Table of Contents Author Guidelines Submit a Manuscript
Discrete Dynamics in Nature and Society
Volume 2015, Article ID 818421, 11 pages
http://dx.doi.org/10.1155/2015/818421
Research Article

A Proposed Chaotic-Switched Turbo Coding Design and Its Application for Half-Duplex Relay Channel

College of Electronic and Information Engineering, Nanjing University of Aeronautics and Astronautics, Nanjing 210016, China

Received 31 December 2014; Revised 26 March 2015; Accepted 29 March 2015

Academic Editor: Daniele Fournier-Prunaret

Copyright © 2015 Tamer H. M. Soliman et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Linked References

  1. R. Brown and L. O. Chua, “Clarifying chaos: examples and counterexamples,” International Journal of Bifurcation and Chaos in Applied Sciences and Engineering, vol. 6, no. 2, pp. 219–249, 1996. View at Publisher · View at Google Scholar · View at Zentralblatt MATH · View at MathSciNet · View at Scopus
  2. J. Fridrich, “Symmetric ciphers based on two-dimensional chaotic maps,” International Journal of Bifurcation and Chaos in Applied Sciences and Engineering, vol. 8, no. 6, pp. 1259–1284, 1998. View at Publisher · View at Google Scholar · View at Zentralblatt MATH · View at MathSciNet · View at Scopus
  3. L. Kocarev, G. Jakimoski, T. Stojanovski, and U. Parlitz, “From chaotic maps to encryption schemes,” in Proceedings of the IEEE International Symposium on Circuits and Systems (ISCAS '98), pp. 514–517, Monterey, Calif, USA, June 1998. View at Scopus
  4. G. Alvarez, G. P. F. Monotoya, G. Pastor, and M. Romera, “Chaotic cryptosystems,” in Proceedings of the IEEE 33rd Annual International Carnahan Conference on Security Technology, pp. 332–338, Madrid, Spain, October 1999. View at Publisher · View at Google Scholar
  5. F. Dachselt and W. Schwarz, “Chaos and cryptography,” IEEE Transactions on Circuits and Systems. I. Fundamental Theory and Applications, vol. 48, no. 12, pp. 1498–1509, 2001. View at Publisher · View at Google Scholar · View at Zentralblatt MATH · View at MathSciNet · View at Scopus
  6. S. Hayes, C. Grebogi, and E. Ott, “Communicating with chaos,” Physical Review Letters, vol. 70, no. 20, pp. 3031–3034, 1993. View at Publisher · View at Google Scholar · View at Scopus
  7. X. Yongxiang, C. K. Tse, and F. C. M. Lau, “Performance of differential chaos-shift-keying digital communication systems over a multipath fading channel with delay spread,” IEEE Transactions on Circuits and Systems II: Express Briefs, vol. 51, no. 12, pp. 680–684, 2004. View at Publisher · View at Google Scholar · View at Scopus
  8. R. Bose and S. Pathak, “A novel compression and encryption scheme using variable model arithmetic coding and coupled chaotic system,” IEEE Transactions on Circuits and Systems. I. Regular Papers, vol. 53, no. 4, pp. 848–857, 2006. View at Publisher · View at Google Scholar · View at MathSciNet · View at Scopus
  9. R. Matthews, “On the derivation of a chaotic encryption algorithm,” Cryptologia, vol. 13, no. 1, pp. 29–42, 1989. View at Publisher · View at Google Scholar · View at MathSciNet
  10. M. S. Baptista, “Cryptography with chaos,” Physics Letters A, vol. 240, no. 1-2, pp. 50–54, 1998. View at Publisher · View at Google Scholar · View at MathSciNet
  11. R. Bose and A. Banerjee, “Implementing symmetric cryptography using chaos functions,” in Proceedings of the 7th International Conference on Advanced Computing and Communications (ADCOM '99), pp. 318–321, December 1999.
  12. E. Alvarez, A. Fernández, P. Garcí, J. Jiménez, and A. Marcano, “New approach to chaotic encryption,” Physics Letters, Section A: General, Atomic and Solid State Physics, vol. 263, no. 4-6, pp. 373–375, 1999. View at Google Scholar · View at Scopus
