A Non-symmetric Digital Image Secure Communication Scheme Based on Generalized Chaos Synchronization System
|
|
- Amie Stone
- 5 years ago
- Views:
Transcription
1 Commun. Theor. Phys. (Beijing China) 44 (2005) pp c International Academic Publishers Vol. 44 No. 6 December A Non-symmetric Digital Image Secure Communication Scheme Based on Generalized Chaos Synchronization System ZHANG Xiao-Hong 12 and MIN Le-Quan 1 1 Applied Science School and Information Engineering School University of Science and Technology Beijing Beijing China 2 Information Engineering School Jiangxi University of Science and Technology Ganzhou China (Received April ) Abstract Based on a generalized chaos synchronization system and a discrete Sinai map a non-symmetric true color (RGB) digital image secure communication scheme is proposed. The scheme first changes an ordinary RGB digital image with 8 bits into unrecognizable disorder codes and then transforms the disorder codes into an RGB digital image with 16 bits for transmitting. A receiver uses a non-symmetric key to verify the authentication of the received data origin and decrypts the ciphertext. The scheme can encrypt and decrypt most formatted digital RGB images recognized by computers and recover the plaintext almost without any errors. The scheme is suitable to be applied in network image communications. The analysis of the key space sensitivity of key parameters and correlation of encrypted images imply that this scheme has sound security. PACS numbers: Sn Xt Vx Pq Key words: generalized chaos synchronization Sinai map image confusion non-symmetric key data origin authentication network communication 1 Introduction Chaos is one type of complex dynamic behaviors generated by determined nonlinear dynamic systems but is similar to statistic process. A chaos signal has the characteristics of aperiodicity continuous wide spectrum similarity to noise and so on. In the past decade the study of chaos-based secure communication systems has been fascinatingly developed. [1 19] Recently the Generalized Chaos Synchronization (GCS) approaches have also been gradually developed [ ] which may provided new tools for constructing secure communication systems. [ ] In recent papers [232526] several text secure communication schemes have been proposed via GCS systems. Network communication has become a main tool for information distributions. Digital image transformations have played more and more roles. In this paper a nonsymmetric GCS-based digital true color (RGB) image encryption scheme is proposed. The scheme uses the chaotic source signals generated by the responding system in a GCS system and a discrete Sinai map to encrypt RGB images. A receiver may use his non-symmetric keys for the authentication of received data origin without communication with the sender of the data origin. Theoretical analysis experimental simulation and statistical analysis show that this scheme is extreme sensitivity to keys and has a large key space sound security and university. Our researches imply that the digital image encryption scheme may be used in digital image network communications. 2 Digital Image Secure Communication Scheme 2.1 Some Basics Firstly let us remember the definition on GCS and a GCS theorem to be used for constructing chaotic source generators. Definition 1 be (Similar to Refs. [6] and [20]) Let systems Ẋ = F (X) (1) Ẏ = G(Y X m ) (2) X(t) = (x 1 (t) x 2 (t)... x n (t)) T R n Y R m (3) X m (t) = (x 1 (t) x 2 (t)... x m (t)) T m n (4) F (X) = (f 1 (X) f 2 (X)... f n (X)) T (5) G(Y X m ) = (g 1 (Y X m ) g 2 (Y X m )... g m (Y X m )) T. (6) System (1) is called the driving system and system (2) is said to be the responding system. The two systems The project supported by National Natural Science Foundation of China under Grant Nos and the Foundation for University Key Teachers and the Research Fund for the Doctoral Program of Higher Education under Grant No by the Ministry of Education of China Correspondence author lqmin@sohu.com
2 1116 ZHANG Xiao-Hong and MIN Le-Quan Vol. 44 are said to be in GCS with respect to a transformation H : R m R m if there exists an open subset B = B X B Y R n R m such that any trajectory (X(t) Y (t)) of systems (1) and (2) with initial conditions (X(0) Y (0)) B has the property: lim t + X m(t) H 1 (Y (t)) = 0. Theorem 1 [20] Let X X m Y F (X) and G(Y X) be defined by Eqs. (1) (6). Suppose that H : R m R m is a C 1 diffeomorphism and X m = V (Y ) is the inverse function of H. If systems (1) and (2) are in GCS via transformation Y = H(X m ) then the function G(Y X) in Eq. (2) takes the following form: G(Y X) = [ V (Y )] 1 [F m (X) q(x m Y )] (7) V 1 V 1 y 1 y 2 V 2 V 2 y V (Y ) = 1 y 2 V m V m y 1 y 2 and the function V 1 y m V 2 y m (8) V m y m F m (X) = (f 1 (X) f 2 (X)... f m (X)) T (9) q(x m Y ) = (q 1 (X m Y ) q 2 (X m Y )... q m (X m Y )) T guarantees that the zero solution of the error equation (10) ė = Ẋm V (Y )Ẏ = q(x m Y ) (10) is asymptotically stable. In subsection 2.2 we shall first construct a Lorenz GCS system by means of Theorem 1. A non-symmetric digital RGB image secure communication scheme will be presented in subsection 2.3 via the discrete Sinai map. 2.2 GCS System Let the driving system Ẋ = F (X) be the Lorenz system ẋ 1 = f 1 (X) = σ(x 1 x 2 ) ẋ 2 = f 2 (X) = γx 1 x 2 x 1 x 3 ẋ 3 = f 3 (X) = x 1 x 2 βx 3. (11) Now construct a diffeomorphism H : R 3 R 3 as follows: H(X) = (h 1 (X) h 2 (X) h 3 (X)) T = ( 4 e x 1/20 h(x) 3 ex2/15 h(x) 5 ) ex3/18 (12) h(x) h(x) = ( e x1/20 e x2/ e x2/15 e x3/ e x1/20 e x3/18 ). (13) Then V (Y ) = (V 1 (Y ) V 2 (Y ) V 3 (Y )) (14) V 1 (Y ) = 20[ln(15y 1 ) ln( )] (15) V 2 (Y ) = 15[ln(20y 2 ) ln( )] (16) V 3 (Y ) = 18[ln(12y 3 ) ln( )]. (17) It follows that a 11 a 12 a 13 V (Y ) = a 21 a 22 a 23 a 31 a 32 a 33 a 11 = 160y 2 y 3 y 1 ( ) 20(5y 1 + 8y 3 ) a 12 = 20(9y 1 + 8y 2 ) a 13 = 15(5y 2 + 9y 3 ) a 21 = a 22 = 135y 1 y 3 y 2 ( ) 15(9y 1 + 8y 2 ) a 23 = 18(5y 2 + 9y 3 ) a 31 = 18(5y 1 + 8y 3 ) a 32 = a 33 = 90y 1 y 2 y 3 ( ). Consequently b 11 b 12 b 13 [ V (Y )] 1 = b 21 b 22 b 23 b 31 b 32 b 33 b 11 = 2y 1 y 2 y 3 5( ) y 1 y 2 (5y 1 + 8y 3 ) b 12 = 15( ) y 1 y 3 (9y 1 + 8y 2 ) b 13 = 18( ) y 1 y 2 (5y 2 + 9y 3 ) b 21 = 20( ) b 22 = 3y 1 y 2 y 3 5( ) y 2 y 3 (9y 1 + 8y 2 ) b 23 = 18( )
3 No. 6 A Non-symmetric Digital Image Secure Communication Scheme Based on Generalized Chaos Synchronization System 1117 Let y 1 y 3 (5y 2 + 9y 3 ) b 31 = 20( ) y 2 y 3 (5y 1 + 8y 3 ) b 32 = 15( ) b 33 = 5y 1 y 2 y 3 18( ). q(x Y ) = (q 1 (X Y ) q 2 (X Y ) q 3 (X Y )) T = (V 1 (Y ) x 1 V 2 (Y ) x 2 V 3 (Y ) x 3 ) G(Y X) = [ V (Y )] 1 [F (X) q(x Y )]. Then from Theorem 1 we obtain the responding system Ẏ = G(Y X). (18) Select the initial states of the systems (11) and (18) as follows: and X(0) = (x 1 (0) x 2 (0) x 3 (0)) = ( ) (19) Y (0) = (y 1 (0) y 2 (0) y 3 (0)) = (h 1 (X(0)) h 2 (X(0)) h 3 (X(0))). (20) The trajectories of the GCS system are shown in Fig. 1. It can be seen that the state variables X and Y are in GCS with respect to the transformation V. Fig. 1 Chaotic trajectories of the state variables. (a) x 1 x 2 and x 3; (b) y 1 y 2 and y 3; (c) the decoded trajectory; (d) the variables are in chaotic GCS via a transformation V Sinai Map Discrete Sinai map is a 2-dimensional chaotic system. The representation of Sinai map has the form x n+1 = x n + y n + α cos(2πy n ) mod (1) y n+1 = x n + 2y n mod (1) (21) α [0 1]. From the Sinai EQ. it follows that 0 x n 1 0 y n 1. Let (x(0) y(0)) = (0 0). (22) Then figures 2(a) 2(c) show the positions of the points (x n y n ) of the first 1000 iterations of Sinai maps with pa-
4 1118 ZHANG Xiao-Hong and MIN Le-Quan Vol. 44 rameters α = and 0.99 respectively. It can be seen that the Sinai map with parameter α = 0.01 has an orbit with uniform density. Fig. 2 The orbits of Sinai maps for the first 1000 iterations. (a) α = 0.01 (b) α = 0.30 (c) α = Digital Image Secure Communication Scheme Popular digital images recognized by Matlab are classified into three kinds: (i) RGB images. An RGB image can be represented as an m n 3 data matrix m n stand for the rows and the columns of the pixels in the image and 3 represents 3 color planes red green and blue each plane with 256 levels of intensity denoted as (R G B). Such an image is called an RGB 24 bitmap. Since each color has an 8-bit binary system representation there are altogether 2 24 kinds of colors. (ii) Index images. An index image includes a data matrix X and a color map matrix P. P is an m 3 data matrix and 3 represents 3 color planes red green and blue with double accuracy in [0 1] of intensity. (iii) Intensity images. An intensity image is a gray scale image consisting of one gray scale intensity m n matrix. The gray scale intensity at each pixel (i j) is a double accuracy value in [0 1]. Now let us describe the image communication scheme for the case that the image to be sent is an RGB image. In the cases of other kind images the scheme is still effective after slightly amending. Assume that sender A has the systems (11) and (18) and receiver B holds the system (11) non-symmetric key K n = (V 1 V 2 ) defined by Eqs. (15) and (16). Both A and B have three Sinai maps (21) with system parameter α = and A and B share a symmetric keys K s = {k1 k 2 k 3 k 4 k 5 k 6 k 7 k 8 k 9 }. Here {k 1 k 2 k 3 } = {σ γ β} which are the parameters of the Lorenz equation; {k 4 k 5 k 6 } = {k x1(0) k x2(0) k x3(0)} which are real numbers to be used to encrypt the initial X(0) conditions of the Lorenz equation in our cryptographic algorithm; {k 7 k 8 k 9 } = {α x(0) y(0)} α x(0) and y(0) are the parameter and the initial condition of the Sinai map (21) respectively. The sender A and the receiver B hold a meeting before the remote transmission start and agree on iterate times 2N for the Lorenz equation and N for the Sinai map N = m n is the number of all the pixels of the image (m rows and n columns) received by B. Now sender A wants to transmit an RGB image M to receiver B. Denote the level of intensity of the 3 color planes as g(r) g(g) and g(b) respectively. The following procedure describes our secure communication scheme: (i) Sender A first uses the GCS systems (11) and (18) with initial conditions (19) and (20) to generate a chaotic trajectory (X(t) Y (t)) as shown in Fig. 1. Then the sender A uses the chaotic signal y 1 (t) to diffuse the intensity of the 3 color planes red green and blue by c 1 = g(r) + round(kkk 1 reshap(y 1 (m n + 1 : 2m n) m n)) + round(kk 1 reshap(ys 1 m n)) + round(200 reshap(x 1 (m n + 1 : 2m n) m n) reshap(xs 1 m n)) + round(400 reshap(y 1 (m n + 1 : 2m n) m n) reshap(ys 2 + xs 3 m n)) c 2 = g(g) + round(kkk 2 reshap(y 1 (m n + 1 : 2m n) m n))
5 No. 6 A Non-symmetric Digital Image Secure Communication Scheme Based on Generalized Chaos Synchronization System round(kk 2 reshap(ys 2 m n)) + round(150 reshap(x 2 (m n + 1 : 2m n) m n) reshap(xs 2 m n)) + round(300 reshap(y 1 (m n + 1 : 2m n) m n) reshap(ys 3 + xs 1 m n)) c 3 = g(b) + round(kkk 3 reshap(y 1 (m n + 1 : 2m n) m n)) + round(kk 3 reshap(ys 3 m n)) + round(250 reshap(x 3 (m n + 1 : 2m n) m n) reshap(xs 3 m n)) + round(500 reshap(y 1 (m n + 1 : 2m n) m n) reshap(ys 1 + xs 2 m n)) (x 1 x 2 x 3 ) are the trajectory of Eq. (11) y 1 is the component of the trajectory of Eq. (18) and (xs i ys i ) (i = 1 2 3) are the trajectories of the Sinai maps with parameters α = respectively. A B represents the cross product of two matrices A and B. kk 1 = 4.5e + 4 kkk 1 = 3e + 4 kk 2 = 4.8e + 4 kkk 2 = 2e + 4 kk 3 = 5e + 4 kkk 3 = 1.5e + 4. (23) Then sender A transforms these array data into a 16-bit RGB ciphertext image: (c 1 c 2 c 3 ) C = (g (R) g (G) g (B)). (ii) Sender A transmits the diffused initial condition X(0) + (k x1(0) k x2(0) k x3(0)) the ciphertext C and a tag σ = y 2 + C to receiver B. (iii) Receiver B uses the keys {k 4 k 5 k 6 } = {k x1(0) k x2(0) k x3(0)} to figure out the initial condition X(0) and then solves the system (11) and obtains the trajectory X. (iv) Receiver B uses the key K n and X to obtain y 1 y 2. (v) Receiver B calculates = σ y 2. If C then B stops decrypting otherwise goes to step (vi). (vi) Receiver B uses the inverse procedures of the steps 2 and 1 to decrypt the ciphertext and obtains the plaintext M. Remarks This scheme uses two chaotic systems to encrypt the plaintext. Therefore ciphertext has stronger ability against the attack than one chaos system based encryption scheme. Since the GCS system has been used the scheme has a data origin authentication function which is difficult to be realized in the chaos synchronization based scheme. Since a receiver only knows partially the diffeomorphism function V = (V 1 V 2 V 3 ) he cannot reconstruct the GCS responding system (18). Consequently as tools of encryption GCS systems have higher security than chaos synchronization systems. 3 Experiment Simulation Our scheme can be realized by using Matlab 6.1. We select a plain-image M: flowers.tif stored in \matlab6p1\ toolbox\images\imdemos. The picture M is a 8-bit RGB image. We use the scheme described in Sec Here N = m n = Our simulation results are shown in Fig. 3. It can be seen that the original image flowers.tif (Fig. 3(a)) has been successfully changed into un-recognizable disorder codes (Fig. 3(b)). The decrypted image is shown in Fig. 3(c) which is almost the same as the original image that is the maximum error and the mean error between the levels of intensity of the color planes {g(r) g(g) g(b)} of the original image Fig. 3(a) and the decrypted image (see Fig. 3(c)) are 1 and respectively. We have also used the scheme to encrypt and decrypt some other kinds of digital images which can be recognized by computer (For examples:.bmp.jpg.jpeg.tif.tag.gif.hdf.png.xwd.pcd.ico.cur). The similar results are
