• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    A novel algorithm to analyze the dynamics of digital chaotic maps in finite-precision domain

    2023-02-20 13:14:20ChunleiFan范春雷andQunDing丁群
    Chinese Physics B 2023年1期
    關(guān)鍵詞:春雷

    Chunlei Fan(范春雷) and Qun Ding(丁群)

    Electrical Engineering College,Heilongjiang University,Harbin 150080,China

    Keywords: digital chaos,dynamic degradation,state-mapping graph,periodicity analysis

    1. Introduction

    As we all know, Lorenz’s outstanding contribution opened the way for the study of chaos theory in 1963.[1]After more than half a century,scholars from various countries have also made many distinguished achievements in chaos theory and applied research,[2,3]which undoubtedly deepened people’s understanding of chaotic systems. Some basic characteristics of chaos are also revealed, such as long-term unpredictability,positive Lyapunov exponent,intrinsic randomness,topological transfer, high sensitivity to initial conditions, and boundedness. These good characteristics of chaotic systems are highly consistent with the basic principles of confusion and diffusion in cryptography, which makes chaotic systems widely used in chaotic secure communication.

    In recent years, scientific research achievements of chaos in engineering applications emerge one after another,such as a true random sequence generator,[4–6]multimedia data encryption,[7,8]digital watermarking,[9,10]a chaotic pseudo-random sequence generator and chaos-based masking technology.[11,12]However,while chaotic systems play an active role in secure communication and cryptography, the dynamic degradation of digital chaos has also become prominent.According to the mathematical definition of chaos such as Li–Yorke or Devaney,the classical chaos theory is defined in the continuous domain.[13]Nevertheless,when the chaotic system is implemented in a hardware processor (e.g., FPGA, DSP)with limited computational accuracy, it is not chaos in the strict mathematical sense. Due to the influence of truncation error and rounding error,the dynamic characteristics of digital chaos will undergo a series of degradation phenomena.[14,15]For example, the original non-periodic chaotic sequence will have a short-period phenomenon, and its high sensitivity to initial conditions, intrinsic randomness and ergodicity will also be greatly reduced or even disappear.[16]These dynamic degradation phenomena of digital chaos will undoubtedly have a negative impact on the security of chaotic secure communication and chaotic cryptography. Therefore, it is very crucial to analyze the dynamic degradation of digital chaos,especially to estimate the number of fixed points and periodic limit cycles accurately.

    Actually, as early as 1988, Grebogiet al. found that a chaotic system that was numerically simulated on a computer would be affected by the rounding error of hardware equipment, and its chaotic orbit would become periodic.[17]In 2003, Liet al. analyzed the degree of dynamic degradation of the digital one-dimensional piecewise linear chaotic map(PWLCM)in fixed-point arithmetic domain.[18]They designed a set of dynamic indicators, which can quantitatively describe the dynamic degradation of the PWLCM to a certain extent. This method can promote the designs of chaotic pseudo-random generators with good performance and reduce the difficulty of cryptanalysis of chaotic encryption systems based on PWLCMs. In 2011, Miyazakiet al. found that different rounding methods have different effects on the transient branch length and cycle length of the digital logistic map.[19]The properties of discrete sequences generated by the digital logistic map depend heavily on the rounding method. In Ref. [20], based on strict statistical tests, a new algorithm is designed to analyze the weak keys of digital chaos. When analyzing the security of chaotic ciphers, it is found that the short periodicity of the digital chaotic orbit is the essential factor that causes many weak keys in chaotic ciphers. In addition, compared to floating-point operations, chaotic systems implemented by fixed-point operations have a longer average period of chaotic sequences. In 2016, Yoshioka and Kawano analyzed the periodic properties of Chebyshev polynomial sequences over the residue ringZ/2kZ.[21]The analysis results show that a recently proposed public-key algorithm based on the polynomial is insecure. In Ref. [22], for different finite calculation precisions, Persohn and Povinelli conducted a detailed analysis of the periodicity of logistic chaotic sequences generated by floating-point operations. Due to the low efficiency of the calculation method,they used the Condor cluster supercomputer to perform large-scale parallel calculations,and statistically analyzed the transient length and period length of these sequences. The results show that the performance of the logistic sequence generator is not ideal. In 2018,when Frahmet al. analyzed the dynamic characteristics of the Chirikov standard map and the Arnold map, they found that there is a certain internal relationship between the dynamic system and the complex network.[23]In recent years,scholars at home and abroad have made outstanding contributions to the study of the dynamic characteristics of digital chaos.[24–27]Nevertheless,these algorithms have several limitations. First,most conventional methods have high time complexity.Therefore, it is bound to use high-performance supercomputers or graphics processing unit(GPU)for parallel computing to improve the execution speed of programs,which undoubtedly increases the consumption of hardware resources and the cost of experiments. Second, some proposed schemes lack a certain degree of versatility,that is,these methods are only suitable for analyzing the dynamic characteristics of one or several digital chaotic systems. Third,most schemes only calculate a general performance index, and cannot accurately locate all periodic cycles and fixed points contained in a digital chaotic map.

    In this work, aiming at the limitations of the current schemes, we design a periodic cycle location algorithm(PCLA)from a new perspective to analyze the dynamic degradation of digital chaos. The PCLA can divide the statemapping graph of digital chaos into several connected subgraphs with the purpose of locating all fixed points and periodic limit cycles contained in a digital chaotic map. In addition, this algorithm can also used to calculate the total number of state variables contained in each connected subgraph.Furthermore,in order to test the versatility and performability of our proposed algorithm,the periodic distribution and security of several typical digital chaotic maps (i.e., logistic map and Baker map) are analyzed in detail. Numerical simulation results show that these digital chaotic maps have obvious short period and multi period phenomena. This algorithm can clearly describe the internal mapping structure of the digital chaotic system under different calculation accuracies,thereby promoting the effective resistance and accurate evaluation of dynamic degradation of digital chaotic maps. In addition, a full understanding of the periodic distribution of digital Baker map is also helpful to design more excellent digital watermarking and image encryption schemes.

