Book description
The monograph begins with a systematic introduction of chaos and chaos synchronization, and then extends to the methodologies and technologies in secure communication system design and implementation. The author combines theoretical frameworks with empirical studies, making the book a pratical reference for both academics and industrial engineers.
Table of contents
- Cover
- Title
- Copyright
- Preface
- Contents
- 1 Introduction
-
2 Characteristic Analysis Methods for Nonlinear System
- 2.1 Phase Diagram Analysis Method
- 2.2 Power Spectral Analysis Method
- 2.3 Poincaré Section Method
- 2.4 Lyapunov Characteristic Exponent Method
- 2.5 Fractal Dimension Analysis Method
- 2.6 0–1 Test Method
- 2.7 Dividing Frequency Sampling Method
- 2.8 Pseudo-Phase Space Method
- 2.9 Complexity Measure Algorithm
- 3 Typical Chaotic Systems
-
4 Chaotic Synchronization Principle and Method
- 4.1 Definition of Chaos Synchronization
- 4.2 Performance Index of Chaotic Synchronization System
- 4.3 Principle and Performance of Feedback Control Synchronization
- 4.4 Parameter Adaptive Synchronization Based on Pecora–Carroll Synchronization Criterion
- 4.5 Adaptive Synchronization Control Based on Lyapunov Stable Theory
- 4.6 Intermittent Feedback Synchronization Control
- 4.7 Synchronization Control Based on State Observer Method
- 4.8 Chaos Synchronization Based on Chaos Observer
- 4.9 Projective Synchronization
-
5 Secure Communication Technology Based on Chaos Synchronization
- 5.1 Chaotic Masking Communication
- 5.2 Chaos Shift Keying Communication
- 5.3 Chaos Parameter Modulation
-
5.4 Chaotic Spread Spectrum Communication
- 5.4.1 Principle of Chaotic DS/SS Communication
- 5.4.2 Generation of Chaotic Spread Spectrum Code
- 5.4.3 Simulation Module Design of Multiuser Chaotic Spread Spectrum System
- 5.4.4 Design and Simulation of Multiuser Chaotic Spread Spectrum System Based on Rake Receiver
- 5.4.5 Performance Analysis of Multiuser Chaotic Spread Spectrum System Based on Rake Receiver
- Questions
- 6 Data Encryption Based on Chaotic Sequence
- 7 Audio and Video Chaotic Encryption and Communication Technology
-
8 Analysis and Simulation of Fractional-Order Chaotic System
- 8.1 Development of Fractional-Order Chaotic System
- 8.2 Definition and Physical Meaning of Fractional Calculus
- 8.3 Solution Methods of Fractional-Order Chaotic System
- 8.4 Simulation Method for Fractional-Order Chaotic System
- 8.5 Dynamics of Fractional-Order Unified System Based on Frequency Domain Method
-
8.6 Dynamics of Fractional-Order Diffusionless Lorenz System Based on Time Domain Method
- 8.6.1 Fractional-Order Diffusionless Lorenz System Model
- 8.6.2 Chaotic Characteristic of Fractional-Order Diffusionless Lorenz System
- 8.6.3 Bifurcation Analysis with Varying System Parameter R
- 8.6.4 Bifurcation Analysis with Varying Fractional Order q
- 8.6.5 Bifurcations with Different Fractional Order
- Questions
- 9 Simulation and Hardware Implementation of Chaotic System
- Appendix A
-
Appendix B.
- B.1 Mode of the Simplified Lorenz System
-
B.2 Programs about Characteristic Analysis of Integer-Order Simplified Lorenz System
- B.2.1 Simulation Codes for Matlab Toolbox with Runge–Kutta Algorithm
- B.2.2 Solution Based on Euler and Runge–Kutta Algorithm
- B.2.3 Program of Calculating LE
- B.2.4 Program of Calculating the Maximum LE
- B.2.5 Program for Calculating Bifurcation Diagram
- B.2.6 Program for Plotting Poincaré Section
- B.2.7 Program for 0–1 Test
- B.3 Solution Program for the Fraction-Order Simplified Lorenz System
- B.4 Simulation of Chaotic Synchronization
- References
- Index
Product information
- Title: Chaotic Secure Communication
- Author(s):
- Release date: September 2016
- Publisher(s): De Gruyter
- ISBN: 9783110433265
You might also like
book
Advanced Persistent Security
Advanced Persistent Security covers secure network design and implementation, including authentication, authorization, data and access integrity, …
book
8 Steps to Better Security
Harden your business against internal and external cybersecurity threats with a single accessible resource. In 8 …
book
FISMA Compliance Handbook
This comprehensive book instructs IT managers to adhere to federally mandated compliance requirements. FISMA Compliance Handbook …
book
Security and Privacy in Cyber-Physical Systems
Written by a team of experts at the forefront of the cyber-physical systems (CPS) revolution, this …