CN101436928B - Parameter estimation method for chaos system - Google Patents
Parameter estimation method for chaos system Download PDFInfo
- Publication number
- CN101436928B CN101436928B CN2008102367274A CN200810236727A CN101436928B CN 101436928 B CN101436928 B CN 101436928B CN 2008102367274 A CN2008102367274 A CN 2008102367274A CN 200810236727 A CN200810236727 A CN 200810236727A CN 101436928 B CN101436928 B CN 101436928B
- Authority
- CN
- China
- Prior art keywords
- chaos
- sequence
- analyzed
- parameter
- chaos sequence
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Expired - Fee Related
Links
Images
Landscapes
- Complex Calculations (AREA)
Abstract
The invention discloses a method for estimating a parameter for a chaotic system. The method comprises a chaotic system type determination process, a chaotic parameter rang estimation process and a chaotic parameter determination process. Under the condition of only obtaining a finite chaotic state sequence, the method can estimate the type and parameters of chaotic mapping. The method breaks the condition limitation that the prior chaotic parameter estimation method can only aim at the prior chaotic mapping and carry out estimation under the condition that only one of the system parameters is unknown. The parameter estimation method can be widely applied to security analysis based on a chaotic cipher system and a security communication system, does not need to be based on the chaotic mapping type, parameters and other conditions in the analytic process and has strong applicability and maneuverability.
Description
Technical field
The invention belongs to information security safety analysis technology, be specifically related to a kind ofly, can be widely used in based on fields such as the cryptographic system of chaos and secret signalling safety analysis at chaos method for parameter estimation based on the cryptographic system and the secret signalling of chaos.
Background technology
Existing safety analysis technology at chaos cipher system and secret signalling mainly adopts as methods such as genetic algorithm, improvement particle swarm optimization algorithms to be estimated the parameter of chaotic maps.Yet in actual application, these safety analytical methods exist realizes that difficulty is big, and efficiency of evolution is low, problems such as low precision.Therefore said method only is in theoretical research stage, can not be as the safety analysis method of actual cryptographic system or secret signalling.
Paper " a kind of chaotic maps method for parameter estimation based on genetic algorithm " (is worn, Ma Xikui, Li Fucai, outstanding brave, Acta Physica Sinica, 2002 (51), 11, a kind of chaotic maps method for parameter estimation based on genetic algorithm has been proposed in P2459-4), this method is by suitable fitness function of structure, the parameter Estimation problem of chaotic maps is converted into the optimizing problem of a parameter, utilizes the global optimization search capability of genetic algorithm that it is found the solution then.Yet this method only can be meaningful at short notice.Along with the long-time evolution of system, the error between estimated parameter institute's characterization system and the real system will increase.In addition, this method only at the situation of a unknown parameters of chaotic maps, yet for the condition of whole system parameters the unknowns, can only the searching for of this method in a bigger scope, efficient is low, poor accuracy.
Summary of the invention
The object of the present invention is to provide a kind of method for parameter estimation that is used for chaos system, this method can be under the condition of unknown password system or the employed chaotic maps type of secret signalling, parameter to chaotic maps estimates that it is fast that it has analysis speed, the characteristics that accuracy is high.
For realizing purpose of the present invention, the method for parameter estimation that is used for chaos system provided by the invention, its step comprises:
(A1) according to chaos system type and parameter information, determine parameter group, the quantity of parameter group is l, and l is a positive integer;
(A2) use respectively every group of parameter generate one with the isometric comparison chaos sequence { C1 of chaos sequence to be analyzed { T (i) }
j(i) }, wherein, i represents the sequence number of element in the chaos sequence to be analyzed, i=1, and 2 ..., N, N represent the length of chaos sequence to be analyzed, j represents to be used to generate the sequence number of the parameter group of this comparison chaos sequence, and j=1,2 ..., l;
(A3) calculate the nonlinear characteristic amount of chaos sequence to be analyzed { T (i) }, comprise time delay τ and embed dimension d;
(A4) according to time delay τ that calculates and embedding dimension d, chaos sequence to be analyzed { T (i) } and each are compared chaos sequence { C1
j(i) } carry out phase space reconfiguration, obtain respectively the vector sequence { T (i) } that reconstitutes and C1 '
j(i) };
T′(i)={T(i),T(i+τ),...,T(i+(d-1)τ)}
C1′
j(i)={C1
j(i),C1
j(i+τ),...,C1
j(i+(d-1)τ)}
(A5) calculate each vector sequence that reconstitutes { T (i) } and C1 '
j(i) } Central Moment Feature amount λ
TWith
(A6) according to vector sequence T (i), utilize statistical analysis technique, calculate the threshold epsilon that is used for critical parameter;
(A7) the Central Moment Feature amount λ of chaos sequence more to be analyzed
TWith the Central Moment Feature amount that compares chaos sequence
, obtain the comparison chaos sequence of its difference, with the system parameters of the comparison chaos sequence that obtains parameter Estimation result as chaos sequence to be analyzed smaller or equal to ε.
