高级搜索

留言板

尊敬的读者、作者、审稿人, 关于本刊的投稿、审稿、编辑和出版的任何问题, 您可以本页添加留言。我们将尽快给您答复。谢谢您的支持!

姓名
邮箱
手机号码
标题
留言内容
验证码

混沌密码及其在多媒体保密通信中应用的进展

禹思敏 吕金虎 李澄清

禹思敏, 吕金虎, 李澄清. 混沌密码及其在多媒体保密通信中应用的进展[J]. 电子与信息学报, 2016, 38(3): 735-752. doi: 10.11999/JEIT151356
引用本文: 禹思敏, 吕金虎, 李澄清. 混沌密码及其在多媒体保密通信中应用的进展[J]. 电子与信息学报, 2016, 38(3): 735-752. doi: 10.11999/JEIT151356
YU Simin, Lü Jinhu, LI Chengqing. Some Progresses of Chaotic Cipher and Its Applications in Multimedia Secure Communications[J]. Journal of Electronics & Information Technology, 2016, 38(3): 735-752. doi: 10.11999/JEIT151356
Citation: YU Simin, Lü Jinhu, LI Chengqing. Some Progresses of Chaotic Cipher and Its Applications in Multimedia Secure Communications[J]. Journal of Electronics & Information Technology, 2016, 38(3): 735-752. doi: 10.11999/JEIT151356

混沌密码及其在多媒体保密通信中应用的进展

doi: 10.11999/JEIT151356
基金项目: 

国家自然科学基金重点项目(61532020)

Some Progresses of Chaotic Cipher and Its Applications in Multimedia Secure Communications

Funds: 

The National Natural Science Foundation of China (61532020)

