A chaotic masking scheme by using synchronized chaotic systems
نویسندگان
چکیده
منابع مشابه
Spread Spectrum Modulation and Signal Masking Using Synchronized Chaotic Systems
Chaotic dynamical systems are nonlinear deterministic systems which often exhibit erratic and irregular behavior. The signals that evolve in these systems are typically broadband, noise-like and similar in many respects to a stochastic process. Because of these properties chaotic signals potentially provide an important class of signals which can be utilized in various communications, radar and...
متن کاملCommunicating Using Filtered Synchronized Chaotic Signals
The principles of synchronization of chaotic systems are extended to the case where the drive signal is filtered. A feedback loop in the response system with an identical filter is used to reconstruct the original drive signal, allowing synchronization. A simple parameter switching scheme is used to send information from a drive circuit to a receiver. It is also possible to add a chaotic signal...
متن کاملWatermarking Scheme Based on Multiple Chaotic Maps
a watermarking scheme for Grayscale image isproposed based on a family of the chaotic maps and discretecosine transform. Jacobian Elliptic mapis employed to encrypt ofwatermarked logo. Piecewise nonlinear chaotic map is also usedto determine the location of DCT coefficients for the watermarkembedding. The purpose of this algorithm is to improve theshortcoming of watermarking such as small key s...
متن کاملGenerating Chaotic Stream Ciphers Using Chaotic Systems
A new scheme for generating good pseudo-random numbers, based on the composition of chaotic maps, is studied. In this method, hereafter called the chaotic stream cipher, one first uses a known chaotic dynamical system to generate a sequence of pseudo-random bytes, then applies certain permutations to them, using the discretized version of another two-dimensional chaotic map. Standard statistica...
متن کاملChaotic Encryption Scheme Using 1-D Chaotic Map
This paper proposes three different chaotic encryption methods using 1-D chaotic map known as Logistic map named as Logistic, NLFSR and Modified NLFSR according to the name of chaotic map and non-linear function involved in the scheme. The designed schemes have been crypt analyzed for five different methods for testing its strength. Cryptanalysis has been performed for various texts using vario...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Physics Letters A
سال: 1999
ISSN: 0375-9601
DOI: 10.1016/s0375-9601(98)00868-8