一级黄色片免费播放|中国黄色视频播放片|日本三级a|可以直接考播黄片影视免费一级毛片

高級搜索

留言板

尊敬的讀者、作者、審稿人, 關(guān)于本刊的投稿、審稿、編輯和出版的任何問題, 您可以本頁添加留言。我們將盡快給您答復。謝謝您的支持!

姓名
郵箱
手機號碼
標題
留言內(nèi)容
驗證碼

混沌密碼及其在多媒體保密通信中應(yīng)用的進展

禹思敏 呂金虎 李澄清

禹思敏, 呂金虎, 李澄清. 混沌密碼及其在多媒體保密通信中應(yīng)用的進展[J]. 電子與信息學報, 2016, 38(3): 735-752. doi: 10.11999/JEIT151356
引用本文: 禹思敏, 呂金虎, 李澄清. 混沌密碼及其在多媒體保密通信中應(yīng)用的進展[J]. 電子與信息學報, 2016, 38(3): 735-752. doi: 10.11999/JEIT151356
YU Simin, Lü Jinhu, LI Chengqing. Some Progresses of Chaotic Cipher and Its Applications in Multimedia Secure Communications[J]. Journal of Electronics & Information Technology, 2016, 38(3): 735-752. doi: 10.11999/JEIT151356
Citation: YU Simin, Lü Jinhu, LI Chengqing. Some Progresses of Chaotic Cipher and Its Applications in Multimedia Secure Communications[J]. Journal of Electronics & Information Technology, 2016, 38(3): 735-752. doi: 10.11999/JEIT151356

混沌密碼及其在多媒體保密通信中應(yīng)用的進展

doi: 10.11999/JEIT151356 cstr: 32379.14.JEIT151356
基金項目: 

國家自然科學基金重點項目(61532020)

Some Progresses of Chaotic Cipher and Its Applications in Multimedia Secure Communications

Funds: 

The National Natural Science Foundation of China (61532020)

