The continuous change of communica-tion frequency brings difficulties to the reconnaissance and prediction of non-cooperative communication net-works.Since the frequency-hopping(FH)sequence is usually generated by a c...The continuous change of communica-tion frequency brings difficulties to the reconnaissance and prediction of non-cooperative communication net-works.Since the frequency-hopping(FH)sequence is usually generated by a certain model with certain regularity,the FH frequency is thus predictable.In this paper,we investigate the FH frequency reconnais-sance and prediction of a non-cooperative communi-cation network by effective FH signal detection,time-frequency(TF)analysis,wavelet detection and fre-quency estimation.With the intercepted massive FH signal data,long short-term memory(LSTM)neural network model is constructed for FH frequency pre-diction.Simulation results show that our parameter es-timation methods could estimate frequency accurately in the presence of certain noise.Moreover,the LSTM-based scheme can effectively predict FH frequency and frequency interval.展开更多
The key to narrow-band interference excision in frequency domain is to determine the excision thresh- old in direct-sequence spread-spectrum (DS-SS) systems. The excision threshold is a non-linear function related t...The key to narrow-band interference excision in frequency domain is to determine the excision thresh- old in direct-sequence spread-spectrum (DS-SS) systems. The excision threshold is a non-linear function related to the number and the power of interference, and attempting to get the exact relation of threshold related to the number and the power of interference is almost impossible. The N-sigma algorithm determines the excision threshold using subsection function; however, the excision threshold determined by this method is not exact. A new method to determine the threshold of N-sigma algorithm is proposed. The new method modifies the scale factor N by use of the membership function. The threshold determined by this method is consecutive and smooth, and it is closer to the fact than that of the initial N-sigma algorithm. The GPS signal and single-tone (CW) interference (that is, typical narrow-band interference) are implemented in the simulation, and the results are presented to demonstrate the validity of the new algorithm.展开更多
This paper presents a secure spread-spectrum watermarking algorithm for digital images in discrete wavelet transform (DWT) domain. The algorithm is applied for embedding watermarks like patient identification /source ...This paper presents a secure spread-spectrum watermarking algorithm for digital images in discrete wavelet transform (DWT) domain. The algorithm is applied for embedding watermarks like patient identification /source identification or doctors signature in binary image format into host digital radiological image for potential telemedicine applications. Performance of the algorithm is analysed by varying the gain factor, subband decomposition levels, size of watermark, wavelet filters and medical image modalities. Simulation results show that the proposed method achieves higher security and robustness against various attacks.展开更多
Frequency-hopping(FH) technique is widely used in high-secure communications by exploiting its capabilities of mitigating interference and confidentiality. However, electronic attacks in wireless systems become more a...Frequency-hopping(FH) technique is widely used in high-secure communications by exploiting its capabilities of mitigating interference and confidentiality. However, electronic attacks in wireless systems become more and more rigorous, which poses huge challenges to the use of the number theory based and chaos theory assisted sequences. The structure of the FH sequence directly affects the performance of FH communication systems. In this paper, the novel FH sequence generation scheme is proposed with the aid of the so-called Government Standard(GOST) algorithm, which achieves a promising balance between efficiency and security. Moreover, the security performance of the proposed algorithm is analyzed, which reveals that it is more resistant to impossible differential attacks than the widely-used Data Encryption Standard(DES) algorithm. The numerical results show that the FH sequences generated by the GOST algorithm significantly outperform the ones generated by the DES algorithm and chaotic theory in terms of the randomness and complexity.展开更多
