Covert communication system based on random noise modulation

Active Publication Date: 2018-10-09
ZHEJIANG POLICE COLLEGE
View PDF4 Cites 15 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] In order to overcome the shortcomings of the existing legitimate users that they cannot reliably ensure that important information is not eavesdropped and have poor concealment, and in order to enable legitimate users to realize the safe transmission of concealed data, the present invention proposes a random noise modulated covert communication system. It is a covert communication system that relies on the communication link of one's own party (or other party, or even the enemy's). Because its channel avoids the enemy's intentional interference and physical destruction, it is a highly survivable communication system. covert means of communication

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Covert communication system based on random noise modulation
  • Covert communication system based on random noise modulation
  • Covert communication system based on random noise modulation

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0039] The present invention will be further described below in conjunction with the accompanying drawings.

[0040] refer to Figure 1 ~ Figure 3 , a covert communication system based on random noise modulation, comprising:

[0041] A covert transmitter for generating a Gaussian white noise generator in a covert system using host communication data as a seed to generate a noise sequence n 1 , n 2 ; n 1 , n 2 Constitute the joint normal distribution noise w, whose correlation coefficient is hidden bit c to modulate; the random noise w is superimposed on the digitally modulated output of the traditional digital transmitter, enters the up-sampling and root-raised cosine filter, and then transmits to the channel;

[0042]The covert receiver is used for the synchronization, channel estimation and recovery of random noise w at the receiving end of the covert system, all of which are completed with the help of the host system; the data of the host system is used as the seed of t...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a covert communication system based on random noise modulation. At a transmitter, host data is taken as a seed of a Gaussian noise generator, a correlation coefficient of jointnormal distribution noise is modulated by a covert bit, and the joint normal distribution noise carrying the covert bit is linearly overlapped with output of a host transmitter digital modulator; andat a receiver, Gaussian noise the same as the transmitter is generated by taking the host data as the seed, then the Gaussian noise and the estimation of the joint normal distribution noise are correlated, and the covert bit can be restored through hard decision, so the covert transmission of the information is realized. The system has relatively high covert performance.

Description

technical field [0001] The invention relates to the technical fields of wireless communication and information security, in particular to a covert communication system based on random noise modulation. Background technique [0002] Due to the openness of electromagnetic space and the radiation of electromagnetic signal transmission, communication signals carrying important information are completely exposed in free space, and the wide adoption of standard protocols makes mobile data vulnerable to eavesdropping by illegal users during transmission. , It is very likely to lead to the leakage of important personal information such as user privacy and finance. Cryptography technology is to encrypt the plaintext information to be transmitted, turn the plaintext into unrecognizable ciphertext, and make the encrypted information difficult to understand. But doing so has brought another problem. The encryption technology encrypts the plaintext into a bunch of garbled characters, wh...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L1/20H04L25/02
CPCH04L1/203H04L25/0202H04L63/0428
Inventor 王亢周国民李国军董齐芬
Owner ZHEJIANG POLICE COLLEGE
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products