Counteracting the dynamical degradation of digital chaos via hybrid control

被引:69
作者
Hu, Hanping [1 ]
Deng, Yashuang [1 ]
Liu, Lingfeng [1 ]
机构
[1] Huazhong Univ Sci & Technol, Sch Automat, Educ Minist, Key Lab Image Proc & Intelligent Control, Wuhan 430074, Peoples R China
基金
中国国家自然科学基金;
关键词
Digital chaotic system; Dynamical degradation; Chaotification; Complexity; ENCRYPTION SCHEME; GENERATING CHAOS; MAPS; PERIODICITY; PRECISION; SECURITY; SYSTEMS; TRAJECTORIES; ATTRACTORS; TRANSITION;
D O I
10.1016/j.cnsns.2013.10.031
中图分类号
O29 [应用数学];
学科分类号
070104 ;
摘要
Chaotic systems would degrade owing to finite computing precisions, and such degradation often seriously affects the performance of digital chaos-based applications. In this paper, a chaotification method is proposed to solve the dynamical degradation of digital chaotic systems based on a hybrid structure, where a continuous chaotic system is applied to control the digital chaotic system, and a unidirectional coupling controller that combines a linear external state control with a modular function is designed. Moreover, we proof rigorously that a class of digital chaotic systems can be driven to be chaotic in the sense that the system is sensitive to initial conditions. Different from the existing remedies, this method can recover the dynamical properties of system, and even make some properties better than those of the original chaotic system. Thus, this new approach can be applied to the fields of chaotic cryptography and secure communication. (C) 2013 Elsevier B.V. All rights reserved.
引用
收藏
页码:1970 / 1984
页数:15
相关论文
共 37 条
[1]   Cryptanalysis of a chaotic encryption system [J].
Alvarez, G ;
Montoya, F ;
Romera, M ;
Pastor, G .
PHYSICS LETTERS A, 2000, 276 (1-4) :191-196
[2]   Stochastic sensitivity analysis of noise-induced intermittency and transition to chaos in one-dimensional discrete-time systems [J].
Bashkirtseva, Irina ;
Ryashko, Lev .
PHYSICA A-STATISTICAL MECHANICS AND ITS APPLICATIONS, 2013, 392 (02) :295-306
[3]  
Beck C, 1987, PHYSICA D, V25, P95
[4]   Security of public-key cryptosystems based on Chebyshev polynomials [J].
Bergamo, P ;
D'Arco, P ;
De Santis, A ;
Kocarev, L .
IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS I-REGULAR PAPERS, 2005, 52 (07) :1382-1393
[5]   SECURE RANDOM NUMBER GENERATION USING CHAOTIC CIRCUITS [J].
BERNSTEIN, GM ;
LIEBERMAN, MA .
IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS, 1990, 37 (09) :1157-1164
[6]  
Cernak J, 1996, PHYS LETT A, V214, P151, DOI 10.1016/0375-9601(96)00179-X
[7]  
Chen G, 1997, PROCEEDINGS OF THE 3
[8]   Feedback anticontrol of discrete chaos [J].
Chen, GR ;
Lai, DJ .
INTERNATIONAL JOURNAL OF BIFURCATION AND CHAOS, 1998, 8 (07) :1585-1590
[9]   Symmetric ciphers based on two-dimensional chaotic maps [J].
Fridrich, J .
INTERNATIONAL JOURNAL OF BIFURCATION AND CHAOS, 1998, 8 (06) :1259-1284
[10]   DESIGN OF PSEUDONOISE SEQUENCES WITH GOOD OLD AND EVEN CORRELATION-PROPERTIES FOR DS-CDMA [J].
FUKUMASA, H ;
KOHNO, R ;
IMAI, H .
IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 1994, 12 (05) :828-836