O'Reilly logo

Chaotic Secure Communication by Tsinghua University Tsinghua University Press, Kehui Sun

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

7Audio and Video Chaotic Encryption and Communication Technology

With the development of network communication, Internet provides an amount of information services to users every day. Because the foundation protocol of Internet is not completely secure, when unencrypted information transmits on the network, it will be directly exposed to the entire network, which is a great threat to information security, especially for audio and video communications, such as eavesdropping, call tracking, phone hijacking, and denial of service. Therefore, we should improve network design and also take a variety of technologies, such as voice encryption technology, to ensure the safety of audio and video communications. With the deepening of chaotic applied research, ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required