When chaos cipher system or secret signalling adopt multiple chaos system, under chaos system type condition of unknown, entering step (A1) before, according to following step the chaos sequence that chaos sequence to be analyzed and chaotic maps to be selected generate is carried out the nonlinear correlation degree relatively, determine the chaos system type that chaos cipher system to be analyzed or secret signalling are adopted when generating chaos sequence to be analyzed:
(B1) according to the design rule of chaos cipher system to be analyzed or secret signalling, the n kind chaos system type that definite random source that generates this chaos sequence to be analyzed { T (i) } can be adopted;
(B2) the n kind chaos system that utilizes above step to determine adopts classical parameter setting, generates and the identical comparison chaos sequence { C2 of chaos sequence to be analyzed { T (i) } length
k(i) }, k represents to be used to generate the sequence number of the chaos system type of this comparison chaos sequence, k=1, and 2 ..., n, n represent the quantity of chaos system type;
(B3) the nonlinear characteristic amount of calculating chaos sequence to be analyzed comprises embedding dimension d and time delay τ;
(B4) according to the embedding peacekeeping time delay of determining, to chaos sequence to be analyzed { T (i) } and comparison chaos sequence { C2
k(i) } carry out phase space reconfiguration, obtain:
T′(i)={T(i),T(i+τ),...,T(i+(d-1)τ)}
C2′
k(i)={C2
k(i),C2
k(i+τ),...,C2
k(i+(d-1)τ)}
(B5) calculate T (i) and the C2 that reconstruct obtains
k' (i) dynamics auto-correlation factor index, that is:
Wherein:
Θ is the Heaviside step function.
(B6) comparison chaos sequence and the chaos sequence to be analyzed with chaos sequence dynamics auto-correlation factor index value minimum to be analyzed results from identical chaos system; Draw the chaos system type that chaos cipher system to be analyzed or secret signalling are adopted thus when generating chaos sequence to be analyzed.
This method is compared with existing method, has overcome the condition restriction that existing chaos method for parameter estimation can only only have the condition an of the unknown to estimate at known chaotic maps and system parameters.This system can type and the parameter to chaotic maps estimate under the condition that only obtains limited chaos state sequence.This method for parameter estimation can be widely used in the safety analysis based on the cryptographic system and the secret signalling of chaos, and analytic process need not to have stronger adaptability and operability based on conditions such as chaotic maps type and parameters.Compare with documents " a kind of chaotic maps method for parameter estimation based on genetic algorithm ", the present invention has following characteristics:
(1), the chaos sequence that chaos sequence to be analyzed and chaotic maps to be selected are generated carries out the nonlinear correlation degree relatively, determine the type of chaotic maps to be analyzed, thereby can under the condition of unknown chaotic maps type, analyze, strengthen the adaptability of this analytical method.
(2), compare, seek possible the value space of parameter, dwindle the parameter search scope, improve analysis efficiency, reduction overall calculation complexity by the Central Moment Feature amount.
(3), in determining parameter space, utilize possible parameter to generate chaos sequence, the chaos sequence of chaos sequence to be analyzed and generation is compared, determine whole system parameters spans of chaotic maps to be analyzed.
