Extracting information masked by chaos and contaminated with noise: Some considerations on the security of communication approaches using chaos