Data encryption with chaotic Colpitts oscillators via power supply modulation

P. Canyelles-Pericas, R. Binns, Z. Ghassemlooy, K. Busawon

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

3 Citations (Scopus)

Abstract

In this work we present numerical investigations for a simple data modulating technique employing Colpitts electronic oscillator models operating in the chaotic regime. The procedure includes a low amplitude half-wave rectified sinusoidal function on top of power supply terms, which acts as a message embedded data. We show how the suggested method does not take away the transmitter's chaotic dynamics or the unidirectional complete chaotic synchronisation achieved. Advantages are in form of straightforward implementation that does not require hardware modifications as well as information recovery based on a simple subtraction. The proposed methodology can be applied to either positive or negative power supply. Traces of embedded data in the transmitted chaotic carrier cannot be spotted in time or frequency domain. In consequence the proposed method falls in the category of chaotic inclusion or embedding techniques but without requiring complex and computationally expensive left inversion protocols.

Original languageEnglish
Title of host publication2016 10th International Symposium on Communication Systems, Networks and Digital Signal Processing, CSNDSP 2016
PublisherIEEE
ISBN (Electronic)9781509025268
ISBN (Print)978-1-5090-2527-5
DOIs
Publication statusPublished - 22 Sep 2016
Event10th International Symposium on Communication Systems, Networks and Digital Signal Processing, CSNDSP 2016 - Prague, Czech Republic
Duration: 20 Jul 201623 Jul 2016

Conference

Conference10th International Symposium on Communication Systems, Networks and Digital Signal Processing, CSNDSP 2016
CountryCzech Republic
CityPrague
Period20/07/1623/07/16

Fingerprint Dive into the research topics of 'Data encryption with chaotic Colpitts oscillators via power supply modulation'. Together they form a unique fingerprint.

Cite this