Description of drawings
Fig. 1 is the flow chart of chaos method for parameter estimation of the present invention;
Fig. 2 is for determining the method flow diagram of chaotic maps type;
Fig. 3 is for determining the method flow diagram of chaos parameter value scope.
Embodiment
The present invention is further detailed explanation below in conjunction with accompanying drawing and example.
The invention provides a kind of to based on the cryptographic system of chaos and the safety analysis method of secret signalling.This method is estimated the chaos system type of cryptographic system and secret signalling employing by the chaos sequence for the treatment of that analysis collects, according to the Given informations such as parameter information of cryptographic system and secret signalling the parameter that this chaos system adopts is estimated on this basis.
As shown in Figure 1, the step of the inventive method is as follows:
(1) cryptographic system or the secret signalling based on chaos might adopt following dual mode to design random source: one, single chaos system; Two, multiple chaos system.If chaos cipher system to be analyzed or secret signalling adopt mode directly to enter step (2) first, if chaos cipher system to be analyzed or secret signalling adopt mode two, then this step is carried out the nonlinear correlation degree relatively with the chaos sequence that chaos sequence to be analyzed and chaotic maps to be selected generate, and determines the chaos system type that chaos cipher system to be analyzed or secret signalling are adopted when generating chaos sequence to be analyzed.Its specific implementation process comprises as shown in Figure 2:
(1.1) design rule of chaos cipher system to be analyzed or secret signalling, the n kind chaos system type that definite random source that generates this chaos sequence to be analyzed may be adopted;
(1.2) each chaos system that utilizes above step to determine adopts classical parameter setting, generates the comparison chaos sequence { C2 that is all length N with chaos sequence to be analyzed { T (i) }
k(i) }, wherein, i represents the sequence number of element in the chaos sequence to be analyzed, i=1,2, ..., N, N represent the length of chaos sequence to be analyzed, k represents to be used to generate the sequence number of the chaos system type of this comparison chaos sequence, k=1,2 ..., n, n represent the quantity of chaos system type;
(1.3) the nonlinear characteristic amount of calculating chaos sequence to be analyzed: embed dimension d and time delay τ;
(1.4) according to the result of step (1.3), to chaos sequence to be analyzed { T (i) } and chaos sequence { C2 relatively
k(i) } carry out phase space reconfiguration, obtain:
T′(i)={T(i),T(i+τ),...,T(i+(d-1)τ)}
C2′
k(i)={C2
k(i),C2
k(i+τ),...,C2
k(i+(d-1)τ)}
(1.5) calculate T (i) and the C2 that reconstruct obtains
k' (i) dynamics auto-correlation factor index, that is:
Wherein:
Θ is the Heaviside step function.
(1.6) comparison chaos sequence and the chaos sequence to be analyzed with chaos sequence dynamics auto-correlation factor index value minimum to be analyzed results from identical chaos system.Draw the chaos system type that chaos cipher system to be analyzed or secret signalling are adopted thus when generating chaos sequence to be analyzed.
(2) can in specific scope, choose the parameter generation chaos sequence of specific parameter according to key protocol based on the cryptographic system or the secret signalling of chaos as chaos system.Therefore will in possible parameter value, compare the possible value of searching and definite parameter by the Central Moment Feature amount.Its specific implementation process comprises as shown in Figure 3:
(2.1) according to the result and the parameter information of step (1), determine possible parameter group, species number is l;
(2.2), generate and the isometric comparison chaos sequence { C1 of chaos sequence to be analyzed according to every group of possible parameter
j(i) } (j=0,1,2..., l);
(2.3) result according to step (1.3) carries out phase space reconfiguration { C1 according to the method for step (1.4) to each comparison chaos sequence
j(i) } (j=0,1,2... l), obtains the vector sequence after the reconstruct;
C1′
j(i)={C1
j(i),C1
j(i+τ),...,C1
j(i+(d-1)τ)}
(2.4) calculate vector sequence T (i) and the C1 ' that each reconstitutes
j(i) Central Moment Feature amount λ
TWith
(2.5) according to vector sequence T (i), utilize statistical analysis technique, calculate the threshold epsilon that is used for critical parameter;
(2.6) the Central Moment Feature amount λ of chaos sequence more to be analyzed
TWith the Central Moment Feature amount that compares chaos sequence
, obtain the comparison chaos sequence of its difference, with the system parameters of the comparison chaos sequence that relatively obtains estimated result as chaos sequence to be analyzed smaller or equal to ε.
Example 1:
Suppose A for the chaos cipher system, according to its design and key protocol, known following information:
(1) this cryptographic system may be chosen a random source of conduct in a plurality of chaos systems, these chaos systems comprise the Lorenz chaos system, Chen chaos system, three kinds of three-dimensional chaos systems of Lu chaos system, and the sampling interval that produces chaos sequence is 1ms, and its chaos system equation is as follows:
Lorenz chaotic maps equation:
Chen chaotic maps equation:
Lu chaotic maps equation:
(2) for the Lorenz chaos system, its parameter value scope is:
a∈{x|x=7+0.2*i,i=0,1,...,30}
b∈{x|x=25+0.2*i,i=0,1,...,30}
c∈{x|x=2/3+0.2*i,i=0,1,...,20}
For the Chen chaos system, its parameter value scope is:
a∈{x|x=32+0.2*i,i=0,1,...,30}
b∈{x|x=25+0.2*i,i=0,1,...,30}
c∈{x|x=2/3+0.2*i,i=0,1,...,20}
For the Lu chaos system, its parameter value scope is:
a∈{x|x=33+0.2*i,i=0,1,...,30}
b∈{x|x=17+0.2*i,i=0,1,...,30}
c∈{x|x=1+0.2*i,i=0,1,...,20}
(3) chaos sequence to be analyzed comprises x, y, three dimension { T of z
x(i) }, { T
y(i) }, { T
z(i) }, wherein, i represents the sequence number of element in the chaos sequence to be analyzed, i=1, and 2 ..., 1,000,000.
By analyzing known chaos sequence { T
x(t
i), { T
y(t
i), { T
z(t
i), the type and the system parameters of the chaos system that generates this sequence are estimated that concrete implementation method is as follows:
(1) determine the chaos system type:
(1.1), learn that the chaos cipher system may adopt following 3 kinds of chaos systems: Lorenz chaos system, Chen chaos system, Lu chaos system according to Given information (1);
(1.2) chaos system of determining according to step (1.1), generation length are 1,000,000 three-dimensional comparison chaos sequence { C2
Lorenz_x(i) }, { C2
Lorenz_y(i) }, { C2
Lorenz_z(i) }, { C2
Chen_x(i) }, { C2
Chen_y(i) }, { C2
Chen_z(i) }, { C2
Lu_x(i) }, { C2
Lu_y(i) }, { C2
Lu_z(i) }, wherein the parameter of chaos system is classical parameter setting, { a
Lorenz=10, b
Lorenz=28, c
Lorenz=8/3}, { a
Chen=35, b
Chen=28, c
Chen=8/3}, { a
Lu=36, b
Lu=20, c
Lu=3};
(1.3) utilize pseudo-neighbor point to calculate the embedding dimension d of chaos sequence to be analyzed
x, d
y, d
z, utilize mutual information method to calculate the time delay τ of chaos sequence to be analyzed
x, τ
y, τ
z
(1.4) according to the result of step (1.3), to chaos sequence { T to be analyzed
x(i) }, { T
y(i) }, { T
z(i) } chaos sequence { C2 and relatively
Lorenz_x(i) }, { C2
Lorenz_y(i) }, { C2
Lorenz_z(i) }; { C2
Chen_x(i) }, { C2
Chen_y(i) }, { C2
Chen_z(i) }; { C2
Lu_x(i) }, { C2
Lu_y(i) }, { C2
Lu_z(i) }, carry out phase space reconfiguration, obtain the sequence { T after the reconstruct
x' (i) }, { T
y' (i) }, { T
z' (i) }; { C2
Lorenz_x' (i) }, { C2
