The Dynamics of the Fixed Points to Duffing Map

Total Page:16

File Type:pdf, Size:1020Kb

The Dynamics of the Fixed Points to Duffing Map Mathematical Theory and Modeling www.iiste.org ISSN 2224-5804 (Paper) ISSN 2225-0522 (Online) Vol.3, No.7, 2013 The Dynamics of the Fixed Points to Duffing Map Iftichar M.T.AL-Shara'a 1 May Alaa Abdul-khaleq AL-Yaseen 2* Mathematics Department ,University of Babylon ,Hilla , Babylon, Iraq * E-mail of the corresponding author : [email protected] Abstract We study the fixed points of Duffing map and the general properties of them , we find the contracting and expanding area of this map .So, we divide the parameter space for many regions to determinate the fixed points attracting , repelling or saddle . Also we determinate the bifurcation points of the parameter space . Keywords: Duffing map , fixed point , bifurcation point , attracting- expanding area. 1. Introduction Chaos Theory is a synonym for dynamical systems theory, a branch of mathematics. Dynamical systems come in three flavors: flows (continuous dynamical systems), cascades (discrete, reversible, dynamical systems), and semi-cascades (discrete, irreversible, dynamical systems).The concept of a dynamical system has its origins in Newtonian mechanics. There, as in other natural sciences and engineering disciplines, the evolution rule of dynamical systems is given implicitly by a relation that gives the state of the system only a short time into the future.In a dynamical system, a bifurcation is a period doubling, quadrupling, etc., that accompanies the onset of chaos. It represents the sudden appearance of a qualitatively different solution for a nonlinear system as some parameter is varied. Most commonly applied to the mathematical study of dynamical systems, a bifurcation occurs when a small smooth change made to the parameter values (the bifurcation parameters) of a system causes a sudden 'qualitative' or topological change in its behaviour. Bifurcations occur in both continuous systems (described by ordinary differential equations , delay differential equations, or partial differential equations), and discrete systems (described by maps). The name "bifurcation" was first introduced by Henri Poincaré in 1885 in the first paper in mathematics showing such a behavior. Henri Poincaré also later named various types of stationary points and classified them. The Duffing map is a 2 – D discrete dynamical system , its form is . It has fractal y F, = attractor studied by Paul Bourke 1998 .Some literatures studied its chaotic properties−bx + , ayMishra − y and Mankar [3] constructed encryption method using Duffing map, this method is desined using message embedded scheme and is analyzed for its validity, for plaintext sensitivity , key sensitivity, known plaintext and brute-force attacks. Tarai and Khan[2] applied backstepping method for projective synchronization of Duffing map ,in this case the error goes to zero through oscillation , the numerical simulation results indicate that their approach works very well .In this research we show that the Duffing map is diffeomorphism map and it has three fixed points , in our research we divide the parameter space into six regions to determinate types of the fixed points, and to find the bifurcation parameter points . 2. Preliminaries ∞ Let be a map .We say F is C , if its mixed k-th partial derivatives exist and are continuous for all ∞ ∞ F , and→ it is called a diffeomorphism if it is one-to-one, onto, C and its inverse is C . Let V be a subset of , and be any element in .Consider be a map. Furthermore assume that the first partials k of the coordinate maps f and g of F exist at .The differential → of F at is the linear map defined v v DF v !" !" on by , for all in .The determinant of is called the Jacobian !# v !$ v DF v = !% !% & v DF v of F at and it is denoted!# v by !$ v , so F is said to be area-contracting at if , F is vsaid to be area-expandingJF vat = if det+ . Let be an matrix .The real,det+ number, -is called eigenvalue of A if there exists a non, zero vector , X in such that , every non zero vector X . det+ /. 4 0 n 2 n 3 satisfying this equation is called an eigen vector of A associated with the eigenvalue05 = 35 .The point is called 7 3 6 9 fixed point if , it is an attracting fixed point, the eigenvalues of DF at this point if 8 and are 7 7 : less than one in 6absolute89 = 68 value9 , and it is repelling fixed point, if and are less than one in absolute3 value3 . with , is called hyperbolic matrix 3if: 3 where are the eigenvalues of 0A .Gulick GL 2, [3] defineddet the 0bifurcation = >. point at one dimension, we generalized,3?, @. this definition3? in two dimensions. A 41 Mathematical Theory and Modeling www.iiste.org ISSN 2224-5804 (Paper) ISSN 2225-0522 (Online) Vol.3, No.7, 2013 ′ parameterized family has a bifurcation of parameter if the number or nature (attracting vs. repelling ) C′ A,B ′ ′ of periodic point of the family changes as the parameter a Dor b passes through . In this case, is said to C′ C′ be a bifurcation point .We denote to the inverse of A. E: D D 0 3.The General Properties of Duffing Map In this section , we find the fixed point and we study the general properties of Duffing map , for example : is ∞ , one to one , onto , C and invertible so it is diffeomorphism, and we find the parameter which hasF area contracting or expanding . A,B Proposition 3-1 : Let be a Duffing map , if then has three fixed points : and 0 C − D − . A,B: → a / D + . A,B 6 9 , H 0 . HC − D − . − C − D − . H Proof−HC : − By D −definition . of fixed point , then and 7 8 7 A,B 6 9 = = 6 9 7 = 8 8 = I D7 + C8 − , so , therefore 8 −D7 + C8 − 8then 8 is the first fixed point , and 0 8 7 = −D7 + C7 − 7 7−D +,then C − 7 − . = 0 J and= 6 9 therefore 0 I D + C − 7 − . = 0 that…….( is 3.1)7 = and C − D − . 7 = >HC −……( D − 3.2) . are8 the = second >HC − and D − third . fixed points . C − D − . E − C − D − . J = H J = H ¶ HC − D − . −HC − D − . Proposition 3-2 : Let be the Duffing map then the Jacobian of is b . A,B Proof: : → = , so . ¶ 7 0 . 7 0 . +A,B 6 9 OA,B 6 9 = PQR = D Proposition 3-38 : −D C − N8 8 −D C − N8 The eigenvalues of are λ T T T ; . x ES$ EU>V$ E EW x DF, 6 9 :, = X 6 9 Proof : If is eigen value ofy then must be satisfied the characteristicy equation 7 3 −. 3 +A,B 6 9 Y Y = 8 D 3 − C + N8 then and the solutions of this equation are where λ T T T . ES$ EU>V$ E EW ¶0 3 − C3 + N38 + D = 0 3:, :, = Remark : 1. It is clear that if , then the eigenvalues of are real . x , ,Ny − a, / 2Hb b / 0 DF 6y9 2. The eigenvalues of at fixed points are T for fixed point and 7 A>VA EWB A,B :, + 689 3 = P 3 = T for fixed point and λ T for fixed points . EAEBE>VAEBE EWB E EEE>VEE EW E Proposition 3-4 : P :, = P Let be a Duffing map , If then is diffeomorphism . ProofF ,: To: prove→ is diffeomorphism ,b we @ 0must proveF, : 1) is one-to-oneF, map : Let such that then x: 7 7: 7 A,B 6 9 , 6 9 F, 6 9 = F, 6 9 y: so8 and 8: 8 8: 8 : : : : = hence 8 = 8 and so , that is , is −D7 + C8 − 8 −D7 + C8 − 8 one-to-one.