نتایج جستجو برای: multiple chaotic maps

تعداد نتایج: 879192  

a watermarking scheme for Grayscale image isproposed based on a family of the chaotic maps and discretecosine transform. Jacobian Elliptic mapis employed to encrypt ofwatermarked logo. Piecewise nonlinear chaotic map is also usedto determine the location of DCT coefficients for the watermarkembedding. The purpose of this algorithm is to improve theshortcoming of watermarking such as small key s...

Journal: :international journal of communications and information technology 2011
j. ayubi f. mohanna s. mohanna m. rezaei

a watermarking scheme for grayscale image isproposed based on a family of the chaotic maps and discretecosine transform. jacobian elliptic mapis employed to encrypt ofwatermarked logo. piecewise nonlinear chaotic map is also usedto determine the location of dct coefficients for the watermarkembedding. the purpose of this algorithm is to improve theshortcoming of watermarking such as small key s...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه فردوسی مشهد 1376

in this thesis our aim is to construct vector field in r3 for which the corresponding one-dimensional maps have certain discontinuities. two kinds of vector fields are considered, the first the lorenz vector field, and the second originally introced here. the latter have chaotic behavior and motivate a class of one-parameter families of maps which have positive lyapunov exponents for an open in...

2007
Jonathan Crofts Michael Tretyakov Jonathan J. Crofts

iv List of figures v List of tables v

2004
Alan Rogers Robert Shorten Daniel M. Heffernan

The Inverse Frobenius-Perron problem (IFPP) concerns the creation of discrete chaotic mappings with arbitrary invariant densities. In this note, we present a new and elegant solution to the IFPP, based on positive matrix theory. Our method allows chaotic maps with arbitrary piecewise-constant invariant densities, and with arbitrary mixing properties, to be synthesized.

Journal: :Signal Processing 2014
Yicong Zhou Long Bao C. L. Philip Chen

This paper introduces a simple and effective chaotic system using a combination of two existing one-dimension (1D) chaotic maps (seed maps). Simulations and performance evaluations show that the proposed system is able to produce many 1D chaotic maps with larger chaotic ranges and better chaotic behaviors compared with their seed maps. To investigate its applications in multimedia security, a n...

2014

In any communication system, including the satellite and the Internet, it is almost impossible to prevent unauthorized people from eavesdropping. When information is broadcast from a satellite or transmitted through the Internet, there is a risk of information interception. Security of image and video data has become increasingly important for many applications, including video conferencing, se...

2000
Athanasios Nikolaidis Ioannis Pitas

The current paper presents a method for image watermarking based on chaotic sequences produced by different functions. The effect of embedding a chaotic watermark on an image is examined. Extensive experimental results for JPEG and filtering attacks on images watermarked by the different functions are presented together with a comparative study of them. The results show that efficient watermark...

2008
F. K. Diakonos D. Pingel P. Schmelcher

We use a recently found parametrization of the solutions of the inverse Frobenius-Perron problem within the class of complete unimodal maps to develop a Monte-Carlo approach for the construction of one-dimensional chaotic dynamical laws with given statistical properties, i.e. invariant density and autocorrelation function. A variety of different examples are presented to demonstrate the power o...

Journal: :IJDCF 2013
Min Long Hao Wang

Recently, a parallel hash function based on chaotic maps with changeable parameters was proposed by Li et al (2011, pp.1305-1312). In this paper, the security of it is analyzed and the weakness of the architecture is pointed out. It is found that the main limitations are the error using of floor, round and exclusive OR operations in the algorithm. In order to counterstrike these, some improveme...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید