نتایج جستجو برای: chaotic maps
تعداد نتایج: 129928 فیلتر نتایج به سال:
In the study of nonlinear physical systems, one encounters apparently random or chaotic behavior, although the systems may be completely deterministic. Applying techniques from symbolic dynamics to maps of the interval, we compute two measures of chaotic behavior commonly employed in dynamical systems theory: the topological and metric entropies. For the quadratic logistic equation, we find tha...
Most of the privacy-protection schemes adopting chaotic maps are usually by symmetric cryptography for guaranteeing identity hiding. This will lead to a high calculated amount. So, the paper will wipe out the symmetric cryptography, and only use chaotic maps, a secure one-way hash function to construct a provable privacy-protection system (PPS) which can achieve two kinds of privacyprotection a...
This paper constructs two encryption methods using 2-D chaotic maps, Duffings and Arnold’s cat maps respectively. Both of the methods are designed using message embedded scheme and are analyzed for their validity, for plaintext sensitivity, key sensitivity, known plaintext and brute-force attacks. Due to the less key space generally many chaotic cryptosystem developed are found to be weak again...
We introduce a new, simple and efficient method for determining the ordered or chaotic nature of orbits in two-dimensional (2D), four-dimensional (4D) and six-dimensional (6D) symplectic maps: the computation of the alignment indices. For a given orbit we follow the evolution in time of two different initial deviation vectors computing the norms of the difference d− (parallel alignment index) a...
The combination of chaotic theory and cryptography forms an important field of information security. In the past decade, chaos based image encryption is given much attention in the research of information security and a lot of image encryption algorithms based on chaotic maps have been proposed. Due to some inherent features of images like bulk data capacity and high data redundancy, the encryp...
A method for the semiclassical quantization of chaotic maps is proposed, which is based on harmonic inversion. The power of the technique is demonstrated for the baker’s map as a prototype example of a chaotic map. The harmonic inversion method for signal processing [1,2] has proven to be a powerful tool for the semiclassical quantization of chaotic as well as integrable dynamical systems [3–5]...
Information Security is an important problem in communication. Information includes text, audio, video, image etc. When information is transferred through various networks, there is high chance of unauthorized access. In many fields such as medical science, military, geographic satellite images etc, high security of information is guaranteed using encryption. As a result, the data confidentiali...
Corresponding Author: Muhammad Asif Khan Department of Electrical and Electronics Engineering, Universiti Teknologi PETRONAS, Darul Ridzuan, 31750 Perak, Malaysia Email: [email protected] Abstract: Robust chaotic maps with wide robust region are favored in cryptography as it extends the key length. Chaotic tent map has robust chaos for control parameter μ = 2. Perturbation of control parameter v...
Robust chaos occurs when a dynamical system has a neighborhood in parameter space such that there is one unique chaotic attractor, and no periodic attractors are present [Barreto et al., 1997; Banerjee et al., 19981. This behavior, expected to be relevant for any practical applications of chaos, was shown to exist in a general family of piecewise-smooth twodimensional maps, but conjectured to b...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید