999精品在线视频,手机成人午夜在线视频,久久不卡国产精品无码,中日无码在线观看,成人av手机在线观看,日韩精品亚洲一区中文字幕,亚洲av无码人妻,四虎国产在线观看 ?

Heterogeneous Memristive Models Design and Its Application in Information Security

2019-08-13 05:54:12Shaojianghong
Computers Materials&Continua 2019年8期

Shaojiang Ζhong

Abstract: Based on the three-dimensional classic Chua circuit,a nonlinear circuit containing two flux-control memristors is designed.Due to the difference in the design of the characteristic equation of the two magnetron memristors,their position form a symmetrical structure with respect to the capacitor.The existence of chaotic properties is proved by analyzing the stability of the system,including Lyapunov exponent,equilibrium point,eigenvalue,Poincare map,power spectrum,bifurcation diagram et al.Theoretical analysis and numerical calculation show that this heterogeneous memristive model is a hyperchaotic five-dimensional nonlinear dynamical system and has a strong chaotic behavior.Then,the memristive system is applied to digital image and speech signal processing.The analysis of the key space,sensitivity of key parameters,and statistical character of encrypted scheme imply that this model can applied widely in multimedia information security.

Keywords: Chua circuit,heterogeneous memristor,flux-control memristor,hyperchaos system,data image encryption.

1 Introduction

There are four basic variables in circuit theory:currenti,voltagev,chargeq,and magnetic fluxφ,so there are=6possible combinations of relation between any two variables.Five relationships have been discovered before which arev-i,v-q,v-φ,i-q,i-φ,but what is the relationship between fluxφand chargeq? Professor Leon O.Chua at the University of California,Berkeley,predicted their existence in 1971 based on the completeness and symmetry of the circuit statistics [Chua (1971)].The fourth basic circuit component named memristor (short for memory and resistor),forms a complete circuit system with the original capacitorsC,resistorRand inductorL(see Fig.1).In 2008,Strukov and his colleagues of Hewlett-Packard (HP) Labs fabricated a nanometer-sized TiO2 memristor,the features of the circuit are consistent with the characteristics of the resistive device predicted by Leon O.Chua [Strukov,Snider,Stewart et al.(2008)].In 2010,HP Labs once again announced that the memristor apparatus has Boolean logic operation function,this discovery shocked the computer field [Vaidyanathan,Pham and Volos (2017);Duan,Zhang and Hu et al.(2014);Qu,Zhu and Wang et al.(2018)].

Figure1:Correlation of the memristor with four basic circuit variables

Hence,the research of memristor has been widely developed and applied in various fields[Peishin and Di Ventra (2011);Yakopcic,Hasan and Taha (2017);Wang,Wang and Zhou (2016)].Researchers in Germany have produced learning-capable nanomemristor devices,each of them is only 600 times the diameter of a human hair [Thomas (2013)].As a key part of designing an artificial brain,the memristor mimics human neural function.Biolek established a SPICE macro model of TiO2 memristor to study the physical and circuit characteristics of memristor under the condition of nonlinear drift[Biolek,Biolek and Biolkova (2009)].IBM Zurich research center announced the creation of the world’s first 500 artificial nanoscale random phase-change neuron arrays[Tuma,Pantazi,Le et al.(2016)] to simulate the way the human brain works.Bao et al.[Bao,Liu and Xu (2010)] researched the characters of smooth flux-controlled memristor and set up a new chaotic circuit.Zeng et al constructed and simulated synchronization of memristor-based on Chua’s circuits [Wen,Zeng,Huang et al.(2013)].Professor Hu and Duan et al proposed several design operations of Cellular Neural Networks (CNN) image processing based on the memristor [Hu,Duan,Chen et al.(2017);Hu,Feng,Liu et al.(2015)],which demonstrated the nonlinear behavior through simulation and comparison,and designed the reverse tandem memristor synaptic circuit.

