Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method for secret communication of chaotic neural network under signal quantization circumstance

A neural network, secure communication technology, applied in secure communication through chaotic signals, secure communication devices, digital transmission systems, etc., can solve problems such as inability to handle signal quantization

Active Publication Date: 2017-05-10
CHINA UNIV OF PETROLEUM (EAST CHINA)
View PDF3 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The present invention provides a chaotic neural network secure communication method under the signal quantization situation in view of the inability to deal with the problem of signal quantization in the existing chaotic secure communication process, which can effectively deal with uniform quantization and random disturbance in the chaotic secure communication process The impact

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for secret communication of chaotic neural network under signal quantization circumstance
  • Method for secret communication of chaotic neural network under signal quantization circumstance
  • Method for secret communication of chaotic neural network under signal quantization circumstance

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0088] Embodiment 1: The above-mentioned method of the present invention is used to simulate the ciphertext signal, and the ciphertext signal is the sound signal when the window7 system is shut down.

[0089] The parameters used are:

[0090]

[0091]

[0092]

[0093] Sampling period T=0.02s;

[0094] Quantization precision Δ=0.02;

[0095] Drive system initial value x 0 =[0.1,0.2,-0.1] T ;

[0096] Response system initial value y 0 =[1,2,3] T ;

[0097] constant matrix

[0098] Solve the controller gain matrix by formula (6)

[0099] For the time-domain diagram of the original ciphertext signal at the sender, see Figure 5 , for the time-domain diagram of the encrypted signal in the network transmission channel see Image 6 , the time-domain diagram of the ciphertext signal recovered by the receiving end is shown in Figure 7 , the original ciphertext signal s(k) and the restored ciphertext signal Make a difference to get a secure communication erro...

Embodiment 2

[0101] Embodiment 2: The above-mentioned method of the present invention is used to simulate the ciphertext signal, and the ciphertext signal is the sound signal of the song "You and Me" by Liu Huan.

[0102] The parameters used are:

[0103]

[0104]

[0105]

[0106] Sampling period T=0.02s;

[0107] Quantization precision Δ=0.02;

[0108] Drive system initial value x 0 =[0.1,0.2,-0.1] T ;

[0109] Response system initial value y 0 =[2,1.5,2] T ;

[0110] constant matrix

[0111] Solve the controller gain matrix by formula (6)

[0112] For the time-domain diagram of the original ciphertext signal at the sender, see Figure 9 , for the time-domain diagram of the encrypted signal in the network transmission channel see Figure 10 , the time-domain diagram of the ciphertext signal recovered by the receiving end is shown in Figure 11 , the original ciphertext signal s(k) and the restored ciphertext signal Make a difference to get a secure communication...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a method for secret communication of a chaotic neural network under a signal quantization circumstance. The method comprises the following steps of (1) establishing a chaotic neural network model and a quantizer model; (2) constructing a state feedback controller to obtain an error dynamics system; (3) solving a controller gain matrix K and substituting into an actual controller to obtain a synchronous controller; (4) loading a ciphertext signal through a driving system in order to obtain a superposed signal and transmitting the superposed signal to a response system through a network; (5) making the driving system and the response system synchronous under the action of the synchronous controller; and (6) obtaining a recovered ciphertext signal through the superposed signal and a synchronizing signal. The method considers the uniform quantization phenomenon in the network environment and provides the synchronous controller, the driving system and the response system are synchronous under the action of the synchronous controller, and the recovered ciphertext signal is obtained through the superposed signal and the synchronizing signal after quantization, so that the impact of uniform quantization and random disturbance can be effectively eliminated and the secret communication can be carried out under the chaotic neural network model.

Description

technical field [0001] The invention belongs to the technical field of network communication, and relates to a neural network secure communication method, in particular to a chaotic neural network secure communication method under the condition of signal quantization. Background technique [0002] Since Pecora and Carroll discovered the synchronization method of chaotic systems in 1990, the application of chaos in secure communication has become a research hotspot in the field of information security. Chaotic signal can be used as the carrier of ciphertext information due to its characteristics of randomness, aperiodicity and unpredictability. Chaotic neural network usually has the characteristics of simple structure and complex dynamic performance, and is very suitable as a generator of chaotic signals. Therefore, the secure communication technology of chaotic neural network has broad application prospects. [0003] With the rapid development of computer network technology...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/00
CPCH04L9/001
Inventor 盛立牛艺春高明
Owner CHINA UNIV OF PETROLEUM (EAST CHINA)
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products