نتایج جستجو برای: logistic chaotic system

تعداد نتایج: 2335757  

Journal: :Advances in Mathematics 2022

To ensure confidentiality and avoid humain attacks against our data, we exchange encryption decryption keys. In proposal scheme, use the commutative properties of product circular matrices to create a common key by applying protocol { \it Diffie-Hellman} through classic channel. raise security level system have introduced sensibility chaotic logistic maps in another which is $BB84$ throuth quan...

This paper presents a new method for encryption of color images based on a combination of chaotic systems, which makes the image encryption more efficient and robust. The proposed algorithm generated three series of data, ranged between 0 and 255, using a chaotic Chen system. Another Chen system was then started with different initial values, which were converted to three series of numbers from...

2013
Nadia Al-Rousan Hazem Al-Najjar

In this paper, we propose a new image encryption algorithm that depends on changing the pixels value and on the shuffling approach of the image. Our algorithm used two chaotic functions to encrypt the image. First, the Rossler chaotic function to create a linear independence between random chaotic blocks and to shuffle the image, where the second chaotic function is a logistic map to create PMT...

Journal: :CoRR 2016
Fei Hu Changjiu Pu Haowei Gao Mengzi Tang Li Li

Stacked Auto-Encoder (SAE) is a kind of deep learning algorithm for unsupervised learning. Which has multilayers that project the vector representation of input data into a lower vector space. These projection vectors are dense representations of the input data. As a result, SAE can be used for image compression. Using chaotic logistic map, the compression ones can further be encrypted. In this...

بهروز میرزا, , طلوع تقیان, , معصومه شریفیان پور, ,

  In this paper a new method is introduced for studying time series of complex systems. This method is based on using the concept of entropy and Jensen-Shannon divergence. In this paper this method is applied to time series of billiard system and heart signals. By this method, we can diagnose the healthy and unhealthy heart and also chaotic billiards from non chaotic systems . The method can al...

2009
G. Alvarez Shujun Li

This paper describes the security weakness of a recently proposed image encryption algorithm based on a logistic-like new chaotic map. We show that the chaotic map’s distribution is far from ideal, thus making it a bad candidate as a pseudo-random stream generator. As a consequence, the images encrypted with this algorithm are shown to be breakable through different attacks of variable complexity.

2011
Takahiro Nagai Yoko Uwate Yoshifumi Nishio

In this study, we investigate switching synchronization phenomena which are observed in coupled chaotic maps. Two logistic maps with generating intermittency chaos near three periodic window are coupled as a CML coupling topology. Moreover, we compare obtained synchronization states of coupled maps with coupled chaotic circuits.

2006
Chung-Ming Ou Chung-Ren Ou

The behaviors of the real exchange rate corresponding to capital mobility within an open-economy macroeconomic framework are investigated. Chaotic phenomena are reasonable candidates for analyzing the random walk behaviors of the given real exchange rate model similar to the simple logistic map. Method of Lyapunov exponents helps determine varied chaotic phenomena in order to choose specific ca...

2017
Mohamed Krim Naima Hadj-Said

While the private radio communications field has grown in recent years, the communication method known as spread spectrum name has gained much prominence. A spread spectrum method can be combined with multiple access method CDMA for dividing sequences to create multi-user communication systems with very good performance of interference between symbols.The production of the chaotic sequence in s...

Journal: :I. J. Network Security 2017
Cong Jin Hui Liu

In recent years, several algorithms of image encryption have been proposed independently. In this paper, an algorithm of image encryption based on general twodimensional Arnold transform with keys and quantum chaotic map is proposed. First, the key streams are generated by the two-dimensional logistic map as initial conditions and parameters. Second, general Arnold scrambling algorithm with key...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید