首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 15 毫秒
1.
In the current network and big data environment, the secure transmission of digital images is facing huge challenges. The use of some methodologies in artificial intelligence to enhance its security is extremely cutting-edge and also a development trend. To this end, this paper proposes a security-enhanced image communication scheme based on cellular neural network (CNN) under cryptanalysis. First, the complex characteristics of CNN are used to create pseudorandom sequences for image encryption. Then, a plain image is sequentially confused, permuted and diffused to get the cipher image by these CNN-based sequences. Based on cryptanalysis theory, a security-enhanced algorithm structure and relevant steps are detailed. Theoretical analysis and experimental results both demonstrate its safety performance. Moreover, the structure of image cipher can effectively resist various common attacks in cryptography. Therefore, the image communication scheme based on CNN proposed in this paper is a competitive security technology method.  相似文献   

2.
Grassi G 《中国物理 B》2012,21(5):50505-050505
This paper presents a new scheme to achieve generalized synchronization(GS) between different discrete-time chaotic(hyperchaotic) systems.The approach is based on a theorem,which assures that GS is achieved when a structural condition on the considered class of response systems is satisfied.The method presents some useful features:it enables exact GS to be achieved in finite time(i.e.,dead-beat synchronization);it is rigorous,systematic,and straightforward in checking GS;it can be applied to a wide class of chaotic maps.Some examples of GS,including the Grassi-Miller map and a recently introduced minimal 2-D quadratic map,are illustrated.  相似文献   

3.
时空混沌系统在保密通信中的应用   总被引:1,自引:1,他引:0  
张旭  汪柏年 《物理实验》2003,23(10):13-16
以环形腔中激光振荡输出空间扩展模型为例,研究了多组信息同时编码的时空混沌加密及解密,给出安全可靠的加解密结果,并对抗破译能力进行了检验,完成了互联网上保密通信实验,结果令人满意。  相似文献   

4.
混沌神经网络的控制   总被引:5,自引:0,他引:5       下载免费PDF全文
何国光  曹志彤 《物理学报》2001,50(11):2103-2107
提出了一种针对混沌神经网络的钉扎控制方法.利用此方法对混沌神经网络进行控制,使网络的输出稳定在网络的一个存储的模式上.实现了混沌神经网络的信息搜索,并对影响混沌神经网络控制效果的几个因素进行了讨论. 关键词: 混沌控制 混沌神经网络 钉扎控制方法  相似文献   

5.
张国山  牛弘 《物理学报》2012,61(11):110503-110503
通过在Chen系统的第一个方程中加入一个可变系数的乘积项, 构造了一个新的三维自治混沌系统.新系统可通过调节其可变系数实现不同系数组合下系统的混沌产生或混沌抑制, 即调节该乘积项的可变系数, 可使不出现混沌的Chen系统产生混沌现象, 同时也可使产生混沌运动的Chen系统不再产生混沌现象.详细分析了新系统的特性, 研究了新系统的混沌同步问题, 并给出了相应的仿真结果.  相似文献   

6.
李维楠 《计算物理》1998,15(3):331-336
北京科技大学陈难先教授把数论中的一条古老定理:莫比乌斯变换推广到普通函数并创造性地用之于物理学中许多反问题,取得了巨大成功。在此以更直观和易于理解的方式导出陈氏定理,并通过一些具体实例展示其应用前景。  相似文献   

7.
针对新设计的ITER纵场重力支撑结构特点,用ANSYS有限元软件对它建立了有限元模型。采用Block Lanczos方法求出了ITER重力支撑的屈曲特征值。分析结果表明ITER重力支撑不会发生屈曲。为了确保新设计结构的可靠性,初步设计了全尺寸支撑的半原型件拟用来对支撑进行工程受力测试。  相似文献   

