Radial basis function networks as chaotic generators for secure communication systems

S. Papadimitriou, A. Bezerianos, T. Bountis

Research output: Contribution to journalArticlepeer-review

9 Scopus citations


This paper improves upon a new class of discrete chaotic systems (i.e. chaotic maps) recently introduced for effective information encryption. The nonlinearity and adaptability of these systems are achieved by designing proper radial basis function networks. The potential for automatic synchronization, the lack of periodicity and the extremely large parameter spaces of these chaotic maps offer robust transmission security. The Radial Basis Function (RBF) networks offer a large number of parameters (i.e. the centers and spreads of the RBF kernels and the weights of the linear layer) while at the same time as universal approximators they have the flexibility to implement any function. The RBF networks can learn the dynamics of chaotic systems (maps or flows) and mimic them accurately by using many more parameters than the original dynamical recurrence. Since the parameter space size increases exponentially with respect to the number of parameters, the RBF based systems greatly outperform previous designs in terms of encryption security. Moreover, the learning of the dynamics from data generated by chaotic systems guarantees the chaoticity of the dynamics of the RBF networks and offers a convenient method of implementing any desirable chaotic dynamics. Since each sequence of training data gives rise to a distinct RBF configuration, theoretically there exists an infinity of possible configurations.

Original languageEnglish (US)
Pages (from-to)221-232
Number of pages12
JournalInternational Journal of Bifurcation and Chaos in Applied Sciences and Engineering
Issue number1
StatePublished - Jan 1999

ASJC Scopus subject areas

  • Modeling and Simulation
  • Engineering (miscellaneous)
  • General
  • Applied Mathematics


Dive into the research topics of 'Radial basis function networks as chaotic generators for secure communication systems'. Together they form a unique fingerprint.

Cite this