n-Dimensional Chaotic Map with application in secure communication

被引:55
作者
Cao, Weijia [1 ,2 ,3 ]
Cai, Hang [4 ]
Hua, Zhongyun [4 ]
机构
[1] Chinese Acad Sci, Aerosp Informat Res Inst, Beijing 100094, Peoples R China
[2] Univ Macau, Taipa 999078, Macau, Peoples R China
[3] Yangtze Three Gorges Technol & Econ Dev Co Ltd, Beijing 101100, Peoples R China
[4] Harbin Inst Technol, Sch Comp Sci & Technol, Shenzhen 518055, Peoples R China
基金
国家重点研发计划; 中国国家自然科学基金;
关键词
Chaotic system; Chaotic map; Secure communication; Lyapunov exponent; Image encryption; DYNAMICAL DEGRADATION; SYSTEM; SYNCHRONIZATION; SCHEME; DESIGN;
D O I
10.1016/j.chaos.2022.112519
中图分类号
O1 [数学];
学科分类号
0701 ; 070101 ;
摘要
When applied to practical applications, existing chaotic systems exhibit many weaknesses, including discontinuous chaotic intervals and easily predicted chaotic signals. This study proposes an n-dimensional chaotic model (nD-CM) to resolve the weaknesses of existing chaotic systems nD-CM can produce chaotic maps with any desired dimension utilizing existing 1D chaotic maps as seed chaotic maps. To demonstrate the effect of nD-CM, we generate three 2D and one 3D chaotic map as examples, utilizing three 1D chaotic maps as the seed maps. The evaluation and experiment results show that these newly generated chaotic maps can obtain continuous and wider chaotic intervals and better performance using the indicators of the Lyapunov exponent, sample entropy and correlation dimension, compared to existing maps. To further show the practicality of nD-CM, the generated maps are additionally applied to secure communication. The experimental results show that these chaotic maps exhibit much better performance in resisting transmission noise in this application than existing chaotic
引用
收藏
页数:11
相关论文
共 48 条
[1]  
Aybar OO, 2013, CHAOTIC MODELING SIM, V4, P529
[2]   CIPRNG: A VLSI Family of Chaotic Iterations Post-Processings for F2-Linear Pseudorandom Number Generation Based on Zynq MPSoC [J].
Bakiri, Mohammed ;
Couchot, Jean-Francois ;
Guyeux, Christophe .
IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS I-REGULAR PAPERS, 2018, 65 (05) :1628-1641
[3]   A Novel Differential-Chaos-Shift-Keying Secure Communication Scheme [J].
Cai, Hang ;
Hua, Zhongyun ;
Huang, Hejiao .
2018 IEEE INTERNATIONAL CONFERENCE ON SYSTEMS, MAN, AND CYBERNETICS (SMC), 2018, :1794-1798
[4]  
Cantrell Cyrus. D., 2000, Modern Mathematical Methods for Physicists and Engineers
[5]   Security measurement of a medical communication scheme based on chaos and DNA coding [J].
Chen, Lei ;
Li, Chengqing ;
Li, Chao .
JOURNAL OF VISUAL COMMUNICATION AND IMAGE REPRESENTATION, 2022, 83
[6]   Design and FPGA-Based Realization of a Chaotic Secure Video Communication System [J].
Chen, Shikun ;
Yu, Simin ;
Lu, Jinhu ;
Chen, Guanrong ;
He, Jianbin .
IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, 2018, 28 (09) :2359-2371
[7]   A Fuzzy-Model-Based Chaotic Synchronization and Its Implementation on a Secure Communication System [J].
Chou, Hao-Gong ;
Chuang, Chun-Fu ;
Wang, Wen-June ;
Lin, Jia-Chin .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2013, 8 (12) :2177-2185
[8]  
Devaney Robert, 2018, An introduction to chaotic dynamical systems
[9]   On the Security of Chaos Based "True" Random Number Generators [J].
Ergun, Salih .
IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2016, E99A (01) :363-369
[10]   Permutation Index DCSK Modulation Technique for Secure Multiuser High-Data-Rate Communication Systems [J].
Herceg, Marijan ;
Kaddoum, Georges ;
Vranjes, Denis ;
Soujeri, Ebrahim .
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2018, 67 (04) :2997-3011