首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 31 毫秒
1.
It has been proposed to realize secure communication using chaotic synchronization via transmission of a binary message encoded by parameter modulation in the chaotic system. This paper considers the use of parameter adaptive control techniques to extract the message, based on the assumptions that we know the equation form of the chaotic system in the transmitter but do not have access to the precise values of the parameters which are kept secret as a secure set. In the case in which a synchronizing system can be constructed using parameter adaptive control by the transmitted signal and the synchronization is robust to parameter mismatches, the parameter modulation can be revealed and the message decoded without resorting to exact parameter values in the secure set. A practical local Lyapunov function method for designing parameter adaptive control rules based on originally synchronized systems is presented.  相似文献   

2.
基于独立成分分析和经验模态分解的混沌信号降噪   总被引:3,自引:0,他引:3       下载免费PDF全文
王文波  张晓东  汪祥莉 《物理学报》2013,62(5):50201-050201
基于经验模态分解和独立成分分析去噪的特点,提出了一种联合独立成分分析和经验模态分解的混沌信号降噪方法. 利用经验模态分解对混沌信号进行分解,根据平移不变经验模态分解的思想构造多维输入向量, 通过所构造的多维输入向量和独立成分分析对混沌信号的各层内蕴模态函数进行自适应去噪处理; 将处理后的所有内蕴模态函数进行累加重构,从而得到降噪后的混沌信号. 仿真实验中分别对叠加不同强度高斯噪声的Lorenz混沌信号及实际观测的月太阳黑子混沌序列进行了研究, 结果表明本文方法能够对混沌信号进行有效的降噪,而且能够较好地校正相空间中点的位置, 逼近真实的混沌吸引子轨迹. 关键词: 独立成分分析 经验模态分解 混沌信号 降噪  相似文献   

3.
光学双稳系统混沌驱动保密通讯原理研究   总被引:4,自引:0,他引:4  
刘金刚  沈柯 《光学学报》1997,17(11):473-1479
根据声光双稳系统混沌驱动下的动力学行为,提出利用系统的相位特性实现信息的混沌加密,并且由接收端混沌驱动产生的混沌信号完成信息提取的原理。发现在较大的噪声覆盖下仍然可以实现信息的安全传送,由于信息解密不需要与载波安全同步的混信号而只利用传输信号与接收端被驱动系统输出信号的相位关系,因此这种方法具有实际应用价值。  相似文献   

4.
龙敏  彭飞  陈关荣 《中国物理 B》2008,17(10):3588-3595
A new one-way hash function based on the unified chaotic system is constructed. With different values of a key parameter, the unified chaotic system represents different chaotic systems, based on which the one-way hash function algorithm is constructed with three round operations and an initial vector on an input message. In each round operation, the parameters are processed by three different chaotic systems generated from the unified chaotic system. Feed-forwards are used at the end of each round operation and at the end of each element of the message processing. Meanwhile, in each round operation, parameter-exchanging operations are implemented. Then, the hash value of length 160 bits is obtained from the last six parameters. Simulation and analysis both demonstrate that the algorithm has great flexibility, satisfactory hash performance, weak collision property, and high security.  相似文献   

5.
This paper studies the adaptive synchronization of a switching system with unknown parameters which switches between the R?ssler system and a unified chaotic system. Using the Lyapunov stability theory and adaptive control method, the receiver system will achieve synchronization with the drive system and the unknown parameters would be estimated by the receiver. Then the proposed switching system is used for secure communications based on the communication schemes including chaotic masking, chaotic modulation, and chaotic shift key strategies. Since the system switches between two chaotic systems and the parameters are almost unknown, it is more difficult for the intruder to extract the useful message from the transmission channel. In addition, two new schemes in which the chaotic signal used to mask (or modulate) the transmitted signal switches between two components of a chaotic system are also presented. Finally, some simulation results are given to show the effectiveness of the proposed communication schemes.  相似文献   

6.
We use control of chaos to encode information into the oscillations of the Belousov-Zhabotinsky reaction. An arbitrary binary message is encoded by forcing the chaotic oscillations to follow a specified trajectory. The information manipulating control requires only small perturbations to vary the binary message. In this paper we extend our recent theoretical work [Bollt and Dolnik, Phys. Rev. E 64, 1196 (1990)] by introducing a new and simplified encoding technique which can be utilized in the presence of experimental noise. We numerically and theoretically study several practical aspects of controlling symbol dynamics including: modeling noisy time-series, learning underlying symbol dynamics, and evaluation of derivatives for control by observing system responses to an intelligent and deliberate sequence of input parameter variations. All of the modeling techniques incorporated here are ultimately designed to learn and control symbol dynamics of experimental data known only as an observed time-series; the simulation assumes no global model. We find that noise affects reliability of encoding information and may cause coding errors. But, if the level of noise is confined to relatively small values, which are achievable in experiments, the control mechanism is robust to the noise. Thus we can still produce a desired symbolic code. However, scarce errors in encoding may occur due to rare but large fluctuations. These errors may be corrected during the decoding process by a variation of the filtering technique suggested by Rosa et al. [Phys. Rev. Lett. 78, 1247 (1997)]. (c) 1998 American Institute of Physics.  相似文献   

