{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,30]],"date-time":"2025-07-30T14:57:47Z","timestamp":1753887467249,"version":"3.41.2"},"reference-count":46,"publisher":"Wiley","issue":"1","license":[{"start":{"date-parts":[[2019,12,22]],"date-time":"2019-12-22T00:00:00Z","timestamp":1576972800000},"content-version":"vor","delay-in-days":355,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61571181"],"award-info":[{"award-number":["61571181"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["onlinelibrary.wiley.com"],"crossmark-restriction":true},"short-container-title":["Complexity"],"published-print":{"date-parts":[[2019,1]]},"abstract":"<jats:p>When chaotic systems are realized in digital circuits, their chaotic behavior will degenerate into short periodic behavior. Short periodic behavior brings hidden dangers to the application of digitized chaotic systems. In this paper, an approach based on the introduction of additional parameters to counteract the short periodic behavior of digitized chaotic time series is discussed. We analyze the ways that perturbation sources are introduced in parameters and variables and prove that the period of digitized chaotic time series generated by a digitized logistic map is improved efficiently. Furthermore, experimental implementation shows that the digitized chaotic time series has great complexity, approximate entropy, and randomness, and the perturbed digitized logistic map can be used as a secure pseudorandom sequence generator for information encryption.<\/jats:p>","DOI":"10.1155\/2019\/5942121","type":"journal-article","created":{"date-parts":[[2019,12,22]],"date-time":"2019-12-22T23:30:24Z","timestamp":1577057424000},"update-policy":"https:\/\/doi.org\/10.1002\/crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Constructing Digitized Chaotic Time Series with a Guaranteed Enhanced Period"],"prefix":"10.1155","volume":"2019","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-9720-6563","authenticated-orcid":false,"given":"Chuanfu","family":"Wang","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5520-6001","authenticated-orcid":false,"given":"Qun","family":"Ding","sequence":"additional","affiliation":[]}],"member":"311","published-online":{"date-parts":[[2019,12,22]]},"reference":[{"key":"e_1_2_10_1_2","first-page":"11","article-title":"New directions in communications","volume":"13","author":"Turner J. S.","year":"1995","journal-title":"IEEE Journal on Selected Areas in Communication"},{"key":"e_1_2_10_2_2","doi-asserted-by":"publisher","DOI":"10.1142\/s0218127412501258"},{"key":"e_1_2_10_3_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2010.11.009"},{"key":"e_1_2_10_4_2","doi-asserted-by":"publisher","DOI":"10.1109\/tim.2011.2179330"},{"key":"e_1_2_10_5_2","doi-asserted-by":"publisher","DOI":"10.7498\/aps.66.020504"},{"key":"e_1_2_10_6_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.chaos.2003.12.022"},{"key":"e_1_2_10_7_2","doi-asserted-by":"publisher","DOI":"10.1142\/s0218127418500840"},{"key":"e_1_2_10_8_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2018.03.055"},{"key":"e_1_2_10_9_2","doi-asserted-by":"publisher","DOI":"10.1007\/s11071-018-4440-6"},{"key":"e_1_2_10_10_2","doi-asserted-by":"publisher","DOI":"10.1142\/s021812749800098x"},{"key":"e_1_2_10_11_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2015.10.027"},{"key":"e_1_2_10_12_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2014.11.018"},{"key":"e_1_2_10_13_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2014.02.156"},{"key":"e_1_2_10_14_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.sigpro.2018.06.008"},{"key":"e_1_2_10_15_2","doi-asserted-by":"publisher","DOI":"10.1109\/tifs.2018.2812080"},{"key":"e_1_2_10_16_2","doi-asserted-by":"publisher","DOI":"10.1109\/31.76495"},{"key":"e_1_2_10_17_2","doi-asserted-by":"publisher","DOI":"10.1080\/0161-119191865821"},{"key":"e_1_2_10_18_2","doi-asserted-by":"publisher","DOI":"10.1109\/tcsi.2016.2515398"},{"key":"e_1_2_10_19_2","doi-asserted-by":"publisher","DOI":"10.1109\/tcsvt.2014.2369711"},{"key":"e_1_2_10_20_2","doi-asserted-by":"publisher","DOI":"10.1109\/tcomm.1994.582834."