Journals
  Publication Years
  Keywords
Search within results Open Search
Please wait a minute...
For Selected: Toggle Thumbnails
Generalized hybrid dislocated function projective synchronization between different-order chaotic systems and its application to secure communication
LI Rui ZHANG Guangjun ZHU Tao WANG Xiangbo WANG Yu
Journal of Computer Applications    2014, 34 (7): 1915-1918.   DOI: 10.11772/j.issn.1001-9081.2014.07.1915
Abstract214)      PDF (684KB)(490)       Save

In order to improve the security of secure communication, a new Generalized Hybrid Dislocated Function Projective Synchronization (GHDFPS) based on generalized hybrid dislocated projective synchronization and function projective synchronization was researched by Lyapunov stability theory and adaptive active control method. At the same time, the control methods of GHDFPS between two different-order chaotic systems with uncertain parameter and parameter identification were presented, and the application of the novel synchronization on secure communication was analyzed. By strict mathematical proof and numerical simulation, the GHDFPS between two different-order chaotic systems with uncertain parameter were achieved, the uncertain parameter was identified. Because of the variety of function scaling factor matrix, the security of secure communication has been increased by GHDFPS. Moreover, this synchronization form and method of control were applied to secure communication via chaotic masking modulation. Many information signals can be recovered and validated.

Reference | Related Articles | Metrics
Simultaneous recursive identification algorithm of system order and parameters based on determinant ratio method
ZHAO Yongli ZHONG Heng LI Dingyuan HU Tao
Journal of Computer Applications    2014, 34 (2): 538-541.  
Abstract621)      PDF (501KB)(426)       Save
Concerning the output error model, order identification and parameter estimation were integrated and extended, and the determinant ratio method based on the auxiliary model was put forward. The system order and parameter estimation were got simultaneously with this method, so it could reduce calculation time in the process of system identification. Considering the inaccuracy of the determinant ratio method, a model validation method was proposed to enhance the identification ability. At last, the simulation indicates that the expended determinant ratio method effectively estimates the system order and parameters.
Related Articles | Metrics
Anonymous bidirectional RFID authentication protocol based on low-cost tags
HU Tao WEI Guo-heng
Journal of Computer Applications    2012, 32 (01): 111-114.   DOI: 10.3724/SP.J.1087.2012.00111
Abstract1273)      PDF (792KB)(621)       Save
To remove hidden risks and solve neglected Denial-of-Service (DoS) attacks in the back-end database in current low-cost Radio Frequency Identification (RFID) authentication protocols, a new anonymous bidirectional RFID authentication protocol based on low-cost tags was proposed, and the performance analysis was conducted. According to the simple operative logic and shielded operation of reader, this scheme was designed by utilizing two cascading 16 bit Cyclic Redundancy Check (CRC) messages as mutual authentication factor between the label and the reader. The analytical results show the proposed protocol possesses untraceability, authenticity and usability and resists replaying attack and synchronization attack. Overall, it is a RFID low-power security authentication scheme of security, efficiency and practicality.
Reference | Related Articles | Metrics
Objective quality evaluation of image fusion based on visual attention mechanism and regional structural similarity
REN Xian-yi LIU Xiu-jian HU Tao ZHANG Ji-hong
Journal of Computer Applications    2011, 31 (11): 3022-3026.   DOI: 10.3724/SP.J.1087.2011.03022
Abstract1275)      PDF (859KB)(683)       Save
To handle the problem of low consistency between the objective and subjective evaluations of image fusion, considering the features of Human Visual System (HVS), a new metric to evaluate the quality of the fusion image based on the Visual Attention Mechanism (VAM) and the regional structural similarity was proposed. This quality metric utilized the global salience got by VAM and the local salient information to estimate how well the salient information contained within the sources was presented by the composite image. Since human eyes are more sensitive to region, by giving higher weight to those regions with high saliency value in the source images, the new metric evaluated the quality of the fused image by computing the weighted regional structural similarity of the fused image and source images in all regions. The correlation analysis between objective measure and subjective evaluation was performed and the results demonstrate that the new metric is more consistent with human subjective evaluation, compared with the traditional objective measurements and the widely used EFQI.
Related Articles | Metrics