CN107426197A - A kind of secret communication method for realizing hidden voice call - Google Patents

A kind of secret communication method for realizing hidden voice call Download PDF

Info

Publication number
CN107426197A
CN107426197A CN201710540584.5A CN201710540584A CN107426197A CN 107426197 A CN107426197 A CN 107426197A CN 201710540584 A CN201710540584 A CN 201710540584A CN 107426197 A CN107426197 A CN 107426197A
Authority
CN
China
Prior art keywords
voice
waveform
information
hidden
signal
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201710540584.5A
Other languages
Chinese (zh)
Inventor
黄清华
晏华华
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Xiamen Rong Sheng Technology Co Ltd
Original Assignee
Xiamen Rong Sheng Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Xiamen Rong Sheng Technology Co Ltd filed Critical Xiamen Rong Sheng Technology Co Ltd
Priority to CN201710540584.5A priority Critical patent/CN107426197A/en
Publication of CN107426197A publication Critical patent/CN107426197A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/02Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Telephonic Communication Services (AREA)

Abstract

The invention discloses a kind of secret communication method for realizing hidden voice call, comprise the following steps:(1) calling party sends open voice messaging, and microprocessor carries out sub-frame processing to open voice messaging, obtains a series of voice frame signal;(2) Waveform Reconstructing is carried out to voice frame signal, security information be hidden among the information between the waveform of Waveform Reconstructing, realize information embedding and modulation, the voice synthesized;(3) calling party is smooth by smoothing filter progress waveform by the voice of synthesis, or adds transition waveform to realize the linking of waveform signal, then carries out open transmission;(4) after calling party discloses the voice arrival callee of transmission, receiving terminal is demodulated to the voice signal received, is recovered the secure voice information being hidden in open transmission voice, is completed secret communication process.The present invention can solve the problems, such as that voice is ravesdropping in communication network, can meet requirement of the relevant departments such as government, army to the security of voice communication very well.

Description

A kind of secret communication method for realizing hidden voice call
Technical field
The invention belongs to voice communication technology field, more particularly to a kind of secret communication side for realizing hidden voice call Method.
Background technology
Voice communication such as phone, it is a kind of very strong business of real-time, voice messaging is encrypted, it is ensured that voice The confidentiality of transmission.But all Content of Communication is not encrypted for most of voice communication at present, thus Content of Communication is very Easily it is ravesdropping.Requirement of the relevant departments such as government, army to the security of communication can not be met.
The content of the invention
It is an object of the invention to provide a kind of secret communication method for realizing hidden voice call, solves in communication network The problem of voice is ravesdropping.
To achieve the above object, the present invention uses following technical scheme:
A kind of secret communication method for realizing hidden voice call, comprises the following steps:
(1) calling party sends open voice messaging, and microprocessor carries out sub-frame processing to open voice messaging, obtains a system The voice frame signal of row;
(2) Waveform Reconstructing, information security information being hidden between the waveform of Waveform Reconstructing are carried out to voice frame signal It is central, realize information embedding and modulation, the voice synthesized;
(3) calling party is smooth by smoothing filter progress waveform by the voice of synthesis, or adds transition waveform to realize ripple The linking of shape signal, then carry out open transmission;
(4) after calling party discloses the voice arrival callee of transmission, receiving terminal is demodulated to the voice signal received, Recover the secure voice information being hidden in open transmission voice, complete secret communication process.
Also include before the Waveform Reconstructing step:To the processing of speech frame signal limiter or envelope extraction processing.
It is described to be modulated to frequency modulation, phase modulation, amplitude modulation or difference.
Inlaying and modulating for described information, comprises the following steps:The modulation needed first according to speech frame signal behavior Exponent number, according to the requirement of call, select the combining form of small echo;The mutual cross correlation value of various small echos is calculated again, is selected The best combination of correlation;The segment reconstruction to voice signal is finally realized according to the small echo of selection.
The segment reconstruction process of voice signal is:Utilize Gaussian waveform, the all-order derivative ripple of Gaussian waveform, ellipsoid ripple, ellipse The all-order derivative ripple of ball ripple, or each rank wavelet and all-order derivative ripple, calling party are each according to what is tried to achieve by voice frame signal Rank maximum is segmented, and realizes with one or several each rank ripples above are reconstructed, its quantity needs to be wanted according to communication Ask to determine.
The waveform of the reconstruct is high bass wave, wavelet, the basic mother wavelet function or its wavelet of ellipsoid ripple The differential transform form of function.
The Function Fitting process of Waveform Reconstructing is:
Step 1:Extract the envelope of voice frame signal;
Step 2:Try to achieve the extreme point of signal envelope;
Step 3:Extract the waveform between extreme point;
Step 4:Produce the linear combination of N number of wavelet function;
Step 5:Waveform progress between composite function and extreme point is related and take and be most worth;
Step 6:An iterative value is set, the process of step 3~step 5 is iterated, constantly adjusts linear combination The weight of function.
The demodulation for being demodulated into reconstruct ripple, using frequency modulation, phase modulation, amplitude modulation or difference, realizes the demodulation of information.
The demodulation of information comprises the following steps:The exponent number of modulation needed is selected according to information first, according to wanting for call Ask, select the combining form of small echo;According to the voice signal of reception by demodulating algorithm, the demodulation of corresponding small echo is realized;Demodulation Algorithm is related operation, matched filtering, various basic functions, or obtains the search of optimal order by sparse transformation;According to The hiding information arrived, obtain the corresponding hidden information to be transmitted.
Beneficial effects of the present invention are:
Open voice frame signal is carried out Waveform Reconstructing by the present invention, and security information is hidden between the waveform of Waveform Reconstructing Information among, realize information embedding with modulation, the voice synthesized, realize low probability of intercept communication, ensure that signal Confidentiality, and carry information increased, communication quality meet require, there is good practicality and good performance, Solve the problems, such as that voice is ravesdropping in communication network, security of the relevant departments such as government, army to voice communication can be met Requirement.
Brief description of the drawings
Fig. 1 is the flow chart of communication means of the present invention.
Fig. 2 is time domain, frequency-domain analysis figure and the signal ambiguity functional arrangement of open voice signal provided by the invention.
Fig. 3 is the wavelet functions such as Gaussian function provided by the invention, the derivative of Gaussian function or spheroidal wave function Each rank derived function time-domain diagram.
Fig. 4 is the wavelet functions such as Gaussian function provided by the invention, the derivative of Gaussian function or spheroidal wave function Auto-correlation and the cross correlation figure with other exponent number derived functions.
Embodiment
In order to make the purpose , technical scheme and advantage of the present invention be clearer, it is right below in conjunction with drawings and Examples The present invention is further elaborated.It should be appreciated that the specific embodiments described herein are merely illustrative of the present invention, and It is not used in the restriction present invention.
With reference to figure 1, the invention discloses a kind of secret communication method for realizing hidden voice call, comprise the following steps:
(1) calling party sends open voice messaging, and microprocessor carries out sub-frame processing to open voice messaging, obtains a system The voice frame signal of row;
(2) Waveform Reconstructing, information security information being hidden between the waveform of Waveform Reconstructing are carried out to voice frame signal It is central, realize information embedding and modulation, the voice synthesized;
Before Waveform Reconstructing, the processing of speech frame signal limiter or envelope extraction can be handled, amplitude limiting processing can drop The degree of low speech distortion.
Inlaying and modulating for described information, comprises the following steps:The modulation needed first according to speech frame signal behavior Exponent number, according to the requirement of call, select the combining form of small echo;The mutual cross correlation value of various small echos is calculated again, is selected The best combination of correlation;The segment reconstruction to voice signal is finally realized according to the small echo of selection.Segment reconstruction process is:Profit With Gaussian waveform, the all-order derivative ripple of Gaussian waveform, ellipsoid ripple, ellipsoid ripple all-order derivative ripple, or each rank wavelet with Voice frame signal is segmented by all-order derivative ripple, calling party according to each rank maximum tried to achieve, and is realized with one or several Each rank ripple is reconstructed above, and its quantity needs to be determined according to the requirement of communication.The waveform of the reconstruct is high bass wave, substantially small The differential transform form of ripple, the basic mother wavelet function of ellipsoid ripple or its wavelet function.It is described to be modulated to frequency modulation, adjust Phase, amplitude modulation or difference.
Voice signal is fitted, first has to time domain, frequency domain and the ambiguity function of the voice signal to open transmission Analyzed, see Fig. 2.Analysis to various voice signals, it can be used as by Wilson's correlation function and voice quality evaluation Judge the foundation of signal fitting effect.It is relatively low that the range resolution of voice signal is can be seen that by the ambiguity function of signal, But its speed resoluting force is higher.Although range resolution is not high, if it is more than sufficient to be intended only as low communication interception.
Carried out by the wavelet functions such as Gaussian function, the derivative of Gaussian function or spheroidal wave function and all-order derivative The fitting of voice sound signal, next is needed to wavelets such as Gaussian function, the derivative of Gaussian function or spheroidal wave functions Function and its derived function are analyzed.
One Gaussian pulse p (t) can be described with following expression formula:
Wherein σ is standard deviation.
The wavelet functions such as Gaussian function, the derivative of Gaussian function or spheroidal wave function have each rank derived function shape Formula, its expression formula are as follows:
N represents the exponent number of derivation in formula.
Preceding the 15 of the wavelet functions such as Gaussian function, the derivative of Gaussian function or spheroidal wave function are analyzed in the present invention Rank derived function, as shown in Figure 3.Obviously, order of differentiation is higher, and the number of zero crossing is more, and its frequency is higher.
The amplitude spectrum of the n order derivatives of Gaussian pulse is:
If work as f=fMWhen | xn(f) | maximum is taken, then fMReferred to as peak-peak tranmitting frequency, fMCan be by above formula derivation And it is zero to obtain to make it:
Take the auto-correlations of wavelet function such as Gaussian function, the derivative of Gaussian function or spheroidal wave function and with being left The cross-correlation of 15 order derivatives can obtain result as shown in Figure 4.Gaussian function, the derivative of Gaussian function or spheroidal wave function etc. Among each rank derived function of wavelet function, autocorrelation is relatively strong and cross correlation is weaker, and this is fitting voice sound signal Provide theoretical foundation.Acoustic impluse string has the characteristics of similar, as long as therefore calculate the envelope of acoustic impluse string, it is possible to It is fitted with the wavelet functions such as Gaussian function, the derivative of Gaussian function or spheroidal wave function and its each rank derived function.
In many cases, individual pulse possessed feature can not meet some requirements, so of the invention using N number of The linear combination of the wavelet functions such as Gaussian function, the derivative of Gaussian function or spheroidal wave function, each Gaussian function, height The wavelet function such as derivative or spheroidal wave function of this function is considered the basic function in N-dimensional space.Gaussian linear combines The weight of function is then relevant with the effect of final fitting voice sound signal.Expressed with mathematical expression:
Wherein, SiFor weight coefficient.gi(t) the i-th order derivative is represented.
F (f) is f (t) Fourier transform.
The wavelet Function Fitting voice sound such as Gaussian function of the invention, the derivative of Gaussian function or spheroidal wave function The process of sound signal is as follows:
Step 1:Extract the envelope of voice sound signal;
Step 2:Try to achieve the extreme point of the signal envelope;
Step 3:Extract the waveform between extreme point;
Step 4:Produce the line of the wavelet functions such as N number of Gaussian function, the derivative of Gaussian function or spheroidal wave function Property combination;
Step 5:Gauss composite function is related to the waveform progress between extreme point and take and be most worth;
Step 6:An iterative value is set, the process of step 3~step 5 is iterated, constantly adjusts Gaussian linear The weight of composite function.
For the imitative voice sound signal finally fitted, the noise robustness of the signal is analyzed, ensures the letter after fitting Number proper communication, can meet communicating requirement.
The present invention illustrates by taking Gaussian function as an example, and other basic morther wavelets can realize identical function, all protect Within the scope of shield.Voice sound signal is reconstructed as basic function using gaussian signal and its derived function, realizes low intercept and capture generally Rate communicates, and ensure that the confidentiality of signal, and carries information and increased, and communication quality meets to require, applied to low intercepting and capturing In the design of probability communication waveforms, there is good practicality and good performance.
(3) voice of synthesis is carried out waveform smoothing processing by calling party by smoothing filter, or adds transition waveform real The linking of existing waveform signal, then carry out open transmission;
(4) after calling party discloses the voice arrival callee of transmission, receiving terminal is demodulated to the voice signal received, The demodulation for being demodulated into reconstruct ripple, using frequency modulation, phase modulation, amplitude modulation or difference, realizes the demodulation of information, the solution of described information Tune comprises the following steps:The exponent number of modulation needed is selected according to information first, according to the requirement of call, selects the combination of small echo Form;According to the voice signal of reception by demodulating algorithm, the demodulation of corresponding small echo is realized;Demodulating algorithm be related operation, The search of optimal order is obtained with filtering, various basic functions, or by sparse transformation;According to obtained hiding information, obtain The corresponding hidden information to be transmitted.Recover the secure voice information being hidden in open transmission voice, complete secret communication process.
The content that the present invention is included is included with various basic morther wavelet, morther wavelet conversion, Gaussian function, a l pha letters Number, hangover function etc. are various basic to have same kind either small after different types of small echo or various differential transforms Waveshape, if its can make up signal synthesis wavelet form, can be used as signal synthesis unit wavelet function or Person's wave function is all within protection scope of the present invention.Meanwhile its signal subsection realize fitting, various small echo piecewise fittings, The quality of composite signal and its various variations, the assessment mode of composite signal, including voice signal, voice signal, ultrasound Signal, electromagnetic wave signal, underwater sound signal, photosignal, all waveform signals with fluctuation property are all in the protection of the present invention Within the scope of.
More than, it is only the preferable embodiment of the present invention, but protection scope of the present invention is not limited thereto, and it is any Those familiar with the art the invention discloses technical scope in, the change or replacement that can readily occur in, all should It is included within the scope of the present invention.Therefore, protection scope of the present invention should be defined by scope of the claims.

