a one-dimensional piecewise linear map. The lifetime of chaotic transients is usually characterized by the so-called escape rate. In the literature, the reciprocal of the escape rate is considered to be the expected duration of the transient chaotic phenomenon. We claim that this approach is not always fruitful, and present a different way of calculating the mean lifetime in the case of one-dimensional piecewise linear maps. Our method might also be used to solve diffusion problems in one-dimensional models of periodic arrays.  相似文献   

14.
This paper analyzes a delay logistic equation which models a feedback control problem. Interval map associated to the system is derived. By calculating Lyapunov exponent, we indicate stable orbit and chaotic phenomenon respectively. The results are verified through computer simulation. We identify the parameter which controls the dynamics.  相似文献   

15.
16.
In order to solve the problem that chaos is degenerated in limited computer precision and Cat map is the small key space, this paper presents a chaotic map based on topological conjugacy and the chaotic characteristics are proved by Devaney definition. In order to produce a large key space, a Cat map named block Cat map is also designed for permutation process based on multiple-dimensional chaotic maps. The image encryption algorithm is based on permutation–substitution, and each key is controlled by different chaotic maps. The entropy analysis, differential analysis, weak-keys analysis, statistical analysis, cipher random analysis, and cipher sensibility analysis depending on key and plaintext are introduced to test the security of the new image encryption scheme. Through the comparison to the proposed scheme with AES, DES and Logistic encryption methods, we come to the conclusion that the image encryption method solves the problem of low precision of one dimensional chaotic function and has higher speed and higher security.  相似文献   

17.
The delay logistic map with two types of q-deformations: Tsallis and Quantum-group type are studied. The stability of the logistic map and its bifurcation scheme is analyzed as a function of the deformation and delay parameters. Chaos is suppressed in a certain region of deformation and delay parameter space. By introducing delay, the steady state in one type of deformation is maintained while chaotic behavior is recovered in another type.  相似文献   

18.
In this paper, we provide a detailed study of the upper and lower slopes of a vector-valued map recently introduced by Bednarczuk and Kruger. We show that these slopes enjoy most properties of the strong slope of a scalar-valued function and can be explicitly computed or estimated in the convex, strictly differentiable, linear cases. As applications, we obtain error bounds for lower level sets (in particular, a Hoffman-type error bound for a system of linear inequalities in the infinite-dimensional space setting, existence of weak sharp Pareto minima) and sufficient conditions for Pareto minima.  相似文献   

19.
Particle swarm optimization (PSO) has gained increasing attention in tackling complex optimization problems. Its further superiority when hybridized with other search techniques is also shown. Chaos, with the properties of ergodicity and stochasticity, is definitely a good candidate, but currently only the well-known logistic map is prevalently used. In this paper, the performance and deficiencies of schemes coupling chaotic search into PSO are analyzed. Then, the piecewise linear chaotic map (PWLCM) is introduced to perform the chaotic search. An improved PSO algorithm combined with PWLCM (PWLCPSO) is proposed subsequently, and experimental results verify its great superiority.  相似文献   

20.
应用带参数整数小波变换,提出了一种多重水印技术。在图像中同时嵌入半透明数字水印和脆弱水印来达到良好的保护效果。通过构造模糊关系矩阵,实现了半透明水印的安全嵌入。引入R ijndae l加密算法,构造出H ash函数,实现了一种具有高敏感性能的脆弱水印。该技术在图像保护领域有广阔的应用前景。  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号