AN IMPROVED CHAOTIC MASKING SCHEME VIA SYSTEM-ALTERNATING

2013 ◽  
Vol 27 (31) ◽  
pp. 1350201
Author(s):  
XING-YUAN WANG ◽  
BING XU ◽  
YUTIAN MA

Aiming at the drawbacks of the chaotic masking scheme, this paper optimizes this conventional scheme by using improved state observer method and system-alternating method, proposes a new secure communication scheme which can improve these drawbacks of chaotic method: (1) Restriction that the power of useful signal must be smaller than that of chaotic signal. (2) Low security. In addition, the model of this whole communication system is constructed under the system simulation environment of Simulink.

2015 ◽  
Vol 2015 ◽  
pp. 1-7 ◽  
Author(s):  
Wei-Der Chang ◽  
Shun-Peng Shih ◽  
Chih-Yung Chen

This paper develops a new digital communication scheme based on using a unified chaotic system and an adaptive state observer. The proposed communication system basically consists of five important elements: signal modulation, chaotic encryption, adaptive state observer, chaotic decryption, and signal demodulation. A sequence of digital signals will be delivered from the transmitter to the receiver through a public channel. It is rather reasonable that if the number of signals delivered on the public channel is fewer, then the security of such communication system is more guaranteed. Therefore, in order to achieve this purpose, a state observer will be designed and its function is to estimate full system states only by using the system output signals. In this way, the signals delivered on the public channel can be reduced mostly. According to these estimated state signals, the original digital sequences are then retrieved completely. Finally, experiment results are provided to verify the applicability of the proposed communication system.


2015 ◽  
Vol 25 (10) ◽  
pp. 1550134 ◽  
Author(s):  
A. S. Karavaev ◽  
D. D. Kulminskiy ◽  
V. I. Ponomarenko ◽  
M. D. Prokhorov

We develop an experimental secure communication system with chaotic switching. The proposed scheme is based on time-delayed feedback oscillator with switching of chaotic regimes. The scheme shows high tolerance to external noise and amplitude distortions of the signal in a communication channel.


2004 ◽  
Vol 14 (04) ◽  
pp. 1467-1476 ◽  
Author(s):  
YOUSEF AL-ASSAF ◽  
WAJDI M. AHMAD

This paper addresses the problem of reconstructing a slowly-varying information-bearing signal from a parametrically modulated, nonstationary dynamical signal. A chaotic electronic oscillator model characterized by one control parameter and a double-scroll-like attractor is used throughout the study. Wavelet transforms are used to extract features of the chaotic signal resulting from parametric modulation of the control parameter by the useful signal. The vector of feature coefficients is fed into a feed-forward neural network that recovers the embedded information-bearing signal. The performance of the developed method is cross-validated through reconstruction of randomly-generated control parameter patterns. This method is applied to the reconstruction of speech signals, thus demonstrating its potential utility for secure communication applications. Our results are validated via numerical simulations.


2013 ◽  
Vol 68 (8-9) ◽  
pp. 573-580 ◽  
Author(s):  
Xing-Yuan Wang ◽  
Hao Zhang

This paper deals with the synchronization of spatiotemporal chaotic systems and presents a new robust secondary chaotic secure communication system for digital signal transmissions which can recover digital signal even though the transmitted signal is influenced by limited noise. The transmitter terminal and the receiver terminal both contain a spatiotemporal chaotic system and a hyperchaotic system. The asymptotic convergence of the errors between the states of the transmitter terminal and the receiver terminal has been proved based on the Lyapunov stable theory and active-passive decomposition (APD) method. Moreover, a random digital signal and a binary Lena image are encrypted and decrypted successfully to verify the efficiency of the proposed robust secure communication system.


2005 ◽  
Vol 15 (02) ◽  
pp. 605-616 ◽  
Author(s):  
SHUH-CHUAN TSAY ◽  
CHUAN-KUEI HUANG ◽  
WAN-TAI CHEN ◽  
YU-REN WU

In this paper, a scheme of a bidirectional hyperchaotic communication system is proposed. The hyperchaotic communication system including the transmitter and the receiver is composed of a pair of Chua circuit with coupling characteristics respectively. From the viewpoint of communication security, directly adopting the bidirectional communication system would provide a so-called "theoretical security". This is caused by the coupling relationship between the transmitter and the receiver. With the technique of frequency spectrum, the theoretical security of bidirectional communication systems can be proven. In other words, even if an intruder knows the parameter values of the system, he could not steal information from the system. As a result, it is not necessary for us to use the additional encryption. On the other hand, to achieve the synchronization of bidirectional communications, the method which applies a suitable Lyapunov function and the property of positive definite of a matrix is proposed to design the feedback controllers. Therefore, the message masked by chaotic signal from the transmitter can be perfectly recovered in the receiver. Finally, the simulation results can verify that the proposed method and the scheme of the bidirectional communication are favorable.


2011 ◽  
Vol 467-469 ◽  
pp. 437-440 ◽  
Author(s):  
Shao Cheng Qu ◽  
Di Liu ◽  
Li Wang

Synchronization of hyper-chaotic Lorenz system and its application in secure communication is studied. Based on the Lyapunov stability, an active nonlinear controller is presented to achieve synchronization of the drive system and the response system. By the conversion functions, the useful signal is modulated into the drive system, and then a secure communication based on hyper-chaotic masking is derived, which can quickly recover the useful signal from the receiver system. Simulation results illustrate the effectiveness of the proposed method.


1990 ◽  
Author(s):  
Hamed Parsiani ◽  
Jorge Cruz-Emeric

Sign in / Sign up

Export Citation Format

Share Document