Page 93 - 2024-Vol20-Issue2
P. 93
89 | Shumran & Al-Hussein
Fig. 3. Encryption flow chart, adopted from [18].
1) Two stages of chaotic masking were applied to famous nonlinear three dimensional system of dif-
the signal in order to implement the recommended ferential equations. The system is described by the
security approach: the first stage was created using following differential equations (2) [20],:
the Lorenz system as shown in Fig. 4., and the sec-
ond stage was created using the Roessler chaotic
flow system as shown in Fig. 5.
2) The suggested system was tested over an AWGN dx = a(y - x)
channel for usage applications, and the results indi- dt
cated that the quality of the recovered information
starts to be clear at a minimum SNR value of 37 dB dy = x(? - z - y) (2)
with an MSE of 0.0061. dt
3) This strategy has been coupled with the digital dz
processing method (DPM) to lessen the impact of dt = ß z + xy
noise on the information that has been recovered.In
this way, the suggested method was able to function where ( a , ? and ß ) are the system parameters.
correctly at a signal-to-noise ratio (SNR) of 21 dB
and a mean square error (MSE) of 3.7135 10-6. The Rossler Attractor shown in Fig. 5. is another three
However, although the system’s complexity increased dimensional system of differential equations. The system is
as a result of this combination, which is very help- described by the following differential equations (3) [20],:
ful in improving the quality of the recovered signal,
the channel’s bandwidth will need to be increased
because the data type has changed from analog to
binary. The Lorenz Attractor shown in Fig. 4., is a