Chaotic Systems Based Real-Time Implementation of Visual Cryptography Using LabVIEW

被引:8
|
作者
Bulut, Gulden Gunay [1 ]
Catalbas, Mehmet Cem [2 ]
Guler, Hasan [3 ]
机构
[1] Nevsehir Haci Bektas Veli Univ, Engn Architecture Fac, Dept Elect Elect Engn, TR-50300 Nevsehir, Turkey
[2] OSTIM Tech Univ, Vocat High Sch, Dept Elect & Automat, TR-06374 Ankara, Turkey
[3] Firat Univ, Engn Fac, Dept Elect Elect Engn, TR-23000 Elazig, Turkey
关键词
chaotic circuit; chaotic system; real-time application; image encryption; SYNCHRONIZATION; CRYPTANALYSIS;
D O I
10.18280/ts.370413
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
In recent years, chaotic systems have begun to take a substantial place in literature due to increasing importance of secure communication. Chaotic synchronization which has emerged as a necessity for secure communication can now be performed with many different methods. This study purposes the Master-Slave synchronization via active controller and real time simulation of five different chaotic systems such as Lorenz, Sprott, Rucklidge, Moore-Spiegel, Rossler. Master slave synchronization was performed because of synchronization realized between the same type of chaotic systems with different initial parameters and also because of the systems were expected to behave similarly as a result of synchronization. Active control method was used to amplify the difference signal between master and slave systems which have different initial parameters and to return back synchronization information to the slave system. The real time simulation and synchronization of the master and slave systems performed successfully in LabVIEW environment. Furthermore, for the real time implementation, analogue outputs of NI-DAQ card used and real time results also were observed on an oscilloscope and secure communication application using sinusoidal signal and an image encryption application achieved successfully.
引用
下载
收藏
页码:639 / 645
页数:7
相关论文
共 50 条
  • [21] Experimental implementation of visual cryptography based on time average moire
    Ragulskis, M.
    Fedaravicius, A.
    Ragulskiene, J.
    ICEM 14: 14TH INTERNATIONAL CONFERENCE ON EXPERIMENTAL MECHANICS, VOL 6, 2010, 6
  • [22] Real-Time Implementation of Energy Management for Photovoltaic/Battery/Diesel Hybrid System Based on LabVIEW
    Atia, Doaa M.
    El-Madany, Hanaa T.
    Atia, Yousry
    Zahran, Mohamed B.
    INTERNATIONAL JOURNAL OF RENEWABLE ENERGY RESEARCH, 2022, 12 (02): : 1105 - 1116
  • [23] A LabVIEW-Based Implementation of Real-Time Adaptive Modulation for Underwater Acoustic OFDM Communication
    Barua, Suchi
    Rong, Yue
    Nordholm, Sven
    Chen, Peng
    GLOBAL OCEANS 2020: SINGAPORE - U.S. GULF COAST, 2020,
  • [24] Dynamic visual cryptography based on chaotic oscillations
    Petrauskiene, Vilma
    Palivonaite, Rita
    Aleksa, Algiment
    Ragulskis, Minvydas
    COMMUNICATIONS IN NONLINEAR SCIENCE AND NUMERICAL SIMULATION, 2014, 19 (01) : 112 - 120
  • [25] Implementation of a real-time moving object tracking system using visual servoing
    Tsai, MC
    Chen, KY
    Cheng, MY
    Lin, KC
    ROBOTICA, 2003, 21 : 615 - 625
  • [26] Heterogeneous chaotic systems based cryptography
    Murali, K
    PHYSICS LETTERS A, 2000, 272 (03) : 184 - 192
  • [27] Correct Implementation of Open Real-time Systems
    Abdellatif, Tesnim
    Combaz, Jacques
    Poulhies, Marc
    2011 37TH EUROMICRO CONFERENCE ON SOFTWARE ENGINEERING AND ADVANCED APPLICATIONS (SEAA 2011), 2011, : 57 - 64
  • [28] Two Idea Implementation of Real-Time Systems
    Konczak, Piotr
    Zabierowski, Wojciech
    TEM JOURNAL-TECHNOLOGY EDUCATION MANAGEMENT INFORMATICS, 2012, 1 (03): : 188 - 191
  • [29] Real Time Implementation of Secure Communication System Based On Synchronization of Hyper Chaotic Systems
    Elkholy, Mohamed M.
    El Hennawy, H. M.
    Elkouny, Abdellatif
    2016 33RD NATIONAL RADIO SCIENCE CONFERENCE (NRSC), 2016, : 159 - 167
  • [30] Real-Time Symmetric Cryptography using Quaternion Julia Set
    Anandi, P. M. Rubesh
    Bajpai, Gaurav
    Bhaskari, Vidhyacharan
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2009, 9 (03): : 20 - 26