Book description
The monograph begins with a systematic introduction of chaos and chaos synchronization, and then extends to the methodologies and technologies in secure communication system design and implementation. The author combines theoretical frameworks with empirical studies, making the book a pratical reference for both academics and industrial engineers.
Table of contents
- Cover
- Title
- Copyright
- Preface
- Contents
- 1 Introduction
-
2 Characteristic Analysis Methods for Nonlinear System
- 2.1 Phase Diagram Analysis Method
- 2.2 Power Spectral Analysis Method
- 2.3 Poincaré Section Method
- 2.4 Lyapunov Characteristic Exponent Method
- 2.5 Fractal Dimension Analysis Method
- 2.6 0–1 Test Method
- 2.7 Dividing Frequency Sampling Method
- 2.8 Pseudo-Phase Space Method
- 2.9 Complexity Measure Algorithm
- 3 Typical Chaotic Systems
-
4 Chaotic Synchronization Principle and Method
- 4.1 Definition of Chaos Synchronization
- 4.2 Performance Index of Chaotic Synchronization System
- 4.3 Principle and Performance of Feedback Control Synchronization
- 4.4 Parameter Adaptive Synchronization Based on Pecora–Carroll Synchronization Criterion
- 4.5 Adaptive Synchronization Control Based on Lyapunov Stable Theory
- 4.6 Intermittent Feedback Synchronization Control
- 4.7 Synchronization Control Based on State Observer Method
- 4.8 Chaos Synchronization Based on Chaos Observer
- 4.9 Projective Synchronization
-
5 Secure Communication Technology Based on Chaos Synchronization
- 5.1 Chaotic Masking Communication
- 5.2 Chaos Shift Keying Communication
- 5.3 Chaos Parameter Modulation
-
5.4 Chaotic Spread Spectrum Communication
- 5.4.1 Principle of Chaotic DS/SS Communication
- 5.4.2 Generation of Chaotic Spread Spectrum Code
- 5.4.3 Simulation Module Design of Multiuser Chaotic Spread Spectrum System
- 5.4.4 Design and Simulation of Multiuser Chaotic Spread Spectrum System Based on Rake Receiver
- 5.4.5 Performance Analysis of Multiuser Chaotic Spread Spectrum System Based on Rake Receiver
- Questions
- 6 Data Encryption Based on Chaotic Sequence
- 7 Audio and Video Chaotic Encryption and Communication Technology
-
8 Analysis and Simulation of Fractional-Order Chaotic System
- 8.1 Development of Fractional-Order Chaotic System
- 8.2 Definition and Physical Meaning of Fractional Calculus
- 8.3 Solution Methods of Fractional-Order Chaotic System
- 8.4 Simulation Method for Fractional-Order Chaotic System
- 8.5 Dynamics of Fractional-Order Unified System Based on Frequency Domain Method
-
8.6 Dynamics of Fractional-Order Diffusionless Lorenz System Based on Time Domain Method
- 8.6.1 Fractional-Order Diffusionless Lorenz System Model
- 8.6.2 Chaotic Characteristic of Fractional-Order Diffusionless Lorenz System
- 8.6.3 Bifurcation Analysis with Varying System Parameter R
- 8.6.4 Bifurcation Analysis with Varying Fractional Order q
- 8.6.5 Bifurcations with Different Fractional Order
- Questions
- 9 Simulation and Hardware Implementation of Chaotic System
- Appendix A
-
Appendix B.
- B.1 Mode of the Simplified Lorenz System
-
B.2 Programs about Characteristic Analysis of Integer-Order Simplified Lorenz System
- B.2.1 Simulation Codes for Matlab Toolbox with Runge–Kutta Algorithm
- B.2.2 Solution Based on Euler and Runge–Kutta Algorithm
- B.2.3 Program of Calculating LE
- B.2.4 Program of Calculating the Maximum LE
- B.2.5 Program for Calculating Bifurcation Diagram
- B.2.6 Program for Plotting Poincaré Section
- B.2.7 Program for 0–1 Test
- B.3 Solution Program for the Fraction-Order Simplified Lorenz System
- B.4 Simulation of Chaotic Synchronization
- References
- Index
Product information
- Title: Chaotic Secure Communication
- Author(s):
- Release date: September 2016
- Publisher(s): De Gruyter
- ISBN: 9783110433265
You might also like
book
Designing Data-Intensive Applications
Data is at the center of many challenges in system design today. Difficult issues need to …
book
Wireless and Mobile Device Security, 2nd Edition
Written by an industry expert, Wireless and Mobile Device Security explores the evolution of wired networks …
book
Generative Deep Learning, 2nd Edition
Generative AI is the hottest topic in tech. This practical book teaches machine learning engineers and …
book
Phishing and Communication Channels: A Guide to Identifying and Mitigating Phishing Attacks
Mitigate the dangers posed by phishing activities, a common cybercrime carried out through email attacks. This …