Zobrazeno 1 - 10
of 1 440
pro vyhledávání: '"Covert communication"'
Autor:
Henderson, Robert, McCready, Elin
Publikováno v:
Signaling without Saying: The Semantics and Pragmatics of Dogwhistles.
Externí odkaz:
https://doi.org/10.1093/9780191994319.003.0008
Autor:
Bahman Khosravi
Publikováno v:
AUT Journal of Mathematics and Computing, Vol 6, Iss 1, Pp 39-50 (2024)
Recently, a serious problem in communications is security. Hiding data is one of the most important security techniques. Steganography is the art and science of hiding information in a cover media. Texts are the most usual method of communication and
Externí odkaz:
https://doaj.org/article/da66450232324b5d9ee7818d458af661
Autor:
Dmitriy Kvitko, Erivelton Nepomuceno, Lucas Nardo, Timur Karimov, Ivan Babkin, Vyacheslav Rybin, Denis Butusov
Publikováno v:
Chaos Theory and Applications, Vol 5, Iss 3, Pp 141-152 (2023)
It is known, that coherent chaotic communication systems are more vulnerable to noise in the transmission channel than conventional communications. Among the methods of noise impact reduction, such as extended symbol length and various digital filter
Externí odkaz:
https://doaj.org/article/93771a8422d34039b41faf59e8082214
Publikováno v:
Mathematics, Vol 12, Iss 14, p 2219 (2024)
Data hiding in digital images is a potent solution for covert communication, embedding sensitive data into cover images. However, most existing methods are tailored for one-to-one scenarios, which present security risks. To mitigate this vulnerabilit
Externí odkaz:
https://doaj.org/article/d3b34c09aa584f5b8e91a77cd3528112
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Autor:
Kang Yingyun
Publikováno v:
Applied Mathematics and Nonlinear Sciences, Vol 9, Iss 1 (2024)
We urgently need to explore the communication security guarantee mechanism to ensure the security of transmitting important information, and the steganographic communication model plays a crucial role in achieving this security. In this paper, we foc
Externí odkaz:
https://doaj.org/article/0fd4164fe024471dbeb4f722a3d45d74
Autor:
Hongxing Peng, Zhifa Tian, Xingwang Li, Weizheng Wang, Galymzhan Nauryzbayev, Khaled Rabie, Thippa Reddy Gadekallu
Publikováno v:
Alexandria Engineering Journal, Vol 67, Iss , Pp 39-49 (2023)
This paper investigates the covert communication of cooperative non-orthogonal multiple access (NOMA) systems, where the near user serves as a decode-and-forward (DF) relay and the far user receives the covert information from both the source and the
Externí odkaz:
https://doaj.org/article/3f4d1144637a46729137c5495fa215cd
Publikováno v:
Applied Sciences, Vol 14, Iss 5, p 1727 (2024)
This study investigates covert communication in multi-sensor systems employing Intelligent Reflecting Surfaces (IRSs). Different from previous works, we focus on optimizing transmission amplitudes and phase angles for a 2-BPSK codebook in the presenc
Externí odkaz:
https://doaj.org/article/df824765854c42bdbd69b760ef8aa502
Publikováno v:
Security and Safety, Vol 3, p 2024006 (2024)
Blockchain has brought great potential in improving Space-Air-Ground Integrated Networks (SAGINs) in terms of security and efficiency. In blockchain-integrated SAGINs, many applications and services inherently require both the communication contents
Externí odkaz:
https://doaj.org/article/0b0a4ccfd060416b9e09a43a5f8d1e63
Publikováno v:
Sensors, Vol 24, Iss 3, p 796 (2024)
This work investigates wireless covert communication in a multi-sensor asymmetric noise scenario. We adopt KL (Kullback–Leibler) divergence as the covertness constraint metric and mutual information as the transmission rate metric. To accurately ap
Externí odkaz:
https://doaj.org/article/0b0a890e76de42fc861267be23064a40