2021
DOI: 10.1016/j.aej.2020.11.035
|View full text |Cite
|
Sign up to set email alerts
|

A novel secure communications scheme based on chaotic modulation, recursive encryption and chaotic masking

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4

Citation Types

0
19
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
6
3
1

Relationship

0
10

Authors

Journals

citations
Cited by 45 publications
(19 citation statements)
references
References 64 publications
0
19
0
Order By: Relevance
“…Dynamic chaos research continues to develop rapidly due to its wide application in various fields of science and technology, such as telecommunication systems [1]- [2], cryptography [3]- [4], neural network systems [5], and other applications. Recently, the design of new dynamic chaos electronic generators has been significantly increased.…”
Section: Introductionmentioning
confidence: 99%
“…Dynamic chaos research continues to develop rapidly due to its wide application in various fields of science and technology, such as telecommunication systems [1]- [2], cryptography [3]- [4], neural network systems [5], and other applications. Recently, the design of new dynamic chaos electronic generators has been significantly increased.…”
Section: Introductionmentioning
confidence: 99%
“…designed a new simple hyperchaotic system with dual memristors and applied it for a secure communication system [3]. Using a hyperchaotic Lorenz system, Ouannas et al (2021) suggested a new secure communication system, which is obtained by combining chaotic modulation, recursive encryption and chaotic masking [4]. Sahin et al (2020) proposed a memristor based 4-D hyperchaotic circuit and implemented it for communication systems on FPGA platform [5].…”
Section: Introductionmentioning
confidence: 99%
“…Nevertheless, due to the uniqueness of the image, such as being two-dimensional, redundancy and a strong correlation of two adjacent pixels, traditional text encryption faces severe challenges [20][21][22]. Moreover, the problem of realtime transmission should be considered in image encryption to improve the communication performance [9,23,24]. Therefore, it is quite necessary to study the new technologies and methods of image encryption.…”
Section: Introductionmentioning
confidence: 99%