Lorenz_y' (i) }, { C2
Lorenz_z' (i) }; { C2
Chen_x' (i) }, { C2
Chen_y' (i) }, { C2
Chen_z' (i) }; { C2
Lu_x' (i) }, { C2
Lu_y' (i) }, { C2
Lu_z' (i) };
(1.5) calculate { T
xAnd { C2 (i) }
Lorenz_x(i) }; { T
xAnd { C2 (i) }
Chen_x(i) }; { T
xAnd { C2 (i) }
Lu_x(i) }; { T
yAnd { C2 (i) }
Lorenz_y(i) }; { T
yAnd { C2 (i) }
Chen_y(i) }; { T
yAnd { C2 (i) }
Lu_y(i) }; { T
zAnd { C2 (i) }
Lorenz_z(i) }; { T
zAnd { C2 (i) }
Chen_z(i) }; { T
zAnd { C2 (i) }
Lu_zDynamics auto-correlation factor index (ii) }:
(1.6) the dynamics auto-correlation factor index that calculates by comparison step (1.5), the result points out:
Be the dynamics auto-correlation factor index minimum of the comparative sequences of chaos sequence to be analyzed and Chen chaos system generation, illustrate that chaos sequence to be analyzed is to have the Chen chaos system to generate;
(2) determine the possible value of the parameter of chaos system:
(2.1) chaos system of Chen as a result and the Given information of determining according to step (1) (2) determined parameter range;
a∈{x|x=32+0.2*i,i=0,1,..,30}
b∈{x|x=25+0.2*i,i=0,1,...,30}
c∈{x|x=2/3+0.2*i,i=0,1,...,20}
(2.2) the parameter value scope of determining according to step (2.1) is utilized possible parameter group, and generation length is 1,000,000 comparison chaos sequence
Wherein, i represents the sequence number of element in the chaos sequence to be analyzed, i=1, and 2 ..., 1,000,000, j represents to be used to generate the sequence number of the parameter group of this comparison chaos sequence, j=1,2 ..., 20181;
(2.3) result according to step (1.3) compares chaos sequence to each
Carry out phase space reconfiguration, obtain the vector sequence after the reconstruct
(2.4) calculate the vector sequence { T that each reconstitutes
x' (i) }, { T
y' (i) }, { T
z' (i) } and
Central Moment Feature amount λ
x, λ
y, λ
zWith
(2.5) choose 100 respectively smaller or equal to 1,000,000 positive integer: 1,000,000,1,000,000-500,1,000,000-500 * 2 ..., 1,000,000-500 * 99, computational length is for being 1,000,000,1,000 respectively, 000-500,1,000,000-500 * 2 ..., 1,000,000-500 * 99, vector sequence { T
x' (t
i), { T
y' (t
i), { T
z' (t
i) the Central Moment Feature amount
Calculate
Variance ε
x, calculate
Variance ε
y, calculate
Variance ε
z
(2.6) the Central Moment Feature amount λ of chaos sequence more to be analyzed
x, λ
y, λ
zWith the Central Moment Feature amount that compares chaos sequence
λ
C1z, obtain its difference smaller or equal to ε
x, ε
y, ε
yThe comparison chaos sequence, with the system parameters of the comparison chaos sequence that relatively obtains estimated result, from 20181 groups of possible parameter values, finally determined 25 groups of possible parameter values thus as chaos sequence to be analyzed.