  • 摘要: 该文回顾了过去混沌密码理论与应用的现状及存在的问题,并对其进行了综合评述。重点报道了近年来高维混沌密码及其在多媒体保密通信中的应用与硬件实现技术的进展,其中包括基本理论、设计方法、典型应用以及解决这些问题的思路。在混沌密码设计与安全性能评估方面,报道了以下几个方面的进展:基于反控制方法设计无简并高维混沌密码增强数字混沌的抗退化能力;无退化数字域混沌系统的设计;具有闭环反馈的有限精度高维混沌长周期序列流密码的多轮加密设计方案;高维混沌密码的安全性能评估。在多媒体保密通信中的应用与硬件实现方面,报道了针对手机,计算机,ARM, FPGA, DSP等手持设备所需不同应用业务、广域网和WIFI无线通信网传输的实时远程混沌保密通信应用环境和多位一体的应用平台进行优化融合,创建示范验证系统等若干技术实现问题的进展。该文试图推进国内外未来混沌密码理论及其应用的研究。
  • 陈关荣, 吕金虎. Lorenz系统族的动力学分析、控制与同步[M]. 北京: 科学出版社, 2003: 9-32.
    CHEN Guanrong and Jinhu. Dynamics Analysis, Control and Synchronization of Lorenz System Family[M]. Beijing: Science Press, 2003: 9-32.
    吕金虎, 陆君安, 陈士华. 混沌时间序列分析及其应用[M]. 武汉: 武汉大学出版社, 2002: 11-56.
    Jinhu, LU Junan, and CHEN Shihua. Chaotic Time Series Analysis and Its Application[M]. Wuhan: Wuhan University Press, 2002: 11-56.
    廖晓峰, 肖迪, 陈勇, 等. 混沌密码学原理及其应用[M]. 北京: 科学出版社, 2009: 232-263.
    LIAO Xiaofeng, XIAO Di, CHEN Yong, et al. Principle and Application of Chaos-based Cryptography[M]. Beijing: Science Press, 2009: 232-263.
    王兴元. 复杂非线性系统中的混沌[M]. 北京: 电子工业出版社, 2003: 1-14.
    WANG Xingyuan. Chaos in Complex Nonlinear Systems[M]. Beijing: Publishing House of Electronics Industry, 2003: 1-14.
    王兴元. 混沌系统的同步及在保密通信中的应用[M]. 北京: 科学出版社, 2012: 25-41.
    WANG Xingyuan. Synchronization of Chaotic Systems and Its Application in Secure Communications[M]. Beijing: Science Press, 2012: 25-41.
    朱从旭, 胡玉平, 孙克辉. 基于超混沌系统和密文交错扩散的图像加密新算法[J]. 电子与信息学报, 2012, 34(7): 1735-1743. doi: 10.3724/SP.J.1146.2011.01004.
    ZHU Congxu, HU Yuping, and SUN Kehui. New image encryption algorithm based on hyperchaotic system and ciphertext diffusion in crisscross pattern[J]. Journal of Electronics Information Technology, 2012, 34(7): 1735-1743. doi: 10.3724/SP.J.1146.2011.01004.
    刘泉, 李佩玥, 章明朝, 等. 基于可Markov分割混沌系统的图像加密算法[J]. 电子与信息学报, 2014, 36(6): 1271-1277. doi: 10.3724/SP.J.1146.2013.01246.
    LIU Quan, LI Peiyue, ZHANG Mingchao, et al. Image encryption algorithm based on chaos system having Markov portion[J]. Journal of Electronics Information Technology, 2014, 36(6): 1271-1277. doi: 10.3724/SP.J.1146.2013.01246.
    邓晓衡, 廖春龙, 朱从旭, 等. 像素位置与比特双重置乱的图像混沌加密算法[J]. 通信学报, 2014, 35(3): 216-223. doi: 10.3969/j.issn.1000-436x.2014.03.025.
    DENG Xiaoheng, LIAO Chunlong, ZHU Congxu, et al. Image encryption algorithms based on chaos through dual scrambling of pixel position and bit[J]. Journal on Communications, 2014, 35(3): 216-223. doi: 10.3969/j.issn. 1000-436x.2014.03.025.
    张顺, 高铁杠. 基于类 DNA 编码分组与替换的加密方案[J]. 电子与信息学报, 2015, 37(1): 150-157. doi: 10.11999/ JEIT140091.
    ZHANG Shun and GAO Tiegang. Encryption based on DNA coding codon grouping and substitution[J]. Journal of Electronics Information Technology, 2015, 37(1): 150-157. doi: 10.11999/JEIT140091.
    文昌辞, 王沁, 黄付敏, 等. 基于仿射和复合混沌的图像自适应加密算法[J]. 通信学报, 2012, 33(11): 119-127. doi: 10.3969/j.issn.1000-436x.2012.11.015.
    WEN Changci, WANG Qin, HUANG Fumin, et al. Self- adaptive encryption algorithm for image based on affine and composed chaos[J]. Journal on Communications, 2012, 33(11): 119-127. doi: 10.3969/j.issn.1000-436x.2012.11.015.
    陈铁明, 葛亮. 面向无线传感器网络的混沌加密与消息鉴别算法[J]. 通信学报, 2013, 5: 012. doi: 10.3969/j.issn.1000- 436x.2013.05.013.
    CHEN Tieming and GE Liang. Chaos-based encryption and message authentication algorithm for wireless sensor network [J]. Journal on Communications, 2013, 34(5): 113-120. doi: 10.3969/ j.issn.1000-436x.2013.05.013.
    谭良, 吴波, 刘震, 等. 一种基于混沌和小波变换的大容量音频信息隐藏算法[J]. 电子学报, 2010, 38(8): 1812-1818.
    TAN Liang, WU Bo, LIU Zhen, et al. An audio information hiding algorithm with high-capacity which based on chaotic and wavelet transform[J]. Acta Electronica Sinica, 2010, 38(8): 1812-1818.
    郭建胜, 张锋. 一种图像加密算法的等效密钥攻击方案[J]. 电子学报, 2010, 38(4): 781-785.
