Secret communication method adopting fractional-order Fourier transform
A fractional Fourier, secure communication technology, applied in wireless communication, electrical components, security devices, etc., can solve problems such as inability to "secrecy", achieve a wide range of applications, a wide range of applications, and improve security performance.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0038] "A secure communication method using fractional Fourier transform" in this embodiment, its flow is as follows figure 1 As shown, the specific implementation steps are as follows:
[0039] Step 1. Modulate and group the data to be transmitted to obtain parallel N sets of data, denoted as: D i , i∈[1, N], and then perform interpolation and serial-to-parallel conversion;
[0040] In this embodiment, N=2, that is, perform modulation and grouping to obtain two sets of data in parallel; it can also be divided into one group without grouping, or be divided into more groups; the more groups, the more complex, the better the performance;
[0041] Step 2, determining the order of the fractional Fourier transform of each path according to the estimated receiving channel impulse response coefficient;
[0042] In this embodiment, the receive channel impulse response coefficient is determined to be [0.80.2];
[0043] Step 3, using the 0.8 and 0.2 orders in the above step 2 to carr...
Embodiment 2
[0052] The flow chart of the present invention "a secure communication method using fractional Fourier transform" can also be combined with a typical communication system. The flow chart is as follows figure 2 As shown, the specific implementation steps are as follows:
[0053] Step 1. Generate randomly distributed bit streams;
[0054] The preferred distribution can choose uniform distribution, binomial Poisson distribution, Gaussian distribution, etc.;
[0055] Step 2, performing channel coding on the output of step 1;
[0056] Preferred channel coding is convolutional coding, Hamming coding, LDPC coding, tail-biting convolutional code, etc.;
[0057] Step 3, interleaving the output of step 2;
[0058] The preferred interleaving method can be matrix interleaving, pseudo-random interleaving, bit interleaving, prime-code interleaving, square prime-code interleaving, etc.;
[0059] Step 4, digitally modulating the output of step 3;
[0060]The preferred digital modulation...
Embodiment 3
[0073] Taking some steps in Embodiment 2 to form a new embodiment also has the effect of communication and is also protected by the present invention.
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More - R&D
- Intellectual Property
- Life Sciences
- Materials
- Tech Scout
- Unparalleled Data Quality
- Higher Quality Content
- 60% Fewer Hallucinations
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2025 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com
