Application of modified ICA to secure communications in chaotic systems

Shih Lin Lin, Pi Cheng Tung

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

10 Scopus citations

Abstract

Along with the increasingly quick development of modern communication system technologies, secure communication has become increasingly important. We propose a new method for secure communication systems. Independent component analysis (ICA) is employed to retrieve the message signal encrypted by a mixture of Gaussian white noise and chaotic noise. Unlike the traditional chaotic synchronization method, this method does not require knowing the basic Gaussian white noise and chaotic noise variables. However, the signals separated by traditional ICA shows opposite phase and unequal amplitude. Our study proposed a modified ICA, which can calculate accurately the phase and amplitude. The results showed that modified ICA could effectively extract the original message signal.

Original languageEnglish
Title of host publicationComputational Science and Its Applications - ICCSA 2007 - International Conference, Proceedings
PublisherSpringer Verlag
Pages431-444
Number of pages14
EditionPART 3
ISBN (Print)9783540744825
DOIs
StatePublished - 2007
EventInternational Conference on Computational Science and its Applications, ICCSA 2007 - Kuala Lumpur, Malaysia
Duration: 26 Aug 200729 Aug 2007

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
NumberPART 3
Volume4707 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

ConferenceInternational Conference on Computational Science and its Applications, ICCSA 2007
Country/TerritoryMalaysia
CityKuala Lumpur
Period26/08/0729/08/07

Keywords

  • Chaotic systems
  • Independent component analysis
  • Information retrieval
  • Secure communication

Fingerprint

Dive into the research topics of 'Application of modified ICA to secure communications in chaotic systems'. Together they form a unique fingerprint.

Cite this