• Distributed coordination algorithms (DCA) carry out information processing processes among a group of networked agents without centralized information fusion. Though it is well known that DCA characterized by an SIA (stochastic, indecomposable, aperiodic) matrix generate consensus asymptotically via synchronous iterations, the dynamics of DCA with asynchronous iterations have not been studied extensively, especially when viewed as stochastic processes. This paper aims to show that for any given irreducible stochastic matrix, even non-SIA, the corresponding DCA lead to consensus successfully via random asynchronous iterations under a wide range of conditions on the transition probability. Particularly, the transition probability is neither required to be independent and identically distributed, nor characterized by a Markov chain.
  • Recently, a chaotic image encryption algorithm based on information entropy (IEAIE) was proposed. This paper scrutinizes security properties of the algorithm and evaluates validity of the used quantifiable security metrics. Some common insecurity problems in the field of chaotic image encryption are found in IEAIE, e.g. the short orbits of digital chaotic system and invalid sensitivity mechanism built on information entropy of the plain-image. What's worse, each security metric is obviously questionable, undermining the security credibility of IEAIE. So, IEAIE can only serve as a counterexample for the secure and effective communication method for image data.
  • Chaotic dynamics is an important source for generating pseudorandom binary sequences. F. Chen, et al. precisely derived period distribution of the generalized discrete Arnold Cat map in Galois ring $\mathbb{Z}_{2^e}$ using Hensel's lifting approach (IEEE Trans. Inf. Theory, vol. 59, no. 5, pp. 3249--3255, 2013). However, the paper confused the period of point (state) with that of the whole map and overestimated impact of the work in chaos theory and cryptographic applications. This paper aims to clarify the problem by disclosing its real structure of the generalized discrete Arnold Cat map in any digital domain.
  • Synchronization phenomena are of broad interest across disciplines and increasingly of interest in a multiplex network setting. Here we show how the Master Stability Function, a celebrated framework for analyzing synchronization on a single network, can be extended to certain classes of multiplex networks with different intra-layer and inter-layer coupling functions. We derive three master stability equations that determine respectively the necessary regions of complete synchronization, intra-layer synchronization and inter-layer synchronization. We calculate these three regions explicitly for the case of a two-layer network of R{\"o}ssler oscillators and show that the overlap of the regions determines the type of synchronization achieved. In particular, if the inter- or intra-layer coupling function is such that the inter-layer or intra-layer synchronization region is empty, complete synchronization cannot be achieved regardless of the coupling strength. Furthermore, for any given nodal dynamics and network structure, the occurrence of intra-layer and inter-layer synchronization depend mainly on the coupling functions of nodes within a layer and across layers, respectively. Our mathematical analysis requires that the intra- and inter-layer supra-Laplacians commute. But we show this is only a sufficient, and not necessary, condition and that the results can be applied more generally.
  • Position scrambling (permutation) is widely used in multimedia encryption schemes and some international encryption standards, such as the Data Encryption Standard and the Advanced Encryption Standard. In this article, the authors re-evaluate the security of a typical image-scrambling encryption algorithm (ISEA). Using the internal correlation remaining in the cipher image, they disclose important visual information of the corresponding plain image in a ciphertext-only attack scenario. Furthermore, they found that the real scrambling domain--the position-scrambling scope of ISEA's scrambled elements--can be used to support an efficient known or chosen-plaintext attack on it. Detailed experimental results have verified these points and demonstrate that some advanced multimedia processing techniques can facilitate the cryptanalysis of multimedia encryption algorithms.
  • This paper discusses the letter entitled "Network analysis of the state space of discrete dynamical systems" by A. Shreim et al. [Physical Review Letters, 98, 198701 (2007)]. We found that some theoretical analyses are wrong and the proposed indicators based on two parameters of the state-mapping network cannot discriminate the dynamical complexity of the discrete dynamical systems composed of a 1-D Cellular Automata.
  • This paper proposes a chaotic map-based multicast scheme for multiuser speech wireless communication and implements it in an ARM platform. The scheme compresses the digital audio signal decoded by a sound card and then encrypts it with a three-level chaotic encryption scheme. First, the position of every bit of the compressed data is permuted randomly with a pseudo-random number sequence (PRNS) generated by a 6-D chaotic map. Then, the obtained data are further permuted in the level of byte with a PRNS generated by a 7-D chaotic map. Finally, it is operated with a multiround chaotic stream cipher. The whole system owns the following merits: the redundancy in the original audio file is reduced effectively and the corresponding unicity distance is increased; the balancing point between a high security level of the system and real-time conduction speed is achieved well. In the ARM implementation, the framework of communication of multicast-multiuser in a subnet and the Internet Group Manage Protocol is adopted to obtain the function of communication between one client and other ones. Comprehensive test results were provided to show the feasibility and security performance of the whole system.
