CN108199825A - A kind of file-type read-write secret communication method based on chaos system - Google Patents
A kind of file-type read-write secret communication method based on chaos system Download PDFInfo
- Publication number
- CN108199825A CN108199825A CN201810209808.9A CN201810209808A CN108199825A CN 108199825 A CN108199825 A CN 108199825A CN 201810209808 A CN201810209808 A CN 201810209808A CN 108199825 A CN108199825 A CN 108199825A
- Authority
- CN
- China
- Prior art keywords
- inverse time
- signal
- file
- chaos system
- chaotic signal
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/001—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using chaotic signals
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Storage Device Security (AREA)
Abstract
The invention discloses a kind of file-types based on chaos system to read and write secret communication method, includes the following steps:1) a series of binary sequence is randomly generated;2) binary sequence caused by will be random becomes bipolar sequence;3) using bipolar sequence and the second order inverse time required initial value of chaos system, corresponding inverse time chaotic signal is generated by corresponding second order inverse time chaos system;4) mask encryption is carried out to wanted coded signal using inverse time chaotic signal, and be stored in a file;5) the inverse time chaotic signal initial value needed for inverse time chaotic signal is generated, bipolar sequence and used second order inverse time chaos system are as key;6) in receiving terminal, receive the file containing coded signal, coded signal is therefrom read out;7) it and then using key with it is decrypted, obtains transmitted original signal.By inverse time chaotic signal caused by second order inverse time chaos system voice signal is encrypted transmission in the present invention.
Description
Technical field
The invention belongs to chaotic secret communication fields, and in particular to a kind of file-type read-write secrecy based on chaos system is logical
Letter method.
Background technology
Influence of the primary condition to chaotic signal is especially big, even if two identical chaos systems, if they
There are small differences for primary condition, their movement locus can soon become orthogonal after after a period of time, and
This characteristic allows chaotic signal to become difficult to predict and be difficult to be trapped.
Although chaotic signal structure is more complicated, the composition of chaos system is fairly simple.The research of chaotic communication
Mutually mainly it is encrypted including the following aspects using chaos technology;Spread spectrum communication chaotic modulation skill is carried out using chaos
Art.In recent years, the correlative study in relation to chaotic communication has been obtained for the development advanced by leaps and bounds, the correlation theory of chaotic communication
And the related research of chaotic communication has had arrived at the stage of comparative maturity.
Invention content
The object of the present invention is to provide a kind of file-types based on chaos system to read and write secret communication method, inverse by second order
When inverse time chaotic signal caused by chaos system voice signal is encrypted transmission.
The present invention adopts the following technical scheme that realize:
A kind of file-type read-write secret communication method based on chaos system, includes the following steps:
1) a series of binary sequence is randomly generated;
2) binary sequence caused by will be random becomes bipolar sequence;
3) using bipolar sequence and the second order inverse time required initial value of chaos system, pass through the corresponding second order inverse time
Chaos system generates corresponding inverse time chaotic signal;
4) mask encryption is carried out to wanted coded signal using inverse time chaotic signal, and be stored in a file;
5) the inverse time chaotic signal initial value needed for inverse time chaotic signal, bipolar sequence and used second order are generated
Inverse time, chaos system was as key;
6) in receiving terminal, receive the file containing coded signal, coded signal is therefrom read out;
7) it and then using key with it is decrypted, obtains transmitted original signal.
Further improve of the invention is that in step 3), the second order inverse time mathematic(al) representation of chaos system is:
Wherein u is the inverse time chaotic signal of required generation,It is the second-order differential of u,It is the first differential of u, β and ω are
The control parameter of the system, ω are angular frequency;
Excitation function s (t) is described as:S (t)=sn, n < t≤n+1 (2)
And have, the general solution expression formula of inverse time chaotic signal is:
The waveform of inverse time chaotic signal is by ugSuperposition composition;By the s of generation0It is updated in formula (2) and obtains s (t);
Obtained s (t) is updated to, corresponding inverse time chaotic signal u (t) is obtained in formula (1).