  • 摘要: 該文回顧了過去混沌密碼理論與應(yīng)用的現(xiàn)狀及存在的問題,并對其進行了綜合評述。重點報道了近年來高維混沌密碼及其在多媒體保密通信中的應(yīng)用與硬件實現(xiàn)技術(shù)的進展,其中包括基本理論、設(shè)計方法、典型應(yīng)用以及解決這些問題的思路。在混沌密碼設(shè)計與安全性能評估方面,報道了以下幾個方面的進展:基于反控制方法設(shè)計無簡并高維混沌密碼增強數(shù)字混沌的抗退化能力;無退化數(shù)字域混沌系統(tǒng)的設(shè)計;具有閉環(huán)反饋的有限精度高維混沌長周期序列流密碼的多輪加密設(shè)計方案;高維混沌密碼的安全性能評估。在多媒體保密通信中的應(yīng)用與硬件實現(xiàn)方面,報道了針對手機,計算機,ARM, FPGA, DSP等手持設(shè)備所需不同應(yīng)用業(yè)務(wù)、廣域網(wǎng)和WIFI無線通信網(wǎng)傳輸?shù)膶崟r遠程混沌保密通信應(yīng)用環(huán)境和多位一體的應(yīng)用平臺進行優(yōu)化融合,創(chuàng)建示范驗證系統(tǒng)等若干技術(shù)實現(xiàn)問題的進展。該文試圖推進國內(nèi)外未來混沌密碼理論及其應(yīng)用的研究。
  • 陳關(guān)榮, 呂金虎. Lorenz系統(tǒng)族的動力學分析、控制與同步[M]. 北京: 科學出版社, 2003: 9-32.
    CHEN Guanrong and Jinhu. Dynamics Analysis, Control and Synchronization of Lorenz System Family[M]. Beijing: Science Press, 2003: 9-32.
    呂金虎, 陸君安, 陳士華. 混沌時間序列分析及其應(yīng)用[M]. 武漢: 武漢大學出版社, 2002: 11-56.
    Jinhu, LU Junan, and CHEN Shihua. Chaotic Time Series Analysis and Its Application[M]. Wuhan: Wuhan University Press, 2002: 11-56.
    廖曉峰, 肖迪, 陳勇, 等. 混沌密碼學原理及其應(yīng)用[M]. 北京: 科學出版社, 2009: 232-263.
    LIAO Xiaofeng, XIAO Di, CHEN Yong, et al. Principle and Application of Chaos-based Cryptography[M]. Beijing: Science Press, 2009: 232-263.
    王興元. 復雜非線性系統(tǒng)中的混沌[M]. 北京: 電子工業(yè)出版社, 2003: 1-14.
    WANG Xingyuan. Chaos in Complex Nonlinear Systems[M]. Beijing: Publishing House of Electronics Industry, 2003: 1-14.
    王興元. 混沌系統(tǒng)的同步及在保密通信中的應(yīng)用[M]. 北京: 科學出版社, 2012: 25-41.
    WANG Xingyuan. Synchronization of Chaotic Systems and Its Application in Secure Communications[M]. Beijing: Science Press, 2012: 25-41.
    朱從旭, 胡玉平, 孫克輝. 基于超混沌系統(tǒng)和密文交錯擴散的圖像加密新算法[J]. 電子與信息學報, 2012, 34(7): 1735-1743. doi: 10.3724/SP.J.1146.2011.01004.
    ZHU Congxu, HU Yuping, and SUN Kehui. New image encryption algorithm based on hyperchaotic system and ciphertext diffusion in crisscross pattern[J]. Journal of Electronics Information Technology, 2012, 34(7): 1735-1743. doi: 10.3724/SP.J.1146.2011.01004.
    劉泉, 李佩玥, 章明朝, 等. 基于可Markov分割混沌系統(tǒng)的圖像加密算法[J]. 電子與信息學報, 2014, 36(6): 1271-1277. doi: 10.3724/SP.J.1146.2013.01246.
    LIU Quan, LI Peiyue, ZHANG Mingchao, et al. Image encryption algorithm based on chaos system having Markov portion[J]. Journal of Electronics Information Technology, 2014, 36(6): 1271-1277. doi: 10.3724/SP.J.1146.2013.01246.
    鄧曉衡, 廖春龍, 朱從旭, 等. 像素位置與比特雙重置亂的圖像混沌加密算法[J]. 通信學報, 2014, 35(3): 216-223. doi: 10.3969/j.issn.1000-436x.2014.03.025.
    DENG Xiaoheng, LIAO Chunlong, ZHU Congxu, et al. Image encryption algorithms based on chaos through dual scrambling of pixel position and bit[J]. Journal on Communications, 2014, 35(3): 216-223. doi: 10.3969/j.issn. 1000-436x.2014.03.025.
    張順, 高鐵杠. 基于類 DNA 編碼分組與替換的加密方案[J]. 電子與信息學報, 2015, 37(1): 150-157. doi: 10.11999/ JEIT140091.
    ZHANG Shun and GAO Tiegang. Encryption based on DNA coding codon grouping and substitution[J]. Journal of Electronics Information Technology, 2015, 37(1): 150-157. doi: 10.11999/JEIT140091.
    文昌辭, 王沁, 黃付敏, 等. 基于仿射和復合混沌的圖像自適應(yīng)加密算法[J]. 通信學報, 2012, 33(11): 119-127. doi: 10.3969/j.issn.1000-436x.2012.11.015.
    WEN Changci, WANG Qin, HUANG Fumin, et al. Self- adaptive encryption algorithm for image based on affine and composed chaos[J]. Journal on Communications, 2012, 33(11): 119-127. doi: 10.3969/j.issn.1000-436x.2012.11.015.
    陳鐵明, 葛亮. 面向無線傳感器網(wǎng)絡(luò)的混沌加密與消息鑒別算法[J]. 通信學報, 2013, 5: 012. doi: 10.3969/j.issn.1000- 436x.2013.05.013.
    CHEN Tieming and GE Liang. Chaos-based encryption and message authentication algorithm for wireless sensor network [J]. Journal on Communications, 2013, 34(5): 113-120. doi: 10.3969/ j.issn.1000-436x.2013.05.013.
    譚良, 吳波, 劉震, 等. 一種基于混沌和小波變換的大容量音頻信息隱藏算法[J]. 電子學報, 2010, 38(8): 1812-1818.
    TAN Liang, WU Bo, LIU Zhen, et al. An audio information hiding algorithm with high-capacity which based on chaotic and wavelet transform[J]. Acta Electronica Sinica, 2010, 38(8): 1812-1818.
    郭建勝, 張鋒. 一種圖像加密算法的等效密鑰攻擊方案[J]. 電子學報, 2010, 38(4): 781-785.
    GUO Jiansheng and ZHANG Feng. An equivalent key attack on an image cryptosystem[J]. Acta Electronica Sinica, 2010, 38(4): 781-785.
    葛辛, 劉粉林, 蘆斌, 等. 基于搜索機制混沌加密算法的密文特性分析[J]. 電子與信息學報, 2008, 30(7): 1625-1629.
    GE Xin, LIU Fenlin, LU Bin, et al. Analysis for the cipherext characteristic of based on search mechanism chaotic cryptosystem[J]. Journal of Electronics Information Technology, 2008, 30(7): 1625-1629.
    楊吉云, 廖曉峰, 肖迪, 等. 對一種基于logistic 映射的分組加密機制的分析和改進[J]. 通信學報, 2008, 29(12): 86-90.
    YANG Jiyun, LIAO Xiaofeng, XIAO Di, et al. Cryptanalysis and improvement of a block cryptographic scheme based on logistic map[J]. Journal on Communications, 2008, 29(12): 86-90.
    SCHARINGER J. Fast encryption of image data using chaotic Kolmogorov flows[J]. Journal of Electronic Imaging, 1998, 7(2): 318-325.
    FRIDRICH J. Symmetric ciphers based on two-dimensional chaotic maps[J]. International Journal of Bifurcation and Chaos, 1998, 8(6): 1259-1284.
    BAPTISTA M S. Cryptography with chaos[J]. Physics Letters A, 1998, 240(1/2): 50-54.
    PISARCHIK A N, FLORES-CARMONA N J, and CARPIO-VALADEZ M. Encryption and decryption of images with chaotic map lattices[J]. Chaos, 2006, 16(3): 033118.
    胡漢平, 劉雙紅, 王祖喜, 等. 一種混沌密鑰流產(chǎn)生方法[J]. 計算機學報, 2004, 27(3): 408-412. doi: 10.3321/j.issn: 0254-4164.2004.03.019.
    HU Hanping, LIU Shuanghong, WANG Zuxi, et al. A method for generating chaotic key stream[J]. Chinese Journal of Computers, 2004, 27(3): 408-412. doi: 10.3321/j.issn: 0254-4164.2004.03.019.
    CHEN G, MAO Y, and CHUI C. A symmetric image encryption scheme based on 3D chaotic cat maps[J]. Chaos Solitons Fractals, 2004, 21(3): 749-761.
    PAREEK N, et al. Image encryption using chaotic logistic map[J]. Image and Vision Computing, 2006, 24(9): 926-934.
    BOSE R. Novel public key encryption technique based on multiple chaotic systems[J]. Physical Review Letters, 2005, 95: 098702.
    CHEN Y and LIAO X. Cryptanalysis on a modified Baptista-type cryptosystem with chaotic masking algorithm [J]. Physics Letters A, 2005, 342(5/6): 389-396.
    SHEN Chaowen, YU Simin, L Jinhu, et al. A systematic methodology for constructing hyperchaotic systems with multiple positive Lyapunov exponents and circuit implementation[J]. IEEE Transactions on Circuits and Systems-I: Regular Papers, 2014, 61(3): 854-864.
    SHEN Chaowen, YU Simin, L Jinhu, et al. Designing hyperchaotic systems with any desired number of positive Lyapunov exponents via a simple model[J]. IEEE Transactions on Circuits and Systems-I: Regular Papers, 2014, 61(8): 2380-2389.