7.
An approach for the secure transmission of encrypted messages using chaos and noise is presented in this paper. The method is based on the synchronization of certain types of chaotic oscillators in response to a common noise input. This allows two distant oscillators to generate identical output which can be used as a key for encryption and decryption of a message signal. The noiselike synchronizing input-which contains no message information-is communicated to identical oscillators in the transmitter and the receiver over a public channel. The encrypted message is also sent over a public channel, while the key is never transmitted at all. The chaotic nature of the oscillators which generate the key and the randomness of the signal driving the process combine to make the recovery of the key by an eavesdropper extremely difficult. We evaluate system performance with respect to security and robustness and show that a robust and secure system can be obtained. (c) 1998 American Institute of Physics.  相似文献   

8.
In this paper, parameters of a given (chaotic) dynamical system are estimated from time series by using identical synchronization between two different systems. This technique is based on the invariance principle of differential equations, i.e., a dynamical Lyapunov function involving synchronization error and the estimation error of parameters. The control used in this synchronization consists of feedback and adaptive control loop associated with the update law of estimation parameters. Our estimation process indicates that one may identify dynamically all unknown parameters of a given (chaotic) system as long as time series of the system are available. Lorenz and Rossler systems are used to illustrate the validity of this technique. The corresponding numerical results and analysis on the effect of noise are also given.  相似文献   

9.
分数阶统一混沌系统的自适应同步   总被引:2,自引:0,他引:2       下载免费PDF全文
张若洵  杨洋  杨世平 《物理学报》2009,58(9):6039-6044
提出了分数阶统一混沌系统的自适应同步方法, 给出了自适应同步控制器和参数自适应率. 设计的单一控制器简单且只含有一个驱动变量. 所用同步方法适用于一类分数阶混沌系统的同步, 且具有较强的抗噪声能力, 具有较高的实用价值. 数值模拟结果表明了该方法的有效性. 关键词: 分数阶 统一混沌系统 自适应同步  相似文献   

10.
一种破译混沌直接序列扩频保密通信的方法   总被引:1,自引:0,他引:1       下载免费PDF全文
胡进峰  郭静波 《物理学报》2008,57(3):1477-1484
提出了一种新型的混沌保密通信破译方法,并破译了混沌直接序列扩频保密通信(简称混沌直扩).针对混沌直扩信号中只有一个混沌吸引子的特点,基于混沌系统广义同步的思想,提出了混沌拟合方法;针对混沌直扩中混沌实值序列和数字信号相乘的特点,充分利用混沌直扩的基本原理和信息码是慢变信号的特性,提出了用无先导卡尔曼滤波混沌拟合的方法估计信息码的破译方法;进一步针对无先导卡尔曼滤波的过程噪声和混沌拟合的拟合误差共同导致的跟踪误差,提出了跟踪误差控制因子的方法,从而将跟踪误差转变成有利因素并加以利用,根据跟踪误差的值域范围破  相似文献   

11.
薛楷嘉  王从庆 《物理学报》2015,64(7):70502-070502
提出了一种基于在线误差修正自适应SVR的滑模控制方法, 用于解决一类非线性不确定分数阶混沌系统的控制问题. 分别通过对混沌系统非线性函数的离线SVR估计和基于增量学习的状态跟踪误差在线SVR预测, 解决了不确定分数阶混沌系统模型难以预测的问题. 同时根据Lyapunov稳定性理论设计出SVR权值自适应调整律. 本文以分数阶Arneodo 系统为例进行仿真, 仿真结果表明了, 对于带有外界噪声扰动的非线性不确定分数阶混沌系统, 该方法可以在有限时间内将系统稳定至期望状态, 提高对非线性函数的预测精度, 改善控制性能.  相似文献   

12.
王小敏  张家树  张文芳 《物理学报》2005,54(12):5566-5573
在对多个满足Kelber条件的滤波器组成的复合系统进行初步分析的基础上,提出了一个基于复合非线性数字滤波器的带密钥的Hash算法.算法首先构建能产生高维混沌序列的复合滤波器系统,然后在明文作用的复合序列控制下随机选择滤波器子系统,并以复合系统的初态作为密钥,以粗粒化的量化迭代轨迹作为明文的Hash值.讨论了复合系统实现Hash函数的不可逆性、防伪造性、初值敏感性等特点.研究结果表明:基于复合非线性数字滤波器的Hash算法简单快速,比基于单一混沌映射的Hash算法有着更高的安全性,同时滤波器结构中没有复杂的浮点运算,比一般复合混沌系统更易于软硬件实现. 关键词: Hash 函数 混沌 非线性自回归数字滤波器  相似文献   

13.
《Physics letters. A》1999,251(3):169-176
We present a new chaotic masking scheme by using synchronized chaotic systems. In this method, synchronization and message transmission phases are separated, and while synchronization is achieved in the synchronization phases, the message is only sent in message transmission phases. We show that if synchronization is achieved exponentially fast, then under certain conditions any message of any length could be transmitted and successfully recovered provided that the synchronization length is sufficiently long. We also show that the proposed scheme is robust with respect to noise and parameter mismatch under some mild conditions.  相似文献   

