Highly-secured chaos-based communication system using cascaded masking technique and adaptive synchronization

Over the past years, many chaos-based secure communication system algorithms have been published for the encryption of different types of data. The problem with these algorithms is either the high complexity that makes them difficult to be implemented or the lack of the high security that prevents t...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:Multimedia tools and applications 2023-09, Vol.82 (22), p.34229-34258
Hauptverfasser: Bonny, Talal, Nassan, Wafaa Al, Vaidyanathan, Sundarapandian, Sambas, Aceng
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 34258
container_issue 22
container_start_page 34229
container_title Multimedia tools and applications
container_volume 82
creator Bonny, Talal
Nassan, Wafaa Al
Vaidyanathan, Sundarapandian
Sambas, Aceng
description Over the past years, many chaos-based secure communication system algorithms have been published for the encryption of different types of data. The problem with these algorithms is either the high complexity that makes them difficult to be implemented or the lack of the high security that prevents them from being applicable in real applications. In this paper, we propose a new highly-secured chaos-based communication system that is based on adaptive control synchronization. The implementation process of the proposed system is detailed including the oscillator dynamic equations, the control laws derivation, the numerical solutions, and the Matlab/Simulink representation. To show the efficiency of the proposed system, its security is analyzed using different security measures. This proofs that the carrier signal is unpredictable by the intruder in both time and frequency domains. The experimental results and the show that the proposed system outperforms the different related and recent work in addition to its stability and robustness to the variation of initial conditions. Finally, we introduce an application on voice encryption to demonstrate the effectiveness of our system. Then We compare the security results of our system with different implementations of recent and related work.
doi_str_mv 10.1007/s11042-023-14643-3
format Article
fullrecord <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_journals_2859995047</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>2859995047</sourcerecordid><originalsourceid>FETCH-LOGICAL-c319t-941a66e22faabb4b436a1a897b4dae9ba3eceeb71ec2ad6ee13468b5cfd5c0d73</originalsourceid><addsrcrecordid>eNp9kE9LxDAQxYsouK5-AU8Fz9H8a9MeZVFXELzoOUyS6bbrNl2TVlg_ve1W8OZpHsPvvRleklwzessoVXeRMSo5oVwQJnMpiDhJFixTgijF2emoRUGJyig7Ty5i3FLK8ozLRdKum029O5CIdgjoUltDF4mBOOmubQffWOibzqfxEHts0yE2fpNaiBbcyLQQP6ZFj7b2zeeAKXiXgoN933zhaPK2Dp1vvo8hl8lZBbuIV79zmbw_Pryt1uTl9el5df9CrGBlT0rJIM-R8wrAGGmkyIFBUSojHWBpQKBFNIqh5eByRCZkXpjMVi6z1CmxTG7m3H3oxp9ir7fdEPx4UvMiK8syo3Ki-EzZ0MUYsNL70LQQDppRPdWq51r1WKs-1qrFaBKzKY6w32D4i_7H9QOBWH6Y</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2859995047</pqid></control><display><type>article</type><title>Highly-secured chaos-based communication system using cascaded masking technique and adaptive synchronization</title><source>Springer Nature - Complete Springer Journals</source><creator>Bonny, Talal ; Nassan, Wafaa Al ; Vaidyanathan, Sundarapandian ; Sambas, Aceng</creator><creatorcontrib>Bonny, Talal ; Nassan, Wafaa Al ; Vaidyanathan, Sundarapandian ; Sambas, Aceng</creatorcontrib><description>Over the past years, many chaos-based secure communication system algorithms have been published for the encryption of different types of data. The problem with these algorithms is either the high complexity that makes them difficult to be implemented or the lack of the high security that prevents them from being applicable in real applications. In this paper, we propose a new highly-secured chaos-based communication system that is based on adaptive control synchronization. The implementation process of the proposed system is detailed including the oscillator dynamic equations, the control laws derivation, the numerical solutions, and the Matlab/Simulink representation. To show the efficiency of the proposed system, its security is analyzed using different security measures. This proofs that the carrier signal is unpredictable by the intruder in both time and frequency domains. The experimental results and the show that the proposed system outperforms the different related and recent work in addition to its stability and robustness to the variation of initial conditions. Finally, we introduce an application on voice encryption to demonstrate the effectiveness of our system. Then We compare the security results of our system with different implementations of recent and related work.