{"id":"https://openalex.org/W2908826203","doi":"https://doi.org/10.1109/smc.2018.00310","title":"A Novel Differential-Chaos-Shift-Keying Secure Communication Scheme","display_name":"A Novel Differential-Chaos-Shift-Keying Secure Communication Scheme","publication_year":2018,"publication_date":"2018-10-01","ids":{"openalex":"https://openalex.org/W2908826203","doi":"https://doi.org/10.1109/smc.2018.00310","mag":"2908826203"},"language":"en","primary_location":{"is_oa":false,"landing_page_url":"https://doi.org/10.1109/smc.2018.00310","pdf_url":null,"source":null,"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false},"type":"article","type_crossref":"proceedings-article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5054556630","display_name":"Hang Cai","orcid":null},"institutions":[{"id":"https://openalex.org/I204983213","display_name":"Harbin Institute of Technology","ror":"https://ror.org/01yqg2h08","country_code":"CN","type":"education","lineage":["https://openalex.org/I204983213"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Hang Cai","raw_affiliation_strings":["School of Computer Science and Technology, Harbin Institute of Technology, Shenzhen, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Technology, Harbin Institute of Technology, Shenzhen, China","institution_ids":["https://openalex.org/I204983213"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5007080915","display_name":"Zhongyun Hua","orcid":"https://orcid.org/0000-0002-3529-0541"},"institutions":[{"id":"https://openalex.org/I204983213","display_name":"Harbin Institute of Technology","ror":"https://ror.org/01yqg2h08","country_code":"CN","type":"education","lineage":["https://openalex.org/I204983213"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zhongyun Hua","raw_affiliation_strings":["School of Computer Science and Technology, Harbin Institute of Technology, Shenzhen, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Technology, Harbin Institute of Technology, Shenzhen, China","institution_ids":["https://openalex.org/I204983213"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5102748055","display_name":"Hejiao Huang","orcid":"https://orcid.org/0000-0001-8728-3012"},"institutions":[{"id":"https://openalex.org/I204983213","display_name":"Harbin Institute of Technology","ror":"https://ror.org/01yqg2h08","country_code":"CN","type":"education","lineage":["https://openalex.org/I204983213"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Hejiao Huang","raw_affiliation_strings":["School of Computer Science and Technology, Harbin Institute of Technology, Shenzhen, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Technology, Harbin Institute of Technology, Shenzhen, China","institution_ids":["https://openalex.org/I204983213"]}]}],"institution_assertions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.257,"has_fulltext":true,"fulltext_origin":"ngrams","cited_by_count":4,"citation_normalized_percentile":{"value":0.409085,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":77,"max":79},"biblio":{"volume":null,"issue":null,"first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"primary_topic":{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image Encryption Techniques","score":0.9999,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image Encryption Techniques","score":0.9999,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12162","display_name":"Theory and Applications of Cellular Automata","score":0.9957,"subfield":{"id":"https://openalex.org/subfields/1703","display_name":"Computational Theory and Mathematics"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12946","display_name":"Genomic Signal Processing and Analysis Techniques","score":0.9922,"subfield":{"id":"https://openalex.org/subfields/1312","display_name":"Molecular Biology"},"field":{"id":"https://openalex.org/fields/13","display_name":"Biochemistry, Genetics and Molecular Biology"},"domain":{"id":"https://openalex.org/domains/1","display_name":"Life Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/color-image-encryption","display_name":"Color Image Encryption","score":0.523296},{"id":"https://openalex.org/keywords/modulation","display_name":"Modulation (music)","score":0.49937987}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7413609},{"id":"https://openalex.org/C47798520","wikidata":"https://www.wikidata.org/wiki/Q190157","display_name":"Transmitter","level":3,"score":0.67766404},{"id":"https://openalex.org/C169334058","wikidata":"https://www.wikidata.org/wiki/Q353292","display_name":"Additive white Gaussian noise","level":3,"score":0.6606925},{"id":"https://openalex.org/C56296756","wikidata":"https://www.wikidata.org/wiki/Q840922","display_name":"Bit error