14.
The ultimate secure choice for block cryptosystem until now is advanced encryption standard (AES). It is very difficult to implement AES for the constrained situations such as sensor networks, image encryption and RFID tags. In this article, a chaotic oscillator generated by a second order differential equation is used to produce confusion and diffusion in the plaintext message to achieve the desired secrecy. The produced chaotic sequence of random numbers from dynamical system is utilized to scramble the pixels of an image to obtain an encrypted image. Chaos based encryption technique is found secure enough to tackle chosen plaintext attacks and brute force attacks. The specific attributes of chaotic system like, sensitivity to initial conditions, randomness and uncertainty make it suitable for the design of cryptosystem. The dominance of the proposed scheme is acknowledged due to the fact of better cryptographic properties when compared with the algorithms already developed in the literature.  相似文献   

15.
The integrity of a chaotic encoding technique based on an external-cavity semiconductor laser transmitter-receiver system is experimentally examined. A semiconductor laser placed in the transmission path of the system is used to represent an eavesdropper intercepting a chaotic communication. The eavesdropper is able to obtain a copy of the transmission but is unable to decode the message. A chaotic communication system based on external-cavity semiconductor lasers is seen therefore to be secure against this form of interception.  相似文献   

16.
Chaotic signals can be used as carriers of information in communication systems. In this work we describe a simple encoding method that allows one to map any desired bit sequence into a chaotic waveform. The redundancy of the resulting information carrying signal enables us to devise a novel signal reconstruction technique that is able to recover relatively large parts of the chaotic signal starting from just a few samples of it. We show that this technique allows one to increase both the transmission reliability and the transmission rate of a communication system even in the presence of noise.  相似文献   

17.
This paper studies the adaptive complete synchronization of chaotic and hyperchaotic systems with fully unknown parameters. In practical situations, some systems' parameters cannot be exactly known a priori, and the uncertainties often affect the stability of the process of synchronization of the chaotic oscillators. An adaptive scheme is proposed to compensate for the effects of parameters' uncertainty based on the structure of chaotic systems in this paper. Based on the Lyapunov stability theorem, an adaptive controller and a parameters update law can be designed for the synchronization of chaotic and hyperchaotic systems. The drive and response systems can be nonidentical, even with different order. Three illustrative examples are given to demonstrate the validity of this technique, and numerical simulations are also given to show the effectiveness of the proposed chaos synchronization method. In addition, this synchronization scheme is quite robust against the effect of noise.  相似文献   

18.
罗小华  李华青  陈秋华 《物理学报》2009,58(11):7532-7538
提出一种混沌系统自适应追踪控制任意参考信号的新方法.该方法是通过预先设计出补偿控制器将混沌系统状态变量对参考信号的追踪控制问题转化为同结构混沌系统状态变量的自适应同步问题,再通过设计出自适应控制器,使同结构混沌系统全局渐近达到同步,追踪控制器为补偿控制器和自适应控制器的代数和.基于Lyapunov稳定性原理,理论上严格证明了利用本方法所设计追踪控制器的正确性.最后,以超混沌Chen系统为控制对象,利用本方法设计出追踪控制器完成了对不动点,正、余弦信号,同结构混沌系统状态变量,异结构混沌系统状态变量的追踪控 关键词: 自适应追踪控制 补偿控制器 自适应控制器 追踪控制器  相似文献   

19.
王跃钢  文超斌  左朝阳  杨家胜  郭志斌 《物理学报》2014,63(8):89101-089101
针对现有重力导航匹配算法的匹配精度、匹配率受惯导初始位置误差影响较大以及实时性较差等不足,提出了一种基于自适应混沌蚁群径向分析的实时重力辅助导航匹配算法,新算法引入改进的连续域蚁群算法进行优化模型求解,通过进行连续域蚁群算法的信息素的自适应调整,同时对蚁群算法的搜索策略、计算参数、局部信息素进行混沌自适应处理,最终达到提高算法搜索效率、匹配率、抗噪性能的效果,实验结果表明,新算法对惯导初始误差不敏感,匹配率高,实时性强。  相似文献   

20.
A multiple-image encryption scheme is proposed based on the asymmetric technique, in which the encryption keys are not identical to the decryption ones. First, each plain image is scrambled based on a sequence of chaotic pairs generated with a system of two symmetrically coupled identical logistic maps. Then, the phase-only function of each scrambled image is retrieved with an iterative phase retrieval process in the fractional Fourier transform domain. Second, all phase-only functions are modulated into an interim, which is encrypted into the ciphertext with stationary white noise distribution by using the fractional Fourier transform and chaotic diffusion. In the encryption process, three random phase functions are used as encryption keys to retrieve the phase-only functions of plain images. Simultaneously, three decryption keys are generated in the encryption process, which make the proposed encryption scheme has high security against various attacks, such as chosen plaintext attack. The peak signal-to-noise is used to evaluate the quality of the decrypted image, which shows that the encryption capacity of the proposed scheme is enhanced considerably. Numerical simulations demonstrate the validity and efficiency of the proposed method.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号