</description><identifier>ISSN: 1380-7501</identifier><identifier>EISSN: 1573-7721</identifier><identifier>DOI: 10.1007/s11042-023-14643-3</identifier><language>eng</language><publisher>New York: Springer US</publisher><subject>Adaptive control ; Algorithms ; Communications systems ; Computer Communication Networks ; Computer Science ; Control theory ; Data Structures and Information Theory ; Initial conditions ; Multimedia Information Systems ; Robustness (mathematics) ; Security ; Special Purpose and Application-Based Systems ; Synchronism ; Voice communication</subject><ispartof>Multimedia tools and applications, 2023-09, Vol.82 (22), p.34229-34258</ispartof><rights>The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature 2023. Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c319t-941a66e22faabb4b436a1a897b4dae9ba3eceeb71ec2ad6ee13468b5cfd5c0d73</citedby><cites>FETCH-LOGICAL-c319t-941a66e22faabb4b436a1a897b4dae9ba3eceeb71ec2ad6ee13468b5cfd5c0d73</cites><orcidid>0000-0003-1111-0304</orcidid></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktopdf>$$Uhttps://link.springer.com/content/pdf/10.1007/s11042-023-14643-3$$EPDF$$P50$$Gspringer$$H</linktopdf><linktohtml>$$Uhttps://link.springer.com/10.1007/s11042-023-14643-3$$EHTML$$P50$$Gspringer$$H</linktohtml><link.rule.ids>314,776,780,27903,27904,41467,42536,51297</link.rule.ids></links><search><creatorcontrib>Bonny, Talal</creatorcontrib><creatorcontrib>Nassan, Wafaa Al</creatorcontrib><creatorcontrib>Vaidyanathan, Sundarapandian</creatorcontrib><creatorcontrib>Sambas, Aceng</creatorcontrib><title>Highly-secured chaos-based communication system using cascaded masking technique and adaptive synchronization</title><title>Multimedia tools and applications</title><addtitle>Multimed Tools Appl</addtitle><description>Over the past years, many chaos-based secure communication system algorithms have been published for the encryption of different types of data. The problem with these algorithms is either the high complexity that makes them difficult to be implemented or the lack of the high security that prevents them from being applicable in real applications. In this paper, we propose a new highly-secured chaos-based communication system that is based on adaptive control synchronization. The implementation process of the proposed system is detailed including the oscillator dynamic equations, the control laws derivation, the numerical solutions, and the Matlab/Simulink representation. To show the efficiency of the proposed system, its security is analyzed using different security measures. This proofs that the carrier signal is unpredictable by the intruder in both time and frequency domains. The experimental results and the show that the proposed system outperforms the different related and recent work in addition to its stability and robustness to the variation of initial conditions. Finally, we introduce an application on voice encryption to demonstrate the effectiveness of our system. Then We compare the security results of our system with different implementations of recent and related work.</description><subject>Adaptive control</subject><subject>Algorithms</subject><subject>Communications systems</subject><subject>Computer Communication Networks</subject><subject>Computer Science</subject><subject>Control theory</subject><subject>Data Structures and Information Theory</subject><subject>Initial conditions</subject><subject>Multimedia Information Systems</subject><subject>Robustness (mathematics)</subject><subject>Security</subject><subject>Special Purpose and Application-Based Systems</subject><subject>Synchronism</subject><subject>Voice communication</subject><issn>1380-7501</issn><issn>1573-7721</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2023</creationdate><recordtype>article</recordtype><sourceid>8G5</sourceid><sourceid>ABUWG</sourceid><sourceid>AFKRA</sourceid><sourceid>AZQEC</sourceid><sourceid>BENPR</sourceid><sourceid>CCPQU</sourceid><sourceid>DWQXO</sourceid><sourceid>GNUQQ</sourceid><sourceid>GUQSH</sourceid><sourceid>M2O</sourceid><recordid>eNp9kE9LxDAQxYsouK5-AU8Fz9H8a9MeZVFXELzoOUyS6bbrNl2TVlg_ve1W8OZpHsPvvRleklwzessoVXeRMSo5oVwQJnMpiDhJFixTgijF2emoRUGJyig7Ty5i3FLK8ozLRdKum029O5CIdgjoUltDF4mBOOmubQffWOibzqfxEHts0yE2fpNaiBbcyLQQP6ZFj7b2zeeAKXiXgoN933zhaPK2Dp1vvo8hl8lZBbuIV79zmbw_Pryt1uTl9el5df9CrGBlT0rJIM-R8wrAGGmkyIFBUSojHWBpQKBFNIqh5eByRCZkXpjMVi6z1CmxTG7m3H3oxp9ir7fdEPx4UvMiK8syo3Ki-EzZ0MUYsNL70LQQDppRPdWq51r1WKs-1qrFaBKzKY6w32D4i_7H9QOBWH6Y</recordid><startdate>20230901</startdate><enddate>20230901</enddate><creator>Bonny, Talal</creator><creator>Nassan, Wafaa