1) The document proposes a novel method for improving chaotic secure communication using steganography and multimodal chaotic maps.
2) It hides a message signal in an image by modifying pixel grey levels, and sends the stego image using chaotic parameter modulation.
3) At the receiver, synchronization is used to estimate system parameters and determine the map set in order to retrieve the hidden message signal.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Today among various medium of data transmission or storage our sensitive data
are not secured with a third-party, that we used to take help of. Cryptography plays an
important role in securing our data from malicious attack. This paper present a partial
image encryption based on bit-planes permutation using Peter De Jong chaotic map for
secure image transmission and storage. The proposed partial image encryption is a raw data
encryption method where bits of some bit-planes are shuffled among other bit-planes based
on chaotic maps proposed by Peter De Jong. By using the chaotic behavior of the Peter De
Jong map the position of all the bit-planes are permuted. The result of the several
experimental, correlation analysis and sensitivity test shows that the proposed image
encryption scheme provides an efficient and secure way for real-time image encryption and
decryption.
INTRA BLOCK AND INTER BLOCK NEIGHBORING JOINT DENSITY BASED APPROACH FOR JPEG...ijsc
Steganalysis is the method used to detect the presence of any hidden message in a cover medium. A novel
approach based on feature mining on the discrete cosine transform (DCT) domain based approach,
machine learning for steganalysis of JPEG images is proposed. The neighboring joint density on both
intra-block and inter-block are extracted from the DCT coefficient array. After the feature space has been
constructed, it uses SVM like binary classifier for training and classification. The performance of the
proposed method on different Steganographic systems named F5, Pixel Value Differencing, Model Based
Steganography with and without deblocking, JPHS, Steghide etc are analyzed. Individually each feature
and combined features classification accuracy is checked and concludes which provides better
classification.
This document summarizes a research paper that designed and implemented sphere decoding (SD) for multiple-input multiple-output (MIMO) systems using an FPGA. It used Newton's iterative method to calculate the matrix inverse as part of the SD algorithm, which reduces complexity compared to direct matrix inversion. The authors implemented SD for a 2x2 MIMO system with 4-QAM modulation. Simulation results showed that Newton's method converged after 7 iterations, and SD successfully calculated the minimum Euclidean distance vector.
An Efficient Multiplierless Transform algorithm for Video CodingCSCJournals
This paper presents an efficient algorithm to accelerate software video encoders/decoders by reducing the number of arithmetic operations for Discrete Cosine Transform (DCT). A multiplierless Ramanujan Ordered Number DCT (RDCT) is presented which computes the coefficients using shifts and addition operations only. The reduction in computational complexity has improved the performance of the video codec by almost 58% compared with the commonly used integer DCT. The results show that significant computation reduction can be achieved with negligible average peak signal-to-noise ratio (PSNR) degradation. The average structural similarity index matrix (SSIM) also ensures that the degradation due to the approximation is minimal.
This document summarizes an article from the International Journal of Electronics and Communication Engineering & Technology. The article proposes techniques for image steganography based on chaos theory and the contourlet transform. It describes using a modified Arnold cat map to scramble secret data for increased security before embedding it in the contourlet domain of an image. Experimental results showed the proposed method provides high embedding capacity while maintaining good stego image quality compared to wavelet-based approaches. It embeds data in subbands with lower energy to minimize distortion, and evaluates quality using PSNR, SNR, and correlation metrics.
Adaptive Control of a Robotic Arm Using Neural Networks Based ApproachWaqas Tariq
A new neural networks and time series prediction based method has been discussed to control the complex nonlinear multi variable robotic arm motion system in 3d environment without engaging the complicated and voluminous dynamic equations of robotic arms in controller design stage, the proposed method gives such compatibility to the manipulator that it could have significant changes in its dynamic properties, like getting mechanical loads, without need to change designs of the controller.
INVERSIONOF MAGNETIC ANOMALIES DUE TO 2-D CYLINDRICAL STRUCTURES –BY AN ARTIF...ijsc
Application of Artificial Neural Network Committee Machine (ANNCM) for the inversion of magnetic
anomalies caused by a long-2D horizontal circular cylinder is presented. Although, the subsurface targets
are of arbitrary shape, they are assumed to be regular geometrical shape for convenience of mathematical
analysis. ANNCM inversion extract the parameters of the causative subsurface targets include depth to the
centre of the cylinder (Z), the inclination of magnetic vector(Ɵ)and the constant term (A)comprising the
radius(R)and the intensity of the magnetic field(I). The method of inversion is demonstrated over a
theoretical model with and without random noise in order to study the effect of noise on the technique and
then extended to real field data. It is noted that the method under discussion ensures fairly accurate results
even in the presence of noise. ANNCM analysis of vertical magnetic anomaly near Karimnagar, Telangana,
India, has shown satisfactory results in comparison with other inversion techniques that are in vogue.The
statistics of the predicted parameters relative to the measured data, show lower sum error (<9.58%) and
higher correlation coefficient (R>91%) indicating that good matching and correlation is achieved between
the measured and predicted parameters.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Today among various medium of data transmission or storage our sensitive data
are not secured with a third-party, that we used to take help of. Cryptography plays an
important role in securing our data from malicious attack. This paper present a partial
image encryption based on bit-planes permutation using Peter De Jong chaotic map for
secure image transmission and storage. The proposed partial image encryption is a raw data
encryption method where bits of some bit-planes are shuffled among other bit-planes based
on chaotic maps proposed by Peter De Jong. By using the chaotic behavior of the Peter De
Jong map the position of all the bit-planes are permuted. The result of the several
experimental, correlation analysis and sensitivity test shows that the proposed image
encryption scheme provides an efficient and secure way for real-time image encryption and
decryption.
INTRA BLOCK AND INTER BLOCK NEIGHBORING JOINT DENSITY BASED APPROACH FOR JPEG...ijsc
Steganalysis is the method used to detect the presence of any hidden message in a cover medium. A novel
approach based on feature mining on the discrete cosine transform (DCT) domain based approach,
machine learning for steganalysis of JPEG images is proposed. The neighboring joint density on both
intra-block and inter-block are extracted from the DCT coefficient array. After the feature space has been
constructed, it uses SVM like binary classifier for training and classification. The performance of the
proposed method on different Steganographic systems named F5, Pixel Value Differencing, Model Based
Steganography with and without deblocking, JPHS, Steghide etc are analyzed. Individually each feature
and combined features classification accuracy is checked and concludes which provides better
classification.
This document summarizes a research paper that designed and implemented sphere decoding (SD) for multiple-input multiple-output (MIMO) systems using an FPGA. It used Newton's iterative method to calculate the matrix inverse as part of the SD algorithm, which reduces complexity compared to direct matrix inversion. The authors implemented SD for a 2x2 MIMO system with 4-QAM modulation. Simulation results showed that Newton's method converged after 7 iterations, and SD successfully calculated the minimum Euclidean distance vector.
An Efficient Multiplierless Transform algorithm for Video CodingCSCJournals
This paper presents an efficient algorithm to accelerate software video encoders/decoders by reducing the number of arithmetic operations for Discrete Cosine Transform (DCT). A multiplierless Ramanujan Ordered Number DCT (RDCT) is presented which computes the coefficients using shifts and addition operations only. The reduction in computational complexity has improved the performance of the video codec by almost 58% compared with the commonly used integer DCT. The results show that significant computation reduction can be achieved with negligible average peak signal-to-noise ratio (PSNR) degradation. The average structural similarity index matrix (SSIM) also ensures that the degradation due to the approximation is minimal.
This document summarizes an article from the International Journal of Electronics and Communication Engineering & Technology. The article proposes techniques for image steganography based on chaos theory and the contourlet transform. It describes using a modified Arnold cat map to scramble secret data for increased security before embedding it in the contourlet domain of an image. Experimental results showed the proposed method provides high embedding capacity while maintaining good stego image quality compared to wavelet-based approaches. It embeds data in subbands with lower energy to minimize distortion, and evaluates quality using PSNR, SNR, and correlation metrics.
Adaptive Control of a Robotic Arm Using Neural Networks Based ApproachWaqas Tariq
A new neural networks and time series prediction based method has been discussed to control the complex nonlinear multi variable robotic arm motion system in 3d environment without engaging the complicated and voluminous dynamic equations of robotic arms in controller design stage, the proposed method gives such compatibility to the manipulator that it could have significant changes in its dynamic properties, like getting mechanical loads, without need to change designs of the controller.
INVERSIONOF MAGNETIC ANOMALIES DUE TO 2-D CYLINDRICAL STRUCTURES –BY AN ARTIF...ijsc
Application of Artificial Neural Network Committee Machine (ANNCM) for the inversion of magnetic
anomalies caused by a long-2D horizontal circular cylinder is presented. Although, the subsurface targets
are of arbitrary shape, they are assumed to be regular geometrical shape for convenience of mathematical
analysis. ANNCM inversion extract the parameters of the causative subsurface targets include depth to the
centre of the cylinder (Z), the inclination of magnetic vector(Ɵ)and the constant term (A)comprising the
radius(R)and the intensity of the magnetic field(I). The method of inversion is demonstrated over a
theoretical model with and without random noise in order to study the effect of noise on the technique and
then extended to real field data. It is noted that the method under discussion ensures fairly accurate results
even in the presence of noise. ANNCM analysis of vertical magnetic anomaly near Karimnagar, Telangana,
India, has shown satisfactory results in comparison with other inversion techniques that are in vogue.The
statistics of the predicted parameters relative to the measured data, show lower sum error (<9.58%) and
higher correlation coefficient (R>91%) indicating that good matching and correlation is achieved between
the measured and predicted parameters.