Further improve of the invention is, in step 4), original voice signal is covered with inverse time chaotic signal
Code encryption, i.e.,:
S (t)=u (t)+x (t) (4)
Wherein, s (t) is signal after encryption, and u (t) is inverse time chaotic signal, and x (t) is primary speech signal,
Coded signal s (t) is deposited into the txt file A.txt of a blank, i.e.,:
Fp=fopen (' A.txt', ' a') (5)
Fprintf (Fp, ' %d', s (t)) (6)
fclose(Fp) (7)。
Further improve of the invention is, in step 6), in the initial of the obtained inverse time chaotic signal of receiving terminal
The bipolar sequence of value and generation inverse time chaotic signal is brought into the inverse time chaotic signal u that receiving terminal is obtained in formula (2)1
(t)。
Further improve of the invention is, in step 7), u is subtracted with signal g (t) read in file1(t) restore
Go out original signal x1(t), i.e.,:
x1(t)=g (t)-u1(t) (10)。
The present invention has following beneficial technique effect:
1) encryption method is simple
Mask encryption directly is carried out to coded signal using chaotic signal, it is at low cost;
2) cipher round results are good, and hardly possible is decoded
Using chaos system it is especially sensitive to initial value the characteristics of, caused by the different initial value of same chaos system
There is very big differences for chaotic signal;
3) binary sequence for generating inverse time chaotic signal randomly generates, and is difficult to estimate in advance;
4) a variety of chaos systems can be utilized to encrypt, chaotic signal difference is very big caused by different chaos systems, connects
Receiving end is if it is not known that chaos system can not be decrypted used by transmitting terminal.
Description of the drawings
Fig. 1 is the binary sequence randomly generated;
Fig. 2 is the corresponding bipolar sequence of binary sequence;
Fig. 3 is to utilize inverse time chaotic signal caused by bipolar sequence;
Fig. 4 is the encrypted signal of original needs;
Fig. 5 is original signal encryption figure;
Fig. 6 is that coded signal is stored in file data figure;
Fig. 7 is that receiving terminal receives file data conversion gained signal graph;
Fig. 8, which is that decoding gained is primary, penetrates signal graph.
Specific embodiment
The present invention will be described in detail with reference to the accompanying drawings and examples.
The present invention can realize that this sentences second order inverse time chaos system and carry out implementation explanation with a variety of chaos systems;
Of the present invention is second order inverse time chaos system, its mathematic(al) representation is:
Wherein u is the inverse time chaotic signal of required generation,It is the second-order differential of u,It is the first differential of u, β and ω
It is the control parameter of the system, ω is angular frequency;
Input function s (t) is described as:S (t)=sn, n < t≤n+1 (2)
The general solution of inverse time chaotic signal can be written as:
The waveform of inverse time chaotic signal can be by ugSuperposition composition.
