Chaotic Secure Communication
Home > Computing and Information Technology > Computer networking and communications > Network security > Chaotic Secure Communication: Principles and Technologies
Chaotic Secure Communication: Principles and Technologies

Chaotic Secure Communication: Principles and Technologies


     0     
5
4
3
2
1



Out of Stock


Notify me when this book is in stock
X
About the Book

The monograph begins with a systematic introduction of chaos and chaos synchronization, and then extends to the methodologies and technologies in secure communication system design and implementation. The author combines theoretical frameworks with empirical studies, making the book a pratical reference for both academics and industrial engineers.

Table of Contents:
Table of content: Preface Chapter 1 Introduction 1.1 Linear, nonlinear and chaos 1.2 History of chaos research 1.3 Important scientists and interesting stories during the development of chaos 1.4 Definition and characteristics of chaos 1.5 Review on the research of chaotic synchronization method 1.5.1 Existing synchronization methods and its characteristics 1.5.2 Other synchronization methods and problems 1.6 Review on the study of chaotic secure communication 1.6.1 Chaotic analogy communication 1.6.2 Chaotic digital communication 1.6.3 Encryption communication based on chaotic sequence 1.7 Chaos research methods and the main research contents Chapter 2 Chaos performances analysis approach for nonlinear system 2.1Phase trajectory (phase) graph analysis method 2.2 Power spectrum analysis method 2.3 Poincaré section method 2.4 Lyapunov characteristics exponent method 2.4.1 Definition of Lyapunov characteristic exponent 2.4.2 Lyapunov characteristics spectrum 2.4.3 Physical meaning of Lyapunov characteristics spectrum 2.4.4 Condition Lyapunov characteristics exponent 2.5 Fractal dimension analysis method 2.6 0-1 test method 2.6.1 0-1 test algorithm 2.6.2 Modified 0-1 test algorithm 2.6.3 Application of 0-1 test method 2.7 Frequency divider sampling method????? 2.8 Pseudo phase space method 2.9 Complexity measure method 2.9.1 Spectral entropy complexity algorithm 2.9.2 C0 complexity algorithm Chapter 3 Typical chaotic system 3.1 Discrete chaotic system 3.1.1 Logistic map 3.1.2 Tent map 3.1.3 Hénon map 3.1.4 TD-ERCS map 3.2 Continuous chaotic system 3.2.1 Duffing oscillator 3.2.2 van der Pol oscillator 3.2.3 Lorenz chaotic system 3.2.4 Rössler chaotic system 3.2.5 Chua's circuit system 3.2.6 Chen chaotic system 3.2.7 Lü chaotic system 3.2.8 Unified chaotic system 3.2.9 Simplified Lorenz chaotic system 3.2.10 Proposed standard for new chaotic system 3.3 Hyperchaotic system 3.3.1 Rössler hyperchaotic system 3.3.2 Chen hyperchaotic system Chapter 4 Synchronization principle and method of chaotic system 4.1 Definition of chaos synchronization 4.2 Performance index of chaos synchronization system 4.3 Principle and performance of feedback control synchronization 4.3.1 Multi-variables driving feedback control synchronization between continuous chaotic system 4.3.2 Linear and nonlinear feedback control synchronization for discrete chaotic system 4.4 Adaptive parameter synchronization control based on Pecora-Carroll synchronization criterion 4.4.1 Principle of adaptive parameter synchronization 4.4.2 Choice of control law and control parameter 4.4.3 Determine of the control constant boundary and scope 4.4.4 Synchronization simulation and results discussion 4.5 Adaptive synchronization based on Lyapunov stability theory 4.5.1 Adaptive synchronization control for chaos system with known parameter 4.5.2 Adaptive synchronization control for chaos system with unknown parameter 4.6 Intermittent feedback synchronization 4.6.1 Intermittent feedback synchronization control between different chaos systems 4.6.2 Synchronization simulation and performance analysis 4.7 Chaos synchronization control based on states observer 4.7.1 Design principle of states observer 4.7.2 Design of states observer for unified chaotic system 4.7.3 Simulation and results discussion 4.8 Chaos observer synchronization 4.8.1 Design principle of chaos observer 4.8.2 Design of chaos observer for unified chaotic system 4.8.3 Synchronization simulation and performance analysis 4.9 Projective synchronization 4.9.1 Principle and simulation of scale projective synchronization 4.9.2 Principle and simulation of function projective synchronization 4.9.3 Principle and simulation of adaptive function projective synchronization 4.10 Problems and hot topic about chaos synchronization Chapter 5 Secure communication technology based on chaos synchronization 5.1 Chaos masking communication 5.2 Chaos shift keying communication 5.2.1 COOK 5.2.2 CSK 5.2.3 DCSK 5.2.4 FM-DCSK 5.2.5 QCSK 5.3 Chaos parameter modulation 5.4 Chaotic spread spectrum communication 5.4.1 Principle of chaotic direct sequence spread spectrum 5.4.2 Chaotic spread spectrum code 5.4.3 Multi user chaotic