Highly-secured chaos-based communication system using cascaded masking technique and adaptive synchronization
Over the past years, many chaos-based secure communication system algorithms have been published for the encryption of different types of data. The problem with these algorithms is either the high complexity that makes them difficult to be implemented or the lack of the high security that prevents t...
Gespeichert in:
Veröffentlicht in: | Multimedia tools and applications 2023-09, Vol.82 (22), p.34229-34258 |
---|---|
Hauptverfasser: | , , , |
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 34258 |
---|---|
container_issue | 22 |
container_start_page | 34229 |
container_title | Multimedia tools and applications |
container_volume | 82 |
creator | Bonny, Talal Nassan, Wafaa Al Vaidyanathan, Sundarapandian Sambas, Aceng |
description | Over the past years, many chaos-based secure communication system algorithms have been published for the encryption of different types of data. The problem with these algorithms is either the high complexity that makes them difficult to be implemented or the lack of the high security that prevents them from being applicable in real applications. In this paper, we propose a new highly-secured chaos-based communication system that is based on adaptive control synchronization. The implementation process of the proposed system is detailed including the oscillator dynamic equations, the control laws derivation, the numerical solutions, and the Matlab/Simulink representation. To show the efficiency of the proposed system, its security is analyzed using different security measures. This proofs that the carrier signal is unpredictable by the intruder in both time and frequency domains. The experimental results and the show that the proposed system outperforms the different related and recent work in addition to its stability and robustness to the variation of initial conditions. Finally, we introduce an application on voice encryption to demonstrate the effectiveness of our system. Then We compare the security results of our system with different implementations of recent and related work. |
doi_str_mv | 10.1007/s11042-023-14643-3 |
format | Article |
fullrecord | <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_journals_2859995047</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>2859995047</sourcerecordid><originalsourceid>FETCH-LOGICAL-c319t-941a66e22faabb4b436a1a897b4dae9ba3eceeb71ec2ad6ee13468b5cfd5c0d73</originalsourceid><addsrcrecordid>eNp9kE9LxDAQxYsouK5-AU8Fz9H8a9MeZVFXELzoOUyS6bbrNl2TVlg_ve1W8OZpHsPvvRleklwzessoVXeRMSo5oVwQJnMpiDhJFixTgijF2emoRUGJyig7Ty5i3FLK8ozLRdKum029O5CIdgjoUltDF4mBOOmubQffWOibzqfxEHts0yE2fpNaiBbcyLQQP6ZFj7b2zeeAKXiXgoN933zhaPK2Dp1vvo8hl8lZBbuIV79zmbw_Pryt1uTl9el5df9CrGBlT0rJIM-R8wrAGGmkyIFBUSojHWBpQKBFNIqh5eByRCZkXpjMVi6z1CmxTG7m3H3oxp9ir7fdEPx4UvMiK8syo3Ki-EzZ0MUYsNL70LQQDppRPdWq51r1WKs-1qrFaBKzKY6w32D4i_7H9QOBWH6Y</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2859995047</pqid></control><display><type>article</type><title>Highly-secured chaos-based communication system using cascaded masking technique and adaptive synchronization</title><source>Springer Nature - Complete Springer Journals</source><creator>Bonny, Talal ; Nassan, Wafaa Al ; Vaidyanathan, Sundarapandian ; Sambas, Aceng</creator><creatorcontrib>Bonny, Talal ; Nassan, Wafaa Al ; Vaidyanathan, Sundarapandian ; Sambas, Aceng</creatorcontrib><description>Over the past years, many chaos-based secure communication system algorithms have been published for the encryption of different types of data. The problem with these algorithms is either the high complexity that makes them difficult to be implemented or the lack of the high security that prevents them from being applicable in real applications. In this paper, we propose a new highly-secured chaos-based communication system that is based on adaptive control synchronization. The implementation process of the proposed system is detailed including the oscillator dynamic equations, the control laws derivation, the numerical solutions, and the Matlab/Simulink representation. To show the efficiency of the proposed system, its security is analyzed using different security measures. This proofs that the carrier signal is unpredictable by the intruder in both time and frequency domains. The experimental results and the show that the proposed system outperforms the different related and recent work in addition to its stability and robustness to the variation of initial conditions. Finally, we introduce an application on voice encryption to demonstrate the effectiveness of our system. Then We compare the security results of our system with different implementations of recent and related work.</description><identifier>ISSN: 1380-7501</identifier><identifier>EISSN: 1573-7721</identifier><identifier>DOI: 10.1007/s11042-023-14643-3</identifier><language>eng</language><publisher>New York: Springer US</publisher><subject>Adaptive control ; Algorithms ; Communications systems ; Computer Communication Networks ; Computer Science ; Control theory ; Data Structures and Information Theory ; Initial conditions ; Multimedia Information Systems ; Robustness (mathematics) ; Security ; Special Purpose and Application-Based Systems ; Synchronism ; Voice communication</subject><ispartof>Multimedia tools and applications, 2023-09, Vol.82 (22), p.34229-34258</ispartof><rights>The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature 2023. Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c319t-941a66e22faabb4b436a1a897b4dae9ba3eceeb71ec2ad6ee13468b5cfd5c0d73</citedby><cites>FETCH-LOGICAL-c319t-941a66e22faabb4b436a1a897b4dae9ba3eceeb71ec2ad6ee13468b5cfd5c0d73</cites><orcidid>0000-0003-1111-0304</orcidid></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktopdf>$$Uhttps://link.springer.com/content/pdf/10.1007/s11042-023-14643-3$$EPDF$$P50$$Gspringer$$H</linktopdf><linktohtml>$$Uhttps://link.springer.com/10.1007/s11042-023-14643-3$$EHTML$$P50$$Gspringer$$H</linktohtml><link.rule.ids>314,776,780,27903,27904,41467,42536,51297</link.rule.ids></links><search><creatorcontrib>Bonny, Talal</creatorcontrib><creatorcontrib>Nassan, Wafaa Al</creatorcontrib><creatorcontrib>Vaidyanathan, Sundarapandian</creatorcontrib><creatorcontrib>Sambas, Aceng</creatorcontrib><title>Highly-secured chaos-based communication system using cascaded masking technique and adaptive synchronization</title><title>Multimedia tools and applications</title><addtitle>Multimed Tools Appl</addtitle><description>Over the past years, many chaos-based secure communication system algorithms have been published for the encryption of different types of data. The problem with these algorithms is either the high complexity that makes them difficult to be implemented or the lack of the high security that prevents them from being applicable in real applications. In this paper, we propose a new highly-secured chaos-based communication system that is based on adaptive control synchronization. The implementation process of the proposed system is detailed including the oscillator dynamic equations, the control laws derivation, the numerical solutions, and the Matlab/Simulink representation. To show the efficiency of the proposed system, its security is analyzed using different security measures. This proofs that the carrier signal is unpredictable by the intruder in both time and frequency domains. The experimental results and the show that the proposed system outperforms the different related and recent work in addition to its stability and robustness to the variation of initial conditions. Finally, we introduce an application on voice encryption to demonstrate the effectiveness of our system. Then We compare the security results of our system with different implementations of recent and related work.</description><subject>Adaptive control</subject><subject>Algorithms</subject><subject>Communications systems</subject><subject>Computer Communication Networks</subject><subject>Computer Science</subject><subject>Control theory</subject><subject>Data Structures and Information Theory</subject><subject>Initial conditions</subject><subject>Multimedia Information Systems</subject><subject>Robustness (mathematics)</subject><subject>Security</subject><subject>Special Purpose and Application-Based Systems</subject><subject>Synchronism</subject><subject>Voice communication</subject><issn>1380-7501</issn><issn>1573-7721</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2023</creationdate><recordtype>article</recordtype><sourceid>8G5</sourceid><sourceid>ABUWG</sourceid><sourceid>AFKRA</sourceid><sourceid>AZQEC</sourceid><sourceid>BENPR</sourceid><sourceid>CCPQU</sourceid><sourceid>DWQXO</sourceid><sourceid>GNUQQ</sourceid><sourceid>GUQSH</sourceid><sourceid>M2O</sourceid><recordid>eNp9kE9LxDAQxYsouK5-AU8Fz9H8a9MeZVFXELzoOUyS6bbrNl2TVlg_ve1W8OZpHsPvvRleklwzessoVXeRMSo5oVwQJnMpiDhJFixTgijF2emoRUGJyig7Ty5i3FLK8ozLRdKum029O5CIdgjoUltDF4mBOOmubQffWOibzqfxEHts0yE2fpNaiBbcyLQQP6ZFj7b2zeeAKXiXgoN933zhaPK2Dp1vvo8hl8lZBbuIV79zmbw_Pryt1uTl9el5df9CrGBlT0rJIM-R8wrAGGmkyIFBUSojHWBpQKBFNIqh5eByRCZkXpjMVi6z1CmxTG7m3H3oxp9ir7fdEPx4UvMiK8syo3Ki-EzZ0MUYsNL70LQQDppRPdWq51r1WKs-1qrFaBKzKY6w32D4i_7H9QOBWH6Y</recordid><startdate>20230901</startdate><enddate>20230901</enddate><creator>Bonny, Talal</creator><creator>Nassan, Wafaa Al</creator><creator>Vaidyanathan, Sundarapandian</creator><creator>Sambas, Aceng</creator><general>Springer US</general><general>Springer Nature B.V</general><scope>AAYXX</scope><scope>CITATION</scope><scope>3V.</scope><scope>7SC</scope><scope>7WY</scope><scope>7WZ</scope><scope>7XB</scope><scope>87Z</scope><scope>8AL</scope><scope>8AO</scope><scope>8FD</scope><scope>8FE</scope><scope>8FG</scope><scope>8FK</scope><scope>8FL</scope><scope>8G5</scope><scope>ABUWG</scope><scope>AFKRA</scope><scope>ARAPS</scope><scope>AZQEC</scope><scope>BENPR</scope><scope>BEZIV</scope><scope>BGLVJ</scope><scope>CCPQU</scope><scope>DWQXO</scope><scope>FRNLG</scope><scope>F~G</scope><scope>GNUQQ</scope><scope>GUQSH</scope><scope>HCIFZ</scope><scope>JQ2</scope><scope>K60</scope><scope>K6~</scope><scope>K7-</scope><scope>L.-</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope><scope>M0C</scope><scope>M0N</scope><scope>M2O</scope><scope>MBDVC</scope><scope>P5Z</scope><scope>P62</scope><scope>PQBIZ</scope><scope>PQBZA</scope><scope>PQEST</scope><scope>PQQKQ</scope><scope>PQUKI</scope><scope>Q9U</scope><orcidid>https://orcid.org/0000-0003-1111-0304</orcidid></search><sort><creationdate>20230901</creationdate><title>Highly-secured chaos-based communication system using cascaded masking technique and adaptive synchronization</title><author>Bonny, Talal ; Nassan, Wafaa Al ; Vaidyanathan, Sundarapandian ; Sambas, Aceng</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c319t-941a66e22faabb4b436a1a897b4dae9ba3eceeb71ec2ad6ee13468b5cfd5c0d73</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2023</creationdate><topic>Adaptive control</topic><topic>Algorithms</topic><topic>Communications systems</topic><topic>Computer Communication Networks</topic><topic>Computer Science</topic><topic>Control theory</topic><topic>Data Structures and Information Theory</topic><topic>Initial conditions</topic><topic>Multimedia Information Systems</topic><topic>Robustness (mathematics)</topic><topic>Security</topic><topic>Special Purpose and Application-Based Systems</topic><topic>Synchronism</topic><topic>Voice communication</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Bonny, Talal</creatorcontrib><creatorcontrib>Nassan, Wafaa Al</creatorcontrib><creatorcontrib>Vaidyanathan, Sundarapandian</creatorcontrib><creatorcontrib>Sambas, Aceng</creatorcontrib><collection>CrossRef</collection><collection>ProQuest Central (Corporate)</collection><collection>Computer and Information Systems Abstracts</collection><collection>ABI/INFORM Collection</collection><collection>ABI/INFORM Global (PDF only)</collection><collection>ProQuest Central (purchase pre-March 2016)</collection><collection>ABI/INFORM Global (Alumni Edition)</collection><collection>Computing Database (Alumni Edition)</collection><collection>ProQuest Pharma Collection</collection><collection>Technology Research Database</collection><collection>ProQuest SciTech Collection</collection><collection>ProQuest Technology Collection</collection><collection>ProQuest Central (Alumni) (purchase pre-March 2016)</collection><collection>ABI/INFORM Collection (Alumni Edition)</collection><collection>Research Library (Alumni Edition)</collection><collection>ProQuest Central (Alumni Edition)</collection><collection>ProQuest Central UK/Ireland</collection><collection>Advanced Technologies & Aerospace Collection</collection><collection>ProQuest Central Essentials</collection><collection>ProQuest Central</collection><collection>Business Premium Collection</collection><collection>Technology Collection</collection><collection>ProQuest One Community College</collection><collection>ProQuest Central Korea</collection><collection>Business Premium Collection (Alumni)</collection><collection>ABI/INFORM Global (Corporate)</collection><collection>ProQuest Central Student</collection><collection>Research Library Prep</collection><collection>SciTech Premium Collection</collection><collection>ProQuest Computer Science Collection</collection><collection>ProQuest Business Collection (Alumni Edition)</collection><collection>ProQuest Business Collection</collection><collection>Computer Science Database</collection><collection>ABI/INFORM Professional Advanced</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><collection>ABI/INFORM Global</collection><collection>Computing Database</collection><collection>Research Library</collection><collection>Research Library (Corporate)</collection><collection>Advanced Technologies & Aerospace Database</collection><collection>ProQuest Advanced Technologies & Aerospace Collection</collection><collection>ProQuest One Business</collection><collection>ProQuest One Business (Alumni)</collection><collection>ProQuest One Academic Eastern Edition (DO NOT USE)</collection><collection>ProQuest One Academic</collection><collection>ProQuest One Academic UKI Edition</collection><collection>ProQuest Central Basic</collection><jtitle>Multimedia tools and applications</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Bonny, Talal</au><au>Nassan, Wafaa Al</au><au>Vaidyanathan, Sundarapandian</au><au>Sambas, Aceng</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Highly-secured chaos-based communication system using cascaded masking technique and adaptive synchronization</atitle><jtitle>Multimedia tools and applications</jtitle><stitle>Multimed Tools Appl</stitle><date>2023-09-01</date><risdate>2023</risdate><volume>82</volume><issue>22</issue><spage>34229</spage><epage>34258</epage><pages>34229-34258</pages><issn>1380-7501</issn><eissn>1573-7721</eissn><abstract>Over the past years, many chaos-based secure communication system algorithms have been published for the encryption of different types of data. The problem with these algorithms is either the high complexity that makes them difficult to be implemented or the lack of the high security that prevents them from being applicable in real applications. In this paper, we propose a new highly-secured chaos-based communication system that is based on adaptive control synchronization. The implementation process of the proposed system is detailed including the oscillator dynamic equations, the control laws derivation, the numerical solutions, and the Matlab/Simulink representation. To show the efficiency of the proposed system, its security is analyzed using different security measures. This proofs that the carrier signal is unpredictable by the intruder in both time and frequency domains. The experimental results and the show that the proposed system outperforms the different related and recent work in addition to its stability and robustness to the variation of initial conditions. Finally, we introduce an application on voice encryption to demonstrate the effectiveness of our system. Then We compare the security results of our system with different implementations of recent and related work.</abstract><cop>New York</cop><pub>Springer US</pub><doi>10.1007/s11042-023-14643-3</doi><tpages>30</tpages><orcidid>https://orcid.org/0000-0003-1111-0304</orcidid></addata></record> |
fulltext | fulltext |
identifier | ISSN: 1380-7501 |
ispartof | Multimedia tools and applications, 2023-09, Vol.82 (22), p.34229-34258 |
issn | 1380-7501 1573-7721 |
language | eng |
recordid | cdi_proquest_journals_2859995047 |
source | Springer Nature - Complete Springer Journals |
subjects | Adaptive control Algorithms Communications systems Computer Communication Networks Computer Science Control theory Data Structures and Information Theory Initial conditions Multimedia Information Systems Robustness (mathematics) Security Special Purpose and Application-Based Systems Synchronism Voice communication |
title | Highly-secured chaos-based communication system using cascaded masking technique and adaptive synchronization |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-23T20%3A55%3A21IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Highly-secured%20chaos-based%20communication%20system%20using%20cascaded%20masking%20technique%20and%20adaptive%20synchronization&rft.jtitle=Multimedia%20tools%20and%20applications&rft.au=Bonny,%20Talal&rft.date=2023-09-01&rft.volume=82&rft.issue=22&rft.spage=34229&rft.epage=34258&rft.pages=34229-34258&rft.issn=1380-7501&rft.eissn=1573-7721&rft_id=info:doi/10.1007/s11042-023-14643-3&rft_dat=%3Cproquest_cross%3E2859995047%3C/proquest_cross%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=2859995047&rft_id=info:pmid/&rfr_iscdi=true |