期刊文献+
共找到3篇文章
< 1 >
每页显示 20 50 100
A Novel High Spectral Efficiency Waveform Coding-OVFDM 被引量:2
1
作者 LI Daoben 《China Communications》 SCIE CSCD 2015年第2期61-73,共13页
Based on the Overlapped Multiplexing Principle[12],a frequency domain OVFDM(Overlapped Frequency Domain Multiplexing) Coding is proposed.By the data weighted shift overlapped version of any band-limited Multiplexing T... Based on the Overlapped Multiplexing Principle[12],a frequency domain OVFDM(Overlapped Frequency Domain Multiplexing) Coding is proposed.By the data weighted shift overlapped version of any band-limited Multiplexing Transfer Function H(f) the coding gain and spectral efficiency are both achieved.The heavier the overlap of the data weighted Multiplexing Transfer Function H(f),the higher the coding gain and spectral efficiency as well as the closer the output to the optimum complex Gaussian distribution.The bit error probability performance is estimated.The time domain OVTDM(Overlapped Time Domain Multiplexing) Coding,the dual of OVFDM in time domain is incidentally proposed as well.Both theoretical analysis and testified simulations show that OVFDM(OVTDM) is suitable for high spectral efficiency application and its spectral efficiency is only roughly linear to SNR rather than the well-known logarithm to SNR. 展开更多
关键词 overlapped multiplexing principle frequency domain coding waveform coding spectral efficiency shannon capacity dual relation OVFDM OVTDM
下载PDF
Novel Video Steganography Algorithm Based on Secret Sharing and Error-Correcting Code for H.264/AVC 被引量:4
2
作者 Yingnan Zhang Minqing Zhang +2 位作者 Xiaoyuan Yang Duntao Guo Longfei Liu 《Tsinghua Science and Technology》 SCIE EI CAS CSCD 2017年第2期198-209,共12页
In this paper, we analyze the video steganography technique, which is used to ensure national security and the confidentiality of the information of governmental agencies and enterprises. Videos may be used to transmi... In this paper, we analyze the video steganography technique, which is used to ensure national security and the confidentiality of the information of governmental agencies and enterprises. Videos may be used to transmit secrets and conduct covert communication. As such, we present an algorithm based on a secret sharing scheme and an Error-Correcting Code(ECC), which combines Grey Relational Analysis(GRA) with a partition mode in video compression standard H.264/AVC. First, we process secret information by secret sharing, and then use an ECC to process the obtained information. Moreover, we choose the Discrete Cosine Transform(DCT) blocks using GRA, and then use rules to hide the pretreated information in DCT coefficients of the video frames. Experimental results indicate that our algorithm has good invisibility, better robustness, good anti-steganalysis ability, and little influence on the bit rate of the video carrier. In addition, the bit error rate is low after attacks such as noise, filtering,or frame loss in the simulation environment. 展开更多
关键词 steganography video secret sharing error-correcting code robustness grey relational analysis partition mode
原文传递
The t-wise intersection of relative two-weight codes
3
作者 LIU ZiHui 《Science China Mathematics》 SCIE 2014年第8期1765-1770,共6页
The t-wise intersection of constant-weight codes are computed.Based on the above result,the t-wise intersection of relative two-weight codes are determined by using the finite geometric structure of relative two-weigh... The t-wise intersection of constant-weight codes are computed.Based on the above result,the t-wise intersection of relative two-weight codes are determined by using the finite geometric structure of relative two-weight codes. 展开更多
关键词 relative two-weight code t-wise intersecting constant-weight code projective subspace value function
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部