    SHEN Chaowen, YU Simin, L Jinhu, et al. Constructing hyperchaotic systems at will[J]. International Journal of Circuit Theory and Applications, 2015, 43(12): 2039-2056.
    GAN Qiuye, YU Simin, LI Chengqing, et al. Design and ARM-embedded implementation of a chaotic map-based multicast scheme for multiuser speech wireless communication[J]. Submitted to IEEE Transactions on Circuits and Systems for Video Technology, 2015.
    LIN Zhuosheng, YU Simin, L Jinhu, et al. Design and ARM-embedded implementation of a chaotic map-based real-time secure video communication system[J]. IEEE Transactions on Circuits and Systems for Video Technology, 2015, 25(7): 1203-1216.
    ZHENG Hanzhong, YU Simin, and XU Xiangqian. A systematic methodology for multi-images encryption and decryption based on single chaotic system and FPGA embedded implementation[J]. Mathematical Problems in Engineering, 2014: 698608-1-698608-15.
    CHEN Shikun, YU Simin, L Jinhu, et al. Theoretical design and FPGA-based implementation of real-time chaos-based video encryption-decryption communication systems[J]. Submitted to IEEE Transactions on Circuits and Systems for Video Technology, 2016.
    ZHENG Hanzhong, YU Simin, and L Jinhu. Design and ARM platform-based realization of digital color image encryption and decryption via single state varible feedback control[J]. International Journal of Bifurcation and Chaos, 2014, 24(4): 1450049-1-1450049-11.
    方錦清. 混沌通信及其相關(guān)網(wǎng)絡(luò)信息安全研究的若干進展[J]. 系統(tǒng)工程學報, 2010: 25(6): 725-741.
    FANG Jinqing. Several advances in chaos-based communication and research of information security associated with networks[J]. Journal of Systems Engineering, 2010: 25(6): 725-741.
    BOURBAKIS N and ALEXOPOULOS C. Picture data encryption using scan patterns[J]. Pattern Recognition, 1992, 25(6): 567-581.
    LI Shujun, LI Chengqing, CHEN Guanrong, et al. A general quantitative cryptanalysis of permutation-only multimedia ciphers against plaintext attacks[J]. Signal Processing: Image Communication, 2008, 23(3): 212-223.
    LI Chengqing and LO K T. Optimal quantitative cryptanalysis of permutation-only multimedia ciphers against plaintext attacks[J]. Signal Processing, 2011, 91(4): 949-954.
    ARROYO D, RHOUMA R, ALVAREZ G, et al. On the security of a new image encryption scheme based on chaotic map lattices[J]. Chaos, 2008, 18(3): 033112-1-033112-8.
    SOLAK E andOKAL C. Algebraic break of image ciphers based on discretized chaotic map lattices[J]. Information Sciences, 2011, 181(1): 227-233.
    WANG Kai, PEI Wenjiang, ZOU Liuhua, et al. On the security of 3D Cat map based symmetric image encryption scheme[J]. Physics Letters A, 2005, 343(6): 432-439.
    LI Chengqing and CHEN Guanrong. On the security of a class of image encryption schemes[C]. Proceeding of IEEE International Symposium on Circuits and Systems, Seattle, 2008: 3290-3293.
    SOLAK Ercan,OKAL Cahit, YILDIZ Olcaytaner, et al. Cryptanalysis of Fridrichs chaotic image encryption[J]. International Journal of Bifurcation and Chaos, 2010, 20(5): 1405-1413.