Nonvolatile random memory is expected to be realized by the appearance of nanometer memristor.The integration,power consumption and reading and writing speed of the random memory based on memristor are superior to the traditional random memory[Bilotta,Chiaravalloti and Pantano (2014);Sah,Kim and Chua (2014);Wang,Ma,Xu et al.(2017)].In addition,memristor is the best way for hardware to realize synapse of artificial neural network.Since memristor is also composed of nonlinear models,it is easy to associate with chaotic systems [Wu,Wang,Jin et al.(2017);Sheridan,Cai,Du et al.(2017);U?ar and Yav?an (2016)].In fact,many existing memristic models are generated by nonlinear equations or circuits [Pham,Jafari,Vaidyanathan et al.(2016)].The chaotic system is vulnerable and sensitive to external environment,so it can be applied in the information encryption and secret communication.At the same time,due to the diversity of model parameters,large key space can be generated to increase the difficulty of cracking.

In this paper,a 5-dimentional flux-controlled memristors based on classical Chua’s circuit are put forward.Numerical simulation shows that system variables have obvious chaos trajectories and complex nonlinear dynamical behaviors,also including memristic characters.This model can be successfully applied to the scrambling and encryption of image and speech information,so the memristive model will provides a reference for the further study of the memory chaotic system and information processing.

2 Heterogeneous memristor system construction

The memristor can remember the number of charges flowing through it,and at any given moment the resistance is a function of time,and it changes with the current passing through.

2.1 Memristor properties

Memristor is a kind of nonlinear resistor with memory function.The resistance value can be changed by controlling the change of current.If the high resistance value is defined as“1” and the low resistance value is defined as “0”,the resistance can realize the function of data storage.It is actually a non-linear resistor with memory.

Memristor has three essential characteristics summarized as [Adhikari,Sah,Kim et al(2013)]:

(1) When a periodic excitation voltagev(t)(or currenti(t)) signal is connected to the outside,thev(t) -i(t)characteristic curve of the memristor is a zero crossing point.The shape of pinched hysteresis loop is presented as italic digital “8”,and the whole curve has odd symmetry and periodicity;

(2) When the frequencyωof the applied excitation signal increases to a larger value,thev(t) -i(t)plane area of the pinched hysteresis loop will decrease with the increase of the frequency of the input excitation signal;

(3) When the frequencyωof the applied electric signal tends to infinity,the pinched hysteresis loop will shrink into a straight line,and the nonlinearity of the memristor will disappear,and the resistance will be a constant value.

These are the typical features of the ideal memristor and the criterion of its judgment.

2.2 Dual flux-control memristor model

From Fig.1,memristor is a new two-terminal circuit element in which there is a functional relationship between chargeqand magnetic fluxφ.Assumingvandistand for voltage and current respectively,according to the basic principles of the circuit,the memristanceM(q)and memductanceW(φ)can be expressed as following:

andM(q)(Ohm) andW(φ)(Siemens) have physical definitions as

In this paper,we construct 2 different memductancesW1(φ1)andW1(φ1),whose expressions are given by

wherea,b,c,d,eare real constants.

To reveal that the modelsW1andW2in Eq.(3) possess three essential characteristics of memristor described in Section 2.1,selecting a periodic excitation sinusoidal voltagesv=Vmsin (ωt) =Vmsin(2πft),whereVmis voltage amplitude,ωandfare angular and frequency,respectively.

Assuminga=1.923,b=1.923,c=-1.9230.9,d=1.9615,e=0.09615in Eq.(3),by replacing Eq.(3) with Eq.(1),Fig.2 shows thev-icurves ofW1andW2memristors withω=(1,0.5,0.35)Hz angular frequency,we can show they have shapes like italic digital ‘8’,they possess obvious pinched hysteresis loop features.

Figure2:Thev - icurves of two different memristors with W1 and W2

2.3 Dual memristors structure based on classic Chua's circuit

The classic Chua’s chaotic circuit is consisted by two capacitorsC1andC2,an inductorLand a Chua’s nonlinear resistance diode [Muthuswamy and Chua (2010)].

