WO2019095174A1 - Procédé et appareil de détection d'informations basés sur une différence d'amplitude, et dispositif de réception - Google Patents

Procédé et appareil de détection d'informations basés sur une différence d'amplitude, et dispositif de réception Download PDF

Info

Publication number
WO2019095174A1
WO2019095174A1 PCT/CN2017/111215 CN2017111215W WO2019095174A1 WO 2019095174 A1 WO2019095174 A1 WO 2019095174A1 CN 2017111215 W CN2017111215 W CN 2017111215W WO 2019095174 A1 WO2019095174 A1 WO 2019095174A1
Authority
WO
WIPO (PCT)
Prior art keywords
carrier information
information
carrier
steganography
difference
Prior art date
Application number
PCT/CN2017/111215
Other languages
English (en)
Chinese (zh)
Inventor
谢宁
谭杰
Original Assignee
深圳大学
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 深圳大学 filed Critical 深圳大学
Priority to PCT/CN2017/111215 priority Critical patent/WO2019095174A1/fr
Publication of WO2019095174A1 publication Critical patent/WO2019095174A1/fr

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L1/00Arrangements for detecting or preventing errors in the information received
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols

Definitions

  • the present invention relates to the field of communications technologies, and in particular, to an information detection method, apparatus, and receiving device based on amplitude difference.
  • Substitute steganography means that the original information is embedded in the secret information after channel coding, and the secret information is directly replaced with the original part information to achieve the purpose of information hiding.
  • the chi-square detection method is the earliest detection algorithm for the detection of Least Significant Bit (LSB) steganography, which tests the image by defining a chi-square statistic.
  • the probability of statistical characteristics enables detection of sequential LSB replacement, but does not detect LSB replacement at random locations.
  • the detection algorithm for LSB matching basically adopts methods such as neural network and pattern recognition.
  • the feature set is trained to extract effective features, and then the joint information of multiple features is used to detect the hidden information.
  • these methods are computationally intensive.
  • the test results are not precise enough and have limitations.
  • the embodiment of the invention discloses a method, a device and a receiving device for detecting information based on the amplitude difference, which can accurately detect the secret information.
  • a first aspect of the embodiments of the present invention discloses a method for detecting information based on an amplitude difference, including:
  • the method further includes include:
  • the processing the first carrier information to obtain the original carrier information includes:
  • the first carrier information is demodulated and error-corrected and encoded to obtain original carrier information.
  • the comparing whether the first carrier information and the second carrier information are different include:
  • a second aspect of the embodiments of the present invention discloses an information detecting apparatus, including:
  • a receiving unit configured to receive the first bearer information after replacing the steganography
  • a first acquiring unit configured to process the first carrier information to obtain original carrier information
  • a second acquiring unit configured to process the original carrier information to obtain second carrier information before replacing the steganography
  • a comparing unit configured to compare whether the first carrier information and the second carrier information are different
  • a determining unit configured to determine that the secret information exists if the first carrier information and the second carrier information are different.
  • the determining unit is further configured to determine, as the replacement steganography, a location where the first carrier information and the second carrier information are different. Modified location
  • the second obtaining unit is further configured to acquire the secret information at the modified location of the first carrier information.
  • the first acquiring unit processes the first carrier information, and obtaining the original carrier information includes:
  • the first carrier information is demodulated and error-corrected and encoded to obtain original carrier information.
  • whether the comparing unit compares the first carrier information with the second carrier information includes:
  • a third aspect of the embodiments of the present invention discloses a receiving device, where the receiving device includes a processor and a memory, and the processor executes the computer program stored in the memory to implement the amplitude difference according to any one of the foregoing first aspects.
  • Information detection method includes a processor and a memory, and the processor executes the computer program stored in the memory to implement the amplitude difference according to any one of the foregoing first aspects.
  • a computer readable storage medium storing at least one instruction, the at least one instruction being executed by a processor to implement the amplitude difference based information detection method of any of the above first aspects.
  • the embodiment of the invention has the following beneficial effects:
  • the receiving device may receive the first bearer information after the replacement of the steganography; process the first carrier information to obtain the original bearer information; and process the original bearer information to obtain the replacement before the steganography