First generate a series of bipolar sequence s0=[1-1-1 1-1-1-1 1-1 1 1-1 1 1-1-1
-1 1 -1 1 1 -1 -1 1 -1 1 -1 -1 1 1 -1 -1 1 -1 1 1 -1 1 -1 -1 -1 1 -1 -1 1 -1
1 1 -1 -1 1 -1 -1 1 -1 -1 -1 1 -1 1 1 -1 1 1 -1 1 -1 -1 1 -1 -1 -1 1 -1 1 1 -
1 1 1 -1 -1 -1 1 -1 1 1 -1 -1 1 -1 1 -1 -1 1 1 -1 -1 1 -1 1 1 -1 -1 1 -1 -1 -
1 1 -1 1 1 -1 1 1 -1 -1 -1 1 -1 1 1 -1 -1 1 -1 1 -1 -1 1 1 -1 -1 1 -1 1 1 -1
1 -1 -1 -1 1 -1 -1 1 -1 1 1 -1 -1 1 -1 -1 1 -1 -1 -1 1 -1 1 1 -1 1 1 -1 1 -1
-1 1 -1 -1 -1 1 -1 1 1 -1 1 1 -1 -1 -1 1 -1 1 1 -1 -1 1 -1 1 -1 -1 1 1 -1 -1
1 -1 1 1 -1 -1 1 -1 -1 -1 1 -1 1 1 -1 1 1 -1 -1 -1 1 -1 1 1 -1 -1 1 -1 1 -1 -
1 1 1 -1 -1 1 -1 1 1 -1 1 -1 -1 -1 1 -1 -1 1 -1 1 1 -1 -1 1 -1 -1 1 -1 -1 -1
1 -1 1 1 -1 1 1 -1 1 -1 -1 1 -1 -1 -1 1 -1 1 1 -1 1 1 -1 -1 -1 1 -1 1 1 -1 -1
1 -1 1 -1 -1 1 1 -1 -1 1 -1 1 1 -1 -1 1 -1 -1 -1 1 -1 1 1 -1 1 1 -1 -1 -1 1 -
1 1 1 -1 -1 1 -1 1 -1 -1 1 1 -1 -1 1 -1 1 1 -1 1 -1 -1 -1 1 -1 -1 1 -1 1 1 -1
-1 1 -1 -1 1 -1 -1 -1 1 -1 1 1 -1 1 1 -1 1 -1 -1 1 -1 -1 -1 1 -1 1 1 -1 1 1 -
1 -1 -1 1 -1 1 1 -1 -1 1 -1 1 -1 -1 1 1 -1 -1 1 -1 1 1 -1 -1 1 -1 -1 -1 1 -1
1 1 -1 1 1 -1 -1 -1 1 -1 1 1 -1 -1 1 -1 1 -1 -1 1 1 -1 -1 1 -1 1 1 -1 1 -1 -1
-1 1 -1 -1 1 -1 1 1 -1 -1 1 -1 -1 1 -1 -1 -1 1 -1 1 1 -1 1 1 -1 1 -1 -1 1 -1
-1 -1 1 -1 1 1 -1 1 1 -1 -1 -1 1];
By s generated above0It is updated in formula (2) and obtains s (t);
Obtained s (t) is updated to, corresponding inverse time chaotic signal u (t) is obtained in formula (1);
Better cipher round results in order to obtain expand 500 times, i.e., to the amplitude of inverse time chaotic signal u (t):
ui(t)=u (t) × 500 (3)
Wherein, ui(t) it is gained signal after initial inverse time chaotic signal amplitude is expanded 500 times.
Mask encryption is carried out to original voice signal with the inverse time chaotic signal after expansion, i.e.,:
S (t)=ui(t)+x(t) (4)
Wherein, s (t) be encryption after signal, ui(t) be expand after inverse time chaotic signal, x (t) is primary speech signal,
Coded signal s (t) is deposited into the txt file A.txt of a blank, i.e.,:
Fp=fopen (' A.txt', ' a') (5)
Fprintf (Fp, ' %d', s (t)) (6)
fclose(Fp) (7)
Coded signal in receiving terminal reads file A.txt and receive transmitting terminal and generate needed for inverse time chaotic signal
Chaotic signal initial value and bipolar sequence;
G (t)=load (' A.txt') (8)
Wherein g (t) is that receiving terminal reads gained signal in file;
In the bipolarity sequence of the receiving terminal initial value of obtained inverse time chaotic signal and generation inverse time chaotic signal
Row are brought into the inverse time chaotic signal u that receiving terminal is obtained in formula (2)1(t),
Inverse time chaotic signal caused by receiving terminal is expanded 500 times and obtains uo(t), i.e.,:
uo(t)=u1(t)×500 (9)
U is subtracted with signal g (t) read in fileo(t) original signal x is recovered1(t), i.e.,:
x1(t)=g (t)-uo(t) (10)
The feasibility of test this method is carried out by taking one section of voice signal as an example, Fig. 1 is the binary sequence randomly generated, figure
2 be the corresponding bipolar sequence of binary sequence, and Fig. 3 is using inverse time chaotic signal caused by bipolar sequence, and Fig. 4 is to adopt
Coded signal is stored in by primary speech signal of the sample frequency for 11025Hz sampling gained, Fig. 5 raw tone coded signal figures, Fig. 6
File data figure, Fig. 7 receiving terminals receive file data conversion gained signal graph, and Fig. 8 decoding gained is primary to penetrate signal, by above-mentioned several
Width figure can be seen that the feasibility for carrying out the encryption method.
