Xinlei An, Jian-Ning Yu, Jiangang Zhang, Zhansong Peng
{"title":"一种新型多级混沌保密通信同步系统","authors":"Xinlei An, Jian-Ning Yu, Jiangang Zhang, Zhansong Peng","doi":"10.1109/IWCFTA.2009.15","DOIUrl":null,"url":null,"abstract":"Based on Lyapunov stabilization theorem, considering the diffusionless chaotic system, a method is proposed for global chaos synchronization of three identical systems. Meanwhile, the method of three different structures chaotic systems global synchronization is shown. Then this method is applied to secure communication through chaotic masking, use three coupled identical systems, propose a novel method of chaos encryption, after encrypting in the first two coupled systems, do it again in the later two coupled systems. Simulation results show that the method can realize monotonous synchronization. Further more, the information signal can be recovered undistorted when applying this method to secure communication.","PeriodicalId":235382,"journal":{"name":"2009 Fifth International Conference on Natural Computation","volume":"39 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2009-11-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":"{\"title\":\"A New Multistage Chaos Synchronized System for Secure Communications\",\"authors\":\"Xinlei An, Jian-Ning Yu, Jiangang Zhang, Zhansong Peng\",\"doi\":\"10.1109/IWCFTA.2009.15\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Based on Lyapunov stabilization theorem, considering the diffusionless chaotic system, a method is proposed for global chaos synchronization of three identical systems. Meanwhile, the method of three different structures chaotic systems global synchronization is shown. Then this method is applied to secure communication through chaotic masking, use three coupled identical systems, propose a novel method of chaos encryption, after encrypting in the first two coupled systems, do it again in the later two coupled systems. Simulation results show that the method can realize monotonous synchronization. Further more, the information signal can be recovered undistorted when applying this method to secure communication.\",\"PeriodicalId\":235382,\"journal\":{\"name\":\"2009 Fifth International Conference on Natural Computation\",\"volume\":\"39 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2009-11-06\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"2\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2009 Fifth International Conference on Natural Computation\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/IWCFTA.2009.15\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2009 Fifth International Conference on Natural Computation","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/IWCFTA.2009.15","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
A New Multistage Chaos Synchronized System for Secure Communications
Based on Lyapunov stabilization theorem, considering the diffusionless chaotic system, a method is proposed for global chaos synchronization of three identical systems. Meanwhile, the method of three different structures chaotic systems global synchronization is shown. Then this method is applied to secure communication through chaotic masking, use three coupled identical systems, propose a novel method of chaos encryption, after encrypting in the first two coupled systems, do it again in the later two coupled systems. Simulation results show that the method can realize monotonous synchronization. Further more, the information signal can be recovered undistorted when applying this method to secure communication.