    GUO Jiansheng and ZHANG Feng. An equivalent key attack on an image cryptosystem[J]. Acta Electronica Sinica, 2010, 38(4): 781-785.
    葛辛, 刘粉林, 芦斌, 等. 基于搜索机制混沌加密算法的密文特性分析[J]. 电子与信息学报, 2008, 30(7): 1625-1629.
    GE Xin, LIU Fenlin, LU Bin, et al. Analysis for the cipherext characteristic of based on search mechanism chaotic cryptosystem[J]. Journal of Electronics Information Technology, 2008, 30(7): 1625-1629.
    杨吉云, 廖晓峰, 肖迪, 等. 对一种基于logistic 映射的分组加密机制的分析和改进[J]. 通信学报, 2008, 29(12): 86-90.
    YANG Jiyun, LIAO Xiaofeng, XIAO Di, et al. Cryptanalysis and improvement of a block cryptographic scheme based on logistic map[J]. Journal on Communications, 2008, 29(12): 86-90.
    SCHARINGER J. Fast encryption of image data using chaotic Kolmogorov flows[J]. Journal of Electronic Imaging, 1998, 7(2): 318-325.
    FRIDRICH J. Symmetric ciphers based on two-dimensional chaotic maps[J]. International Journal of Bifurcation and Chaos, 1998, 8(6): 1259-1284.
    BAPTISTA M S. Cryptography with chaos[J]. Physics Letters A, 1998, 240(1/2): 50-54.
    PISARCHIK A N, FLORES-CARMONA N J, and CARPIO-VALADEZ M. Encryption and decryption of images with chaotic map lattices[J]. Chaos, 2006, 16(3): 033118.
    胡汉平, 刘双红, 王祖喜, 等. 一种混沌密钥流产生方法[J]. 计算机学报, 2004, 27(3): 408-412. doi: 10.3321/j.issn: 0254-4164.2004.03.019.
    HU Hanping, LIU Shuanghong, WANG Zuxi, et al. A method for generating chaotic key stream[J]. Chinese Journal of Computers, 2004, 27(3): 408-412. doi: 10.3321/j.issn: 0254-4164.2004.03.019.
    CHEN G, MAO Y, and CHUI C. A symmetric image encryption scheme based on 3D chaotic cat maps[J]. Chaos Solitons Fractals, 2004, 21(3): 749-761.
    PAREEK N, et al. Image encryption using chaotic logistic map[J]. Image and Vision Computing, 2006, 24(9): 926-934.
    BOSE R. Novel public key encryption technique based on multiple chaotic systems[J]. Physical Review Letters, 2005, 95: 098702.
    CHEN Y and LIAO X. Cryptanalysis on a modified Baptista-type cryptosystem with chaotic masking algorithm [J]. Physics Letters A, 2005, 342(5/6): 389-396.
    SHEN Chaowen, YU Simin, L Jinhu, et al. A systematic methodology for constructing hyperchaotic systems with multiple positive Lyapunov exponents and circuit implementation[J]. IEEE Transactions on Circuits and Systems-I: Regular Papers, 2014, 61(3): 854-864.
    SHEN Chaowen, YU Simin, L Jinhu, et al. Designing hyperchaotic systems with any desired number of positive Lyapunov exponents via a simple model[J]. IEEE Transactions on Circuits and Systems-I: Regular Papers, 2014, 61(8): 2380-2389.
    SHEN Chaowen, YU Simin, L Jinhu, et al. Constructing hyperchaotic systems at will[J]. International Journal of Circuit Theory and Applications, 2015, 43(12): 2039-2056.
    GAN Qiuye, YU Simin, LI Chengqing, et al. Design and ARM-embedded implementation of a chaotic map-based multicast scheme for multiuser speech wireless communication[J]. Submitted to IEEE Transactions on Circuits and Systems for Video Technology, 2015.
    LIN Zhuosheng, YU Simin, L Jinhu, et al. Design and ARM-embedded implementation of a chaotic map-based real-time secure video communication system[J]. IEEE Transactions on Circuits and Systems for Video Technology, 2015, 25(7): 1203-1216.
    ZHENG Hanzhong, YU Simin, and XU Xiangqian. A systematic methodology for multi-images encryption and decryption based on single chaotic system and FPGA embedded implementation[J]. Mathematical Problems in Engineering, 2014: 698608-1-698608-15.
    CHEN Shikun, YU Simin, L Jinhu, et al. Theoretical design and FPGA-based implementation of real-time chaos-based video encryption-decryption communication systems[J]. Submitted to IEEE Transactions on Circuits and Systems for Video Technology, 2016.