    The rest of this paper is organized as follows: Section 2 describes digitization of chaotic maps in finite-precision domain. Section 3 puts forward a periodic cycle location algorithm. The performance of two chaotic maps,i.e.,logistic and Baker, in finite-precision domains is analyzed in Section 4,and Section 5 concludes the paper.

    2. Digitization of chaotic maps in finite-precision domain

    In the classical chaos theory, all chaotic maps are defined in the continuous domain, and their dynamic characteristics are meaningful only in the continuous space with positive Lebesgue measure. However,when chaotic maps are implemented on hardware devices (e.g., FPGA and DSP) with limited computational accuracy, these chaotic maps will go through the process of digitization. In this section, let us assume that the iterative formula of a chaotic map can be defined as

    whereμdenotes the control parameter. In binary representation,xncan be written as

    where (·)2means the contained digits in binary format. Assuming thatmdenotes limited computational accuracy,the binary representation ofxncan be approximated as

    In order to convert decimal fractions to integer representation,we introduce a new variable,i.e.,yn,which is defined as

    Based on Eq.(4),the binary representation ofyncan be given by

    whereyndenotes the bits stored in the memory of hardware devices with the limited computational accuracym. Substitutingyninto Eq.(1),we obtain

    Multiplying both sides of Eq.(6)by 2m,we obtain

    Furthermore, Eq. (8) can be re-expressed by substituting for the functionf(·)from Eq.(8)into Eq.(7)to obtain

    whereμis generally set as 4. Based on Eq. (9), we can analyze the dynamic characteristics of the digital logistic map under different limited calculation accuracy.

    3. Periodic cycle location algorithm for digital chaotic maps

    In this section, in order to effectively analyze the dynamic degradation and internal structure of digital chaotic maps under different finite calculation precision, we develop a periodic cycle location algorithm (PCLA) that is based on a state-mapping graph. This algorithm has strong universality and can accurately calculate all periodic cycles and fixed points contained in a digital chaotic map. Due to the finite calculation accuracy of microprocessors, the value range of the digital logistic map will be limited to a finite state setΩm={0,1,...,2m-1}. Based on Eq.(9), we plot the statemapping graph of the digital logistic map with limited calculation accuracym=4, as shown in Fig. 1. It is obvious that the state-mapping graph is composed of three connected subgraphs, among which the connection subgraph 1 containing the most state variables is called the maximal connection subgraph. Undoubtedly, if any two state variables are in the same connected subgraph, the two state variables must converge to the same fixed point or periodic cycle after several iterations. The core idea of the periodic cycle location algorithm is to divide the state-mapping graphs of digital chaotic maps with different calculation accuracies into multiple connected subgraphs and extract the unique periodic cycle or fixed point contained in each connected subgraph. In addition,this algorithm can also be used to calculate the number of state variables contained in each connected subgraph.

    Fig.1. State-mapping graph of the digital logistic map with limited calculation accuracy m=4.

    Specifically, the periodic cycle location algorithm(PCLA)is proposed as follows:

    Step 1Define an array of 1-D variablesε={ε0,ε1,...,εi,...,εL}, whereL=2md-1 andddenotes the dimension of digital chaos in finite-precision domains.Please note that if the dimension of a digital chaotic map exceeds 1,dimensionality reduction is required before executing this algorithm. Then,the 1-D arrayεcan be initialized as

    Step 2We can define a 2×2LmatrixA,which is given by

    wherer ∈{0,1,2,...,L}, and the functionf(·) denotes the iterative equation of digital chaos. Subsequently, variables[A0,r,A1,r]Tin each column are separately used as a formal parameter of the state variable union algorithm (SVUA). Then,the SVUA with different formal parameters is executed one by one from variable [A0,0,A1,0]Tto [A0,L,A1,L]T. Furthermore,the state variable union algorithm is presented in algorithm 1 as a pseudocode. This algorithm can filter out state variables that are connected to each other, that is, it can split the state-mapping graph of digital chaos into several connected subgraphs.

    Step 3After Step 2 is carried out,the corresponding elements in the 1-D arrayεare also updated.Moreover,we define a 1×Larrayγ,which can be initialized as

    Then, the elementγεiin the arrayγis incremented by 1 and letirange from 0 toL. Based on the above operation,the updated arrayγcontains the structural information of the digital chaotic map. Here, we can search for all non-zero elements in the arrayγand defineCas the set of all non-zero elements.The sum of all elements in setCis equal to 2m. Ifγj >0,the state variablejwill be a fixed point or a node in a periodic cycle for digital chaos. In addition,the total number of nodes in the connected subgraph containing the state variablejis equal toγj. Moreover,ifj >0 andj=f(j),the state variablejwill be a fixed point of digital chaos in finite-precision domains.Ifj >0 andj/=f(j),the state variablejwill be a node in a limit cycle. The core idea of this algorithm is to assume that each node (i.e., state variable) of the digital chaotic map is isolated. Then, SVUA is used to determine which nodes are connected by the state-mapping relationship of the digital chaotic system. Those interconnected nodes are constructed into a connected subgraph. The above-mentioned periodic cycle location algorithm can precisely locate the fixed point and periodic distribution of digital chaos, which is of great significance for analyzing the degree of dynamic degradation of digital chaotic systems. It is worth noting that this algorithm is limited by storage bottlenecks when the computational accuracymis greater than 32. This can make the program difficult to run. Therefore,when the finite calculation accuracy is relatively high,we can use Floyd’s cycle-finding algorithm to calculate the cycle length of a single chaotic orbit,which occupies almost no memory(only a few variables’storage space).Furthermore, in order to speed up the running efficiency of the program, the CUDA platform can be used for large-scale parallel computing.

