1998
DOI: 10.1016/s0375-9601(98)00560-x
|View full text |Cite
|
Sign up to set email alerts
|

Breaking chaotic secure communication using a spectrogram

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
36
0
1

Year Published

2006
2006
2022
2022

Publication Types

Select...
4
4

Relationship

0
8

Authors

Journals

citations
Cited by 75 publications
(37 citation statements)
references
References 7 publications
0
36
0
1
Order By: Relevance
“…For instance, the spectrum of x(t) in the Lorenz System is relatively good, but that of |x(t)| has a significant peak. When the plaintext message signal is hidden in the driving signal, the narrow-band spectrum means that the driving signal may be directly filtered to recover the message signal [114,8]. On the other hand, for some parameter modulation systems the power energy of the driving signal varies according to the value of the transmitted signal.…”
Section: Case Study 822 ([27])mentioning
confidence: 99%
“…For instance, the spectrum of x(t) in the Lorenz System is relatively good, but that of |x(t)| has a significant peak. When the plaintext message signal is hidden in the driving signal, the narrow-band spectrum means that the driving signal may be directly filtered to recover the message signal [114,8]. On the other hand, for some parameter modulation systems the power energy of the driving signal varies according to the value of the transmitted signal.…”
Section: Case Study 822 ([27])mentioning
confidence: 99%
“…The system's mathematical model in [23] is described by the following nonlinear differential equations and is denoted as system (1).…”
Section: Mathematical Modelmentioning
confidence: 99%
“…In fact, adopting higher-dimensional chaotic systems has been proposed for secure communication [1][2][3], and the presence of more than one Lyapunov exponent clearly improves the security of communication schemes by generating more-complex dynamics [4,5]. Therefore, creating a hyperchaotic attractor is a theoretically very attractive and yet technically quite challenging task.…”
Section: Introductionmentioning
confidence: 99%
“…Obviously, it is hard to identify "0" and "1" from the power spectral density distribution. Through numerical simulations, the digital secure communication scheme can resist spectral attacking [29] and filtering attack [28] effectively.…”
Section: Some Tests About the Digital Secure Communication Schemementioning
confidence: 99%