CN108632255B - Covert communication system based on random noise modulation - Google Patents

Covert communication system based on random noise modulation Download PDF

Info

Publication number
CN108632255B
CN108632255B CN201810305109.4A CN201810305109A CN108632255B CN 108632255 B CN108632255 B CN 108632255B CN 201810305109 A CN201810305109 A CN 201810305109A CN 108632255 B CN108632255 B CN 108632255B
Authority
CN
China
Prior art keywords
noise
bit
channel
host
normal distribution
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201810305109.4A
Other languages
Chinese (zh)
Other versions
CN108632255A (en
Inventor
王亢
周国民
李国军
董齐芬
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Zhejiang Police College
Original Assignee
Zhejiang Police College
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Zhejiang Police College filed Critical Zhejiang Police College
Priority to CN201810305109.4A priority Critical patent/CN108632255B/en
Publication of CN108632255A publication Critical patent/CN108632255A/en
Application granted granted Critical
Publication of CN108632255B publication Critical patent/CN108632255B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L1/00Arrangements for detecting or preventing errors in the information received
    • H04L1/20Arrangements for detecting or preventing errors in the information received using signal quality detector
    • H04L1/203Details of error rate determination, e.g. BER, FER or WER
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L25/00Baseband systems
    • H04L25/02Details ; arrangements for supplying electrical power along data transmission lines
    • H04L25/0202Channel estimation

Abstract

A concealed digital communication system based on random noise modulation, a transmitter takes host data as a seed of a Gaussian noise generator; the correlation coefficient of the joint normal distribution noise is modulated by a hidden bit; carrying the joint normal distribution noise of the hidden bit, and linearly superposing the joint normal distribution noise to the output of the host transmitter digital modulator; at the receiving end, the host data is used as a seed to generate Gaussian noise which is the same as that of the transmitter, then the Gaussian noise is correlated with the estimation of the joint normal distribution noise, and the hidden bit can be recovered after hard decision, so that the hidden transmission of information is realized. The invention has strong concealment.

Description

Covert communication system based on random noise modulation
Technical Field
The invention relates to the technical field of wireless communication and information security, in particular to a covert communication system based on random noise modulation.
Background
Due to the openness of an electromagnetic space and the radiation of electromagnetic signal transmission, a communication signal bearing important information is completely exposed in a free space, and a standard protocol is widely adopted, so that mobile data is easily intercepted by an illegal user in the transmission process, and personal important information such as user privacy, finance and the like is possibly leaked. In the cryptographic technology, plaintext information to be transmitted is encrypted, and the plaintext is converted into unrecognizable ciphertext, so that the encrypted information is difficult to understand. However, another problem is caused by the encryption technology, which encrypts the plaintext into a bunch of messy codes and rather reminds the eavesdropper that the transmitted data has important information.
How to escape from the strict monitoring of an eavesdropper and realize the concealed transmission of electromagnetic signals becomes the key of information countermeasure and the competition for the control right of an electromagnetic space in military; for civil use, the key to protect important information of users from eavesdropping is provided.
A conventional digital transmitter (considering only the baseband), which includes a source, channel coding, digital modulation, upsampling and root-raised cosine FIR filter, transmits to the channel. Conventional digital receivers (only baseband considered): the method comprises down-sampling, root raised cosine filtering, digital demodulation, channel decoding and information sink, and information transmitted by a transmitter is restored.
Disclosure of Invention
In order to overcome the defects that the prior legal user can not reliably ensure that important information is not intercepted and the concealment is poor, and in order to enable the legal user to realize the safe transmission of concealed data, the invention provides a concealed communication system modulated by random noise, which is a concealed communication system on a communication link by the existing party (or other party, even enemy), and is a concealed communication means with strong survivability because the channel of the concealed communication system is prevented from being intentionally interfered and physically destroyed by the enemy. The method not only basically does not affect the service quality of the original system, but also can effectively ensure the smooth communication of the own party.
In order to solve the technical problems, the invention provides the following technical scheme:
a covert communication system based on random noise modulation comprising:
a concealment transmitter for generating a noise sequence n from host communication data as a seed to a white Gaussian noise generator in a concealment system1、n2;n1、n2Forming joint normal distribution noise w, and modulating by using a correlation coefficient hidden bit c; the random noise w is superposed to the output of the digital modulation of the traditional digital transmitter, enters an up-sampling and root raised cosine filter and is transmitted to a channel;
the covert receiver is used for synchronizing the receiving end of the covert system, estimating a channel and recovering random noise w and is completed by a host system; local white Gaussian noise generation by seeding a Gaussian noise generator with data from a host system
Figure BDA0001620737150000021
Obtaining an estimate of random noise w by means of a host system
Figure BDA0001620737150000022
Then the
Figure BDA0001620737150000023
And
Figure BDA0001620737150000024
and performing correlation and hard decision to recover the hidden system.
Further, in said covert transmitter, a noise sequence n1、n2The correlation coefficient of the joint normal distribution noise is modulated by the concealed bit c, and the process is as follows:
the joint normal distribution noise of the concealment system is:
Figure BDA0001620737150000025
wherein, c is the information bit of the hidden system; w (t) and n1(t) the correlation coefficient between (t) is modulated by a concealment bit c, assuming that when a transmission bit is '0', the correlation coefficient is ρ, and when the transmission bit is '1', the correlation coefficient is- ρ; noise sequence n1(t)、n2(t) are independent of each other, all obey
Figure BDA0001620737150000031
The normal distribution random process of (1);
the random noise w, after modulation, is linearly superimposed on the host transmitter modulated symbols.
Still further, the host system is a traditional digital communication system, and the transmitting and receiving processes are as follows:
the code rate adopted by the host system is 2/3, the constraint length vector is [5,4] and the code generation matrix is [23,35, 0; 0,5,13] to correct the error code generated by the channel; decoding a channel by adopting a Viterbi algorithm at a receiving end; carrying out digital modulation and demodulation by adopting 16QAM of Gray code; and a root raised cosine filter with roll-off coefficients of 0.25 and 4 times of up-sampling/down-sampling is adopted to realize pulse shaping and matched filtering.
Other types of multi-system digital modulation modes, channel error correction coding, and pulse shaping and matched filtering are all applicable to the invention.
In the covert receiver, a traditional receiver obtains an estimate of a transmitted modulation symbol after digital demodulation and digital modulation
Figure BDA0001620737150000032
And then receiving the signal from
Figure BDA0001620737150000033
Minus
Figure BDA0001620737150000034
Obtaining estimates of the joint normal distribution random noise of a hidden transmitter
Figure BDA0001620737150000035
The Gaussian white noise generator seed is derived from all or a predetermined part of host communication data
Figure BDA0001620737150000036
Generating noise
Figure BDA0001620737150000037
Figure BDA0001620737150000038
And
Figure BDA0001620737150000039
input to a correlator to obtain
Figure BDA00016207371500000310
Estimation of correlation coefficients
Figure BDA00016207371500000311
Then, the hard decision is performed to recoverInto a concealed bit
Figure BDA00016207371500000312
In the concealed receiver, the derivation process of the theoretical bit error rate is as follows:
setting the bit sent by the concealment system to' 0
Figure BDA00016207371500000313
Figure BDA00016207371500000314
Estimation of joint normal distribution noise by receiver
Figure BDA00016207371500000315
The method comprises the steps of including channel noise introduced by a channel and modulation noise introduced by host modulated symbol errors, classifying the modulation noise into the channel noise, recording the sum of the two as n (t), and assuming that data of a transmitting party and a receiving party are the same after a host system is subjected to channel error correction decoding, a hidden system receiver can generate white Gaussian noise n consistent with a transmitter1(t), assuming n1(t)、n2(t), n (t) are both Gaussian white noise, so the discrete sample values { n }1,kn2,k,nkK is 1,2, …, N independently of one another;
let the signal-to-noise ratio γ of the concealment system be the ratio of the noise power of the concealment system to the channel noise power, i.e. the ratio
Figure BDA0001620737150000041
Where E is desired and the correlator output is
Figure BDA0001620737150000042
Where N is the number of discrete samples within a masked bit duration, and although u is not Gaussian, according to the central limit theorem u converges to a Gaussian distribution with an average of
Figure BDA0001620737150000043
The variance is:
Figure BDA0001620737150000044
therefore, assuming that the concealed bits '0' and '1' are equal in probability, the bit error rate is:
Figure BDA0001620737150000045
wherein the complementary error function is defined as
Figure BDA0001620737150000051
The conception of the invention is as follows: the present invention is a random noise modulated digital covert communication system hosted by a host system. The transmitting power of the covert communication system is far lower than that of the host system, and the influence on the host system is small; after strong channel error correction coding, the receiving and transmitting information of the host system are completely the same, so that the random number seeds of the receiving and transmitting parties of the hidden system are also completely consistent, and the receiving and transmitting parties can generate the same random Gaussian noise; the correlation coefficient of the joint normal distribution noise is determined by the hidden bit; joint normal distribution noise superimposed on host digital modulation belongs to one of common channel noise types; if the eavesdropper fails to acquire the working mechanism of the hidden system in advance, the eavesdropper cannot perceive the hidden information embedded in the host system; further, if a random channel key unique to both the transmitter and the receiver is added to the random number generator seed, since the eavesdropper cannot acquire the random channel key of the host system, the eavesdropper cannot generate random gaussian noise consistent with the covert communication system, and thus the eavesdropper cannot recover the covert bits even if knowing the working mechanism of the covert communication system.
When the signal-to-noise ratio of the channel is high, after channel error correction coding, the data of both the transmitting and receiving sides of the host system are identical. The covert receiver generates the same Gaussian noise sequence of the covert transmitter by using the host system to seed the random number, and the seeds of the transmitting and receiving dual-emission Gaussian noise generator are the same. Meanwhile, the modulation signal of the host system is subtracted from the signal received by the channel, namely the combined normal distribution noise containing the channel noise. And then, the Gaussian noise and the joint normal distribution noise containing the channel noise are correlated to obtain the estimation of the correlation coefficient of the Gaussian noise, and the estimation of the hidden bit is obtained through hard decision.
The invention has the beneficial effects that: the hidden bit to be transmitted is converted into a united normal distribution random sequence and is superposed into the traditional digital communication system. This method is insensitive to eavesdroppers, and legitimate users carry out covert transmission of information.
Drawings
Fig. 1 is an overall block diagram of a covert communication system.
Fig. 2 is a constellation diagram of joint normal distribution noise superimposed on a host communication system after modulation by a covert communication system.
Fig. 3 shows the bit error rate of the covert communication system under different signal-to-noise ratios.
Detailed Description
The invention is further described below with reference to the accompanying drawings.
Referring to fig. 1 to 3, a covert communication system based on random noise modulation comprises:
a concealment transmitter for generating a noise sequence n from host communication data as a seed to a white Gaussian noise generator in a concealment system1、n2;n1、n2Forming joint normal distribution noise w, and modulating by using a correlation coefficient hidden bit c; the random noise w is superposed to the output of the digital modulation of the traditional digital transmitter, enters an up-sampling and root raised cosine filter and is transmitted to a channel;
a covert receiver for the synchronization, channel estimation and recovery of random noise w at the receiving end of a covert system, all by means of a sinkThe main system is used for completion; local white Gaussian noise generation by seeding a Gaussian noise generator with data from a host system
Figure BDA0001620737150000061
Obtaining an estimate of random noise w by means of a host system
Figure BDA0001620737150000062
Then the
Figure BDA0001620737150000063
And
Figure BDA0001620737150000064
and performing correlation and hard decision to recover the hidden system.
The host system is a traditional digital communication system, a digital transmitter comprises a signal source, a channel coding, a digital modulation, an upsampling and root raised cosine FIR filter and transmits the signal to a channel, assuming equal probability and random generation of '0' and '1' of the signal source A, the channel coding adopts convolutional codes with code rate of 2/3, constraint length vector of [5,4] and code generating matrix of [23,35, 0; 0,5,13] to correct error codes generated by the channel, the output of the encoder is C, other error correction codes such as low density parity check code (L DPC) are also applicable, the digital modulation adopts 16QAM modulation of Gray coding (other multi-system digital modulation is also applicable), binary bits are mapped to modulation symbols S, and then the modulation symbols are subjected to a pulse shaping filter of Root Raised Cosine (RRC) with 4 times of upsampling and 0.25 roll-off coefficient, and finally the signal is transmitted to the channel.
The digital receiver of the host system comprises down-sampling, root raised cosine filtering, digital demodulation, channel decoding and information sink, and recovers the data transmitted by the transmitter. The received signal is matched with the transmitted signal by down-sampling and root raised cosine filtering to obtain maximum signal-to-noise ratio
Figure BDA0001620737150000071
Gray coded 16QAM digital demodulation mapping modulation symbols to contain erroneous bitsOf a bit stream
Figure BDA0001620737150000072
Error correction is performed on the bit stream using a high efficiency Viterbi decoding algorithm corresponding to the transmitter channel coding to recover the data transmitted by the transmitter
Figure BDA0001620737150000073
The covert transmitter comprises: the method comprises the following steps of hiding a bit information source, selecting a correlation coefficient, generating a Gaussian white noise generator and combining normal distribution random noise. The hidden system is parasitic in the host system, and takes host communication data (all or predetermined partial data in each frame) as the seed of a Gaussian white noise generator to generate a noise sequence n1,n2(ii) a The hidden bit c determines the correlation coefficient of the combined normal distribution random noise W, namely the correlation coefficient of W is modulated by c; the random noise W is linearly superposed to the output of the digital modulation of the traditional digital transmitter, Z is S + W, and enters an up-sampling and root raised cosine filter together to be transmitted to a channel, so that the digital modulation of the hidden bit is completed.
The combined normal distribution random noise W is generated by the following formula
Figure BDA0001620737150000074
Wherein c is the information bit of the concealment system; w (t) and n1(t) the correlation coefficient between (t) is modulated by a concealment bit c, assuming that when a transmission bit is '0', the correlation coefficient is ρ, and when the transmission bit is '1', the correlation coefficient is- ρ; n is1(t),n2(t) are independent of each other, obey
Figure BDA0001620737150000081
The normal distribution of (1) is a random process.
The covert receiver comprises: a digital modulator and a white gaussian noise generator, a correlator, and a decision taker consistent with conventional digital transmitters. After digital demodulation, the traditional receiver is digitally modulated to obtainObtaining estimates of the transmitted modulation symbols
Figure BDA0001620737150000082
And then receiving the signal from
Figure BDA0001620737150000083
Minus
Figure BDA0001620737150000084
Obtaining estimates of the joint normal distribution random noise of a hidden transmitter
Figure BDA0001620737150000085
The Gaussian white noise generator seed is derived from all or a predetermined part of host communication data
Figure BDA0001620737150000086
Generating noise
Figure BDA0001620737150000087
Figure BDA0001620737150000088
And
Figure BDA0001620737150000089
input to a correlator to obtain
Figure BDA00016207371500000810
Estimation of correlation coefficients
Figure BDA00016207371500000811
Then, hard decision is carried out to recover the hidden bit
Figure BDA00016207371500000812
In the above process
Figure BDA00016207371500000813
Noise introduced by the channel (called channel noise n (t)) and noise introduced by erroneous modulation symbols of the host system (called modulation noise) are included. When the host system is trustedWhen the noise ratio is high, after the channel error correction coding, the data communicated by the host transceiver and the host transceiver are completely consistent, and the covert system receiver can generate the noise n same as that of the transmitter1That is to say
Figure BDA00016207371500000814
In order to reduce the influence of the introduced concealment system on the host system, the power of the joint normal distribution random noise of the concealment system is set to be 30dB lower than the modulated symbol power of the host system. Referring to fig. 2, the digital modulation of the host system is 16QAM, linearly superimposed with the constellation diagram after masking the random noise of the system.
Let the signal-to-noise ratio of the concealment system be the ratio of the noise power of the concealment system to the channel noise power, i.e.
Figure BDA00016207371500000815
At the receiving end, assume that
Figure BDA0001620737150000091
Figure BDA0001620737150000092
And n1(t) correlating, the output is recorded as μ,
Figure BDA0001620737150000093
set at one code element TbThe number of the discrete samples is N, the output of the correlator after the discrete is
Figure BDA0001620737150000094
After the judgment, the hidden bit can be recovered.
As shown in fig. 3, the specific derivation process of the theoretical bit error rate of the bit error rates under different snr conditions of the concealment system is as follows:
without lossIn general, assuming the transmitted bit of the concealment system is' 0
Figure BDA0001620737150000095
Figure BDA0001620737150000096
The receiver estimates the joint normal distribution noise, which includes the channel noise and the modulation noise, for the convenience of derivation, the modulation noise is added to the channel noise, and the sum of the two is denoted as n (t). Since n is1(t),n2(t), n (t) are both white Gaussian noise, so that the discrete sample values { n }1,kn2,k,nkK is 1,2, …, N is independent of each other,
Figure BDA0001620737150000097
although u is not Gaussian, according to the central limit theorem, u converges to a Gaussian distribution with a mean value of
Figure BDA0001620737150000098
And second moment
Figure BDA0001620737150000101
The variance of the factor u is
Figure BDA0001620737150000102
As shown in FIG. 2, in order to minimize the impact on the host system, the power of the concealment system is assumed to be 30dB lower than the power of the host system. Assuming the host system transmit power is 0dB, the signal-to-noise ratio of the additive channel is 10, 20]In dB, therefore, the signal-to-noise ratio for the concealment system is γ ∈ [ -20, -10 [ ]]dB, i.e.
Figure BDA0001620737150000103
It is further noted that when the correlation coefficient ρ ∈ [0,1 ] is used]When the temperature of the water is higher than the set temperature,
1+ρ2∈[1,2]
therefore, the variance of u can be approximated to
Figure BDA0001620737150000104
That is to say
Figure BDA0001620737150000105
Based on this, assuming that the concealment system transmits '0' and '1' with equal probability, the bit error rate is
Figure BDA0001620737150000111
Where the complementary error function is defined as
Figure BDA0001620737150000112
In fig. 3, the sampling length N is 200, and the correlation coefficient ρ is 0.8, it can be seen that as the signal-to-noise ratio of the concealment system increases, the bit error rate decreases rapidly, and at-10 dB, the bit error rate is less than 0.001, which can meet the actual requirement. The bit error rate is further reduced by increasing the sampling length, but the transmission rate is also reduced. If the concealment system adds channel coding, the bit error rate is lower, but the side effect of reducing the transmission code rate is brought.

Claims (2)

1. A covert communication system based on random noise modulation, comprising: the system comprises:
a concealment transmitter for generating a noise sequence n from host communication data as a seed to a white Gaussian noise generator in a concealment system1、n2;n1、n2Forming joint normal distribution noise w, wherein the correlation coefficient of the joint normal distribution noise w is modulated by a hidden bit c; the random noise w is superposed to the output of the digital modulation of the traditional digital transmitter, enters an up-sampling and root raised cosine filter and is transmitted to a channel;
a covert receiver for synchronization, channel estimation and recovery of random noise w at the receiving end of the covert system, all by means of a host systemCompleting the process; local white Gaussian noise generation by seeding a Gaussian noise generator with data from a host system
Figure FDA0002536496910000011
Obtaining an estimate of random noise w by means of a host system
Figure FDA0002536496910000012
Then the
Figure FDA0002536496910000013
And
Figure FDA0002536496910000014
making correlation, and then recovering a hidden system through hard decision;
in said concealed transmitter, the noise sequence n1、n2The correlation coefficient of the joint normal distribution noise is modulated by the concealed bit c, and the process is as follows:
the joint normal distribution noise of the concealment system is:
Figure FDA0002536496910000015
wherein, c is the information bit of the hidden system; w (t) and n1(t) the correlation coefficient between (t) is modulated by a concealment bit c, assuming that when a transmission bit is '0', the correlation coefficient is ρ, and when the transmission bit is '1', the correlation coefficient is- ρ; noise sequence n1(t)、n2(t) are independent of each other, all obey
Figure FDA0002536496910000016
The normal distribution random process of (1);
linearly superposing the modulated random noise w to the modulated symbol of the host transmitter;
the host system is a traditional digital communication system, and the transmitting and receiving processes are as follows:
the code rate adopted by the host system is 2/3, the constraint length vector is [5,4] and the code generation matrix is [23,35, 0; 0,5,13] to correct the error code generated by the channel; decoding a channel by adopting a Viterbi algorithm at a receiving end; carrying out digital modulation and demodulation by adopting 16QAM of Gray code; a root-raised cosine filter with roll-off coefficient of 0.25 and 4 times of up-sampling/down-sampling is adopted to realize pulse shaping and matched filtering;
in the covert receiver, a traditional receiver obtains an estimate of a transmitted modulation symbol after digital demodulation and digital modulation
Figure FDA0002536496910000021
And then receiving the signal from
Figure FDA0002536496910000022
Minus
Figure FDA0002536496910000023
Obtaining estimates of the joint normal distribution random noise of a hidden transmitter
Figure FDA0002536496910000024
The Gaussian white noise generator seed is derived from all or a predetermined part of host communication data
Figure FDA0002536496910000025
Generating noise
Figure FDA0002536496910000026
Figure FDA0002536496910000027
And
Figure FDA0002536496910000028
input to a correlator to obtain
Figure FDA0002536496910000029
Estimation of correlation coefficients
Figure FDA00025364969100000210
Then, hard decision is carried out to recover the hidden bit
Figure FDA00025364969100000211
2. A covert communication system based on random noise modulation as claimed in claim 1 wherein: in the concealed receiver, the derivation process of the theoretical bit error rate is as follows:
setting the bit sent by the concealment system to' 0
Figure FDA00025364969100000212
Figure FDA00025364969100000213
Estimation of joint normal distribution noise by receiver
Figure FDA00025364969100000214
The method comprises the steps of including channel noise introduced by a channel and modulation noise introduced by host modulated symbol errors, classifying the modulation noise into the channel noise, recording the sum of the two as n (t), and assuming that data of a transmitting party and a receiving party are the same after a host system is subjected to channel error correction decoding, a hidden system receiver can generate white Gaussian noise n consistent with a transmitter1(t), assuming n1(t)、n2(t), n (t) are both Gaussian white noise, so the discrete sample values { n }1,kn2,k,…,nk,kK is 1,2, …, N independently of one another;
let the signal-to-noise ratio γ of the concealment system be the ratio of the noise power of the concealment system to the channel noise power, i.e. the ratio
Figure FDA0002536496910000031
Where E is desired and the correlator output is
Figure FDA0002536496910000032
Where N is the number of discrete samples within a masked bit duration, and although u is not Gaussian, according to the central limit theorem u converges to a Gaussian distribution with an average of
Figure FDA0002536496910000033
The variance is:
Figure FDA0002536496910000034
therefore, assuming that the concealed bits '0' and '1' are equal in probability, the bit error rate is:
Figure FDA0002536496910000035
wherein the complementary error function is defined as
Figure FDA0002536496910000036
CN201810305109.4A 2018-04-08 2018-04-08 Covert communication system based on random noise modulation Active CN108632255B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810305109.4A CN108632255B (en) 2018-04-08 2018-04-08 Covert communication system based on random noise modulation

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810305109.4A CN108632255B (en) 2018-04-08 2018-04-08 Covert communication system based on random noise modulation

Publications (2)

Publication Number Publication Date
CN108632255A CN108632255A (en) 2018-10-09
CN108632255B true CN108632255B (en) 2020-08-07

Family

ID=63704986

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810305109.4A Active CN108632255B (en) 2018-04-08 2018-04-08 Covert communication system based on random noise modulation

Country Status (1)

Country Link
CN (1) CN108632255B (en)

Families Citing this family (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109714737B (en) * 2019-02-21 2021-08-20 江苏大学 D2D covert communication system with full-duplex base station cellular network and communication method thereof
CN110278560B (en) * 2019-06-06 2022-10-18 浙江机电职业技术学院 Concealed communication system based on IEEE802.11a
CN111525976B (en) * 2020-03-03 2023-05-12 浙江警察学院 Covert communication method based on normal random process mean parameter modulation
CN112187373B (en) * 2020-08-28 2022-02-01 浙江大学 Concealed channel communication method based on gyroscope resonance
CN112865916A (en) * 2021-01-05 2021-05-28 福州大学 Method for hiding transmitting node in covert communication system
CN113141604B (en) * 2021-04-27 2023-04-07 河北爱其科技有限公司 Bluetooth safety communication system
CN113489587B (en) * 2021-07-30 2023-05-16 南京信息工程大学 Covert communication method, covert communication system, storage medium and computing device
CN113746803B (en) * 2021-08-02 2022-04-29 西安电子科技大学 Covert communication method, system, computer equipment and processing terminal
CN114401062B (en) * 2021-12-31 2023-05-30 北京升哲科技有限公司 Signal-to-noise ratio adjustment method and device, electronic equipment and storage medium

