×

Application of ICA-EEMD to secure communications in chaotic systems. (English) Zbl 1312.94069

Summary: We propose the application of ICA-EEMD to secure communication systems. ICA-EEMD is employed to retrieve the message data encrypted by a mixture of Gaussian white noise and chaotic noise. The results showed that ICA-EEMD can effectively extract the two original message data.

MSC:

94A60 Cryptography
37D45 Strange attractors, chaotic dynamics of systems with hyperbolic behavior
PDFBibTeX XMLCite
Full Text: DOI

References:

[1] DOI: 10.1142/S0129183108013138 · Zbl 1169.93390 · doi:10.1142/S0129183108013138
[2] DOI: 10.1142/S0129183107010565 · Zbl 1152.34040 · doi:10.1142/S0129183107010565
[3] DOI: 10.1142/S0129183110015221 · Zbl 1188.37037 · doi:10.1142/S0129183110015221
[4] S.L. Lin and P.C. Tung, Lecture Notes in Computer Science 4707 (Springer, 2007) p. 431.
[5] DOI: 10.1142/S0217979204025798 · doi:10.1142/S0217979204025798
[6] DOI: 10.1142/S0217979207037557 · Zbl 1186.37109 · doi:10.1142/S0217979207037557
[7] DOI: 10.1142/S0217979207038162 · doi:10.1142/S0217979207038162
[8] DOI: 10.1142/S0217979208039563 · Zbl 1178.34049 · doi:10.1142/S0217979208039563
[9] DOI: 10.1016/j.automatica.2004.06.001 · Zbl 1162.93353 · doi:10.1016/j.automatica.2004.06.001
[10] DOI: 10.1109/TCSI.2004.838151 · Zbl 1371.37060 · doi:10.1109/TCSI.2004.838151
[11] Lü J., IEEE Trans. Circuits Syst. I 53 pp 149–
[12] DOI: 10.1142/S0218127406015179 · Zbl 1097.94038 · doi:10.1142/S0218127406015179
[13] Yu S., IEEE Trans. Circuits Syst. I
[14] DOI: 10.1142/9789812798701 · doi:10.1142/9789812798701
[15] DOI: 10.1016/S0375-9601(98)00159-5 · Zbl 0933.94023 · doi:10.1016/S0375-9601(98)00159-5
[16] DOI: 10.1103/PhysRevLett.101.244102 · doi:10.1103/PhysRevLett.101.244102
[17] Álvarez G., Phys. Rev. A 306 pp 200–
[18] Álvarez G., Phys. Rev. A 319 pp 334–
[19] DOI: 10.1126/science.1066168 · doi:10.1126/science.1066168
[20] DOI: 10.1126/science.1074355 · doi:10.1126/science.1074355
[21] DOI: 10.1126/science.290.5500.2319 · doi:10.1126/science.290.5500.2319
[22] DOI: 10.1126/science.293.5537.2051 · doi:10.1126/science.293.5537.2051
[23] DOI: 10.1038/nn831 · doi:10.1038/nn831
[24] DOI: 10.1103/PhysRevLett.94.084102 · doi:10.1103/PhysRevLett.94.084102
[25] DOI: 10.1016/j.chaos.2009.04.054 · Zbl 1198.94107 · doi:10.1016/j.chaos.2009.04.054
[26] DOI: 10.1142/S0129183111017007 · Zbl 1261.93080 · doi:10.1142/S0129183111017007
[27] DOI: 10.1098/rspa.1998.0193 · Zbl 0945.62093 · doi:10.1098/rspa.1998.0193
[28] Z. Wu and N. E. Huang, Advances in Adaptive Data Analysis 1 (World Scientific, 2009) p. 1.
[29] DOI: 10.1103/PhysRevLett.94.010602 · doi:10.1103/PhysRevLett.94.010602
[30] DOI: 10.1038/nature02225 · doi:10.1038/nature02225
[31] Huang N. E., Rev. Geophys. 46 pp RG2006–
[32] DOI: 10.1073/pnas.0701020104 · doi:10.1073/pnas.0701020104
[33] DOI: 10.1007/978-1-4757-2851-4 · doi:10.1007/978-1-4757-2851-4
[34] DOI: 10.1002/0470845899 · doi:10.1002/0470845899
[35] DOI: 10.1007/978-3-211-45295-0_7 · doi:10.1007/978-3-211-45295-0_7
[36] DOI: 10.1103/PhysRevE.79.066705 · doi:10.1103/PhysRevE.79.066705
[37] Abramson N. M., Information Theory and Coding (1963)
This reference list is based on information provided by the publisher or from digital mathematics libraries. Its items are heuristically matched to zbMATH identifiers and may contain data conversion errors. In some cases that data have been complemented/enhanced by data from zbMATH Open. This attempts to reflect the references listed in the original paper as accurately as possible without claiming completeness or a perfect matching.