  • the second carrier information is compared: whether there is a difference between the first carrier information and the second carrier information; if there is a difference between the first carrier information and the second carrier information, it is determined that the secret information exists. It can be seen that, in the embodiment of the present invention, the receiving device can restore the original carrier information, and further compare the second bearer information after replacing the steganography with the second carrier information before the steganography replacement. If there is a difference, the information can be detected. The location being replaced so that it can be determined that there is hidden information.
  • FIG. 1 is a diagram of a communication model for replacing steganography disclosed in an embodiment of the present invention
  • FIG. 2 is a schematic flow chart of a method for detecting information based on amplitude difference according to an embodiment of the present invention
  • FIG. 3 is a schematic flow chart of another method for detecting information based on amplitude difference according to an embodiment of the present invention.
  • FIG. 4 is a schematic structural diagram of an information detecting apparatus according to an embodiment of the present invention.
  • FIG. 5 is a schematic structural diagram of a receiving device according to an embodiment of the present invention.
  • the embodiment of the invention discloses a method, a device and a receiving device for detecting information based on the amplitude difference, which can accurately detect the secret information.
  • the details are described below in conjunction with the drawings.
  • FIG. 1 is a diagram of a communication model for replacing steganography disclosed in an embodiment of the present invention.
  • the alternative steganographic communication model can include two processes: a transmitting process and a receiving process.
  • the sending process is mainly performed by the sending device.
  • the sending device may include a base station or a user equipment.
  • a base station e.g., an access point
  • the base station can refer to a device in an access network that communicates with a wireless terminal over one or more sectors over an air interface.
  • the base station can be used to convert the received air frame to the IP packet as a router between the wireless terminal and the rest of the access network, wherein the remainder of the access network can include an Internet Protocol (IP) network.
  • IP Internet Protocol
  • the base station can also coordinate attribute management of the air interface.
  • the base station may be a base station (BTS, Base Transceiver Station) in GSM or CDMA, or may be a base station (NodeB) in WCDMA, or may be an evolved base station in LTE (NodeB or eNB or e-NodeB, evolutional Node B), the embodiment of the present invention is not limited.
  • User equipment may include, but is not limited to, a smart phone, a notebook computer, a personal computer (PC), a personal digital assistant (PDA), a mobile internet device (MID), a wearable device (such as a smart watch).
  • the operating system of the user device may include, but is not limited to, an Android operating system, an IOS operating system, a Symbian operating system, and a BlackBerry operating system.
  • the Windows Phone 8 operating system and the like are not limited in the embodiment of the present invention.
  • the transmitting device is divided into two paths, one is that the carrier information is encoded, and the other is that the secret information is encoded. After the two are encoded, the secret information is embedded in the carrier information, modulated, and then sent to the channel. The channel is sent to the receiving device.
  • the receiving process is mainly performed by the receiving device.
  • the receiving device may include a base station or a user equipment.
  • a base station e.g., an access point
  • the base station can refer to a device in an access network that communicates with a wireless terminal over one or more sectors over an air interface.
  • the base station can be used to convert the received air frame to the IP packet as a router between the wireless terminal and the rest of the access network, wherein the remainder of the access network can include an Internet Protocol (IP) network.
  • IP Internet Protocol
  • the base station can also coordinate attribute management of the air interface.
  • the base station may be a base station (BTS, Base Transceiver Station) in GSM or CDMA, or may be a base station (NodeB) in WCDMA, or may be an evolution in LTE.
  • BTS Base Transceiver Station
  • NodeB base station
  • WCDMA evolution in LTE.
  • a type of base station (NodeB or eNB or e-NodeB, evolutional Node B) is not limited in this embodiment of the present invention.
  • User equipment may include, but is not limited to, a smart phone, a notebook computer, a personal computer (PC), a personal digital assistant (PDA), a mobile internet device (MID), a wearable device (such as a smart watch).
  • Various types of electronic devices such as smart bracelets and smart glasses, wherein the operating system of the user device may include, but is not limited to, an Android operating system, an IOS operating system, a Symbian operating system, and a BlackBerry operating system.
  • the Windows Phone 8 operating system and the like are not limited in the embodiment of the present invention.