  13. G. Jakimoski and L. Kocarev, “Chaos and cryptography: block encryption ciphers based on chaotic maps,” IEEE Transactions on Circuits and Systems. I. Fundamental Theory and Applications, vol. 48, no. 2, pp. 163–169, 2001. View at Publisher · View at Google Scholar · View at Zentralblatt MATH · View at MathSciNet · View at Scopus
  14. L. Kocarev and G. Jakimoski, “Logistic map as a block encryption algorithm,” Physics Letters A, vol. 289, no. 4-5, pp. 199–206, 2001. View at Publisher · View at Google Scholar · View at MathSciNet · View at Scopus
  15. K. W. Wong, “A fast chaotic cryptographic scheme with dynamic look-up table,” Physics Letters A, vol. 298, no. 4, pp. 238–242, 2002. View at Publisher · View at Google Scholar · View at MathSciNet · View at Scopus
  16. S. Li, X. Zheng, X. Mou, and Y. Cai, “Chaotic encryption scheme for real-time digital video,” in Real-Time Imaging VI, vol. 4666 of Proceedings of SPIE, pp. 149–160, January 2002. View at Publisher · View at Google Scholar · View at Scopus
  17. S. Kozic and M. Hasler, “Low-density codes based on chaotic systems for simple encoding,” IEEE Transactions on Circuits and Systems. I. Regular Papers, vol. 56, no. 2, pp. 405–415, 2009. View at Publisher · View at Google Scholar · View at MathSciNet · View at Scopus
  18. T. Y. Ng, L. Y. Chew, and S. Puthusserypady, “Error correction with chaotic switching between convolutional codecs,” IEEE Transactions on Circuits and Systems I: Regular Papers, vol. 55, no. 11, pp. 3655–3662, 2008. View at Publisher · View at Google Scholar · View at MathSciNet · View at Scopus
  19. F. J. Escribano, S. Kozic, L. López, M. A. F. Sanjuán, and M. Hasler, “Turbo-like structures for chaos encoding and decoding,” IEEE Transactions on Communications, vol. 57, no. 3, pp. 597–601, 2009. View at Publisher · View at Google Scholar · View at Scopus
  20. F. J. Escribano, A. Wagemakers, and M. A. F. Sanjuan, “Chaos-based turbo systems in fading channels,” IEEE Transactions on Circuits and Systems I: Regular Papers, vol. 61, no. 2, pp. 530–541, 2014. View at Publisher · View at Google Scholar · View at Scopus
  21. F. J. Escribano and A. Tarable, “Interleaver design for parallel concatenated chaos-based coded modulations,” IEEE Communications Letters, vol. 17, no. 5, pp. 834–837, 2013. View at Publisher · View at Google Scholar · View at Scopus
  22. W. K. Harrison, J. Almeida, S. W. McLaughlin, and J. Barros, “Coding for cryptographic security enhancement using stopping sets,” IEEE Transactions on Information Forensics and Security, vol. 6, no. 3, pp. 575–584, 2011. View at Publisher · View at Google Scholar · View at Scopus
  23. O. O. Koyluoglu and H. El Gamal, “Polar coding for secure transmission and key agreement,” IEEE Transactions on Information Forensics and Security, vol. 7, no. 5, pp. 1472–1483, 2012. View at Publisher · View at Google Scholar · View at Scopus
  24. N. Živić and M. F. Flanagan, “On joint cryptographic verification and channel decoding via the maximum likelihood criterion,” IEEE Communications Letters, vol. 16, no. 5, pp. 717–719, 2012. View at Publisher · View at Google Scholar · View at Scopus
  25. C. Berrou, A. Glavieux, and P. Thitimajshima, “Near Shannon limit error-correcting coding and encoding: turbo-codes,” in Proceedings of the IEEE International Conference on Communications, pp. 1064–1070, Geneve, Switzerland, May 1993. View at Scopus
  26. G. A. Gottwald and I. Melbourne, “On the implementation of the 0-1 test for chaos,” SIAM Journal on Applied Dynamical Systems, vol. 8, no. 1, pp. 129–145, 2009. View at Publisher · View at Google Scholar · View at Zentralblatt MATH · View at MathSciNet · View at Scopus
  27. D. Divsalar and F. Pollara, “Multiple turbo codes,” in PRoceedings of the IEEE Military Communications Conference (MILCOM '95), vol. 1, pp. 279–285, San Diego, Calif, USA, November 1995. View at Publisher · View at Google Scholar