Novel Bit Power Spectrum Measures for Improved Security in Chaotic Communication Systems
Signals and Communication Technology, ISSN: 1860-4870, Page: 299-316
2011
- 1Captures
Metric Options: CountsSelecting the 1-year or 3-year option will change the metrics count to percentiles, illustrating how an article or review compares to other articles or reviews within the selected time period in the same journal. Selecting the 1-year option compares the metrics against other articles/reviews that were also published in the same calendar year. Selecting the 3-year option compares the metrics against other articles/reviews that were also published in the same calendar year plus the two years prior.
Example: if you select the 1-year option for an article published in 2019 and a metric category shows 90%, that means that the article or review is performing better than 90% of the other articles/reviews published in that journal in 2019. If you select the 3-year option for the same article published in 2019 and the metric category shows 90%, that means that the article or review is performing better than 90% of the other articles/reviews published in that journal in 2019, 2018 and 2017.
Citation Benchmarking is provided by Scopus and SciVal and is different from the metrics context provided by PlumX Metrics.
Example: if you select the 1-year option for an article published in 2019 and a metric category shows 90%, that means that the article or review is performing better than 90% of the other articles/reviews published in that journal in 2019. If you select the 3-year option for the same article published in 2019 and the metric category shows 90%, that means that the article or review is performing better than 90% of the other articles/reviews published in that journal in 2019, 2018 and 2017.
Citation Benchmarking is provided by Scopus and SciVal and is different from the metrics context provided by PlumX Metrics.
Metrics Details
- Captures1
- Readers1
Book Chapter Description
In this chapter, the general approach to master-slave chaotic map synchronization of chapter 4 is demonstrated on the e $\Re^2$ Burgers’ map master-slave system. A Burgers’ map CPM based chaotic communication system is then designed using the method of chapter 6. Primarily, however, the security of the proposed Burgers’ map and the existing CPM, as well as of the ICM, chaotic communication systems is evaluated. The security is evaluated in terms of the average power of the bits transmitted using the newly developed measures, termed the bit power parameter spectrum (BPPS) and the bit power initial condition spectrum (BPICS). It is shown that due to the largest bit power overlap region of the chaotic carriers of the transmitted bits, (overlap within BPPS and BPICS), the Ueda ICM based chaotic communication system is more secure than the CPM based chaotic communication systems.
Bibliographic Details
http://www.scopus.com/inward/record.url?partnerID=HzOxMe3b&scp=85132865556&origin=inward; http://dx.doi.org/10.1007/978-3-642-21849-1_10; https://link.springer.com/10.1007/978-3-642-21849-1_10; https://dx.doi.org/10.1007/978-3-642-21849-1_10; https://link.springer.com/chapter/10.1007/978-3-642-21849-1_10; http://www.springerlink.com/index/10.1007/978-3-642-21849-1_10; http://www.springerlink.com/index/pdf/10.1007/978-3-642-21849-1_10
Springer Science and Business Media LLC
Provide Feedback
Have ideas for a new metric? Would you like to see something else here?Let us know