This document proposes a new two-dwell acquisition method for optical code division multiple access (OCDMA) systems using unipolar optical orthogonal codes (OOCs).
It presents a two-step acquisition procedure where the first dwell examines only the first portion of the OOC code to test cells, and the second dwell fully examines cells that pass the first test. Closed-form expressions are derived to analyze the false alarm and detection probabilities of this method using GQ functions, showing it can achieve the same performance as the existing Multiple Shift algorithm with lower complexity. Numerical results validate the model and show the two-dwell method matches the performance of the Multiple Shift algorithm.
This document proposes a new method to remove the dependence of fuzzy c-means clustering on random initialization. The conventional fuzzy c-means algorithm's performance is highly dependent on the randomly initialized membership values used to select initial centroids. The proposed method uses an algorithm by Yuan et al. to determine initial centroids without randomization. These centroids are then used as inputs to the conventional fuzzy c-means algorithm. The performance of the proposed method is compared to conventional fuzzy c-means using partition coefficient and clustering entropy validity indices. Results show the proposed method produces more consistent and better performance by removing the effect of random initialization.
This document presents a digital medical image cryptosystem based on an infinite-dimensional multi-scroll chaotic delay differential equation (DDE) for secure telemedicine applications. The cryptosystem performs an XOR operation between separated image planes and a shuffled chaotic attractor image from the DDE. The security keys are the initial condition and time constant in the DDE. The document analyzes the nonlinear dynamics of the DDE, including equilibrium points, waveforms, and a 3-scroll attractor. It evaluates the encryption and decryption of CT scan images using histograms, spectral density, key sensitivity, and correlation to demonstrate the cryptosystem's security.
Image Segmentation Using Two Weighted Variable Fuzzy K MeansEditor IJCATR
Image segmentation is the first step in image analysis and pattern recognition. Image segmentation is the process of dividing an image into different regions such that each region is homogeneous. The accurate and effective algorithm for segmenting image is very useful in many fields, especially in medical image. This paper presents a new approach for image segmentation by applying k-means algorithm with two level variable weighting. In image segmentation, clustering algorithms are very popular as they are intuitive and are also easy to implement. The K-means and Fuzzy k-means clustering algorithm is one of the most widely used algorithms in the literature, and many authors successfully compare their new proposal with the results achieved by the k-Means and Fuzzy k-Means. This paper proposes a new clustering algorithm called TW-fuzzy k-means, an automated two-level variable weighting clustering algorithm for segmenting object. In this algorithm, a variable weight is also assigned to each variable on the current partition of data. This could be applied on general images and/or specific images (i.e., medical and microscopic images). The proposed TW-Fuzzy k-means algorithm in terms of providing a better segmentation performance for various type of images. Based on the results obtained, the proposed algorithm gives better visual quality as compared to several other clustering methods.
DSR Routing Decisions for Mobile Ad Hoc Networks using Fuzzy Inference Systemcscpconf
Mobile ad-hoc network technology has gained popularity in recent years by researchers on account of its flexibility, low cost and ease of deployment. The objective of this paper is to model the behavior of MANET for DSR protocol by considering some prominent routing metrics.These metrics ( packet delivery fraction, normalized routing load , average end- to- end delayetc.) have been generated by Network Simulator NS 2.34 tools and the node movement has beengenerated using Bonmotion 1.4.The MANET behavior for DSR protocol is hypothesized to be dependent on fuzzy variables like node density, pause time , number of packets transferred , and the number of connection. In this paper the behavior of MANET is modeled using Fuzzy Inference System for DSR (Dynamic Source Routing) protocol , Fuzzy Inference System offers a natural way of representing and reasoning the problems with uncertainty and imprecision. Fuzzy logic is found to be a suitable way in the mobile ad hoc network routing decision. A Fuzzy inference system is implemented on MATLAB 7.0 and the model is found to be satisfactory with the fuzzy input metrics and de fuzzified output metrics .
Radial basis function neural network control for parallel spatial robotTELKOMNIKA JOURNAL
The derivation of motion equations of constrained spatial multibody system is an important problem of dynamics and control of parallel robots. The paper firstly presents an overview of the calculating the torque of the driving stages of the parallel robots using Kronecker product. The main content of this paper is to derive the inverse dynamics controllers based on the radial basis function (RBF) neural network control law for parallel robot manipulators. Finally, numerical simulation of the inverse dynamics controller for a 3-RRR delta robot manipulator is presented as an illustrative example.
Chaotic Secure Communication Using Iterated Filtering Method P. Karthik -Assistant Professor,
D. Gokul Prashanth -UG Scholar,
T. Gokul - UG Scholar,
Department of Electronics and Communication Engineering,
SNS College of Engineering, Coimbatore, India.
This document summarizes a research paper that proposes a microcontroller-based cryptosystem using the Tiny Encryption Algorithm (TEA) combined with a Key Generation Unit (KGU). The KGU uses timers in the microcontroller to generate random bits for encryption keys. The cryptosystem can operate in serial or wireless transmission modes. Performance analysis shows the cryptosystem has improved throughput and decreased execution time compared to TEA alone. Randomness testing of the generated keys indicates distinct random bits. In conclusion, the system provides moderate security and simplicity for applications requiring secured data transfer with low cost and memory constraints.
A New Chaos Based Image Encryption and Decryption using a Hash FunctionIRJET Journal
This document proposes a new chaos-based image encryption and decryption scheme using Arnold's cat map for pixel permutation and the Lorenz system for diffusion. A hash function, specifically MurmurHash3, is used to generate the permutation and diffusion keys. This helps accelerate the diffusion process and reduces the number of cipher cycles needed compared to previous schemes. The encryption process involves first permuting the pixel positions using the cat map, with control parameters determined by the hash value of the original image. Then diffusion is performed using the Lorenz system to generate the keystream. Decryption follows the reverse process using the same keys. Security analysis demonstrates the scheme has a large key space and the encrypted images pass various statistical tests, indicating the
Robust Adaptive Threshold Algorithm based on Kernel Fuzzy Clustering on Image...cscpconf
The document presents a robust adaptive threshold algorithm based on kernel fuzzy clustering for image segmentation. It proposes using kernel fuzzy c-means clustering (KFCM) to generate adaptive thresholds for segmenting images. KFCM computes fuzzy membership values for pixels to cluster them. The algorithm was tested on MR brain images and showed good performance in detecting large and small objects while also enhancing low contrast images. Experimental results demonstrated the efficiency and accuracy of combining an adaptive threshold algorithm with KFCM for medical image segmentation.
Hierarchical algorithms of quasi linear ARX Neural Networks for Identificatio...Yuyun Wabula
This document summarizes a research paper on hierarchical algorithms for training a quasi-linear ARX neural network model for identification of nonlinear systems. The key points are:
1) A hierarchical algorithm is proposed that first estimates the system using a linear sub-model and least squares estimation to obtain linear parameters. It then trains a neural network nonlinear sub-model to refine the errors of the linear sub-model.
2) The linear parameter estimates are fixed and used as biases for the neural network, which is trained to minimize the residual errors of the linear sub-model.
3) This hierarchical approach separates the identification into linear and nonlinear parts, allowing analysis of the system linearly while also capturing nonlinearities. The neural
A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...IJERD Editor
This paper presents a blind steganalysis technique to effectively attack the JPEG steganographic
schemes i.e. Jsteg, F5, Outguess and DWT Based. The proposed method exploits the correlations between
block-DCTcoefficients from intra-block and inter-block relation and the statistical moments of characteristic
functions of the test image is selected as features. The features are extracted from the BDCT JPEG 2-array.
Support Vector Machine with cross-validation is implemented for the classification.The proposed scheme gives
improved outcome in attacking.
A C OMPARATIVE A NALYSIS A ND A PPLICATIONS O F M ULTI W AVELET T RANS...IJCI JOURNAL
In the era of telemedicine a large amount of medica
l information is exchanged via electronic media mos
tly
in the form of medical images, to improve the accur
acy and speed of diagnosis process. Medical Image
denoising has the basic importance in image analysi
s as these algorithm and procedures affects the eff
icacy
of medical diagnostic. In this paper focus is on Mu
lti wavelets based Image denoising techniques, beca
use
they provide the possibility of designing wavelets
systems which are orthogonal, symmetric and compact
ly
supported, simultaneously. Performance of Discrete
Multi Wavelet Transform and Discrete Wavelet
Transform based denoising methods are compared on t
he basis of PSNR
Adaptive Fuzzy-Neural Control Utilizing Sliding Mode Based Learning Algorithm...IJERA Editor
This paper introduces an adaptive fuzzy-neural control (AFNC) utilizing sliding mode-based learning algorithm
(SMBLA) for robot manipulator to track the desired trajectory. A traditional sliding mode controller is applied to
ensure the asymptotic stability of the system, and the fuzzy rule-based wavelet neural networks (FWNNs) are
employed as the feedback controllers. Additionally, a novel adaptation of the FWNNs parameters is derived
from the SMBLA in the Lyapunov stability theorem. Hence, the AFNC approximates parameter variation,
unmodeled dynamics, and unknown disturbances without the detailed knowledge of robot manipulator, while
resulting in an improved tracking performance. Lastly, in order to validate the effectiveness of the proposed
approach, the comparative simulation results of two-degrees of freedom robot manipulator are presented.
Secure Image Transmission for Cloud Storage System Using Hybrid SchemeIJERD Editor
- Data over the cloud is transferred or transmitted between servers and users. Privacy of that
data is very important as it belongs to personal information. If data get hacked by the hacker, can be
used to defame a person’s social data. Sometimes delay are held during data transmission. i.e. Mobile
communication, bandwidth is low. Hence compression algorithms are proposed for fast and efficient
transmission, encryption is used for security purposes and blurring is used by providing additional
layers of security. These algorithms are hybridized for having a robust and efficient security and
transmission over cloud storage system.
IRJET- Analysis of Chaotic, Hyperchaotic and DNA Sequence for Image EncryptionIRJET Journal
The document proposes a new image encryption method that uses both a hyperchaotic sequence and DNA sequence. A 4D hyperchaotic system is used to generate a pseudorandom sequence, which is then applied to almost all steps of the encryption process. The intensity values of an input image are converted to a binary digit stream and globally scrambled using the hyperchaotic sequence. DNA algebraic operations and complementation are then performed between the hyperchaotic sequence and a DNA sequence to further encrypt the image. Experimental results demonstrate the proposed method achieves better encryption performance than other state-of-the-art methods in terms of quality, security, and robustness against noise and cropping attacks.
A BLIND ROBUST WATERMARKING SCHEME BASED ON SVD AND CIRCULANT MATRICEScsandit
Multimedia security has been the aim point of considerable research activity because of its wide
application area. The major technology to achieve copyright protection, content authentication,
access control and multimedia security is watermarking which is the process of embedding data
into a multimedia element such as image or audio, this embedded data can later be extracted
from, or detected in the embedded element for different purposes. In this work, a blind
watermarking algorithm based on SVD and circulant matrices has been presented. Every
circulant matrix is associated with a matrix for which the SVD decomposition coincides with the
spectral decomposition. This leads to improve the Chandra algorithm [1], our presentation will
include a discussion on the data hiding capacity, watermark transparency and robustness
against a wide range of common image processing attacks.
This document compares the Efficient Fuzzy Kohonen Clustering Network (EFKCN) algorithm to the original Fuzzy Kohonen Clustering Network (FKCN) algorithm to determine if EFKCN improves clustering results. Through empirical testing and simulations using expanded Fisher's Iris Data, the results showed that EFKCN did not achieve better accuracy than FKCN and is not yet a better clustering algorithm. While EFKCN had smaller errors in cluster center positions, FKCN consistently achieved higher correct clustering rates, even when the algorithms were run for the same number of iterations. Therefore, the document concludes that EFKCN does not actually improve upon the clustering performance of the original FKCN algorithm.
1. El documento habla sobre Mesopotamia, la región entre los ríos Tigris y Éufrates donde florecieron las primeras civilizaciones humanas. 2. Explica que esta región es correctamente llamada Mesopotamia ya que los países de Kuwait, Irak e Irán se encuentran entre estos dos ríos. 3. Resume partes del Poema del Diluvio, incluyendo que narra una gran inundación de 6 días provocada por un huracán del que sólo sobrevivieron Noé y su familia.
This document contains a cover letter and resume for Anne Hopkins. She is looking for security work, preferably gatehouse or static duties, with a 1A license and willingness to update her C license. Her experience includes over 11 years as a security officer with gatehouse and patrol duties, as well as crowd control, alarm monitoring, and other roles. She has also worked in loss prevention, hotel management, and supplies procurement for a college.
QA and content management involve testing software for bugs and managing digital content to ensure a quality user experience. The document discusses tasks like test automation, data validation, adding and fixing pages, and translating content across different languages. It also lists tools used for tasks like continuous integration, testing tracking, and content management systems.
This document proposes a new two-dwell acquisition method for optical code division multiple access (OCDMA) systems using unipolar optical orthogonal codes (OOCs).
It presents a two-step acquisition procedure where the first dwell examines only the first portion of the OOC code to test cells, and the second dwell fully examines cells that pass the first test. Closed-form expressions are derived to analyze the false alarm and detection probabilities of this method using GQ functions, showing it can achieve the same performance as the existing Multiple Shift algorithm with lower complexity. Numerical results validate the model and show the two-dwell method matches the performance of the Multiple Shift algorithm.
This document proposes a new method to remove the dependence of fuzzy c-means clustering on random initialization. The conventional fuzzy c-means algorithm's performance is highly dependent on the randomly initialized membership values used to select initial centroids. The proposed method uses an algorithm by Yuan et al. to determine initial centroids without randomization. These centroids are then used as inputs to the conventional fuzzy c-means algorithm. The performance of the proposed method is compared to conventional fuzzy c-means using partition coefficient and clustering entropy validity indices. Results show the proposed method produces more consistent and better performance by removing the effect of random initialization.
This document presents a digital medical image cryptosystem based on an infinite-dimensional multi-scroll chaotic delay differential equation (DDE) for secure telemedicine applications. The cryptosystem performs an XOR operation between separated image planes and a shuffled chaotic attractor image from the DDE. The security keys are the initial condition and time constant in the DDE. The document analyzes the nonlinear dynamics of the DDE, including equilibrium points, waveforms, and a 3-scroll attractor. It evaluates the encryption and decryption of CT scan images using histograms, spectral density, key sensitivity, and correlation to demonstrate the cryptosystem's security.
Image Segmentation Using Two Weighted Variable Fuzzy K MeansEditor IJCATR
Image segmentation is the first step in image analysis and pattern recognition. Image segmentation is the process of dividing an image into different regions such that each region is homogeneous. The accurate and effective algorithm for segmenting image is very useful in many fields, especially in medical image. This paper presents a new approach for image segmentation by applying k-means algorithm with two level variable weighting. In image segmentation, clustering algorithms are very popular as they are intuitive and are also easy to implement. The K-means and Fuzzy k-means clustering algorithm is one of the most widely used algorithms in the literature, and many authors successfully compare their new proposal with the results achieved by the k-Means and Fuzzy k-Means. This paper proposes a new clustering algorithm called TW-fuzzy k-means, an automated two-level variable weighting clustering algorithm for segmenting object. In this algorithm, a variable weight is also assigned to each variable on the current partition of data. This could be applied on general images and/or specific images (i.e., medical and microscopic images). The proposed TW-Fuzzy k-means algorithm in terms of providing a better segmentation performance for various type of images. Based on the results obtained, the proposed algorithm gives better visual quality as compared to several other clustering methods.
DSR Routing Decisions for Mobile Ad Hoc Networks using Fuzzy Inference Systemcscpconf
Mobile ad-hoc network technology has gained popularity in recent years by researchers on account of its flexibility, low cost and ease of deployment. The objective of this paper is to model the behavior of MANET for DSR protocol by considering some prominent routing metrics.These metrics ( packet delivery fraction, normalized routing load , average end- to- end delayetc.) have been generated by Network Simulator NS 2.34 tools and the node movement has beengenerated using Bonmotion 1.4.The MANET behavior for DSR protocol is hypothesized to be dependent on fuzzy variables like node density, pause time , number of packets transferred , and the number of connection. In this paper the behavior of MANET is modeled using Fuzzy Inference System for DSR (Dynamic Source Routing) protocol , Fuzzy Inference System offers a natural way of representing and reasoning the problems with uncertainty and imprecision. Fuzzy logic is found to be a suitable way in the mobile ad hoc network routing decision. A Fuzzy inference system is implemented on MATLAB 7.0 and the model is found to be satisfactory with the fuzzy input metrics and de fuzzified output metrics .
Radial basis function neural network control for parallel spatial robotTELKOMNIKA JOURNAL
The derivation of motion equations of constrained spatial multibody system is an important problem of dynamics and control of parallel robots. The paper firstly presents an overview of the calculating the torque of the driving stages of the parallel robots using Kronecker product. The main content of this paper is to derive the inverse dynamics controllers based on the radial basis function (RBF) neural network control law for parallel robot manipulators. Finally, numerical simulation of the inverse dynamics controller for a 3-RRR delta robot manipulator is presented as an illustrative example.
Chaotic Secure Communication Using Iterated Filtering Method P. Karthik -Assistant Professor,
D. Gokul Prashanth -UG Scholar,
T. Gokul - UG Scholar,
Department of Electronics and Communication Engineering,
SNS College of Engineering, Coimbatore, India.
This document summarizes a research paper that proposes a microcontroller-based cryptosystem using the Tiny Encryption Algorithm (TEA) combined with a Key Generation Unit (KGU). The KGU uses timers in the microcontroller to generate random bits for encryption keys. The cryptosystem can operate in serial or wireless transmission modes. Performance analysis shows the cryptosystem has improved throughput and decreased execution time compared to TEA alone. Randomness testing of the generated keys indicates distinct random bits. In conclusion, the system provides moderate security and simplicity for applications requiring secured data transfer with low cost and memory constraints.
A New Chaos Based Image Encryption and Decryption using a Hash FunctionIRJET Journal
This document proposes a new chaos-based image encryption and decryption scheme using Arnold's cat map for pixel permutation and the Lorenz system for diffusion. A hash function, specifically MurmurHash3, is used to generate the permutation and diffusion keys. This helps accelerate the diffusion process and reduces the number of cipher cycles needed compared to previous schemes. The encryption process involves first permuting the pixel positions using the cat map, with control parameters determined by the hash value of the original image. Then diffusion is performed using the Lorenz system to generate the keystream. Decryption follows the reverse process using the same keys. Security analysis demonstrates the scheme has a large key space and the encrypted images pass various statistical tests, indicating the
Robust Adaptive Threshold Algorithm based on Kernel Fuzzy Clustering on Image...cscpconf
The document presents a robust adaptive threshold algorithm based on kernel fuzzy clustering for image segmentation. It proposes using kernel fuzzy c-means clustering (KFCM) to generate adaptive thresholds for segmenting images. KFCM computes fuzzy membership values for pixels to cluster them. The algorithm was tested on MR brain images and showed good performance in detecting large and small objects while also enhancing low contrast images. Experimental results demonstrated the efficiency and accuracy of combining an adaptive threshold algorithm with KFCM for medical image segmentation.
Hierarchical algorithms of quasi linear ARX Neural Networks for Identificatio...Yuyun Wabula
This document summarizes a research paper on hierarchical algorithms for training a quasi-linear ARX neural network model for identification of nonlinear systems. The key points are:
1) A hierarchical algorithm is proposed that first estimates the system using a linear sub-model and least squares estimation to obtain linear parameters. It then trains a neural network nonlinear sub-model to refine the errors of the linear sub-model.
2) The linear parameter estimates are fixed and used as biases for the neural network, which is trained to minimize the residual errors of the linear sub-model.
3) This hierarchical approach separates the identification into linear and nonlinear parts, allowing analysis of the system linearly while also capturing nonlinearities. The neural
A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...IJERD Editor
This paper presents a blind steganalysis technique to effectively attack the JPEG steganographic
schemes i.e. Jsteg, F5, Outguess and DWT Based. The proposed method exploits the correlations between
block-DCTcoefficients from intra-block and inter-block relation and the statistical moments of characteristic
functions of the test image is selected as features. The features are extracted from the BDCT JPEG 2-array.
Support Vector Machine with cross-validation is implemented for the classification.The proposed scheme gives
improved outcome in attacking.
A C OMPARATIVE A NALYSIS A ND A PPLICATIONS O F M ULTI W AVELET T RANS...IJCI JOURNAL
In the era of telemedicine a large amount of medica
l information is exchanged via electronic media mos
tly
in the form of medical images, to improve the accur
acy and speed of diagnosis process. Medical Image
denoising has the basic importance in image analysi
s as these algorithm and procedures affects the eff
icacy
of medical diagnostic. In this paper focus is on Mu
lti wavelets based Image denoising techniques, beca
use
they provide the possibility of designing wavelets
systems which are orthogonal, symmetric and compact
ly
supported, simultaneously. Performance of Discrete
Multi Wavelet Transform and Discrete Wavelet
Transform based denoising methods are compared on t
he basis of PSNR
Adaptive Fuzzy-Neural Control Utilizing Sliding Mode Based Learning Algorithm...IJERA Editor
This paper introduces an adaptive fuzzy-neural control (AFNC) utilizing sliding mode-based learning algorithm
(SMBLA) for robot manipulator to track the desired trajectory. A traditional sliding mode controller is applied to
ensure the asymptotic stability of the system, and the fuzzy rule-based wavelet neural networks (FWNNs) are
employed as the feedback controllers. Additionally, a novel adaptation of the FWNNs parameters is derived
from the SMBLA in the Lyapunov stability theorem. Hence, the AFNC approximates parameter variation,
unmodeled dynamics, and unknown disturbances without the detailed knowledge of robot manipulator, while
resulting in an improved tracking performance. Lastly, in order to validate the effectiveness of the proposed
approach, the comparative simulation results of two-degrees of freedom robot manipulator are presented.
Secure Image Transmission for Cloud Storage System Using Hybrid SchemeIJERD Editor
- Data over the cloud is transferred or transmitted between servers and users. Privacy of that
data is very important as it belongs to personal information. If data get hacked by the hacker, can be
used to defame a person’s social data. Sometimes delay are held during data transmission. i.e. Mobile
communication, bandwidth is low. Hence compression algorithms are proposed for fast and efficient
transmission, encryption is used for security purposes and blurring is used by providing additional
layers of security. These algorithms are hybridized for having a robust and efficient security and
transmission over cloud storage system.
IRJET- Analysis of Chaotic, Hyperchaotic and DNA Sequence for Image EncryptionIRJET Journal
The document proposes a new image encryption method that uses both a hyperchaotic sequence and DNA sequence. A 4D hyperchaotic system is used to generate a pseudorandom sequence, which is then applied to almost all steps of the encryption process. The intensity values of an input image are converted to a binary digit stream and globally scrambled using the hyperchaotic sequence. DNA algebraic operations and complementation are then performed between the hyperchaotic sequence and a DNA sequence to further encrypt the image. Experimental results demonstrate the proposed method achieves better encryption performance than other state-of-the-art methods in terms of quality, security, and robustness against noise and cropping attacks.
A BLIND ROBUST WATERMARKING SCHEME BASED ON SVD AND CIRCULANT MATRICEScsandit
Multimedia security has been the aim point of considerable research activity because of its wide
application area. The major technology to achieve copyright protection, content authentication,
access control and multimedia security is watermarking which is the process of embedding data
into a multimedia element such as image or audio, this embedded data can later be extracted
from, or detected in the embedded element for different purposes. In this work, a blind
watermarking algorithm based on SVD and circulant matrices has been presented. Every
circulant matrix is associated with a matrix for which the SVD decomposition coincides with the
spectral decomposition. This leads to improve the Chandra algorithm [1], our presentation will
include a discussion on the data hiding capacity, watermark transparency and robustness
against a wide range of common image processing attacks.
This document compares the Efficient Fuzzy Kohonen Clustering Network (EFKCN) algorithm to the original Fuzzy Kohonen Clustering Network (FKCN) algorithm to determine if EFKCN improves clustering results. Through empirical testing and simulations using expanded Fisher's Iris Data, the results showed that EFKCN did not achieve better accuracy than FKCN and is not yet a better clustering algorithm. While EFKCN had smaller errors in cluster center positions, FKCN consistently achieved higher correct clustering rates, even when the algorithms were run for the same number of iterations. Therefore, the document concludes that EFKCN does not actually improve upon the clustering performance of the original FKCN algorithm.
1. El documento habla sobre Mesopotamia, la región entre los ríos Tigris y Éufrates donde florecieron las primeras civilizaciones humanas. 2. Explica que esta región es correctamente llamada Mesopotamia ya que los países de Kuwait, Irak e Irán se encuentran entre estos dos ríos. 3. Resume partes del Poema del Diluvio, incluyendo que narra una gran inundación de 6 días provocada por un huracán del que sólo sobrevivieron Noé y su familia.
This document contains a cover letter and resume for Anne Hopkins. She is looking for security work, preferably gatehouse or static duties, with a 1A license and willingness to update her C license. Her experience includes over 11 years as a security officer with gatehouse and patrol duties, as well as crowd control, alarm monitoring, and other roles. She has also worked in loss prevention, hotel management, and supplies procurement for a college.
QA and content management involve testing software for bugs and managing digital content to ensure a quality user experience. The document discusses tasks like test automation, data validation, adding and fixing pages, and translating content across different languages. It also lists tools used for tasks like continuous integration, testing tracking, and content management systems.
Towards neuralprocessingofgeneralpurposeapproximateprogramsParidha Saxena
Did validation of one of the machine learning algorithms of neural networks,and compared the results for its implementation on hardware (FPGA) using xilinx, with that of a sequential code execution(using FANN).
The document discusses research conducted for a product proposal for nanny robots called Rohona. It summarizes several academic articles about advances in robotics and artificial intelligence, including robots with neural networks that can interact with humans. The proposed nanny robots would be adaptable to each family's needs and able to provide education, entertainment, and care in multiple languages.
This document discusses the convergence of man and machine through the development of robots that think and act more human-like. It references several research projects aimed at creating robots with artificial neural networks and direct sensory-action capabilities. The document proposes potential future applications of more human-like robots, such as surgical procedures conducted by robots without doctors, robotic supervisors for assembly lines, robotic nannies, and even humanoid spouses.
The document provides a summary of Kathy Semore's professional experience and qualifications. She has over 18 years of experience in business analysis, technical research, application development, project management, and data analysis. Her experience includes working with various software programs and developing requirements, test cases, documentation, and more. She has held roles as a business analyst and technical consultant at several large banks.
The document discusses research on making robots think like humans and highlights several projects. It proposes nanny-bots as a future product that would be adaptable to family needs, educational and entertaining for children, able to speak multiple languages, and customizable to each family's specific needs and desires. The document references articles on using artificial neural networks to control robots and the importance of robots having physical bodies to develop intelligence through direct sensory-action interactions.
This document contains research from various sources on creating robots that think like humans and using artificial intelligence to give robots bodies and senses. It also discusses potential nanny robot products and naming ideas. Further, it provides tips for effective Twitter marketing campaigns, including engaging audiences, using hashtags and visual content, and humanizing brands.
This document contains research notes and proposals for a product focused on the convergence of families and machines. It includes summaries of articles on developing thinking robots and the value of embodied intelligence. The document also proposes the concept of "Nanny-Bots" as an adaptable, educational, and entertaining robotic product for families. It describes the naming process for the brand "Robauten" and provides a diagram mapping character words like "sweet" and "knowing" to the brand.
THE ACTIVE CONTROLLER DESIGN FOR ACHIEVING GENERALIZED PROJECTIVE SYNCHRONIZA...ijait
This paper discusses the design of active controllers for achieving generalized projective synchronization (GPS) of identical hyperchaotic Lü systems (Chen, Lu, Lü and Yu, 2006), identical hyperchaotic Cai systems (Wang and Cai, 2009) and non-identical hyperchaotic Lü and hyperchaotic Cai systems. The synchronization results (GPS) for the hyperchaotic systems have been derived using active control method and established using Lyapunov stability theory. Since the Lyapunov exponents are not required for these calculations, the active control method is very effective and convenient for achieving the GPS of the
hyperchaotic systems addressed in this paper. Numerical simulations are provided to illustrate the effectiveness of the GPS synchronization results derived in this paper.
A new block cipher for image encryption based on multi chaotic systemsTELKOMNIKA JOURNAL
In this paper, a new algorithm for image encryption is proposed based on three chaotic systems which are Chen system,logistic map and two-dimensional (2D) Arnold cat map. First, a permutation scheme is applied to the image, and then shuffled image is partitioned into blocks of pixels. For each block, Chen system is employed for confusion and then logistic map is employed for generating subsititution-box (S-box) to substitute image blocks. The S-box is dynamic, where it is shuffled for each image block using permutation operation. Then, 2D Arnold cat map is used for providing diffusion, after that XORing the result using Chen system to obtain the encrypted image.The high security of proposed algorithm is experimented using histograms, unified average changing intensity (UACI), number of pixels change rate (NPCR), entropy, correlation and keyspace analyses.
The Quality of the New Generator Sequence Improvent to Spread the Color Syste...TELKOMNIKA JOURNAL
This paper shows a new technic applicable for the digital devices that are the result of the finite’s
effect precision in the chaotic dynamics used in the coupled technic and the chaotic map’s perturbation
technics used for the generation of a Pseudo-Random Number Generator (PRNGs).The use of the
pseudo- chaotic sequences coupled to the orbit perturbation method in the chaotic logistic map and the
NewPiece-Wise Linear Chaotic Map (NPWLCM). The pseudo random number generator’s originality
proposed from the perturbation of the chaotic recurrence. Furthermore the outputs of the binary sequences
with NPWLCM are reconstructed conventionally with the Bernoulli’s sequences shifts map to change the
shapes with the bitwise permetation then the results in simulation are shown in progress.After being
perturbed, the chaotic system can generate the chaotic binary sequences in uniform distribution and the
statistical properties invulnerable analysis. This generator also has many advantages in the possible useful
applications of spread spectrum digitalimages, such as sensitive secret keys, random uniform distribution
of pixels in Crypto system in secure and synchronize communication.
COLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMSIJNSA Journal
This paper proposed a novel color image encryption scheme based on multiple chaotic systems. The ergodicity property of chaotic system is utilized to perform the permutation process; a substitution operation is applied to achieve the diffusion effect. In permutation stage, the 3D color plain-image matrix is converted to a 2D image matrix, then two generalized Arnold maps are employed to generate hybrid chaotic sequences which are dependent on the plain-image’s content. The generated chaotic sequences are then applied to perform the permutation process. The encryption’s key streams not only depend on the cipher keys but also depend on plain-image and therefore can resist chosen-plaintext attack as well as
known-plaintext attack. In the diffusion stage, four pseudo-random gray value sequences are generated by
another generalized Arnold map. The gray value sequences are applied to perform the diffusion process by bitxoring operation with the permuted image row-by-row or column-by-column to improve the encryption rate. The security and performance analysis have been performed, including key space analysis, histogram analysis, correlation analysis, information entropy analysis, key sensitivity analysis, differential analysis
etc. The experimental results show that the proposed image encryption scheme is highly secure thanks to its
large key space and efficient permutation-substitution operation, and therefore it is suitable for practical image and video encryption.
COLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMSIJNSA Journal
This document proposes a novel color image encryption scheme based on multiple chaotic systems. The scheme utilizes the ergodic properties of chaotic systems to perform pixel permutation and applies a substitution operation to achieve diffusion. In the permutation stage, two generalized Arnold maps are used to generate hybrid chaotic sequences to permute pixel positions. In the diffusion stage, four pseudo-random gray value sequences generated by another generalized Arnold map are used to diffuse the permuted image via bitwise XOR operations. Security analysis shows the scheme has a large key space and is highly secure against statistical attacks, differential attacks, and chosen/known plaintext attacks.
COLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMSIJNSA Journal
This paper proposed a novel color image encryption scheme based on multiple chaotic systems. The ergodicity property of chaotic system is utilized to perform the permutation process; a substitution
operation is applied to achieve the diffusion effect. In permutation stage, the 3D color plain-image matrix
is converted to a 2D image matrix, then two generalized Arnold maps are employed to generate hybrid chaotic sequences which are dependent on the plain-image’s content. The generated chaotic sequences are then applied to perform the permutation process. The encryption’s key streams not only depend on the
cipher keys but also depend on plain-image and therefore can resist chosen-plaintext attack as well as
known-plaintext attack. In the diffusion stage, four pseudo-random gray value sequences are generated by another generalized Arnold map. The gray value sequences are applied to perform the diffusion process by bitxoring operation with the permuted image row-by-row or column-by-column to improve the encryption rate. The security and performance analysis have been performed, including key space analysis, histogram analysis, correlation analysis, information entropy analysis, key sensitivity analysis, differential analysis etc. The experimental results show that the proposed image encryption scheme is highly secure thanks to its large key space and efficient permutation-substitution operation, and therefore it is suitable for practical image and video encryption.
ACTIVE CONTROLLER DESIGN FOR THE GENERALIZED PROJECTIVE SYNCHRONIZATION OF TH...ijait
This paper discusses the design of active controllers for generalized projective synchronization (GPS) of identical Wang 3-scroll chaotic systems (Wang, 2009), identical Dadras 3-scroll chaotic systems (Dadras and Momeni, 2009) and non-identical Wang 3-scroll system and Dadras 3-scroll system. The synchronization results (GPS) derived in this paper for the 3 scroll chaotic systems have been derived using active control method and established using Lyapunov stability theory. Since the Lyapunov exponents are not required for these calculations, the active control method is very effective and convenient for
achieving the generalized projective synchronization (GPS) of the 3-scroll chaotic systems addressed in this paper. Numerical simulations are provided to illustrate the effectiveness of the GPS synchronization results derived in this paper.
The secure communication through synchronization between two identic chaotic systems have
recently gained a lot of interest. To implement a robust secure system based on synchronization, there is
always a need to generate new discrete dynamical systems and investigate their performances in terms of
amount of randomness they have and the ability to achieve synchronization smoothly. In this work, a new
chaotic system, named Nahrain, is proposed and tested for the possible use in secure transmission via
chaos synchronization as well as in cryptography applications. The performance of the proposed chaotic
system is tested using 0-1 test, while NIST suite tests are used to check the randomness statistical
properties. The nonlinear control laws are used to verify the synchronization of master-slave parts of the
proposed system. The simulation results show that Nahrain system has chaotic behavior and
synchronizable, while the equivalent binary sequence of the system has excellent randomness statistical
properties. The numerical results obtained using MATLAB for 0-1 test was 0.9864, and for frequency test
was 0.4202, while for frequency test within a block was 0.4311. As a result, the new proposed system can
be used to develop efficient encryption and synchronization algorithms for multimedia secure transmission
applications.
Chaotic Block Image Scheme using Large Key Space and Message Digest AlgorithmCSCJournals
In this paper, chaotic block image scheme using large key space and message digest algorithm. Cat map intended for confusion and 2D-Sine Tent Composite map (2D-STCM) key generator intended for diffusion. Confusion is implemented by 2D Cat map with arbitrary block size. In the first tendency, 2D cat map use for local shuffling of indexes inside blocks, while in the second tendency, 2D cat map used for global shuffling of whole image indexes. The designed algorithm executes two confusions and one diffusion in each iteration. To increase the security level, the message digestion algorithm is used as a fingerprint for the plain image that creates the initial value of the key. After that 2D-STCM generates a large key stream. Diffusion implementation takes place by XOR operation; between a key stream and confused image. Experimental results, show that security level increases due to integration of confusion and diffusion. On the other side large key space and the high sensitivity of secret keys have been given a guarantee for the performance of the security. Performance measures reach to the top value among those in the similar researches. To verify the obtained results, authors implemented inverse chaos. All the tests are processed by MATLAB 2015a.
Enhancement and Analysis of Chaotic Image Encryption Algorithms cscpconf
The focus of this paper is to improve the level of security and secrecy provided by the chaotic
map based image encryption.An encryption algorithm based on the Logistic and the Henon
maps is proposed. The algorithm uses chaotic iteration to generate the encryption keys, and
then carries out the XOR and cyclic shift operations on the plain text to change the values of
image pixels. Chaotic Map Lattice based image encryption algorithm suggested by Pisarchik is
also examined which is based on Logistic map alone. In experiments, the corresponding results
showed the proposed method is a promising scheme for image encryption in terms of security
and secrecy. At the end, we show the results of a security analysis and a comparison of both
schemes
A novel technique for speech encryption based on k-means clustering and quant...journalBEEI
This document proposes a new algorithm for speech encryption that uses quantum chaotic maps, k-means clustering, and two stages of scrambling. The first stage uses a tent map to scramble bits in the binary representation of the signal. The second stage uses k-means clustering to scramble blocks of the signal. A quantum logistic map is used to generate an encryption key. The proposed method is evaluated using statistical quality metrics and is shown to provide secure and efficient speech encryption while maintaining high quality of recovered speech.
TEST GENERATION FOR ANALOG AND MIXED-SIGNAL CIRCUITS USING HYBRID SYSTEM MODELSVLSICS Design
In this paper we propose an approach for testing time-domain properties of analog and mixed-signal circuits. The approach is based on an adaptation of a recently developed test generation technique for hybrid systems and a new concept of coverage for such systems. The approach is illustrated by its application to some benchmark circuits.
Test Generation for Analog and Mixed-Signal Circuits Using Hybrid System Mode...VLSICS Design
In this paper we propose an approach for testing time-domain properties of analog and mixed-signal circuits. The approach is based on an adaptation of a recently developed test generation technique for hybrid systems and a new concept of coverage for such systems. The approach is illustrated by its application to some benchmark circuits.
SLIDING MODE CONTROLLER DESIGN FOR GLOBAL CHAOS SYNCHRONIZATION OF COULLET SY...ijistjournal
This paper derives new results for the design of sliding mode controller for the global chaos synchronization of identical Coullet systems (1981). The synchronizer results derived in this paper for the complete chaos synchronization of identical hyperchaotic systems are established using sliding control theory and Lyapunov stability theory. Since the Lyapunov exponents are not required for these calculations, the sliding mode control method is very effective and convenient to achieve global chaos synchronization of the identical Coullet systems. Numerical simulations are shown to illustrate and validate the synchronization schemes derived in this paper for the identical Coullet systems.
SLIDING MODE CONTROLLER DESIGN FOR GLOBAL CHAOS SYNCHRONIZATION OF COULLET SY...ijistjournal
This paper derives new results for the design of sliding mode controller for the global chaos synchronization of identical Coullet systems (1981). The synchronizer results derived in this paper for the complete chaos synchronization of identical hyperchaotic systems are established using sliding control theory and Lyapunov stability theory. Since the Lyapunov exponents are not required for these calculations, the sliding mode control method is very effective and convenient to achieve global chaos synchronization of the identical Coullet systems. Numerical simulations are shown to illustrate and validate the synchronization schemes derived in this paper for the identical Coullet systems.
Distributed Spatial Modulation based Cooperative Diversity Schemeijwmn
: In this paper, a distributed spatial modulation based cooperative diversity scheme for relay
wireless networks is proposed. Where, the space-time block code is exploited to integrate with distributed
spatial modulation. Therefore, the interested transmission scheme achieves high diversity gain. By using
Monte-Carlo simulation based on computer, we showed that our proposed transmission scheme outperforms
state-of-the-art cooperative relaying schemes in terms bit error rate (BER) performance.
CHANNEL ESTIMATION AND MULTIUSER DETECTION IN ASYNCHRONOUS SATELLITE COMMUNIC...ijwmn
In this paper, we propose a new method of channel estimation for asynchronous additive white Gaussian noise channels in satellite communications. This method is based on signals correlation and multiuser interference cancellation which adopts a successive structure. Propagation delays and signals amplitudes are jointly estimated in order to be used for data detection at the receiver. As, a multiuser detector, a single stage successive interference cancellation (SIC) architecture is analyzed and integrated to the channel estimation technique and the whole system is evaluated. The satellite access method adopted is the direct sequence code division multiple access (DS CDMA) one. To evaluate the channel estimation and the detection technique, we have simulated a satellite uplink with an asynchronous multiuser access.
- The document details a state space solver approach for analog mixed-signal simulations using SystemC. It models analog circuits as sets of linear differential equations and solves them using the Runge-Kutta method of numerical integration.
- Two examples are provided: a digital voltage regulator simulation and a digital phase locked loop simulation. Both analog circuits are modeled in state space and simulated alongside a digital design to verify mixed-signal behavior.
- The state space approach allows modeling analog circuits without transistor-level details, improving simulation speed over traditional mixed-mode simulations while still capturing system-level behavior.
A review of literature shows that there is a variety of works studying coverage path planning in several autonomous robotic applications. In this work, we propose a new approach using Markov Decision Process to plan an optimum path to reach the general goal of exploring an unknown environment containing buried mines. This approach, called Goals to Goals Area Coverage on-line Algorithm, is based on a decomposition of the state space into smaller regions whose states are considered as goals with the same reward value, the reward value is decremented from one region to another according to the desired search mode. The numerical simulations show that our approach is promising for minimizing the necessary cost-energy to cover the entire area.
The document provides an overview of discrete time signal processing concepts including:
1) Signals can be classified as continuous, discrete, deterministic, random, periodic, and non-periodic. Systems can be linear, time-invariant, causal, stable/unstable, and recursive/non-recursive.
2) Digital signal processing has advantages over analog such as precision, stability and easy implementation of operations. It also has drawbacks like needing ADCs/DACs and being limited by sampling frequency.
3) Discrete time signals are only defined at discrete time instances while continuous time signals are defined for all time. Both can be represented graphically, functionally, through tables or sequences.
Similar to Improvement of chaotic secure communication scheme based on steganographic method and multimodal dynamic maps (20)
2. 306 M. Khodadadzadeh and H. Gholizadeh-Narm
1 Introduction
The second generation of chaotic secure communication systems was introduced between
1993 and 1995, known as chaotic modulation. This generation utilised two different
methods for modulating message into chaotic carrier. In the first one (chaotic parameter
modulation), message signal was used to change the parameters of chaotic transmitter
(Yang and Chua, 1996); while in the second one (non-automatic chaotic modulation),
message signal was used to change the phase space of the chaotic transmitter (Wu and
Chua, 1993). Unlike chaotic parameter modulation in which, transmitter switches among
different trajectories in different chaotic attractors, in non-automatic chaotic modulation,
transmitter switches among different trajectories of the same chaotic attractor.
Since the bifurcation of a chaotic system is an extremely complex, finding the way by
which parameters change is really difficult, even if an intruder has partial information
about the chaotic system structure in transmitter. In receiver side, an adaptive controller
is used to regulate chaotic system’s parameters adaptively so that synchronisation error
approaches zero (Chua et al., 1996).
The degree of system security can be increased by the second generation; however
such a security level is not satisfactory yet. For this reason, at first, we steganography
message signal using the grey level modification (GLM) method with multimodal chaotic
maps and send it using chaotic parameter modulation. Then with synchronisation in
receiver side and by determining system’s undefined parameters and also by specifying
map set, the message signal is retrieved.
Steganography is the art of hiding a message in a communicational channel or route
in such a way that no one, apart from the intended recipient, can be aware of the
existence of the message. GLM is a method for mapping information using GLM
and utilises the concept of odd and even numbers to map information in a picture
(Wu et al., 1996). This method is a one-to-one map between binary information and
selected pixel of a picture.
Multimodal chaotic maps are used to increase the security of chaotic secure
communication systems, in steganographic method, multimodal chaotic maps are used to
select pixels. We use a family of maps whose domain is partitioned according to the
maximal number of modals to be generated each of which consists of a logistic map. The
number of members of a set equals to the maximum number of modals.
In general, one of methods used to increase the security of secured chaotic
communication systems is to send encrypted information using such systems. Having a
semi-noisy nature, chaotic systems have various applications in this field. Normally
various generations of secured chaotic systems do not have a high security individually.
A solution to eliminate this problem is to combine various generations and use novel
encryption methods before sending information. Unlike encryption in which an attacker
knows the encrypted data that are sent but only is not able to recognise its crypt,
steganography sends hidden data without attackers even being informed of sending
procedure of such hidden data. Considering these characteristics, steganography is one of
the solutions that may be utilised.
The rest of this paper is organised as follows. In Section 2 synchronisation method is
introduced. Section 3 is devoted to the generation of multimodal chaotic maps based on
the logistic map. In Section 4, the steganographic method is discussed. In Section 5, we
develop our proposed method using multimodal chaotic maps. To assess the effectiveness
3. Improvement of chaotic secure communication scheme 307
of our method, we present some numerical simulations in Section 6. Finally, we present
the conclusions in Section 7.
2 System description and synchronisation method
In chaotic secure communication system both master and slave systems are chaotic.
Chaos synchronisation means, the trajectories of the slave system can track that of the
master system starting from arbitrary initial condition.
2.1 Transmitter
Rossler system’s dynamic is as follows:
( )
1 1 1
1 1 1
1 1 1
x y z
y x ay
z b z x c
= − −
= +
= + −
(1)
This system has a chaotic behaviour for vicinity of a = b = 0.2, c ∈ [3, 11], and a large set
of initial conditions.
2.2 Some algebraic properties
For the purpose of chaotic synchronisation of two Rossler systems, we introduce the
following definitions.
Definition 1: Consider a smooth nonlinear system, described by a state vector
1{ }i n n
iX x R=
= ∈ and by the output vector 1{ } ,i m m
iG g R=
= ∈ of the form:
( , ), ( )X f X P G h X= = (2)
where h(⋅) is a smooth vector function and p ∈ Rl
is a constant parameters vector, with
l < n. Let G(j)
denote the jth
time derivative of the vector G. We say that the vector state X
is algebraically observable, if it can be uniquely expressed as
( )(1) ( )
, ,..., j
X G G G= Φ (3)
for some integer j and for some smooth function Φ.
Definition 2: Under same conditions as in Definition 1. If the vector of parameters, P
satisfies the following relation
( ) ( )( ) ( )
1 2,..., ,...,j j
G G Y Y PΩ = Ω (4)
where Ω1(⋅)and Ω2(⋅)are, respectively, n × 1 and n × n smooth matrices, then P is said to
be algebraically identifiable with respect to the output vector G (Fliess and Sira-Ramírez,
2003).
4. 308 M. Khodadadzadeh and H. Gholizadeh-Narm
To this end the following state x1, can be rewritten, as
1 1 1x g ag= − (5)
where the outputs is chosen such that g1 = y1 and g2 = z1. Moreover, substituting the
above expression into the third differential equation of (1), we have
1 2 2 1 2 2b g g g ag g cg+ − = + (6)
Hence, we conclude that Rossler system is algebraically observable and identifiable with
respect to the available outputs g1 = y1 and g2 = z1. it is possible to solve the
synchronisation problem of the uncertain Rossler system provided that the states y1 and z1
are always available and state x1 is non-available. Moreover the vector of parameters
p = (a, c) can be simultaneously recovered.
2.3 Receiver
Consider the uncertain Rossler system (1), referred as the transmitter system, with the
available output states y1 and z1. And let us propose the following receiver controlled
system:
( )
2 1 1 1
2 2 1 2
2 1 2 3
ˆ
ˆ
x y z u
y x ay u
z b z x c u
= − − +
= + +
= + − +
(7)
Then, the synchronisation objective is to find u = (u1, u2, u3) and ˆ ˆ ˆ( , )p a c= such that the
unknown Rossler system (7) follows the Rossler system (1) with different initial
condition and ˆp converging to the actual values of (a, c).
2.4 Transmission of message signals by chaotic parameter modulation
In this section we discuss the case when both parameters a and c of system (1) are used to
transmit message signals I1(t) and I2(t). We use modulation rules to modulate I1(t) and
I2(t). in parameters of the transmitter in (1).
The modulation rules are given by
1 1
2 2
ˆˆ ˆ( ) ( ), ( ) ( ),
ˆˆ ˆ( ) ( ), ( ) ( ),
a t a I t a t a I t
c t c I t c t c I t
= + = +
= + = +
(8)
where 1
ˆ ( )I t and 2
ˆ ( )I t are the recovered message signals.
Now let us introduce the following errors:
1 2 1 2 1 2; ; ;x y ze x x e y y e z z= − = − = − (9)
1 1 1 2 2 2
ˆ ˆ; ;
ˆ ˆ; ;
a a a c c c
I I I I I I
= − = −
= − = −
(10)
5. Improvement of chaotic secure communication scheme 309
and according to them, we define the following vectors:
( ) ( ) ( )1 2, , ; , ; ,T T T
x y ze e e e p a c I I I= = = (11)
From equations (1) to (7), and taking into account the modulation rules (8) we have:
1
1 2
2 3
x
y
z x
ue
e e ex ay I y u
e ze cz I z u
−⎡ ⎤⎡ ⎤
⎢ ⎥⎢ ⎥= = + + −⎢ ⎥⎢ ⎥
⎢ ⎥⎢ ⎥ − − −⎣ ⎦ ⎣ ⎦
(12)
where for simplicity, we stand for y = y1 and x = x1. As we can see, the above system can
be considered as a control problem where the vector inputs u and p must be proposed
such that e asymptotically converges to zero.
2.5 Control design
In this section a high order sliding mode adaptive controller (HOSMAC) proposed in
Mata-Machuca et al. (2012) is used at the receiver to maintain synchronisation by
continuously tracking the changes in the modulated parameters. Then, I1(t) and I2(t) can
be recovered by using this controller.
Consider a Lyapunov function
1 1 1
2 2 2
T T T
V e e p p I I= + + (13)
The time derivative of V along the trajectories of (9) is then given by
1 1 2
2 3 1 1 2 2
x x y y y y
x z z z z
V aa cc e u e e aye I ye e u
ze e cze I ze e u I I I I
= + − + + + −
+ − − − + +
(14)
Now, in order to make V semi-definite negative, we propose ; ,p u and I as
1
2 1
3 2
( )
( )
y z
d
y y
d
z z
e zeu
u u k e sign e
u k e sign e
+⎡ ⎤⎡ ⎤
⎢ ⎥⎢ ⎥= = ×⎢ ⎥⎢ ⎥
⎢ ⎥⎢ ⎥ ×⎣ ⎦ ⎣ ⎦
(15)
y
z
yea
p
zec
⎡ ⎤ −⎡ ⎤
= =⎢ ⎥ ⎢ ⎥
⎢ ⎥ ⎣ ⎦⎣ ⎦
(16)
1
2
y
z
yeI
I
zeI
⎡ ⎤ −⎡ ⎤
⎢ ⎥= = ⎢ ⎥
⎢ ⎥ ⎣ ⎦⎣ ⎦
(17)
where k1 and k12are strictly positive constants and d is any positive even integer.
6. 310 M. Khodadadzadeh and H. Gholizadeh-Narm
3 Multimodal chaotic maps
A unimodal map is a continuous 1D function ℜ → ℜ with a single critical point c0 and
monotonically increasing on one side of c0 and decreasing on the other (Campos-Cantón
et al., 2011). The dynamics of the system is governed by the function
1 ( , )n nx f x β+ = (18)
where xn is the system state after n iterations and β is the bifurcation parameter and initial
condition c0.
We use a family of maps whose domain is partitioned according to the maximal
number of modals to be generated. The theory of multimodal maps is studied in de Melo
and van Strien (1993). Here, we are interested in the definition given in Smania (2005)
for a particular type of multimodal maps.
A map fβ is k-modal, if it is continuous and has k critical points denoted by c0, c1, …,
ck–1 in I = [a, b] ⊂ R, monotonically increases on the left of each ci and monotonically
decreases on the right of each ci, (i = {0, 1, 2, …, k}).
We say that f is a k-modal map if it can be written as a composition of k unimodal
maps f1, f2, …, fk with the following properties:
• fi: Ii → I has a unique critical point (a maximum)
• f(ci) = f(cj), for i ≠ j
•
1
.
k
i
i
I I
=
=∪
The parameterised family F of maps fβ is defined by the following piecewise function
( )( ) [ )1 1( ) , for , ,r r r rf x d x x d x d d+ += − − ∈β β
where
}{( )/ 0,1,2,..., 1 .rd r k r k= = −
Note that
[ ] [ ) [ )
1 1
1 1
0 0
0, / , , and , .
k k
r r r r
r r
J k γ I d d d d
− −
+ +
= =
∈ = = =∪ ∩β α φ
4 Steganographic method
Steganography is an art of hiding information inside others. The main purpose of
steganography is to hide a message in another one in a way to prevent any attacker to
detect or notice the hidden message (Katzenbeisser and Petitcolas, 2000). GLM
Steganography is a technique to map data by modifying the grey level values of the
image. It is a one-to-one mapping between the binary data and the selected pixels in an
image (Al-Taani and Al-Issa, 2009). From a given image a set of pixels are selected
based on a mathematical function, for this purpose we use a multimodal chaotic map. The
grey level values of those pixels are compared with the bit stream that is to be mapped in
the image. Initially, the grey level values of the selected pixels (odd pixels) are made
7. Improvement of chaotic secure communication scheme 311
even by changing the grey level by one unit. Once all the selected pixels have an even
grey level, it is compared with the bit stream, which has to be mapped. The first bit from
the bit stream is compared with the first selected pixel. If the first bit is even, then the
first pixel is not modified as all the selected pixels have an even grey level value. But if
the bit is odd, then the grey level value of the pixel is decremented by one unit to make its
value odd, which then would represent an odd bit mapping. This is carried out for all bits
in the bit stream and each and every bit is mapped by modifying the grey level values
accordingly.
5 Proposed method
To hide the information in different steganographic method, the proper pixel should be
selected so that they are completely random and cannot be identified and exert minimal
impact on the visual properties. To begin the process of embedding, we first select a set
of pixels, which would be used for hiding the data.
In the proposed method, we used multimodal chaotic map for choosing random
pixels. Domain of multimodal chaotic maps is partitioned according to the maximal
number of modals to be generated. To this end, by choosing system parameters, we can
consider the parameter ci = ki, i = 1, 2, 3, 4 as family of multimodal maps and the
parameter aj = rj, j = 1, 2, 3, 4 as member of the family. The correspondence between
parameters are given in Tables 1 and 2.
Table 1 Correspondence between Ki and ci
Ki ci
K1 = 1 c1 = 1
K2 = 2 c2 = 2
K3 = 3 c3 = 3
K4 = 4 c4 = 4
Table 2 Correspondence between ri and ai
rj aj
r1 = 1 a1 = 1
r2 = 2 a2 = 2
r3 = 3 a3 = 3
r4 = 4 a4 = 4
Selecting these parameters the monoparametric family F of multimodal chaotic maps fβ
can be described as
(1/ 4 ) for [0,1/ 4);
(1/ 2 )( 1/ 4) for [1/ 4,1/ 2);
( )
(3/ 4 )( 1/ 2) for [1/ 2,3/ 4);
(1 )( 3/ 4) for [3/ 4,1];
β
x x x
x x x
f x β
x x x
x x x
− ∈⎧
⎪ − − ∈⎪
= ⎨
− − ∈⎪
⎪ − − ∈⎩
(19)
8. 312 M. Khodadadzadeh and H. Gholizadeh-Narm
where β ∈ J = [0, 64], this interval is determined by k = 4, γ = 0.25, and. Then, r = 0, 1, 2,
3 and the family F consists of the following four members:
1 the quadmodal map f64 for r = 0
2 the trimodal map f48 for r = 1
3 the bimodal map f32 for r = 2
4 the unimodal map f16 for r = 3.
Figure 1 shows the phase diagram of stretching and folding of structure for various
member of this family.