Prior to hardware implementation, simulation is an important step in the study of systems such as Direct Sequence Code Division Multiple Access (DS-CDMA). A useful technique is presented, allowing to model and simulat...Prior to hardware implementation, simulation is an important step in the study of systems such as Direct Sequence Code Division Multiple Access (DS-CDMA). A useful technique is presented, allowing to model and simulate Linear Feedback Shift Register (LFSR) for CDMA. It uses the Scilab package and its modeling tool for dynamical systems Xcos. PN-Generators are designed for the quadrature-phase modulation and the Gold Code Generator for Global Positioning System (GPS). This study gives a great flexibility in the conception of LFSR and the analysis of Maximum Length Sequences (MLS) used by spread spectrum systems. Interesting results have been obtained, which allow the verification of generated sequences and their exploitation by signal processing tools.展开更多
An signal noise ratio( SNR) adaptive sorting algorithm using the time-frequency( TF)sparsity of frequency-hopping( FH) signal is proposed in this paper. Firstly,the Gabor transformation is used as TF transformat...An signal noise ratio( SNR) adaptive sorting algorithm using the time-frequency( TF)sparsity of frequency-hopping( FH) signal is proposed in this paper. Firstly,the Gabor transformation is used as TF transformation in the system and a sorting model is established under undetermined condition; then the SNR adaptive pivot threshold setting method is used to find the TF single source. The mixed matrix is estimated according to the TF matrix of single source. Lastly,signal sorting is realized through improved subspace projection combined with relative power deviation of source. Theoretical analysis and simulation results showthat this algorithm has good effectiveness and performance.展开更多
A novel monolithic digitalized random carrier frequency modulation spread-spectrum clock generator (RCF-SSCG) is proposed.In this design,the output frequency of the proposed RCF-SSCG changes with the intensity of th...A novel monolithic digitalized random carrier frequency modulation spread-spectrum clock generator (RCF-SSCG) is proposed.In this design,the output frequency of the proposed RCF-SSCG changes with the intensity of the capacitive charge and discharge current.Its analytical model is induced and the effect of the modulation parameters on the spread spectrum is numerically simulated and discussed.Compared with other works,this design has the advantages of small size,low power consumption and good robustness.The circuit has been fabricated in a 0.5μm CMOS process and applied to a class D amplifier in which the proposed RCF-SSCG occupies an area of 0.112 mm^2 and consumes 9 mW.The experimental results confirm the theoretical analyses.展开更多
A method of Direct Sequence Spread-Spectrum(DS/SS)corn,nunication based on synchronizedspatiotemporal chootic sequences is proposed.We use Coupled Logistic Maps(CLM)to generate the chaotictimes sequences.This coupled ...A method of Direct Sequence Spread-Spectrum(DS/SS)corn,nunication based on synchronizedspatiotemporal chootic sequences is proposed.We use Coupled Logistic Maps(CLM)to generate the chaotictimes sequences.This coupled mop lattices has long chaotic transient and can be recovered easily.Therobustness and the error probability is discussed and the advantage of the method in Spectral spreading andsecure communication is demonstrated.展开更多
文摘The continuous change of communica-tion frequency brings difficulties to the reconnaissance and prediction of non-cooperative communication net-works.Since the frequency-hopping(FH)sequence is usually generated by a certain model with certain regularity,the FH frequency is thus predictable.In this paper,we investigate the FH frequency reconnais-sance and prediction of a non-cooperative communi-cation network by effective FH signal detection,time-frequency(TF)analysis,wavelet detection and fre-quency estimation.With the intercepted massive FH signal data,long short-term memory(LSTM)neural network model is constructed for FH frequency pre-diction.Simulation results show that our parameter es-timation methods could estimate frequency accurately in the presence of certain noise.Moreover,the LSTM-based scheme can effectively predict FH frequency and frequency interval.
文摘The key to narrow-band interference excision in frequency domain is to determine the excision thresh- old in direct-sequence spread-spectrum (DS-SS) systems. The excision threshold is a non-linear function related to the number and the power of interference, and attempting to get the exact relation of threshold related to the number and the power of interference is almost impossible. The N-sigma algorithm determines the excision threshold using subsection function; however, the excision threshold determined by this method is not exact. A new method to determine the threshold of N-sigma algorithm is proposed. The new method modifies the scale factor N by use of the membership function. The threshold determined by this method is consecutive and smooth, and it is closer to the fact than that of the initial N-sigma algorithm. The GPS signal and single-tone (CW) interference (that is, typical narrow-band interference) are implemented in the simulation, and the results are presented to demonstrate the validity of the new algorithm.
