نتایج جستجو برای: multiple chaotic maps

تعداد نتایج: 879192  

Journal: :CoRR 2006
Chengqing Li Shujun Li Gonzalo Álvarez Guanrong Chen Kwok-Tung Lo

Recently, Pareek et al. proposed a symmetric key block cipher using multiple onedimensional chaotic maps. This paper reports some new findings on the security problems of this kind of chaotic cipher: 1) a number of weak keys exists; 2) some important intermediate data of the cipher are not sufficiently random; 3) the whole secret key can be broken by a known-plaintext attack with only 120 conse...

ژورنال: Journal of Railway Research 2014
Ariaei, A., Kouchaki, M., Ziaei-Rad, S.,

A simply supported Timoshenko beam with an intermediate backlash is considered. The beam equations of motion are obtained based on the Timoshenko beam theory by including the dynamic effect of a moving mass travelling along the vibrating path. The equations of motion are discretized by using the assumed modes technique and solved using the Runge–Kutta method. The analysis methods employed in...

2014
Xiaopeng Wei Bin Wang Qiang Zhang Chao Che

In recent years, there has been growing interesting in image encryption based on chaotic maps and wavelet transform. In this paper, a novel scheme for image encryption based on chaotic maps and reversible integer wavelet transform is proposed. Firstly, the cipher key which is related to plain-image is used to generate different parameters and initial values of chaotic maps. Then the plain-image...

2006
Ali A. Minai Tirunelveli Anand

Synchronization between chaotic systems has recently been a topic of great interest among physicists and engineers. In addition to theoretical results, a number of applications in communications and control have also been proposed. We have previously shown that identical chaotic maps can, under certain conditions, be synchronized by a common noise-like input. This raises the question whether th...

Journal: :CoRR 2011
G. A. Sathish Kumar K. Bhoopathy Bagan N. Sriraam

In the recent world, security is a prime important issue, and encryption is one of the best alternative way to ensure security. More over, there are many image encryption schemes have been proposed, each one of them has its own strength and weakness. This paper presents a new algorithm for the image encryption/decryption scheme. This paper is devoted to provide a secured image encryption techni...

Journal: :Chaos 2021

In this work, we only use data on the unstable manifold to locate partition boundaries by checking folding points at different levels, which practically coincide with homoclinic tangencies. The method is then applied classic two-dimensional Hénon map and a well-known three-dimensional map. Comparison previous results made in case, Lyapunov exponents are computed through metric entropy based sho...

Journal: :Applied Mathematics Letters 1989

Journal: :Frontiers in Physics 2022

GENERAL COMMENTARY article Front. Phys., 06 December 2022Sec. Interdisciplinary Physics Volume 10 - 2022 | https://doi.org/10.3389/fphy.2022.1094240

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید