Cargando…

Secret Communication Systems Using Chaotic Wave Equations with Neural Network Boundary Conditions

In a secret communication system using chaotic synchronization, the communication information is embedded in a signal that behaves as chaos and is sent to the receiver to retrieve the information. In a previous study, a chaotic synchronous system was developed by integrating the wave equation with t...

Descripción completa

Detalles Bibliográficos
Autores principales: Chen, Yuhan, Sano, Hideki, Wakaiki, Masashi, Yaguchi, Takaharu
Formato: Online Artículo Texto
Lenguaje:English
Publicado: MDPI 2021
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC8306622/
https://www.ncbi.nlm.nih.gov/pubmed/34356445
http://dx.doi.org/10.3390/e23070904
_version_ 1783727854791426048
author Chen, Yuhan
Sano, Hideki
Wakaiki, Masashi
Yaguchi, Takaharu
author_facet Chen, Yuhan
Sano, Hideki
Wakaiki, Masashi
Yaguchi, Takaharu
author_sort Chen, Yuhan
collection PubMed
description In a secret communication system using chaotic synchronization, the communication information is embedded in a signal that behaves as chaos and is sent to the receiver to retrieve the information. In a previous study, a chaotic synchronous system was developed by integrating the wave equation with the van der Pol boundary condition, of which the number of the parameters are only three, which is not enough for security. In this study, we replace the nonlinear boundary condition with an artificial neural network, thereby making the transmitted information difficult to leak. The neural network is divided into two parts; the first half is used as the left boundary condition of the wave equation and the second half is used as that on the right boundary, thus replacing the original nonlinear boundary condition. We also show the results for both monochrome and color images and evaluate the security performance. In particular, it is shown that the encrypted images are almost identical regardless of the input images. The learning performance of the neural network is also investigated. The calculated Lyapunov exponent shows that the learned neural network causes some chaotic vibration effect. The information in the original image is completely invisible when viewed through the image obtained after being concealed by the proposed system. Some security tests are also performed. The proposed method is designed in such a way that the transmitted images are encrypted into almost identical images of waves, thereby preventing the retrieval of information from the original image. The numerical results show that the encrypted images are certainly almost identical, which supports the security of the proposed method. Some security tests are also performed. The proposed method is designed in such a way that the transmitted images are encrypted into almost identical images of waves, thereby preventing the retrieval of information from the original image. The numerical results show that the encrypted images are certainly almost identical, which supports the security of the proposed method.
format Online
Article
Text
id pubmed-8306622
institution National Center for Biotechnology Information
language English
publishDate 2021
publisher MDPI
record_format MEDLINE/PubMed
spelling pubmed-83066222021-07-25 Secret Communication Systems Using Chaotic Wave Equations with Neural Network Boundary Conditions Chen, Yuhan Sano, Hideki Wakaiki, Masashi Yaguchi, Takaharu Entropy (Basel) Article In a secret communication system using chaotic synchronization, the communication information is embedded in a signal that behaves as chaos and is sent to the receiver to retrieve the information. In a previous study, a chaotic synchronous system was developed by integrating the wave equation with the van der Pol boundary condition, of which the number of the parameters are only three, which is not enough for security. In this study, we replace the nonlinear boundary condition with an artificial neural network, thereby making the transmitted information difficult to leak. The neural network is divided into two parts; the first half is used as the left boundary condition of the wave equation and the second half is used as that on the right boundary, thus replacing the original nonlinear boundary condition. We also show the results for both monochrome and color images and evaluate the security performance. In particular, it is shown that the encrypted images are almost identical regardless of the input images. The learning performance of the neural network is also investigated. The calculated Lyapunov exponent shows that the learned neural network causes some chaotic vibration effect. The information in the original image is completely invisible when viewed through the image obtained after being concealed by the proposed system. Some security tests are also performed. The proposed method is designed in such a way that the transmitted images are encrypted into almost identical images of waves, thereby preventing the retrieval of information from the original image. The numerical results show that the encrypted images are certainly almost identical, which supports the security of the proposed method. Some security tests are also performed. The proposed method is designed in such a way that the transmitted images are encrypted into almost identical images of waves, thereby preventing the retrieval of information from the original image. The numerical results show that the encrypted images are certainly almost identical, which supports the security of the proposed method. MDPI 2021-07-16 /pmc/articles/PMC8306622/ /pubmed/34356445 http://dx.doi.org/10.3390/e23070904 Text en © 2021 by the authors. https://creativecommons.org/licenses/by/4.0/Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
spellingShingle Article
Chen, Yuhan
Sano, Hideki
Wakaiki, Masashi
Yaguchi, Takaharu
Secret Communication Systems Using Chaotic Wave Equations with Neural Network Boundary Conditions
title Secret Communication Systems Using Chaotic Wave Equations with Neural Network Boundary Conditions
title_full Secret Communication Systems Using Chaotic Wave Equations with Neural Network Boundary Conditions
title_fullStr Secret Communication Systems Using Chaotic Wave Equations with Neural Network Boundary Conditions
title_full_unstemmed Secret Communication Systems Using Chaotic Wave Equations with Neural Network Boundary Conditions
title_short Secret Communication Systems Using Chaotic Wave Equations with Neural Network Boundary Conditions
title_sort secret communication systems using chaotic wave equations with neural network boundary conditions
topic Article
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC8306622/
https://www.ncbi.nlm.nih.gov/pubmed/34356445
http://dx.doi.org/10.3390/e23070904
work_keys_str_mv AT chenyuhan secretcommunicationsystemsusingchaoticwaveequationswithneuralnetworkboundaryconditions
AT sanohideki secretcommunicationsystemsusingchaoticwaveequationswithneuralnetworkboundaryconditions
AT wakaikimasashi secretcommunicationsystemsusingchaoticwaveequationswithneuralnetworkboundaryconditions
AT yaguchitakaharu secretcommunicationsystemsusingchaoticwaveequationswithneuralnetworkboundaryconditions