2003
DOI: 10.1142/s0218127403007072
|View full text |Cite
|
Sign up to set email alerts
|

Observer Based Chaotic Message Transmission

Abstract: We consider observer based synchronization of continuous-time chaotic systems. We present two message transmission schemes for such systems. The first one is based on chaotic masking and modulation, and the second one is based on only chaotic modulation. We show that in these schemes, the message may be recovered under certain conditions. We show that the proposed schemes are robust with respect to noise and parameter mismatch. We also present some simulation results.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

1
17
0

Year Published

2005
2005
2012
2012

Publication Types

Select...
6
3

Relationship

0
9

Authors

Journals

citations
Cited by 23 publications
(18 citation statements)
references
References 21 publications
1
17
0
Order By: Relevance
“…This can be done by using any techniques existing in the literature [3,4,7,8]. The signals and are used to generate an estimate of the encrypted signal .…”
Section: The Proposed Communication Systemmentioning
confidence: 99%
“…This can be done by using any techniques existing in the literature [3,4,7,8]. The signals and are used to generate an estimate of the encrypted signal .…”
Section: The Proposed Communication Systemmentioning
confidence: 99%
“…This can be done by using any techniques existing in the literature (Nijmeijer and Mareels, 1997, Morgul et al, 2003, L'Hernault et al, 2008. The signals 1 (t) and y' t (t) are used to generate an estimate (m(t)) of the encrypted signal e(m(t)).…”
Section: Proposed Techniquementioning
confidence: 99%
“…In recent years, there has been a growing interest in the derivation of secure communication schemes using chaotic oscillators [1][2][3][4][5][6]. In effect, various chaotic synchronization methods have been proposed [3-5, 7, 8] together with a number of modulation methods for chaotic communication systems such as chaotic masking [1,5], parameter modulation techniques [5], chaotic shift keying [2,5], just to mention a few.…”
Section: Introductionmentioning
confidence: 99%