您的位置: 专家智库 > >

国家自然科学基金(61173183)

作品数:19 被引量:57H指数:4
相关作者:王兴元梁义赵玉章刘莹张永雷更多>>
相关机构:大连理工大学伊犁师范学院新疆财经大学更多>>
发文基金:国家自然科学基金国家教育部博士点基金辽宁省自然科学基金更多>>
相关领域:理学自动化与计算机技术电子电信经济管理更多>>

文献类型

  • 19篇期刊文章
  • 1篇会议论文

领域

  • 13篇理学
  • 6篇自动化与计算...
  • 4篇电子电信
  • 1篇经济管理
  • 1篇化学工程
  • 1篇电气工程
  • 1篇医药卫生

主题

  • 5篇混沌
  • 4篇选择明文攻击
  • 4篇图像
  • 4篇明文
  • 4篇加密
  • 3篇网络
  • 3篇CRYPTA...
  • 2篇映射
  • 2篇神经网
  • 2篇神经网络
  • 2篇混沌神经网络
  • 2篇混沌同步
  • 2篇加密方案
  • 2篇加密算法
  • 2篇复杂网
  • 2篇复杂网络
  • 2篇SPATIO...
  • 2篇CHAOTI...
  • 1篇代理
  • 1篇低阶

机构

  • 4篇大连理工大学
  • 2篇伊犁师范学院
  • 1篇新疆财经大学
  • 1篇山东经贸职业...