Claims (5)
1. a kind of file-type read-write secret communication method based on chaos system, which is characterized in that include the following steps:
1) a series of binary sequence is randomly generated;
2) binary sequence caused by will be random becomes bipolar sequence;
3) using bipolar sequence and the second order inverse time required initial value of chaos system, pass through corresponding second order inverse time chaos
System generates corresponding inverse time chaotic signal;
4) mask encryption is carried out to wanted coded signal using inverse time chaotic signal, and be stored in a file;
5) the inverse time chaotic signal initial value needed for inverse time chaotic signal, bipolar sequence and used second order inverse time are generated
Chaos system is as key;
6) in receiving terminal, receive the file containing coded signal, coded signal is therefrom read out;
7) it and then using key with it is decrypted, obtains transmitted original signal.
2. a kind of file-type read-write secret communication method based on chaos system according to claim 1, which is characterized in that
In step 3), the second order inverse time mathematic(al) representation of chaos system is:
Wherein u is the inverse time chaotic signal of required generation,It is the second-order differential of u,It is the first differential of u, β and ω are that this is
The control parameter of system, ω are angular frequency;
Excitation function s (t) is described as:S (t)=sn, n < t≤n+1 (2)
And have, the general solution expression formula of inverse time chaotic signal is:
The waveform of inverse time chaotic signal is by ugSuperposition composition;By the s of generation0It is updated in formula (2) and obtains s (t);
Obtained s (t) is updated to, corresponding inverse time chaotic signal u (t) is obtained in formula (1).
3. a kind of file-type read-write secret communication method based on chaos system according to claim 2, which is characterized in that
In step 4), mask encryption is carried out to original voice signal with inverse time chaotic signal, i.e.,:
S (t)=u (t)+x (t) (4)
Wherein, s (t) is signal after encryption, and u (t) is inverse time chaotic signal, and x (t) is primary speech signal,
Coded signal s (t) is deposited into the txt file A.txt of a blank, i.e.,:
Fp=fopen (' A.txt', ' a') (5)
Fpr int f (Fp, ' %d', s (t)) (6)
fclose(Fp) (7)。
4. a kind of file-type read-write secret communication method based on chaos system according to claim 3, which is characterized in that
In step 6), in the bipolarity sequence of the receiving terminal initial value of obtained inverse time chaotic signal and generation inverse time chaotic signal
Row are brought into the inverse time chaotic signal u that receiving terminal is obtained in formula (2)1(t)。
5. a kind of file-type read-write secret communication method based on chaos system according to claim 3, which is characterized in that
In step 7), u is subtracted with signal g (t) read in file1(t) original signal x is recovered1(t), i.e.,:
x1(t)=g (t)-u1(t) (10)。
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810209808.9A CN108199825A (en) | 2018-03-14 | 2018-03-14 | A kind of file-type read-write secret communication method based on chaos system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810209808.9A CN108199825A (en) | 2018-03-14 | 2018-03-14 | A kind of file-type read-write secret communication method based on chaos system |
Publications (1)
Publication Number | Publication Date |
---|---|
CN108199825A true CN108199825A (en) | 2018-06-22 |
Family
ID=62595780
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201810209808.9A Pending CN108199825A (en) | 2018-03-14 | 2018-03-14 | A kind of file-type read-write secret communication method based on chaos system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN108199825A (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109194845A (en) * | 2018-08-27 | 2019-01-11 | 长安大学 | A kind of image encryption method based on inverse time chaos system |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20070219739A1 (en) * | 2006-03-15 | 2007-09-20 | Spears Brian K | Mixer measurement system and method using a chaotic signal |