    LI Chengqing, LI Shujun, ASIM Muhammad, et al. On the security defects of an image encryption scheme[J]. Image and Vision Computing, 2009, 27(9): 1371-1381.
    FRANZ M. Comment on Novel public key encryption technique based on multiple chaotic systems[J]. Physical Review Letters, 2006, 96(6): 069401-1-069401-5.
    WANG Kai, PEI Wenjiang, ZOU Liuhua, et al. Security of public key encryption technique based on multiple chaotic systems[J]. Physics Letters A, 2006, 360(2): 259-262.
    李樹鈞. 數(shù)字化混沌密碼的分析與設(shè)計[D]. [博士論文], 西安交通大學, 2003.
    LI Shujun. Analyses and new designs of digital chaotic ciphers[D]. [Ph.D. dissertation], Xian Jiaotong University, 2003.
    ALVAREZ G and LI Shujun. Some basic cryptographic requirements for chaos-based cryptosystems[J]. International Journal of Bifurcation and Chaos, 2006, 16(8): 2129-2151.
    KOCAREV L. Chaos-based cryptography: a brief overview[J]. IEEE Circuits and Systems Magazine, 2001, 1(3): 6-21.
    SOLAK E. Partial identification of Lorenz system and its application to key space reduction of chaotic cryptosystems [J]. IEEE Transactions on Circuits and Systems II: Express Briefs, 2004, 51(10): 557-560.
    金晨輝, 楊陽. 對自同步混沌密碼的分割攻擊方法[J]. 電子學報, 2006, 34(7): 1337-1341. doi: 10.3321/j.issn:0372-2112. 2006.07.031.
    JIN Chenhui and YANG Yang. A divide-and-conquer attack on self-synchronous chaotic ciphers[J]. Acta Electronica Sinica, 2006, 34(7): 1337-1341. doi: 10.3321/j.issn:0372-2112. 2006.07.031.
    ZHU Zhiliang, ZHANG Wei, WONG Kwokwo, et al. A chaos-based symmetric image encryption scheme using a bit-level permutation[J]. Information Sciences, 2011, 181(6): 1171-1186.
    BHATNAGAR G and WU Q M J. Chaos-based security solution for fingerprint data during communication and transmission[J]. IEEE Transactions on Instrumentation and Measurement, 2012, 61(4): 876-887.
    KWOK H S and TANG W K S. A fast image encryption system based on chaotic maps with finite precision representation[J]. Chaos, Solitons Fractals, 2007, 32(4): 1518-1529.
    RSSLER O E. An equation for hyperchaos[J]. Physics Letters A, 1979, 71A(2/3): 155-157.
    MATSUMOTO T, CHUA L O, and KOBAYASHI K. Hyperchaos: laboratory experiment and numerical confirmation[J]. IEEE Transactions on Circuits and Systems, 1986, 33(11): 1143-1147.
    RECH P and ALBUQUERQUE H A. A hyperchaotic Chua system[J]. International Journal of Bifurcation and Chaos, 2009, 19(11): 3823-3828.
    BARBOZA R. Dynamics of a hyperchaotic Lorenz system[J]. International Journal of Bifurcation and Chaos, 2007, 17(12): 4285-4294.
    HU Guosi. Generating hyperchaotic attractors with three positive Lyapunov exponents via state feedback control[J]. International Journal of Bifurcation and Chaos, 2009, 19(2): 651-660.
    LI Yuxiang, CHEN Guanrong, and TANG W K S. Controlling a unified chaotic system to hyperchaotic[J]. IEEE Transactions on Circuits and Systems-II: Express Briefs, 2005, 52(4): 204-207.
    WANG Xingyuan and WANG Mingjun. A hyperchaos generated from Lorenz system[J]. Physica A, 2008, 387(14): 3751-3758.
    CHEN Aimin, LU Junan, L Jinhu, et al. Generating hyperchaotic L attractor via state feedback control[J]. Physica A, 2006, 364: 103-110.