    ZHENG Hanzhong, YU Simin, and L Jinhu. Design and ARM platform-based realization of digital color image encryption and decryption via single state varible feedback control[J]. International Journal of Bifurcation and Chaos, 2014, 24(4): 1450049-1-1450049-11.
    方锦清. 混沌通信及其相关网络信息安全研究的若干进展[J]. 系统工程学报, 2010: 25(6): 725-741.
    FANG Jinqing. Several advances in chaos-based communication and research of information security associated with networks[J]. Journal of Systems Engineering, 2010: 25(6): 725-741.
    BOURBAKIS N and ALEXOPOULOS C. Picture data encryption using scan patterns[J]. Pattern Recognition, 1992, 25(6): 567-581.
    LI Shujun, LI Chengqing, CHEN Guanrong, et al. A general quantitative cryptanalysis of permutation-only multimedia ciphers against plaintext attacks[J]. Signal Processing: Image Communication, 2008, 23(3): 212-223.
    LI Chengqing and LO K T. Optimal quantitative cryptanalysis of permutation-only multimedia ciphers against plaintext attacks[J]. Signal Processing, 2011, 91(4): 949-954.
    ARROYO D, RHOUMA R, ALVAREZ G, et al. On the security of a new image encryption scheme based on chaotic map lattices[J]. Chaos, 2008, 18(3): 033112-1-033112-8.
    SOLAK E andOKAL C. Algebraic break of image ciphers based on discretized chaotic map lattices[J]. Information Sciences, 2011, 181(1): 227-233.
    WANG Kai, PEI Wenjiang, ZOU Liuhua, et al. On the security of 3D Cat map based symmetric image encryption scheme[J]. Physics Letters A, 2005, 343(6): 432-439.
    LI Chengqing and CHEN Guanrong. On the security of a class of image encryption schemes[C]. Proceeding of IEEE International Symposium on Circuits and Systems, Seattle, 2008: 3290-3293.
    SOLAK Ercan,OKAL Cahit, YILDIZ Olcaytaner, et al. Cryptanalysis of Fridrichs chaotic image encryption[J]. International Journal of Bifurcation and Chaos, 2010, 20(5): 1405-1413.
    LI Chengqing, LI Shujun, ASIM Muhammad, et al. On the security defects of an image encryption scheme[J]. Image and Vision Computing, 2009, 27(9): 1371-1381.
    FRANZ M. Comment on Novel public key encryption technique based on multiple chaotic systems[J]. Physical Review Letters, 2006, 96(6): 069401-1-069401-5.
    WANG Kai, PEI Wenjiang, ZOU Liuhua, et al. Security of public key encryption technique based on multiple chaotic systems[J]. Physics Letters A, 2006, 360(2): 259-262.
    李树钧. 数字化混沌密码的分析与设计[D]. [博士论文], 西安交通大学, 2003.
    LI Shujun. Analyses and new designs of digital chaotic ciphers[D]. [Ph.D. dissertation], Xian Jiaotong University, 2003.
    ALVAREZ G and LI Shujun. Some basic cryptographic requirements for chaos-based cryptosystems[J]. International Journal of Bifurcation and Chaos, 2006, 16(8): 2129-2151.
    KOCAREV L. Chaos-based cryptography: a brief overview[J]. IEEE Circuits and Systems Magazine, 2001, 1(3): 6-21.
    SOLAK E. Partial identification of Lorenz system and its application to key space reduction of chaotic cryptosystems [J]. IEEE Transactions on Circuits and Systems II: Express Briefs, 2004, 51(10): 557-560.
    金晨辉, 杨阳. 对自同步混沌密码的分割攻击方法[J]. 电子学报, 2006, 34(7): 1337-1341. doi: 10.3321/j.issn:0372-2112. 2006.07.031.
    JIN Chenhui and YANG Yang. A divide-and-conquer attack on self-synchronous chaotic ciphers[J]. Acta Electronica Sinica, 2006, 34(7): 1337-1341. doi: 10.3321/j.issn:0372-2112. 2006.07.031.
    ZHU Zhiliang, ZHANG Wei, WONG Kwokwo, et al. A chaos-based symmetric image encryption scheme using a bit-level permutation[J]. Information Sciences, 2011, 181(6): 1171-1186.
    BHATNAGAR G and WU Q M J. Chaos-based security solution for fingerprint data during communication and transmission[J]. IEEE Transactions on Instrumentation and Measurement, 2012, 61(4): 876-887.
