Third International Conference on Information Technology and Applications (ICITA'05)
DOI: 10.1109/icita.2005.164
|View full text |Cite
|
Sign up to set email alerts
|

Investigation on Operations of a Secure Communication System Based on the Chaotic Phase Shift Keying Scheme

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
13
0

Publication Types

Select...
4
4

Relationship

0
8

Authors

Journals

citations
Cited by 20 publications
(13 citation statements)
references
References 4 publications
0
13
0
Order By: Relevance
“…Traditionally, signal spreading and user information encoding in direct sequence CDMA reverse and forward links have been based on application of short and long pseudo random sequences with good orthogonal characteristics, Walsh functions or wavelets [1,2,3]. In spite of the fact these sequences are semi-deterministic they spread signals in frequency domain and thus increase security in signal transmission and enhance resistance to jamming.…”
Section: Introductionmentioning
confidence: 99%
“…Traditionally, signal spreading and user information encoding in direct sequence CDMA reverse and forward links have been based on application of short and long pseudo random sequences with good orthogonal characteristics, Walsh functions or wavelets [1,2,3]. In spite of the fact these sequences are semi-deterministic they spread signals in frequency domain and thus increase security in signal transmission and enhance resistance to jamming.…”
Section: Introductionmentioning
confidence: 99%
“…In past research reports, chaos systems have been an attractive topic for their potential applications in secure communication [29][30][31][32]. In recent years, digital chaos signals have been extensively used in commercial applications, such as multimedia systems, mobile and wireless communications [33][34][35]. In [36], by using XOR logic operation, a chaotic watermark was obtained between the binary watermark and the binary chaotic image, and then the chaotic watermark was embedded into an order less image of each block of the least significant bit.…”
Section: Introductionmentioning
confidence: 99%
“…The performance of CPSK, in terms of system capacity and BER characteristics, has been shown to be superior to that of CSK [4]. In CPSK, a single chaotic sequence is used as the information carrier, requiring only one chaotic sequence generator per user.…”
Section: B Chaos-based Communication Systemmentioning
confidence: 99%
“…The system presented in this paper uses the digital modulation method of chaotic phase shift keying (CPSK), as proposed by Sandhu and Berber in [4]. The performance of CPSK, in terms of system capacity and BER characteristics, has been shown to be superior to that of CSK [4].…”
Section: B Chaos-based Communication Systemmentioning
confidence: 99%
See 1 more Smart Citation