期刊文献+
共找到5篇文章
< 1 >
每页显示 20 50 100
隐蔽通信性能及措施分析 被引量:3
1
作者 熊健 《中国新通信》 2012年第9期73-77,共5页
通过对影响隐蔽通信性能的因素的分析,提出了截获距离、LPI品质因数、截获概率的度量方法。并在此基础上,从波形设计、功率控制、天线设计、辐射方向控制等方面,提出了实现隐蔽通信的可选措施,为工程应用提供了一定参考价值。
关键词 通隐蔽信 LPI LPI波形 定向
下载PDF
Frame-bitrate-change based steganography for voice-over-IP 被引量:4
2
作者 刘进 田晖 周可 《Journal of Central South University》 SCIE EI CAS 2014年第12期4544-4552,共9页
Steganography based on bits-modification of speech frames is a kind of commonly used method, which targets at RTP payloads and offers covert communications over voice-over-IP(Vo IP). However, direct modification on fr... Steganography based on bits-modification of speech frames is a kind of commonly used method, which targets at RTP payloads and offers covert communications over voice-over-IP(Vo IP). However, direct modification on frames is often independent of the inherent speech features, which may lead to great degradation of speech quality. A novel frame-bitrate-change based steganography is proposed in this work, which discovers a novel covert channel for Vo IP and introduces less distortion. This method exploits the feature of multi-rate speech codecs that the practical bitrate of speech frame is identified only by speech decoder at receiving end. Based on this characteristic, two steganography strategies called bitrate downgrading(BD) and bitrate switching(BS)are provided. The first strategy substitutes high bit-rate speech frames with lower ones to embed secret message, which introduces very low distortion in practice, and much less than other bits-modification based methods with the same embedding capacity. The second one encodes secret message bits into different types of speech frames, which is an alternative choice for supplement. The two strategies are implemented and tested on our covert communication system Steg Vo IP. The experiment results show that our proposed method is effective and fulfills the real-time requirement of Vo IP communication. 展开更多
关键词 covert communication steganography multi-rate speech codec voice-over-IP(VOIP)
下载PDF
A NOVEL COVERT SPEECH COMMUNICATION SYSTEM AND ITS IMPLEMENTATION
3
作者 Deng Zongyuan Shao Xi +1 位作者 Yang Zhen Zheng Baoyu 《Journal of Electronics(China)》 2008年第6期737-745,共9页
In this paper, a Covert Speech Telephone (CST) is designed and implemented based on the information hiding technique, which works on the internet. To solve the large embedding capacity problem for real-time informatio... In this paper, a Covert Speech Telephone (CST) is designed and implemented based on the information hiding technique, which works on the internet. To solve the large embedding capacity problem for real-time information hiding, a steganographic system combined with a watermarking scheme is proposed, which skillfully transfers the secret speech into watermarking information. The basic idea is to use the speech recognition to significantly reduce the size of information that has to be transmitted in a hidden way. Furthermore, an improved DFT watermarking scheme is proposed which adaptively chooses the embedding locations and applies the multi-ary modulation technique. Based on the GUI (Graphical User Interface) software, the CST operates on both ordinary and secure mode. It is a completely digital system with high speech quality. Objective and subjective tests show that the CST is robust against normal signal processing attacks and steganalysis. The proposed scheme can be used in terms of military applications. 展开更多
关键词 STEGANOGRAPHY Information hiding Speech recognition Covert Speech Telephone (CST)
下载PDF
Covert voice over internet protocol communications based on spatial model 被引量:3
4
作者 HUANG YongFeng TANG ShanYu 《Science China(Technological Sciences)》 SCIE EI CAS CSCD 2016年第1期117-127,共11页
This paper presents a new spatial steganography model for covert communications over voice over internet protocol(Vo IP), providing a solution to the issue of increasing the capacity of covert Vo IP channels without c... This paper presents a new spatial steganography model for covert communications over voice over internet protocol(Vo IP), providing a solution to the issue of increasing the capacity of covert Vo IP channels without compromising the imperceptibility of the channels. Drawing from Orthogonal Modulation Theory in communications, the model introduced two concepts, orthogonal data hiding features and data hiding vectors, to covert Vo IP communications. By taking into account the variation characteristics of Vo IP audio streams in the time domain, a hiding vector negotiation mechanism was suggested to achieve dynamic self-adaptive steganography in media streams. Experimental results on Vo IP steganography show that the proposed steganographic method effectively depicted the spatial and temporal characteristics of Vo IP audio streams, and enhanced robustness against detection of steganalysis tools, thereby improving the security of covert Vo IP communications. 展开更多
关键词 covert communication multimedia networking Vo IP data security
原文传递
A Novel Quantum Covert Channel Protocol Based on Any Quantum Secure Direct Communication Scheme
5
作者 徐淑奖 陈秀波 +1 位作者 钮心忻 杨义先 《Communications in Theoretical Physics》 SCIE CAS CSCD 2013年第5期547-553,共7页
By analyzing the basic properties of unitary transformations used in a quantum secure direct communication (QSDC) protocol, we show the main idea why a covert channel can be established within any QSDC channel which e... By analyzing the basic properties of unitary transformations used in a quantum secure direct communication (QSDC) protocol, we show the main idea why a covert channel can be established within any QSDC channel which employs unitary transformations to encode information. On the basis of the fact that the unitary transformations used in a QSDC protocol are secret and independent, a novel quantum covert channel protocol is proposed to transfer secret messages with unconditional security. The performance, including the imperceptibility, capacity and security of the proposed protocol are analyzed in detail. 展开更多
关键词 quantum information hiding quantum covert channel quantum cryptography quantum communication
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部