The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In this paper, iteration method of logistic map with low positions is introduced in order to investigate property of logistic map. Basic structure of logistic map is proposed, which consists of common gene positions (CGPs) and individual gene positions (IGPs). CGPs have the same value of corresponding positions which transferred from previous numerical solutions. The ergodicity and long-term unpredictability...
A method of encryption for embedding a meaningful gray image in the frequency domains of an audio signal is described. Chaotic sequence based on logistic map is adopted to improve the security of the proposed watermarking scheme by quantizing wavelet packet coefficients of audio samples. Simulations under various conditions are given to verify the effectiveness of the audio watermarking scheme. The...
The concepts of chaotic quasi-random variables and chaotic quasi-random process are proposed in this paper. The study focuses on viewing from a new viewpoint to descript chaotic signal generated by Logistic mapping for communication. We find that although chaos has essential difference from random, it also can be seen by a new view to some extent. This paper shows the probability, with theoretical...
Symmetric stream cipher with chaotic maps have been proven to be feasible and secure for digital image encryption, where 2D Cat map as well as Baker map are usually employed to permute pixels and 1D chaotic maps are employed to diffuse the values of pixels. In this paper, a new permutation method with perturbation strategy is proposed, which is used to enhance the performance of Cat map and hence...
The shortage of original AES key generation and expansion strategy was researched. Based on these researches, the new AES key generation and expansion algorithms are proposed. In these algorithms, two-dimensional Logistic mapping is used to reduce the dependence between sub-keys. Experimental result shows that the security and robustness of the AES sub-keys have been strengthened.
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.