Al</creator><creator>Vaidyanathan, Sundarapandian</creator><creator>Sambas, Aceng</creator><general>Springer US</general><general>Springer Nature B.V</general><scope>AAYXX</scope><scope>CITATION</scope><scope>3V.</scope><scope>7SC</scope><scope>7WY</scope><scope>7WZ</scope><scope>7XB</scope><scope>87Z</scope><scope>8AL</scope><scope>8AO</scope><scope>8FD</scope><scope>8FE</scope><scope>8FG</scope><scope>8FK</scope><scope>8FL</scope><scope>8G5</scope><scope>ABUWG</scope><scope>AFKRA</scope><scope>ARAPS</scope><scope>AZQEC</scope><scope>BENPR</scope><scope>BEZIV</scope><scope>BGLVJ</scope><scope>CCPQU</scope><scope>DWQXO</scope><scope>FRNLG</scope><scope>F~G</scope><scope>GNUQQ</scope><scope>GUQSH</scope><scope>HCIFZ</scope><scope>JQ2</scope><scope>K60</scope><scope>K6~</scope><scope>K7-</scope><scope>L.-</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope><scope>M0C</scope><scope>M0N</scope><scope>M2O</scope><scope>MBDVC</scope><scope>P5Z</scope><scope>P62</scope><scope>PQBIZ</scope><scope>PQBZA</scope><scope>PQEST</scope><scope>PQQKQ</scope><scope>PQUKI</scope><scope>Q9U</scope><orcidid>https://orcid.org/0000-0003-1111-0304</orcidid></search><sort><creationdate>20230901</creationdate><title>Highly-secured chaos-based communication system using cascaded masking technique and adaptive synchronization</title><author>Bonny, Talal ; Nassan, Wafaa Al ; Vaidyanathan, Sundarapandian ; Sambas, Aceng</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c319t-941a66e22faabb4b436a1a897b4dae9ba3eceeb71ec2ad6ee13468b5cfd5c0d73</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2023</creationdate><topic>Adaptive control</topic><topic>Algorithms</topic><topic>Communications systems</topic><topic>Computer Communication Networks</topic><topic>Computer Science</topic><topic>Control theory</topic><topic>Data Structures and Information Theory</topic><topic>Initial conditions</topic><topic>Multimedia Information Systems</topic><topic>Robustness (mathematics)</topic><topic>Security</topic><topic>Special Purpose and Application-Based Systems</topic><topic>Synchronism</topic><topic>Voice communication</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Bonny, Talal</creatorcontrib><creatorcontrib>Nassan, Wafaa Al</creatorcontrib><creatorcontrib>Vaidyanathan, Sundarapandian</creatorcontrib><creatorcontrib>Sambas, Aceng</creatorcontrib><collection>CrossRef</collection><collection>ProQuest Central (Corporate)</collection><collection>Computer and Information Systems Abstracts</collection><collection>ABI/INFORM Collection</collection><collection>ABI/INFORM Global (PDF only)</collection><collection>ProQuest Central (purchase pre-March 2016)</collection><collection>ABI/INFORM Global (Alumni Edition)</collection><collection>Computing Database (Alumni Edition)</collection><collection>ProQuest Pharma Collection</collection><collection>Technology Research Database</collection><collection>ProQuest SciTech Collection</collection><collection>ProQuest Technology Collection</collection><collection>ProQuest Central (Alumni) (purchase pre-March 2016)</collection><collection>ABI/INFORM Collection (Alumni Edition)</collection><collection>Research Library (Alumni Edition)</collection><collection>ProQuest Central (Alumni Edition)</collection><collection>ProQuest Central UK/Ireland</collection><collection>Advanced Technologies &amp; Aerospace Collection</collection><collection>ProQuest Central Essentials</collection><collection>ProQuest Central</collection><collection>Business Premium Collection</collection><collection>Technology Collection</collection><collection>ProQuest One Community College</collection><collection>ProQuest Central Korea</collection><collection>Business Premium Collection (Alumni)</collection><collection>ABI/INFORM Global (Corporate)</collection><collection>ProQuest Central Student</collection><collection>Research Library Prep</collection><collection>SciTech Premium Collection</collection><collection>ProQuest Computer Science Collection</collection><collection>ProQuest Business Collection (Alumni Edition)</collection><collection>ProQuest Business Collection</collection><collection>Computer Science Database</collection><collection>ABI/INFORM Professional Advanced</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts – Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><collection>ABI/INFORM Global</collection><collection>Computing Database</collection><collection>Research Library</collection><collection>Research Library (Corporate)</collection><collection>Advanced Technologies &amp; Aerospace Database</collection><collection>ProQuest Advanced Technologies &amp; Aerospace Collection</collection><collection>ProQuest One Business</collection><collection>ProQuest One Business (Alumni)</collection><collection>ProQuest One Academic Eastern Edition (DO NOT USE)</collection><collection>ProQuest One Academic</collection><collection>ProQuest One Academic UKI Edition</collection><collection>ProQuest Central Basic</collection><jtitle>Multimedia tools and applications</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Bonny, Talal</au><au>Nassan, Wafaa Al</au><au>Vaidyanathan, Sundarapandian</au><au>Sambas, Aceng</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Highly-secured chaos-based communication system using cascaded masking technique and adaptive synchronization</atitle><jtitle>Multimedia tools and applications</jtitle><stitle>Multimed Tools Appl</stitle><date>2023-09-01</date><risdate>2023</risdate><volume>82</volume><issue>22</issue><spage>34229</spage><epage>34258</epage><pages>34229-34258</pages><issn>1380-7501</issn><eissn>1573-7721</eissn><abstract>Over the past years, many chaos-based secure communication system algorithms have been published for the encryption of different types of data. The problem with these algorithms is either the high complexity that makes them difficult to be implemented or the lack of the high security that prevents them from being applicable in real applications. In this paper, we propose a new highly-secured chaos-based communication system that is based on adaptive control synchronization. The implementation process of the proposed system is detailed including the oscillator dynamic equations, the control laws derivation, the numerical solutions, and the Matlab/Simulink representation. To show the efficiency of the proposed system, its security is analyzed using different security measures. This proofs that the carrier signal is unpredictable by the intruder in both time and frequency domains. The experimental results and the show that the proposed system outperforms the different related and recent work in addition to its stability and robustness to the variation of initial conditions. Finally, we introduce an application on voice encryption to demonstrate the effectiveness of our system. Then We compare the security results of our system with different implementations of recent and related work.</abstract><cop>New York</cop><pub>Springer US</pub><doi>10.1007/s11042-023-14643-3</doi><tpages>30</tpages><orcidid>https://orcid.org/0000-0003-1111-0304</orcidid></addata></record>
fulltext fulltext
identifier ISSN: 1380-7501
ispartof Multimedia tools and applications, 2023-09, Vol.82 (22), p.34229-34258
issn 1380-7501
1573-7721
language eng
recordid cdi_proquest_journals_2859995047
source Springer Nature - Complete Springer Journals
subjects Adaptive control
Algorithms
Communications systems
Computer Communication Networks
Computer Science
Control theory
Data Structures and Information Theory
Initial conditions
Multimedia Information Systems
Robustness (mathematics)
Security
Special Purpose and Application-Based Systems
Synchronism
Voice communication
title Highly-secured chaos-based communication system using cascaded masking technique and adaptive synchronization
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-23T20%3A55%3A21IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Highly-secured%20chaos-based%20communication%20system%20using%20cascaded%20masking%20technique%20and%20adaptive%20synchronization&rft.jtitle=Multimedia%20tools%20and%20applications&rft.au=Bonny,%20Talal&rft.date=2023-09-01&rft.volume=82&rft.issue=22&rft.spage=34229&rft.epage=34258&rft.pages=34229-34258&rft.issn=1380-7501&rft.eissn=1573-7721&rft_id=info:doi/10.1007/s11042-023-14643-3&rft_dat=%3Cproquest_cross%3E2859995047%3C/proquest_cross%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=2859995047&rft_id=info:pmid/&rfr_iscdi=true