  • the demodulated signal is extracted and then decoded to obtain the secret information, and then the signal after the secret information is extracted is decoded to obtain the carrier information.
  • the specific embedding method of the secret information may be BINARY PHASE SHIFT KEYING (BPSK) as an example.
  • the carrier information is encoded into 0, 1 sequence, and the secret information is also 0, 1 sequence.
  • the secret information can randomly replace some positions of the carrier information to hide the information.
  • the carrier information 0 can be replaced by the secret information 1
  • the carrier information 1 can be replaced by the secret information 0, after BPSK is - 1 changes to 1, 1 changes to -1.
  • the number of bits of the secret information needs to be smaller than the number of bits that can be corrected by the error correction capability of the carrier information. For example, suppose that the encoded information bits have k bits, for a total of n symbols, then the number of bits that can be corrected Take an integer, so the number of bits of the secret information is less than t in order to replace the steganography.
  • FIG. 2 is a schematic flowchart diagram of an information detection method based on amplitude difference disclosed in an embodiment of the present invention. As shown in FIG. 2, the amplitude difference based information detecting method may include the following steps:
  • Step 201 The receiving device receives the first bearer information after replacing the steganography.
  • Substitute steganography means that the original information is embedded in the secret information after channel coding, and the secret information is directly replaced with the original part information to achieve the purpose of information hiding.
  • the transmitting device transmits the first bearer information after the steganography is replaced, and the receiving device can receive the first bearer information from the channel, wherein the first bearer information is the coded and modulated information.
  • Step 202 The receiving device processes the first carrier information to obtain original carrier information.
  • the receiving device may process the first carrier information.
  • the receiving device processes the first carrier information, and obtaining the original carrier information includes:
  • the first carrier information is demodulated and error-corrected and encoded to obtain original carrier information.
  • the receiving device demodulates the first carrier information
  • error correction encoding processing may be performed. Based on the error correction capability of the error correction coding, the replacement part does not affect the restoration identification of the original information, and the receiving device can use the error correction capability to restore the original carrier information.
  • Step 203 The receiving device processes the original carrier information to obtain second carrier information before replacing the steganography.
  • the original bearer information may be encoded and modulated to obtain second bearer information before the steganography is replaced.
  • the original carrier information is encoded and modulated to ensure that the obtained second carrier information and the first carrier information are subjected to the same processing for subsequent better comparison.
  • Step 204 The receiving device compares whether the first carrier information and the second carrier information are different.
  • the receiving device may compare the first carrier information with the second carrier information to determine whether there is a difference between the two.
  • the comparing, by the receiving device, whether the difference between the first carrier information and the second carrier information includes:
  • the receiving device can compare whether there is a difference between the waveform of the first carrier information and the waveform of the second carrier information. Specifically, whether the peaks of the waveforms of the two are different, if there is a difference, Then, it can be determined that the first carrier information and the second carrier information are different.
  • the receiving device may compare whether the bit sequence of the first carrier information and the bit sequence of the second carrier information are different, for example, the bit sequence of the first carrier information is 1 -1 1 1 -1, where the The bit sequence of the two carrier information is 1 -1 1 -1 -1, then it can be seen that the fourth bit has a difference of 2, and the other bits have a difference of 0. If the difference is obvious, the first carrier information can be determined. There is a difference from the second carrier information. Due to the influence of noise, when the specific difference is greater than or equal to 2, it is considered that there is a difference.
  • Step 205 If there is a difference between the first carrier information and the second carrier information, the receiving device determines that the secret information exists.
  • the second carrier information is information that is encoded and modulated on the original carrier information, and no other information is embedded in the second carrier information. If the first carrier information and the second carrier information are different, Determining that other information is embedded in the first carrier information and the location different from the second carrier information, further determining that the embedded other information is secret information.
