Method for generating random pseudorandom sequence based on discrete progressive determinacy
A technology of pseudo-random sequence and random sequence, which is applied in the field of password generation in information security, and can solve problems such as short-term unpredictability of sequence
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
example 1
[0033] Example 1: We use the above PRBG for image encryption as an example. In order to protect image data from being stolen, illegally copied and disseminated during transmission, various encryption schemes have been proposed to protect image data security. A common feature of these encrypted data is that the encrypted data is transformed into a set of meaningless codes. Once interceptors spot such code, they know they have valuable information. In order to protect the security of image data and avoid exposing the value of image data, the information redundancy characteristics of images can be used to hide one image into another image. For image encryption, possible monitors or illegal interceptors can intercept and decipher the ciphertext, or destroy the ciphertext before sending it, thereby affecting the security of confidential information; but for image information hiding , it is difficult for a possible monitor or illegal interceptor to judge whether the confidential i...
example 2
[0034] Example 2: An important field of random sequence application is frequency hopping communication. The carrier frequency of the frequency hopping communication system is controlled by a set of code sequences. In a frequency band much wider than the information bandwidth, it randomly hops according to a certain rule. The variable law is called the frequency hopping pattern. The code sequence that controls the frequency hopping pattern is called a frequency hopping sequence. Frequency hopping sequences are generally generated by pseudo-random sequences. A frequency hopping sequence with excellent performance must have good randomness, as long as possible period, uniform distribution in the working frequency band and good nonlinear performance.
[0035] Apply PRBG to the frequency hopping communication system, the schematic diagram is as follows Figure 5 shown. Use PRBG to control the frequency hopping frequency table to generate the hopping carrier frequency. Here, the...
example 3
[0036] Example 3: Ultra Wideband (UWB) technology is a new type of short-distance high-speed wireless communication technology that is currently receiving much attention. UWB communicates by directly transmitting narrow pulses. In view of the high requirements of the system on power efficiency, the modulation method of pulse radio generally adopts binary pulse phase modulation (PPM). In order to improve the confidentiality of communication, Chaotic Pulse Phase Modulation (CPPM) is adopted. This communication scheme is based on chaotic pulse trains, and the time interval between pulses is controlled by PRBG. This pulse train with chaotic pulse spacing can be used as a carrier. The binary information is modulated onto the carrier by the method of pulse position modulation, and the left edge of each pulse is unchanged or delayed at a certain moment depending on whether "0" or "1" is transmitted. By synchronizing the receiving system with the chaotic pulse sequence, the pulse ti...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com