Chaos, Cryptography and Communications
In this topical collection (23 articles)
-
Editorial
Chaos and Cryptography: A new dimension in secure communications
Santo Banerjee, J. Kurths Pages 1441-1445 -
Regular Article
Isochronal synchronization in networks and chaos-based TDMA communication
J.M.V. Grzybowski, E.E.N. Macau… Pages 1447-1463 -
Regular Article
Synchronization in coupled Ikeda delay systems
D. Valli, B. Muthuswamy, S. Banerjee… Pages 1465-1479 -
Regular Article
An LPV framework for chaos synchronization in communication
M. Halimi, G. Millérioux Pages 1481-1493 -
Regular Article
Synchronization of incommensurate non-identical fractional order chaotic systems using active control
S. Bhalekar Pages 1495-1508 -
Regular Article
Outer synchronization of networks with different node dynamics
A. Ray, A. Roychowdhury Pages 1509-1518 -
Regular Article
Controlling dynamical behavior of drive-response system through linear augmentation
Pooja Rani Sharma, Anupam Singh… Pages 1531-1539 -
Regular Article
Nonlinear observer for synchronization of chaotic systems with application to secure data transmission
Ricardo Aguilar-López… Pages 1541-1548 -
Regular Article
Parameter adaptation technique for rapid synchronization and secure communication
A.K. Mittal, A. Dwivedi, S. Dwivedi Pages 1549-1560 -
Regular Article
Phase synchronization of instrumental music signals
Sayan Mukherjee, Sanjay Kumar Palit… Pages 1561-1577 -
Regular Article
Control and synchronization of Chaotic Attitude Control of Satellite with Backstepping controller
K. Kemih, M. Halimi, M. Ghanes, H. Fanit… Pages 1579-1589 -
Regular Article
Dynamics of fractional-order sinusoidally forced simplified Lorenz system and its synchronization
Yan Wang, Kehui Sun, Shaobo He, Huihai Wang Pages 1591-1600 -
Regular Article
A fast and light stream cipher for smartphones
G. Vidal, M.S. Baptista, H. Mancini Pages 1601-1610 -
Regular Article
Image encryption using eight dimensional chaotic cat map
K. Ganesan, K. Murali Pages 1611-1622 -
Regular Article
Adaptive iterated function systems filter for images highly corrupted with fixed – Value impulse noise
P. Shanmugavadivu, P.S. Eliahim Jeevaraj Pages 1623-1634 -
Regular Article
Cryptanalysis and security improvement for selective image encryption
T.M. Hoang, D. Tran Pages 1635-1646 -
Regular Article
Biometric identification using local iterated function
N.M.G. Al-Saidi, M.R.M. Said Pages 1647-1662 -
Regular Article
Image encryption based on permutation-substitution using chaotic map and Latin Square Image Cipher
H.T. Panduranga, S.K. Naveen Kumar, Kiran Pages 1663-1677
Continue reading...
To view the rest of this content please follow the download PDF link above.