scholarly journals The Design and Its Application in Secure Communication and Image Encryption of a New Lorenz-Like System with Varying Parameter

2016 ◽  
Vol 2016 ◽  
pp. 1-11 ◽  
Author(s):  
Lilian Huang ◽  
Donghai Shi ◽  
Jie Gao

A new Lorenz-like chaotic system with varying parameter is proposed by adding a state feedback function. The structure of the new designed system is simple and has more complex dynamic behaviors. The chaos behavior of the new system is studied by theoretical analysis and numerical simulation. And the bifurcation diagram shows a chaos-cycle-chaos evolution when the new parameter changes. Then a new synchronization scheme by a single state variable drive is given based on the new system and a chaotic parameter modulation digital secure communication system is also constructed. The results of simulation demonstrate that the new proposed system could be well applied in secure communication. Otherwise, based on the new system, the encryption and decryption of image could be achieved also.

Symmetry ◽  
2020 ◽  
Vol 12 (11) ◽  
pp. 1765
Author(s):  
Emad E. Mahmoud ◽  
M. Higazy ◽  
Ohood A. Althagafi

Our work here is to propose a novel technique by which chaos complete and phase synchronizations can be accomplished via a low-cost scheme. We call the proposed technique a “single-state feedback track synchronization control algorithm”. A single-state feedback track synchronization control algorithm is designed so that both complete and phase synchronizations can be accomplished using the same controller. Complete synchronization between two chaotic systems means complete symmetry between them, but phase synchronization means complete symmetry with a phase shift. In addition, the proposed method is applied to the synchronization of two identical chaotic Lorenz models. The effectiveness and robustness of the proposed algorithm is well illustrated via exhaustive numerical simulation experiments based on the Matlab toolbox of the powerful genetic algorithm. The robustness of the proposed algorithm motivated us to apply this method of synchronization in a secure communication application.


2014 ◽  
Vol 24 (04) ◽  
pp. 1450049 ◽  
Author(s):  
Hanzhong Zheng ◽  
Simin Yu ◽  
Jinhu Lü

In this paper, discrete-time chaotic systems under single state variable feedback control are studied, and drive-response synchronization is investigated. To that end, ARM platform-based digital color image encryption and decryption using a chaotic stream cipher is designed and implemented, with experimental results demonstrated.


2017 ◽  
Vol 27 (04) ◽  
pp. 1850057 ◽  
Author(s):  
Uğur Erkin Kocamaz ◽  
Serdar Çiçek ◽  
Yılmaz Uyaroğlu

This work deals with the passive control-based chaos synchronization with circuit design for secure communication. First, the numerical simulation and electronic circuit design of a simple five-term chaotic system are performed. The numerical simulation and electronic circuit design outputs have confirmed each other. Then, the passive control method is applied for synchronizing two identical five-term chaotic systems using only one state control signal. After the synchronization study, design and analysis for secure communication by chaotic masking method are conducted in Matlab–Simulink platform. Finally, an electronic circuit design is performed for the designed communication system. In the designed communication system with Matlab–Simulink platform and electronic circuit design, information signal which is sent from the transmitter unit is successfully retrieved at the receiver unit. As a result, the electronic circuit design has shown that a single state passivity-based synchronization signal can be effectively used for secure data communication applications for the real environment.


Complexity ◽  
2018 ◽  
Vol 2018 ◽  
pp. 1-10
Author(s):  
David I. Rosas Almeida ◽  
Laura O. Orea Leon

This paper presents a synchronization strategy based on second-order sliding mode control, to obtain robust controlled synchronization in an array of uncertain pancreatic β-cells. This strategy considers a synchronization scheme with a reference cell, which incorporates the desired dynamics, and an array of cells, which does not demonstrate adequate synchronization. The array may be formed by active and inactive cells having different strengths in gap junctions. For an array with three cells, we design the coupling signal considering that only the output of an active cell of the array is available. The coupling signal is the signum of the difference between the output of the reference cell and the output of an active cell in the array; this ensures exact synchronization in finite time between both cells. Then, this coupling signal is applied to the other cells in the array, and we establish the conditions required to be satisfied to obtain approximate synchronization between the reference cell and all other cells in the array. The performance of this technique is demonstrated by the results of numerical simulations performed for several cases of connections for an array with three cells and the reference cell. Finally, we show through a numerical simulation that this technique can be applied to arrays with many β-cells.


2020 ◽  
Vol 13 (44) ◽  
pp. 4483-4489
Author(s):  
C Beaula ◽  

Background/Objective: The Coronavirus Covid-19 has affected almost all the countries and millions of people got infected and more deaths have been reported everywhere. The uncertainty and fear created by the pandemic can be used by hackers to steal the data from both private and public systems. Hence, there is an urgent need to improve the security of the systems. This can be done only by building a strong cryptosystem. So many researchers started embedding different topics of mathematics like algebra, number theory, and so on in cryptography to keep the system, safe and secure. In this study, a cryptosystem using graph theory has been attempted, to strengthen the security of the system. Method: A new graph is constructed from the given graph, known as a double vertex graph. The edge labeling of this double vertex graph is used in encryption and decryption. Findings: A new cryptosystem using the amalgamation of the path, its double vertex graph and edge labeling has been proposed. From the double vertex graph of a path, we have given a method to find the original path. To hack such an encrypted key, the knowledge of graph theory is important, which makes the system stronger. Applications:The one-word encryption method will be useful in every security system that needs a password for secure communication or storage or authentication. Keywords: Double vertex graphs; path; adjacency matrix; encryption; cryptography


Author(s):  
Eric Donald Dongmo ◽  
Kayode Stephen Ojo ◽  
Paul Woafo ◽  
Abdulahi Ndzi Njah

This paper introduces a new type of synchronization scheme, referred to as difference synchronization scheme, wherein the difference between the state variables of two master [slave] systems synchronizes with the state variable of a single slave [master] system. Using the Lyapunov stability theory and the active backstepping technique, controllers are derived to achieve the difference synchronization of three identical hyperchaotic Liu systems evolving from different initial conditions, as well as the difference synchronization of three nonidentical systems of different orders, comprising the 3D Lorenz chaotic system, 3D Chen chaotic system, and the 4D hyperchaotic Liu system. Numerical simulations are presented to demonstrate the validity and feasibility of the theoretical analysis. The development of difference synchronization scheme has increases the number of existing chaos synchronization scheme.


2020 ◽  
Vol 30 (05) ◽  
pp. 2050075
Author(s):  
Baoju Chen ◽  
Simin Yu ◽  
Ping Chen ◽  
Liangshan Xiao ◽  
Jinhu Lü

In this paper, a Virtex-7-based video chaotic secure communication scheme is investigated. First, the network sending and receiving controller Intellectual Property (IP) cores are designed. Next, the chaotic encryption and decryption IP cores are implemented using fixed-point algorithm, pipeline operation, and state machine control. Thus, video capturing, video displaying, network sending, network receiving, chaotic encrypting, and chaotic decrypting can be achieved via IP core integration design. An improved 7D chaotic stream cipher algorithm for resisting divide-and-conquer attack is then designed and realized on a Virtex-7 high-end FPGA platform. Hardware experimental results are also given to verify the feasibility of the scheme.


2006 ◽  
Vol 16 (02) ◽  
pp. 419-425 ◽  
Author(s):  
MAO-YIN CHEN ◽  
DONG-HUA ZHOU ◽  
YUN SHANG

This Letter considers the problem of chaotic secure communication in the drive-response framework. The drive system can be augmented into a higher order system, and then a sliding mode observer based response system can be constructed to synchronize this augmented system. If they satisfy certain conditions, the hidden message can be recovered directly by the concept of equivalent control. Theoretical analysis and numerical simulation verify the effectiveness of the proposed method.


Sign in / Sign up

Export Citation Format

Share Document