文摘This paper presents a secure spread-spectrum watermarking algorithm for digital images in discrete wavelet transform (DWT) domain. The algorithm is applied for embedding watermarks like patient identification /source identification or doctors signature in binary image format into host digital radiological image for potential telemedicine applications. Performance of the algorithm is analysed by varying the gain factor, subband decomposition levels, size of watermark, wavelet filters and medical image modalities. Simulation results show that the proposed method achieves higher security and robustness against various attacks.
基金supported in part by the National Natural Science Foundation of China (No.61631015 and 61501354)
文摘Frequency-hopping(FH) technique is widely used in high-secure communications by exploiting its capabilities of mitigating interference and confidentiality. However, electronic attacks in wireless systems become more and more rigorous, which poses huge challenges to the use of the number theory based and chaos theory assisted sequences. The structure of the FH sequence directly affects the performance of FH communication systems. In this paper, the novel FH sequence generation scheme is proposed with the aid of the so-called Government Standard(GOST) algorithm, which achieves a promising balance between efficiency and security. Moreover, the security performance of the proposed algorithm is analyzed, which reveals that it is more resistant to impossible differential attacks than the widely-used Data Encryption Standard(DES) algorithm. The numerical results show that the FH sequences generated by the GOST algorithm significantly outperform the ones generated by the DES algorithm and chaotic theory in terms of the randomness and complexity.
文摘Prior to hardware implementation, simulation is an important step in the study of systems such as Direct Sequence Code Division Multiple Access (DS-CDMA). A useful technique is presented, allowing to model and simulate Linear Feedback Shift Register (LFSR) for CDMA. It uses the Scilab package and its modeling tool for dynamical systems Xcos. PN-Generators are designed for the quadrature-phase modulation and the Gold Code Generator for Global Positioning System (GPS). This study gives a great flexibility in the conception of LFSR and the analysis of Maximum Length Sequences (MLS) used by spread spectrum systems. Interesting results have been obtained, which allow the verification of generated sequences and their exploitation by signal processing tools.
基金Supported by the National Natural Science Foundation of China(64601500)
文摘An signal noise ratio( SNR) adaptive sorting algorithm using the time-frequency( TF)sparsity of frequency-hopping( FH) signal is proposed in this paper. Firstly,the Gabor transformation is used as TF transformation in the system and a sorting model is established under undetermined condition; then the SNR adaptive pivot threshold setting method is used to find the TF single source. The mixed matrix is estimated according to the TF matrix of single source. Lastly,signal sorting is realized through improved subspace projection combined with relative power deviation of source. Theoretical analysis and simulation results showthat this algorithm has good effectiveness and performance.
基金Project supported by the National Natural Science Foundation of China(No.60436030).
文摘A novel monolithic digitalized random carrier frequency modulation spread-spectrum clock generator (RCF-SSCG) is proposed.In this design,the output frequency of the proposed RCF-SSCG changes with the intensity of the capacitive charge and discharge current.Its analytical model is induced and the effect of the modulation parameters on the spread spectrum is numerically simulated and discussed.Compared with other works,this design has the advantages of small size,low power consumption and good robustness.The circuit has been fabricated in a 0.5μm CMOS process and applied to a class D amplifier in which the proposed RCF-SSCG occupies an area of 0.112 mm^2 and consumes 9 mW.The experimental results confirm the theoretical analyses.
文摘A method of Direct Sequence Spread-Spectrum(DS/SS)corn,nunication based on synchronizedspatiotemporal chootic sequences is proposed.We use Coupled Logistic Maps(CLM)to generate the chaotictimes sequences.This coupled mop lattices has long chaotic transient and can be recovered easily.Therobustness and the error probability is discussed and the advantage of the method in Spectral spreading andsecure communication is demonstrated.