    KAPITANIAK T, CHUA L O, and ZHONG G Q. Experimental hyperchaos in coupled Chuas circuits[J]. IEEE Transactions on Circuits and Systems-I: Fundamental Theory and Applications, 1994, 41(7): 499-503.
    CANNAS B and CINCOTTI S. Hyper chaotic behaviour of two bi-directionally coupled Chuas circuits[J]. International Journal of Circuit Theory and Applications, 2002, 30(6): 625-637.
    CAFAGNA D and GRASSI G. Hyperchaotic coupled Chua circuits: An approach for generating new nm-scroll attractors[J]. International Journal of Bifurcation and Chaos, 2003, 13(9): 2537-2550.
    CAFAGNA D and GRASSI G. Decomposition method for studying smooth Chuas equation with application to hyperchaotic multiscroll attractors[J]. International Journal of Bifurcation and Chaos, 2007, 17(1): 209-226.
    THAMILMARAN K, LAKSHMANAN M, and VENKATESAN A. Hyperchaos in a modified canonical Chuas circuit[J]. International Journal of Bifurcation and Chaos, 2004, 14(1): 221-243.
    LI Yuxia, TANG W K S, and CHEN Guanrong. Hyperchaotic evolved from the generalized Lorenz system[J]. International Journal of Circuit Theory and Applications, 2005, 33(4): 235-251.
    WANG Jiezhi, CHEN Zengqiang, CHEN Guanrong, et al. A novel hyperchaotic system and its complex dynamics[J]. International Journal of Bifurcation and Chaos, 2008, 18(11): 3309-3324.
    陳關(guān)榮, 汪小帆. 動力系統(tǒng)的混沌化理論、方法與應(yīng)用[M]. 上海: 上海交通大學出版社, 2006: 1-49.
    CHEN Guanrong and WANG Xiaofan. Chaotification of Dynamical Systems: Theory, Methods and Applications [M]. Shanghai: Shanghai Jiao Tong University Press, 2006: 1-49.
    禹思敏, 呂金虎, 陳關(guān)榮. 動力系統(tǒng)反控制方法及其應(yīng)用[M]. 北京: 科學出版社, 2013: 270-324.
    YU Simin, Jinhu, and CHEN Guanrong. Anti-control Method of Dynamical Systems and Its Applications[M]. Beijing: Science Press, 2013: 270-324.
    禹思敏. 新型混沌電路與系統(tǒng)的設(shè)計原理及其應(yīng)用[M]. 北京: 科學出版社, 2016: 35-71.
    YU Simin. Design Principle of New Chaotic Circuits and Systems and Its Applications[M]. Beijing: Science Press, 2016: 35-71.
    YU Simin and CHEN Guanrong. Anti-control of continuous- time dynamical systems[J]. Communications in Nonlinear Science and Numerical Simulation, 2012, 17(6): 2617-2627.
    YU Simin and CHEN Guanrong. Chaotifying continuous- time nonlinear autonomous systems[J]. International Journal of Bifurcation and Chaos, 2012, 22(9): 1250232-1-1250232-17.
    LIU Ling, WU Xiaogang, and HU Hanping. Estimating system parameters of Chuas circuit from synchronizing signal[J]. Physics Letters A, 2004, 324(1): 36-41.
    盛利元, 賈偉堯. 一個截斷誤差誘導下的隨機數(shù)字振蕩系統(tǒng)[J]. 物理學報, 2005, 54(12): 5574-5580.
    SHENG Liyuan and JIA Weiyao. A stochastic digital oscillating system induced by the truncation error[J]. Acta Physica Sinica, 2005, 54(12): 5574-5580.
    WHEELER D and MATTHEWS R. Supercomputer investigations of a chaotic encryption algorithm[J]. Cryptologia, 1991, 15(2): 140-151.
    HEIDARI B G and MCGILLEM C D. A chaotic direct- sequence spread-spectrum communication system[J]. IEEE Transactions on Communication, 1994, 42(2): 1524-1527.
    CERNK J. Digital generators of chaos[J]. Physics Letters A, 1996, 214(3): 151-160.
    王相生, 甘駿人. 一種基于混沌的序列密碼生成方法[J]. 計算機學報, 2002, 25(4): 351-356. doi: 10.3321/j.issn:0254-4164. 2002.04.003.