−bx: + ay : − y: = −bx + ay − y −bx: = −bx b @ 0 x: = x F, 2) is ∞ : then all first partial derivatives exist and continuous. Note that 7 8 A,B [ 6 9 = ] 8 −D7 +] C8 − 8 ] ] \ ^_,` , and \ ^_,` , \ c_,` , , and \ c_,` , .We get that all its\_ ] = ixed 0 Xa k-th bpartial derivatives \`] = exist 0 and\_ ]continuou= 0 sXa for d all 2 k. From\` definition] = 0 ofXa diffeomorfism d e , is F∞, . F, [ 42 Mathematical Theory and Modeling www.iiste.org ISSN 2224-5804 (Paper) ISSN 2225-0522 (Online) Vol.3, No.7, 2013 i 3) is onto : Let any element in such that and i . Then there exist gh EAh gh EAh A,B 6 9 8 = 7 = EB j EB k f .Then is onto . 7 l A,B 6 9 = 6 9 F, 8 f i 4) has an inverse : Let gh EAh such that . Note E: E: E: A,B A,B 6 9 = j EB k A,B m A,B 6 9 = A,B m A,B 6 9 = 6 9 f f f f i i that , EBhAgEg g EAg , and E: E: f E: A,B m A,B 6 9 = A,B 6 9 = j EB k = 6 9 A,B m A,B 6 9 = f −D + Cf − f f f i f gh EAh . Then has an inverse and it is invertible . ¶ i A,B EB gh EAh , j k = j−D 6 9 + C − k = 6 9 F EB f It is clear that if or then is a hyperbolic matrix , the question what about 7 : A,B : , these proposition3 3 answer= D @ this . question−. .+ 689 3 3 = Remark. 3-5 : If then , so then is not one to one, that y 7 D = 0 A, = nQoSA,BU = p6 9 : 7 q A, is , is not diffeomorphism . ay − y 8 Proposition A, 3-6 : 1. is non hyperbolic matrix if and . Also , it is non hyperbolic matrix if 7 AE A,B and+ 689 .
Recommended publications
  • FPGA Design of Encryption Speech System Using Synchronized Fixed-Point Chaotic Maps Based Stream Ciphers
    International Journal of Engineering and Advanced Technology (IJEAT) ISSN: 2249 – 8958, Volume-8 Issue-6, August 2019 FPGA Design of Encryption Speech system using Synchronized Fixed-Point Chaotic Maps Based Stream Ciphers Zahraa M. Alroubaie, Muneer A. Hashem, Fadhil S. Hasan Abstract: In this work, speech encryption using synchronized Nowadays, Unpredictable long-term assessment of fixed-point chaotic map-based stream ciphers (SFPCM-SC) is chaotic systems has been appeared, initial parameters suggested. Five chaotic maps named quadratic, henon, logistic, sensitivity and infinite period, that the usage make them lozi and duffing are synchronized by using master-slave suitable in pseudo random bit generator [10],[14] and synchronization technique and then used to generate the pseudo permutation [15]. Therefore, different researchers are random bit generator (PRBG) using fixed-point converter. The PRBG is then Xor-ed with digitized speech signal where the suggested the chaotic system in stream ciphers-based speech encrypted signal is created. In the other side, the same map is encryption system. In [1] Lorenz chaotic system and Henon synchronized with the master one and used to recover the map in hybrid discrete continuous chaotic system for real original speech signal. First this work is simulated by using time wireless speech encryption are used. In [16] the chaotic MATLAB and then built the design using Xilinx system system is synchronized using the same manner described in generator (XSG). Finally, the hardware co-simulation is applied chaotic masking system. Furthermore, the proposed cipher for the proposed system by using FPGA SP605 XC6SLX45T speech system is implemented using FPGA Virtex-II device.
    [Show full text]
  • Empirical Analysis of Robust Chaotic Maps for Image Encryption
    International Journal of Innovative Technology and Exploring Engineering (IJITEE) ISSN: 2278-3075, Volume-9 Issue-11, September 2020 Empirical Analysis of Robust Chaotic Maps for Image Encryption Sonal Ayyappan, C Lakshmi Abstract: The rate of transferring data in the form of text, image, video or audio over an open network has drastically increased. As these are carried out in highly sophisticated fields of medicine, military and banking, security becomes important. In- order to enhance security for transmission, encryption algorithms play a vital role. So as to enhance the proficiency of the existing Images are represented as 2-dimensional arrays of encryption methods and for stronger anti attack abilities, chaotic data. Hence to apply encryption algorithms it must be based cryptography is essential. Chaotic based encryption has considered as one-dimensional array of data[3]. One- advantages of being sensitive to initial conditions and control parameters. Images have features like bulk data capacity and high dimensional image array consumes more space when inter pixel correlation. Transmission of such medical data should compared to one dimensional text data which leads to be highly confidential, integral and authorized. Hence chaos-based compression. It results in reduced space and reduced time for image encryption is an efficient way of fast and high-quality image transmission. But this may cause loss of some data which encryption. It has features like good speed, complexity, highly may be agreeable for general images but may be costly for secure, reasonable computational overhead and power. In this medical images. This results to wrong diagnosis of these paper a comprehensive analysis and an evaluation regarding the medical images [4].
    [Show full text]
  • Generalized Chaotic Maps and Elementary Functions Between Analysis and Implementation
    GENERALIZED CHAOTIC MAPS AND ELEMENTARY FUNCTIONS BETWEEN ANALYSIS AND IMPLEMENTATION By Wafaa Saber AbdelHalim Sayed A Thesis Submitted to the Faculty of Engineering at Cairo University in Partial Fulfillment of the Requirements for the Degree of MASTER OF SCIENCE in Mathematical Engineering FACULTY OF ENGINEERING, CAIRO UNIVERSITY GIZA, EGYPT 2015 GENERALIZED CHAOTIC MAPS AND ELEMENTARY FUNCTIONS BETWEEN ANALYSIS AND IMPLEMENTATION By Wafaa Saber AbdelHalim Sayed A Thesis Submitted to the Faculty of Engineering at Cairo University in Partial Fulfillment of the Requirements for the Degree of MASTER OF SCIENCE in Mathematical Engineering Under the Supervision of Prof. Abdel-Latif E. Hussien Prof. Hossam A. H. Fahmy Professor Professor Engineering Mathematics and Physics Department Electronics and Communication Engineering Department Faculty of Engineering, Cairo University Faculty of Engineering, Cairo University Assoc. Prof. Ahmed G. Radwan Associate Professor Engineering Mathematics and Physics Department Faculty of Engineering, Cairo University FACULTY OF ENGINEERING, CAIRO UNIVERSITY GIZA, EGYPT 2015 GENERALIZED CHAOTIC MAPS AND ELEMENTARY FUNCTIONS BETWEEN ANALYSIS AND IMPLEMENTATION By Wafaa Saber AbdelHalim Sayed A Thesis Submitted to the Faculty of Engineering at Cairo University in Partial Fulfillment of the Requirements for the Degree of MASTER OF SCIENCE in Mathematical Engineering Approved by the Examining Committee: Prof. Abdel-Latif E. Hussien, Thesis Main Advisor Prof. Hossam A. H. Fahmy, Member Assoc. Prof. Ahmed G. Radwan, Member Prof. Salwa K. Abd-El-Hafiz, Internal Examiner Prof. Nasser H. Sweilam, External Examiner Professor, Faculty of Science, Cairo University FACULTY OF ENGINEERING, CAIRO UNIVERSITY GIZA, EGYPT 2015 Engineer’s Name: Wafaa Saber AbdelHalim Sayed Date of Birth: 20/3/1991 Nationality: Egyptian E-mail: [email protected] Registration Date: 1/10/2013 Awarding Date: –/–/2015 Degree: Master of Science Department: Engineering Mathematics and Physics Supervisors: Prof.
    [Show full text]
  • Novel Image Encryption Scheme Based on Chebyshev Polynomial and Duffing Map
    Hindawi Publishing Corporation e Scientific World Journal Volume 2014, Article ID 283639, 11 pages http://dx.doi.org/10.1155/2014/283639 Research Article Novel Image Encryption Scheme Based on Chebyshev Polynomial and Duffing Map Borislav Stoyanov and Krasimir Kordov Faculty of Mathematics and Informatics, Konstantin Preslavski University of Shumen, 9712 Shumen, Bulgaria Correspondence should be addressed to Borislav Stoyanov; [email protected] Received 10 December 2013; Accepted 4 March 2014; Published 26 March 2014 Academic Editors: T. Cao, M. K. Khan, and F. Yu Copyright © 2014 B. Stoyanov and K. Kordov. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. We present a novel image encryption algorithm using Chebyshev polynomial based on permutation and substitution and Duffing map based on substitution. Comprehensive security analysis has been performed on the designed scheme using key space analysis, visual testing, histogram analysis, information entropy calculation, correlation coefficient analysis, differential analysis, key sensitivity test, and speed test. The study demonstrates that the proposed image encryption algorithm shows advantages of 113 more than 10 key space and desirable level of security based on the good statistical results and theoretical arguments. 1. Introduction chaotic cryptographic algorithm with good complex struc- ture is designed [5]. In [6], an improved stochastic middle In recent years, the dynamical chaotic systems have been multibits quantification algorithm based on Chebyshev poly- commonly used for the design of cryptographic primitives nomial is proposed. Three-party key agreement protocols featuring chaotic behaviour and random-like properties.
    [Show full text]
  • A Period-Doubling Cascade Precedes Chaos for Planar Maps Evelyn Sander and James A
    A period-doubling cascade precedes chaos for planar maps Evelyn Sander and James A. Yorke Citation: Chaos 23, 033113 (2013); doi: 10.1063/1.4813600 View online: http://dx.doi.org/10.1063/1.4813600 View Table of Contents: http://chaos.aip.org/resource/1/CHAOEH/v23/i3 Published by the AIP Publishing LLC. Additional information on Chaos Journal Homepage: http://chaos.aip.org/ Journal Information: http://chaos.aip.org/about/about_the_journal Top downloads: http://chaos.aip.org/features/most_downloaded Information for Authors: http://chaos.aip.org/authors CHAOS 23, 033113 (2013) A period-doubling cascade precedes chaos for planar maps Evelyn Sander1,a) and James A. Yorke2,b) 1Department of Mathematical Sciences, George Mason University, 4400 University Dr., Fairfax, Virginia 22030, USA 2University of Maryland, College Park, Maryland 20742, USA (Received 25 April 2013; accepted 27 June 2013; published online 22 July 2013) A period-doubling cascade is often seen in numerical studies of those smooth (one-parameter families of) maps for which as the parameter is varied, the map transitions from one without chaos to one with chaos. Our emphasis in this paper is on establishing the existence of such a cascade for many maps with phase space dimension 2. We use continuation methods to show the following: under certain general assumptions, if at one parameter there are only finitely many periodic orbits, and at another parameter value there is chaos, then between those two parameter values there must be a cascade. We investigate only families that are generic in the sense that all periodic orbit bifurcations are generic.
    [Show full text]
  • An Algorithm to Automatically Detect the Smale Horseshoes
    Hindawi Publishing Corporation Discrete Dynamics in Nature and Society Volume 2012, Article ID 283179, 9 pages doi:10.1155/2012/283179 Research Article An Algorithm to Automatically Detect the Smale Horseshoes Qingdu Li,1, 2 Lina Zhang,2 and Fangyan Yang2 1 Key Laboratory of Network Control & Intelligent Instrument of Ministry of Education, Chongqing University of Posts and Telecommunications, Chongqing 400065, China 2 Institute for Nonlinear Circuits and Systems, Chongqing University of Posts and Telecommunications, Chongqing 400065, China Correspondence should be addressed to Qingdu Li, [email protected] Received 9 August 2011; Revised 10 November 2011; Accepted 15 December 2011 Academic Editor: Nikos I. Karachalios Copyright q 2012 Qingdu Li et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. Smale horseshoes, curvilinear rectangles and their U-shaped images patterned on Smale’s famous example, provide a rigorous way to study chaos in dynamical systems. The paper is devoted to constructing them in two-dimensional diffeomorphisms with the existence of transversal homoclinic saddles. We first propose an algorithm to automatically construct “horizontal” and “vertical” sides of the curvilinear rectangle near to segments of the stable and of the unstable manifolds, respectively, and then apply it to four classical chaotic maps the Duffing map, the Henon´ map, the Ikeda map, and the Lozi map to verify its effectiveness. 1. Introduction Among a variety of mathematical characteristics of chaos, the existence of a horseshoe by S. Smale has been recognized as the most important signature of chaos from geometrical point of view.
    [Show full text]
  • Lie Methods for Nonlinear Dynamics with Applications to Accelerator Physics
    Lie Methods for Nonlinear Dynamics with Applications to Accelerator Physics Alex J. Dragt University of Maryland, College Park http://www.physics.umd.edu/dsat/ RSIT VE Y I O N F U 18 56 M A D N R Y L A 1 June 2019 Alex J. Dragt Dynamical Systems and Accelerator Theory Group Department of Physics University of Maryland College Park, Maryland 20742 http://www.physics.umd.edu/dsat Work supported in part by U.S. Department of Energy Grant DE-FG02-96ER40949. c 1991, 2014, and 2018 by Alex J. Dragt. All rights reserved. Contents Preface lxiii 1 Introductory Concepts 1 1.1 Transfer Maps ................................. 1 1.1.1 Maps and Dynamics ......................... 2 1.1.2 Maps and Accelerator Physics ................... 8 1.1.3 Maps and Geometry ......................... 9 1.2 Map Iteration and Other Background Material ............... 10 1.2.1 Logistic Map ............................. 10 1.2.2 Complex Logistic Map and the Mandelbrot Set .......... 18 1.2.3 Simplest Nonlinear Symplectic Map ................ 24 1.2.4 Goal for Use of Maps in Accelerator Physics ........... 27 1.2.5 Maps from Hamiltonian Di↵erential Equations .......... 32 1.3 Essential Theorems for Di↵erential Equations ................ 46 1.4 Transfer Maps Produced by Di↵erential Equations ............. 52 1.4.1 Map for Simple Harmonic Oscillator ................ 53 1.4.2 Maps for Monomial Hamiltonians ................. 54 1.4.3 Stroboscopic Maps and Duffing Equation Example ........ 55 1.5 Lagrangian and Hamiltonian Equations ................... 62 1.5.1 The Nonsingular Case ........................ 63 1.5.2 A Common Singular Case ...................... 65 1.6 Hamilton’s Equations with a Coordinate as an Independent Variable ..
    [Show full text]
  • Appendix a Classical Mechanics
    Appendix A Classical Mechanics In this Appendix we review some of the basic concepts from classical mechanics that are used in the text. A.1 Newton's Equations Newton's equations of motion describe the behavior of collections of N point particles in a three dimensional space (3N degrees of freedom) in terms of 3N coupled second order differential equations (the number of equations can be reduced if constraints are present), cf(mQrQ) _ F (A.1) dt2 - 01, where a = 1, ... , N, mo: is the mass and ro: is the displacement of the a th particle, and F 01 is the net force on the ath particle due to the other particles and any external fields that might be present. Eqs. (A.1) only have simple structure in inertial frames of reference and for Cartesian coordinates. For noninertial frames and general orthog­ onal curvilinear coordinate systems they rapidly become extremely complicated and nonintuitive. Because Newton's equations are second order, the state of a col­ lection of N particles at time t is determined once the velocities, VOl = ~ = rQ and displacements rQ are specified at time t. New­ ton's equations allow one to determine the state of the system at time, t, uniquely in terms of the state at time t=O Thus a system composed of N point particles evolves in a phase space composed of 3N velocity and 3N position coordinates. 460 Appendix A. Classical Mechanics A.2 Lagrange's Equations Lagrange showed that it is possible to formulate Newtonian mechan­ ics in terms of a variational principle which vastly simplifies the study of mechanical systems in curvilinear coordinates and nonin­ ertial frames and allows a straightforward extension to continuum mechanics.
    [Show full text]
  • A Chaotic-Based Encryption/Decryption Framework for Secure Multimedia Communications
    entropy Article A Chaotic-Based Encryption/Decryption Framework for Secure Multimedia Communications Ibrahim Yasser 1 , Mohamed A. Mohamed 2 , Ahmed S. Samra 2 and Fahmi Khalifa 2,* 1 Communications and Electronics Engineering Department, Nile Higher Institute for Engineering and Technology, Mansoura 35524, Egypt; [email protected] 2 Electronics and Communications Engineering Department, Faculty of Engineering, Mansoura University, Mansoura 35516, Egypt; [email protected] (M.A.M.); [email protected] (A.S.S.) * Correspondence: [email protected] Received: 10 September 2020; Accepted: 28 October 2020; Published: 4 November 2020 Abstract: Chaos-based encryption has shown an increasingly important and dominant role in modern multimedia cryptography compared with traditional algorithms. This work proposes novel chaotic-based multimedia encryption schemes utilizing 2D alteration models for high secure data transmission. A novel perturbation-based data encryption for both confusion and diffusion rounds is proposed. Our chaotification structure is hybrid, in which multiple maps are combined combines for media encryption. Blended chaotic maps are used to generate the control parameters for the permutation (shuffling) and diffusion (substitution) structures. The proposed schemes not only maintain great encryption quality reproduced by chaotic, but also possess other advantages, including key sensitivity and low residual clarity. Extensive security and differential analyses documented that the proposed schemes are efficient for secure multimedia transmission as well as the encrypted media possesses resistance to attacks. Additionally, statistical evaluations using well-known metrics for specific media types, show that proposed encryption schemes can acquire low residual intelligibility with excessive nice recovered statistics. Finally, the advantages of the proposed schemes have been highlighted by comparing it against different state-of-the-art algorithms from literature.
    [Show full text]
  • Kumari Meenu.Pdf (9.124Mb)
    Quantum-Classical Correspondence and Entanglement in Periodically Driven Spin Systems by Meenu Kumari A thesis presented to the University of Waterloo in fulfillment of the thesis requirement for the degree of Doctor of Philosophy in Physics (Quantum Information) Waterloo, Ontario, Canada, 2019 c Meenu Kumari 2019 Examining Committee Membership The following served on the Examining Committee for this thesis. The decision of the Examining Committee is by majority vote. External Examiner: Karl-Peter Marzlin Professor, Dept. of Physics, St. Francis Xavier University Supervisor(s): Shohini Ghose Professor, Dept. of Physics and Computer Sci., Wilfrid Laurier University Robert B. Mann Professor, Dept. of Physics and Astronomy, University of Waterloo Internal Member: Norbert L¨utkenhaus Professor, Dept. of Physics and Astronomy, University of Waterloo Internal-External Member: Achim Kempf Professor, Dept. of Applied Mathematics, University of Waterloo Other Member(s): Eduardo Mart´ın-Mart´ınez Asst. Professor, Dept. of Applied Mathematics, University of Waterloo ii This thesis consists of material all of which I authored or co-authored: see Statement of Contributions included in the thesis. This is a true copy of the thesis, including any required final revisions, as accepted by my examiners. I understand that my thesis may be made electronically available to the public. iii Statement of Contributions This thesis is based on the following publications and forthcoming articles: • Chapters 2 and 3 are based on - M. Kumari and S. Ghose, Quantum-classical correspondence in the vicinity of pe- riodic orbits, Phys. Rev. E 97, 052209 (2018). • Chapter 4 is based on - M. Kumari and S. Ghose, Untangling entanglement and chaos, Phys.
    [Show full text]
  • Encrypting Digitized Voice Signals Using the Chaotic Behavior of a Nonlinear Discrete Time Dynamical System
    Proceedings of the World Congress on Engineering 2016 Vol I WCE 2016, June 29 - July 1, 2016, London, U.K. Encrypting Digitized Voice Signals using the Chaotic Behavior of a Nonlinear Discrete Time Dynamical System Manju Pandey chaotic dynamical behavior has some very interesting Abstract — A method for the encryption and decryption of statistical properties which make it well suited for the design voice signals using the chaotic dynamic behavior exhibited by a of hard-to-crack ciphers in cryptography. nonlinear discrete time dynamical system has been proposed. A In this paper, a method for the encryption of recorded chaotic cipher for digitized voice signals has been designed and digitized voice signals using the chaotic dynamics which is the encryption and decryption processes have been tested on a exhibited by a nonlinear discrete time dynamical system is sample voice signal, i.e., “hello”. The nonlinear discrete-time discussed. A proof-of-concept demonstration of the dynamical system considered for encryption in the present paper is the Duffing’s map which is a nonlinear differential encryption and decryption of a digitized voice signal using a equation of order two modeling an oscillator. chaotic cipher has been carried out by the author. Index Terms—Chaos, Nonlinear Dynamical System, Discrete II. CHAOTIC SEQUENCES Time Signal, Encryption and Decryption A. Chaotic Dynamics and Maps Chaotic dynamics is exhibited by certain nonlinear I. INTRODUCTION dynamical systems [2][3][4]. The dynamical behavior i.e., oluminous voice traffic moves over digital networks in the behavior with respect to time, of systems which exhibit Vthis era of ubiquitous multimedia and wireless chaos is extremely sensitive to even infinitesimal changes in communication.
    [Show full text]
  • UC Irvine UC Irvine Electronic Theses and Dissertations
    UC Irvine UC Irvine Electronic Theses and Dissertations Title Parallel processing of chaos-based image encryption algorithms Permalink https://escholarship.org/uc/item/6zc2n027 Author Raman, Ashwin Publication Date 2016 License https://creativecommons.org/licenses/by/4.0/ 4.0 Peer reviewed|Thesis/dissertation eScholarship.org Powered by the California Digital Library University of California UNIVERSITY OF CALIFORNIA, IRVINE Parallel processing of chaos-based image encryption algorithms THESIS submitted in partial satisfaction of the requirements for the degree of MASTER OF SCIENCE in Computer Engineering by Ashwin Raman Thesis Committee: Professor Jean-Luc Gaudiot, Chair Professor Nader Bagherzadeh Professor Chen-Yu Phillip Sheu 2016 © 2016 Ashwin Raman TABLE OF CONTENTS Page List of Figures ……...……………………………………………………………………………………………… iii List of Tables …...………………………………………………………………………………………………..….. v Acknowledgments …………………..…...…………………………………………………………………...…. vi Abstract of the Thesis ……….……………………………………………………………………………….... vii 1. Introduction .…………………………………………………………………………………………………… 1 1.1. Motivation .………………………………………………………………………………………………... 1 1.2. Organization of Thesis .………………………………………………………………………………. 2 2. Chaos Based Image Encryption …………………………………………………………………………. 4 2.1. Chaotic Maps ……………………………………………………………………………………………... 5 2.1.1. Arnold Cat Map ……………………………………………………………………………….... 6 2.1.2. Henon Map ……………………………………………………………………………………..... 7 2.1.3. Duffing Map …………………………………………………………………………………...… 9 2.1.4. Cross Chaotic Map …………………………………………………………………………..
    [Show full text]