CN111246463B - Covert communication method based on skew parameter of alpha stable distribution random process - Google Patents

Covert communication method based on skew parameter of alpha stable distribution random process Download PDF

Info

Publication number
CN111246463B
CN111246463B CN202010083698.3A CN202010083698A CN111246463B CN 111246463 B CN111246463 B CN 111246463B CN 202010083698 A CN202010083698 A CN 202010083698A CN 111246463 B CN111246463 B CN 111246463B
Authority
CN
China
Prior art keywords
alpha
random
random sequence
skewness
bit
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202010083698.3A
Other languages
Chinese (zh)
Other versions
CN111246463A (en
Inventor
徐志江
金文兵
程文锋
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Zhejiang Institute of Mechanical and Electrical Engineering Co Ltd
Original Assignee
Zhejiang Institute of Mechanical and Electrical Engineering Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Zhejiang Institute of Mechanical and Electrical Engineering Co Ltd filed Critical Zhejiang Institute of Mechanical and Electrical Engineering Co Ltd
Priority to CN202010083698.3A priority Critical patent/CN111246463B/en
Publication of CN111246463A publication Critical patent/CN111246463A/en
Application granted granted Critical
Publication of CN111246463B publication Critical patent/CN111246463B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/03Protecting confidentiality, e.g. by encryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/02Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Detection And Prevention Of Errors In Transmission (AREA)

Abstract

A hidden communication method based on skew parameters in an alpha stable distribution random process is characterized in that a skewed alpha stable distribution random sequence is used as a carrier, and hidden bits transmitted by legal users modulate the polarity of the skew of the carrier sequence in front and back half bit periods to enable the absolute values of the carrier sequences to be the same but the polarities of the carrier sequences to be opposite, so that hidden signals in the whole bit period have the characteristic of symmetrical alpha stable distribution; the covert signal transmitted by this method is very similar to the symmetric alpha-stationary distributed interference present in many wireless communication networks, so that the presence of covert communication is not easily perceived by an eavesdropper. The invention provides an estimation formula of skewness with very small calculation amount and deduces a corresponding probability density function to obtain a bit error rate formula, and indicates the relationship between the bit error rate and the characteristic index, the skewness and the sample number. The invention has the advantages of easy realization, low requirement on the computing performance of equipment and better concealment.

Description

Covert communication method based on skew parameter of alpha stable distribution random process
Technical Field
The invention relates to the technical field of wireless communication and information security, in particular to a covert communication method based on skewness parameters of an alpha stable distribution random process.
Background
In daily life, communication technologies such as LTE, 5G, wiFi, and the like are becoming increasingly common. Currently and in the future, the issue of protecting the communication security involved in personal privacy, property data, etc. is receiving increasing attention. One approach is to encrypt the network connection between the transport layer and the application layer through SSL and TLS. However, another problem is introduced during encryption, and encryption technology encrypts plaintext into a bunch of messy codes and reminds an eavesdropper that important information exists in transmitted data. Another method is to use a covert communication method, so that the transmitted covert signal has a random characteristic similar to that of environmental interference, and an eavesdropper cannot distinguish the source of noise (from the covert signal transmitted by a legitimate user or the environmental interference under multiple users). Therefore, the existence of hidden transmission of a legal user cannot be detected under the strict monitoring of an eavesdropper, and the transmitted information is not cracked, so that the key that the important information of the user is not eavesdropped is realized.
Many documents state that in wireless networks such as ad hoc, wi-Fi, cellular and LET, multiple access interference follows a symmetrical alpha-stationary distribution rather than the generally assumed gaussian (normal) distribution. The invention provides a hidden communication method hidden in environmental interference by utilizing skewness parameters in alpha stable distribution.
Disclosure of Invention
In order to overcome the defects of the prior art and enable a legal user to realize the safe transmission of the covert data, the invention provides a covert communication method based on an alpha stable distribution random process skew parameter, which is easy to realize, has low requirement on the calculation performance of equipment and has better concealment.
The invention provides the following technical scheme:
a hidden communication method based on alpha stable distribution random process skewness parameter comprises information hiding processing of a sending end of a hidden communication system and information recovery processing of a receiving end of the hidden communication system;
the information hiding processing of the sending end of the covert communication system comprises the following steps:
1-1: a stationarity distribution noise generator is used to generate a random distribution sequence following an alpha stationarity distribution with a characteristic index of alpha and a skewness of beta, denoted as S (alpha, beta), in a bit period T b Has N random sequences, marked as { X k ,k=1,...,N};
1-2: the masked bit b, encoded by Manchester, at an intermediate time of each bit period, i.e. T b At/2, a jump occurs; if b =1, a transition is made from low level to high level; if b =0, the level jumps from high level to low level, the single polarity and the double polarity are changed, and unipolar '0' and unipolar '1' are respectively changed into bipolar '-1' and bipolar '+1';
1-3: the random sequence output by the stably distributed noise generator is multiplied by the reversed '-1' of single and double polarity, and the polarity of the skewness is changed, namely the random sequence of S (alpha, -beta) distribution is obtained; multiplied by '+1', still a random sequence of S (α, β) distribution;
thus, if the concealment bit b =0, the random sequence s of the first half bit period 0 ={-X k K = 1...., N/2} is a random sequence obeying S (α, - β) distribution, and a random sequence S of the second half bit period 1 ={X k K = N/2.., N } is a random sequence that follows a distribution of S (α, β); conversely, if the concealed bit b =1, the random sequence s of the first half bit period 0 ={X k K = 1.... N/2} is a random sequence that follows S (α, β) distribution, and a random sequence S of the second half of the bit period 1 ={X k K = N/2.., N } is a random sequence that follows a S (α, - β) distribution;
the information recovery processing of the covert communication system receiving end comprises the following steps:
2-1: in the case of synchronization, the receiving end is in one bit period T b After demultiplexing the received N random sequences, dividing the N random sequences into 2 sequences with the length of N/2, namely r = [ r ] 0 ,r 1 ](ii) a Then make a pair of r 1 X (-1) processing such that the skewness sign is the same for the first and second half bit periods; then multiplexing, combining the 2 random sequences with the length of N/2 into a random sequence with the length of N, and recording the random sequence as a random sequence with the length of N
Figure SMS_1
Under ideal channel, i.e. without attenuation, delay and noise, it is obvious that
Figure SMS_2
2-2: from length N
Figure SMS_3
In the random sequence, an estimate of the parameter skewness is estimated>
Figure SMS_4
The estimated value of skewness is
Figure SMS_5
2-3: by hard decision, obtainEstimation to concealed bits
Figure SMS_6
The hard decision rule is:
Figure SMS_7
further, the estimated value of skewness
Figure SMS_8
Has a probability density function of
Figure SMS_9
In the formula (I), the compound is shown in the specification,
Figure SMS_10
on the basis, the estimator is an approximate unbiased estimation obtained by numerical integration through mathematic mathematical tool software, and when the characteristic index alpha tends to 1 or 2, the variance becomes large, and the performance of the estimator is deteriorated.
Still further, when the hidden bits '0', '1', etc. are at equal probability, the bit error rate ρ under the ideal channel is
Figure SMS_11
Wherein Pr (e) represents the probability of event Pr (e); sign (t) is a sign function, which is defined as
Figure SMS_12
The error function Erf (z) is defined as
Figure SMS_13
The equation indicates the relationship between the bit error rate and the characteristic index α, the skew β and the number of samples N.
Further, in the case of an additive white Gaussian noise channel, the divergence ratio is defined as
Figure SMS_14
Where gamma is the divergence of the alpha plateau,
Figure SMS_15
the bit error rate is reduced with the increase of the divergence ratio, but a bit error rate platform exists, and when the divergence ratio tends to be infinite, the value of the bit error rate platform is the bit error rate of an ideal channel. The technical conception of the invention is as follows: a covert communication system includes a covert transmitter and a receiver. At a transmitting end, concealed bits modulate the skewness beta parameter of alpha stably distributed random noise; at the receiving end, the skewness beta value is estimated, and therefore the hidden bits are recovered.
The transmitter in the covert communication system has '0' for covert bits b, transmits S (alpha, -beta) distributed random distribution noise in the first half bit period, and transmits S (alpha, beta) distributed random distribution noise in the second half bit period; for the masked bit b of '1', the first half of the bit period is transmitted with the randomly distributed noise of S (α, β) distribution, and the second half of the bit period is transmitted with the randomly distributed noise of S (α, - β) distribution. Each bit period has a total of { X } k K = 1.., N samples of alpha-stationary random process. The skewness of the N/2 samples before and after the N samples is different, but noise with symmetrical alpha stable distribution is presented in the whole bit period, namely the skewness beta of the whole sample is 0, and the noise is similar to the environmental noise which is subjected to symmetrical alpha stable distribution in a wireless network.
A receiver in the covert communication system obtains a synchronous position through the fraction low-order covariance; obtaining the estimated value of skewness from the received N samples of one bit period through symbol fraction low-order moment
Figure SMS_16
And obtaining the estimation of the hidden bit through hard decision. />
The hidden signal transmitted by the invention is similar to the environmental interference in the wireless network, i.e. an eavesdropper cannot easily distinguish whether the received signal is the environmental interference or the hidden signal, and the hidden signal has strong concealment. In addition, the structure of the covert communication system is unknown to the eavesdropper, which increases the difficulty of hacking by the eavesdropper.
Before the structure of a covert communication system is given, an alpha stable distribution is introduced. The random process has no closed probability density function expression and is defined by its characteristic function as
Φ X (t)=exp[-iδt-|σt| α (1-iβsign(t)ξ(t,α))]
Here exp [ ·]An exponential function is defined as the function of the exponent,
Figure SMS_17
Figure SMS_18