    WANG Xiangsheng and GAN Junren. A chaotic sequence encryption method[J]. Chinese Journal of Computers, 2002, 25(4): 351-356. doi: 10.3321/j.issn:0254-4164.2002.04.003.
    HU Hanping, DENG Yashuang, and LIU Lingfeng. Counteracting the dynamical degradation of digital chaos via hybrid control[J]. Communications in Nonlinear Science and Numerical Simulation, 2014, 19(6): 1970-1984.
    DENG Yashuang, HU Hanping, et al. Analysis and design of digital chaotic systems with desirable performance via feedback control[J]. IEEE Transactions on Systems, Man, and Cybernetics: Systems, 2015, 45(8): 1187-1200.
    GUYEUX C and BAHI J M. Topological chaos and chaotic iterations application to hash functions[C]. IEEE International Joint Conference on Neural Networks, Barcelona, 2010: 1-7.
    BAHI J M and GUYEUX C. Discrete Dynamical Systems and Chaotic Machines Theory and Applications[M]. Boca Raton: CRC Press, Taylor Francis Group, 2013: 47-70.
    BAHI J M, FANG Xiaole, GUYEUX C, et al. Suitability of chaotic iterations schemes using XOR shift for security applications[J]. Journal of Network and Computer Applications, 2014, 37(1): 282-292.
    WANG Qianxue, YU Simin, GUYEUX C, et al. Theoretical design and circuit implementation of integer domain chaotic systems[J]. International Journal of Bifurcation and Chaos, 2014, 24(10): 1450128-1-1450128-10.
    WANG Qianxue, YU Simin, GUYEUX C, et al. Study on a new chaotic bitwise dynamical system and its FPGA implementation[J]. Chinese Physics B, 2015, 24(6): 060503-1-060503-8.
    WANG Qianxue, YU Simin, LI Chengqing, et al. Theoretical design and FPGA-based implementation of higher- dimensional digital chaotic systems[J]. IEEE Transactions on Circuits and Systems-I: Regular Papers, arXiv: 1509.04469, 2016.
    禹思敏. 混沌系統(tǒng)與混沌電路原理、設(shè)計及其在通信中的應(yīng)用[M]. 西安: 西安電子科技大學出版社, 2011: 313-334.
    YU Simin. Chaotic Systems and Chaotic Circuits: Principle, Design and Its Application in Communications[M]. Xi,an: Xidian University Press, 2011: 313-334.
    YU Simin, L Jinhu, LEUNG H, et al. Design and implementation of n-scroll chaotic attractors from a general Jerk circuit[J]. IEEE Transactions on Circuits and Systems-I: Regular Papers, 2005, 52(7): 1459-1476.
    L Jinhu, YU Simin, LEUNG H, et al. Experimental verification of multidirectional multiscroll chaotic attractors [J]. IEEE Transactions on Circuits and Systems-I: Regular Papers, 2006, 53(1): 149-165.
    YU Simin, L Jinhu, and CHEN Guanrong. Theoretical design and circuit implementation of multi-directional multi-torus chaotic attractors[J]. IEEE Transactions on Circuits and Systems-I: Regular Papers, 2007, 54(9): 2087-2098.
    YU Simin, TANG W K S, L Jinhu, et al. Generation of n m-wing Lorenz-like attractors from a modified Shimizu- Morioka model[J]. IEEE Transactions on Circuits and Systems-I: Regular Papers, 2008, 55(11): 1168-1172.
    YU Simin, LJinhu, CHEN Guanrong, et al. Design and implementation of grid multi-wing butterfly chaotic attractors from a piecewise Lorenz system[J]. IEEE Transactions on Circuits and Systems-I: Regular Papers, 2010, 57(10): 803-807.
    YU Simin, L Jinhu, CHEN Guanrong, et al. Generating grid multi-wing chaotic attractors by constructing heteroclinic loops into switching systems[J]. IEEE Transactions on Circuits and Systems-I: Regular Papers, 2011, 58(5): 314-318.
