2010 2nd IEEE InternationalConference on Network Infrastructure and Digital Content 2010
DOI: 10.1109/icnidc.2010.5657885
|View full text |Cite
|
Sign up to set email alerts
|

Chaos synchronization based on observer and its application in speech secure communication

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3

Citation Types

0
3
0

Year Published

2010
2010
2015
2015

Publication Types

Select...
3
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(3 citation statements)
references
References 4 publications
0
3
0
Order By: Relevance
“…Almost all the scholars are trying to apply it in the secure communication and cryptography field with the chaotic control or synchronization [1][2][3]. In the information subject, chaos can be divided into two categories: one is the chaotic secure communication system with chaotic synchronization as the technical core [4][5][6], the other one is to construct a new digital chaotic encryption algorithm using X.-Y. Wang ( ) · L. Yang · R. Liu · A. Kadir Faculty of Electronic Information and Electrical Engineering, Dalian University of Technology, Dalian 116024, China e-mail: wangxy@dlut.edu.cn a chaotic system based on the computer finite precision technology [7][8][9][10][11].…”
Section: Introductionmentioning
confidence: 99%
“…Almost all the scholars are trying to apply it in the secure communication and cryptography field with the chaotic control or synchronization [1][2][3]. In the information subject, chaos can be divided into two categories: one is the chaotic secure communication system with chaotic synchronization as the technical core [4][5][6], the other one is to construct a new digital chaotic encryption algorithm using X.-Y. Wang ( ) · L. Yang · R. Liu · A. Kadir Faculty of Electronic Information and Electrical Engineering, Dalian University of Technology, Dalian 116024, China e-mail: wangxy@dlut.edu.cn a chaotic system based on the computer finite precision technology [7][8][9][10][11].…”
Section: Introductionmentioning
confidence: 99%
“…Yang, Zhu [15], Pisarchik and Ruiz-Oliveras [16], Al-Hussaibi [17], and Zhao [18] have presented secure communication for different areas. Further, the synchronized chaotic systems have been used in many secure communications applications [19][20][21][22][23]. Kocamaz and Uyaroglu have proposed non-identical synchronization, anti-synchronization and control of chaotic single-machine infinite-bus power system via active control method [24].…”
Section: Introductionmentioning
confidence: 99%
“…Since then, many methods have been applied to chaos control and chaos synchronization such as sliding mode control [5], adaptive control [1]- [3], [12], state feedback control [4], [9]. Recently, more and more scientists are interested in a finite time stability because this is the key issue in the deployment of real applications.…”
Section: Introductionmentioning
confidence: 99%