Claims (9)

  1. A kind of 1. secret communication method for realizing hidden voice call, it is characterised in that:Comprise the following steps:
    (1) calling party sends open voice messaging, and microprocessor carries out sub-frame processing to open voice messaging, obtained a series of Voice frame signal;
    (2) Waveform Reconstructing is carried out to voice frame signal, security information is hidden among the information between the waveform of Waveform Reconstructing, Realize information embedding and modulation, the voice synthesized;
    (3) calling party is smooth by smoothing filter progress waveform by the voice of synthesis, or adds transition waveform to realize that waveform is believed Number linking, then carry out open transmission;
    (4) after calling party discloses the voice arrival callee of transmission, receiving terminal is demodulated to the voice signal received, is recovered The secure voice information being hidden in open transmission voice, completes secret communication process.
  2. A kind of 2. secret communication method for realizing hidden voice call as claimed in claim 1, it is characterised in that:The waveform Also include before reconstruction step:To the processing of speech frame signal limiter or envelope extraction processing.
  3. A kind of 3. secret communication method for realizing hidden voice call as claimed in claim 1, it is characterised in that:The modulation For frequency modulation, phase modulation, amplitude modulation or difference.
  4. A kind of 4. secret communication method for realizing hidden voice call as claimed in claim 3, it is characterised in that:Described information Inlay and modulate, comprise the following steps:The exponent number of the modulation needed first according to speech frame signal behavior, according to wanting for call Ask, select the combining form of small echo;The mutual cross correlation value of various small echos is calculated again, selects the best combination of correlation; The segment reconstruction to voice signal is finally realized according to the small echo of selection.
  5. A kind of 5. secret communication method for realizing hidden voice call as claimed in claim 4, it is characterised in that:Voice signal Segment reconstruction process be:Using Gaussian waveform, the all-order derivative ripple of Gaussian waveform, ellipsoid ripple, ellipsoid ripple all-order derivative ripple, Or voice frame signal is segmented by each rank wavelet and all-order derivative ripple, calling party according to each rank maximum tried to achieve, Realize with one or several each rank ripples above are reconstructed, its quantity needs to be determined according to the requirement of communication.
  6. A kind of 6. secret communication method for realizing hidden voice call as claimed in claim 5, it is characterised in that:The reconstruct Waveform be high bass wave, wavelet, the differential transform shape of the basic mother wavelet function of ellipsoid ripple or its wavelet function Formula.
  7. A kind of 7. secret communication method for realizing hidden voice call as claimed in claim 6, it is characterised in that:Waveform Reconstructing Function Fitting process be:
    Step 1:Extract the envelope of voice frame signal;
    Step 2:Try to achieve the extreme point of signal envelope;
    Step 3:Extract the waveform between extreme point;
    Step 4:Produce the linear combination of N number of wavelet function;
    Step 5:Waveform progress between composite function and extreme point is related and take and be most worth;
    Step 6:An iterative value is set, the process of step 3~step 5 is iterated, constantly adjusts linear combination function Weight.
  8. A kind of 8. secret communication method for realizing hidden voice call as described in claim any one of 1-7, it is characterised in that: The demodulation for being demodulated into reconstruct ripple, using frequency modulation, phase modulation, amplitude modulation or difference, realizes the demodulation of information.
  9. A kind of 9. secret communication method for realizing hidden voice call as claimed in claim 8, it is characterised in that:The solution of information Tune comprises the following steps:The exponent number of modulation needed is selected according to information first, according to the requirement of call, selects the combination of small echo Form;According to the voice signal of reception by demodulating algorithm, the demodulation of corresponding small echo is realized;Demodulating algorithm be related operation, The search of optimal order is obtained with filtering, various basic functions, or by sparse transformation;According to obtained hiding information, obtain The corresponding hidden information to be transmitted.
CN201710540584.5A 2017-07-05 2017-07-05 A kind of secret communication method for realizing hidden voice call Pending CN107426197A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710540584.5A CN107426197A (en) 2017-07-05 2017-07-05 A kind of secret communication method for realizing hidden voice call

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710540584.5A CN107426197A (en) 2017-07-05 2017-07-05 A kind of secret communication method for realizing hidden voice call

Publications (1)

Publication Number Publication Date
CN107426197A true CN107426197A (en) 2017-12-01

Family

ID=60426260

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710540584.5A Pending CN107426197A (en) 2017-07-05 2017-07-05 A kind of secret communication method for realizing hidden voice call

Country Status (1)

Country Link
CN (1) CN107426197A (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108989816A (en) * 2018-09-03 2018-12-11 广州海格通信集团股份有限公司 A kind of coded channel information hidden method based on wavelet transformation
CN110445777A (en) * 2019-07-31 2019-11-12 华中科技大学 A kind of hidden speech signal transmission method and relevant device and storage medium
CN111835673A (en) * 2020-07-02 2020-10-27 香港理工大学深圳研究院 Method and device for transmitting concealed data by modulating amplitude of LoRa signal

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1645780A (en) * 2005-02-01 2005-07-27 四川大学 Secured communicating method and device for hiding talking voice
WO2013067714A1 (en) * 2011-11-12 2013-05-16 Liv Runchun Method for reducing burst noise
CN103475986A (en) * 2013-09-02 2013-12-25 南京邮电大学 Digital hearing aid speech enhancing method based on multiresolution wavelets

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1645780A (en) * 2005-02-01 2005-07-27 四川大学 Secured communicating method and device for hiding talking voice
WO2013067714A1 (en) * 2011-11-12 2013-05-16 Liv Runchun Method for reducing burst noise
CN103475986A (en) * 2013-09-02 2013-12-25 南京邮电大学 Digital hearing aid speech enhancing method based on multiresolution wavelets

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
张晓冬: "基于脊提取的信号表示和重建", 《中国优秀博硕士学位论文全文数据库(博士)信息科技辑》 *
张良智: "基于小波分析的音频数据压缩及调制通信的研究", 《中国优秀博硕士学位论文全文数据库(硕士)信息科技辑》 *

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108989816A (en) * 2018-09-03 2018-12-11 广州海格通信集团股份有限公司 A kind of coded channel information hidden method based on wavelet transformation
CN110445777A (en) * 2019-07-31 2019-11-12 华中科技大学 A kind of hidden speech signal transmission method and relevant device and storage medium
CN110445777B (en) * 2019-07-31 2020-07-10 华中科技大学 Concealed voice signal transmission method, related equipment and storage medium
CN111835673A (en) * 2020-07-02 2020-10-27 香港理工大学深圳研究院 Method and device for transmitting concealed data by modulating amplitude of LoRa signal
CN111835673B (en) * 2020-07-02 2023-01-03 香港理工大学深圳研究院 Method and device for transmitting concealed data by modulating amplitude of LoRa signal

Similar Documents

Publication Publication Date Title
Liu et al. Biologically inspired covert underwater acoustic communication by mimicking dolphin whistles
CN109815942A (en) Normal mode feature extracting method based on ambient sea noise signal
CN105391501B (en) A kind of imitative dolphin whistle underwater acoustic communication method based on time-frequency spectrum translation
CN105227246B (en) It is a kind of to utilize the underwater acoustic communication method for being segmented the imitative dolphin whistle signal of LFM signals
CN105607125A (en) Seismic data noise suppression method based on block matching algorithm and singular value decompression
CN107426197A (en) A kind of secret communication method for realizing hidden voice call
CN109412993A (en) A kind of having based on deep learning inhibits the full duplex cognition water sound communication signal detection method of self-interference
Han et al. Experimental demonstration of underwater acoustic communication using bionic signals
CN105741844B (en) A kind of digital audio watermarking algorithm based on DWT-SVD-ICA
CN105391500A (en) Dolphin click simulating underwater acoustic communication method based on ultra-wideband signal
CN110247867A (en) Underwater sound Doppler estimation and device, underwater acoustic communication method and system
CN114362835A (en) Dolphin whistle-imitated underwater acoustic communication method
Jia et al. Bionic camouflage underwater acoustic communication based on sea lion sounds
Jiang et al. A sonar-embedded disguised communication strategy by combining sonar waveforms and whale call pulses for underwater sensor platforms
CN102629879B (en) Underwater acoustic communication method based on mode frequency modulation
Qiao et al. Doppler scale estimation for varied speed mobile frequency-hopped binary frequency-shift keying underwater acoustic communication
CN107332642A (en) The low probability of intercept waveform design method synthesized based on ocean mammal signal
CN109347569B (en) Disguised and concealed underwater acoustic communication method based on discrete cosine transform
CN104901776B (en) A kind of difference Pattern pattern time-delay coding underwater acoustic communication method based on parametric array
CN107635181A (en) A kind of multiple access based on channel study perceives the feedback optimized method in source
CN115021829B (en) Digital pulse interval modulation underwater acoustic communication method based on marine environmental noise
CN106910508A (en) A kind of hidden underwater acoustic communication method of imitative ocean piling sound source
CN106385392A (en) Low-intercept probability communication waveform design method based on chaotic keying
CN108279418B (en) Combined detection and communication device and method using whale sound
CN114884780B (en) Underwater sound communication signal modulation identification method and device based on passive time reversal mirror

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
CB03 Change of inventor or designer information

Inventor after: Zhou Xiaoping

Inventor after: Yan Huahua

Inventor before: Huang Qinghua

Inventor before: Yan Huahua

SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20171201

RJ01 Rejection of invention patent application after publication