CN108632255B - Covert communication system based on random noise modulation - Google Patents
Covert communication system based on random noise modulation Download PDFInfo
- Publication number
- CN108632255B CN108632255B CN201810305109.4A CN201810305109A CN108632255B CN 108632255 B CN108632255 B CN 108632255B CN 201810305109 A CN201810305109 A CN 201810305109A CN 108632255 B CN108632255 B CN 108632255B
- Authority
- CN
- China
- Prior art keywords
- noise
- bit
- channel
- host
- normal distribution
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L1/00—Arrangements for detecting or preventing errors in the information received
- H04L1/20—Arrangements for detecting or preventing errors in the information received using signal quality detector
- H04L1/203—Details of error rate determination, e.g. BER, FER or WER
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L25/00—Baseband systems
- H04L25/02—Details ; arrangements for supplying electrical power along data transmission lines
- H04L25/0202—Channel estimation
Abstract
A concealed digital communication system based on random noise modulation, a transmitter takes host data as a seed of a Gaussian noise generator; the correlation coefficient of the joint normal distribution noise is modulated by a hidden bit; carrying the joint normal distribution noise of the hidden bit, and linearly superposing the joint normal distribution noise to the output of the host transmitter digital modulator; at the receiving end, the host data is used as a seed to generate Gaussian noise which is the same as that of the transmitter, then the Gaussian noise is correlated with the estimation of the joint normal distribution noise, and the hidden bit can be recovered after hard decision, so that the hidden transmission of information is realized. The invention has strong concealment.
Description
Technical Field
The invention relates to the technical field of wireless communication and information security, in particular to a covert communication system based on random noise modulation.
Background
Due to the openness of an electromagnetic space and the radiation of electromagnetic signal transmission, a communication signal bearing important information is completely exposed in a free space, and a standard protocol is widely adopted, so that mobile data is easily intercepted by an illegal user in the transmission process, and personal important information such as user privacy, finance and the like is possibly leaked. In the cryptographic technology, plaintext information to be transmitted is encrypted, and the plaintext is converted into unrecognizable ciphertext, so that the encrypted information is difficult to understand. However, another problem is caused by the encryption technology, which encrypts the plaintext into a bunch of messy codes and rather reminds the eavesdropper that the transmitted data has important information.
How to escape from the strict monitoring of an eavesdropper and realize the concealed transmission of electromagnetic signals becomes the key of information countermeasure and the competition for the control right of an electromagnetic space in military; for civil use, the key to protect important information of users from eavesdropping is provided.
A conventional digital transmitter (considering only the baseband), which includes a source, channel coding, digital modulation, upsampling and root-raised cosine FIR filter, transmits to the channel. Conventional digital receivers (only baseband considered): the method comprises down-sampling, root raised cosine filtering, digital demodulation, channel decoding and information sink, and information transmitted by a transmitter is restored.
Disclosure of Invention
In order to overcome the defects that the prior legal user can not reliably ensure that important information is not intercepted and the concealment is poor, and in order to enable the legal user to realize the safe transmission of concealed data, the invention provides a concealed communication system modulated by random noise, which is a concealed communication system on a communication link by the existing party (or other party, even enemy), and is a concealed communication means with strong survivability because the channel of the concealed communication system is prevented from being intentionally interfered and physically destroyed by the enemy. The method not only basically does not affect the service quality of the original system, but also can effectively ensure the smooth communication of the own party.
In order to solve the technical problems, the invention provides the following technical scheme:
a covert communication system based on random noise modulation comprising:
a concealment transmitter for generating a noise sequence n from host communication data as a seed to a white Gaussian noise generator in a concealment system1、n2;n1、n2Forming joint normal distribution noise w, and modulating by using a correlation coefficient hidden bit c; the random noise w is superposed to the output of the digital modulation of the traditional digital transmitter, enters an up-sampling and root raised cosine filter and is transmitted to a channel;
the covert receiver is used for synchronizing the receiving end of the covert system, estimating a channel and recovering random noise w and is completed by a host system; local white Gaussian noise generation by seeding a Gaussian noise generator with data from a host systemObtaining an estimate of random noise w by means of a host systemThen theAndand performing correlation and hard decision to recover the hidden system.
Further, in said covert transmitter, a noise sequence n1、n2The correlation coefficient of the joint normal distribution noise is modulated by the concealed bit c, and the process is as follows:
the joint normal distribution noise of the concealment system is:
wherein, c is the information bit of the hidden system; w (t) and n1(t) the correlation coefficient between (t) is modulated by a concealment bit c, assuming that when a transmission bit is '0', the correlation coefficient is ρ, and when the transmission bit is '1', the correlation coefficient is- ρ; noise sequence n1(t)、n2(t) are independent of each other, all obeyThe normal distribution random process of (1);
the random noise w, after modulation, is linearly superimposed on the host transmitter modulated symbols.
Still further, the host system is a traditional digital communication system, and the transmitting and receiving processes are as follows:
the code rate adopted by the host system is 2/3, the constraint length vector is [5,4] and the code generation matrix is [23,35, 0; 0,5,13] to correct the error code generated by the channel; decoding a channel by adopting a Viterbi algorithm at a receiving end; carrying out digital modulation and demodulation by adopting 16QAM of Gray code; and a root raised cosine filter with roll-off coefficients of 0.25 and 4 times of up-sampling/down-sampling is adopted to realize pulse shaping and matched filtering.
Other types of multi-system digital modulation modes, channel error correction coding, and pulse shaping and matched filtering are all applicable to the invention.
In the covert receiver, a traditional receiver obtains an estimate of a transmitted modulation symbol after digital demodulation and digital modulationAnd then receiving the signal fromMinusObtaining estimates of the joint normal distribution random noise of a hidden transmitterThe Gaussian white noise generator seed is derived from all or a predetermined part of host communication dataGenerating noise Andinput to a correlator to obtainEstimation of correlation coefficientsThen, the hard decision is performed to recoverInto a concealed bit
In the concealed receiver, the derivation process of the theoretical bit error rate is as follows:
setting the bit sent by the concealment system to' 0 Estimation of joint normal distribution noise by receiverThe method comprises the steps of including channel noise introduced by a channel and modulation noise introduced by host modulated symbol errors, classifying the modulation noise into the channel noise, recording the sum of the two as n (t), and assuming that data of a transmitting party and a receiving party are the same after a host system is subjected to channel error correction decoding, a hidden system receiver can generate white Gaussian noise n consistent with a transmitter1(t), assuming n1(t)、n2(t), n (t) are both Gaussian white noise, so the discrete sample values { n }1,kn2,k,nkK is 1,2, …, N independently of one another;
let the signal-to-noise ratio γ of the concealment system be the ratio of the noise power of the concealment system to the channel noise power, i.e. the ratio
Where E is desired and the correlator output is
Where N is the number of discrete samples within a masked bit duration, and although u is not Gaussian, according to the central limit theorem u converges to a Gaussian distribution with an average of
The variance is:
therefore, assuming that the concealed bits '0' and '1' are equal in probability, the bit error rate is:
wherein the complementary error function is defined as
The conception of the invention is as follows: the present invention is a random noise modulated digital covert communication system hosted by a host system. The transmitting power of the covert communication system is far lower than that of the host system, and the influence on the host system is small; after strong channel error correction coding, the receiving and transmitting information of the host system are completely the same, so that the random number seeds of the receiving and transmitting parties of the hidden system are also completely consistent, and the receiving and transmitting parties can generate the same random Gaussian noise; the correlation coefficient of the joint normal distribution noise is determined by the hidden bit; joint normal distribution noise superimposed on host digital modulation belongs to one of common channel noise types; if the eavesdropper fails to acquire the working mechanism of the hidden system in advance, the eavesdropper cannot perceive the hidden information embedded in the host system; further, if a random channel key unique to both the transmitter and the receiver is added to the random number generator seed, since the eavesdropper cannot acquire the random channel key of the host system, the eavesdropper cannot generate random gaussian noise consistent with the covert communication system, and thus the eavesdropper cannot recover the covert bits even if knowing the working mechanism of the covert communication system.
When the signal-to-noise ratio of the channel is high, after channel error correction coding, the data of both the transmitting and receiving sides of the host system are identical. The covert receiver generates the same Gaussian noise sequence of the covert transmitter by using the host system to seed the random number, and the seeds of the transmitting and receiving dual-emission Gaussian noise generator are the same. Meanwhile, the modulation signal of the host system is subtracted from the signal received by the channel, namely the combined normal distribution noise containing the channel noise. And then, the Gaussian noise and the joint normal distribution noise containing the channel noise are correlated to obtain the estimation of the correlation coefficient of the Gaussian noise, and the estimation of the hidden bit is obtained through hard decision.
The invention has the beneficial effects that: the hidden bit to be transmitted is converted into a united normal distribution random sequence and is superposed into the traditional digital communication system. This method is insensitive to eavesdroppers, and legitimate users carry out covert transmission of information.
Drawings
Fig. 1 is an overall block diagram of a covert communication system.
Fig. 2 is a constellation diagram of joint normal distribution noise superimposed on a host communication system after modulation by a covert communication system.
Fig. 3 shows the bit error rate of the covert communication system under different signal-to-noise ratios.
Detailed Description
The invention is further described below with reference to the accompanying drawings.
Referring to fig. 1 to 3, a covert communication system based on random noise modulation comprises:
a concealment transmitter for generating a noise sequence n from host communication data as a seed to a white Gaussian noise generator in a concealment system1、n2;n1、n2Forming joint normal distribution noise w, and modulating by using a correlation coefficient hidden bit c; the random noise w is superposed to the output of the digital modulation of the traditional digital transmitter, enters an up-sampling and root raised cosine filter and is transmitted to a channel;
a covert receiver for the synchronization, channel estimation and recovery of random noise w at the receiving end of a covert system, all by means of a sinkThe main system is used for completion; local white Gaussian noise generation by seeding a Gaussian noise generator with data from a host systemObtaining an estimate of random noise w by means of a host systemThen theAndand performing correlation and hard decision to recover the hidden system.
The host system is a traditional digital communication system, a digital transmitter comprises a signal source, a channel coding, a digital modulation, an upsampling and root raised cosine FIR filter and transmits the signal to a channel, assuming equal probability and random generation of '0' and '1' of the signal source A, the channel coding adopts convolutional codes with code rate of 2/3, constraint length vector of [5,4] and code generating matrix of [23,35, 0; 0,5,13] to correct error codes generated by the channel, the output of the encoder is C, other error correction codes such as low density parity check code (L DPC) are also applicable, the digital modulation adopts 16QAM modulation of Gray coding (other multi-system digital modulation is also applicable), binary bits are mapped to modulation symbols S, and then the modulation symbols are subjected to a pulse shaping filter of Root Raised Cosine (RRC) with 4 times of upsampling and 0.25 roll-off coefficient, and finally the signal is transmitted to the channel.
The digital receiver of the host system comprises down-sampling, root raised cosine filtering, digital demodulation, channel decoding and information sink, and recovers the data transmitted by the transmitter. The received signal is matched with the transmitted signal by down-sampling and root raised cosine filtering to obtain maximum signal-to-noise ratioGray coded 16QAM digital demodulation mapping modulation symbols to contain erroneous bitsOf a bit streamError correction is performed on the bit stream using a high efficiency Viterbi decoding algorithm corresponding to the transmitter channel coding to recover the data transmitted by the transmitter
The covert transmitter comprises: the method comprises the following steps of hiding a bit information source, selecting a correlation coefficient, generating a Gaussian white noise generator and combining normal distribution random noise. The hidden system is parasitic in the host system, and takes host communication data (all or predetermined partial data in each frame) as the seed of a Gaussian white noise generator to generate a noise sequence n1,n2(ii) a The hidden bit c determines the correlation coefficient of the combined normal distribution random noise W, namely the correlation coefficient of W is modulated by c; the random noise W is linearly superposed to the output of the digital modulation of the traditional digital transmitter, Z is S + W, and enters an up-sampling and root raised cosine filter together to be transmitted to a channel, so that the digital modulation of the hidden bit is completed.
The combined normal distribution random noise W is generated by the following formula
Wherein c is the information bit of the concealment system; w (t) and n1(t) the correlation coefficient between (t) is modulated by a concealment bit c, assuming that when a transmission bit is '0', the correlation coefficient is ρ, and when the transmission bit is '1', the correlation coefficient is- ρ; n is1(t),n2(t) are independent of each other, obeyThe normal distribution of (1) is a random process.