  • the receiving device may receive the first bearer information after replacing the steganography; processing the first carrier information to obtain original carrier information; and processing the original carrier information to obtain replacement The second carrier information before the steganography; comparing whether the first carrier information and the second carrier information are different; if the first carrier information and the second carrier information are different, determining that the secret information exists. It can be seen that, in the embodiment of the present invention, the receiving device can restore the original carrier information, and further compare the second bearer information after replacing the steganography with the second carrier information before the steganography replacement. If there is a difference, the information can be detected. The location being replaced so that it can be determined that there is hidden information.
  • FIG. 3 is another information detection based on amplitude difference disclosed in an embodiment of the present invention. Schematic diagram of the process. As shown in FIG. 3, the amplitude difference based information detecting method may include the following steps:
  • Step 301 The receiving device receives the first bearer information after replacing the steganography.
  • Step 302 The receiving device processes the first carrier information to obtain original carrier information.
  • Step 303 The receiving device processes the original carrier information to obtain second carrier information before replacing the steganography.
  • Step 304 The receiving device compares whether the first carrier information and the second carrier information are different.
  • Step 305 If there is a difference between the first carrier information and the second carrier information, the receiving device determines that the secret information exists.
  • Step 306 The receiving device determines, where the first carrier information and the second carrier information are different, a location to replace the steganographic modification.
  • the second carrier information is information that is encoded and modulated on the original carrier information, and no other information is embedded in the second carrier information. If the first carrier information and the second carrier information are different, It is determined that other information (ie, secret information) is embedded in the first carrier information and the location different from the second carrier information. Further, the receiving device may determine a location where the first carrier information and the second carrier information are different as a modified location to replace the steganography.
  • Step 307 The receiving device acquires the secret information in the modified location of the first carrier information.
  • the secret information may be acquired after the demodulation and the corresponding decoding mode of the modified location of the first carrier information.
  • the method described in FIG. 3 is implemented, and can be replaced after detecting the presence of the secret information. Obtain hidden information in a steganographic location.
  • FIG. 4 is a schematic structural diagram of an information detecting apparatus according to an embodiment of the present invention.
  • the information detecting apparatus described in FIG. 4 may be used to perform some or all of the steps of the amplitude difference based information detecting method described in FIG. 2 or FIG. 3, and specifically refer to the related description in FIG. 2 or FIG. This will not be repeated here.
  • the information detecting apparatus may include:
  • the receiving unit 401 is configured to receive the first bearer information after replacing the steganography
  • the first obtaining unit 402 is configured to process the first carrier information to obtain original carrier information.
  • the second obtaining unit 403 is configured to process the original carrier information to obtain second carrier information before replacing the steganography;
  • the comparing unit 404 is configured to compare whether the first carrier information and the second carrier information are different.
  • the determining unit 405 is configured to determine that the secret information exists if the first carrier information and the second carrier information are different.
  • the determining unit 405 is further configured to determine, where the first carrier information and the second carrier information are different, a location to replace the steganographic modification;
  • the second obtaining unit 403 is further configured to acquire the secret information in the modified location of the first carrier information.
  • the first obtaining unit 402 processes the first carrier information, and obtaining the original carrier information includes:
  • the first carrier information is demodulated and error-corrected and encoded to obtain original carrier information.
  • the comparison unit 404 compares whether the first carrier information and the second carrier information are different, including:
  • the information detecting apparatus described in FIG. 4 may receive the first bearer information after replacing the steganography; process the first carrier information to obtain original carrier information; and process the original carrier information to obtain replacement.
  • the above-described integrated unit implemented in the form of a software function module can be stored in a computer readable storage medium.
  • the computer readable storage medium can store a computer program, which when executed by the processor, can implement the steps in the foregoing method embodiments.