Fig.3 draw a novel dual memristor-based Chua’s circuit,which is synthesized by 1 inductorL,2 linear resistorsRandr,2 capacitorsC1andC2,2 different memristorsW1andW2.

According to Kirchhoff Current Laws (KCL) and Kirchhoff Voltage Laws (KVL),we can obtain the following equations from Fig.3.

Figure3:Heterogeneous dual flux-control memristive circuit

Combining two different structure magnetic-controlled memristorsM1andM2,Eq.(4)is changed as:

Substitute formula (3) into formula (4),and we can obtain

3 Chaos nonlinear performs of the dual heterogeneous memristors

In this section,we will use numerical simulation to display the state trajectory of the system(6) and analyze the nonlinear characteristics of the two novels designed memristors.

3.1 Dual memristors numerical simulation

Let the coefficients of Eq.(6) areC1= 0 .18,C2= 1 .923,R= 0 .52,L= 0 .05,r=0.0125,and parametersa=1.923,b=1.923,c=-1.9230.9,d=1.9615,e=0.09615,the trajectory diagrams of system (6) are drawn in Fig.4.

Figure4:Variable phase portraits and trajectories of Eq.(6)

Figs.4(a)-4(f) show there are obvious dual-scroll chaotic attractors,and Fig.4(i) displays 3-D complex trajectory,Figs.4(g) and 4(h) showv(t) -i(t)trajectories ofW1andW2flux-controlled memristors ,they present a pinched hysteresis loop and similar to Fig.2.

3.2 Main chaotic features with dual memristors

In order to fully verify the chaotic characteristics of system (6) with dual memristors,we verify it from the following aspects:

A) Lyapunov exponent

The Lyapunov exponent can characterize the motion of the system,it is the magnitude of positive and negative values along a certain direction and represents the average divergence or convergence of adjacent orbits in the attractor in a long time.For chaotic systems,Lyapunov exponent can describe quantitatively the degree of separation of orbits of dynamic systems in phase space.The Jacobian matrix of system (6) is

Adopting Jacobian matrix method,Lyapunov exponents of system (6) are calculated:LE1=0.7896,LE2=0.4131,LE3=-0.3092,LE4=-0.5225,LE5=-4.5787.There are two positive Lyapunov exponents and the sum of the Lyapunov exponents is negative,indicating hyperchaotic behaviour.

The Lyapunov dimension is:

DLis a fractal dimension.

Fig.5(a) displays the Lyapunov exponents change of the system (6) within parameterb∈[0,3],Fig.5(b) displays the Lyapunov exponents of the system (6) with timetvaries,and whent> 10ms,LE1>0andLE2>0,which show the double memristor system is also a hyperchaotic system.

Figure5:Lyapunov exponents of the system (6)

B) Equilibrium point and eigenvalue

For system (6),let each of these terms is equal to 0,namely

There is only one equilibriumS*=(0,0,0,0,0),the Jacobia matrix withS*is

Eigenvalues are calculatedλ1,2=0,λ3,4= -1 .1832 ± 1 .0496 < 0,λ5= 1 .0659 > 0,this indicates that the equilibrium pointS*is an unstable saddle point.

C) Poincare map

Poincare cross section is used to analyse the motion of multi-variable autonomous system.If the transient transition process of the initial stage is not considered,the steady-state image of the Poincare section is only considered.When there is only one fixed point and a few discrete points on the Poincare section,the motion can be determined as periodic.When the Poincare section is a closed curve,it can be determined that the motion is quasi-periodic,and when the Poincare section is a dense point with a hierarchical structure,it can be determined that the motion is in a chaotic state.

Fig.6 showsv2-i3profile (wherev1=0.5) andv1-v2profile (wherei3=3)respectively,listing signs of complex folding.