the constant alpha is belonged to (0, 2)]Called characteristic index (characteristic exponent), beta e [ -1,1]Called skewness (shewness), σ ∈ R + Called scale, γ = σ α Called divergence (dispersion) and δ ∈ R as position (location). Note that the alpha stable distribution is S (α, β, σ, δ), and in the present invention, δ =0, σ =1, and is abbreviated as S (α, β) unless otherwise specified. If a random variable X obeys an alpha stable distribution, it is marked as X-S (alpha, beta).
The hidden bit to be transmitted is converted into an alpha stable distribution random sequence with opposite skewness symbols in the front half bit period and the rear half bit period, but the whole sequence presents the characteristic of symmetrical alpha stable distribution, is similar to the environmental interference in a wireless network, and is insensitive to an eavesdropper, so that the aim of hidden communication is fulfilled.
The invention has the beneficial effects that: the skewness estimation method based on the symbolic score low-order moment has low calculation complexity, and is suitable for calculating the Internet of things and the likeIn weaker equipment; gives the skewness
Figure SMS_19
The probability density function formula and the bit error rate formula of the covert communication system obtain the performance of the covert communication system.
Drawings
Fig. 1 is a block diagram of a covert communication system.
Fig. 2 shows the fractional low-order covariance when α =1.43, β =0.5, and N = 400.
Fig. 3 is a graph of the estimator probability density function for α =1.43, β =0.8, N = 1000.
Fig. 4 is the mean of the estimators at α < 1, N = 1000.
Fig. 5 shows the variance of the α < 1, N =1000 estimator.
Fig. 6 shows the bit error rate for an ideal channel with a =0.5 and different numbers of samples.
Fig. 7 shows the bit error rate for α =0.5 for different numbers of samples in an additive white gaussian noise channel.
Detailed Description
The present invention will now be described in detail with reference to the accompanying drawings.
Referring to fig. 1-7, a covert communication method based on alpha stable distribution random process skewness parameter includes information hiding processing at the transmitting end of covert communication system and information recovery processing at the receiving end of covert communication system,
the information hiding processing of the sending end of the covert communication system comprises the following steps:
1-1: generating a randomly distributed sequence obeying an S (alpha, beta) distribution with a steadily distributed noise generator, with a bit period of T b At a T b Has N random sequences, marked as { X k ,k=1,...,N};
1-2: the masked bit b, encoded by Manchester, at an intermediate time of each bit period, i.e. T b At/2, a jump occurs, if b =1, from low level to high level; if b =0, the level is changed from high level to low levelChanging the unipolar '0' and '1' into bipolar '1' and '1', respectively;
1-3: the random sequence output by the stably distributed noise generator is multiplied by the '-1' of the single and double polarity transformation, and the polarity of the skewness is changed, namely the random sequence of S (alpha, -beta) distribution is obtained; multiplied by '+1', still a random sequence of S (α, β) distribution;
thus, if the concealment bit b =0, the random sequence s of the first half bit period 0 ={-X k K = 1...., N/2} is a random sequence obeying S (α, - β) distribution, and a random sequence S of the second half bit period 1 ={X k K = N/2.., N } is a random sequence that follows a distribution of S (α, β); conversely, if the concealed bit b =1, the random sequence s of the first half bit period 0 ={X k K = 1.... N/2} is a random sequence that follows S (α, β) distribution, and a random sequence S of the second half of the bit period 1 ={X k K = N/2.., N } is a random sequence that follows a S (α, - β) distribution;
the information recovery processing of the covert communication system receiving end comprises the following steps:
2-1: in the case of synchronization, the receiving end is in one bit period T b The received N random sequences are r = [ r = [ r ] 0 ,r 1 ]From the description of the transmitting end, it can be seen that, no matter whether the hidden bit is '0' or '1', the skewness sign of the half bit period before and after transmission is opposite, therefore, r is done at the receiving end 1 Processing x (-1) to make the skewness sign of the front and back half bit periods the same, where the demultiplexing divides the N random sequences into 2 random sequences with length N/2, and the multiplexing is just opposite, and combines the 2 random sequences with length N/2 into one random sequence with length N;
after multiplexing, it is recorded as
Figure SMS_20
In the ideal channel, i.e., in the absence of fading, delay, and noise, it is apparent that there is a->
Figure SMS_21
2-2: from length N
Figure SMS_22
Evaluation of a parameter in a random sequence that estimates skewness>
Figure SMS_23
The estimated value of skewness is
Figure SMS_24
2-3: obtaining estimates of concealed bits using hard decisions
Figure SMS_25
The hard decision rule is:
Figure SMS_26
referring to fig. 2, a covert communication method based on an alpha stable distribution random process skewness parameter synchronously adopts a method of fractional low-order covariance. For random sequences of length N that obey S (alpha, beta) distribution { X k K =1,.., N }, the fractional low-order covariance is defined as:
Figure SMS_27
wherein N is 1 =max(0,-k),N 2 = min (N-k, N), a + b < α, p-th order of the symbol of the random variable X, defined as X <p> =sign(X)|X| p
Fig. 2 shows the fractional low-order covariance map of the signal of step 1-3, i.e. transmitted into the channel by the concealment system, where α =1.43, β =0.5, N =400, a = b = α/4. As can be seen from the figure, the fractional low order covariance is maximum only when k =0, i.e. full synchronization; in addition, fractional low order covariance is small; in particular, k = ± 400, ± 800, i.e., ± 1, ± 2 bit periods, no periodicity occurs. This means that an eavesdropper cannot determine the bit period of covert communication by the periodicity of the fractional low-order moments.
Referring to fig. 3, a probability density function curve of the estimator when α =1.25, β =0.8, n =1000 is given. The expression of the estimator and the probability density function thereof is specifically derived as follows:
if the random variables X-S (alpha, beta), the sign fraction low order moment is
Figure SMS_28
Wherein E [ X ]]Is the expectation of a random variable X; gamma function
Figure SMS_29
Figure SMS_30
p.epsilon (-2, -1) U (-1, alpha). If p =0, then
Figure SMS_31
Using ensemble averaging
Figure SMS_32
Surrogate statistical mean E [ sign (X)]Obtaining an estimate of skewness
Figure SMS_33
Is composed of
Figure SMS_34
From the central limit theorem, S 0 Subject to a normal distribution with a mean value of
Figure SMS_35
With a second order origin moment of
Figure SMS_36
Thus, its variance is
Figure SMS_37
That is to say S 0 Has a probability density function of
Figure SMS_38
/>
Known as S 0 Probability density function of
Figure SMS_39
Then it is found based on the relevant theorem in the random process>
Figure SMS_40
Is based on the probability density function->
Figure SMS_41
Is composed of
Figure SMS_42
Referring to fig. 4 and 5, the mean and variance of the estimator for a number of samples N =1000 and a characteristic index α < 1 are given. The mean value expression is
Figure SMS_43
The variance is expressed as
Figure SMS_44
These two expressions have no closed solution, but can be numerically calculated using mathematic mathematical software. As can be seen from the view in figure 4,
Figure SMS_45
belonging to unbiased estimation. As can be seen from fig. 5, when the characteristic index α tends to 1, the variance becomes large and the performance of the estimator deteriorates. The same holds true for α > 2.
Referring to fig. 6, the bit error rate in the ideal channel for different numbers of samples N is given when α = 0.5. Based on the probability density function of the known estimator, the bit error rate rho of the hidden bit with equal probability of '0', '1' and the like can be directly obtained by combining the rule of hard decision
Figure SMS_46
/>
Simulation results show that the skew degree and the number of samples are increased, and the bit error rate can be reduced. Meanwhile, the simulation result is very consistent with the theoretical derivation.
Referring to fig. 7, the bit error rate for the additive white gaussian noise channel for different number of samples N and skewness is given for α = 0.5. Since the alpha-stationary random process does not have variance (power) in the conventional sense, the divergence is used to define the signal-to-noise ratio, called the divergence ratio, defined as
Figure SMS_47
Where γ is the divergence of the alpha plateau, γ G Is the divergence of the gaussian noise and is,
Figure SMS_48
Figure SMS_49
is the gaussian noise power. It can be seen from the graph that under the condition of low divergence ratio, the bit error rate is higher, that is, the influence of gaussian noise on the estimator is larger; on the other hand, when the divergence is relatively large, there is an error bit rate platform (error floor), that is, no matter how high the divergence ratio is, the bit error rate can not be reduced any more. This is because the limit at this time is the ideal channel, so the bit error rate plateau value is the error ratio of the ideal channelSpecific rate. />

