The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
With the development of networking and communications technology, data transmission has penetrated into all aspects of life. Such information security has become a problem we have to consider about, Secure transmission of data has become an important indicator of the exchange of information. As the chaotic system has good encryption features, so this paper describes a method of digital encryption...
It has been proved that Local-Period phenomena widely exsit in any chaotic binary sequence. Among the reasons of Local-Period phenomena existing, quantifications of chaotic binary random numnber generators are the key factor. This paper proposed that different quantifications could make sequences have different randomness from the same chaotic real-value seqence. The simulation results illustrated...
As digital chaos is affected by the limited precision of computer, chaotic sequence properties present short periodicity. For the phenomenon of digital chaos, the paper analyzes similar-short periodicity of digital chaos and puts forward a novel generator of digital chaos key sequence. Meanwhile, we detail the DCT (Discrete Cosine Transformation) compression and Wavelet compression method, and then...
Due to extensive research of non-linear science theory (the chaos) in the image encryption, we find especially that the properties of chaos make itself particularly suitable for image encryption. On the basis of many excellent features of chaotic sequence, combining application of chaotic theory in cryptography, the paper puts forward image encryption based on chaotic binary sequence. On Logistic...
This paper proposes a new scheme design and hardware implementation of wireless transmission system based on FPGA and chaotic encryption with A5/1 algorithm. This design uses FPGA chip as the encryption core, in which Logistic system generates the initial key and encrypts the plaintext combined with A5/1 algorithm, then it uses SIM300 module to realize wireless transmission. Develop two test boards...
Chaotic special properties make the chaotic encryption technology to be an important research field of information science and technology. However, as digital chaos is affected by the limited precision of computer, chaos system properties present degradation--short periodicity of output sequence. This paper proposes K-L transform method for Logistic 0/1 sequence, and then analyses time-autocorrelation,...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.