Figure 1 The block diagram of proposed method (see online version for colours)
By mapping the xn and xn+1 axis of the phase diagram showing stretching and folding of
the chaotic map to x and y axis of the cover image respectively, maximum of xn+2 are
selected pixels for candidate of embedding data. The selected points are shown in
Figure 2.
The uncertain parameters of Rossler systems are used to determine the family of
maps. After parameter adaptation and suitable synchronisation in receiver, the exact
parameters and family of maps will be available.
The secret message can be images, texts or sound. We put message into a bit stream
and choose the size of 32-bit for it. Using a function (multimodal maps) that takes two
numbers as keys; pixel of image is randomly selected. The grey level values of those
pixels are compared with the bit stream that is to be mapped in the image. The first bit
from the bit stream is compared with the first selected pixel. If the first bit is even, then
the first pixel is not modified as all the selected pixels have an even grey level value. But
if the bit is odd, then the grey level value of the pixel is decremented by one unit to make
its value odd, which then would represent an odd bit mapping. This is carried out for all
bits in the bit stream and each and every bit is mapped by modifying the grey level values
accordingly.
9. Improvement of chaotic secure communication scheme 313
Figure 2 Three-dimensional phase diagrams showing stretching and folding structure of the
quadmodal chaotic map for k = 4, (a) r = 0 (b) r = 1 (c) r = 2 (d) r = 3 (see online
version for colours)
(a) (b)
(c) (d)
We use modulation rules to modulate I1(t) and I2(t) in parameters of the transmitter. The
modulation rules are as follows:
1 1
2 2
ˆˆ ˆ( ) ( ), ( ) ( ),
ˆˆ ˆ( ) ( ), ( ) ( ),
a t a I t a t a I t
c t c I t c t c I t
= + = +
= + = +
(20)
where 1
ˆ ( )I t and 2
ˆ ( )I t are the recovered message signals.
After adaptive synchronisation and parameters estimation in receiver, we can encrypt
the Stego image and find the message data. Figure 1 shows the block diagram of our
proposed method.
10. 314 M. Khodadadzadeh and H. Gholizadeh-Narm
6 Experimental results
In our experiments, we used an image with size of 256 × 256. Computer simulations have
been carried out in order to test the effectiveness of the proposed method. We use
modulation rules to modulate I1(t) and I2(t) in parameters of the transmitter. The
modulation rules are given by (20). where 1
ˆ ( )I t and 2
ˆ ( )I t are the recovered message
signals.
We changed the image to vector so that it was transmitted as I1(t) in our secure
communication scheme. We can transmit other image with I2(t). Figure 3 shows the
original image and vector of the image used for simulation.
Figure 3 Selected pixels for candidate of embedding data corresponds to the quadmodal map
shown in Figure 1 (see online version for colours)
(a) (b)
(c) (d)
11. Improvement of chaotic secure communication scheme 315
We can choose the transmitter system parameter p = (a, c); while the arbitrary
initial conditions were selected as x1(0) = 1, y1(0) = –1, z1(0) = 1. Figure 4 shows
the attractor and the behaviour of the whole state of the Rossler system for
p = (a = 0.2, c = 5.7).
Figure 4 The image using for steganography: (a) original image (b) vector of the pixels
(see online version for colours)
(a)
(b)
This system displays a chaotic behaviour for the parameters values in a neighbourhood
{a = 0.2, c = 5.7}, therefore by mapping c and a interval to ki = 1, 2, 3, 4 and
rj = 0, 1, 2, 3 respectively, these numbers can be used to specify multimodal dynamic
maps.
Therefore, by choosing system parameters, we can consider the parameter ci = ki,
i = 1, 2, 3, 4 as family of multimodal maps and the parameter aj = rj, j = 1, 2, 3, 4 as
member of the family. Selecting c2 = 4 → k2 = 2 and a1 = 0.2 → r1 =0, one biomodal map
of this family F of multimodal chaotic maps can be described as
16
(1/ 2 ) for [0,0.5);
( ) 16
(1 )( 1/ 2) for [0.5,1];
x x x
f x
x x x
− ∈⎧
= ⎨
− − ∈⎩
Figure 5 shows the phase diagram of stretching and folding of structure for one biomodal
map of this family.
12. 316 M. Khodadadzadeh and H. Gholizadeh-Narm
Figure 5 (a) Rossler chaotic system attractor (b) Qualitative behaviour of the Rossler system
(see online version for colours)
(a)
(b)
By mapping the xn and xn+1 axis of the phase diagram showing in Figure 5 to x and y axis
of the cover image respectively, maximum of xn+2 are selected pixels for candidate of
embedding data. The selected points are shown in Figure 6.
To show the performance of the proposed control strategy, we carried out simulation
using the set-up as above, and fixing the receiver system gains as k1 = k2 = 0.7 and m = 4;
with the receiver system initialised at 1 1 1 1
ˆˆ(0) (0) (0) 0, (0) 0, 2.x y z p I= = = = = − In
Figure 7, we can see that the synchronisation errors asymptotically converge to zero and
parameters estimate to real value in receiver system.
As we expected a better performance can be obtained as long as the time is increased.
Figure 8 shows secret message error between transmitter and receiver in our chaotic
secure communication scheme that converges to zero.
13. Improvement of chaotic secure communication scheme 317
Figure 6 (a) Family F of biomodal logistic maps (b) The phase diagram of stretching and
folding of this structure (see online version for colours)
(a)
(b)
Figure 7 Selected pixels for candidate of embedding data corresponds to the one biomodal map
shown in Figure 5(b) (see online version for colours)
14. 318 M. Khodadadzadeh and H. Gholizadeh-Narm
Figure 8 (a) Synchronisation errors (b) Parameters estimation, when the master system is
initialised at (1, 1, 1); and the actual parameters vector is fixed as p = (0.2, 4)
(see online version for colours)
(a)
(b)
In this paper, we consider a text as a secret message data which is embed in cover image
using proposed steganographic method. Figure 9 shows the stego image after embedding
message. After using synchronisation and parameter estimation, the secret message can
be retrieved exactly.
Secret message is used in experimental results: This is a secret message …
7 Conclusions
In this paper, we proposed a steganographic method using multimodal maps for the fist
time that is imperceptible while a secret message is concealed in a cover image. In our
scheme, synchronisation and parameters identification of the constant unknown
15. Improvement of chaotic secure communication scheme 319
parameters of Rossler system were used. Indeed, we improve the security of
chaotic secure communication approach via parameter modulation by using multimodal
maps. The experimental results show that the proposed steganographic method is
capable of achieving high quality stego images and high embedding capacity (especially,
when block embedding is performed). Compared with other methods like LSB1, LSB2,
MBNS, etc. selected pixels for candidate of embedding data is more random. Finally,
numerical simulations were carried out to evaluate the performance of the proposed
solution.
Figure 9 Rossler system for chaotic communication. Numerical results for message signal s1 and
Information recovery error 1 1
ˆ( )I I− (see online version for colours)
Figure 10 Stego image after embedding data
Note: This image shows that the message cannot be identified and exert minimal impact
on the visual properties.
16. 320 M. Khodadadzadeh and H. Gholizadeh-Narm
References
Al-Taani, A.T. and Al-Issa, A.M. (2009) ‘A novel steganographic method for gray-level images’,
International Journal of Computer, Information & Systems Science & Engineering, Vol. 3,
No. 4, pp.613–618.
Campos-Cantón, E., Femat, R. and Pisarchik, A. (2011) ‘A family of multimodal dynamic
maps’, Communications in Nonlinear Science and Numerical Simulation, Vol. 16, No. 9,
pp.3457–3462.
Chua, L.O., Yang, T., Zhong, G-Q. and Wu, C.W. (1996) ‘Adaptive synchronization of Chua's
oscillators’, International Journal of Bifurcation and Chaos, Vol. 6, No. 1, pp.189–201.
de Melo, W. and van Strien, S. (1993) ‘One-dimensional dynamics’, Vol. 25 of Ergebnisse der
Mathematik und ihrer Grenzgebiete (3) [Results in Mathematics and Related Areas (3)],
Springer-Verlag, Berlin.
Fliess, M. and Sira-Ramírez, H. (2003) ‘An algebraic framework for linear identification’, ESAIM:
Control, Optimisation and Calculus of Variations, Vol. 9, No. 2, pp.151–168.
Katzenbeisser, S. and Petitcolas, F.A. (2000) ‘Information hiding techniques for steganography and
digital watermarking’, DNA, Vol. 28, No. 2.
Mata-Machuca, J.L., Martínez-Guerra, R., Aguilar-López, R. and Aguilar-Ibañez, C. (2012) ‘A
chaotic system in synchronization and secure communications’, Communications in Nonlinear
Science and Numerical Simulation, Vol. 17, No. 8, pp.1706–1713.
Smania, D. (2005) ‘Phase space universality for multimodal maps’, Bulletin of the Brazilian
Mathematical Society, Vol. 36, pp.225–274.
Wu, C.W. and Chua, L.O. (1993) ‘A simple way to synchronize chaotic systems with applications
to secure communication systems’, International Journal of Bifurcation and Chaos, Vol. 3,
No. 6, pp.1619–1627.
Wu, C.W., Yang, T. and Chua, L.O. (1996) ‘On adaptive synchronization and control of nonlinear
dynamical systems’, International Journal of Bifurcation and Chaos, Vol. 6, No. 6,
pp.455–471.
Yang, T. and Chua, L. (1996) ‘Secure communication via chaotic parameter modulation’, Circuits
and Systems I: Fundamental Theory and Applications, IEEE Transactions on, Vol. 43, No. 9,
pp.817–819.