6 1120 ZHANG Xiao-Hong and MIN Le-Quan Vol. 44 obtained. This implies that our GCS-based encryption scheme has universality. Fig. 3 (a) Original image; (b) Encrypted image; (c) Decrypted image. 4 Security Analysis A good encryption scheme should resist all kinds of known attacks. In the following subsections key space analysis and statistical analysis are given. The results show that our scheme has satisfactory security. 4.1 Key Space and Sensitivity Analysis Key space The symmetric key used in the scheme is double precision numbers. We take that K s = {k 1 k 2 k 3 k 4 k 5 k 6 k 7 k 8 k 9 } to be decimals with 16 characters long. Consequently our symmetric key space size is > Additionally the space size of our non-symmetric key K n = (V 1 V 2 ) is uncountable. Therefore the key space of our scheme should be large enough for the requirements of secure communications. Key sensitivity test The key sensitivity test is proceeded as follows. (i) The image flowers.tif is encrypted by using the key K s as above. (ii) The key K s is slightly perturbed in nine fashions: K s ( i ) = K s + [ δ }{{} i ] (24) i i = δ i = (iii) Using the four of the nine perturbed keys encrypts the image flowers.tif respectively. (iv) Compare the five encrypted images each other. Table 1 lists the percentages of numbers of pixels with different RGB values in the images encrypted via two keys and the means of different RGB values in the images. (v) Compare the image flowers.tif with the decrypted flowers.tif image G ij which is encrypted by key K( i ) but decrypted via key K( j ). The comparison results are given in Table 2 in which the two values at position (K s ( i ) K s ( j )) stand for (a) The percentages of the numbers of the pixels with different RGB values in the flowers.tif and G ij ; (b) The mean of the different RGB values in the two images. Table 1 Comparisons between two images encrypted by keys K s( i) and K s( j). %/mean K s K s( 1 ) K s( 4 ) K s( 7 ) K s( 8 ) K s 0%/ %/ %/ %/ %/16003 K s( 1 ) 99.98%/2417 0%/ %/ %/ %/16219 K s( 4 ) 99.98%/ %/2407 0%/ %/ %/16219 K s( 7 ) 99.98%/ %/ %/ %/ %/15995 Table 2 Comparisons between flowers.tif and G ij. %/mean K s K s( 1 ) K s( 4 ) K s( 7 ) K s( 8 ) K s 0%/ %/ %/ %/ %/ K s( 1 ) 99.26%/ %/ %/ %/ %/ K s( 4 ) 99.15%/ %/ %/ %/ %/ K s( 7 ) 99.25%/ %/ %/ %/ %/ K s( 8 ) 99.25%/ %/ %/ %/ %/0
7 No. 6 A Non-symmetric Digital Image Secure Communication Scheme Based on Generalized Chaos Synchronization System Discussions (i) Table 1 shows that encrypted images are very sensitive to perturbations of the keys k1 k4 k7 k8. In fact our computer simulation shows that encrypted images are also very sensitive to perturbations of the other 5 keys. (ii) Table 2 shows that decrypted images are very sensitive to perturbations of keys k1 k4 k7 k8. Any attempt that wants to use sightly modified keys to decrypt the encrypted images completely fails. The similar results can also be obtained for the perturbations of other 5 keys. (iii) Figures 4(a) 4(c) are the images that are encrypted by the same key Ks but decrypted via keys 1121 Ks ( 1 ) Ks ( 4 ) Ks ( 7 ) Ks ( 8 ). Table 2 shows that in these images the colors of about 80 /00 pixels are recovered correctly only. Figure 4 illustrates graphically the recovered colors of 80 /00 pixels are useless for recognizing the original image flowers.tif. (iv) We have also found that almost the same results can be obtained if using lager modified keys (10 1 perturbation) decrypts the images encrypted by unmodified one. The results imply that an intruder cannot judge from his decrypted images which one of his two approximate keys is closer to the real key even though one key is different from the real key by 10 1 and another by only. Fig. 4 Images generated via different encrypting keys and decrypting keys. (a) K( 0 ) and K( 1 ); (b) K( 0 ) and K( 4 ); (c) K( 0 ) and K( 7 ); (d) K( 0 ) and K( 8 ). In summary the sensitivity of key for decrypted images makes intruders difficult to decrypt ciphertexts. The results imply that intruders may not recognize two encrypted images to be the same one if sender uses slightly different initial values (X(0) ). Consequently our scheme may have the task similar to one-time pad scheme. 4.2 Statistical Analysis First let us compare the histograms between the plain-image (original image) and the encrypted image. Select the original color image flowers.tif shown in Fig. 3(a). The histograms of the intensity level of its three color planes are shown in the first row in Fig. 5. The graphs given in the second row in Fig. 5 are the histograms of the intensity level
8 1122 ZHANG Xiao-Hong and MIN Le-Quan Vol. 44 of the encrypted image shown in Fig. 3(b). It can be seen that the histograms of the ciphered images are fairly uniform and are significantly different from those of the plain-image. Fig. 5 RGB histograms. The first line is the RGB histograms of the original images; The second line is the RGB histograms of the encrypted images by the key K s. Secondly similar to the study given in Ref. [16] we discuss the correlations of two adjacent pixels in the original image flowers.tif and encrypted images. To test the correlation between two vertically adjacent pixels in a ciphered image the following procedure is carried out. First select all pairs of two adjacent pixels from the image flowers.tif. Then calculate the correlation coefficient of each pair by using the following formulas (25) (32). Our statistical analysis implies that the encryption algorithm posed here has superior confusion and diffusion properties which can strongly resist statistical attacks. Let P be an image with dimension m n the image grayscales of the color planes (red green and blue) at the position (i j) are denoted by x 1 ij x 2 ij x 3 ij respectively. The corresponding gray matrices are written as g x (R) g x (G) g x (B). Denote y 1 ij (= x 1 ij+1 ) y 2 ij (= x 2 ij+1 ) y 3 ij (= x 3 ij+1 ) as the gray-scales of the three color planes of the pixel which are on the right side of the pixel at the position (i j). Denote E(X k ) = E(Y k ) = D(X k ) = 1 m (n 1) 1 m (n 1) 1 m (n 1) m n 1 x k ij (25) i=1 j=1 m n 1 y k ij (26) i=1 j=1 m n 1 (x k ij E(X k )) 2 (27) i=1 j=1
9 No. 6 A Non-symmetric Digital Image Secure Communication Scheme Based on Generalized Chaos Synchronization System 1123 D(Y k ) = cov(x k Y k ) = 1 m (n 1) m n 1 (y k ij E(Y k )) 2 (28) i=1 j=1 1 m (n 1) m n 1 (x k ij E(X k )) i=1 j=1 (y k ij E(Y k )) k = (29) Then the correlation coefficients of the gray matrices g x (R) g x (G) g x (B) can be defined respectively by r R = cov(x 1 Y 1 ) D(X1 )) D(Y 1 ) (30) r G = r B = cov(x 2 Y 2 ) D(X2 )) D(Y 2 ) (31) cov(x 3 Y 3 ) D(X3 )) D(Y 3 ). (32) Figure 6 shows the correlation distribution of two vertically adjacent pixels in the image flowers.tif and that in the cipherimage for three color planes. The correlation coefficients are and respectively which are remarkably different from each other. Fig. 6 Correlations of two vertically adjacent pixels in the original images (a) (b) (c) and in the encrypted images (d) (e) and (f). 5 Concluding Remarks GCS system provides a new tool for secure communication. Based on a recent GCS theorem 1 [20] and the well-known Lorenz equation this paper constructs a GCS system. Combing the GCS system and the Sinai map a non-symmetric digital image encryption scheme is proposed. The scheme has a data origin authentication function and large key space. The sensitivity of the keys and the uniformity of the histograms of encrypted images imply that the new secure communication scheme is a promising candidates for images transmission. This scheme may be suitable for network image encryption.