  • the computer program comprises computer program code, which may be in the form of source code, object code form, executable file or some intermediate form.
  • the computer readable storage medium may include any entity or device capable of carrying the computer program code, a recording medium, a USB flash drive, a removable hard disk, a magnetic disk, an optical disk, a computer memory, a read only memory (ROM, Read-Only Memory). ), random access memory (RAM, Random-Access Memory), electrical carrier signals, telecommunications signals, and software distribution media. It should be noted that the content contained in the computer readable storage medium may be appropriately increased or decreased according to the requirements of legislation and patent practice in a jurisdiction.
  • FIG. 5 is a schematic structural diagram of a receiving device according to an embodiment of the present invention.
  • the receiving device shown in FIG. 5 includes a processor 501 and a memory 502.
  • the processor 501 and the memory 502 are respectively connected to a communication bus.
  • the memory 502 may be a high speed RAM memory or a non-volatile memory. It will be understood by those skilled in the art that the structure of the receiving device shown in FIG. 5 does not constitute a limitation of the present invention, and it may be a bus-shaped structure or a star-shaped structure, and may further include more than that shown in FIG. 5. More or less parts, or some parts, or different parts.
  • the processor 501 is a control center of the receiving device, and may be a central processing unit (CPU).
  • the processor 501 connects various parts of the entire receiving device by using various interfaces and lines, and is stored in the memory 502 by running or executing.
  • processor 501 may also call program code stored in the memory 502 for performing the following operations:
  • the processing the first carrier information to obtain the original carrier information includes:
  • the first carrier information is demodulated and error-corrected and encoded to obtain original carrier information.
  • the comparing whether the first carrier information and the second carrier information are different include:
  • the receiving device may receive the first bearer information after the replacement of the steganography; process the first carrier information to obtain the original bearer information; and process the original bearer information to obtain a replacement. Second carrier information before steganography; comparing the first carrier information with Whether there is a difference in the second carrier information; if there is a difference between the first carrier information and the second carrier information, it is determined that the secret information exists. It can be seen that, in the embodiment of the present invention, the receiving device can restore the original carrier information, and further compare the second bearer information after replacing the steganography with the second carrier information before the steganography replacement. If there is a difference, the information can be detected. The location being replaced so that it can be determined that there is hidden information.
  • the disclosed apparatus may be implemented in other ways.
  • the device embodiments described above are merely illustrative.
  • the division of the unit is only a logical function division.
  • there may be another division manner for example, multiple units or components may be combined or may be Integrate into another system, or some features can be ignored or not executed.
  • the mutual coupling or direct coupling or communication connection shown or discussed may be an indirect coupling or communication connection through some interface, device or unit, and may be electrical or otherwise.
  • the units described as separate components may or may not be physically separated, and the components displayed as units may or may not be physical units, that is, may be located in one place, or may be distributed to multiple network units. Some or all of the units may be selected according to actual needs to achieve the purpose of the solution of the embodiment.
  • each functional unit in each embodiment of the present invention may be integrated into one processing unit, or each unit may exist physically separately, or two or more units may be integrated into one unit.
  • the above integrated unit can be implemented in the form of hardware or in the form of a software functional unit.
  • the integrated unit if implemented in the form of a software functional unit and sold or used as a standalone product, may be stored in a computer readable memory. Based on such understanding, the technical solution of the present invention may contribute to the prior art or all or part of the technical solution may be embodied in the form of a software product stored in a memory. A number of instructions are included to cause a computer device (which may be a personal computer, server or network device, etc.) to perform all or part of the steps of the methods described in various embodiments of the present invention. And before The memory includes: U disk, read-only memory (ROM), random access memory (RAM), random access memory (RAM), mobile hard disk, disk or optical disk, and other media that can store program code.
  • ROM read-only memory
  • RAM random access memory
  • RAM random access memory
  • mobile hard disk disk or optical disk, and other media that can store program code.
  • ROM Read-Only Memory
  • RAM Random Access Memory