Figure6:Poincare map of the system (6)

D) Power spectrum

Power spectrum analysis is an important means to study vibration and chaos.According to Fourier series expansion,the frequency of chaotic aperiodic dynamics is continuous spectrum.Fig.7 shows the system (5) is a continuous spectrum.

Figure7:The continuous power spectrum with variable v1

E) Bifurcation diagram

When the system parameter changes,the projection of Poincare mapping on a coordinate axis can constitute the bifurcation diagram.The countless points drawn in a chaotic graph indicate that there are numberless periodic signal points that never fall into the same position when chaos occurs.In the bifurcation diagram (Fig.8),the characteristics of system performance change with system parameters can be clearly described.

4 Data signal security with heterogeneous memristors

Chaos is a random behavior generated by deterministic equation,which is extremely sensitive to initial conditions and parameters,as well as long-term unpredictability.It can be used for confusion and synchronization control in secure communication field.In this section,we apply the constructed dual memristors to the encryption of digital image and voice signal.

4.1 Digital image secure scheme

Now let us describe the secure image communication scheme,for the case the image to be sent is a 24-bit RGB image.For other format images,the scheme is still effective after slightly adjustment.First,we define the key set of the scheme as follows:

where

●k1~k5are the initial conditions ofv1(0),v2(0),i3(0),φ1(0),φ1(0)with Eq.(6);

●k6~k10are the parametersC1,C2,L,R,rof heterogeneous memristors of Eq.(5);

●k11~k15are the parameters of two memristors (a,b,c,d,e)which are selected with Eq.(3);

In order to achieve the encryption of the original image information,the chaotic sequence in system (6) is used to mix up the RGB color image sufficiently,as far as possible to achieve a Gaussian white noise effect.

AM×Npixels color image is selected in the experiment,the encryption result is show as Fig.9.Fig.9(a) is the secret color image,it has 256×213 pixels.Fig.9(b) is encryption image,it has completely obscured the original image and is impossible to guess.Fig.9(c)is correct decryption image without any key error.

4.2 Security analysis

In the following subsections,key space and sensitivity analysis are given.The results show that our scheme has satisfactory security.

●Key space.The keys used in the scheme are double precision numbers.There are 15 keys altogether defined as Eq.(11).The sensitivity of the keys is 10-16.For the reason that guarantees to generate chaotic orbits,and the effective bits ofKs,consequently the size of the key space is 10(16×15)=10240>2797.If we adopt brutally attack in search of the exact key value,time complexity is tremendous!

●Key sensitivity.Tab.1 shows that encrypted images are very sensitive to perturbations of the keys (k2,k9,k12) = (v2(0),R,b).That is to say,when we first encrypt the original image withki,the cipertext is calledCi,then re-encrypt the plaintext withki+Δ,commonly Δ=1e-14,1e-15,1e-16,the new cipertext is calledCj,other 12 keys are unchanged.The percent of pixel error betweenCiandCjis over 99%,the results are shown in Figs.9(d)~9(f).In fact,our computer simulation shows that encrypted images are also very sensitive to perturbations of the other 12 keys.

In other words,if we encrypt withkikey,but decrypt withki+Δkey,we will get the similar non-decryption effects.

Table1:Sensitivity analysis of cipher image between Ciand Cj

Figure9:Data image encryption result and the key sensitivity analysis

●Statistical analysis.Let us compare the histograms between the plaintext (original imageP) and the encrypted imageQ.Select the original imagePshown in Fig.9(a),the histograms of the intensity level of RGB color planes are shown in the first row in Fig.10.The graphs given in the second row in Fig.10 are the histograms of the intensity level of the encrypted imageQ,that is shown in Fig.9(b).It can be seen that the histograms of the cipher images are more flat and are significantly different from those of the plaintext image.This illustrates the encryption image has quite chaotic.

●Speech signal security.We can also encrypt and protect the speech signal by using a scheme similar to that of image encryption.Fig.11 shows the all processes of encryption and decryption.

● Actually,origin speech signal in Fig.11(a) is single track,that is to say we can use a part of system (6) serial,the attacker doesn't know the number of equations we choose,and this adds more obstacles to decryption.

●Fractional order test.The fractional order equation is also used to process the system (5),the test results show that this design scheme is also suitable for fractional memristor systems.Different fractional value selection will increase the space of the key and the complexity of the algorithm.

●Others.In order to verify the chaotic behavior of the dual memristors,we can consider designing analog or digital circuits,that's the path to real physics,they are the extensive work in the future.

Figure10:Histogram comparison with origin image and cipher image

Figure11:Speech signal secure communication with similar image scheme

5 Conclusion

In this paper,a novel memristive circuit is proposed with two flux-controlled smooth memristors.Furthermore,analyzing the Lyapunov exponent spectrum,equilibrium point and phase portraits,and indicate this system has also the hyperchaotic nonlinear characteristics.The scheme has 15 keys and the key space is larger than 2797,which should be large enough for the requirements of secure communications.The sensitivity of the keys and the uniformity of the histograms of encrypted images imply that the new secure communication scheme is a promising candidate for images transmission.This scheme may be suitable for many format image encryptions and is feasible to color image secure communication and can be applied to speech and other multimedia signal encryption.

主站蜘蛛池模板: 幺女国产一级毛片| a在线观看免费| 精品一区二区三区中文字幕| 亚洲欧美日韩天堂| 国产福利一区视频| 97久久超碰极品视觉盛宴| 国产欧美日韩另类| 制服丝袜一区二区三区在线| 欧美日韩一区二区三| jizz国产在线| 成人免费一区二区三区| 亚洲最猛黑人xxxx黑人猛交| 国产三级成人| 国产JIZzJIzz视频全部免费| 国产在线精彩视频二区| 国产午夜福利在线小视频| 91综合色区亚洲熟妇p| 午夜福利免费视频| 久久久久免费精品国产| 丁香五月婷婷激情基地| 国产国语一级毛片| 无码内射中文字幕岛国片| 日本a∨在线观看| 欧美a网站| 在线毛片免费| 国产裸舞福利在线视频合集| 99久久精品国产麻豆婷婷| 五月天在线网站| 色婷婷国产精品视频| 人与鲁专区| 免费一级无码在线网站 | 国产成人一级| 欧美第九页| 五月天综合婷婷| 精品国产中文一级毛片在线看 | 97国产在线观看| 久久精品国产91久久综合麻豆自制| 蜜臀AV在线播放| 国产福利免费视频| 制服丝袜亚洲| 天天色综合4| 91无码网站| 日韩福利在线观看| 欧美19综合中文字幕| 国产麻豆91网在线看| 成年片色大黄全免费网站久久| 亚洲美女一区二区三区| 亚洲精品视频网| 精品国产免费人成在线观看| 国产在线自乱拍播放| 国产一级在线播放| 国产在线小视频| 日韩专区欧美| 亚洲欧美自拍中文| 亚洲成A人V欧美综合| 91精品综合| 草草影院国产第一页| 全午夜免费一级毛片| 国产精品亚洲精品爽爽| 成人字幕网视频在线观看| 国产精品午夜电影| 国模私拍一区二区| 精品无码一区二区三区电影| 久久久久亚洲Av片无码观看| 伊人久久久大香线蕉综合直播| 99久久婷婷国产综合精| 一级毛片不卡片免费观看| 无码福利视频| 久久久久无码精品国产免费| 午夜a视频| 欧美福利在线播放| 狠狠五月天中文字幕| 日韩无码视频播放| 亚洲AⅤ综合在线欧美一区| 无码国产伊人| 日韩黄色在线| 香蕉精品在线| 国产女人18毛片水真多1| 国产嫖妓91东北老熟女久久一| 国产精品林美惠子在线观看| 久久国产拍爱| 性欧美在线|