作者

  • 4篇王兴元
  • 2篇梁义
  • 1篇任小丽
  • 1篇刘莹
  • 1篇赵玉章
  • 1篇张永雷

传媒

  • 14篇Chines...
  • 4篇物理学报
  • 1篇物流技术

年份

  • 1篇2019
  • 2篇2018
  • 1篇2015
  • 2篇2014
  • 5篇2013
  • 8篇2012
  • 1篇2011
19 条 记 录,以下是 1-10
排序方式:
参数未知神经元模型的全阶与降阶最优同步被引量:2
2012年
基于Lyapunov稳定性理论、最优控制原理以及分步设计方法,为神经元系统设计了非线性反馈控制器和最优控制器.其中非线性反馈控制器能使得两个神经元系统之间的轨道误差趋于零,最优控制器使得在同步过程中所花费的能量达到最低.本文以Cable模型为例,实现了两个神经元模型的全阶最优同步;以Cable模型和Hindmarsh-Rose(HR)模型为例,实现了两个神经元模型的降阶最优同步;同时,均能有效地辨识出系统参数.最后通过数值模拟进一步验证了本方案的有效性.
王兴元任小丽张永雷
关键词:神经元
Cryptanalysis on an image block encryption algorithm based on spatiotemporal chaos被引量:1
2012年
An image block encryption scheme based on spatiotemporal chaos has been proposed recently.In this paper,we analyse the security weakness of the proposal.The main problem of the original scheme is that the generated keystream remains unchanged for encrypting every image.Based on the flaws,we demonstrate a chosen plaintext attack for revealing the equivalent keys with only 6 pairs of plaintext/ciphertext used.Finally,experimental results show the validity of our attack.
王兴元何国祥
关键词:图像块选择明文攻击加密方案密钥流
A novel pseudo-random coupled LP spatiotemporal chaos and its application in image encryption被引量:3
2018年
In this paper, first, we investigate a novel one-dimensional logistic-PWLCM(LP) modulation map which is derived from the logistic and PWLCM maps. Second, we propose a novel PCLML spatiotemporal chaos in pseudo-random coupling method that can accelerate the system behavior of the fully spatial chaos. Here, because the better chaotic properties include a wide range of parameter settings and better ergodicity than a logistic map, the LP is used in PCLML as f(x). The Kolmogorov–Sinai entropy density and universality and the bifurcation diagram are employed to investigate the chaotic behaviors of the proposed PCLML model. Finally, we apply the LP and PCLML chaotic systems to image encryption to improve the effectiveness and security of the encryption scheme. By combining self-generating matrix model M and dynamic substitution box(S-Box) methods, we design a new image encryption algorithm. Numerical simulations and security analysis have been carried out to demonstrate that the proposed algorithm has a high security level and can efficiently encrypt several different kinds of images into random-like images.
王兴元王宇王思伟张盈谦武相军
New chaotical image encryption algorithm based on Fisher–Yatess scrambling and DNA coding被引量:8
2019年
Based on the Fisher–Yatess scrambling and DNA coding technology, a chaotical image encryption method is proposed. First, the SHA-3 algorithm is used to calculate the hash value of the initial password, which is used as the initial value of the chaotic system. Second, the chaotic sequence and Fisher–Yatess scrambling are used to scramble the plaintext,and a sorting scrambling algorithm is used for secondary scrambling. Then, the chaotic sequence and DNA coding rules are used to change the plaintext pixel values, which makes the ciphertext more random and resistant to attacks, and thus ensures that the encrypted ciphertext is more secure. Finally, we add plaintext statistics for pixel-level diffusion to ensure plaintext sensitivity. The experimental results and security analysis show that the new algorithm has a good encryption effect and speed, and can also resist common attacks.
王兴元张钧荐张付臣曹光辉
关键词:SCRAMBLINGCHAOTICDNACODINGENCRYPTION
Cryptanalysis and improvement of a digital image encryption method with chaotic map lattices被引量:2
2013年
A digital image encryption scheme using chaotic map lattices has been proposed recently. In this paper, two fatal flaws of the cryptosystem are pointed out. According to these two drawbacks, cryptanalysts could recover the plaintext by applying the chosen plaintext attack. Therefore, the proposed cryptosystem is not secure enough to be used in the image transmission system. Experimental results show the feasibility of the attack. As a result, we make some improvements to the encryption scheme, which can completely resist our chosen plaintext attack.
王兴元刘林涛
关键词:选择明文攻击图像传输系统加密方案
A fast image encryption algorithm based on only blocks in cipher text被引量:2
2014年
In this paper, a fast image encryption algorithm is proposed, in which the shuffling and diffusion is performed simultaneously. The cipher-text image is divided into blocks and each block has k × k pixels, while the pixels of the plain-text are scanned one by one. Four logistic maps are used to generate the encryption key stream and the new place in the cipher image of plain image pixels, including the row and column of the block which the pixel belongs to and the place where the pixel would be placed in the block. After encrypting each pixel, the initial conditions of logistic maps would be changed according to the encrypted pixel's value; after encrypting each row of plain image, the initial condition would also be changed by the skew tent map. At last, it is illustrated that this algorithm has a faster speed, big key space, and better properties in withstanding differential attacks, statistical analysis, known plaintext, and chosen plaintext attacks.
王兴元王倩
关键词:图像加密算法选择明文攻击帐篷映射密钥空间差分攻击
New Linear Generalized Synchronization and Parameter Identification between Different Chaotic Systems
The stability of a linear generalized synchronization approach between different chaotic systems with unknown ...
Chao MaXingyuan WangYujuan Tian
文献传递
基于低阶矩阵最大特征值的复杂网络牵制混沌同步被引量:4
2012年
虽已对复杂网络牵制同步需要牵制结点数量及牵制结点数量与耦合强度的关系进行了研究,然而快速计算牵制结点数量仍是大规模复杂网络面临的一个重要问题.研究发现了复杂网络耦合矩阵主子阵最大值递减规律,由此提出了快速计算复杂网络牵制结点数量的方法,揭示了不同的牵制策略与牵制结点数量之间的关系.数值仿真显示了在无标度网络和小世界网络上三种不同的牵制策略下,牵制结点数与主子阵最大特征值的变化规律;最后给出了一个在无标度网络上采用随机选择结点策略的牵制同步实例.
梁义王兴元
关键词:复杂网络主子阵
A secure key agreement protocol based on chaotic maps
2013年
To guarantee the security of communication in the public channel,many key agreement protocols have been proposed.Recently,Gong et al.proposed a key agreement protocol based on chaotic maps with password sharing.In this paper,Gong et al.’s protocol is analyzed,and we find that this protocol exhibits key management issues and potential security problems.Furthermore,the paper presents a new key agreement protocol based on enhanced Chebyshev polynomials to overcome these problems.Through our analysis,our key agreement protocol not only provides mutual authentication and the ability to resist a variety of common attacks,but also solve the problems of key management and security issues existing in Gong et al.’s protocol.
王兴元栾大朋
关键词:密钥协商协议混沌映射切比雪夫多项式密钥管理公共通道
参数未知的统一超混沌系统自适应反同步被引量:6
2011年
文章研究了参数未知的统一超混沌系统的控制与同步问题.首先基于Lyapunov稳定性理论,设计了自适应控制器,证明了该控制器可使参数未知统一超混沌系统渐近稳定于不动点.其次使用自适应反同步方法,设计了自适应同步控制器,实现了参数未知统一超混沌系统的完全同步,最后数值仿真实验进一步验证了所提出方案的有效性.
阿布都热合曼.卡的尔王兴元赵玉章
关键词:自适应控制器
共2页<12>
聚类工具0