    KWOK H S and TANG W K S. A fast image encryption system based on chaotic maps with finite precision representation[J]. Chaos, Solitons Fractals, 2007, 32(4): 1518-1529.
    RSSLER O E. An equation for hyperchaos[J]. Physics Letters A, 1979, 71A(2/3): 155-157.
    MATSUMOTO T, CHUA L O, and KOBAYASHI K. Hyperchaos: laboratory experiment and numerical confirmation[J]. IEEE Transactions on Circuits and Systems, 1986, 33(11): 1143-1147.
    RECH P and ALBUQUERQUE H A. A hyperchaotic Chua system[J]. International Journal of Bifurcation and Chaos, 2009, 19(11): 3823-3828.
    BARBOZA R. Dynamics of a hyperchaotic Lorenz system[J]. International Journal of Bifurcation and Chaos, 2007, 17(12): 4285-4294.
    HU Guosi. Generating hyperchaotic attractors with three positive Lyapunov exponents via state feedback control[J]. International Journal of Bifurcation and Chaos, 2009, 19(2): 651-660.
    LI Yuxiang, CHEN Guanrong, and TANG W K S. Controlling a unified chaotic system to hyperchaotic[J]. IEEE Transactions on Circuits and Systems-II: Express Briefs, 2005, 52(4): 204-207.
    WANG Xingyuan and WANG Mingjun. A hyperchaos generated from Lorenz system[J]. Physica A, 2008, 387(14): 3751-3758.
    CHEN Aimin, LU Junan, L Jinhu, et al. Generating hyperchaotic L attractor via state feedback control[J]. Physica A, 2006, 364: 103-110.
    KAPITANIAK T, CHUA L O, and ZHONG G Q. Experimental hyperchaos in coupled Chuas circuits[J]. IEEE Transactions on Circuits and Systems-I: Fundamental Theory and Applications, 1994, 41(7): 499-503.
    CANNAS B and CINCOTTI S. Hyper chaotic behaviour of two bi-directionally coupled Chuas circuits[J]. International Journal of Circuit Theory and Applications, 2002, 30(6): 625-637.
    CAFAGNA D and GRASSI G. Hyperchaotic coupled Chua circuits: An approach for generating new nm-scroll attractors[J]. International Journal of Bifurcation and Chaos, 2003, 13(9): 2537-2550.
    CAFAGNA D and GRASSI G. Decomposition method for studying smooth Chuas equation with application to hyperchaotic multiscroll attractors[J]. International Journal of Bifurcation and Chaos, 2007, 17(1): 209-226.
    THAMILMARAN K, LAKSHMANAN M, and VENKATESAN A. Hyperchaos in a modified canonical Chuas circuit[J]. International Journal of Bifurcation and Chaos, 2004, 14(1): 221-243.
    LI Yuxia, TANG W K S, and CHEN Guanrong. Hyperchaotic evolved from the generalized Lorenz system[J]. International Journal of Circuit Theory and Applications, 2005, 33(4): 235-251.
    WANG Jiezhi, CHEN Zengqiang, CHEN Guanrong, et al. A novel hyperchaotic system and its complex dynamics[J]. International Journal of Bifurcation and Chaos, 2008, 18(11): 3309-3324.
    陈关荣, 汪小帆. 动力系统的混沌化理论、方法与应用[M]. 上海: 上海交通大学出版社, 2006: 1-49.
    CHEN Guanrong and WANG Xiaofan. Chaotification of Dynamical Systems: Theory, Methods and Applications [M]. Shanghai: Shanghai Jiao Tong University Press, 2006: 1-49.
    禹思敏, 吕金虎, 陈关荣. 动力系统反控制方法及其应用[M]. 北京: 科学出版社, 2013: 270-324.
    YU Simin, Jinhu, and CHEN Guanrong. Anti-control Method of Dynamical Systems and Its Applications[M]. Beijing: Science Press, 2013: 270-324.
    禹思敏. 新型混沌电路与系统的设计原理及其应用[M]. 北京: 科学出版社, 2016: 35-71.
    YU Simin. Design Principle of New Chaotic Circuits and Systems and Its Applications[M]. Beijing: Science Press, 2016: 35-71.
    YU Simin and CHEN Guanrong. Anti-control of continuous- time dynamical systems[J]. Communications in Nonlinear Science and Numerical Simulation, 2012, 17(6): 2617-2627.
    YU Simin and CHEN Guanrong. Chaotifying continuous- time nonlinear autonomous systems[J]. International Journal of Bifurcation and Chaos, 2012, 22(9): 1250232-1-1250232-17.