rate","level":3,"score":0.619741},{"id":"https://openalex.org/C2776542216","wikidata":"https://www.wikidata.org/wiki/Q6398306","display_name":"Keying","level":2,"score":0.6040003},{"id":"https://openalex.org/C761482","wikidata":"https://www.wikidata.org/wiki/Q118093","display_name":"Transmission (telecommunications)","level":2,"score":0.5859318},{"id":"https://openalex.org/C2777052490","wikidata":"https://www.wikidata.org/wiki/Q5072826","display_name":"Chaotic","level":2,"score":0.5813068},{"id":"https://openalex.org/C123079801","wikidata":"https://www.wikidata.org/wiki/Q750240","display_name":"Modulation (music)","level":2,"score":0.49937987},{"id":"https://openalex.org/C126042441","wikidata":"https://www.wikidata.org/wiki/Q1324888","display_name":"Frame (networking)","level":2,"score":0.48629293},{"id":"https://openalex.org/C24326235","wikidata":"https://www.wikidata.org/wiki/Q126095","display_name":"Electronic engineering","level":1,"score":0.4589402},{"id":"https://openalex.org/C57273362","wikidata":"https://www.wikidata.org/wiki/Q576722","display_name":"Decoding methods","level":2,"score":0.45697698},{"id":"https://openalex.org/C127162648","wikidata":"https://www.wikidata.org/wiki/Q16858953","display_name":"Channel (broadcasting)","level":2,"score":0.43383014},{"id":"https://openalex.org/C99498987","wikidata":"https://www.wikidata.org/wiki/Q2210247","display_name":"Noise (video)","level":3,"score":0.4283684},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.37883964},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.2955761},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.2824408},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.112077236},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.099406004},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.07564321},{"id":"https://openalex.org/C24890656","wikidata":"https://www.wikidata.org/wiki/Q82811","display_name":"Acoustics","level":1,"score":0.0},{"id":"https://openalex.org/C115961682","wikidata":"https://www.wikidata.org/wiki/Q860623","display_name":"Image (mathematics)","level":2,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"is_oa":false,"landing_page_url":"https://doi.org/10.1109/smc.2018.00310","pdf_url":null,"source":null,"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false}],"best_oa_location":null,"sustainable_development_goals":[],"grants":[],"datasets":[],"versions":[],"referenced_works_count":20,"referenced_works":["https://openalex.org/W2059020343","https://openalex.org/W2061090545","https://openalex.org/W2103941230","https://openalex.org/W2109529167","https://openalex.org/W2131702354","https://openalex.org/W2156331736","https://openalex.org/W2186538531","https://openalex.org/W2252815310","https://openalex.org/W2398714011","https://openalex.org/W24195377","https://openalex.org/W2461348034","https://openalex.org/W2486876923","https://openalex.org/W2507521523","https://openalex.org/W2588353154","https://openalex.org/W2603066698","https://openalex.org/W2743732015","https://openalex.org/W2760967785","https://openalex.org/W2790533449","https://openalex.org/W4229899424","https://openalex.org/W4249210728"],"related_works":["https://openalex.org/W3175815506","https://openalex.org/W2990613306","https://openalex.org/W2917237719","https://openalex.org/W2808551685","https://openalex.org/W2159567781","https://openalex.org/W2152274405","https://openalex.org/W2124039066","https://openalex.org/W2118875463","https://openalex.org/W2062607947","https://openalex.org/W2057250360"],"abstract_inverted_index":{"To":[0],"securely":[1],"communicate":[2],"information":[3,31,39,55],"in":[4,76,96],"different":[5],"networks,":[6],"this":[7],"paper":[8],"introduces":[9],"a":[10,43,61,92],"novel":[11],"secure":[12],"communication":[13,71],"scheme":[14,72],"using":[15],"non-coherent":[16],"modulation.":[17],"The":[18],"transmitter":[19],"is":[20],"to":[21],"generate":[22],"transmitted":[23],"signal":[24],"by":[25],"modulating":[26],"the":[27,34,38,47,69,97],"chaotic":[28,48],"sequences":[29],"and":[30,80],"bits,":[32],"while":[33],"receiver":[35],"can":[36,52,59],"recover":[37],"bits":[40],"without":[41],"generating":[42],"synchronized":[44],"duplication":[45],"of":[46],"sequence.":[49],"Each":[50],"frame":[51],"transmit":[53],"two":[54],"bits.":[56],"Thus,":[57],"it":[58,85],"achieve":[60],"high":[62,74],"transmission":[63],"rate.":[64],"Performance":[65],"analysis":[66],"demonstrates":[67],"that":[68,84],"proposed":[70],"has":[73,86],"performance":[75,90],"resisting":[77],"Gaussian":[78],"noise":[79],"simulation":[81],"results":[82],"shows":[83],"better":[87],"bit-error":[88],"rate":[89],"than":[91],"newly":[93],"developed":[94],"method":[95],"additive-white-Gaussian-noise":[98],"channel.":[99]},"cited_by_api_url":"https://api.openalex.org/works?filter=cites:W2908826203","counts_by_year":[{"year":2022,"cited_by_count":1},{"year":2020,"cited_by_count":1},{"year":2019,"cited_by_count":2}],"updated_date":"2024-10-06T06:40:22.105532","created_date":"2019-01-25"}