The covert receiver comprises: a digital modulator and a white gaussian noise generator, a correlator, and a decision taker consistent with conventional digital transmitters. After digital demodulation, the traditional receiver is digitally modulated to obtainObtaining estimates of the transmitted modulation symbolsAnd then receiving the signal fromMinusObtaining estimates of the joint normal distribution random noise of a hidden transmitterThe Gaussian white noise generator seed is derived from all or a predetermined part of host communication dataGenerating noise Andinput to a correlator to obtainEstimation of correlation coefficientsThen, hard decision is carried out to recover the hidden bitIn the above processNoise introduced by the channel (called channel noise n (t)) and noise introduced by erroneous modulation symbols of the host system (called modulation noise) are included. When the host system is trustedWhen the noise ratio is high, after the channel error correction coding, the data communicated by the host transceiver and the host transceiver are completely consistent, and the covert system receiver can generate the noise n same as that of the transmitter1That is to say
In order to reduce the influence of the introduced concealment system on the host system, the power of the joint normal distribution random noise of the concealment system is set to be 30dB lower than the modulated symbol power of the host system. Referring to fig. 2, the digital modulation of the host system is 16QAM, linearly superimposed with the constellation diagram after masking the random noise of the system.
Let the signal-to-noise ratio of the concealment system be the ratio of the noise power of the concealment system to the channel noise power, i.e.
set at one code element TbThe number of the discrete samples is N, the output of the correlator after the discrete is
After the judgment, the hidden bit can be recovered.
As shown in fig. 3, the specific derivation process of the theoretical bit error rate of the bit error rates under different snr conditions of the concealment system is as follows:
without lossIn general, assuming the transmitted bit of the concealment system is' 0 The receiver estimates the joint normal distribution noise, which includes the channel noise and the modulation noise, for the convenience of derivation, the modulation noise is added to the channel noise, and the sum of the two is denoted as n (t). Since n is1(t),n2(t), n (t) are both white Gaussian noise, so that the discrete sample values { n }1,kn2,k,nkK is 1,2, …, N is independent of each other,although u is not Gaussian, according to the central limit theorem, u converges to a Gaussian distribution with a mean value of
And second moment
The variance of the factor u is
As shown in FIG. 2, in order to minimize the impact on the host system, the power of the concealment system is assumed to be 30dB lower than the power of the host system. Assuming the host system transmit power is 0dB, the signal-to-noise ratio of the additive channel is 10, 20]In dB, therefore, the signal-to-noise ratio for the concealment system is γ ∈ [ -20, -10 [ ]]dB, i.e.It is further noted that when the correlation coefficient ρ ∈ [0,1 ] is used]When the temperature of the water is higher than the set temperature,
1+ρ2∈[1,2]
therefore, the variance of u can be approximated toThat is to sayBased on this, assuming that the concealment system transmits '0' and '1' with equal probability, the bit error rate is
Where the complementary error function is defined as
In fig. 3, the sampling length N is 200, and the correlation coefficient ρ is 0.8, it can be seen that as the signal-to-noise ratio of the concealment system increases, the bit error rate decreases rapidly, and at-10 dB, the bit error rate is less than 0.001, which can meet the actual requirement. The bit error rate is further reduced by increasing the sampling length, but the transmission rate is also reduced. If the concealment system adds channel coding, the bit error rate is lower, but the side effect of reducing the transmission code rate is brought.
Claims (2)
1. A covert communication system based on random noise modulation, comprising: the system comprises:
a concealment transmitter for generating a noise sequence n from host communication data as a seed to a white Gaussian noise generator in a concealment system1、n2;n1、n2Forming joint normal distribution noise w, wherein the correlation coefficient of the joint normal distribution noise w is modulated by a hidden bit c; the random noise w is superposed to the output of the digital modulation of the traditional digital transmitter, enters an up-sampling and root raised cosine filter and is transmitted to a channel;
a covert receiver for synchronization, channel estimation and recovery of random noise w at the receiving end of the covert system, all by means of a host systemCompleting the process; local white Gaussian noise generation by seeding a Gaussian noise generator with data from a host systemObtaining an estimate of random noise w by means of a host systemThen theAndmaking correlation, and then recovering a hidden system through hard decision;
in said concealed transmitter, the noise sequence n1、n2The correlation coefficient of the joint normal distribution noise is modulated by the concealed bit c, and the process is as follows:
the joint normal distribution noise of the concealment system is:
wherein, c is the information bit of the hidden system; w (t) and n1(t) the correlation coefficient between (t) is modulated by a concealment bit c, assuming that when a transmission bit is '0', the correlation coefficient is ρ, and when the transmission bit is '1', the correlation coefficient is- ρ; noise sequence n1(t)、n2(t) are independent of each other, all obeyThe normal distribution random process of (1);
linearly superposing the modulated random noise w to the modulated symbol of the host transmitter;
the host system is a traditional digital communication system, and the transmitting and receiving processes are as follows:
the code rate adopted by the host system is 2/3, the constraint length vector is [5,4] and the code generation matrix is [23,35, 0; 0,5,13] to correct the error code generated by the channel; decoding a channel by adopting a Viterbi algorithm at a receiving end; carrying out digital modulation and demodulation by adopting 16QAM of Gray code; a root-raised cosine filter with roll-off coefficient of 0.25 and 4 times of up-sampling/down-sampling is adopted to realize pulse shaping and matched filtering;
in the covert receiver, a traditional receiver obtains an estimate of a transmitted modulation symbol after digital demodulation and digital modulationAnd then receiving the signal fromMinusObtaining estimates of the joint normal distribution random noise of a hidden transmitterThe Gaussian white noise generator seed is derived from all or a predetermined part of host communication dataGenerating noise Andinput to a correlator to obtainEstimation of correlation coefficientsThen, hard decision is carried out to recover the hidden bit
2. A covert communication system based on random noise modulation as claimed in claim 1 wherein: in the concealed receiver, the derivation process of the theoretical bit error rate is as follows:
setting the bit sent by the concealment system to' 0 Estimation of joint normal distribution noise by receiverThe method comprises the steps of including channel noise introduced by a channel and modulation noise introduced by host modulated symbol errors, classifying the modulation noise into the channel noise, recording the sum of the two as n (t), and assuming that data of a transmitting party and a receiving party are the same after a host system is subjected to channel error correction decoding, a hidden system receiver can generate white Gaussian noise n consistent with a transmitter1(t), assuming n1(t)、n2(t), n (t) are both Gaussian white noise, so the discrete sample values { n }1,kn2,k,…,nk,kK is 1,2, …, N independently of one another;
let the signal-to-noise ratio γ of the concealment system be the ratio of the noise power of the concealment system to the channel noise power, i.e. the ratio
Where E is desired and the correlator output is
Where N is the number of discrete samples within a masked bit duration, and although u is not Gaussian, according to the central limit theorem u converges to a Gaussian distribution with an average of
The variance is:
therefore, assuming that the concealed bits '0' and '1' are equal in probability, the bit error rate is:
wherein the complementary error function is defined as
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810305109.4A CN108632255B (en) | 2018-04-08 | 2018-04-08 | Covert communication system based on random noise modulation |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810305109.4A CN108632255B (en) | 2018-04-08 | 2018-04-08 | Covert communication system based on random noise modulation |
Publications (2)
Publication Number | Publication Date |
---|---|
CN108632255A CN108632255A (en) | 2018-10-09 |
CN108632255B true CN108632255B (en) | 2020-08-07 |
Family
ID=63704986
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201810305109.4A Active CN108632255B (en) | 2018-04-08 | 2018-04-08 | Covert communication system based on random noise modulation |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN108632255B (en) |
Families Citing this family (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109714737B (en) * | 2019-02-21 | 2021-08-20 | 江苏大学 | D2D covert communication system with full-duplex base station cellular network and communication method thereof |
CN110278560B (en) * | 2019-06-06 | 2022-10-18 | 浙江机电职业技术学院 | Concealed communication system based on IEEE802.11a |
CN111525976B (en) * | 2020-03-03 | 2023-05-12 | 浙江警察学院 | Covert communication method based on normal random process mean parameter modulation |
CN112187373B (en) * | 2020-08-28 | 2022-02-01 | 浙江大学 | Concealed channel communication method based on gyroscope resonance |
CN112865916A (en) * | 2021-01-05 | 2021-05-28 | 福州大学 | Method for hiding transmitting node in covert communication system |
CN113141604B (en) * | 2021-04-27 | 2023-04-07 | 河北爱其科技有限公司 | Bluetooth safety communication system |
CN113489587B (en) * | 2021-07-30 | 2023-05-16 | 南京信息工程大学 | Covert communication method, covert communication system, storage medium and computing device |
CN113746803B (en) * | 2021-08-02 | 2022-04-29 | 西安电子科技大学 | Covert communication method, system, computer equipment and processing terminal |
CN114401062B (en) * | 2021-12-31 | 2023-05-30 | 北京升哲科技有限公司 | Signal-to-noise ratio adjustment method and device, electronic equipment and storage medium |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105959245A (en) * | 2016-04-20 | 2016-09-21 | 刘方正 | Broadband agile hopping hidden communication waveform generation method |
CN106535177A (en) * | 2016-11-22 | 2017-03-22 | 浙江工业大学 | Autoregressive artificial noise-based covert communication method |
CN106714148A (en) * | 2016-12-09 | 2017-05-24 | 浙江警察学院 | Concealed communication method based on joint normal random process |
Family Cites Families (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2016164146A2 (en) * | 2015-03-16 | 2016-10-13 | Lockheed Martin Corporation | Apparatus and method for increased data rates in underwater communications using orbital angular momentum |
-
2018
- 2018-04-08 CN CN201810305109.4A patent/CN108632255B/en active Active
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105959245A (en) * | 2016-04-20 | 2016-09-21 | 刘方正 | Broadband agile hopping hidden communication waveform generation method |
CN106535177A (en) * | 2016-11-22 | 2017-03-22 | 浙江工业大学 | Autoregressive artificial noise-based covert communication method |
CN106714148A (en) * | 2016-12-09 | 2017-05-24 | 浙江警察学院 | Concealed communication method based on joint normal random process |
Non-Patent Citations (3)
Title |
---|
"Wireless covert communications with code spectrum modulation of UWB noise signals";V. I. Kalinin 等;《2010 20th International Crimean Conference "Microwave & Telecommunication Technology"》;20101130;第366-367页 * |
"基于 对称稳定分布的隐蔽通信系统";王亢 等;《中国科学(信息科学)》;20170331;第47卷(第3期);第374-384页 * |
"基于噪声调相干扰寄生扩频的隐蔽信息传输";石荣 等;《火力与指挥控制》;20171130;第42卷(第11期);第60-64页 * |
Also Published As
Publication number | Publication date |
---|---|
CN108632255A (en) | 2018-10-09 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN108632255B (en) | Covert communication system based on random noise modulation | |
US8312551B2 (en) | Low level sequence as an anti-tamper Mechanism | |
US8458559B2 (en) | Method and apparatus for encoding and decoding | |
CA2579983C (en) | Method and apparatus for encryption of wireless communication | |
CA2995500C (en) | A differential chaos shift keying (dcsk) based on hybrid chaotic system | |
CN107148015B (en) | Continuous encryption physical layer secure transmission method based on polarization code structure | |
CN101584170A (en) | System and method for human body communication using limited passband | |
WO2003034646A2 (en) | Method and apparatus for channel quality measurements | |
CN106535177B (en) | A kind of concealed communication method based on autoregression man made noise | |
CN110233701B (en) | Coding and decoding method for wireless communication physical layer communication safety | |
CN107231215B (en) | Polarization code-based safe transmission method under parallel channel | |
US20160212616A1 (en) | Secure Transmissions Of Narrowband Digital Signals | |
Nain et al. | A reliable covert channel over IEEE 802.15. 4 using steganography | |
CN104270227A (en) | Null-shift-keying-based physical layer safety transmission method in multi-input single-output system | |
CN111065096A (en) | Physical layer encryption transmission system for wireless communication and method thereof | |
CN109743155B (en) | Physical layer secure transmission method based on antenna selection differential chaos keying | |
CN113923312B (en) | Robust reversible watermarking method of digital image coding layer based on wireless communication | |
CN109462456B (en) | Streaming media safe transmission method based on error code diffusion and noise aggregation | |
Mehta et al. | Steganography in 802.15. 4 wireless communication | |
Torres-Figueroa et al. | Experimental evaluation of a modular coding scheme for physical layer security | |
WO2017063716A1 (en) | Secure paring method for mimo systems | |
CN102647258B (en) | Cross-layer enhancing safety processing method of wireless communication MIMO (Multi-Input Multi-Output) system | |
KR102631694B1 (en) | System and Method for encryption/decription and channel-coding | |
US20210328840A1 (en) | All digital non-conventional chaotic communication systems for resilient communications and signaling | |
Hamamreh et al. | An efficient security method based on exploiting channel state information (CSI) |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |