• Title/Summary/Keyword: Chaos Map

Search Result 74, Processing Time 0.032 seconds

An EEG Encryption Scheme for Authentication System based on Brain Wave (뇌파 기반의 인증시스템을 위한 EEG 암호화 기법)

  • Kim, Jung-Sook;Chung, Jang-Young
    • Journal of Korea Multimedia Society
    • /
    • v.18 no.3
    • /
    • pp.330-338
    • /
    • 2015
  • Gradually increasing the value of the technology, the techniques of the various security systems to protect the core technology have been developed. The proposed security scheme, which uses both a Password and the various devices, is always open by malicious user. In order to solve that problem, the biometric authentication systems are introduced but they have a problem which is the secondary damage to the user. So, the authentication methods using EEG(Electroencephalography) signals were developed. However, the size of EEG signals is big and it cause a lot of problems for the real-time authentication. And the encryption method is necessary. In this paper, we proposed an efficient real-time authentication system applied encryption scheme with junk data using chaos map on the EEG signals.

Controlling chaos of Lorenz Equation by Using Return Map (되돌이 본뜨기를 이용한 Lorenz식의 혼돈제어)

  • Kim, Chil-Min;Jo, Chang-Ho;Park, Jong-Dae
    • The Journal of Natural Sciences
    • /
    • v.7
    • /
    • pp.5-9
    • /
    • 1995
  • We have controlled the chaotic output of Lorenz equation by using a return map. By applying small perturbations, the chaotic temporal behaviors and phase diagrams have been stabilized to period-1T, -2T, -3T which are unstable fixed points respectively as the same behaviors as the OGY method.

  • PDF

Design of image encryption system using multiple chaotic maps (다중 카오스 사상을 이용한 영상 암호시스템 설계)

  • 이성우;신재호
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.14 no.4
    • /
    • pp.183-194
    • /
    • 2004
  • The proliferation of the Internet and the rapid progress of wire/wireless communication technology makes security of digital images more and more important since the exchanges of digital images occur more and more frequently. And as the tight relationship between chaos theory and cryptography, many researches for development of new encryption systems based on chaotic maps have been widely progressed recently. In this paper, we propose a digital image encryption system based on both one-dimensional PLCM(Piecewise Linear Chaotic Map) and two-dimensional baker map. This proposed system is a product cipher that contains a perturbance-based chaotic stream cipher based on ID PLCM and a chaotic block cipher based on 2D baker map and is very high secure and easily implementable cipher having both a good confusion property and a good diffusion property. And with test results, we showed this system is very secure against statistical attacks.

Nonlinear dynamic analysis of SWNTs conveying fluid using nonlocal continuum theory

  • Kordkheili, Seyed Ali Hosseini;Mousavi, Taha;Bahai, Hamid
    • Structural Engineering and Mechanics
    • /
    • v.66 no.5
    • /
    • pp.621-629
    • /
    • 2018
  • By employing the nonlocal continuum field theory of Eringen and Von Karman nonlinear strains, this paper presents an analytical model for linear and nonlinear dynamics analysis of single-walled carbon nanotubes (SWNTs) conveying fluid with different boundary conditions. In the linear analysis the natural frequencies and critical flow velocities of SWNTs are computed. However, in the nonlinear analysis the effect of nonlocal parameter on nonlinear dynamics of cantilevered SWNTs conveying fluid is investigated by using bifurcation diagram, phase plane and Poincare map. Numerical results confirm existence of chaos as well as a period-doubling transition to chaos.

Anticontrol of Chaos for a Continuous-time TS Fuzzy System via Time-delay Feedback

  • Zhong Li;Park, Jin-Bea;Joo, Young-Hoon
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2001.10a
    • /
    • pp.108.1-108
    • /
    • 2001
  • A time-delay feedback control approach is proposed for making a given stable continuous-time Takagi-Sugeno (TS) fuzzy system chaotic, which is based on the fuzzy feedback linearization and a suitable approximate relationship between a time-delay differential equation and a discrete map. The time-delay feedback controller, chosen among several candidates, is a simple sinusoidal function of the delay states of the system, which has small amplitude. This approach is mathematically proven for rigorous generation of chaos from stable continuous-time TS fuzzy systems, where the generated chaos is in the sense of Li and Yorke. Numerical examples are included to visualize the theoretical analysis and the controller design.

  • PDF

Development of Efficient Encryption Scheme on Brain-Waves Using Five Phase Chaos Maps

  • Kim, Jung-Sook;Chung, Jang-Young
    • International Journal of Fuzzy Logic and Intelligent Systems
    • /
    • v.16 no.1
    • /
    • pp.59-63
    • /
    • 2016
  • Secondary damage to the user is a problem in biometrics. A brain-wave has no shape and a malicious user may not cause secondary damage to a user. However, if user sends brain-wave signals to an authentication system using a network, a malicious user could easily capture the brain-wave signals. Then, the malicious user could access the authentication system using the captured brain-wave signals. In addition, the dataset containing the brain-wave signals is large and the transfer time is long. However, user authentication requires a real-time processing, and an encryption scheme on brain-wave signals is necessary. In this paper, we propose an efficient encryption scheme using a chaos map and adaptive junk data on the brain-wave signals for user authentication. As a result, the encrypted brain-wave signals are produced and the processing time for authentication is reasonable in real-time.