10 1124 ZHANG Xiao-Hong and MIN Le-Quan Vol. 44 Acknowledgments The authors would like to express sincere gratitude to Prof. Guan-Rong Chen at the City University in Hong Kong for providing them references on chaos-based secure communications. References [1] L.M. Pecora and T.L. Carroll Phys. Rev. Lett. 64 (1990) 821. [2] L.J. Kocarev K.S. Halle K. Eckert L.O. Chua and U. Parliz Int. J. Bifurcation Chaos 2 (1992) 709. [3] U. Parliz L.O. Chua L.J. Kocarev K.S. Halle and A. Shang Int. J. Bifurcation Chaos 2 (1992) 973. [4] L.M. Cuomo and A.V. Oppenheim Phys. Rev. Lett. 71 (1993) 65. [5] C.W. Wu and L.O. Chua Int. J. Bifurcation and Chaos 3 (1993) [6] L. Kocarev and U. Parlitz Phys. Rev. Lett. 74 (1995) [7] L. Kocarev and U. Parlitz Phys. Rev. Lett. 76 (1996) [8] U. Feldmann M. Halser and W. Schwarz Int. J. Circuit Theory Appl. 24 (1996) 551. [9] T. Yang and L.O. Chua Int. J. Bifurcation Chaos 6 (1996) [10] T. Yang and L.O. Chua Int. J. Bifurcation Chaos 7 (1997) 645. [11] K. Murali and M. Lakshmanan Phys. Lett. A 241 (1998) 302. [12] J. Kawata Y. Nishio H. Dedieu and A. Ushida IEICE Trans. Fund. E 82-A (1999) [13] L. Kocarev IEEE Circuits and Syst. I: Fundam. Theory Appl. 48 (2001) [14] T.L. Carroll Phys. Rev. E 67 (2003) [15] F.C.M. Lau and C.K. Tse Chaos-Based Digital Communication Systems Springer (2003). [16] G. Chen Y. Mao and C.K. Chui Chaos Solitons and Fractals 21 (2004) 749. [17] W. Ye Q. Dai S. Wang et al. Phys. Lett. A 330 (2004) 75. [18] D. Zhao G. Chen and W. Liu Chaos Solitons and Fractals 22 (2004) 47. [19] T. Yang and L.O. Chua Int. J. Bifurcation Chaos 6 (1996) 215. [20] X. Zhang and L. Min J. Univ. of Sci. and Tech. Beijing 7 (2000) 224. [21] R. John and D. Gregory Chaos Solitons and Fractals 12 (2001) 145. [22] J. Lu and Y. Xi Chaos Solitons and Fractals 17 (2003) 825. [23] X. Zhang L. Zhang and L. Min Chin. Phys. Lett. 20 (2003) 211. [24] L. Min X. Zhang and M. Yang J. Beijing Univ. of Sci. and Tech. 10 (2003) 75. [25] L. Min G. Chen X. Zhang et al. Commun. Theor. Phys. (Beijing China) 41 (2004) 632. [26] J. Xu L. Min and G. Chen Chin. Phys. Lett. 21 (2004) 1445.
New communication schemes based on adaptive synchronization
CHAOS 17, 0114 2007 New communication schemes based on adaptive synchronization Wenwu Yu a Department of Mathematics, Southeast University, Nanjing 210096, China, Department of Electrical Engineering,
More informationStudy on Proportional Synchronization of Hyperchaotic Circuit System
Commun. Theor. Phys. (Beijing, China) 43 (25) pp. 671 676 c International Academic Publishers Vol. 43, No. 4, April 15, 25 Study on Proportional Synchronization of Hyperchaotic Circuit System JIANG De-Ping,
More informationTime-delay feedback control in a delayed dynamical chaos system and its applications
Time-delay feedback control in a delayed dynamical chaos system and its applications Ye Zhi-Yong( ), Yang Guang( ), and Deng Cun-Bing( ) School of Mathematics and Physics, Chongqing University of Technology,
More informationBidirectional Partial Generalized Synchronization in Chaotic and Hyperchaotic Systems via a New Scheme
Commun. Theor. Phys. (Beijing, China) 45 (2006) pp. 1049 1056 c International Academic Publishers Vol. 45, No. 6, June 15, 2006 Bidirectional Partial Generalized Synchronization in Chaotic and Hyperchaotic
More informationFunction Projective Synchronization of Discrete-Time Chaotic and Hyperchaotic Systems Using Backstepping Method
Commun. Theor. Phys. (Beijing, China) 50 (2008) pp. 111 116 c Chinese Physical Society Vol. 50, No. 1, July 15, 2008 Function Projective Synchronization of Discrete-Time Chaotic and Hyperchaotic Systems
More informationSynchronizing Chaotic Systems Based on Tridiagonal Structure
Proceedings of the 7th World Congress The International Federation of Automatic Control Seoul, Korea, July 6-, 008 Synchronizing Chaotic Systems Based on Tridiagonal Structure Bin Liu, Min Jiang Zengke
More informationarxiv: v1 [cs.cr] 18 Jul 2009
Breaking a Chaotic Cryptographic Scheme Based on Composition Maps Chengqing Li 1, David Arroyo 2, and Kwok-Tung Lo 1 1 Department of Electronic and Information Engineering, The Hong Kong Polytechnic University,
More informationSecure Communication Using H Chaotic Synchronization and International Data Encryption Algorithm
Secure Communication Using H Chaotic Synchronization and International Data Encryption Algorithm Gwo-Ruey Yu Department of Electrical Engineering I-Shou University aohsiung County 840, Taiwan gwoyu@isu.edu.tw
More informationADAPTIVE CHAOS SYNCHRONIZATION OF UNCERTAIN HYPERCHAOTIC LORENZ AND HYPERCHAOTIC LÜ SYSTEMS
ADAPTIVE CHAOS SYNCHRONIZATION OF UNCERTAIN HYPERCHAOTIC LORENZ AND HYPERCHAOTIC LÜ SYSTEMS Sundarapandian Vaidyanathan 1 1 Research and Development Centre, Vel Tech Dr. RR & Dr. SR Technical University
More informationLorenz System Parameter Determination and Application to Break the Security of Two-channel Chaotic Cryptosystems
1 Lorenz System Parameter Determination and Application to Break the Security of Two-channel Chaotic Cryptosystems A. B. Orue, G. Alvarez, M. Romera, G. Pastor, F. Montoya and Shujun Li arxiv:nlin/669v
More informationADAPTIVE SYNCHRONIZATION FOR RÖSSLER AND CHUA S CIRCUIT SYSTEMS
Letters International Journal of Bifurcation and Chaos, Vol. 12, No. 7 (2002) 1579 1597 c World Scientific Publishing Company ADAPTIVE SYNCHRONIZATION FOR RÖSSLER AND CHUA S CIRCUIT SYSTEMS A. S. HEGAZI,H.N.AGIZA
More informationFunction Projective Synchronization of Fractional-Order Hyperchaotic System Based on Open-Plus-Closed-Looping
Commun. Theor. Phys. 55 (2011) 617 621 Vol. 55, No. 4, April 15, 2011 Function Projective Synchronization of Fractional-Order Hyperchaotic System Based on Open-Plus-Closed-Looping WANG Xing-Yuan ( ), LIU
More informationCryptanalysis of a computer cryptography scheme based on a filter bank
NOTICE: This is the author s version of a work that was accepted by Chaos, Solitons & Fractals in August 2007. Changes resulting from the publishing process, such as peer review, editing, corrections,
More informationBreaking an encryption scheme based on chaotic Baker map
Breaking an encryption scheme based on chaotic Baker map Gonzalo Alvarez a, and Shujun Li b a Instituto de Física Aplicada, Consejo Superior de Investigaciones Científicas, Serrano 144 28006 Madrid, Spain
More informationGeneralized-Type Synchronization of Hyperchaotic Oscillators Using a Vector Signal
Commun. Theor. Phys. (Beijing, China) 44 (25) pp. 72 78 c International Acaemic Publishers Vol. 44, No. 1, July 15, 25 Generalize-Type Synchronization of Hyperchaotic Oscillators Using a Vector Signal
More informationK. Pyragas* Semiconductor Physics Institute, LT-2600 Vilnius, Lithuania Received 19 March 1998
