2019
DOI: 10.1109/twc.2019.2920970
|View full text |Cite
|
Sign up to set email alerts
|

Chaotic Polarization-Assisted ${L}$ DPSK-MPPM Modulation for Free-Space Optical Communications

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
14
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
6
1

Relationship

2
5

Authors

Journals

citations
Cited by 20 publications
(14 citation statements)
references
References 57 publications
0
14
0
Order By: Relevance
“…In contrast to other works, the simulation results revealed superior performance. The algorithm in [46] depends on L-ary differential phase-shift keying multiple pulse position modulation (LDPSK-MPPM) that is protected by a discrete chaos mechanism in the physical layer. Device protection was tested for various forms of attacks, such as brute-force, differential, and statistical attacks by Monte Carlo (MC) simulations.…”
Section: Related Workmentioning
confidence: 99%
See 3 more Smart Citations
“…In contrast to other works, the simulation results revealed superior performance. The algorithm in [46] depends on L-ary differential phase-shift keying multiple pulse position modulation (LDPSK-MPPM) that is protected by a discrete chaos mechanism in the physical layer. Device protection was tested for various forms of attacks, such as brute-force, differential, and statistical attacks by Monte Carlo (MC) simulations.…”
Section: Related Workmentioning
confidence: 99%
“…In the horizontal, vertical, and diagonal directions, the adjacent pixels of the original video frame are strongly correlated. An ideal encryption algorithm should have a sufficiently low correlation between the encrypted video frame pixels to avoid any statistical attacks [38], [46]. The correlations of the adjacent pixels in the plain and encrypted video frames are evaluated and compared by arbitrarily picking 2000 pairs of adjacent pixels in every direction of the two video frames.…”
Section: A Correlation Analysismentioning
confidence: 99%
See 2 more Smart Citations
“…There are few partial attempts to solve the aforementioned security issues in literature. For example, the need for chaos synchronization can be ignored if digital implementations of identical chaotic maps are employed by both communication sides [47]- [48]. Although it is known that a degradation in statistical properties of chaotic output due to finite precision of computing machine, the pseudo-chaos or finite precision error can be exploited to treat this degradation and greatly improve the performance of encryption technique, see [47] and reference therein.…”
Section: Introductionmentioning
confidence: 99%