Analysis of Response behaviors of offshore mooring structures by a piecewise-linear system (구분적선형시스템을 이용한 해양 구조물의 거동분석)

  • 마호성
    • Computational Structural Engineering
    • /
    • v.10 no.4
    • /
    • pp.251-265
    • /
    • 1997
  • A piecewise-linear system is utilized to model the offshore mooring system. The approximated piecewise-linear restoring force is obtained to be compared with the analytically derived restoring force of a mooring system. Two systems are compared to verify the applicability of the piecewise-linear system to evaluate responses of the mooring system. Using the piecewise-linear system, the response behaviors of mooring systems are examined under various excitations. Nonlinearity of the system and effects of both system and excitation parameters are intensively examined. System responses are identified mainly by observing Poincare maps. The mooring system is found to have various types of responses such as regular harmonic, subharmonic and complex nonlinear behaviors, including chaos by utilizing a piecewise-linear system. Various values of parameters are applied to determine the effects of parameters upon system responses. Response domains are determined by establishing parametric maps.

  • PDF

Performance Evaluation of a Novel Chaos Transceiver for the High Level Modulation (고레벨 변조를 위한 새로운 카오스 송수신기의 성능 평가)

  • Lee, Jun-Hyun;Ryu, Heung-Gyoon
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.51 no.1
    • /
    • pp.31-36
    • /
    • 2014
  • Security of chaos communication system that has characteristic of sensitive initial conditions is superior to digital communication systems, but BER(Bit Error Rate) performance is evaluatied badly. So, studies in order to improve the BER performance is important. existing studies, BER performance of proposed chaos transceiver is possible to improve than the CDSK(Correlation Delay Shift Keying) system because it has characteristic that has very few addition elements like noise signal except for the desired signal. Chaos communication system has many symbols because it spreads according to characteristic of chaos map. Therefore, study that can have the good data rate in chaos communication system is required. Information bits of existing chaos modulation system are modulated as -1 and 1 on the basis of BPSK system. However, instead of BPSK system, if chaos communication system is applied high level modulation systems such as QPSK system and 16QAM system, it is possible to have good data rate because more data are transmitted at a time. In the paper, when QPSK system and 16QAM system are applied to proposed chaos transceiver in existing study, we evaluate the SER(Symbol Error Rate) performance and compare the each performance. Also, when QPSK system and 16QAM system are applied to proposed chaos transceiver, we evaluate the anti-jamming performance of proposed system.

An Image Encryption Scheme Based on Concatenated Torus Automorphisms

  • Mao, Qian;Chang, Chin-Chen;Wu, Hsiao-Ling
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.7 no.6
    • /
    • pp.1492-1511
    • /
    • 2013
  • A novel, chaotic map that is based on concatenated torus automorphisms is proposed in this paper. As we know, cat map, which is based on torus automorphism, is highly chaotic and is often used to encrypt information. But cat map is periodic, which decreases the security of the cryptosystem. In this paper, we propose a novel chaotic map that concatenates several torus automorphisms. The concatenated mechanism provides stronger chaos and larger key space for the cryptosystem. It is proven that the period of the concatenated torus automorphisms is the total sum of each one's period. By this means, the period of the novel automorphism is increased extremely. Based on the novel, concatenated torus automorphisms, two application schemes in image encryption are proposed, i.e., 2D and 3D concatenated chaotic maps. In these schemes, both the scrambling matrices and the iteration numbers act as secret keys. Security analysis shows that the proposed, concatenated, chaotic maps have strong chaos and they are very sensitive to the secret keys. By means of concatenating several torus automorphisms, the key space of the proposed cryptosystem can be expanded to $2^{135}$. The diffusion function in the proposed scheme changes the gray values of the transferred pixels, which makes the periodicity of the concatenated torus automorphisms disappeared. Therefore, the proposed cryptosystem has high security and they can resist the brute-force attacks and the differential attacks efficiently. The diffusing speed of the proposed scheme is higher, and the computational complexity is lower, compared with the existing methods.

Stability Improvement of the Chaos Encryption Algorithm (카오스 암호화 알고리즘의 안정성 개선)

  • 박혜련;정갑식;이윤수;이종혁
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2002.05a
    • /
    • pp.469-472
    • /
    • 2002
  • 본 논문에서는 카오스에 기반을 둔 ELM(Expanding Logistic Map) 암호화 알고리즘을 개선하기 위해 CELM(Cascade Expanding Logistic Map)을 제안한다. 제안된 암호화 시스템은 3차 방정식에 기반을 둔 ELM의 차수를 증가시켜 키의 범위를 확대하고, 서로 다른 Key 값과 초기 값의 함수를 Cascade연결하여 안정성을 높일 수 있었다.

  • PDF