Secure communication using chaotic systems is considered from a control point of view. It is shown that a synchronization-based scheme for secure communication described in the literature may in fact be interpreted as an adaptive identification scheme. Two examples where the existing scheme fails to achieve the reconstruction of an encoded message are treated using adaptive identification techniques.
展开▼