    Furthermore, to assess the effectiveness and practicality of the PCLA, we take the case of the digitized logistic map with finite calculation accuracym=3 as an example. Based on the execution steps of the PCLA,we first define an array of 1-D variablesε={ε0,ε1,...,εi,...,εL}. Because the dimension of the digital logistic map is 1 and the calculation accuracymis 3,the variableLis equal to 7. Therefore,the arrayεcan be initialized asε={0,1,2,...,7}. Next,according to the iterative formula of the digitized chaotic map,the matrixAis given by

    According to the column order of matrixA,the periodic cycle location algorithm is performed from element[0,0]Tto[7,3]T.The update process of each elementεiin the arrayεis shown in Fig. 2. First, we can regard all state variables as multiple sets (i.e., connected subgraphs), and the nodes in each connected subgraph are connected. As shown in Fig.2,based on the iterative relationship of the digital logistic map,these isolated state variables are continuously connected and eventually construct multiple connected subgraphs.

    Fig.2. Update process of each element εi in the array ε.

    Moreover,the general structure diagram of the connected subgraph is illustrated in Fig.3,which is composed of branch nodes and cyclic nodes.All branch nodes will eventually point to a cyclic node and fall into a limit cycle. Specifically,if the lengthpof a limit cycle is equal to 1, the cyclic node in the limit cycle will be a fixed point. Based on the above analysis,we find that if the subscriptiofεiis equal to a branch node of the connected subgraph, the final value of the updatedεiwill equal the value of a cyclic node. As an example,the variableε1is continuously updated from initial value 1 to 7. Note that,for the state-mapping graph of the digital logistic map with the precisionm=3,all branch nodes(1,5)and partial cyclic nodes 3 of the connected subgraph 1 will eventually point to a cyclic node 7 in the limit cycle(3,7).

    Fig.3. General structure diagram of the connected subgraph.

    Next, after the arrayεis updated, we can calculate the 1×Larrayγ={2,0,0,0,0,0,2,4}. Sequentially, we can search for all non-zero elements(i.e.,γ0,γ6andγ7)in the arrayγ, the setCof all non-zero elements is{2,2,4}. Since 0=f(0), 6=f(6) and 7/=f(7)=3, we can conclude that the digitized logistic map with the precisionm=3 contains two fixed points(0,6)and one limit cycle(3,7).

    4. Performance analysis of chaotic maps in finite-precision domains

    4.1. Analyzing the dynamic degradation of the digital logistic map

    4.1.1. Short-period and multi-period phenomena

    In cryptography, the confidentiality of sequence ciphers depends on the performance of key stream generator. For chaotic cryptography, the key stream is usually generated by chaotic pseudo-random sequence generators. In order to improve the security of the encryption algorithm as much as possible, the generated key stream needs to have certain characteristics of a random sequence. An extremely large period can effectively increase the anti-attack ability of the cryptographic algorithm. Generally speaking, since the data rate of modern cipher machines is as high as 108b/s,the period length of the key stream should not be less than 3×1016. Chaotic time series in the continuous domain have the characteristics of nonperiodicity and good randomness. Nevertheless, due to the limited calculation accuracy of hardware equipment, chaotic maps in finite-precision domains emerge many short-period and multi-period phenomena. In this section, for the digital logistic map,we perform the periodic cycle location algorithm for different calculation accuracym,and the experimental results are listed in Table 1. Here,NcsandNsvrepresent the number of connected subgraphs and the total number of state variables contained in each connected subgraph. The variable nodecndenotes the cyclic node located by the PCLA,andpis the period length of the limit cycle contained in a certain connected subgraph. Note that ifp=1, the variable nodecnwill be a fixed point.

    Table 1. Periodicities of the digital logistic map with various calculation precisions.

    As an example,the state-mapping graph of the digital logistic map with limited calculation accuracym=6 is divided into three connected subgraphs,as shown in Fig.4. The variables nodecn=0,48,63 are located as the cyclic nodes. Based on the corresponding period lengthp, we can draw conclusions that the digital logistic map has two fixed point (0, 48)and one limit cycle (63, 3, 11, 36). Since the largestNsvis equal to 60, the maximal connection subgraph has sixty state variables. Undoubtedly, if the sixty state variables are used as initial values of the digital logistic map,all discrete chaotic sequences generated by them will eventually fall into the periodic limit cycle(63, 3, 11, 36). From the table, as the calculation accuracymincreases,the maximum value of the period lengthpalso becomes longer. However, the period length is far less than 3×1016. The experimental results show that the digital chaotic map has obvious short-period and multi-period phenomena, which cannot guarantee the security of chaotic sequence ciphers.

    Fig.4. State-mapping graph of the digital logistic map with limited calculation accuracy m=6.

    4.1.2. Cross-correlation of discrete chaotic sequences

    Chaotic systems have strong initial value sensitivity.When the initial conditions change slightly,the difference between the two chaotic trajectories is not obvious in a short time. However, as time goes on, the chaotic trajectories under different initial conditions will occur huge deviation. The initial value sensitivity of chaos reduces the correlation between different discrete chaotic sequences. This characteristic makes the chaotic encryption algorithm have a large key space.However,for digital chaotic maps,the initial sensitivity is severely degraded due to the negative influence of limited calculation accuracy. As an example, we set the calculation accuracym=7 and generate three discrete logistic sequences with initial values 7,23 and 39. Furthermore,we analyze the cross correlation between different discrete logistic sequences,as given in Fig.5. The result of cross-correlation operation reflects the measure of similarity between two signals. Here,we assume that{x(n)}and{y(n)}denote two different logistic sequences. The cross-correlation function is defined as

    whereRxy(k) andNrepresent the cross-correlation function and the length of digital logistic sequence. As shown in Fig.5(a),the cross correlation of two logistic sequences with the initial values 7 and 39 shows dense peak lines,which implies strong correlation. When the initial values are equal to 7 and 23,it can be seen from Fig.5(b)that the cross correlation of the two sequences is significantly reduced.

    Fig.5. Cross correlation of discrete logistic sequences with different initial values of(a)7,39 and(b)7,23.

    Fig.6. Partial state-mapping graph of the digital logistic map with calculation accuracy m=7.

    Moreover,the reason for this phenomenon is that the three initial values are in different connected subgraphs. Partial state-mapping graph of the digital logistic map with calculation accuracym=7 is shown in Fig. 6. According to the figure, the initial values 7 and 39 are in the same connected subgraph,and the initial values 7 and 23 are in different connected subgraphs. This phenomenon implies that the discrete chaotic sequences generated by these initial values in the same connected subgraph are approximately equal to each other and differ only in the transient state. Based on the PCLA,we can obtain that the digital logistic map with the precisionm=7 has two fixed point (0, 96) and one limit cycle (11, 40, 110,61,127,3). This phenomenon is common for the digital logistic map, which will reduce the effective key space of chaotic ciphers. From the above analysis, it can be concluded that the sensitivity of initial value and long-term unpredictability of digital chaotic maps are degraded due to the influence of calculation accuracy,and this undesirable phenomenon has caused a non-negligible effect on the security of the chaotic pseudorandom sequence generator.

    4.1.3. Ergodic property of the digital logistic map

    In the classical chaos theory,the chaotic system has good ergodicity in its attraction domain. However,the digitized logistic map is affected by limited calculation accuracy, and its dynamic characteristics are severely degraded. It is difficult to achieve complete coverage of state variables in the range of state space. Therefore,in order to evaluate the degradation degree of ergodicity of the digital logistic map, under the same calculation accuracy,2mdiscrete logistic sequences are generated with different initial values.Furthermore,a set of discrete data can be obtained by calculating the state-space utilization of each logistic sequence. Based on the box-whisker plot,these data are statistically analyzed. The simulation results can be shown in Fig. 7. The box-whisker plot can describe the distribution of data in a relatively stable manner without being affected by outliers. As presented in Fig.7,with the calculation accuracy increases, the state-space utilization of the digital logistic map gradually tends to 0.

    Fig.7. State-space utilizations of the digital logistic map with various computational precisions.

    4.1.4. Low permutation entropy

    In 2002, Bandtet al. proposed a mensuration to analyze the complexity of discrete-time sequences, that is, permutation entropy(PE).[28]This method has many advantages,such as its robustness,fast-computing speed,and invariance to nonlinear monotonic transformations. The range of permutation entropy is between 0 and 1. The larger the PE value,the better the randomness and the higher the complexity of the discretetime sequence. In this section, we calculate the permutation entropy of digital logistic sequences with various limited calculation precisions. The parameters of PE include embedding dimensionθand time delayτ,which are set as 6 and 1,respectively. For different digital logistic sequences, the results are listed in Table 2. From the table,as the calculation accuracymincreases, the PE value of the discrete logistic sequence also increases. However, when the calculation accuracy reaches 20, the PE value is only 0.62507, which cannot still meet the requirements of chaotic ciphers.

    Table 2. PEs of digital logistic sequences with various calculation precisions.

    4.2. Analyzing the periodicity of the 2-D digital Baker map

    Baker map is widely used in the field of multimedia data encryption, which is often responsible for scrambling digital images.It is called Baker map because the folding and stretching effect of this chaotic map is like that of a baker kneading dough. In this section,we briefly introduce the digitization of the 2-D Baker map. First, we assume thatTcis the iterative equation of the Baker map,which is based on the mapping relationship from a unit square to itself. Furthermore, the unit square is divided intokvertical bars (i.e., [Ni-1,Ni]×[0,1])along thex-axis,wherei ∈{1,2,...,k}andNiis defined by

    wherePirepresents the width of the above vertical bar andP1+P2+···+Pi=1. Each vertical bar is stretched along thex-axis direction and then compressed along they-axis direction,and the schematic diagram of the Baker map is shown in Fig.8. This process can also be expressed by a mathematical formula as

    where(x,y)∈[Ni-1,Ni-1+Pi]×[0,1]andi ∈{1,2,...,k}. In this section,we consider the case ofk=2,and the mathematical equation of the digital 2-D Baker map can be given by

    wheremdenotes the limited computational precision, andxn,yn ∈{0,1,2,...,2m-1}. Furthermore, we reduce the dimension of the 2-D digital Baker map,which is define as

    wherecnis an integer,andcn ∈{0,1,...,22m-1}. Based on Eq.(18),numerical conversion can be realized betweencnand(xn,yn).

    Furthermore, based on the periodic cycle location algorithm, the period distribution of the digital Baker map under different calculation accuracies is analyzed in detail, and the experimental results are listed in Table 3. From the table, we can see that the digital Baker map has two fixed points and many short periodic limit cycles. When the calculation accuracym=8,it has 4116 connected subgraphs.

    Fig.8. Schematic diagram of the Baker map.

    Table 3. Periodicities of the digital Baker map with various calculation precisions.

    In order to reflect the internal mapping structure of the digital Baker map more intuitively, state-mapping graphs of the digital Baker map with calculation precisionsm=2,3 are shown in Fig.9. From the figure,regardless of the calculation accuracym,all connected subgraphs of the digital 2-D Baker map have only cyclic nodes and no branch nodes. Compared with the digital logistic map,the digital Baker map has a large number of short limit cycles and no transient state. For the calculation accuracym,the length of the limit cycle contained in the maximal connected subgraph is equal to 2m.

    When using the 2-D digital Baker map to scramble the pixels of a digital image, an important issue is to select the number of iterations. In this section, we consider how to choose an appropriate number of scrambling from the aspect of the period distribution of the Baker map. When the Baker map is used to scramble an image, (xn,yn) in Eq. (17) represents the position of the pixel of the digital image,and 2m×2mdenotes the size of the digital image. Furthermore, we adopt the Fruits image with a size of 256×256 as the experimental data. Based on the PCLA,we can calculate the period distribution of the digital Baker map with the calculation accuracym=8, and the results are listed in Table 4. As can be seen from Table 4, there are five types of periodic cycles (i.e., 1,2, 4, 8, and 16) for the Baker map. Among these limit cycles, there are 4080 periodic cycles with a length of 16, and the proportion of nodes is as high as 99.61%.

    Fig.9. State-mapping graph of the digital Baker map with different calculation precisions: (a)m=2,and(b)m=3.

    Table 4. Period distribution of the digital Baker map in the precision m=8.

