Chaotic systems provide a rich mechanism for signal design
and generation, with potential application to communications and signal
processing. The main idea is to encrypt a message with a chaotic signal
at the transmitter end and further recover the encoded message by a
synchronization process at the receiver end. We summarize three possible
methods—chaotic masking, parameter modulation and switch keys. Then, we
will discuss the return maps of the three methods and compare their
security.