8.
齐爱学  朱斌达  王光义 《中国物理 B》2022,31(2):20502-020502
This paper presents a new hyperbolic-type memristor model,whose frequency-dependent pinched hysteresis loops and equivalent circuit are tested by numerical simulations and analog integrated operational amplifier circuits.Based on the hyperbolic-type memristor model,we design a cellular neural network(CNN)with 3-neurons,whose characteristics are analyzed by bifurcations,basins of attraction,complexity analysis,and circuit simulations.We find that the memristive CNN can exhibit some complex dynamic behaviors,including multi-equilibrium points,state-dependent bifurcations,various coexisting chaotic and periodic attractors,and offset of the positions of attractors.By calculating the complexity of the memristor-based CNN system through the spectral entropy(SE)analysis,it can be seen that the complexity curve is consistent with the Lyapunov exponent spectrum,i.e.,when the system is in the chaotic state,its SE complexity is higher,while when the system is in the periodic state,its SE complexity is lower.Finally,the realizability and chaotic characteristics of the memristive CNN system are verified by an analog circuit simulation experiment.  相似文献   

9.
In this paper, the technique of image noise cancellation is presented by employing cellular neural networks (CNN) and linear matrix inequality (LMI). The main objective is to obtain the templates of CNN by using a corrupted image and a corresponding desired image. A criterion for the uniqueness and global asymptotic stability of the equilibrium point of CNN is presented based on the Lyapunov stability theorem (i.e., the feedback template “A” of CNN is solved at this step), and the input template “B” of CNN is designed to achieve desirable output by using the property of saturation nonlinearity of CNN. It is shown that the problem of image noise cancellation can be characterized in terms of LMIs. The simulation results indicate that the proposed method is useful for practical application.  相似文献   

10.
对于一类非线性恢复力无法精确解析表达的简谐激励振动系统,建立了由原系统非线性恢复力激振的派生系统.证明了派生系统与原系统可以达到广义同步.派生系统可以自动与激励力频率、大小变化的原非线性振动系统保持广义同步.证明了由派生系统的广义同步,可以识别出原系统的阻尼系数、激振力幅值与频率.由Duffing系统的仿真计算结果可以看出,这种方法是有效的,而且识别精度较高. 关键词: 非线性恢复力 广义同步 混沌  相似文献   

11.
陈氏混沌系统的非反馈控制   总被引:1,自引:0,他引:1       下载免费PDF全文
谌龙  王德石 《物理学报》2007,56(1):91-94
通过对陈氏混沌系统施加非共振参数激励实现非反馈混沌控制.将远大于系统特征频率的周期信号作为控制输入,利用平均法和Lyapunov方法证明控制方案的可行性,并得出控制参数应满足的条件.数值研究表明此方法可以使受控系统迅速达到稳定状态,且具有较强的抗干扰性能.  相似文献   

12.
张旭东  朱萍  谢小平  何国光 《物理学报》2013,62(21):210506-210506
提出了混沌神经网络的动态阈值控制方法, 将大脑脑电波的主要成分, 正弦信号作为控制变量实现对混沌神经网络内部状态的阈值动态改变, 从而达到了控制混沌神经网络混沌的目的. 利用该方法可以将混沌神经网络的输出稳定在一个与网络初始模式相关的存储模式和其反相模式上, 从而使混沌神经网络在模式识别、信息搜索等信息处理功能得以实现. 该控制方法不需要事先指定阈值, 是一种自适应方法, 符合实际人脑的思维运动. 关键词: 混沌控制 混沌神经网络 动态阈值控制 信息处理  相似文献   

13.
基于线性耦合下混沌系统的同步条件   总被引:3,自引:0,他引:3       下载免费PDF全文
刘振泽  田彦涛  宋彦 《物理学报》2006,55(8):3945-3949
将混沌同步问题用精确的数学语言给予描述,通过数学分析将其转化为微分方程组的稳定性问题.以Lorenz系统族的Chen氏系统作为典型系统,在线性耦合下分析系统参数,得到了系统达到同步时的充分条件,且在理论上加以证明.结合该条件,提出了一种确定耦合系数的方法.最后用仿真实验验证了该方法的正确性,并验证了在不同耦合方式和参考系统的情况下定理的有效性. 关键词: 混沌同步 耦合 稳定性  相似文献   