CN101345615A (en) * | 2008-08-05 | 2009-01-14 | 广东工业大学 | Design method for chaos digital secret communication system based on FPGA |
CN103888637A (en) * | 2014-04-08 | 2014-06-25 | 广东工业大学 | Method for chaotic encryption of multi-path image digital information |
-
2018
- 2018-03-14 CN CN201810209808.9A patent/CN108199825A/en active Pending
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20070219739A1 (en) * | 2006-03-15 | 2007-09-20 | Spears Brian K | Mixer measurement system and method using a chaotic signal |
CN101345615A (en) * | 2008-08-05 | 2009-01-14 | 广东工业大学 | Design method for chaos digital secret communication system based on FPGA |
CN103888637A (en) * | 2014-04-08 | 2014-06-25 | 广东工业大学 | Method for chaotic encryption of multi-path image digital information |
Non-Patent Citations (1)
Title |
---|
LIDONG LIU 等: "Easy encoding and low bit-error-rate chaos communication system based on reverse-time chaotic oscillator", 《IET SIGNAL PROCESSING》 * |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109194845A (en) * | 2018-08-27 | 2019-01-11 | 长安大学 | A kind of image encryption method based on inverse time chaos system |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Zaher et al. | On the design of chaos-based secure communication systems | |
Chien et al. | Design of secure digital communication systems using chaotic modulation, cryptography and chaotic synchronization | |
CN110351077B (en) | Method, device, computer equipment and storage medium for encrypting data | |
Renza et al. | High-uncertainty audio signal encryption based on the Collatz conjecture | |
Wang et al. | Novel secure communication based on chaos synchronization | |
CN111259414A (en) | Method, device and equipment for encrypting audio stored in file | |
Limbong et al. | Testing the classic caesar cipher cryptography using of matlab | |
Yang et al. | A cubic map chaos criterion theorem with applications in generalized synchronization based pseudorandom number generator and image encryption | |
Li et al. | Chaotic cryptosystem with high sensitivity to parameter mismatch | |
CN108199825A (en) | A kind of file-type read-write secret communication method based on chaos system | |
Khan et al. | An optimized method for concealing data using audio steganography | |
CN102624521A (en) | Scrambler, scramble processing method, and program | |
He et al. | A robust digital secure communication scheme based on sporadic coupling chaos synchronization | |
Selvan | A review of analog audio scrambling methods for residual intelligibility | |
CN108075878A (en) | A kind of Chaotic Secure Speech Communication method based on transmitting terminal | |
Palaniyandi et al. | Secure digital signal transmission by multistep parameter modulation and alternative driving of transmitter variables | |
Kurian et al. | Self-synchronizing chaotic stream ciphers | |
Xuan Quyen et al. | A chaotic pulse‐time modulation method for digital communication | |
Sathiyamurthi et al. | Speech and Audio Cryptography System using Chaotic Mapping and Modified Euler's System | |
CN108400865A (en) | One kind being based on DCSK chaos encrypting methods | |
Ramakrishnan et al. | Wireless security protocol using a low cost pseudo random number generator | |
Drake et al. | Pseudo-chaos for direct-sequence spread-spectrum communication | |
CN108418672A (en) | A kind of voice communication encryption method based on inverse time chaos matched filter | |
Fawzy et al. | A speech cryptosystem based on chaotic modulation technique | |
KR960006386A (en) | Encryption and Decryption Method of Digital Information |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20180622 |