Secure Communication Systems Based on Cryptography and Chaos
碩士 === 義守大學 === 電機工程學系 === 91 === Identification of logistic map, design of synchronization control, and applications of communication security with cryptography, are presented in this thesis. To reduce the errors of identification and prediction, genetic algorithms and neural networks ar...
Main Authors: | , |
---|---|
Other Authors: | |
Format: | Others |
Language: | zh-TW |
Published: |
2003
|
Online Access: | http://ndltd.ncl.edu.tw/handle/50076654715547186191 |
id |
ndltd-TW-091ISU00442013 |
---|---|
record_format |
oai_dc |
spelling |
ndltd-TW-091ISU004420132015-10-13T17:01:33Z http://ndltd.ncl.edu.tw/handle/50076654715547186191 Secure Communication Systems Based on Cryptography and Chaos 基於密碼學與混沌之安全通訊系統 Wu Dong Shiuah 吳東軒 碩士 義守大學 電機工程學系 91 Identification of logistic map, design of synchronization control, and applications of communication security with cryptography, are presented in this thesis. To reduce the errors of identification and prediction, genetic algorithms and neural networks are applied to search the globally optimal weight and bias by means of reproduction, crossover, and mutation. Then, using fuzzy logic and adaptive network-based fuzzy inference system, the chaos synchronization of logistic map is designed and applied to the encryption of voice and picture. With the help of IDEA and chaos synchronization, the encrypted logistic map is developed. Computer simulations demonstrate the proposed scheme can make sure the security of communications. Yu Gwo Ruey 余國瑞 2003 學位論文 ; thesis 88 zh-TW |
collection |
NDLTD |
language |
zh-TW |
format |
Others
|
sources |
NDLTD |
description |
碩士 === 義守大學 === 電機工程學系 === 91 === Identification of logistic map, design of synchronization control, and applications of communication security with cryptography, are presented in this thesis. To reduce the errors of identification and prediction, genetic algorithms and neural networks are applied to search the globally optimal weight and bias by means of reproduction, crossover, and mutation. Then, using fuzzy logic and adaptive network-based fuzzy inference system, the chaos synchronization of logistic map is designed and applied to the encryption of voice and picture. With the help of IDEA and chaos synchronization, the encrypted logistic map is developed. Computer simulations demonstrate the proposed scheme can make sure the security of communications.
|
author2 |
Yu Gwo Ruey |
author_facet |
Yu Gwo Ruey Wu Dong Shiuah 吳東軒 |
author |
Wu Dong Shiuah 吳東軒 |
spellingShingle |
Wu Dong Shiuah 吳東軒 Secure Communication Systems Based on Cryptography and Chaos |
author_sort |
Wu Dong Shiuah |
title |
Secure Communication Systems Based on Cryptography and Chaos |
title_short |
Secure Communication Systems Based on Cryptography and Chaos |
title_full |
Secure Communication Systems Based on Cryptography and Chaos |
title_fullStr |
Secure Communication Systems Based on Cryptography and Chaos |
title_full_unstemmed |
Secure Communication Systems Based on Cryptography and Chaos |
title_sort |
secure communication systems based on cryptography and chaos |
publishDate |
2003 |
url |
http://ndltd.ncl.edu.tw/handle/50076654715547186191 |
work_keys_str_mv |
AT wudongshiuah securecommunicationsystemsbasedoncryptographyandchaos AT wúdōngxuān securecommunicationsystemsbasedoncryptographyandchaos AT wudongshiuah jīyúmìmǎxuéyǔhùndùnzhīānquántōngxùnxìtǒng AT wúdōngxuān jīyúmìmǎxuéyǔhùndùnzhīānquántōngxùnxìtǒng |
_version_ |
1717778453420310528 |