14.
陈氏混沌系统的自适应控制   总被引:36,自引:0,他引:36       下载免费PDF全文
关新平  范正平  彭海朋  王益群 《物理学报》2001,50(11):2108-2111
通过简单的线性状态反馈方法,分别在系统参数已知和未知的情况下研究了陈氏混沌系统的控制问题.当参数已知时,给出了反馈增益的范围;当参数未知时,设计了一自适应控制器,它克服了一般的自适应控制器中控制律不连续的缺点.通过实验仿真证明了所给方法的有效性. 关键词: 陈氏混沌系统 混沌控制 自适应控制  相似文献   

15.
An improved hyper-chaotic system based on the hyper-chaos generated from Chen's system is presented, and some basic dynamical properties of the system are investigated by means of Lyapunov exponent spectrum, bifurcation diagrams and characteristic equation roots. Simulations show that the new improved system evolves into hyper-chaotic, chaotic, various quasi-periodic or periodic orbits when one parameter of the system is fixed to be a certain value while the other one is variable. Some computer simulations and bifurcation analyses are given to testify the findings.  相似文献   

16.
王东风  韩璞 《中国物理 B》2008,17(10):3603-3608
A universal adaptive generalized functional synchronization approach to any two different or identical chaotic systems with unknown parameters is proposed, based on a unified mathematical expression of a large class of chaotic system. Self-adaptive parameter law and control law are given in the form of a theorem. The synchronization between the three-dimensional R6ssler chaotic system and the four-dimensional Chen's hyper-chaotic system is studied as an example for illustration. The computer simulation results demonstrate the feasibility of the method proposed.  相似文献   

17.
In this paper, we propose a novel block cryptographic scheme based on a spatiotemporal chaotic system and a chaotic neural network (CNN). The employed CNN comprises a 4-neuron layer called a chaotic neuron layer (CNL), where the spatiotemporal chaotic system participates in generating its weight matrix and other parameters. The spatiotemporal chaotic system used in our scheme is the typical coupled map lattice (CML), which can be easily implemented in parallel by hardware. A 160-bit-long binary sequence is used to generate the initial conditions of the CML. The decryption process is symmetric relative to the encryption process. Theoretical analysis and experimental results prove that the block cryptosystem is secure and practical, and suitable for image encryption.  相似文献   

18.
Given the Mayers–Lo–Chau (MLC) no-go theorem, unconditionally secure quantum bit commitment (QBC) is impossible and hence quantum oblivious transfer (QOT) based on QBC is insecure. In this paper, we propose a secure all-or-nothing QOT protocol and a one-out-of-two QOT protocol respectively. The unique merit of the proposed protocols lies in that it is not based on QBC but based on an untrusted third party. Moreover, the proposed protocols do not violate Lo's no-go theorem so that their security can be achieved.  相似文献   

19.
广义混沌同步中的多稳定同步流形   总被引:4,自引:0,他引:4       下载免费PDF全文
俞翔  朱石坚  刘树勇 《物理学报》2008,57(5):2761-2769
从构造驱动系统和响应系统之间的函数关系出发,一般性地研究了广义混沌同步中同步流形的多值性问题,并对同步流形的稳定性进行了分析,提出了多稳定同步流形存在的条件.利用该稳定性条件对两个实例进行了分析,一个为Genesio-Rssler耦合系统,另一个为具有二次、三次非线性的耦合Duffing系统,结果表明前者仅有唯一的稳定同步流形,而后者随着耦合强度的增加,从具有两个稳定的同步流形变为只存在一个稳定同步流形. 关键词: 混沌同步 多稳定性 同步流形  相似文献   

20.
颜森林 《物理学报》2008,57(5):2819-2826
把量子阱激光混沌耦合反馈同步系统应用于光纤保密通信中,提出光纤混沌双芯双向保密通信设想.通过耦合外部光注入多量子阱激光混沌全光耦合反馈同步系统和光纤传输信道,建立了光纤混沌双芯双向通信系统物理模型.理论和数值证明了激光混沌同步,理论分析指出光纤中的自相位调制是限制激光混沌在光纤传输中同步的主要原因,并推导出混沌信号双芯双向传输中的非线性相移以及混沌激光功率限制和传输距离公式.数值实现了该系统在长距离二根光纤传输中的同步,详细地分析了系统同步时间随光纤传输长度的关系.模拟了调制频率06 GHz的混沌模拟通 关键词: 混沌 同步 光纤 保密通信  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号