    It is not difficult to find that when the numberNbof iterations of the digital Baker map is an integer multiple of the length of any limit cycle, there must be corresponding pixels that are not scrambled in the digital image. The Fruits image with different scrambling times are shown in Fig.10. A subjective evaluation method can be used to obtain that the three sub-graphs in Figs.10(h)–10(j)have better scrambling effects.However,according to the above analysis of the periodicity of the digital Baker map, there are still 256 pixels that are not scrambled in Fig. 10(i). Therefore, based on the periodicity of the digital Baker map and the subjective evaluation method,we believe that the scrambling effect of digital image is the best when the scrambling numberNbis equal to 7 or 9.

    Fig.10. Fruits image after being scrambled by the digital Baker map with various numbers of scrambling iterations Nb: (a)original image,(b)Nb=1,(c)Nb=2,(d)Nb=3,(e)Nb=4,(f)Nb=5,(g)Nb=6,(h)Nb=7,(i)Nb=8,(g)Nb=9,(k)Nb=10,(l)Nb=11,(m)Nb=12,(n)Nb=13,(o)Nb=14,(p)Nb=15,and(q)Nb=16.

    5. Conclusion

    In order to facilitate the application of chaos in engineering practice,it is very crucial to effectively evaluate the characteristic degeneration of digital chaotic maps. In this paper,we employ a periodic cycle location algorithm (PCLA) that is based on state-mapping graph of digital chaos. This algorithm can precisely locate all fixed points and limit cycles contained in a digital chaotic map from a new perspective.Related experiments have been performed to verify the versatility and availability of the PCLA in terms of cross correlation of discrete chaotic sequences,period distribution,sequence complexity and state-space utilization.This algorithm can not only analyze the degree of dynamic degeneration of digital chaotic systems,but also effectively improve the security of the multimedia data encryption algorithm and help to understand the internal mapping law of the digital chaos.

    Acknowledgements

    Project supported by the National Natural Science Foundation of China (Grant No. 62101178) and the Fundamental Research Funds for the Higher Institutions in Heilongjiang Province,China(Grant No.2020-KYYWF-1033).

    猜你喜歡
    春雷
    學(xué)術(shù)中堅(jiān)李春雷
    春雷響
    幼兒100(2024年11期)2024-03-27 08:32:56
    明 祝允明 行草書春雷札
    THE EXISTENCE AND CONCENTRATION OF GROUND STATE SOLUTIONS FOR CHERN-SIMONS-SCHR ?DINGER SYSTEMS WITH A STEEP WELL POTENTIAL*
    惜物
    做人與處世(2022年2期)2022-05-26 22:34:53
    花事
    Molecular simulation study of the adhesion work for water droplets on water monolayer at room temperature?
    MULTIPLICITY OF POSITIVE SOLUTIONS FOR A CLASS OF CONCAVE-CONVEX ELLIPTIC EQUATIONS WITH CRITICAL GROWTH?
    澄懷觀道 道法太行——陳春雷山水畫藝術(shù)初探
    豐 碑
    国产一区二区激情短视频| 少妇裸体淫交视频免费看高清| 日韩人妻高清精品专区| 亚洲午夜理论影院| 91麻豆av在线| 啪啪无遮挡十八禁网站| 国产精品久久久久久精品电影| 欧美日韩黄片免| 中文资源天堂在线| 欧美另类亚洲清纯唯美| 在线观看日韩欧美| 男女之事视频高清在线观看| АⅤ资源中文在线天堂| 男女下面进入的视频免费午夜| 国产老妇女一区| 欧美日韩国产亚洲二区| 日韩大尺度精品在线看网址| 精品久久久久久成人av| 国产中年淑女户外野战色| 国模一区二区三区四区视频| 精品久久久久久久毛片微露脸| 久久精品夜夜夜夜夜久久蜜豆| 国产三级中文精品| 午夜两性在线视频| 一个人看视频在线观看www免费 | 日韩中文字幕欧美一区二区| 亚洲av中文字字幕乱码综合| 女人被狂操c到高潮| 青草久久国产| av女优亚洲男人天堂| tocl精华| 一级作爱视频免费观看| 天天添夜夜摸| 国产亚洲欧美在线一区二区| 亚洲成人精品中文字幕电影| 男人舔女人下体高潮全视频| 免费av毛片视频| АⅤ资源中文在线天堂| 高清日韩中文字幕在线| 少妇裸体淫交视频免费看高清| 亚洲成a人片在线一区二区| 天堂av国产一区二区熟女人妻| 欧美日韩黄片免| 精品乱码久久久久久99久播| 最近在线观看免费完整版| 九色国产91popny在线| 国产精品98久久久久久宅男小说| 他把我摸到了高潮在线观看| 男插女下体视频免费在线播放| 黄色丝袜av网址大全| 婷婷精品国产亚洲av| 国产一区二区在线观看日韩 | 国产色婷婷99| 中文亚洲av片在线观看爽| 黄色女人牲交| 亚洲精华国产精华精| 精品99又大又爽又粗少妇毛片 | 中文字幕av在线有码专区| 成人av一区二区三区在线看| 欧美日韩中文字幕国产精品一区二区三区| 非洲黑人性xxxx精品又粗又长| 国产精品电影一区二区三区| 国产精品久久久久久亚洲av鲁大| 一夜夜www| 狂野欧美激情性xxxx| 亚洲人成网站高清观看| 国产中年淑女户外野战色| 男女视频在线观看网站免费| 午夜福利免费观看在线| 亚洲精品色激情综合| 亚洲乱码一区二区免费版| 久久精品国产亚洲av香蕉五月| 99精品欧美一区二区三区四区| 成人特级av手机在线观看| 丝袜美腿在线中文| 久久九九热精品免费| 在线看三级毛片| 亚洲国产中文字幕在线视频| 99久久成人亚洲精品观看| 国产av麻豆久久久久久久| 免费看光身美女| 99久久久亚洲精品蜜臀av| 日韩欧美三级三区| 午夜激情福利司机影院| 亚洲va日本ⅴa欧美va伊人久久| 在线视频色国产色| 亚洲七黄色美女视频| www国产在线视频色| 久久久久免费精品人妻一区二区| 一a级毛片在线观看| 搡老妇女老女人老熟妇| 内地一区二区视频在线| 在线观看66精品国产| 国产91精品成人一区二区三区| 亚洲精品久久国产高清桃花| 最新美女视频免费是黄的| 午夜两性在线视频| 亚洲熟妇熟女久久| 性欧美人与动物交配| 国产免费男女视频| 国产精品久久久人人做人人爽| 白带黄色成豆腐渣| 久久精品国产亚洲av香蕉五月| 国产成人影院久久av| 亚洲第一电影网av| 国产黄片美女视频| 亚洲熟妇中文字幕五十中出| 国产亚洲精品久久久com| 最新美女视频免费是黄的| av在线蜜桃| 亚洲精品粉嫩美女一区| 亚洲成a人片在线一区二区| 两性午夜刺激爽爽歪歪视频在线观看| 色综合亚洲欧美另类图片| 中亚洲国语对白在线视频| 国产在视频线在精品| 女同久久另类99精品国产91| 亚洲av美国av| 国内精品久久久久久久电影| 又黄又爽又免费观看的视频| 美女高潮喷水抽搐中文字幕| 亚洲人与动物交配视频| 欧美激情久久久久久爽电影| 亚洲av免费在线观看| 国产真实乱freesex| 一级毛片高清免费大全| 久久精品国产自在天天线| 久久亚洲真实| 欧美大码av| 三级国产精品欧美在线观看| 久久久精品欧美日韩精品| 成年女人毛片免费观看观看9| 欧美激情久久久久久爽电影| 哪里可以看免费的av片| 少妇的丰满在线观看| h日本视频在线播放| 亚洲,欧美精品.| 国产淫片久久久久久久久 | 在线国产一区二区在线| 男女下面进入的视频免费午夜| 在线观看午夜福利视频| 一区二区三区国产精品乱码| 国产成人系列免费观看| 亚洲成av人片免费观看| 一本综合久久免费| 99精品欧美一区二区三区四区| 51国产日韩欧美| 国产午夜精品论理片| 中文字幕人成人乱码亚洲影| 国产真实乱freesex| 国产亚洲精品av在线| 3wmmmm亚洲av在线观看| 高清毛片免费观看视频网站| 久久精品国产综合久久久| 91av网一区二区| 国产精品 国内视频| 国产色爽女视频免费观看| 人妻夜夜爽99麻豆av| 天天躁日日操中文字幕| 在线播放国产精品三级| 少妇人妻精品综合一区二区 | 校园春色视频在线观看| 校园春色视频在线观看| 亚洲av电影不卡..在线观看| 亚洲在线自拍视频| 亚洲中文字幕日韩| 免费电影在线观看免费观看| 91久久精品国产一区二区成人 | 99精品在免费线老司机午夜| 欧美乱色亚洲激情| 熟妇人妻久久中文字幕3abv| 在线观看免费视频日本深夜| 亚洲乱码一区二区免费版| 国产一区二区在线av高清观看| 老汉色∧v一级毛片| 久久久久免费精品人妻一区二区| 久久这里只有精品中国| 黄色片一级片一级黄色片| 成人永久免费在线观看视频| 国产私拍福利视频在线观看| 美女 人体艺术 gogo| 99久久九九国产精品国产免费| 美女高潮喷水抽搐中文字幕| 一卡2卡三卡四卡精品乱码亚洲| av天堂中文字幕网| 黄色视频,在线免费观看| 99热这里只有精品一区| 日韩人妻高清精品专区| 色播亚洲综合网| 免费人成在线观看视频色| 一级a爱片免费观看的视频| 亚洲最大成人手机在线| 亚洲欧美日韩东京热| 国产免费av片在线观看野外av| 国产欧美日韩一区二区精品| 岛国在线观看网站| 亚洲无线在线观看| 天堂网av新在线| 久久国产乱子伦精品免费另类| 18禁裸乳无遮挡免费网站照片| 国产精品电影一区二区三区| 搡女人真爽免费视频火全软件 | 人妻久久中文字幕网| 久久久久国产精品人妻aⅴ院| 午夜免费观看网址| 欧美3d第一页| 国产视频一区二区在线看| 国产黄a三级三级三级人| 欧美3d第一页| 亚洲专区国产一区二区| 嫩草影院精品99| 亚洲第一电影网av| 日韩欧美精品v在线| 久久天躁狠狠躁夜夜2o2o| 国产成人a区在线观看| 日本五十路高清| 欧美zozozo另类| 国产激情欧美一区二区| 啦啦啦免费观看视频1| 国产亚洲精品久久久com| 韩国av一区二区三区四区| 香蕉av资源在线| 久久久久性生活片| 身体一侧抽搐| 老鸭窝网址在线观看| 国产成人a区在线观看| 亚洲成人精品中文字幕电影| 女警被强在线播放| 不卡一级毛片| 少妇裸体淫交视频免费看高清| 国产高清videossex| 欧美又色又爽又黄视频| 亚洲av免费高清在线观看| 无限看片的www在线观看| 午夜免费观看网址| 亚洲男人的天堂狠狠| ponron亚洲| 免费人成视频x8x8入口观看| a级一级毛片免费在线观看| avwww免费| 日韩有码中文字幕| 亚洲中文字幕一区二区三区有码在线看| 搡老妇女老女人老熟妇| 可以在线观看毛片的网站| 欧美bdsm另类| 国产成人av教育| 国产精品98久久久久久宅男小说| 俄罗斯特黄特色一大片| 成人欧美大片| 91麻豆精品激情在线观看国产| 午夜激情欧美在线| 亚洲国产高清在线一区二区三| 亚洲性夜色夜夜综合| 观看免费一级毛片| eeuss影院久久| 欧美日韩福利视频一区二区| 日韩中文字幕欧美一区二区| av视频在线观看入口| 成人精品一区二区免费| 中文字幕人妻丝袜一区二区| 最近在线观看免费完整版| svipshipincom国产片| 精品人妻一区二区三区麻豆 | 日韩av在线大香蕉| 亚洲成人久久爱视频| svipshipincom国产片| 91在线观看av| 日韩 欧美 亚洲 中文字幕| 两个人视频免费观看高清| 国产成人欧美在线观看| 欧美日韩国产亚洲二区| 好男人电影高清在线观看| 男人舔女人下体高潮全视频| 97超视频在线观看视频| 国内毛片毛片毛片毛片毛片| 非洲黑人性xxxx精品又粗又长| 99精品在免费线老司机午夜| 一区二区三区高清视频在线| 中文字幕人妻丝袜一区二区| 亚洲五月婷婷丁香| 日韩大尺度精品在线看网址| 999久久久精品免费观看国产| 99热只有精品国产| 18禁裸乳无遮挡免费网站照片| 真实男女啪啪啪动态图| 99视频精品全部免费 在线| 免费av毛片视频| 久9热在线精品视频| 18+在线观看网站| 国产午夜精品久久久久久一区二区三区 | 免费搜索国产男女视频| 亚洲无线观看免费| 露出奶头的视频| 99热这里只有是精品50| 久久久成人免费电影| 两人在一起打扑克的视频| 不卡一级毛片| 国产精华一区二区三区| 久久香蕉精品热| 国产精品久久久久久人妻精品电影| 成人精品一区二区免费| 亚洲内射少妇av| 天堂影院成人在线观看| 九九久久精品国产亚洲av麻豆| xxxwww97欧美| 伊人久久大香线蕉亚洲五| 精品欧美国产一区二区三| 在线观看66精品国产| 女人十人毛片免费观看3o分钟| 麻豆一二三区av精品| 美女高潮喷水抽搐中文字幕| 日本在线视频免费播放| 日本 av在线| 成人鲁丝片一二三区免费| 91久久精品电影网| 久9热在线精品视频| 日本黄色视频三级网站网址| 久久精品91无色码中文字幕| 成人高潮视频无遮挡免费网站| 99国产综合亚洲精品| 脱女人内裤的视频| 国产av不卡久久| 欧美中文综合在线视频| 国产男靠女视频免费网站| 久久九九热精品免费| 欧美最新免费一区二区三区 | 啪啪无遮挡十八禁网站| 99国产精品一区二区三区| av在线天堂中文字幕| 国产精品电影一区二区三区| 哪里可以看免费的av片| 丁香六月欧美| 哪里可以看免费的av片| 欧美最黄视频在线播放免费| 美女高潮喷水抽搐中文字幕| 男女那种视频在线观看| www.999成人在线观看| 丰满人妻熟妇乱又伦精品不卡| 日韩 欧美 亚洲 中文字幕| 亚洲精品456在线播放app | 99久久久亚洲精品蜜臀av| 桃红色精品国产亚洲av| 国产一级毛片七仙女欲春2| 天天躁日日操中文字幕| 久久国产精品影院| 亚洲精品久久国产高清桃花| 亚洲电影在线观看av| 夜夜爽天天搞| 女同久久另类99精品国产91| 久久6这里有精品| 中文资源天堂在线| 淫秽高清视频在线观看| 亚洲av一区综合| 欧美日韩国产亚洲二区| 九九热线精品视视频播放| 欧美一级a爱片免费观看看| 丰满的人妻完整版| 亚洲第一电影网av| 在线免费观看的www视频| 法律面前人人平等表现在哪些方面| 美女免费视频网站| 欧美中文综合在线视频| 搡女人真爽免费视频火全软件 | 色在线成人网| 国产成人欧美在线观看| 欧美又色又爽又黄视频| 成人鲁丝片一二三区免费| 午夜福利18| 亚洲人成电影免费在线| 好男人电影高清在线观看| 国产成人av教育| 精品电影一区二区在线| 国产成人av教育| 91字幕亚洲| 在线观看日韩欧美| 欧美+亚洲+日韩+国产| 狂野欧美白嫩少妇大欣赏| 欧美一区二区精品小视频在线| 日本一二三区视频观看| 欧美区成人在线视频| 高清毛片免费观看视频网站| 又紧又爽又黄一区二区| 男插女下体视频免费在线播放| 免费av不卡在线播放| 欧美激情在线99| 中文资源天堂在线| 免费看美女性在线毛片视频| 色老头精品视频在线观看| 成人午夜高清在线视频| 99国产精品一区二区三区| 欧美zozozo另类| 婷婷亚洲欧美| 欧美成人a在线观看| 久久精品国产综合久久久| 亚洲性夜色夜夜综合| 久久精品亚洲精品国产色婷小说| 一个人免费在线观看电影| 亚洲无线观看免费| 69av精品久久久久久| 老司机在亚洲福利影院| 日本一二三区视频观看| 两个人的视频大全免费| 国产麻豆成人av免费视频| 99国产极品粉嫩在线观看| 国产视频内射| av国产免费在线观看| 中出人妻视频一区二区| 美女免费视频网站| 一级黄色大片毛片| 亚洲av免费高清在线观看| 国产高清视频在线播放一区| 一级黄片播放器| 亚洲自拍偷在线| 中出人妻视频一区二区| 久久这里只有精品中国| 亚洲avbb在线观看| 国产精品一及| 啦啦啦观看免费观看视频高清| 亚洲内射少妇av| 亚洲国产欧美网| 国产精品女同一区二区软件 | a级一级毛片免费在线观看| 欧美日韩中文字幕国产精品一区二区三区| 搡老熟女国产l中国老女人| а√天堂www在线а√下载| 欧美激情久久久久久爽电影| 亚洲精品久久国产高清桃花| 日本黄色视频三级网站网址| 欧美日韩福利视频一区二区| 又粗又爽又猛毛片免费看| 99riav亚洲国产免费| 欧美激情久久久久久爽电影| 亚洲精品久久国产高清桃花| 午夜两性在线视频| 一夜夜www| netflix在线观看网站| 国产精品自产拍在线观看55亚洲| 又黄又粗又硬又大视频| 欧美成人a在线观看| 国产精品久久久久久久电影 | 神马国产精品三级电影在线观看| 亚洲在线观看片| 少妇丰满av| 亚洲国产精品久久男人天堂| 亚洲av免费在线观看| 99精品在免费线老司机午夜| 免费观看人在逋| 日韩精品中文字幕看吧| 国产亚洲精品久久久com| 91久久精品电影网| 久久精品国产99精品国产亚洲性色| 丁香欧美五月| 日韩欧美国产在线观看| 美女高潮喷水抽搐中文字幕| 一区二区三区国产精品乱码| 精品免费久久久久久久清纯| 在线观看66精品国产| 好男人在线观看高清免费视频| 一进一出抽搐gif免费好疼| bbb黄色大片| 亚洲精品日韩av片在线观看 | 神马国产精品三级电影在线观看| 亚洲一区高清亚洲精品| 国产主播在线观看一区二区| 淫妇啪啪啪对白视频| 亚洲av电影在线进入| 欧美+日韩+精品| 母亲3免费完整高清在线观看| 日本成人三级电影网站| 国产成人aa在线观看| 午夜福利在线在线| 成人亚洲精品av一区二区| 精品国产美女av久久久久小说| 国产色爽女视频免费观看| 亚洲av日韩精品久久久久久密| 看黄色毛片网站| 69人妻影院| 亚洲中文字幕日韩| 中文字幕精品亚洲无线码一区| 亚洲国产精品sss在线观看| 国产久久久一区二区三区| 五月玫瑰六月丁香| 亚洲国产日韩欧美精品在线观看 | 成人特级黄色片久久久久久久| 午夜精品久久久久久毛片777| 男人舔奶头视频| 婷婷丁香在线五月| 国产高清激情床上av| 久久伊人香网站| 日本精品一区二区三区蜜桃| 韩国av一区二区三区四区| 日韩av在线大香蕉| 精品一区二区三区人妻视频| 亚洲欧美激情综合另类| 搡老岳熟女国产| 一本精品99久久精品77| 舔av片在线| 亚洲色图av天堂| 久久九九热精品免费| 欧美又色又爽又黄视频| 欧美另类亚洲清纯唯美| 亚洲国产欧洲综合997久久,| 麻豆一二三区av精品| 69av精品久久久久久| 动漫黄色视频在线观看| 欧美色欧美亚洲另类二区| 热99在线观看视频| 天堂av国产一区二区熟女人妻| 天美传媒精品一区二区| 欧美日韩黄片免| 国产亚洲欧美98| 91麻豆精品激情在线观看国产| 国产激情偷乱视频一区二区| av视频在线观看入口| 日本黄大片高清| bbb黄色大片| 日本 av在线| 午夜精品一区二区三区免费看| 亚洲av一区综合| 在线观看免费视频日本深夜| 国产欧美日韩一区二区精品| 亚洲国产精品999在线| 欧洲精品卡2卡3卡4卡5卡区| 免费高清视频大片| 日韩精品中文字幕看吧| 给我免费播放毛片高清在线观看| 亚洲av成人不卡在线观看播放网| 国产成人欧美在线观看| 天堂动漫精品| 99国产精品一区二区三区| 欧美黑人巨大hd| 精品国产亚洲在线| 成年女人毛片免费观看观看9| 在线免费观看的www视频| 国产午夜精品论理片| 亚洲精品久久国产高清桃花| 国产男靠女视频免费网站| 国内久久婷婷六月综合欲色啪| 国产精品三级大全| 日本与韩国留学比较| 欧美大码av| 国内毛片毛片毛片毛片毛片| 日韩中文字幕欧美一区二区| 国产成人欧美在线观看| 岛国视频午夜一区免费看| 又黄又粗又硬又大视频| 青草久久国产| 精华霜和精华液先用哪个| 久久人妻av系列| 在线观看美女被高潮喷水网站 | 此物有八面人人有两片| 亚洲人成网站在线播| 中文字幕人妻丝袜一区二区| 亚洲午夜理论影院| 日韩高清综合在线| 大型黄色视频在线免费观看| 欧美日韩亚洲国产一区二区在线观看| 亚洲,欧美精品.| 在线观看舔阴道视频| 午夜福利在线观看吧| 每晚都被弄得嗷嗷叫到高潮| 亚洲精品456在线播放app | 国产在线精品亚洲第一网站| or卡值多少钱| 亚洲色图av天堂| 亚洲人成电影免费在线| 日韩成人在线观看一区二区三区| 久久人妻av系列| 亚洲av日韩精品久久久久久密| 亚洲av二区三区四区| 国产精品 国内视频| 午夜福利在线观看免费完整高清在 | 亚洲激情在线av| 免费观看精品视频网站| а√天堂www在线а√下载| 亚洲成人免费电影在线观看| 国产成人aa在线观看| 亚洲精品成人久久久久久| 国产综合懂色| 亚洲av电影在线进入| 国产毛片a区久久久久| 麻豆成人午夜福利视频| 色在线成人网| 国产精品一区二区免费欧美| 国产亚洲欧美在线一区二区| 搡老熟女国产l中国老女人| 十八禁人妻一区二区| 午夜免费成人在线视频| 成年免费大片在线观看| 精品国产三级普通话版| 亚洲av中文字字幕乱码综合| 久久6这里有精品| 国产高潮美女av| 熟女少妇亚洲综合色aaa.| www.999成人在线观看| 又黄又粗又硬又大视频| www.www免费av| 日韩欧美国产一区二区入口| 亚洲不卡免费看| 亚洲精品国产精品久久久不卡| 欧美日韩瑟瑟在线播放| 美女cb高潮喷水在线观看| 国产午夜精品久久久久久一区二区三区 | 俺也久久电影网| 好男人电影高清在线观看| 国产精品 欧美亚洲| 国产亚洲欧美在线一区二区| 国产精品1区2区在线观看.| 国产美女午夜福利| 国产蜜桃级精品一区二区三区| 少妇的逼水好多| 亚洲国产精品成人综合色| 伊人久久大香线蕉亚洲五| 亚洲精品乱码久久久v下载方式 | 又黄又粗又硬又大视频|