Example 2:
Suppose B for the chaos cipher system, according to its design and parameter information, known following information:
(1) this cryptographic system utilizes the Lorenz chaos system as random source, and Lorenz chaotic maps equation is:
(2) the parameter value scope of Lorenz chaos system is:
a∈{x|x=7+0.2*i,i=0,1,...,30}
b∈{x|x=25+0.2*i,i=0,1,...,30}
c∈{x|x=2/3+0.2*i,i=0,1,...,20}
(3) chaos sequence to be analyzed comprises x, y, three dimension { T of z
x(i) }, { T
y(i) }, { T
z(i) }, the length of sequence is 1,000,000;
By analyzing known chaos sequence, the type and the system parameters of the chaos system that generates this sequence are estimated that concrete implementation method is as follows:
(1) owing to known definite chaos system type, skips steps 1 is directly estimated the parameter of chaos system;
(2) determine the possible value of the parameter of chaos system:
(2.1) determine possible parameter group according to Given information (1) and (2), have 20181 groups;
(2.2) the parameter value scope of determining according to step (2.1) is utilized possible parameter group, and generation length is 1,000,000 comparison chaos sequence
Wherein, i represents the sequence number of element in the chaos sequence to be analyzed, i=1, and 2 ..., 1,000,000, j represents to be used to generate the sequence number of the parameter group of this comparison chaos sequence, j=1,2 ..., 20181;
(2.3) utilize pseudo-neighbor point to calculate the embedding dimension d of chaos sequence to be analyzed
x, d
y, d
z, utilize mutual information method to calculate the time delay τ of chaos sequence to be analyzed
x, τ
y, τ
z
(2.4) according to the result of step (1.3) to chaos sequence { T to be analyzed
x(i) }, { T
y(i) }, { T
zAnd each chaos sequence relatively (i) }
Carry out phase space reconfiguration, obtain the vector sequence { T after the reconstruct
x' (i) }, { T
y' (i) }, { T
z' (i) }; With
(2.5) choose 200 respectively smaller or equal to 1,000,000 natural number: 1,000,000,1,000,000-100,1,000,000-100 * 2 ..., 1,000,000-100 * 199, computational length is 1,000,000,1,000 respectively, 000-100,1,000,000-100 * 2 ..., 1,000,000-100 * 199, vector sequence { T
x' (t
i, { T
y' (t
i), { T
z' (t
i) the Central Moment Feature amount
Calculate
Average E
x, calculate
Average E
y, calculate
Average E
z, calculate
And E
xThe average ε of difference
x, calculate
And E
yThe average ε of difference
y, calculate
And E
zThe average ε of difference
z
(2.6) the Central Moment Feature amount λ of chaos sequence more to be analyzed
x, λ
y, λ
zWith the Central Moment Feature amount that compares chaos sequence
λ
C1z, obtain its difference smaller or equal to ε
x, ε
y, ε
zThe comparison chaos sequence, with the system parameters of the comparison chaos sequence that relatively obtains estimated result, from 20181 groups of possible parameter values, finally determined 25 groups of possible parameter values thus as chaos sequence to be analyzed.
The above is preferred embodiment of the present invention, but the present invention should not be confined to the disclosed content of this embodiment and accompanying drawing.So everyly do not break away from the equivalence of finishing under the spirit disclosed in this invention or revise, all fall into the scope of protection of the invention.
Claims (1)
1. one kind at the chaos method for parameter estimation based on the cryptographic system and the secret signalling of chaos, and its step comprises:
(A1) according to chaos system type and key protocol, determine parameter group, the quantity of parameter group is
l,
lBe positive integer;
(A2) use respectively every group of parameter generate one with the isometric comparison chaos sequence { C1 of chaos sequence to be analyzed { T (i) }
j(i) }, wherein, i represents the sequence number of element in the chaos sequence to be analyzed, i=1, and 2 ..., N, N represent the length of chaos sequence to be analyzed, j represents to be used to generate the sequence number of the parameter group of this comparison chaos sequence, and j=1,2 ...,
l
(A3) calculate the nonlinear characteristic amount of chaos sequence to be analyzed { T (i) }, comprise time delay τ and embed dimension d;
(A4) according to time delay τ that calculates and embedding dimension d, chaos sequence to be analyzed { T (i) } and each are compared chaos sequence { C1
j(i) } carry out phase space reconfiguration, the vector sequence that obtains respectively reconstituting T ' (i) } and C1 '
j(i) };
T′(i)={T(i),T(i+τ),...,T(i+(d-1)τ)}
C1′
j(i)={C1
j(i),C1
j(i+τ),...,C1
j(i+(d-1)τ)}
(A5) calculate each vector sequence that reconstitutes { T ' (i) } and C1 '
j(i) } Central Moment Feature amount λ
TWith
(A6) according to vector sequence T ' (i), utilize statistical analysis technique, calculate the threshold epsilon that is used for critical parameter;
(A7) Correlation Centre moment characteristics amount λ
TWith the Central Moment Feature amount that compares chaos sequence
Obtain the comparison chaos sequence of its difference, with the system parameters of the comparison chaos sequence that obtains parameter Estimation result as chaos sequence to be analyzed smaller or equal to ε.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN2008102367274A CN101436928B (en) | 2008-12-09 | 2008-12-09 | Parameter estimation method for chaos system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN2008102367274A CN101436928B (en) | 2008-12-09 | 2008-12-09 | Parameter estimation method for chaos system |
Publications (2)
Publication Number | Publication Date |
---|---|
CN101436928A CN101436928A (en) | 2009-05-20 |
CN101436928B true CN101436928B (en) | 2011-01-26 |
Family
ID=40711167
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN2008102367274A Expired - Fee Related CN101436928B (en) | 2008-12-09 | 2008-12-09 | Parameter estimation method for chaos system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN101436928B (en) |
Families Citing this family (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103218459A (en) * | 2013-05-13 | 2013-07-24 | 无锡职业技术学院 | Chaotic system parameter estimating method based on neighborhood information optimization algorithm |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1556602A (en) * | 2003-12-31 | 2004-12-22 | 华中科技大学 | Chaotic cipher production method under limited precision |
CN1852089A (en) * | 2005-12-31 | 2006-10-25 | 华中科技大学 | System and method for generating analog-digital mixed chaos signals |
-
2008
- 2008-12-09 CN CN2008102367274A patent/CN101436928B/en not_active Expired - Fee Related
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1556602A (en) * | 2003-12-31 | 2004-12-22 | 华中科技大学 | Chaotic cipher production method under limited precision |
CN1852089A (en) * | 2005-12-31 | 2006-10-25 | 华中科技大学 | System and method for generating analog-digital mixed chaos signals |
Also Published As
Publication number | Publication date |
---|---|
CN101436928A (en) | 2009-05-20 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US9892211B2 (en) | Searchable code processing system and method | |
Dong et al. | A fast secure dot product protocol with application to privacy preserving association rule mining | |
CN110324147B (en) | GAN game countermeasure encryption method based on chaos model | |
CN111475690B (en) | Character string matching method and device, data detection method and server | |
Rachmawanto et al. | A comparative study of image cryptographic method | |
CN111756521B (en) | Cipher S box design method based on Feistel-SP structure | |
CN113935050B (en) | Feature extraction method and device based on federal learning, electronic equipment and medium | |
CN113934983A (en) | Characteristic variable analysis method and device, computer equipment and storage medium | |
Gao et al. | Secure cloud-aided object recognition on hyperspectral remote sensing images | |
CN112860932B (en) | Image retrieval method, device, equipment and storage medium for resisting malicious sample attack | |
CN105281889B (en) | A kind of algorithm restoring method and system based on side channel leakage | |
Liu et al. | Secure remote sensing image registration based on compressed sensing in cloud setting | |
CN101436928B (en) | Parameter estimation method for chaos system | |
CN111934852A (en) | AES password chip electromagnetic attack method and system based on neural network | |
CN105162740A (en) | Single-channel time-frequency overlapping signal blind separation method | |
Nakouri et al. | Chaotic construction of cryptographic keys based on biometric data | |
Zou et al. | Secure encrypted image search in mobile cloud computing | |
David et al. | Fast analytical rank estimation | |
Doroud et al. | Encrypted traffic detection: Beyond the port number era | |
Lei et al. | Global solutions of the evolutionary Faddeev model with small initial data | |
Garasym et al. | Application of observer-based chaotic synchronization and identifiability to original CSK model for secure information transmission | |
Xin et al. | Template attack based on uBlock cipher algorithm | |
Kekre et al. | Sectorization of Full Kekre’s Wavelet Transform for Feature extraction of Color Images | |
CN110912906A (en) | Edge calculation malicious node identification method | |
Li et al. | Explicit approximation of the invariant measure for SDDEs with the nonlinear diffusion term |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C14 | Grant of patent or utility model | ||
GR01 | Patent grant | ||
C17 | Cessation of patent right | ||
CF01 | Termination of patent right due to non-payment of annual fee |
Granted publication date: 20110126 Termination date: 20111209 |