Cargando…
Secret Communication Systems Using Chaotic Wave Equations with Neural Network Boundary Conditions
In a secret communication system using chaotic synchronization, the communication information is embedded in a signal that behaves as chaos and is sent to the receiver to retrieve the information. In a previous study, a chaotic synchronous system was developed by integrating the wave equation with t...
Autores principales: | , , , |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
MDPI
2021
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC8306622/ https://www.ncbi.nlm.nih.gov/pubmed/34356445 http://dx.doi.org/10.3390/e23070904 |
_version_ | 1783727854791426048 |
---|---|
author | Chen, Yuhan Sano, Hideki Wakaiki, Masashi Yaguchi, Takaharu |
author_facet | Chen, Yuhan Sano, Hideki Wakaiki, Masashi Yaguchi, Takaharu |
author_sort | Chen, Yuhan |
collection | PubMed |
description | In a secret communication system using chaotic synchronization, the communication information is embedded in a signal that behaves as chaos and is sent to the receiver to retrieve the information. In a previous study, a chaotic synchronous system was developed by integrating the wave equation with the van der Pol boundary condition, of which the number of the parameters are only three, which is not enough for security. In this study, we replace the nonlinear boundary condition with an artificial neural network, thereby making the transmitted information difficult to leak. The neural network is divided into two parts; the first half is used as the left boundary condition of the wave equation and the second half is used as that on the right boundary, thus replacing the original nonlinear boundary condition. We also show the results for both monochrome and color images and evaluate the security performance. In particular, it is shown that the encrypted images are almost identical regardless of the input images. The learning performance of the neural network is also investigated. The calculated Lyapunov exponent shows that the learned neural network causes some chaotic vibration effect. The information in the original image is completely invisible when viewed through the image obtained after being concealed by the proposed system. Some security tests are also performed. The proposed method is designed in such a way that the transmitted images are encrypted into almost identical images of waves, thereby preventing the retrieval of information from the original image. The numerical results show that the encrypted images are certainly almost identical, which supports the security of the proposed method. Some security tests are also performed. The proposed method is designed in such a way that the transmitted images are encrypted into almost identical images of waves, thereby preventing the retrieval of information from the original image. The numerical results show that the encrypted images are certainly almost identical, which supports the security of the proposed method. |
format | Online Article Text |
id | pubmed-8306622 |
institution | National Center for Biotechnology Information |
language | English |
publishDate | 2021 |
publisher | MDPI |
record_format | MEDLINE/PubMed |
spelling | pubmed-83066222021-07-25 Secret Communication Systems Using Chaotic Wave Equations with Neural Network Boundary Conditions Chen, Yuhan Sano, Hideki Wakaiki, Masashi Yaguchi, Takaharu Entropy (Basel) Article In a secret communication system using chaotic synchronization, the communication information is embedded in a signal that behaves as chaos and is sent to the receiver to retrieve the information. In a previous study, a chaotic synchronous system was developed by integrating the wave equation with the van der Pol boundary condition, of which the number of the parameters are only three, which is not enough for security. In this study, we replace the nonlinear boundary condition with an artificial neural network, thereby making the transmitted information difficult to leak. The neural network is divided into two parts; the first half is used as the left boundary condition of the wave equation and the second half is used as that on the right boundary, thus replacing the original nonlinear boundary condition. We also show the results for both monochrome and color images and evaluate the security performance. In particular, it is shown that the encrypted images are almost identical regardless of the input images. The learning performance of the neural network is also investigated. The calculated Lyapunov exponent shows that the learned neural network causes some chaotic vibration effect. The information in the original image is completely invisible when viewed through the image obtained after being concealed by the proposed system. Some security tests are also performed. The proposed method is designed in such a way that the transmitted images are encrypted into almost identical images of waves, thereby preventing the retrieval of information from the original image. The numerical results show that the encrypted images are certainly almost identical, which supports the security of the proposed method. Some security tests are also performed. The proposed method is designed in such a way that the transmitted images are encrypted into almost identical images of waves, thereby preventing the retrieval of information from the original image. The numerical results show that the encrypted images are certainly almost identical, which supports the security of the proposed method. MDPI 2021-07-16 /pmc/articles/PMC8306622/ /pubmed/34356445 http://dx.doi.org/10.3390/e23070904 Text en © 2021 by the authors. https://creativecommons.org/licenses/by/4.0/Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/). |
spellingShingle | Article Chen, Yuhan Sano, Hideki Wakaiki, Masashi Yaguchi, Takaharu Secret Communication Systems Using Chaotic Wave Equations with Neural Network Boundary Conditions |
title | Secret Communication Systems Using Chaotic Wave Equations with Neural Network Boundary Conditions |
title_full | Secret Communication Systems Using Chaotic Wave Equations with Neural Network Boundary Conditions |
title_fullStr | Secret Communication Systems Using Chaotic Wave Equations with Neural Network Boundary Conditions |
title_full_unstemmed | Secret Communication Systems Using Chaotic Wave Equations with Neural Network Boundary Conditions |
title_short | Secret Communication Systems Using Chaotic Wave Equations with Neural Network Boundary Conditions |
title_sort | secret communication systems using chaotic wave equations with neural network boundary conditions |
topic | Article |
url | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC8306622/ https://www.ncbi.nlm.nih.gov/pubmed/34356445 http://dx.doi.org/10.3390/e23070904 |
work_keys_str_mv | AT chenyuhan secretcommunicationsystemsusingchaoticwaveequationswithneuralnetworkboundaryconditions AT sanohideki secretcommunicationsystemsusingchaoticwaveequationswithneuralnetworkboundaryconditions AT wakaikimasashi secretcommunicationsystemsusingchaoticwaveequationswithneuralnetworkboundaryconditions AT yaguchitakaharu secretcommunicationsystemsusingchaoticwaveequationswithneuralnetworkboundaryconditions |