نتایج جستجو برای: multiple chaotic maps

تعداد نتایج: 879192  

2009
Zenghui Wang Yanxia Sun Barend Jacobus van Wyk Guoyuan Qi Michael Antonie van Wyk

In this paper, several three dimensional (3-D) four-wing smooth quadratic autonomous chaotic systems are analyzed. It is shown that these systems have a number of similar features. A new 3-D continuous autonomous system is proposed based on these features. The new system can generate a four-wing chaotic attractor with less terms in the system equations. Several basic properties of the new syste...

2017
Mahdi Sharifi

The Direct Sequence-Code Division Multiple Access (DS-CDMA) systems offer physical layer security without the need for a significant increase in computation or power requirements but, these systems suffers from multiple access interference because of other users transmitting in the cell, channel inter symbol interference and additive white Gaussian noise. Codes have an effective role in DS-CDMA...

2013
Jianming Liu Huaqing Li

Abstract The chaotic system plays an important role in information communication, electrical equipment, computer cryptography and so on. In this paper, four new high-dimensional complex hyperchaotic systems are found. A new overlaying regularity to generate a new high-dimensional complex hyperchaotic system is found by overlaying a series of low-dimensional chaotic system with the Duffing chaot...

2016
Hongfeng Zhu Tianhua Liu Yu Xia

With rapid changes in the modern communication environment such as wireless mesh networks and cloud storing, it is necessary to put forward a kind more flexible and general architecture to adapt it. But the overwhelming majority of passwordauthenticated key agreement protocols using chaotic maps are based on three architectures (client/server, two clients/server and multi-server) and four secur...

Journal: :International Journal of Advanced Computer Science and Applications 2023

With the exponential growth of internet and social media, images have become a predominant form information transmission, including confidential data. Ensuring proper security these has crucial in today’s digital age. This research study proposes unique strategy for solving this demand by presenting dual confusion diffusion technique encrypting gray-scale pictures. method is presented as an inn...

2011
David Arroyo Shujun Li Gonzalo Alvarez Miguel Hernández

The security of chaos-based cryptosystems is closely related to the possibility of recovering control parameters and/or initial conditions from partial information on the associated chaotic orbits. In this paper we analyze this possibility for the case of unimodal maps. We show a meaningful set of contexts where the dynamics of unimodal maps can be reconstructed, which means a relevant reductio...

Journal: :I. J. Network Security 2016
Hongfeng Zhu

Nowadays chaos theory related to cryptography has been addressed widely, so there is an intuitive connection between group key agreement and chaotic maps. Such a connector may lead to a novel way to construct authenticated and efficient group key agreement protocols. Many chaotic maps based two-party/three-party password authenticated key agreement (2PAKA/3PAKA) schemes have been proposed. Howe...

2001
Rachel M Hilliam Anthony J Lawrance

Statistical and dynamical properties of bivariate (two-dimensional) maps, are less understood than their univariate counterparts. This paper will give a synthesis of extended results with exemplifications by the contrasting bivariate logistic and Arnold cat maps. The use of synchronization from bivariate maps in communication modelling is also described. I. Issues Concerning Bivariate Maps The ...

2017
Meriem Halimi Gilles Millérioux

This paper proposes a unified framework to achieve chaos synchronization of both classes of chaotic discrete-time systems, namely maps involving polynomial nonlinearities and piecewise linear maps. It is shown that all of those chaotic systems can be rewritten as a polytopic Linear Parameter Varying (LPV) system. A unified approach to tackle chaos synchronization problems encountered in communi...

2014
N. F. Elabady M. I. Moussa H. M. Abdalkader S. F. Sabbeh

During the recent years several chaotic image encryption algorithms based on one dimensional (1-D) have been proposed, but the drawbacks of small key space, low speed, and low security in 1-D chaotic cryptosystems are obvious. This paper proposes a new image encryption technique based on 1-D and 2-D chaotic maps which provide more security and big key space. The 1-D chaotic system is induced fr...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید