2006 | OriginalPaper | Chapter
Communication Method for Chaotic Encryption in Remote Monitoring Systems for Product e-Manufacturing and e-Maintenance
Authors : Chengliang Liu, Kun Xie, Y.B. Miao, Xuan F Zha, Zhengjin Feng, Jay Lee
Published in: Applied Soft Computing Technologies: The Challenge of Complexity
Publisher: Springer Berlin Heidelberg
Activate our intelligent search to find suitable subject content or patents.
Select sections of text to find matching patents with Artificial Intelligence. powered by
Select sections of text to find additional relevant content using AI-assisted search. powered by
In chaotic cryptosystems, it is recognized that using (very) high dimensional chaotic attractors for encrypting a given message may improve the privacy of chaotic encoding. In this paper, we study a kind of hyperchaotic systems using some classical methods. The results show that besides the high dimension, the sub-Nyquist sampling interval is also an important factor that can improve the security of the chaotic cryptosystems. We use the method of time series analysis to verify the result.