• 文献检索
  • 文档翻译
  • 深度研究
  • 学术资讯
  • Suppr Zotero 插件Zotero 插件
  • 邀请有礼
  • 套餐&价格
  • 历史记录
应用&插件
Suppr Zotero 插件Zotero 插件浏览器插件Mac 客户端Windows 客户端微信小程序
定价
高级版会员购买积分包购买API积分包
服务
文献检索文档翻译深度研究API 文档MCP 服务
关于我们
关于 Suppr公司介绍联系我们用户协议隐私条款
关注我们

Suppr 超能文献

核心技术专利:CN118964589B侵权必究
粤ICP备2023148730 号-1Suppr @ 2026

文献检索

告别复杂PubMed语法,用中文像聊天一样搜索,搜遍4000万医学文献。AI智能推荐,让科研检索更轻松。

立即免费搜索

文件翻译

保留排版,准确专业,支持PDF/Word/PPT等文件格式,支持 12+语言互译。

免费翻译文档

深度研究

AI帮你快速写综述,25分钟生成高质量综述,智能提取关键信息,辅助科研写作。

立即免费体验

使用具有神经网络边界条件的混沌波动方程的秘密通信系统。

Secret Communication Systems Using Chaotic Wave Equations with Neural Network Boundary Conditions.

作者信息

Chen Yuhan, Sano Hideki, Wakaiki Masashi, Yaguchi Takaharu

机构信息

Graduate School of System Informatics, Kobe University, Kobe 657-8501, Japan.

出版信息

Entropy (Basel). 2021 Jul 16;23(7):904. doi: 10.3390/e23070904.

DOI:10.3390/e23070904
PMID:34356445
原文链接:https://pmc.ncbi.nlm.nih.gov/articles/PMC8306622/
Abstract

In a secret communication system using chaotic synchronization, the communication information is embedded in a signal that behaves as chaos and is sent to the receiver to retrieve the information. In a previous study, a chaotic synchronous system was developed by integrating the wave equation with the van der Pol boundary condition, of which the number of the parameters are only three, which is not enough for security. In this study, we replace the nonlinear boundary condition with an artificial neural network, thereby making the transmitted information difficult to leak. The neural network is divided into two parts; the first half is used as the left boundary condition of the wave equation and the second half is used as that on the right boundary, thus replacing the original nonlinear boundary condition. We also show the results for both monochrome and color images and evaluate the security performance. In particular, it is shown that the encrypted images are almost identical regardless of the input images. The learning performance of the neural network is also investigated. The calculated Lyapunov exponent shows that the learned neural network causes some chaotic vibration effect. The information in the original image is completely invisible when viewed through the image obtained after being concealed by the proposed system. Some security tests are also performed. The proposed method is designed in such a way that the transmitted images are encrypted into almost identical images of waves, thereby preventing the retrieval of information from the original image. The numerical results show that the encrypted images are certainly almost identical, which supports the security of the proposed method. Some security tests are also performed. The proposed method is designed in such a way that the transmitted images are encrypted into almost identical images of waves, thereby preventing the retrieval of information from the original image. The numerical results show that the encrypted images are certainly almost identical, which supports the security of the proposed method.

摘要

在使用混沌同步的秘密通信系统中,通信信息被嵌入到一个表现为混沌的信号中,并发送给接收方以检索信息。在先前的一项研究中,通过将波动方程与范德波尔边界条件相结合开发了一种混沌同步系统,其参数数量仅为三个,安全性不足。在本研究中,我们用人工神经网络取代非线性边界条件,从而使传输的信息难以泄露。神经网络分为两部分;前半部分用作波动方程的左边界条件,后半部分用作右边界条件,从而取代了原来的非线性边界条件。我们还展示了单色和彩色图像的结果并评估了安全性能。特别地,结果表明无论输入图像如何,加密后的图像几乎都是相同的。我们还研究了神经网络的学习性能。计算得到的李雅普诺夫指数表明,经过学习的神经网络会产生一些混沌振动效应。通过所提出的系统进行隐藏后得到的图像来看,原始图像中的信息完全不可见。我们还进行了一些安全性测试。所提出的方法设计成将传输的图像加密成几乎相同的波形图像,从而防止从原始图像中检索信息。数值结果表明加密后的图像确实几乎相同,这支持了所提出方法的安全性。我们还进行了一些安全性测试。所提出的方法设计成将传输的图像加密成几乎相同的波形图像,从而防止从原始图像中检索信息。数值结果表明加密后的图像确实几乎相同,这支持了所提出方法的安全性。

https://cdn.ncbi.nlm.nih.gov/pmc/blobs/19dc/8306622/032ade50acad/entropy-23-00904-g017.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/19dc/8306622/73b32ffb3dbc/entropy-23-00904-g001.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/19dc/8306622/05967cc18fef/entropy-23-00904-g002.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/19dc/8306622/2739a8e14983/entropy-23-00904-g003.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/19dc/8306622/f35f7166b016/entropy-23-00904-g004.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/19dc/8306622/c16ce7bdaf41/entropy-23-00904-g005.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/19dc/8306622/5dd060da4962/entropy-23-00904-g006.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/19dc/8306622/dcd5e2d72480/entropy-23-00904-g007.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/19dc/8306622/da3062b8ea60/entropy-23-00904-g008.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/19dc/8306622/f2ee6d84cd25/entropy-23-00904-g009.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/19dc/8306622/c4cb36e3c83c/entropy-23-00904-g010.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/19dc/8306622/67162bd0c283/entropy-23-00904-g011.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/19dc/8306622/dbbe21a5e397/entropy-23-00904-g012.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/19dc/8306622/6b60642b6fa5/entropy-23-00904-g013.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/19dc/8306622/e13fa7981888/entropy-23-00904-g014.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/19dc/8306622/6efa9ae16df4/entropy-23-00904-g015.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/19dc/8306622/8a2416877dbe/entropy-23-00904-g016.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/19dc/8306622/032ade50acad/entropy-23-00904-g017.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/19dc/8306622/73b32ffb3dbc/entropy-23-00904-g001.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/19dc/8306622/05967cc18fef/entropy-23-00904-g002.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/19dc/8306622/2739a8e14983/entropy-23-00904-g003.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/19dc/8306622/f35f7166b016/entropy-23-00904-g004.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/19dc/8306622/c16ce7bdaf41/entropy-23-00904-g005.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/19dc/8306622/5dd060da4962/entropy-23-00904-g006.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/19dc/8306622/dcd5e2d72480/entropy-23-00904-g007.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/19dc/8306622/da3062b8ea60/entropy-23-00904-g008.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/19dc/8306622/f2ee6d84cd25/entropy-23-00904-g009.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/19dc/8306622/c4cb36e3c83c/entropy-23-00904-g010.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/19dc/8306622/67162bd0c283/entropy-23-00904-g011.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/19dc/8306622/dbbe21a5e397/entropy-23-00904-g012.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/19dc/8306622/6b60642b6fa5/entropy-23-00904-g013.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/19dc/8306622/e13fa7981888/entropy-23-00904-g014.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/19dc/8306622/6efa9ae16df4/entropy-23-00904-g015.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/19dc/8306622/8a2416877dbe/entropy-23-00904-g016.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/19dc/8306622/032ade50acad/entropy-23-00904-g017.jpg

相似文献

1
Secret Communication Systems Using Chaotic Wave Equations with Neural Network Boundary Conditions.使用具有神经网络边界条件的混沌波动方程的秘密通信系统。
Entropy (Basel). 2021 Jul 16;23(7):904. doi: 10.3390/e23070904.
2
Multiuser communication scheme based on binary phase-shift keying and chaos for telemedicine.基于二进制相移键控和混沌的远程医疗多用户通信方案。
Comput Methods Programs Biomed. 2018 Aug;162:165-175. doi: 10.1016/j.cmpb.2018.05.021. Epub 2018 May 17.
3
A new chaotic communication scheme based on adaptive synchronization.一种基于自适应同步的新型混沌通信方案。
Chaos. 2006 Dec;16(4):043118. doi: 10.1063/1.2401058.
4
Super-resolution deep neural network (SRDNN) based multi-image steganography for highly secured lossless image transmission.基于超分辨率深度神经网络(SRDNN)的多图像隐写术用于高度安全的无损图像传输。
Sci Rep. 2024 Mar 13;14(1):6104. doi: 10.1038/s41598-024-54839-7.
5
Cryptanalysis of a chaotic communication scheme using adaptive observer.基于自适应观测器的混沌通信方案的密码分析
Chaos. 2008 Dec;18(4):043110. doi: 10.1063/1.3012262.
6
Sliced chaotic encrypted transmission scheme based on key masked distribution in a W-band millimeter-wave system.基于W波段毫米波系统中密钥掩码分布的切片混沌加密传输方案。
Opt Express. 2024 May 20;32(11):19019-19033. doi: 10.1364/OE.524790.
7
Adaptive synchronization control with optimization policy for fractional-order chaotic systems between 0 and 1 and its application in secret communication.分数阶混沌系统在 0 到 1 之间的自适应同步控制与优化策略及其在保密通信中的应用。
ISA Trans. 2019 Sep;92:35-48. doi: 10.1016/j.isatra.2019.02.027. Epub 2019 Mar 1.
8
Classification of Chaotic Squeak and Rattle Vibrations by CNN Using Recurrence Pattern.基于递归模式的 CNN 对混沌嘎吱声和卡嗒声振动的分类。
Sensors (Basel). 2021 Dec 2;21(23):8054. doi: 10.3390/s21238054.
9
Analog-digital hybrid chaos-based long-haul coherent optical secure communication.基于模拟-数字混合混沌的长距离相干光保密通信
Opt Lett. 2021 Apr 1;46(7):1506-1509. doi: 10.1364/OL.421770.
10
Multi-Gbit/s optical phase chaos communications using a time-delayed optoelectronic oscillator with a three-wave interferometer nonlinearity.利用具有三波干涉仪非线性的延时光电振荡器实现的多吉比特每秒光相位混沌通信。
Chaos. 2017 Nov;27(11):114311. doi: 10.1063/1.5007867.

本文引用的文献

1
Synchronization of chaotic systems.混沌系统的同步。
Chaos. 2015 Sep;25(9):097611. doi: 10.1063/1.4917383.
2
Multichannel digital communications by the synchronization of globally coupled chaotic systems.通过全局耦合混沌系统的同步实现多通道数字通信。
Phys Rev E Stat Phys Plasmas Fluids Relat Interdiscip Topics. 1999 Aug;60(2 Pt A):1648-57. doi: 10.1103/physreve.60.1648.
3
General approach for chaotic synchronization with applications to communication.混沌同步的一般方法及其在通信中的应用
Phys Rev Lett. 1995 Jun 19;74(25):5028-5031. doi: 10.1103/PhysRevLett.74.5028.
4
Circuit implementation of synchronized chaos with applications to communications.同步混沌的电路实现及其在通信中的应用
Phys Rev Lett. 1993 Jul 5;71(1):65-68. doi: 10.1103/PhysRevLett.71.65.