Breaking two secure communication systems based on chaotic masking | IEEE Journals & Magazine | IEEE Xplore