| Once Over Lightly | p. 1 |
| History of Chaotic Secure Communication | p. 1 |
| The First Generation | p. 2 |
| Additive Chaotic Masking | p. 3 |
| Chaotic Shift Keying | p. 12 |
| The Second Generation | p. 15 |
| Chaotic Parameter Modulation | p. 16 |
| Chaotic Nonautonomous Modulation | p. 18 |
| Example 1 | p. 19 |
| Example 2 | p. 22 |
| The Third Generation | p. 24 |
| Concluding Remarks | p. 26 |
| Chaotic Parameter Modulations | p. 29 |
| Adaptive Control of Chaotic Systems with Unknown Parameters | p. 29 |
| Introduction | p. 29 |
| Design of Controller | p. 30 |
| Examples | p. 36 |
| Time-varying Channel Compensation | p. 39 |
| Time-varying Parameter Compensation | p. 46 |
| Discrete-Time Chaotic Parameter Modulation | p. 51 |
| Multi-access Parameter Modulation | p. 52 |
| Cryptography Based on Chaotic Systems | p. 61 |
| Continuous Chaotic Systems for Cryptography | p. 61 |
| Simulation Results | p. 64 |
| Application of Chaotic Maps to Digital Image Copyright Labeling | p. 66 |
| Generate 2D Random Sequences Using RDTCNN | p. 69 |
| Image Copyright Labeling Algorithm | p. 70 |
| Simulation Results | p. 72 |
| Channel-Independent Chaotic Secure Communication | p. 77 |
| Introduction | p. 77 |
| Generalized Synchronization and Nonideal Channel | p. 78 |
| Linear Channel | p. 79 |
| Nonlinear Channel | p. 85 |
| Secure Communication | p. 89 |
| The Preliminary Results | p. 92 |
| The Improvement of Security | p. 100 |
| Chaotic Impulse Radio | p. 103 |
| Introduction | p. 103 |
| Structure of the Chaotic Circuit | p. 105 |
| Structure of Chaotic Impulse Radio System | p. 106 |
| Finding {phi[subscript i]} From {tau[subscript k]} | p. 109 |
| Position Modulation and Demodulation | p. 113 |
| Concluding Remarks | p. 116 |
| Secure Communication Based on Impulsive Synchronization | p. 121 |
| Introduction | p. 121 |
| Basic Theory of Impulsive Differential Equations | p. 122 |
| Impulsive Synchronization of Chua's Oscillators | p. 125 |
| Simulation Results of Impulsive Synchronization | p. 127 |
| Simulation 1: Strong Coupling | p. 127 |
| Simulation 2: Weak Coupling | p. 129 |
| Effects of Channel Noise | p. 131 |
| Effects of Parameter Mismatch | p. 135 |
| The Fourth Generation of Chaotic Secure Communication System | p. 136 |
| A Simple System in Baseband | p. 139 |
| An Illustrative Example: Secure Digital Cellular Phone | p. 144 |
| Concluding Remarks | p. 149 |
| Experiment Results of Impulsive Synchronization of Chaotic Systems | p. 151 |
| Experiment 1 | p. 151 |
| Experimental Configurations | p. 151 |
| Experimental Results | p. 153 |
| Remarks | p. 155 |
| Experiment 2 | p. 156 |
| Experiment 3: Hypechaotic Circuits | p. 163 |
| Concluding Remarks | p. 170 |
| Experiments of Impulsive Chaotic Communication Systems | p. 177 |
| Introduction | p. 177 |
| Additive Modulation | p. 179 |
| Chaotic Circuit | p. 179 |
| Hyperchaotic Circuit | p. 180 |
| DS Modulation | p. 180 |
| Chaotic Circuit | p. 180 |
| Hyperchaotic Circuit | p. 183 |
| Effects of Channel Noise | p. 185 |
| Cryptanalyzing Chaotic Secure Communications Using Return Maps | p. 195 |
| Introduction | p. 195 |
| Characteristics of Return Maps | p. 197 |
| Decoding Chaotic Parameter Modulation | p. 202 |
| Security of Chaotic Shift Keying | p. 203 |
| Security of Chaotic Parameter Modulation | p. 209 |
| Decoding Nonautonomous Chaotic Modulation | p. 212 |
| Naked Transmitted Signal | p. 212 |
| Compound Transmitted Signal | p. 214 |
| Performance Under Conditions of Complicated Return Maps | p. 217 |
| Conclusions | p. 219 |
| Breaking Chaotic Switching Using Generalized Synchronization | p. 227 |
| Introduction | p. 227 |
| Generalized Synchronization of Two Chaotic Systems | p. 228 |
| Breaking Chaotic Switching | p. 228 |
| Low Dimensional Case | p. 229 |
| High Dimensional Case | p. 232 |
| Conclusions | p. 235 |
| Breaking Chaotic Secure Communication Using Spectrogram | p. 239 |
| Low Dimensional Case | p. 239 |
| High Dimensional Case | p. 241 |
| Conclusions | p. 245 |
| Using Neural Networks to Unmasking Chaotic Secure Communication | p. 251 |
| Introduction | p. 251 |
| Chaotic Shift Keying Using Low Dimensional Chaotic Systems | p. 252 |
| Chua's Circuit | p. 252 |
| The Lorenz System | p. 253 |
| Training Neural Networks for Unmasking Chaotic Shift Keying | p. 253 |
| Chua's Circuits as Transmitter | p. 255 |
| The Lorenz Systems as Transmitter | p. 261 |
| High Dimensional Cases | p. 261 |
| Example 1: Three Coupled Chua's Circuits | p. 261 |
| Example 2: Two Coupled Lorenz Systems | p. 263 |
| Conclusions | p. 265 |
| References | p. 267 |
| Index | p. 273 |
| Table of Contents provided by Syndetics. All Rights Reserved. |