PHYSICAL REVIEW E VOLUME 58, NUMBER 3 SEPTEMBER 998 Synchronization of coupled time-delay systems: Analytical estimations K. Pyragas* Semiconductor Physics Institute, LT-26 Vilnius, Lithuania Received
More informationHYBRID CHAOS SYNCHRONIZATION OF HYPERCHAOTIC LIU AND HYPERCHAOTIC CHEN SYSTEMS BY ACTIVE NONLINEAR CONTROL
HYBRID CHAOS SYNCHRONIZATION OF HYPERCHAOTIC LIU AND HYPERCHAOTIC CHEN SYSTEMS BY ACTIVE NONLINEAR CONTROL Sundarapandian Vaidyanathan 1 1 Research and Development Centre, Vel Tech Dr. RR & Dr. SR Technical
More information698 Zou Yan-Li et al Vol. 14 and L 2, respectively, V 0 is the forward voltage drop across the diode, and H(u) is the Heaviside function 8 < 0 u < 0;
Vol 14 No 4, April 2005 cfl 2005 Chin. Phys. Soc. 1009-1963/2005/14(04)/0697-06 Chinese Physics and IOP Publishing Ltd Chaotic coupling synchronization of hyperchaotic oscillators * Zou Yan-Li( ΠΛ) a)y,
More informationA Chaotic Encryption System Using PCA Neural Networks
A Chaotic Encryption System Using PCA Neural Networks Xiao Fei, Guisong Liu, Bochuan Zheng Computational Intelligence Laboratory, School of Computer Science and Engineering, University of Electronic Science
More informationAdaptive feedback synchronization of a unified chaotic system
Physics Letters A 39 (4) 37 333 www.elsevier.com/locate/pla Adaptive feedback synchronization of a unified chaotic system Junan Lu a, Xiaoqun Wu a, Xiuping Han a, Jinhu Lü b, a School of Mathematics and
More informationMulti-Map Orbit Hopping Chaotic Stream Cipher
Multi-Map Orbit Hopping Chaotic Stream Cipher Xiaowen Zhang 1, Li Shu 2, Ke Tang 1 Abstract In this paper we propose a multi-map orbit hopping chaotic stream cipher that utilizes the idea of spread spectrum
More informationExperimental Realization of Binary Signals Transmission Based on Synchronized Lorenz circuits
Experimental Realization of Binary Signals Transmission Based on Synchronized Lorenz circuits Cornelio PosadasCastillo. Faculty of Engineering Mechanic and Electrical (F.I.M.E.), Nuevo León Autonomous
More informationSynchronization and control in small networks of chaotic electronic circuits
Synchronization and control in small networks of chaotic electronic circuits A. Iglesias Dept. of Applied Mathematics and Computational Sciences, Universi~ of Cantabria, Spain Abstract In this paper, a
More informationAn efficient parallel pseudorandom bit generator based on an asymmetric coupled chaotic map lattice
PRAMANA c Indian Academy of Sciences Vol. 85, No. 4 journal of October 215 physics pp. 617 627 An efficient parallel pseudorandom bit generator based on an asymmetric coupled chaotic map lattice RENFU
More informationAnti-synchronization of a new hyperchaotic system via small-gain theorem
Anti-synchronization of a new hyperchaotic system via small-gain theorem Xiao Jian( ) College of Mathematics and Statistics, Chongqing University, Chongqing 400044, China (Received 8 February 2010; revised
More informationGLOBAL CHAOS SYNCHRONIZATION OF UNCERTAIN SPROTT J AND K SYSTEMS BY ADAPTIVE CONTROL
GLOBAL CHAOS SYNCHRONIZATION OF UNCERTAIN SPROTT J AND K SYSTEMS BY ADAPTIVE CONTROL Sundarapandian Vaidyanathan 1 1 Research and Development Centre, Vel Tech Dr. RR & Dr. SR Technical University Avadi,
More informationA Novel Image Encryption Scheme Using the Composite Discrete Chaotic System
entropy Article A Novel Image Encryption Scheme Using the Composite Discrete Chaotic System Hegui Zhu 1, *, Xiangde Zhang 1, Hai Yu 2, Cheng Zhao 3 and Zhiliang Zhu 2 1 College of Sciences, Northeastern
More informationA Hybrid Method with Lorenz attractor based Cryptography and LSB Steganography
International Journal of Current Engineering and Technology E-ISSN 2277 4106, P-ISSN 2347 5161 2015INPRESSCO, All Rights Reserved Available at http://inpressco.com/category/ijcet Research Article A Hybrid
More informationarxiv: v1 [cs.cr] 5 Dec 2007
Cryptanalysis of an image encryption scheme based on the Hill cipher Chengqing Li a,, Dan Zhang b, and Guanrong Chen a arxiv:07120693v1 [cscr] 5 Dec 2007 a Department of Electronic Engineering, City University
More informationAverage Range and Network Synchronizability
Commun. Theor. Phys. (Beijing, China) 53 (2010) pp. 115 120 c Chinese Physical Society and IOP Publishing Ltd Vol. 53, No. 1, January 15, 2010 Average Range and Network Synchronizability LIU Chao ( ),
More informationGeneralized projective synchronization of a class of chaotic (hyperchaotic) systems with uncertain parameters
Vol 16 No 5, May 2007 c 2007 Chin. Phys. Soc. 1009-1963/2007/16(05)/1246-06 Chinese Physics and IOP Publishing Ltd Generalized projective synchronization of a class of chaotic (hyperchaotic) systems with
More informationAnti-synchronization Between Coupled Networks with Two Active Forms
Commun. Theor. Phys. 55 (211) 835 84 Vol. 55, No. 5, May 15, 211 Anti-synchronization Between Coupled Networks with Two Active Forms WU Yong-Qing ( ï), 1 SUN Wei-Gang (êå ), 2, and LI Shan-Shan (Ó ) 3
More informationImpulsive Stabilization for Control and Synchronization of Chaotic Systems: Theory and Application to Secure Communication
976 IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS I: FUNDAMENTAL THEORY AND APPLICATIONS, VOL. 44, NO. 10, OCTOBER 1997 Impulsive Stabilization for Control and Synchronization of Chaotic Systems: Theory and
More informationImpulsive synchronization of chaotic systems
CHAOS 15, 023104 2005 Impulsive synchronization of chaotic systems Chuandong Li a and Xiaofeng Liao College of Computer Science and Engineering, Chongqing University, 400030 China Xingyou Zhang College
More informationarxiv: v2 [cs.cr] 6 Aug 2017
Cryptanalyzing an Image Scrambling Encryption Algorithm of Pixel Bits Chengqing Li a,, Dongdong Lin a, Jinhu Lü b a Hunan Province Cooperative Innovation Center for Wind Power Equipment and Energy Conversion,
More informationProjective synchronization of a complex network with different fractional order chaos nodes
Projective synchronization of a complex network with different fractional order chaos nodes Wang Ming-Jun( ) a)b), Wang Xing-Yuan( ) a), and Niu Yu-Jun( ) a) a) School of Electronic and Information Engineering,
More informationComplete Synchronization, Anti-synchronization and Hybrid Synchronization Between Two Different 4D Nonlinear Dynamical Systems
Mathematics Letters 2016; 2(5): 36-41 http://www.sciencepublishinggroup.com/j/ml doi: 10.11648/j.ml.20160205.12 Complete Synchronization, Anti-synchronization and Hybrid Synchronization Between Two Different
More informationObservers based synchronization and input recovery for a class of nonlinear chaotic models.