    YU Simin, L Jinhu, CHEN Guanrong, et al. Design and implementation of grid multiwing hyperchaotic Lorenz system family via switching control and constructing super- heteroclinic loops[J]. IEEE Transactions on Circuits and Systems-I: Regular Papers, 2012, 59(5): 1015-1028.
    CALLEGARI S, ROVATTI R, and SETTI G. First direct implementation of a true random source on programmable hardware[J]. International Journal of Circuit Theory and Applications, 2005, 33(1): 1-16.
    RECAI KILIC. Universal programmable chaos generator: design and implementation issues[J]. International Journal of Bifurcation and Chaos, 2010, 20(2): 419-435.
    SCHLOTTMANN C R and HASLER J. High-level modeling of analog computational elements for signal processing applications[J]. IEEE Transactions on Very Large Scale Integration Systems, 2014, 22(9): 1945-1953.
    SANTO B and KURTHS J. Chaos and cryptography: A new dimension in secure communications[J]. European Physical Journal Special Topics, 2014, 223(8): 1441-1445.
    CHOU Haogong, CHUANG Chunfu, WANG Wenjune, et al. A fuzzy-model-based chaotic synchronization and its implementation on a secure communication system[J]. IEEE Transactions on Information Forensics and Security, 2013, 8(12): 2177-2185.
    BARAKAT M L, MANSINGKA A S, RADWAN A G, et al. Hardware stream cipher with controllable chaos generator for colour image encryption[J]. IET Image Processing, 2014, 8(1): 33-43.
    AZZAZ M S, TANOUGASTB C, SADOUDI S, et al. Synchronized hybrid chaotic generators: Application to real-time wireless speech encryption[J]. Communications in Nonlinear Science and Numerical Simulation, 2013, 18(8): 2035-2047.
    ANNOVAZZI L V, BENEDETTI M, MERLO S, et al. Optical chaos masking of video signals[J]. IEEE Photonics Technology Letters, 2005, 17(9): 1995-1997.
    SADOUDI S, TANOUGAST C, AZZAZ M S, et al. Design and FPGA implementation of a wireless hyperchaotic communication system for secure real-time image transmission[J]. EURASIP Journal on Image and Video Processing, 2013, 2013(43): 1-18.
    BLAYA A B and LOPEZ V J. On the relations between positive Lyapunov exponents, positive entropy, and sensitivity for interval maps[J]. Discrete and Continuous Dynamical Systems, 2012, 32(2): 433-466.
    TERMONIA Y. Kolmogorov entropy from a time series[J]. Physical Review A, 1984, 29(3): 1612-1614.
    EPSTEIN M, HARS L, KRASINSKI R, et al. Design and implementation of a true random number generator based on digital circuit artifacts[J]. Lecture Notes in Computer Science, 2003, 2779: 152-165.
    SUNAR B, MARTIN W, and STINSON D. A provably secure true random number generator with built-in tolerance to active attacks[J]. IEEE Transactions on Computers, 2007, 56(1): 109-119.
    BANKS J, BROOKS J, CAIRNS G, et al. On Devaney's definition of chaos[J]. The American Mathematical Monthly, 1992, 99(4): 332-334.
    KOCAREV L and LIAN S. Chaos-based Cryptography Theory, Algorithms and Applications[M]. Berlin Heidelberg Springer-Verlag, 2011: 67-98.
  • 加載中
計量
  • 文章訪問數(shù):  2728
  • HTML全文瀏覽量:  246
  • PDF下載量:  2612
  • 被引次數(shù): 0
出版歷程
  • 收稿日期:  2015-12-01
  • 修回日期:  2015-01-15
  • 刊出日期:  2016-03-19

目錄

    /

    返回文章
    返回