    LIU Ling, WU Xiaogang, and HU Hanping. Estimating system parameters of Chuas circuit from synchronizing signal[J]. Physics Letters A, 2004, 324(1): 36-41.
    盛利元, 贾伟尧. 一个截断误差诱导下的随机数字振荡系统[J]. 物理学报, 2005, 54(12): 5574-5580.
    SHENG Liyuan and JIA Weiyao. A stochastic digital oscillating system induced by the truncation error[J]. Acta Physica Sinica, 2005, 54(12): 5574-5580.
    WHEELER D and MATTHEWS R. Supercomputer investigations of a chaotic encryption algorithm[J]. Cryptologia, 1991, 15(2): 140-151.
    HEIDARI B G and MCGILLEM C D. A chaotic direct- sequence spread-spectrum communication system[J]. IEEE Transactions on Communication, 1994, 42(2): 1524-1527.
    CERNK J. Digital generators of chaos[J]. Physics Letters A, 1996, 214(3): 151-160.
    王相生, 甘骏人. 一种基于混沌的序列密码生成方法[J]. 计算机学报, 2002, 25(4): 351-356. doi: 10.3321/j.issn:0254-4164. 2002.04.003.
    WANG Xiangsheng and GAN Junren. A chaotic sequence encryption method[J]. Chinese Journal of Computers, 2002, 25(4): 351-356. doi: 10.3321/j.issn:0254-4164.2002.04.003.
    HU Hanping, DENG Yashuang, and LIU Lingfeng. Counteracting the dynamical degradation of digital chaos via hybrid control[J]. Communications in Nonlinear Science and Numerical Simulation, 2014, 19(6): 1970-1984.
    DENG Yashuang, HU Hanping, et al. Analysis and design of digital chaotic systems with desirable performance via feedback control[J]. IEEE Transactions on Systems, Man, and Cybernetics: Systems, 2015, 45(8): 1187-1200.
    GUYEUX C and BAHI J M. Topological chaos and chaotic iterations application to hash functions[C]. IEEE International Joint Conference on Neural Networks, Barcelona, 2010: 1-7.
    BAHI J M and GUYEUX C. Discrete Dynamical Systems and Chaotic Machines Theory and Applications[M]. Boca Raton: CRC Press, Taylor Francis Group, 2013: 47-70.
    BAHI J M, FANG Xiaole, GUYEUX C, et al. Suitability of chaotic iterations schemes using XOR shift for security applications[J]. Journal of Network and Computer Applications, 2014, 37(1): 282-292.
    WANG Qianxue, YU Simin, GUYEUX C, et al. Theoretical design and circuit implementation of integer domain chaotic systems[J]. International Journal of Bifurcation and Chaos, 2014, 24(10): 1450128-1-1450128-10.
    WANG Qianxue, YU Simin, GUYEUX C, et al. Study on a new chaotic bitwise dynamical system and its FPGA implementation[J]. Chinese Physics B, 2015, 24(6): 060503-1-060503-8.
    WANG Qianxue, YU Simin, LI Chengqing, et al. Theoretical design and FPGA-based implementation of higher- dimensional digital chaotic systems[J]. IEEE Transactions on Circuits and Systems-I: Regular Papers, arXiv: 1509.04469, 2016.
    禹思敏. 混沌系统与混沌电路原理、设计及其在通信中的应用[M]. 西安: 西安电子科技大学出版社, 2011: 313-334.
    YU Simin. Chaotic Systems and Chaotic Circuits: Principle, Design and Its Application in Communications[M]. Xi,an: Xidian University Press, 2011: 313-334.
    YU Simin, L Jinhu, LEUNG H, et al. Design and implementation of n-scroll chaotic attractors from a general Jerk circuit[J]. IEEE Transactions on Circuits and Systems-I: Regular Papers, 2005, 52(7): 1459-1476.
    L Jinhu, YU Simin, LEUNG H, et al. Experimental verification of multidirectional multiscroll chaotic attractors [J]. IEEE Transactions on Circuits and Systems-I: Regular Papers, 2006, 53(1): 149-165.
    YU Simin, L Jinhu, and CHEN Guanrong. Theoretical design and circuit implementation of multi-directional multi-torus chaotic attractors[J]. IEEE Transactions on Circuits and Systems-I: Regular Papers, 2007, 54(9): 2087-2098.
    YU Simin, TANG W K S, L Jinhu, et al. Generation of n m-wing Lorenz-like attractors from a modified Shimizu- Morioka model[J]. IEEE Transactions on Circuits and Systems-I: Regular Papers, 2008, 55(11): 1168-1172.
