Research Article

Secure Communication Based on a Hyperchaotic System with Disturbances

Figure 2

Chaotic secure communication Scheme 2.