登录 注册
登录 注册

Modified Chaotic Hénon Map-Based Text Information Encryption and Hiding Mechanism Using Bottlenose Dolphin Vocalizations.

🔗 访问原文
🔗 Access Paper

📝 摘要
Abstract

As ocean resources are further developed and utilized, bionic covert underwater acoustic communication (CUAC) is increasingly important for military and underwater telemetry applications. The primary purpose of this study was to design a highly secure and undetectable text information (TI) encryption mechanism to realize CUAC using real bottlenose dolphin vocalizations (BDVs). For this purpose, a chaotic encryption scheme, spread spectrum (SS) technology, and a modified chaotic Hénon map (MCHM) were integrated into a TI encryption and hiding (EH) mechanism. Four BDVs and four test TIs were employed to demonstrate the performance of the proposed MCHM-based TI EH mechanism (MCHMTIEHM). The simulation results show that the MCHMTIEHM yields more accurate de-hiding and decryption results. When the correct encryption and decryption parameters were used, the test TI was completely recovered and could be recognized by humans. When the MCHM encryption and decryption parameters SPx and nI were not identical, tests involving TI01, TI02, TI03, and TI04 demonstrated correct de-hiding and error decryption performance; in particular, the test TI had superior correct de-hiding and error decryption results, was unrecoverable, and could not be recognized by the human eye. The modified amplitude correlation coefficient (ACC) and modified unified average amplitude change intensity (UACI) metrics were used to evaluate the hiding performance of MCHM-based encryption of TI using BDVs. The simulation results show that the average modified ACC and average UACI were 0.99995924 and 3.84×10-6, respectively. Performance was evaluated in terms of the average number of changing SS bit rates (NCSSBRs), the average number of changing bit rates (NCBRs), and the average number of changing character rates (NCCRs) for correct de-hiding and correct/erroneous TI decryption. The average NCSSBRs, NCBRs, and NCCRs were all 0% in correct de-hiding and decryption scenarios, while they were 49.29%, 47.65%, and 98.10%, respectively. with correct de-hiding and error-decryption scenarios. In summary, the proposed MCHMTIEHM yields superior encryption and hiding performance.

🏷️ 关键词
Keywords

📊 文章统计
Article Statistics

基础数据
Basic Stats

23 浏览
Views
0 下载
Downloads
6 引用
Citations

引用趋势
Citation Trend

阅读国家分布
Country Distribution

阅读机构分布
Institution Distribution

月度浏览趋势
Monthly Views

相关关键词
Related Keywords

影响因子分析
Impact Analysis

0.00 综合评分
Overall Score
引用影响力
Citation Impact
浏览热度
View Popularity
下载频次
Download Frequency

📄 相关文章
Related Articles

🌊