Abstract
This study aims to determine the best encryption technique to assure the security of transmitted information. The authors concentrate on three main encryption schemes: CSK (chaos shift keying), CMO (chaos modulation) and CMA (chaos masking). In CSK the message is encoded by switching the transmitter injected current between two states, CMO is based on the modulation of chaotic carrier generated by the transmitter laser and finally in CMA the encoding is achieved by adding the message to the chaotic transmitter output. This study also evaluates the efficiency of the masking and its dependence on the message amplitude and bit rate. The quality of the message recovery is investigated through the correlation coefficient technique. Particular attention is paid to the influence of the parameter mismatch between emitter and receiver.
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have
Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.