首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 882 毫秒
1.
Finite-time (FT) synchronization for periodic T–S fuzzy master-slave neural networks (NNs) with distributed delays is addressed in this work. A fuzzy controller is designed for the salve NNs to synchronize the master NNs in FT and a synchronization error system (SES) is derived. Sufficient conditions are established to guarantee that the SES is FT bounded by using the mode and fuzzy basis dependent Lyapunov function. A new algorithm is proposed to obtain the suboptimal boundary of the SES to analyze how the periodic characteristics affect the system boundary. Finally, a numerical example is provided to demonstrate the validity of the fuzzy controller and the iterative algorithm for the boundary.  相似文献   

2.
This paper investigates the problem of finite-time outer-synchronization for discrete-time complex networks with Markov jump topology in the presence of communication delays and possible information losses and its application to image encryption. A hybrid control, which is subject to both stochastic jumps and deterministic switches, is proposed to realize finite-time and stochastic outer-synchronization for the concerned networks. By utilizing a stochastic Lyapunov functional combined with the average dwell-time method, sufficient conditions are found such that the synchronization error dynamical system is stochastically stable in finite-time. Two numerical examples are presented to illustrate the effectiveness of the proposed method. Finally, the complex network consists of four coupled Lorenz systems are utilized to generate chaotic sequences and a new chaotic image cryptosystem is constructed to transmit encrypted images based on the synchronized drive-response complex networks. Experiments are conducted by using numerical simulation, and the security is analyzed in terms of key space, key sensitivity, histogram distributions, correlation coefficients, information entropy and differential attack measures. The experimental results show that the proposed chaotic image cryptosystem has the advantages of high security against some classical attacks.  相似文献   

3.
This paper addresses the synchronization problem of fractional-order complex spatiotemporal networks (CSNs) based on partial differential equations with delays via boundary control. First, fractional-order CSNs with time-invariant and time-varying delays are studied separately due to the widespread existence of time delays in complex networks. Moreover, two boundary controllers are proposed to solve the synchronization issue of fractional-order CSNs, in which nodes communicate with each other only on the spatial boundary. Furthermore, according to the fractional-order inequality, the synchronization criteria of fractional-order CNSs with multiple delays are obtained. Finally, the numerical simulations are given to verify the feasibility of the presented results. A case provides the application of CSNs in image encryption.  相似文献   

4.
In this paper, the master-slave synchronization of the chaotic Lur’e system (MSSCLS) with time-varying delay is investigated. At first, a Lyapunov-Krasovskii functional (LKF) with nonlinear terms and time-varying delay is constructed. Secondly, when the derivative of LKF is estimated, the improved stability criterion is obtained by considering the relationship between the integral terms generated after using the Bessel-Legendre inequality (BLI) and introducing the integral-term-related free-weighting-matrices. Finally, case studies based on Chua’s circuit are carried out to test and verify the effectiveness of the proposed synchronization criterion, and the results are compared with the latest methods to show the advantages of the proposed synchronization criterion.  相似文献   

5.
This paper studies the finite-time lag synchronization issue of master-slave complex networks with unknown signal propagation delays by the linear and adaptive error state feedback approaches. The unknown signal propagation delays are fully considered and estimated by adaptive laws. By designing new Lyapunov functional and discontinuous feedback controllers, which involves the estimated error rather than the general synchronization error, sufficient conditions are derived to ensure lag synchronization of the networks within a setting time. It is interesting to discover that the setting time is related to initial values of both the estimated error and the estimated unknown signal propagation delays. Finally, two numerical examples are given to illustrate the effectiveness and correctness of the proposed finite-time lag synchronization criteria.  相似文献   

6.
In this work, a model-free adaptive sliding mode control (ASMC) methodology is proposed for synchronization of chaotic fractional-order systems (FOSs) with input saturation. Based on the frequency distributed model and the non-integer version of the Lyapunov stability theorem, a model-free ASMC method is designed to overcome the chaotic behavior of the FOSs. The control inputs are free from the nonlinear-linear dynamical terms of the system because of utilizing the boundedness feature of the states of chaotic FOSs. Moreover, a new medical image encryption scheme is tentatively proposed according to our synchronization method, and its effectiveness is verified by numerical simulations. Furthermore, the performance and security analyses are given to confirm the superiority of the proposed encryption scheme, including statistical analysis, key space analysis, differential attack analysis, and time performance analysis.  相似文献   

7.
This paper focuses on the synchronization of fractional-order complex-valued neural networks (FOCVNNs) with reaction–diffusion terms in finite-time interval. Different from the existing complex-valued neural networks (CVNNs), the reaction–diffusion phenomena and fractional derivative are first considered into the system, meanwhile, the parameter switching (the system parameters will switch with the state) is considered, which makes the presented model more comprehensive. By choosing an appropriate Lyapunov function, the driver and response systems achieve Mittag-Leffler synchronization under a suitable controller. In addition, based on the fractional calculus theorem and the basic inequality methods, a criterion of synchronization for the error system in finite-time interval is derived and the upper bound of the corresponding finite synchronization time can be obtained. Finally, two examples are provided, one is a numerical example to explain the effectiveness of the main results, and the other shows that the results of this paper can be applied to image encryption for any size with high-security coefficient.  相似文献   

8.
《Journal of The Franklin Institute》2019,356(18):11638-11667
This paper proposes a new image encryption method based on matrix semi-tensor product theory. Using Hyperchaotic Lorenz system to generate chaotic sequences, and then using this chaotic sequence to generate two fixed scrambling matrices. The plain image is scrambled by chaotic positioning sort scrambled method. Analogous to a chemical reaction, the plain image scrambled image is one of the reactant, then add a matrix which is related to the plain image information and extracted from the chaotic sequence (this matrix can be differ in size from the plain image matrix, different matrices can be intercepted and generated according to different plain image). This matrix is scrambled as another reactant, Apply the method of semi-tensor product to carry on the reaction (diffusion), finally get the product (encryption image). This method breaks the shackles of the traditional matrix operation and makes the reaction matrix have more forms. Compared with other experimental results, the proposed algorithm is more secure and available.  相似文献   

9.
伴随着优秀科学技术的不断衍生,数字图像在传输过程中受到的威胁也越来越多。而图像加密是保证其能够安全的发送到接受者的有效方法之一。本文介绍了现今几种先进的图像加密算法,分析了当前图像加密算法的研究现状及发展趋势。  相似文献   

10.
随着盲源分离理论的日渐成熟,其应用领域也越来越广泛,尤其在图像加密领域中,提出了基于独立分量分析(ICA)、基于非负矩阵分解(NMF)的加密新方法,以及盲源分离加密与混沌结合的加密方法等。本子将对以上基于盲源分离理论的加密新方法进行具体阐述。  相似文献   

11.
CCSDS图像数据压缩(IDC)标准和分组密码算法SMS4通过将数据压缩与安全分别最优化,使编译码总体性能达到最佳.该算法计算复杂度高,难以保障图像数据在资源受限网络中有效和安全传输.本文使用SMS4分组密钥对图像直流系数进行随机算术编码;对交流系数采用序列加密编码,提出一种基于CCSDS IDC的联合信源与安全编译码算法.仿真实验表明,该算法降低了计算复杂度,同时提供了良好的安全性能.  相似文献   

12.
During the recent years several chaotic image encryption algorithms have been proposed, but most of them encountered some drawbacks such as small key space, low speed, lack of robustness and low security. In this paper, we have proposed an image algorithm based on the combination of a one-dimensional polynomial chaotic map and a piecewise nonlinear chaotic map. Theoretical analysis and computer simulations, both confirm that the new algorithm possesses high security, robust fast encryption speed for practical image encryption and solves the problem of small key space.  相似文献   

13.
This paper is concerned with master-slave synchronization for chaotic Lur'e systems subject to aperiodic sampled-data. To reduce the communication burden, an aperiodic event-triggered (APET) transmission scheme is introduced to determine the transmission of the latest sampling synchronization data. In order to reduce the design conservatism, a novel time-dependent Lyapunov functional (TDLF) is constructed to fully use the characteristics about sampling behavior, triggering error, and nonlinear part of the system, simultaneously. A more relaxed constraint criterion is then presented to ensure the positivity of the whole functional between two sampling instants. By partially resorting to the TDLF, the APET-based synchronization criterion depending on the upper and lower bounds of the uncertain sampling period is presented. The synchronization criterion based on aperiodic-sampling mechanism is also provided. Finally, a typical example about neural networks is offered to illustrate the benefit and validity of obtained synchronization methodologies.  相似文献   

14.
一种基于位置变换和灰度变换相结合的数字图像置乱方法   总被引:1,自引:0,他引:1  
熊玮 《人天科学研究》2011,(11):159-161
图像置乱技术在数字图像加密中有着广泛应用。作为一种图像加密技术,它主要通过改变原图像中各像素位置或改变像素灰度值的方式达到对图像信息进行隐藏的目的。提出一种易于实现的将像素位置变换和像素灰度变换相结合的数字图像置乱方法。实验证明该方法相对传统算法置乱效果得到明显加强。  相似文献   

15.
李华艳 《情报探索》2022,(2):117-123
[目的/意义]旨在更好解决古籍高清数字化图像在互联网上传播后存在的版权和高仿真复制问题,提出基于混沌理论和DNA序列运算的加密算法.[方法/过程]该算法以混沌理论为基础,结合DNA序列运算,对图像数据进行像素值替代扩散,再通过图像置乱替换像素值位置,完成整个加密过程.[结果/结论]测试结果表明,该算法加解密效果良好,能...  相似文献   

16.
提出了一种基于逐段线性混沌系统的图像加密算法。通过对外部密钥的映射,分别产生系统的初值和参数值,根据图像大小经16个逐段线性映射迭代出足够的密钥流,并引入密文反馈机制,对图像像素值逐个进行多轮异或加密。实验表明,这种加密算法使密文对明文和密钥都充分敏感,加密图像像素值具有类随机均匀分布特性。而且算法具有密钥空间大、加密速度快的优越性。  相似文献   

17.
This paper considers the lag projective synchronization of fractional-order delayed chaotic systems. The lag projective synchronization is achieved through the use of comparison principle of linear fractional equation at the presence of time delay. Some sufficient conditions are obtained via a suitable controller. The results show that the slave system can synchronize the past state of the driver up to a scaling factor. Finally, two different structural fractional order delayed chaotic systems are considered in order to examine the effectiveness of the lag projective synchronization. Feasibility of the proposed method is validated through numerical simulations.  相似文献   

18.
This paper studies event-triggered synchronization control problem for delayed neural networks with quantization and actuator saturation. Firstly, in order to reduce the load of network meanwhile retain required performance of system, the event-triggered scheme is adopted to determine if the sampled signal will be transmitted to the quantizer. Secondly, a synchronization error model is constructed to describe the master-slave synchronization system with event-triggered scheme, quantization and input saturation in a unified framework. Thirdly, on the basis of Lyapunov–Krasovskii functional, sufficient conditions for stabilization are derived which can ensure synchronization of the master system and slave system; particularly, a co-designed parameters of controller and the corresponding event-triggered parameters are obtained under the above stability condition. Lastly, two numerical examples are employed to illustrate the effectiveness of the proposed approach.  相似文献   

19.
利用二维混沌流加密技术加密有意义的二进制图像,获得水印数据,以提高视频水印的安全性。水印嵌入过程中,水印被嵌入到随机选择的视频帧的离散余弦变换系数里。在鲁棒性和帧平均攻击实验后,大部分水印可以通过水印检测提取算法进行提取和识别。实验结果表明,这种视频水印方法具有一定的安全性、隐蔽性和鲁棒性。  相似文献   

20.
This paper investigates the synchronous control problem for a class of flexible telerobotic systems subject to system uncertainties and communication constraints. In view of the asymmetric time-varying communication delays, an adaptive time-delay estimator is designed to reduce the impacts of delays on the system. Moreover, by combining the neural networks and parameter adaptive method, the uncertainties of system dynamics are estimated and compensated. Based on these efforts, a new adaptive compensation control protocol is proposed. Additionally, input quantization in network control induced chattering phenomenon and unknown parameters is also dealt with by the adaptive compensation method. A useful characteristic of this paper is that the “complexity explosion” problem caused by the backstepping technique is circumvented effectively. Finally, sufficient conditions are derived for the synchronous control of the master-slave flexible telerobotic system under Lyapunov stability theory. A numerical example of flexible-joint robotic system is provided to illustrate the effectiveness of the proposed control schemes.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号