  • Utilizing complex dynamics of chaotic maps and systems in encryption was studied comprehensively in the past two and a half decades. In 1989, Fridrich's chaotic image encryption scheme was designed by iterating chaotic position permutation and value substitution some rounds, which received intensive attention in the field of chaos-based cryptography. In 2010, Solak \textit{et al.} proposed a chosen-ciphertext attack on the Fridrich's scheme utilizing influence network between cipher-pixels and the corresponding plain-pixels. Based on their creative work, this paper scrutinized some properties of Fridrich's scheme with concise mathematical language. Then, some minor defects of the real performance of Solak's attack method were given. The work provides some bases for further optimizing attack on the Fridrich's scheme and its variants.
  • Traditionally, chaotic systems are built on the domain of infinite precision in mathematics. However, the quantization is inevitable for any digital devices, which causes dynamical degradation. To cope with this problem, many methods were proposed, such as perturbing chaotic states and cascading multiple chaotic systems. This paper aims at developing a novel methodology to design the higher-dimensional digital chaotic systems (HDDCS) in the domain of finite precision. The proposed system is based on the chaos generation strategy controlled by random sequences. It is proven to satisfy the Devaney's definition of chaos. Also, we calculate the Lyapunov exponents for HDDCS. The application of HDDCS in image encryption is demonstrated via FPGA platform. As each operation of HDDCS is executed in the same fixed precision, no quantization loss occurs. Therefore, it provides a perfect solution to the dynamical degradation of digital chaos.
  • In this paper the effects of external links on the synchronization performance of community networks, especially on the competition between individual community and the whole network, are studied in detail. The study is organized from two aspects: the number or portion of external links and the connecting strategy of external links between different communities. It is found that increasing the number of external links will enhance the global synchronizability but degrade the ynchronization performance of individual community before some critical point. After that the individual community will synchronize better and better as part of the whole network because the community structure is not so prominent. Among various connection strategies, connecting nodes belonging to different communities randomly rather than connecting nodes with larger degrees is the most efficient way to enhance global synchronization of the network. However, a preferential connection scheme linking most of the hubs from the communities will allow rather efficient global synchronization while maintaining strong dynamical clustering of the communities. Interestingly, the observations are found to be relevant in a realistic network of cat cortex. The synchronization state is just at the critical point, which shows a reasonable combination of segregated function in individual communities and coordination among them. Our work sheds light on principles underlying the emergence of modular architectures in real network systems and provides guidance for the manipulation of synchronization in community networks.
  • This brief paper further investigates the locally and globally adaptive synchronization of an uncertain complex dynamical network. Several network synchronization criteria are deduced. Especially, our hypotheses and designed adaptive controllers for network synchronization are rather simple in form. It is very useful for future practical engineering design. Moreover, numerical simulations are also given to show the effectiveness of our synchronization approaches.
  • Today, complex networks have attracted increasing attention from various fields of science and engineering. It has been demonstrated that many complex networks display various synchronization phenomena. In this paper, we introduce a time-varying complex dynamical network model. We then further investigate its synchronization phenomenon and prove several network synchronization theorems. Especially, we show that synchronization of such a time-varying dynamical network is completely determined by the inner-coupling matrix, and the eigenvalues and the corresponding eigenvectors of the coupling configuration matrix of the network.
  • This letter suggests a new way to investigate 3-D chaos in spatial and frequency domains simultaneously. After spatially decomposing the Lorenz attractor into two separate scrolls with peaked spectra and a 1-D discrete-time zero-crossing series with a wide-band spectrum, it is found that the Lorenz chaotic attractor has an inherent frequency uniquely determined by the three system parameters. This result implies that chaos in the Lorenz attractor is mainly exhibited when the trajectory crosses from one scroll to another, not within the two scrolls. This is also true for some other double-scroll Lorenz-like chaotic attractors, such as Chua's attractor. Some possible applications of the inherent frequency and the spatial decomposition are also discussed.