A Kajbaf, MA Akhaee, M Sheikhan - Chaos, Solitons & Fractals, 2016 - Elsevier
In this paper, a secure communication scheme based on chaotic modulation is proposed using a reversible process and a robust controller with efficient cost and complexity to …
Recently, the synchronization between two matching chaotic systems to provide confident communication has gained a lot of interest. Continuously, there is a necessity to produce a …
A Harb, W Ahmad - Communications in Computing, 2006 - academia.edu
In this paper, synchronization of two chaotic signals is studied and analyzed. A nonlinear recursive backstepping scheme is utilized to design an appropriate control input signal that …
The secure communication through synchronization between two identic chaotic systems have recently gained a lot of interest. To implement a robust secure system based on …
JS Lin, CF Huang, TL Liao, JJ Yan - Digital Signal Processing, 2010 - Elsevier
In this paper, we study the design and implementation of digital secure communication systems via synchronized Sprott chaotic circuits. First, using the variable structure control …
This paper proposes a chaotic secure communication system between a base transmitter station and mobile equipment. To make the chaotic keys, the Chua chaotic systems are used …
S Çiçek, UE Kocamaz, Y Uyaroğlu - Iranian journal of science and …, 2019 - Springer
Chaotic systems (CS) are chosen for secure communication owing to their interesting features. So, various CS and effective synchronization methods are introduced. Sprott's jerk …
M Mitra, S Banerjee - International Journal of Modern Physics B, 2011 - World Scientific
Secure communications via chaotic synchronization is demonstrated in this literature. At first we have designed a feedback controller for chaotic synchronization utilizing the Lyapunov …
R Kharel, K Busawon… - Proceedings of the 2010 …, 2010 - ieeexplore.ieee.org
In this work, the synchronization of two indirectly coupled discrete-time chaotic systems is first demonstrated. Next, the result is then applied for presenting a secure communication …