Han Jian-qun, Zhu Yi-sheng. A Method of Realizing Chaotic Secure Communication by Using Digital Channel[J]. Journal of Electronics & Information Technology, 2006, 28(12): 2359-2361.
Citation:
Han Jian-qun, Zhu Yi-sheng. A Method of Realizing Chaotic Secure Communication
by Using Digital Channel[J]. Journal of Electronics & Information Technology, 2006, 28(12): 2359-2361.
Han Jian-qun, Zhu Yi-sheng. A Method of Realizing Chaotic Secure Communication by Using Digital Channel[J]. Journal of Electronics & Information Technology, 2006, 28(12): 2359-2361.
Citation:
Han Jian-qun, Zhu Yi-sheng. A Method of Realizing Chaotic Secure Communication
by Using Digital Channel[J]. Journal of Electronics & Information Technology, 2006, 28(12): 2359-2361.
Based on the characteristic of the chaotic secure communication system, transmitting the sending signal by the standard digital channel is proposed in this paper. The results show that this method is simple, flexible and reliable in the performance.
Short K M. Steps toward unmasking secure communications[J].Int. J. Bifur. Chaos.1994, 4(4):959-977[2]Kennedy M P, Kolumbn G, Kis G, and Jako Z. Performance evaluation of FM-DCSK modulation in multipath environments[J].IEEE Trans. on Circuits and Systems.2000, 47(12):1702-1711[3]Nikolai F R, Mikhail M S, Lev S T and Alexander R V. Digital communication using chaotic-pulse-position on[J].IEEE Trans. on Circuits and Systems-I: Fundamental Theory and Applications.2001, 48(12):1436-1444[4]李克, 裴文江, 杨绿溪, 何振亚. 一种混沌数字保密通信系统的保密性能分析. 电路与系统学报, 1999, 14(2): 96-102.[5]Mikhail S J, Nikolai F R, Lawrence L, Lev S T, Henry A, Kung Y, and Alexander R V. Chaotic pulse position modulation: A robust method of communication with chaos[J].IEEE Communication Letters.2000, 4(4):128-130