Observers based synchronization and input recovery for a class of nonlinear chaotic models. Estelle Cherrier,, Mohamed Boutayeb, and José Ragot CRAN UMR CNRS 739 INPL 2 Avenue de la Forêt de Haye F-54516
More informationImage encryption based on the tracking control Hindmarsh-Rose system via Genesio-Tesi system
ISSN 1746-7659, England, UK Journal of Information and Computing Science Vol. 1, No., 017, pp.13-19 Image encryption based on the tracking control Hindmarsh-Rose system via Genesio-Tesi system Keming Tang
More informationChaos synchronization of nonlinear Bloch equations
Chaos, Solitons and Fractal7 (26) 357 361 www.elsevier.com/locate/chaos Chaos synchronization of nonlinear Bloch equations Ju H. Park * Robust Control and Nonlinear Dynamics Laboratory, Department of Electrical
More informationHyperchaos and hyperchaos control of the sinusoidally forced simplified Lorenz system
Nonlinear Dyn (2012) 69:1383 1391 DOI 10.1007/s11071-012-0354-x ORIGINAL PAPER Hyperchaos and hyperchaos control of the sinusoidally forced simplified Lorenz system Keihui Sun Xuan Liu Congxu Zhu J.C.
More informationSynchronization between different motifs
Synchronization between different motifs Li Ying( ) a) and Liu Zeng-Rong( ) b) a) College of Information Technology, Shanghai Ocean University, Shanghai 201306, China b) Institute of Systems Biology, Shanghai
More informationChaos Synchronization of Nonlinear Bloch Equations Based on Input-to-State Stable Control
Commun. Theor. Phys. (Beijing, China) 53 (2010) pp. 308 312 c Chinese Physical Society and IOP Publishing Ltd Vol. 53, No. 2, February 15, 2010 Chaos Synchronization of Nonlinear Bloch Equations Based
More informationGlobal Chaos Synchronization of Hyperchaotic Lorenz and Hyperchaotic Chen Systems by Adaptive Control
Global Chaos Synchronization of Hyperchaotic Lorenz and Hyperchaotic Chen Systems by Adaptive Control Dr. V. Sundarapandian Professor, Research and Development Centre Vel Tech Dr. RR & Dr. SR Technical
More informationBackstepping synchronization of uncertain chaotic systems by a single driving variable
Vol 17 No 2, February 2008 c 2008 Chin. Phys. Soc. 1674-1056/2008/17(02)/0498-05 Chinese Physics B and IOP Publishing Ltd Backstepping synchronization of uncertain chaotic systems by a single driving variable
More informationCRYPTANALYSIS OF FRIDRICH S CHAOTIC IMAGE ENCRYPTION
International Journal of Bifurcation and Chaos, Vol. 20, No. 5 (2010) 1405 1413 c World Scientific Publishing Company DOI: 10.1142/S0218127410026563 CRYPTANALYSIS OF FRIDRICH S CHAOTIC IMAGE ENCRYPTION
More informationChaos and Cryptography
Chaos and Cryptography Vishaal Kapoor December 4, 2003 In his paper on chaos and cryptography, Baptista says It is possible to encrypt a message (a text composed by some alphabet) using the ergodic property
More informationComputers and Mathematics with Applications. Adaptive anti-synchronization of chaotic systems with fully unknown parameters
Computers and Mathematics with Applications 59 (21) 3234 3244 Contents lists available at ScienceDirect Computers and Mathematics with Applications journal homepage: www.elsevier.com/locate/camwa Adaptive
More informationOne-way Hash Function Based on Neural Network
One-way Hash Function Based on Neural Network Shiguo Lian, Jinsheng Sun, Zhiquan Wang Department of Automation, Nanjing University of Science & echnology, Nanjing, 294, China, sg_lian@63.com Abstract A
More informationAn Image Encryption Scheme Based on Hyperchaotic Rabinovich and Exponential Chaos Maps
Entropy 2015, 17, 181-196; doi:10.3390/e17010181 Article OPEN ACCESS entropy ISSN 1099-4300 www.mdpi.com/journal/entropy An Image Encryption Scheme Based on Hyperchaotic Rabinovich and Exponential Chaos
More informationADAPTIVE CONTROLLER DESIGN FOR THE ANTI-SYNCHRONIZATION OF HYPERCHAOTIC YANG AND HYPERCHAOTIC PANG SYSTEMS
ADAPTIVE CONTROLLER DESIGN FOR THE ANTI-SYNCHRONIZATION OF HYPERCHAOTIC YANG AND HYPERCHAOTIC PANG SYSTEMS Sundarapandian Vaidyanathan 1 1 Research and Development Centre, Vel Tech Dr. RR & Dr. SR Technical
More informationSYNCHRONIZATION CRITERION OF CHAOTIC PERMANENT MAGNET SYNCHRONOUS MOTOR VIA OUTPUT FEEDBACK AND ITS SIMULATION
SYNCHRONIZAION CRIERION OF CHAOIC PERMANEN MAGNE SYNCHRONOUS MOOR VIA OUPU FEEDBACK AND IS SIMULAION KALIN SU *, CHUNLAI LI College of Physics and Electronics, Hunan Institute of Science and echnology,
More informationCryptanalysis of a Multistage Encryption System
Cryptanalysis of a Multistage Encryption System Chengqing Li, Xinxiao Li, Shujun Li and Guanrong Chen Department of Mathematics, Zhejiang University, Hangzhou, Zhejiang 310027, China Software Engineering
More informationControlling a Novel Chaotic Attractor using Linear Feedback
ISSN 746-7659, England, UK Journal of Information and Computing Science Vol 5, No,, pp 7-4 Controlling a Novel Chaotic Attractor using Linear Feedback Lin Pan,, Daoyun Xu 3, and Wuneng Zhou College of
More informationTHE ACTIVE CONTROLLER DESIGN FOR ACHIEVING GENERALIZED PROJECTIVE SYNCHRONIZATION OF HYPERCHAOTIC LÜ AND HYPERCHAOTIC CAI SYSTEMS
THE ACTIVE CONTROLLER DESIGN FOR ACHIEVING GENERALIZED PROJECTIVE SYNCHRONIZATION OF HYPERCHAOTIC LÜ AND HYPERCHAOTIC CAI SYSTEMS Sarasu Pakiriswamy 1 and Sundarapandian Vaidyanathan 1 1 Department of
More informationThe Method of Obtaining Best Unary Polynomial for the Chaotic Sequence of Image Encryption
Journal of Information Hiding and Multimedia Signal Processing c 2017 ISSN 2073-4212 Ubiquitous International Volume 8, Number 5, September 2017 The Method of Obtaining Best Unary Polynomial for the Chaotic
More informationGLOBAL CHAOS SYNCHRONIZATION OF UNCERTAIN LORENZ-STENFLO AND QI 4-D CHAOTIC SYSTEMS BY ADAPTIVE CONTROL
GLOBAL CHAOS SYNCHRONIZATION OF UNCERTAIN LORENZ-STENFLO AND QI 4-D CHAOTIC SYSTEMS BY ADAPTIVE CONTROL Sundarapandian Vaidyanathan 1 1 Research and Development Centre, Vel Tech Dr. RR & Dr. SR Technical
More informationChaos suppression of uncertain gyros in a given finite time
Chin. Phys. B Vol. 1, No. 11 1 1155 Chaos suppression of uncertain gyros in a given finite time Mohammad Pourmahmood Aghababa a and Hasan Pourmahmood Aghababa bc a Electrical Engineering Department, Urmia
More informationGLOBAL CHAOS SYNCHRONIZATION OF HYPERCHAOTIC QI AND HYPERCHAOTIC JHA SYSTEMS BY ACTIVE NONLINEAR CONTROL
GLOBAL CHAOS SYNCHRONIZATION OF HYPERCHAOTIC QI AND HYPERCHAOTIC JHA SYSTEMS BY ACTIVE NONLINEAR CONTROL Sundarapandian Vaidyanathan 1 1 Research and Development Centre, Vel Tech Dr. RR & Dr. SR Technical
More informationarxiv:cs/ v1 [cs.cr] 2 Feb 2004
Problems of Baptista s chaotic cryptosystems and countermeasures for enhancement of their overall performances arxiv:cs/0402004v1 [cs.cr] 2 Feb 2004 Shujun Li, Guanrong Chen Department of Electronic Engineering,
