Applying Triple Data Encryption Algorithm to a Chaotic Systems: T-S Fuzzy Model-Based Approach

Author(s):  
Feng-Hsiag Hsiao ◽  
Po-Han Lin
2006 ◽  
Vol 16 (05) ◽  
pp. 1435-1444 ◽  
Author(s):  
H. K. LAM ◽  
F. H. F. LEUNG

This paper investigates the synchronization of chaotic systems subject to parameter uncertainties. Based on the fuzzy-model-based approach, a switching controller will be proposed to deal with the synchronization problem. The stability conditions will be derived based on the Lyapunov approach. The tracking performance and parameter design of the proposed switching controller will be formulated as a generalized eigenvalue minimization problem which can be solved numerically using some convex programming techniques. Simulation examples will be given to show the effectiveness of the proposed approach.


2019 ◽  
Vol 2019 ◽  
pp. 1-13 ◽  
Author(s):  
Xuncai Zhang ◽  
Lingfei Wang ◽  
Guangzhao Cui ◽  
Ying Niu

Traditional encryption algorithms are inefficient when applied to image encryption because image data have the characteristics of large data sizes and strong correlations between adjacent pixels. The shortcomings of the traditional Data encryption standard (DES) encryption algorithm when applied to image encryption are analyzed, and a new image encryption algorithm based on the traditional DES encryption algorithm model, chaotic systems, DNA computing, and select cipher-text output is proposed. Select cipher-text output selects cipher image with the biggest entropy, and it can increase the randomness of cipher image and reduce the risk of encryption system being broken down. This algorithm overcomes the shortcomings of high computational complexity and inconvenient key management that the traditional text encryption algorithm has when applied to image encryption. The experimental results show that the security of this algorithm is verified by analyzing the information entropy, image correlation of adjacent pixels and other indexes. At the same time, this algorithm passes the noise attack test and the occlusion attack test, so it can resist common attacks.


2012 ◽  
Vol 482-484 ◽  
pp. 39-42
Author(s):  
Ying Li Wei ◽  
Tian Huang Chen

Security of messaging middleware is the key issue to ensure the integrity of news transmission. By analyzing the defects on safety of current JMS-based messaging middleware communication model, elaborating several safety problems of messaging middleware from authentication, authorization, encapsulation and audit, this paper proposes a messaging middleware security model based on data encryption and digital signature technology, it encrypt messages with symmetric and asymmetric encryption algorithm and audit some safety-related events, then the security of message transmission has improved.


Sign in / Sign up

Export Citation Format

Share Document