“…Different approaches for the transmission of information signals using chaotic dynamics have been proposed, for example, chaotic masking Cuomo & Oppenheim, 1993], chaotic switching or chaos shift keying Dedieu et al, 1993], chaotic modulation [Halle et al, 1993], nonlinear mixing [Volkovskii & Rulkov, 1993;Dmitriev et al, 1995;Dmitriev & Panas, 2002], and others. Based on these approaches, a variety of chaotic communication schemes has been proposed [Van Wiggeren & Roy, 1998;Dmitriev & Panas, 2002;Tao, 2004;Argyris et al, 2005;Koronovskii et al, 2009;Wang et al, 2012;Stankovski et al, 2014]. However, many chaotic communication schemes are not as secure as expected and can be successfully unmasked [Pérez & Cerdeira, 1995;Short, 1997;Zhou & Chen, 1997;Yang et al, 1998;Ponomarenko & Prokhorov, 2002;Alvarez & Li, 2006;Millerioux, 2013].…”