More informationSpread-spectrum communication using binary spatiotemporal chaotic codes
Physics Letters A 334 (2005) 30 36 www.elsevier.com/locate/pla Spread-spectrum communication using binary spatiotemporal chaotic codes Xingang Wang a,,mengzhan a, Xiaofeng Gong a, Choy Heng Lai b, Ying-Cheng
More informationOn the security of a chaotic encryption scheme: problems with computerized chaos in finite computing precision
On the security of a chaotic encryption scheme: problems with computerized chaos in finite computing precision Shujun Li a,, Xuanqin Mou a, Yuanlong Cai a, Zhen Ji b and Jihong Zhang b a School of Electronics
More informationA new parameter determination method for some double-scroll chaotic systems and its applications to chaotic cryptanalysis
NOTICE: This is the author s version of a work that was published by Communications in Nonlinear Science and Numerical Simulations, vol. 15, no. 11, pp. 3471-3483, 21, DOI: 1.116/j.cnsns.29.12.17. Changes
More informationA Novel Hyperchaotic System and Its Control
1371371371371378 Journal of Uncertain Systems Vol.3, No., pp.137-144, 009 Online at: www.jus.org.uk A Novel Hyperchaotic System and Its Control Jiang Xu, Gouliang Cai, Song Zheng School of Mathematics
More informationarxiv: v2 [cs.cr] 13 Oct 2016
Nonlinear Dynamics manuscript No. (will be inserted by the editor) Cryptanalyzing image encryption scheme using chaotic logistic map Chengqing Li Tao Xie Qi Liu Ge Cheng arxiv:3.489v2 [cs.cr] 3 Oct 26
More informationConstruction of a New Fractional Chaotic System and Generalized Synchronization
Commun. Theor. Phys. (Beijing, China) 5 (2010) pp. 1105 1110 c Chinese Physical Society and IOP Publishing Ltd Vol. 5, No. 6, June 15, 2010 Construction of a New Fractional Chaotic System and Generalized
More informationSynchronization of an uncertain unified chaotic system via adaptive control
Chaos, Solitons and Fractals 14 (22) 643 647 www.elsevier.com/locate/chaos Synchronization of an uncertain unified chaotic system via adaptive control Shihua Chen a, Jinhu L u b, * a School of Mathematical
More informationA Novel Image Encryption Algorithm Based on DNA Encoding and Spatiotemporal Chaos
Entropy 2015, 17, 6954-6968; doi:10.3390/e17106954 Article OPEN ACCESS entropy ISSN 1099-4300 www.mdpi.com/journal/entropy A Novel Image Encryption Algorithm Based on DNA Encoding and Spatiotemporal Chaos
More informationGeneralized projective synchronization between two chaotic gyros with nonlinear damping
Generalized projective synchronization between two chaotic gyros with nonlinear damping Min Fu-Hong( ) Department of Electrical and Automation Engineering, Nanjing Normal University, Nanjing 210042, China
More informationRobust Gain Scheduling Synchronization Method for Quadratic Chaotic Systems With Channel Time Delay Yu Liang and Horacio J.
604 IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS I: REGULAR PAPERS, VOL. 56, NO. 3, MARCH 2009 Robust Gain Scheduling Synchronization Method for Quadratic Chaotic Systems With Channel Time Delay Yu Liang
More informationSYNCHRONIZATION IN SMALL-WORLD DYNAMICAL NETWORKS
International Journal of Bifurcation and Chaos, Vol. 12, No. 1 (2002) 187 192 c World Scientific Publishing Company SYNCHRONIZATION IN SMALL-WORLD DYNAMICAL NETWORKS XIAO FAN WANG Department of Automation,
More informationDynamical analysis and circuit simulation of a new three-dimensional chaotic system
Dynamical analysis and circuit simulation of a new three-dimensional chaotic system Wang Ai-Yuan( 王爱元 ) a)b) and Ling Zhi-Hao( 凌志浩 ) a) a) Department of Automation, East China University of Science and
More information5618 IEEE TRANSACTIONS ON IMAGE PROCESSING, VOL. 26, NO. 12, DECEMBER 2017
5618 IEEE TRANSACTIONS ON IMAGE PROCESSING, VOL. 26, NO. 12, DECEMBER 2017 Combination of Sharing Matrix and Image Encryption for Lossless (k, n)-secret Image Sharing Long Bao, Student Member, IEEE, Shuang
More informationADAPTIVE CONTROL AND SYNCHRONIZATION OF HYPERCHAOTIC NEWTON-LEIPNIK SYSTEM
ADAPTIVE CONTROL AND SYNCHRONIZATION OF HYPERCHAOTIC NEWTON-LEIPNIK SYSTEM Sundarapandian Vaidyanathan 1 1 Research and Development Centre, Vel Tech Dr. RR & Dr. SR Technical University Avadi, Chennai-600
More informationSynchronization of Two Chaotic Duffing type Electrical Oscillators
Proceedings of the 0th WSEAS International Conference on CIRCUITS, Vouliagmeni, Athens, Greece, July 0-, 006 (pp79-84) Synchronization of Two Chaotic Duffing type Electrical Oscillators Ch. K. VOLOS, I.
More informationBifurcation control and chaos in a linear impulsive system
Vol 8 No 2, December 2009 c 2009 Chin. Phys. Soc. 674-056/2009/82)/5235-07 Chinese Physics B and IOP Publishing Ltd Bifurcation control and chaos in a linear impulsive system Jiang Gui-Rong 蒋贵荣 ) a)b),
More informationImage encryption based on a delayed fractional-order chaotic logistic system
Chin. Phys. B Vol. 21 No. 5 (212) 556 Image encryption based on a delayed fractional-order chaotic logistic system Wang Zhen( 王震 ) a) Huang Xia( 黄霞 ) b) Li Ning( 李宁 ) a) and Song Xiao-Na( 宋晓娜 ) c) a) College
More informationA novel pseudo-random number generator based on discrete chaotic iterations
A novel pseudo-random number generator based on discrete chaotic iterations Qianxue Wang, Christophe Guyeux and Jacques M. Bahi University of Franche-Comte Computer Science Laboratory LIFC, Belfort, France
More informationGeneralized Function Projective Lag Synchronization in Fractional-Order Chaotic Systems
Generalized Function Projective Lag Synchronization in Fractional-Order Chaotic Systems Yancheng Ma Guoan Wu and Lan Jiang denotes fractional order of drive system Abstract In this paper a new synchronization
More informationarxiv:quant-ph/ v2 2 Jan 2007
Revisiting controlled quantum secure direct communication using a non-symmetric quantum channel with quantum superdense coding arxiv:quant-ph/06106v Jan 007 Jun Liu 1, Yan Xia and Zhan-jun Zhang 1,, 1
More informationSYNCHRONIZATION OF HYPERCHAOTIC CIRCUITS VIA CONTINUOUS FEEDBACK CONTROL WITH APPLICATION TO SECURE COMMUNICATIONS
International Journal of Bifurcation and Chaos, Vol. 8, No. 10 (1998) 2031 2040 c World Scientific Publishing Company SYNCHRONIZATION OF HYPERCHAOTIC CIRCUITS VIA CONTINUOUS FEEDBACK CONTROL WITH APPLICATION
More informationLinear matrix inequality approach for synchronization control of fuzzy cellular neural networks with mixed time delays
Chin. Phys. B Vol. 21, No. 4 (212 4842 Linear matrix inequality approach for synchronization control of fuzzy cellular neural networks with mixed time delays P. Balasubramaniam a, M. Kalpana a, and R.