spread spectrum simulation module 5.4.4 Design and simulation of multi user chaotic spread spectrum system based on Rake receiver 5.4.5 Performance analysis of multi user chaotic spread spectrum system based on Rake receiver Chapter 6 Information encryption technology based on chaotic sequence 6.1 Chaotic cryptography 6.1.1Tradtional cryptosystem 6.1.2 Relationship between chaotic cryptography and traditional cryptography 6.1.3 Principle of chaotic sequence encryption 6.2 Digital encryption algorithm based on chaotic sequence 6.2.1 Basic requirement for chaotic encryption algorithm 6.2.2 Logistic map system and its statistical characteristics 6.2.3 Chaotic sequence encryption module and algorithm 6.2.4 Implementation of data encryption algorithm 6.2.5 System debugging and performance analysis 6.3 Two value watermark image encryption algorithm based on chaotic map 6.3.1 Improvement of chaotic pseudo random sequence generator 6.3.2 Two value watermark image encryption algorithm based on TD-ERCS 6.3.3 Performance analysis of encryption algorithm 6.4 Color image watermarking algorithm based on chaotic map and wavelet transform 6.4.1 Wavelet transform algorithm and its application 6.4.2 Watermark embedding and extraction algorithm 6.4.3 Simulation and performance analysis 6.5 Chaotic image encryption algorithm 6.5.1 Chaotic image encryption technology 6.5.2 New Scheme of chaotic image encryption Chapter 7 Audio and video of chaotic encryption communication technology 7.1 Real time voice encryption communication principle 7.1.1 Principle of digital encryption communication system 7.1.2 Real time voice encryption communication system 7.1.3 Cipher synchronization technology 7.2 Real time data stream encryption algorithm 7.2.1 3DES encryption algorithm 7.2.2 3DES encryption algorithm combined with chaotic map 7.2.3 Network synchronization method 7.2.4 Security performance analysis of real time voice encryption communication 7.3 Implementation of real time voice encryption communication 7.3.1 Framework of real time voice encryption communication system 7.3.2 Real time transport protocol and its data structure 7.3.3 RTP protocol realization based on adaptive communication environment 7.3.4 Debugging and performance testing 7.4 MPEG video encryption algorithm based on chaotic sequence 7.4.1 Design principle of chaotic encryption system 7.4.2 MPEG video encryption principle and step 7.4.3 Design of stream cipher based on chaos 7.4.4 Design of scrambling algorithm based on chaos 7.4.5 Encryption experiment and effect analysis 7.4.6 Performance analysis of MPEG video encryption system 7.5 H.264 video encryption algorithm based on chaos 7.5.1 Design of chaotic stream cipher based on TD-ERCS 7.5.2 H.264 video encryption scheme 7.5.3 Performance analysis of video encryption Chapter 8 Analysis and simulation of fractional-order chaotic system 8.1 Research status of fractional-order chaotic system 8.2 Definition of fractional calculus and its physical meaning 8.3 Approximate method of fractional-order chaotic system 8.3.1 Approximate method in frequency domain 8.3.2 Approximate method in time domain 8.4 Simulation method for fractional-order system 8.4.1 Dynamic simulation method 8.4.2 Circuit simulation method 8.4.3 Numerical Simulation method 8.4.4 Comparison among simulation methods 8.5 Dynamics of fractional-order unified chaotic system based on frequency method 8.5.1 Module of fractional-order unified chaotic system 8.5.2 Dynamic simulation of fractional-order unified chaotic system 8.5.3 Dynamics of fractional-order unified chaotic system with fixed parameter 8.5.4 Dynamics of fractional-order unified chaotic system with changed parameter 8.6 Dynamics of fractional-order diffusionless Lorenz system based on time method 8.6.1 Module of 8.6.2 Chaos characteristic of fractional-order diffusionless Lorenz system 8.6.3 Bifurcation analysis with different control parameter R 8.6.4 Bifurcation analysis with different fractional order 8.6.5 Bifurcation characteristics with different fractional order equation Chapter 9 Simulation and implementation of chaotic system 9.1 Dynamic simulation for chaotic system 9.1.1 Steps of dynamics simulation on Simulink 9.1.2 Results analysis and its performance improvment 9.2 Circuit simulation for chaotic system 9.3 Chaotic analog circuit design 9.3.1 Design steps for chaotic analogy circuit 9.3.2 Chaotic analogy circuit modular design 9.3.3 Basic composition and component selection of chaotic circuit 9.4 Improved modular design of chaotic circuit 9.4.1 Design of multi scroll Jerk circuit based on OA component 9.4.2 Design of multi scroll Jerk circuit based on CC component 9.5 Design and implementation of DSP chaotic system 9.5.1 Experimental platform of DSP chaotic system 9.5.2 DSP implementation of integer-order chaotic system 9.5.3 DSP implementation of fractional-order chaotic system Appendix: Matlab source program for chaotic characteristics analysis

About the Author :
Kehui Sun, Central South University, Changsha, China


Best Sellers


Product Details
  • ISBN-13: 9783110433265
  • Publisher: De Gruyter
  • Publisher Imprint: de Gruyter
  • Language: English
  • Sub Title: Principles and Technologies
  • ISBN-10: 3110433265
  • Publisher Date: 26 Sep 2016
  • Binding: Digital (delivered electronically)
  • No of Pages: 346


Similar Products

Add Photo
Add Photo

Customer Reviews

REVIEWS      0     
Click Here To Be The First to Review this Product
Chaotic Secure Communication: Principles and Technologies
De Gruyter -
Chaotic Secure Communication: Principles and Technologies
Writing guidlines
We want to publish your review, so please:
  • keep your review on the product. Review's that defame author's character will be rejected.
  • Keep your review focused on the product.
  • Avoid writing about customer service. contact us instead if you have issue requiring immediate attention.
  • Refrain from mentioning competitors or the specific price you paid for the product.
  • Do not include any personally identifiable information, such as full names.

Chaotic Secure Communication: Principles and Technologies

Required fields are marked with *

Review Title*
Review
    Add Photo Add up to 6 photos
    Would you recommend this product to a friend?
    Tag this Book Read more
    Does your review contain spoilers?
    What type of reader best describes you?
    I agree to the terms & conditions
    You may receive emails regarding this submission. Any emails will include the ability to opt-out of future communications.

    CUSTOMER RATINGS AND REVIEWS AND QUESTIONS AND ANSWERS TERMS OF USE

    These Terms of Use govern your conduct associated with the Customer Ratings and Reviews and/or Questions and Answers service offered by Bookswagon (the "CRR Service").


    By submitting any content to Bookswagon, you guarantee that:
    • You are the sole author and owner of the intellectual property rights in the content;
    • All "moral rights" that you may have in such content have been voluntarily waived by you;
    • All content that you post is accurate;
    • You are at least 13 years old;
    • Use of the content you supply does not violate these Terms of Use and will not cause injury to any person or entity.
    You further agree that you may not submit any content:
    • That is known by you to be false, inaccurate or misleading;
    • That infringes any third party's copyright, patent, trademark, trade secret or other proprietary rights or rights of publicity or privacy;
    • That violates any law, statute, ordinance or regulation (including, but not limited to, those governing, consumer protection, unfair competition, anti-discrimination or false advertising);
    • That is, or may reasonably be considered to be, defamatory, libelous, hateful, racially or religiously biased or offensive, unlawfully threatening or unlawfully harassing to any individual, partnership or corporation;
    • For which you were compensated or granted any consideration by any unapproved third party;
    • That includes any information that references other websites, addresses, email addresses, contact information or phone numbers;
    • That contains any computer viruses, worms or other potentially damaging computer programs or files.
    You agree to indemnify and hold Bookswagon (and its officers, directors, agents, subsidiaries, joint ventures, employees and third-party service providers, including but not limited to Bazaarvoice, Inc.), harmless from all claims, demands, and damages (actual and consequential) of every kind and nature, known and unknown including reasonable attorneys' fees, arising out of a breach of your representations and warranties set forth above, or your violation of any law or the rights of a third party.


    For any content that you submit, you grant Bookswagon a perpetual, irrevocable, royalty-free, transferable right and license to use, copy, modify, delete in its entirety, adapt, publish, translate, create derivative works from and/or sell, transfer, and/or distribute such content and/or incorporate such content into any form, medium or technology throughout the world without compensation to you. Additionally,  Bookswagon may transfer or share any personal information that you submit with its third-party service providers, including but not limited to Bazaarvoice, Inc. in accordance with  Privacy Policy


    All content that you submit may be used at Bookswagon's sole discretion. Bookswagon reserves the right to change, condense, withhold publication, remove or delete any content on Bookswagon's website that Bookswagon deems, in its sole discretion, to violate the content guidelines or any other provision of these Terms of Use.  Bookswagon does not guarantee that you will have any recourse through Bookswagon to edit or delete any content you have submitted. Ratings and written comments are generally posted within two to four business days. However, Bookswagon reserves the right to remove or to refuse to post any submission to the extent authorized by law. You acknowledge that you, not Bookswagon, are responsible for the contents of your submission. None of the content that you submit shall be subject to any obligation of confidence on the part of Bookswagon, its agents, subsidiaries, affiliates, partners or third party service providers (including but not limited to Bazaarvoice, Inc.)and their respective directors, officers and employees.

    Accept

    New Arrivals


    Inspired by your browsing history


    Your review has been submitted!

    You've already reviewed this product!