    YU Simin, LJinhu, CHEN Guanrong, et al. Design and implementation of grid multi-wing butterfly chaotic attractors from a piecewise Lorenz system[J]. IEEE Transactions on Circuits and Systems-I: Regular Papers, 2010, 57(10): 803-807.
    YU Simin, L Jinhu, CHEN Guanrong, et al. Generating grid multi-wing chaotic attractors by constructing heteroclinic loops into switching systems[J]. IEEE Transactions on Circuits and Systems-I: Regular Papers, 2011, 58(5): 314-318.
    YU Simin, L Jinhu, CHEN Guanrong, et al. Design and implementation of grid multiwing hyperchaotic Lorenz system family via switching control and constructing super- heteroclinic loops[J]. IEEE Transactions on Circuits and Systems-I: Regular Papers, 2012, 59(5): 1015-1028.
    CALLEGARI S, ROVATTI R, and SETTI G. First direct implementation of a true random source on programmable hardware[J]. International Journal of Circuit Theory and Applications, 2005, 33(1): 1-16.
    RECAI KILIC. Universal programmable chaos generator: design and implementation issues[J]. International Journal of Bifurcation and Chaos, 2010, 20(2): 419-435.
    SCHLOTTMANN C R and HASLER J. High-level modeling of analog computational elements for signal processing applications[J]. IEEE Transactions on Very Large Scale Integration Systems, 2014, 22(9): 1945-1953.
    SANTO B and KURTHS J. Chaos and cryptography: A new dimension in secure communications[J]. European Physical Journal Special Topics, 2014, 223(8): 1441-1445.
    CHOU Haogong, CHUANG Chunfu, WANG Wenjune, et al. A fuzzy-model-based chaotic synchronization and its implementation on a secure communication system[J]. IEEE Transactions on Information Forensics and Security, 2013, 8(12): 2177-2185.
    BARAKAT M L, MANSINGKA A S, RADWAN A G, et al. Hardware stream cipher with controllable chaos generator for colour image encryption[J]. IET Image Processing, 2014, 8(1): 33-43.
    AZZAZ M S, TANOUGASTB C, SADOUDI S, et al. Synchronized hybrid chaotic generators: Application to real-time wireless speech encryption[J]. Communications in Nonlinear Science and Numerical Simulation, 2013, 18(8): 2035-2047.
    ANNOVAZZI L V, BENEDETTI M, MERLO S, et al. Optical chaos masking of video signals[J]. IEEE Photonics Technology Letters, 2005, 17(9): 1995-1997.
    SADOUDI S, TANOUGAST C, AZZAZ M S, et al. Design and FPGA implementation of a wireless hyperchaotic communication system for secure real-time image transmission[J]. EURASIP Journal on Image and Video Processing, 2013, 2013(43): 1-18.
    BLAYA A B and LOPEZ V J. On the relations between positive Lyapunov exponents, positive entropy, and sensitivity for interval maps[J]. Discrete and Continuous Dynamical Systems, 2012, 32(2): 433-466.
    TERMONIA Y. Kolmogorov entropy from a time series[J]. Physical Review A, 1984, 29(3): 1612-1614.
    EPSTEIN M, HARS L, KRASINSKI R, et al. Design and implementation of a true random number generator based on digital circuit artifacts[J]. Lecture Notes in Computer Science, 2003, 2779: 152-165.
    SUNAR B, MARTIN W, and STINSON D. A provably secure true random number generator with built-in tolerance to active attacks[J]. IEEE Transactions on Computers, 2007, 56(1): 109-119.
    BANKS J, BROOKS J, CAIRNS G, et al. On Devaney's definition of chaos[J]. The American Mathematical Monthly, 1992, 99(4): 332-334.
    KOCAREV L and LIAN S. Chaos-based Cryptography Theory, Algorithms and Applications[M]. Berlin Heidelberg Springer-Verlag, 2011: 67-98.
  • 加载中
计量
  • 文章访问数:  2344
  • HTML全文浏览量:  180
  • PDF下载量:  2584
  • 被引次数: 0
出版历程
  • 收稿日期:  2015-12-01
  • 修回日期:  2015-01-15
  • 刊出日期:  2016-03-19

目录

    /

    返回文章
    返回