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

L'invention concerne un procédé et un appareil de détection d'informations basés sur une différence d'amplitude, et un dispositif de réception. Le procédé consiste à : recevoir des premières informations de porteuse après une stéganographie de remplacement; traiter les premières informations de porteuse pour obtenir des informations de porteuse d'origine; traiter les informations de porteuse d'origine pour obtenir des secondes informations de porteuse avant la stéganographie de remplacement; comparer si les premières informations de porteuse et les secondes informations de porteuse présentent une différence; et si les premières informations de porteuse et les secondes informations de porteuse présentent une différence, déterminer que des informations cachées existent. Grâce aux modes de réalisation de la présente invention, des informations cachées peuvent être détectées avec précision.
PCT/CN2017/111215 2017-11-15 2017-11-15 Procédé et appareil de détection d'informations basés sur une différence d'amplitude, et dispositif de réception WO2019095174A1 (fr)

Priority Applications (1)

Application Number Priority Date Filing Date Title
PCT/CN2017/111215 WO2019095174A1 (fr) 2017-11-15 2017-11-15 Procédé et appareil de détection d'informations basés sur une différence d'amplitude, et dispositif de réception

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/CN2017/111215 WO2019095174A1 (fr) 2017-11-15 2017-11-15 Procédé et appareil de détection d'informations basés sur une différence d'amplitude, et dispositif de réception

Publications (1)

Publication Number Publication Date
WO2019095174A1 true WO2019095174A1 (fr) 2019-05-23

Family

ID=66538424

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2017/111215 WO2019095174A1 (fr) 2017-11-15 2017-11-15 Procédé et appareil de détection d'informations basés sur une différence d'amplitude, et dispositif de réception

Country Status (1)

Country Link
WO (1) WO2019095174A1 (fr)

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101504760A (zh) * 2009-02-27 2009-08-12 上海师范大学 一种数字图像隐密信息检测与定位的方法
US20130208941A1 (en) * 2012-02-01 2013-08-15 Qingzhong Liu Steganalysis with neighboring joint density
CN105959104A (zh) * 2016-04-25 2016-09-21 深圳大学 基于汉明距离分布的隐写分析方法

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101504760A (zh) * 2009-02-27 2009-08-12 上海师范大学 一种数字图像隐密信息检测与定位的方法
US20130208941A1 (en) * 2012-02-01 2013-08-15 Qingzhong Liu Steganalysis with neighboring joint density
CN105959104A (zh) * 2016-04-25 2016-09-21 深圳大学 基于汉明距离分布的隐写分析方法

Similar Documents

Publication Publication Date Title
CN103299366B (zh) 用于编码及检测带水印信号的装置
CN106464623B (zh) 一种传输信号的方法和装置
JP6096316B2 (ja) Qamデータ信号のための拡張された復号およびデマッピング方法および装置
US20160196825A1 (en) Acoustic channel-based data communications method
US20240129354A1 (en) Transmitting data using audio transmissions and quadrature amplitude modulation and associated equalization strategies
WO2019061514A1 (fr) Procédé et appareil d'authentification de pente de couche physique de communication sans fil sécurisée
RU2372731C2 (ru) Устройство и способ для передачи или приема данных
WO2017185433A1 (fr) Procédé de stéganalyse basé sur la distribution de distance de hamming
CN107809310B (zh) 基于分组方差的信息检测方法、装置及接收设备
CN109640096B (zh) 一种基于视频解码电磁泄漏的隐蔽通信方法
US10949392B2 (en) Steganography obsfucation
CN107766771B (zh) 二维码检测方法以及终端
CN108173791B (zh) 基于平滑技术的时变衰落信道的物理层盲认证方法及系统
US9312893B2 (en) Systems, methods and devices for electronic communications having decreased information loss
US20240072910A1 (en) Audio transmissions with interleaved data payloads
WO2019095174A1 (fr) Procédé et appareil de détection d'informations basés sur une différence d'amplitude, et dispositif de réception
Dai et al. Magcode: Nfc-enabled barcodes for nfc-disabled smartphones
WO2019095178A1 (fr) Procédé et appareil de détection d'informations basés sur une variance de paquet optimale, et dispositif de réception
CN107809309B (zh) 基于幅度差的信息检测方法、装置及接收设备
WO2019095177A1 (fr) Procédé et appareil de détection d'informations en fonction d'une variance de paquets et dispositif de réception
WO2019095176A1 (fr) Procédé et appareil de détection d'informations basés sur une valeur de différence d'énergie de paquet et dispositif de réception
WO2019095175A1 (fr) Procédé et appareil de détection d'informations sur la base d'une distance de points de constellation, et dispositif de réception
CN115314054A (zh) 极化码译码方法、装置、通信设备及存储介质
CN107819568B (zh) 基于星座点距离的信息检测方法、装置及接收设备
CN107947898B (zh) 基于优化分组方差的信息检测方法、装置及接收设备

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 17932123

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

32PN Ep: public notification in the ep bulletin as address of the adressee cannot be established

Free format text: NOTING OF LOSS OF RIGHTS PURSUANT TO RULE 112(1) EPC (EPO FORM 1205A DATED 19/08/2020)

122 Ep: pct application non-entry in european phase

Ref document number: 17932123

Country of ref document: EP

Kind code of ref document: A1