Claims (4)

1. A covert communication method based on skew parameters of an alpha stable distribution random process is characterized in that: the method comprises the steps of information hiding processing of a sending end of the covert communication system and information recovery processing of a receiving end of the covert communication system;
the information hiding processing of the sending end of the covert communication system comprises the following steps:
1-1: a stationarity distribution noise generator is used to generate a random distribution sequence following an alpha stationarity distribution with a characteristic index of alpha and a skewness of beta, denoted as S (alpha, beta), in a bit period T b Has N random sequences, marked as { X k ,k=1,…,N};
1-2: the masked bit b, encoded by Manchester, at an intermediate time of each bit period, i.e. T b At/2, a jump occurs; if b =1, a transition is made from low level to high level; if b =0, the level jumps from high level to low level, the single polarity and the double polarity are changed, and unipolar '0' and unipolar '1' are respectively changed into bipolar '-1' and bipolar '+1';
1-3: the random sequence output by the stably distributed noise generator is multiplied by the reversed '-1' of single and double polarity, and the polarity of the skewness is changed, namely the random sequence of S (alpha, -beta) distribution is obtained; multiplied by '+1', still a random sequence of S (α, β) distribution;
thus, if the concealment bit b =0, the random sequence s of the first half bit period 0 ={-X k K =1, \ 8230;, N/2} is a random sequence obeying a distribution of S (α, - β), a random sequence of the second half of the bit period S 1 ={X k K = N/2, ..., N } is a random sequence obeying a distribution of S (α, β); conversely, if the concealed bit b =1, the random sequence s of the first half bit period 0 ={X k K =1, ..., N/2} is a random sequence obeying the distribution of S (α, β), and S is a random sequence of the second half of the bit period 1 ={X k K = N/2, ..., N } is a random sequence obeying a distribution of S (α, - β);
the information recovery processing of the covert communication system receiving end comprises the following steps:
2-1: in the case of synchronization, the receiving end is in one bit period T b After demultiplexing the received N random sequences, dividing the N random sequences into 2 random sequences with the length of N/2, namely r = [ r ] 0 ,r 1 ](ii) a Then making a pair r 1 X (-1) processing such that the skewness sign is the same for the first and second half bit periods; then multiplexing, combining the 2 random sequences with the length of N/2 into a random sequence with the length of N, and recording the random sequence as a random sequence with the length of N
Figure FDA00040714331700000210
Under ideal channel, i.e. without attenuation, delay and noise, it is obvious that
Figure FDA0004071433170000021
2-2: from length N
Figure FDA0004071433170000022
In the random sequence, an estimate of the parameter skewness is estimated>
Figure FDA0004071433170000023
The estimated value of skewness is
Figure FDA0004071433170000024
2-3: obtaining estimates of concealed bits using hard decisions
Figure FDA0004071433170000025
The rules for hard decision are:
Figure FDA0004071433170000026
2. the covert communication method based on alpha steadily distributed random process skewness parameters of claim 1, wherein: skewness estimation
Figure FDA0004071433170000027
Has a probability density function of
Figure FDA0004071433170000028
/>
In the formula (I), the compound is shown in the specification,
Figure FDA0004071433170000029
on the basis, the estimator is an approximate unbiased estimation obtained by numerical integration through mathematic mathematical tool software, and when the characteristic index alpha tends to 1 or 2, the variance becomes large, and the performance of the estimator is deteriorated.
3. The covert communication method based on alpha-steadily distributed random process skewness parameters as claimed in claim 2, wherein: when the hidden bits are '0', '1', etc., the bit error rate ρ under the ideal channel is
Figure FDA0004071433170000031
The equation indicates the relationship between the bit error rate and the characteristic index α, the skew β and the number of samples N.
4. The covert communication method based on alpha steadily distributed random process skewness parameters of claim 3, wherein: under the additive white Gaussian noise channel, the divergence ratio is defined as
Figure FDA0004071433170000032
Wherein gamma is a stably distributed powder of alphaThe degree of the magnetic field is measured,
Figure FDA0004071433170000033
the bit error rate is reduced with the increase of the divergence ratio, but a bit error rate platform exists, and when the divergence ratio tends to be infinite, the value of the bit error rate platform is the bit error rate of an ideal channel. />
CN202010083698.3A 2020-02-10 2020-02-10 Covert communication method based on skew parameter of alpha stable distribution random process Active CN111246463B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010083698.3A CN111246463B (en) 2020-02-10 2020-02-10 Covert communication method based on skew parameter of alpha stable distribution random process

