scholarly journals Secret Communication Systems Using Chaotic Wave Equations with Neural Network Boundary Conditions

Entropy ◽  
2021 ◽  
Vol 23 (7) ◽  
pp. 904
Author(s):  
Yuhan Chen ◽  
Hideki Sano ◽  
Masashi Wakaiki ◽  
Takaharu Yaguchi

In a secret communication system using chaotic synchronization, the communication information is embedded in a signal that behaves as chaos and is sent to the receiver to retrieve the information. In a previous study, a chaotic synchronous system was developed by integrating the wave equation with the van der Pol boundary condition, of which the number of the parameters are only three, which is not enough for security. In this study, we replace the nonlinear boundary condition with an artificial neural network, thereby making the transmitted information difficult to leak. The neural network is divided into two parts; the first half is used as the left boundary condition of the wave equation and the second half is used as that on the right boundary, thus replacing the original nonlinear boundary condition. We also show the results for both monochrome and color images and evaluate the security performance. In particular, it is shown that the encrypted images are almost identical regardless of the input images. The learning performance of the neural network is also investigated. The calculated Lyapunov exponent shows that the learned neural network causes some chaotic vibration effect. The information in the original image is completely invisible when viewed through the image obtained after being concealed by the proposed system. Some security tests are also performed. The proposed method is designed in such a way that the transmitted images are encrypted into almost identical images of waves, thereby preventing the retrieval of information from the original image. The numerical results show that the encrypted images are certainly almost identical, which supports the security of the proposed method. Some security tests are also performed. The proposed method is designed in such a way that the transmitted images are encrypted into almost identical images of waves, thereby preventing the retrieval of information from the original image. The numerical results show that the encrypted images are certainly almost identical, which supports the security of the proposed method.

2010 ◽  
Vol 72 (3-4) ◽  
pp. 1865-1885
Author(s):  
Le Thi Phuong Ngoc ◽  
Nguyen Anh Triet ◽  
Nguyen Thanh Long

2005 ◽  
Vol 15 (02) ◽  
pp. 567-580 ◽  
Author(s):  
YU HUANG ◽  
JUN LUO ◽  
ZUOLING ZHOU

In this paper, we consider a linear wave equation on an interval with a van der Pol nonlinear boundary condition at one end and an energy-pumping condition at the other end. We study the dynamical behavior of the Riemann invariants (u,v) of the wave equation in terms of the growth rates of the total variations of the snapshots on the spatial interval. Our main contributions here are the detection of rapid fluctuations of the snapshots of u and v in the long run. The results here sharpen those in the earlier works of [Chen et al., 2001] and [Huang, 2003].


2008 ◽  
Vol 41 (1) ◽  
Author(s):  
Nguyen Thanh Long ◽  
Vo Giang Giai ◽  
Le Xuan Truong

AbstractWe study the initial-boundary value problem for a nonlinear wave equation given by


Sign in / Sign up

Export Citation Format

Share Document