M. Feki, G. Gelle, M. Colas, B. Robert, G. Delaunay
{"title":"安全的数字通信使用混沌调制与反馈","authors":"M. Feki, G. Gelle, M. Colas, B. Robert, G. Delaunay","doi":"10.1109/ISSPA.2003.1224891","DOIUrl":null,"url":null,"abstract":"In this note we propose a new chaotic modulation schema with output feedback. It is shown that the receiver can synchronize with the transmitter with any desired rate. Moreover, this approach can be applied to a large class of chaotic systems and provides higher security against an intruder. The robustness of our scheme with respect to noise is illustrated and compared, to the symmetric chaos shift keying method.","PeriodicalId":264814,"journal":{"name":"Seventh International Symposium on Signal Processing and Its Applications, 2003. Proceedings.","volume":"1083 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2003-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":"{\"title\":\"Secure digital communication using chaotic modulation with feedback\",\"authors\":\"M. Feki, G. Gelle, M. Colas, B. Robert, G. Delaunay\",\"doi\":\"10.1109/ISSPA.2003.1224891\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"In this note we propose a new chaotic modulation schema with output feedback. It is shown that the receiver can synchronize with the transmitter with any desired rate. Moreover, this approach can be applied to a large class of chaotic systems and provides higher security against an intruder. The robustness of our scheme with respect to noise is illustrated and compared, to the symmetric chaos shift keying method.\",\"PeriodicalId\":264814,\"journal\":{\"name\":\"Seventh International Symposium on Signal Processing and Its Applications, 2003. Proceedings.\",\"volume\":\"1083 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2003-07-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"3\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Seventh International Symposium on Signal Processing and Its Applications, 2003. Proceedings.\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ISSPA.2003.1224891\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Seventh International Symposium on Signal Processing and Its Applications, 2003. Proceedings.","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ISSPA.2003.1224891","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Secure digital communication using chaotic modulation with feedback
In this note we propose a new chaotic modulation schema with output feedback. It is shown that the receiver can synchronize with the transmitter with any desired rate. Moreover, this approach can be applied to a large class of chaotic systems and provides higher security against an intruder. The robustness of our scheme with respect to noise is illustrated and compared, to the symmetric chaos shift keying method.