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010083698.3A CN111246463B (en) 2020-02-10 2020-02-10 Covert communication method based on skew parameter of alpha stable distribution random process

Publications (2)

Publication Number Publication Date
CN111246463A CN111246463A (en) 2020-06-05
CN111246463B true CN111246463B (en) 2023-04-18

Family

ID=70872976

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010083698.3A Active CN111246463B (en) 2020-02-10 2020-02-10 Covert communication method based on skew parameter of alpha stable distribution random process

Country Status (1)

Country Link
CN (1) CN111246463B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112104439B (en) * 2020-11-23 2021-02-02 北京中超伟业信息安全技术股份有限公司 Self-adaptive recording interference method and system

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2016129363A1 (en) * 2015-02-12 2016-08-18 学校法人東京理科大学 Calculating device relating to concealment computation system employing distribution of secrets
CN106714148A (en) * 2016-12-09 2017-05-24 浙江警察学院 Concealed communication method based on joint normal random process
CN107769862A (en) * 2017-10-19 2018-03-06 厦门大学 A kind of bionical low communication interception method
CN108882236A (en) * 2017-05-17 2018-11-23 中国电子科技集团公司第三十研究所 Physical layer signal watermark embedding method based on S-transformation

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8091093B2 (en) * 2007-10-05 2012-01-03 Equilibrium Networks, Incorporated System and method for information assurance based on thermal analysis techniques

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2016129363A1 (en) * 2015-02-12 2016-08-18 学校法人東京理科大学 Calculating device relating to concealment computation system employing distribution of secrets
CN106714148A (en) * 2016-12-09 2017-05-24 浙江警察学院 Concealed communication method based on joint normal random process
CN108882236A (en) * 2017-05-17 2018-11-23 中国电子科技集团公司第三十研究所 Physical layer signal watermark embedding method based on S-transformation
CN107769862A (en) * 2017-10-19 2018-03-06 厦门大学 A kind of bionical low communication interception method

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
王亢 等.基于对称α稳定分布的隐蔽通信系统.《中国科学》.2017,全文. *

Also Published As

Publication number Publication date
CN111246463A (en) 2020-06-05

Similar Documents

Publication Publication Date Title
Wang et al. Fast and scalable secret key generation exploiting channel phase randomness in wireless networks
Zhang et al. Anti-jamming message-driven frequency hopping—Part II: Capacity analysis under disguised jamming
Cheng et al. Efficient physical‐layer secret key generation and authentication schemes based on wireless channel‐phase
Rottenberg et al. CSI-based versus RSS-based secret-key generation under correlated eavesdropping
Sobers et al. Covert communication with the help of an uninformed jammer achieves positive rate
Shu et al. Chaotic direct sequence spread spectrum for secure underwater acoustic communication
Soni et al. Wireless physical layer key generation with improved bit disagreement for the internet of things using moving window averaging
CN111246463B (en) Covert communication method based on skew parameter of alpha stable distribution random process
Li et al. Covert communication in continuous-time systems in the presence of a jammer
Chavali Signal detection and modulation classification in non-Gaussian noise environments
Ahmed et al. Measure of Covertness based on the imperfect synchronization of an eavesdropper in Random Communication Systems
Xu et al. Structure and performance analysis of an SαS‐based digital modulation system
Li et al. A novel transform for secret key generation in time-varying TDD channel under hardware fingerprint deviation
Albassam et al. Enhancing of chaotic on-off keying scheme
Goeckel et al. Covert communications in a dynamic interference environment
Hu et al. Graph-based confidence verification for BPSK signal analysis under low SNRs
Karmakar et al. Approximate secrecy capacity region of an asymmetric MAC wiretap channel within 1/2 bits
Mehboodi et al. Spreading sequence estimation algorithms based on ML detector in DSSS communication systems
Lei et al. A chaotic direct sequence spread spectrum communication system in shallow water
Molchanov et al. A novel bispectrum-based frequency encoding technique developed for noisy and multipath fading radio links
CN114143147A (en) Unauthorized large-scale Internet of things equipment detection method based on deep learning
Li et al. Covert communication in continuous-time systems
Xu et al. A covert digital communication system using skewed α-stable distributions for Internet of Things
Mroueh et al. Feasibility of interference alignment in the time-frequency domain
CN111525976B (en) Covert communication method based on normal random process mean parameter modulation

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant