• No results found

[PDF] Top 20 Application of Modified Chaotic Sine Map in Secure Communication

Has 10000 "Application of Modified Chaotic Sine Map in Secure Communication" found on our website. Below are the top 20 most common "Application of Modified Chaotic Sine Map in Secure Communication".

Application of Modified Chaotic Sine Map in Secure Communication

Application of Modified Chaotic Sine Map in Secure Communication

... We observe that the modified sine map will provide better BER performance for higher SNR values when compared to other three maps. At lower SNR values it proves to be an alternative to the logistic ... See full document

5

A Novel Chaotic System for Secure Communication Applications

A Novel Chaotic System for Secure Communication Applications

... periods, chaotic systems were considered inappropriate for synchronizing purposes since they are very sensitive to initial conditions and system parameters, Pecora and Carroll proved that chaotic systems ... See full document

8

Application adaptive exponential synchronization of chaotic dynamical systems in secure communications

Application adaptive exponential synchronization of chaotic dynamical systems in secure communications

... to secure chaos communication through the method of chaos masking and ...of chaotic systems in using a transition of the desired signal is integration of it with a chaotic system and ... See full document

21

Anti-Synchronization of Complex Chaotic T-System Via Optimal Adaptive Sliding-Mode and Its Application In Secure Communication

Anti-Synchronization of Complex Chaotic T-System Via Optimal Adaptive Sliding-Mode and Its Application In Secure Communication

... for secure communications via the chaotic masking ...In secure communication, a parameter and a state of master system are used for masking the informa- tion, such that a chaotic signal ... See full document

12

Application of a Chaotic Synchronization System to Secure Communication

Application of a Chaotic Synchronization System to Secure Communication

... a secure communications system, necessitating the development of a sliding mode control ...a chaotic system, while devising a sliding mode control ...the chaotic system and the controller. Finally, ... See full document

9

Designing a New Digital Modulator for Chaotic Secure Communication Systems Using Total

Designing a New Digital Modulator for Chaotic Secure Communication Systems Using Total

... ECURE communication is defined as passing along information in such a way that a third party would not be able to overhear ...ensure communication security as much as possible [1, 2]. Moreover, by ... See full document

10

Implementation of Modified RFID System Architecture for Secure Application

Implementation of Modified RFID System Architecture for Secure Application

... of secure communications between legitimate terminals ...(OFDM) communication[14] This is an unfavorable scenario for secrecy performance as the system is ... See full document

7

A Literature Survey on Image Encryption Kaushal T. Kevadia , Archana M. Nayak, Kaushik S. Patel, Brijesh U. Patel

A Literature Survey on Image Encryption Kaushal T. Kevadia , Archana M. Nayak, Kaushik S. Patel, Brijesh U. Patel

... for secure communication in the presence of an ...military communication, multimedia systems, medical science, telemedicine, internet communication ... See full document

6

RFID cum Biometric based Physical Access Control System for Nuclear Facilities

RFID cum Biometric based Physical Access Control System for Nuclear Facilities

... tailgating, secure communication between access controllers and peripherals, secure access to server application, dual occupancy rule are not present in commercial access control ... See full document

6

Generalized function projective synchronization of chaotic systems for secure communication

Generalized function projective synchronization of chaotic systems for secure communication

... However, the above projective synchronization (PS) method is characterized that its drive and response sys- tems are synchronized up to a constant scaling factor. Recently, Chen et al. [13] introduced a new PS scheme ... See full document

11

A New Technique for Secure Image Communication via Chaotic Circuit

A New Technique for Secure Image Communication via Chaotic Circuit

... compound chaotic cipher sequence. They moved all the pixels through 2D chaotic map using substitution and permutation, which moved new pixels as a permutation of the original ...and secure ... See full document

7

Image Encryption Algorithm based on Chaotic Map

Image Encryption Algorithm based on Chaotic Map

... robust secure systems to store and transmit, such as military image databases, confidential video conference, medical imaging system, online private photograph album, etc ... See full document

10

Securing Images by Combination of Chaotic Map and Steganography

Securing Images by Combination of Chaotic Map and Steganography

... to secure the information during the transmission has been a primary ...multimedia application, security becomes an important issue of communication and storage of ...combining chaotic maps ... See full document

5

An efficient and secure VoIP communication system with chaotic mapping and message digest

An efficient and secure VoIP communication system with chaotic mapping and message digest

... VoIP communication platform called ...VoIP application which was developed based on visual studio 2012 MFC ...VoIP application could be used as normal network phone without steganography, and it is ... See full document

8

The Exponential Map Is Chaotic: An Invitation to Transcendental Dynamics

The Exponential Map Is Chaotic: An Invitation to Transcendental Dynamics

... exponential map f acts chaotically on the complex plane is not the end of the ...exponential map played an important role in our proof of Theorems ... See full document

22

A Novel Triangular Chaotic Map (TCM) with Full Intensive Chaotic Population Based on Logistic Map

A Novel Triangular Chaotic Map (TCM) with Full Intensive Chaotic Population Based on Logistic Map

... three-dimensional chaotic attractors; it was examined and intro- duced by Edward Lorenz in 1963 ...a chaotic attractor, whereas the word chaos is often used to describe the complicated manner of non-linear ... See full document

25

R

R

... of communication with the development and advancement of modern techniques in the ...its application in many fields especially in ...developing secure ciphers as properties of chaotic nature ... See full document

5

Accurate Bit Error Rate Calculation for Asynchronous Chaos-Based DS-CDMA over Multipath Channel

Accurate Bit Error Rate Calculation for Asynchronous Chaos-Based DS-CDMA over Multipath Channel

... chaos communication system was recently presented by Lawrance et ...the chaotic sequence by integrating the BER expression for a given chaotic map over all possible chaotic sequences ... See full document

12

Selective Image Encryption with 3D Chaotic Map

Selective Image Encryption with 3D Chaotic Map

... to secure only selected portion of medical and satellite images, the first way is very useful if the selected portion of image is known while the second encryption scheme is suitable when region of interest is ... See full document

17

Chaotic Map based Block Encryption

Chaotic Map based Block Encryption

... one-dimensional chaotic maps are used, in order to obtain chaotic sequences with better cryptographic ...one-dimensional chaotic maps and an external secret key. The chaotic map adopted ... See full document

8

Show all 10000 documents...