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105959245A (en) * 2016-04-20 2016-09-21 刘方正 Broadband agile hopping hidden communication waveform generation method
CN106535177A (en) * 2016-11-22 2017-03-22 浙江工业大学 Autoregressive artificial noise-based covert communication method
CN106714148A (en) * 2016-12-09 2017-05-24 浙江警察学院 Concealed communication method based on joint normal random process

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2016164146A2 (en) * 2015-03-16 2016-10-13 Lockheed Martin Corporation Apparatus and method for increased data rates in underwater communications using orbital angular momentum

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105959245A (en) * 2016-04-20 2016-09-21 刘方正 Broadband agile hopping hidden communication waveform generation method
CN106535177A (en) * 2016-11-22 2017-03-22 浙江工业大学 Autoregressive artificial noise-based covert communication method
CN106714148A (en) * 2016-12-09 2017-05-24 浙江警察学院 Concealed communication method based on joint normal random process

Non-Patent Citations (3)

* Cited by examiner, † Cited by third party
Title
"Wireless covert communications with code spectrum modulation of UWB noise signals";V. I. Kalinin 等;《2010 20th International Crimean Conference "Microwave & Telecommunication Technology"》;20101130;第366-367页 *
"基于 对称稳定分布的隐蔽通信系统";王亢 等;《中国科学(信息科学)》;20170331;第47卷(第3期);第374-384页 *
"基于噪声调相干扰寄生扩频的隐蔽信息传输";石荣 等;《火力与指挥控制》;20171130;第42卷(第11期);第60-64页 *

Also Published As

Publication number Publication date
CN108632255A (en) 2018-10-09

Similar Documents

Publication Publication Date Title
CN108632255B (en) Covert communication system based on random noise modulation
US8312551B2 (en) Low level sequence as an anti-tamper Mechanism
US8458559B2 (en) Method and apparatus for encoding and decoding
CA2579983C (en) Method and apparatus for encryption of wireless communication
CA2995500C (en) A differential chaos shift keying (dcsk) based on hybrid chaotic system
CN107148015B (en) Continuous encryption physical layer secure transmission method based on polarization code structure
CN101584170A (en) System and method for human body communication using limited passband
WO2003034646A2 (en) Method and apparatus for channel quality measurements
CN106535177B (en) A kind of concealed communication method based on autoregression man made noise
CN110233701B (en) Coding and decoding method for wireless communication physical layer communication safety
CN107231215B (en) Polarization code-based safe transmission method under parallel channel
US20160212616A1 (en) Secure Transmissions Of Narrowband Digital Signals
Nain et al. A reliable covert channel over IEEE 802.15. 4 using steganography
CN104270227A (en) Null-shift-keying-based physical layer safety transmission method in multi-input single-output system
CN111065096A (en) Physical layer encryption transmission system for wireless communication and method thereof
CN109743155B (en) Physical layer secure transmission method based on antenna selection differential chaos keying
CN113923312B (en) Robust reversible watermarking method of digital image coding layer based on wireless communication
CN109462456B (en) Streaming media safe transmission method based on error code diffusion and noise aggregation
Mehta et al. Steganography in 802.15. 4 wireless communication
Torres-Figueroa et al. Experimental evaluation of a modular coding scheme for physical layer security
WO2017063716A1 (en) Secure paring method for mimo systems
CN102647258B (en) Cross-layer enhancing safety processing method of wireless communication MIMO (Multi-Input Multi-Output) system
KR102631694B1 (en) System and Method for encryption/decription and channel-coding
US20210328840A1 (en) All digital non-conventional chaotic communication systems for resilient communications and signaling
Hamamreh et al. An efficient security method based on exploiting channel state information (CSI)

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant