{"title":"基于混沌相移键控方案的保密通信系统操作研究","authors":"G. S. Sandhu, S. Berber","doi":"10.1109/ICITA.2005.164","DOIUrl":null,"url":null,"abstract":"This paper presents the results of the investigation of a chaotic multi-user modulation method, called chaotic phase shift keying. Only one chaotic sequence generator exists in each transmitter and receiver. We present the theory behind their operations, as well as the bit error rate derivation. It was found to have better performances, confirmed by analytical and simulation results, than the chaotic shift keying (CSK) system, which requires two chaotic sequence generators in each transmitter and receiver.","PeriodicalId":371528,"journal":{"name":"Third International Conference on Information Technology and Applications (ICITA'05)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2005-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"31","resultStr":"{\"title\":\"Investigation on operations of a secure communication system based on the chaotic phase shift keying scheme\",\"authors\":\"G. S. Sandhu, S. Berber\",\"doi\":\"10.1109/ICITA.2005.164\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"This paper presents the results of the investigation of a chaotic multi-user modulation method, called chaotic phase shift keying. Only one chaotic sequence generator exists in each transmitter and receiver. We present the theory behind their operations, as well as the bit error rate derivation. It was found to have better performances, confirmed by analytical and simulation results, than the chaotic shift keying (CSK) system, which requires two chaotic sequence generators in each transmitter and receiver.\",\"PeriodicalId\":371528,\"journal\":{\"name\":\"Third International Conference on Information Technology and Applications (ICITA'05)\",\"volume\":\"28 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2005-07-04\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"31\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Third International Conference on Information Technology and Applications (ICITA'05)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICITA.2005.164\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Third International Conference on Information Technology and Applications (ICITA'05)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICITA.2005.164","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Investigation on operations of a secure communication system based on the chaotic phase shift keying scheme
This paper presents the results of the investigation of a chaotic multi-user modulation method, called chaotic phase shift keying. Only one chaotic sequence generator exists in each transmitter and receiver. We present the theory behind their operations, as well as the bit error rate derivation. It was found to have better performances, confirmed by analytical and simulation results, than the chaotic shift keying (CSK) system, which requires two chaotic sequence generators in each transmitter and receiver.