Digital communications using chaos
Signal Processing - Special issue on emerging techniques for communication terminals
High-gain observer for chaotic synchronization and secure communication: Research Articles
International Journal of Communication Systems
A digital secure image communication scheme based on the chaotic Chebyshev map: Research Articles
International Journal of Communication Systems
A steganographic scheme for secure communications based on the chaos and euler Theorem
IEEE Transactions on Multimedia
Region-based image watermarking
IEEE Transactions on Image Processing
Ergodic chaotic parameter modulation with application to digital image watermarking
IEEE Transactions on Image Processing
Design and implementation of digital secure communication based on synchronized chaotic systems
Digital Signal Processing
Chaotic secure communication based on a gravitational search algorithm filter
Engineering Applications of Artificial Intelligence
A chaotic digital secure communication based on a modified gravitational search algorithm filter
Information Sciences: an International Journal
Hi-index | 0.00 |
This paper presents a novel secure communication system for digital signal transmissions. It contains four important parts: modulation, chaotic transmitter, chaotic receiver, and demodulation. The modulation mechanism is to modulate each of delivered bit information to be a carrier signal in the continuous form. Then this carrier signal is taken as a parameter of the chaotic system, called the unified chaotic system. Such a system possesses three different types of chaos characterizations depending on its system's parameter, and this guarantees the communication security more. In the public channel, only three chaotic state variables are delivered and this means that the important carrier information is efficiently screened. According to chaotic states received in the receiver terminal, the continuous carrier signal is decrypted using certain adaptation mechanisms. Finally, the proposed demodulation method can successfully recover the original bit information which is embedded in the communication systems. Some simulation results are provided to verify the efficiency of the proposed secure communication system.