More informationGLOBAL CHAOS SYNCHRONIZATION OF PAN AND LÜ CHAOTIC SYSTEMS VIA ADAPTIVE CONTROL
GLOBAL CHAOS SYNCHRONIZATION OF PAN AND LÜ CHAOTIC SYSTEMS VIA ADAPTIVE CONTROL Sundarapandian Vaidyanathan 1 and Karthikeyan Rajagopal 2 1 Research and Development Centre, Vel Tech Dr. RR & Dr. SR Technical
More informationA new pseudorandom number generator based on complex number chaotic equation
A new pseudorandom number generator based on complex number chaotic equation Liu Yang( 刘杨 ) and Tong Xiao-Jun( 佟晓筠 ) School of Computer Science and Technology, Harbin Institute of Technology, Weihai 264209,
More information-Cryptosystem: A Chaos Based Public Key Cryptosystem
International Journal of Cryptology Research 1(2): 149-163 (2009) -Cryptosystem: A Chaos Based Public Key Cryptosystem 1 M.R.K. Ariffin and 2 N.A. Abu 1 Al-Kindi Cryptography Research Laboratory, Laboratory
More informationChaos, Solitons and Fractals
Chaos, Solitons and Fractals 41 (2009) 962 969 Contents lists available at ScienceDirect Chaos, Solitons and Fractals journal homepage: www.elsevier.com/locate/chaos A fractional-order hyperchaotic system
More informationOBSERVER BASED CHAOTIC MESSAGE TRANSMISSION
International Journal of Bifurcation and Chaos, Vol. 3, No. 4 (23) 3 7 c World Scientific Publishing Company OBSERVER BASED CHAOTIC MESSAGE TRANSMISSION ÖMER MORGÜL, ERCAN SOLAK and MURAT AKGÜL Department
More informationADAPTIVE CHAOS CONTROL AND SYNCHRONIZATION OF HYPERCHAOTIC LIU SYSTEM
International Journal o Computer Science, Engineering and Inormation Technology (IJCSEIT), Vol.1, No., June 011 ADAPTIVE CHAOS CONTROL AND SYNCHRONIZATION OF HYPERCHAOTIC LIU SYSTEM Sundarapandian Vaidyanathan
More informationExperimental and numerical realization of higher order autonomous Van der Pol-Duffing oscillator
Indian Journal of Pure & Applied Physics Vol. 47, November 2009, pp. 823-827 Experimental and numerical realization of higher order autonomous Van der Pol-Duffing oscillator V Balachandran, * & G Kandiban
More informationADAPTIVE CONTROL AND SYNCHRONIZATION OF A GENERALIZED LOTKA-VOLTERRA SYSTEM
ADAPTIVE CONTROL AND SYNCHRONIZATION OF A GENERALIZED LOTKA-VOLTERRA SYSTEM Sundarapandian Vaidyanathan 1 1 Research and Development Centre, Vel Tech Dr. RR & Dr. SR Technical University Avadi, Chennai-600
More informationCONTROLLING HYPER CHAOS WITH FEEDBACK OF DYNAMICAL VARIABLES
International Journal of Modern Physics B Vol. 17, Nos. 22, 23 & 24 (2003) 4272 4277 c World Scientific Publishing Company CONTROLLING HYPER CHAOS WITH FEEDBACK OF DYNAMICAL VARIABLES XIAO-SHU LUO Department
More informationPhase Synchronization of Coupled Rossler Oscillators: Amplitude Effect
Commun. Theor. Phys. (Beijing, China) 47 (2007) pp. 265 269 c International Academic Publishers Vol. 47, No. 2, February 15, 2007 Phase Synchronization of Coupled Rossler Oscillators: Amplitude Effect
More informationA Novel Hyper Chaos-based Image Encryption Algorithm Using Dynamic DNA Coding and SHA-256
A Novel Hyper Chaos-based Image Encryption Algorithm Using Dynamic DNA Coding and SHA-256 Shuqin Zhu Wenhong Wang School of Computer Science; Liaocheng University Liaocheng, 252, China E-mail: wangwenhong@lcu-cs.com
More informationSynchronization-based parameter estimation from time series
PHYSICAL REVIEW E VOLUME 54, NUMBER 6 DECEMBER 1996 Synchronization-based parameter estimation from time series U. Parlitz and L. Junge Drittes Physikalisches Institut, Universität Göttingen, Bürgerstra
More informationADAPTIVE DESIGN OF CONTROLLER AND SYNCHRONIZER FOR LU-XIAO CHAOTIC SYSTEM
ADAPTIVE DESIGN OF CONTROLLER AND SYNCHRONIZER FOR LU-XIAO CHAOTIC SYSTEM WITH UNKNOWN PARAMETERS Sundarapandian Vaidyanathan 1 1 Research and Development Centre, Vel Tech Dr. RR & Dr. SR Technical University
More informationAdaptive synchronization of uncertain chaotic systems via switching mechanism
Chin Phys B Vol 19, No 12 (2010) 120504 Adaptive synchronization of uncertain chaotic systems via switching mechanism Feng Yi-Fu( ) a) and Zhang Qing-Ling( ) b) a) School of Mathematics, Jilin Normal University,
More informationDigital Secure-Communication Using Robust Hyper-Chaotic Systems
Digital Secure-Communication Using Robust Hyper-Chaotic Systems Shih-Liang Chen Shu-Ming Chang Wen-Wei Lin Ting-Ting Hwang Abstract In this paper, we propose a robust hyper-chaotic system that is practically
More informationSynchronization and Bifurcation Analysis in Coupled Networks of Discrete-Time Systems
Commun. Theor. Phys. (Beijing, China) 48 (2007) pp. 871 876 c International Academic Publishers Vol. 48, No. 5, November 15, 2007 Synchronization and Bifurcation Analysis in Coupled Networks of Discrete-Time
More informationADAPTIVE STABILIZATION AND SYNCHRONIZATION OF HYPERCHAOTIC QI SYSTEM
ADAPTIVE STABILIZATION AND SYNCHRONIZATION OF HYPERCHAOTIC QI SYSTEM Sundarapandian Vaidyanathan 1 1 Research and Development Centre, Vel Tech Dr. RR Dr. SR Technical University Avadi, Chennai-600 062,
More informationHYBRID CHAOS SYNCHRONIZATION OF UNCERTAIN LORENZ-STENFLO AND QI 4-D CHAOTIC SYSTEMS BY ADAPTIVE CONTROL
HYBRID CHAOS SYNCHRONIZATION OF UNCERTAIN LORENZ-STENFLO AND QI 4-D CHAOTIC SYSTEMS BY ADAPTIVE CONTROL Sundarapandian Vaidyanathan 1 1 Research and Development Centre, Vel Tech Dr. RR & Dr. SR Technical
More information