Skip to main content

A Secure Communication System Based on DCSK

  • Conference paper
Communications and Information Processing

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 288))

Abstract

Chaotic secure communication has many advantages than traditional communication for its broadband, noise like characteristics. Only after good features of the chaotic system being studied deeply, chaos-based secure communication can be applied. In the traditional secure communication based on Chaos Shift Keying (CSK), synchronization needs to be established between the transmitter and receiver of the system. While due to the extreme sensitivity of initial value of chaotic signal, it is very difficult to achieve synchronization so this method is difficult to be applied practically. Therefore to solve this problem, a new Differential Chaos Shift Keying (DCSK) system was proposed which chaos synchronization is not necessary. The new system was deeply studied and was compared with the Binary Phase Shift Keying (BPSK) modulation. Finally, a new application with DCSK in the image transmission was given.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Smith, T.F., Waterman, M.S.: Identification of Common Molecular Subsequences. J. Mol. Biol. 147, 195–197 (1981)

    Article  Google Scholar 

  2. May, P., Ehrlich, H.-C., Steinke, T.: ZIB Structure Prediction Pipeline: Composing a Complex Biological Workflow Through Web Services. In: Nagel, W.E., Walter, W.V., Lehner, W. (eds.) Euro-Par 2006. LNCS, vol. 4128, pp. 1148–1158. Springer, Heidelberg (2006)

    Chapter  Google Scholar 

  3. Foster, I., Kesselman, C.: The Grid: Blueprint for a New Computing Infrastructure. Morgan Kaufmann, San Francisco (1999)

    Google Scholar 

  4. Czajkowski, K., Fitzgerald, S., Foster, I., Kesselman, C.: Grid Information Services for Distributed Resource Sharing. In: 10th IEEE International Symposium on High Performance Distributed Computing, pp. 181–184. IEEE Press, New York (2001)

    Chapter  Google Scholar 

  5. Foster, I., Kesselman, C., Nick, J., Tuecke, S.: The Physiology of the Grid: an Open Grid Services Architecture for Distributed Systems Integration. Technical report, Global Grid Forum (2002)

    Google Scholar 

  6. National Center for Biotechnology Information, http://www.ncbi.nlm.nih.gov

  7. Chien, T.-I., Liao, T.-L.: Design of secure digital communication systems using chaotic modulation, cryptography and chaotic synchronization. J. Chaos, Solitons & Fractals 24(1), 241–255 (2005)

    MATH  Google Scholar 

  8. Penaud, S.: Etude des potentialités du chaos pour les systèmes de télécommunication: Evaluation des performances de systèmes à accès multiples a répartition par les codes (CDMA) utilisant des sequences d’étalement chaotiques: Thèse résentée à l’université de Limoges Faculté des Sciences le 06 Mars (2001)

    Google Scholar 

  9. Schimming, T., Hasler, M.: Optimal detection of differential chaos shift keying. J. IEEE Trans. Circuits Syst. 47(12), 1712–1719 (2000)

    Article  MathSciNet  MATH  Google Scholar 

  10. Carroll, T.L., Pecora, L.M.: Synchronizing hyperchaotic volume preserving maps and circuits. J. IEEE Trans. Circuits Syst. 45(6), 656–659 (1998)

    Article  Google Scholar 

  11. Lau, F.C.M.: Performance of Chaos-Based Communication Systems Under the Influence of Coexisting Conventional Spread-spectrum Systems. J. IEEE Trans. Actions on Circuits and Systems 50(11), 1475–1481 (2003)

    Article  Google Scholar 

  12. Lau, F.C.M., Tsey, C.K.: Optimum Correlator-Type Receiver Design For Csk Communication Systems. J. International Journal of Bifurcation and Chaos 12(5), 1029–1038 (2002)

    Article  Google Scholar 

  13. Kennedy, M.P., Kolumb, A.N.: Controlling Chaos and Bifurcations in Engineering Systems, pp. 477–500. CRC Press, NY (1999)

    Google Scholar 

  14. Han, C.-Y., Bao, X.-L., Wang, G.-Y.: A new digital chaotic cipher sequence and its property. Journal of Chongqing University of Posts and Telecommunications 22(3), 334–338

    Google Scholar 

  15. Ben Farah, M.A., Kachouri, A., Samet, M.: Design of secure digital communication systems using DCSK chaotic modulation. In: International Conference on DTIS 2006, pp. 200–204 (2006)

    Google Scholar 

  16. Jovic, B., Unsworth, C.P.: Fast synchronisation of chaotic maps for secure chaotic communications. J. Electronics Letters 46(1), 49–50 (2010)

    Article  Google Scholar 

  17. Hugues-Salas, O., Shore, K.A.: An Extended Kalman Filtering Approach to Nonlinear Time-Delay Systems: Application to Chaotic Secure Communications. J. Circuits and Systems I 57(9), 2520–2530 (2010)

    Article  MathSciNet  Google Scholar 

  18. Pisarchik, A.N., Ruiz-Oliveras, F.R.: Optical Chaotic Communication Using Generalized and Complete Synchronization. J. Quantum Electronics 46(3), 279–284 (2010)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2012 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Zhang, G., He, Lf., Zhang, Tq. (2012). A Secure Communication System Based on DCSK. In: Zhao, M., Sha, J. (eds) Communications and Information Processing. Communications in Computer and Information Science, vol 288. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-31965-5_16

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-31965-5_16

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-31964-8

  • Online ISBN: 978-3-642-31965-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics