scholarly journals Based on GAN Generating Chaotic Sequence

Author(s):  
Xuguang Chen ◽  
Hongbin Ma ◽  
Pujun Ji ◽  
Haiting Liu ◽  
Yan Liu

AbstractIn this paper, an adversarial encryption algorithm based on generating chaotic sequence by GAN is proposed. Starting from the poor leakage resistance of the basic adversarial encryption communication model based on GAN, the network structure was improved. Secondly, this paper used the generated adversarial network to generate chaotic-like sequences as the key K and entered the improved adversarial encryption model. The addition of the chaotic model further improved the security of the key. In the subsequent training process, the encryption and decryption party and the attacker confront each other and optimize, and then obtain a more secure encryption model. Finally, this paper analyzes the security of the proposed encryption scheme through the key and overall model security. After subsequent experimental tests, this encryption method can eliminate the chaotic periodicity to a certain extent and the model’s anti-attack ability has also been greatly improved. After leaking part of the key to the attacker, the secure communication can still be maintained.

2020 ◽  
Vol 13 (44) ◽  
pp. 4483-4489
Author(s):  
C Beaula ◽  

Background/Objective: The Coronavirus Covid-19 has affected almost all the countries and millions of people got infected and more deaths have been reported everywhere. The uncertainty and fear created by the pandemic can be used by hackers to steal the data from both private and public systems. Hence, there is an urgent need to improve the security of the systems. This can be done only by building a strong cryptosystem. So many researchers started embedding different topics of mathematics like algebra, number theory, and so on in cryptography to keep the system, safe and secure. In this study, a cryptosystem using graph theory has been attempted, to strengthen the security of the system. Method: A new graph is constructed from the given graph, known as a double vertex graph. The edge labeling of this double vertex graph is used in encryption and decryption. Findings: A new cryptosystem using the amalgamation of the path, its double vertex graph and edge labeling has been proposed. From the double vertex graph of a path, we have given a method to find the original path. To hack such an encrypted key, the knowledge of graph theory is important, which makes the system stronger. Applications:The one-word encryption method will be useful in every security system that needs a password for secure communication or storage or authentication. Keywords: Double vertex graphs; path; adjacency matrix; encryption; cryptography


Author(s):  
Shuiqing Xiao ◽  
◽  
Songbo Wang ◽  
Caihong Ye ◽  
Yuan Gao

The current image encryption method is relatively simple, and there is the problem of poor image encryption effect. Based on the hybrid chaotic model, an image encryption method with component fusion is proposed in this paper. The image is mapped by using Arnold cat mapping method. Chaotic sequence is generated by chaotic model, and the original image is scrambled and substituted to achieve image encryption. Through the fixed point ratio, information entropy, gray mean change value, autocorrelation and similarity, the test of encrypted image is completed. Experimental results show that the proposed image encryption method has good performance, high security intensity, and can effectively encrypt the image.


2014 ◽  
Vol 602-605 ◽  
pp. 3261-3264
Author(s):  
Fang Fang Zhang

In order to enhance the security of the English character document, data-level information security issues have been researched on the English characters document. Use object-oriented programming to get the character information in English characters document and also get the encoding. Use the “long key stream” algorithm to encrypt. During the process of encryption and decryption, the lossless of English characters file format information is maintained. Also, the setting of encryption and decryption is introduced. English characters document which use this encryption method cannot be cracked illegally. Research on this simulation model guarantees the information safety of English characters document on bottom-level.


2018 ◽  
Vol 228 ◽  
pp. 02006
Author(s):  
Chaowen Shen

As is known to all, data transmission in wireless networks is easy to intercept because of the openness of wireless signals. In order to deal with this security problem, this paper presents a secure communication method based on driving-response synchronization and TCP protocol. The video signal is encrypted and decrypted by a chaotic sequence and transmitted through WIFI network in real time. Furthermore, the system configuration and design procedures are described in detail. Experimental results show that our approach is feasible for video secure communication.


Author(s):  
Hamza Sajjad Ahmad ◽  
Muhammad Junaid Arshad ◽  
Muhammad Sohail Akram

To send data over the network, devices need to authenticate themselves within the network. After authentication, the device will be able to send the data in-network. After authentication, secure communication of devices is an important task that is done with an encryption method. IoT network devices have a very small circuit with low resources and low computation power. By considering low power, less memory, low computation, and all the aspect of IoT devices, an encryption technique is needed that is suitable for this type of device. As IoT networks are heterogeneous, each device has different hardware properties, and all the devices are not on one scale. To make IoT networks secure, this paper starts with the secure authentication mechanism to verify the device that wants to be a part of the network. After that, an encryption algorithm is presented that will make the communication secure. This encryption algorithm is designed by considering all the important aspects of IoT devices (low computation, low memory, and cost).


Author(s):  
Kehui Sun

Chaos is characterized by aperiodic, wideband, random-like, and ergodicity. Chaotic secure communication has become one of the hot topics in nonlinear dynamics since the early 1990s exploiting the technique of chaos synchronization. As distinguished by the type of information being carried, chaos-based communication systems can be categorized into analogy and digital, including four popular techniques such as Chaos Masking, Chaos Shift Keying, Chaos Modulation, and Chaos Spreading Spectrum. In this chapter, the principles of these schemes and their modifications are analyzed by theoretical analysis as well as dynamic simulation. In addition, chaos-based cryptography is a new approach to encrypt information. After analyzing the performances of chaotic sequence and designing an effective chaotic sequence generator, the authors briefly presented the principle of two classes of chaotic encryption schemes, chaotic sequence encryption and chaotic data stream encryption.


2020 ◽  
Vol 30 (05) ◽  
pp. 2050075
Author(s):  
Baoju Chen ◽  
Simin Yu ◽  
Ping Chen ◽  
Liangshan Xiao ◽  
Jinhu Lü

In this paper, a Virtex-7-based video chaotic secure communication scheme is investigated. First, the network sending and receiving controller Intellectual Property (IP) cores are designed. Next, the chaotic encryption and decryption IP cores are implemented using fixed-point algorithm, pipeline operation, and state machine control. Thus, video capturing, video displaying, network sending, network receiving, chaotic encrypting, and chaotic decrypting can be achieved via IP core integration design. An improved 7D chaotic stream cipher algorithm for resisting divide-and-conquer attack is then designed and realized on a Virtex-7 high-end FPGA platform. Hardware experimental results are also given to verify the feasibility of the scheme.


2016 ◽  
Vol 2016 ◽  
pp. 1-11 ◽  
Author(s):  
Lilian Huang ◽  
Donghai Shi ◽  
Jie Gao

A new Lorenz-like chaotic system with varying parameter is proposed by adding a state feedback function. The structure of the new designed system is simple and has more complex dynamic behaviors. The chaos behavior of the new system is studied by theoretical analysis and numerical simulation. And the bifurcation diagram shows a chaos-cycle-chaos evolution when the new parameter changes. Then a new synchronization scheme by a single state variable drive is given based on the new system and a chaotic parameter modulation digital secure communication system is also constructed. The results of simulation demonstrate that the new proposed system could be well applied in secure communication. Otherwise, based on the new system, the encryption and decryption of image could be achieved also.


Sign in / Sign up

Export Citation Format

Share Document