},{"key":"e_1_2_10_21_2","doi-asserted-by":"publisher","DOI":"10.1109\/tcyb.2014.2363168"},{"key":"e_1_2_10_22_2","doi-asserted-by":"publisher","DOI":"10.1142\/s0218127417501036"},{"key":"e_1_2_10_23_2","doi-asserted-by":"publisher","DOI":"10.1109\/tcsi.2014.2336512"},{"key":"e_1_2_10_24_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.cnsns.2013.10.031"},{"key":"e_1_2_10_25_2","doi-asserted-by":"publisher","DOI":"10.1142\/s021812741750033x"},{"key":"e_1_2_10_26_2","doi-asserted-by":"publisher","DOI":"10.1038\/261459a0"},{"key":"e_1_2_10_27_2","doi-asserted-by":"publisher","DOI":"10.1175\/1520-0469(1963)020<0130:dnf>2.0.co;2"},{"key":"e_1_2_10_28_2","doi-asserted-by":"publisher","DOI":"10.1007\/s11432-015-0756-1"},{"key":"e_1_2_10_29_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.sigpro.2018.07.011"},{"key":"e_1_2_10_30_2","doi-asserted-by":"publisher","DOI":"10.1140\/epjp\/i2019-12374-y"},{"key":"e_1_2_10_31_2","doi-asserted-by":"publisher","DOI":"10.1142\/s0218127418500591"},{"key":"e_1_2_10_32_2","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-019-7602-8"},{"key":"e_1_2_10_33_2","doi-asserted-by":"publisher","DOI":"10.1109\/tcsi.2018.2888688"},{"volume-title":"Stream Ciphers","year":"2013","author":"Andreas K.","key":"e_1_2_10_34_2"},{"key":"e_1_2_10_35_2","doi-asserted-by":"publisher","DOI":"10.1109\/tit.1987.1057268"},{"volume-title":"Cryptographic Boolean Functions and Applications","year":"2009","author":"Cusick T. W.","key":"e_1_2_10_36_2"},{"volume-title":"Computational Complexity: A Modern Approach","year":"2015","author":"Arora S.","key":"e_1_2_10_37_2"},{"key":"e_1_2_10_38_2","doi-asserted-by":"crossref","unstructured":"YaoA. Theory and applications of trapdoor functions IEEE 23rd Annual Symposium on Foundations of Computer Science 1982 80\u201391.","DOI":"10.1109\/SFCS.1982.45"},{"key":"e_1_2_10_39_2","doi-asserted-by":"publisher","DOI":"10.1007\/BFb0091534"},{"key":"e_1_2_10_40_2","unstructured":"RukhinA. SotoJ. NechvatalJ. SmidM. BarkerE. LeighS. LevensonM. VangelM. BanksD. HeckertA. DrayJ. andVoS. A statistical test suite for random and pseudorandom number generators for cryptographic applications 2010 NIST special publication 800\u201322 Rev. 1-a National Institute of Standards and Technology Gaithersburg MD USA."},{"key":"e_1_2_10_41_2","doi-asserted-by":"publisher","DOI":"10.1073\/pnas.88.6.2297"},{"key":"e_1_2_10_42_2","doi-asserted-by":"publisher","DOI":"10.3390\/e20050322"},{"key":"e_1_2_10_43_2","doi-asserted-by":"publisher","DOI":"10.3390\/e20020086"},{"key":"e_1_2_10_44_2","doi-asserted-by":"publisher","DOI":"10.1137\/s0097539793244708"},{"key":"e_1_2_10_45_2","doi-asserted-by":"publisher","DOI":"10.1137\/0215025"},{"key":"e_1_2_10_46_2","doi-asserted-by":"publisher","DOI":"10.1142\/s0218127406015970"}],"container-title":["Complexity"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/downloads.hindawi.com\/journals\/complexity\/2019\/5942121.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/complexity\/2019\/5942121.xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1155\/2019\/5942121","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,8,7]],"date-time":"2024-08-07T11:59:22Z","timestamp":1723031962000},"score":1,"resource":{"primary":{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/10.1155\/2019\/5942121"}},"subtitle":[],"editor":[{"given":"Quanmin","family":"Zhu","sequence":"additional","affiliation":[]}],"short-title":[],"issued":{"date-parts":[[2019,1]]},"references-count":46,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2019,1]]}},"alternative-id":["10.1155\/2019\/5942121"],"URL":"https:\/\/doi.org\/10.1155\/2019\/5942121","archive":["Portico"],"relation":{},"ISSN":["1076-2787","1099-0526"],"issn-type":[{"type":"print","value":"1076-2787"},{"type":"electronic","value":"1099-0526"}],"subject":[],"published":{"date-parts":[[2019,1]]},"assertion":[{"value":"2019-04-23","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2019-07-03","order":2,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2019-12-22","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}],"article-number":"5942121"}}