International audienceCyclostationary features of communication signals can be considered as weaknesses from a security point of view. They can be used by eavesdroppers for signal detection, modulation recognition or blind parameter estimation. This work presents a simple approach to make the blind estimation or detection of these features more difficult. It relies on the use of a dispersive filter at transmission that acts as a secret key. This filter is a plugin that is applicable to any existing transmission scheme. Numerical results applied to a DSSS signal with channel replay simulations illustrate the benefits of the proposed method
Covert channels can be used to circumvent system and network policies by establishing communications...
This paper proposes a superimposed training method for low probability of detection underwater acous...
International audienceRecent theoretical results show that use of chaotic dynamics can significantly...
International audienceCyclostationary features of communication signals can be considered as weaknes...
International audienceThe effect of underwater acoustic propagation on the cyclostationary features ...
As naval warfighting capabilities evolve, the need for innovative communication techniques for tacti...
Blind detection of modulation, i.e., without any prior knowledge of the signal, the carrier frequen...
Physical layer security has been under extensive investigation in recent years in wireless radio com...
With the growing use of underwater acoustic communications and the recent adoption of standards in t...
The objective of this research was to develop and demonstrate a technique for encrypting information...
Abstract. We present a set of watermarking techniques for effective covert communication over an aud...
The security and privacy of underwater acoustic sensor networks has received extensive attention rec...
Acoustic underwater communication is essential for the participation of friendly submersible vehicle...
Abstract—This work proposes an audio data hiding system that hides information into signals not know...
In this paper we describe a process whereby the magnitude of either one or two frequency components ...
Covert channels can be used to circumvent system and network policies by establishing communications...
This paper proposes a superimposed training method for low probability of detection underwater acous...
International audienceRecent theoretical results show that use of chaotic dynamics can significantly...
International audienceCyclostationary features of communication signals can be considered as weaknes...
International audienceThe effect of underwater acoustic propagation on the cyclostationary features ...
As naval warfighting capabilities evolve, the need for innovative communication techniques for tacti...
Blind detection of modulation, i.e., without any prior knowledge of the signal, the carrier frequen...
Physical layer security has been under extensive investigation in recent years in wireless radio com...
With the growing use of underwater acoustic communications and the recent adoption of standards in t...
The objective of this research was to develop and demonstrate a technique for encrypting information...
Abstract. We present a set of watermarking techniques for effective covert communication over an aud...
The security and privacy of underwater acoustic sensor networks has received extensive attention rec...
Acoustic underwater communication is essential for the participation of friendly submersible vehicle...
Abstract—This work proposes an audio data hiding system that hides information into signals not know...
In this paper we describe a process whereby the magnitude of either one or two frequency components ...
Covert channels can be used to circumvent system and network policies by establishing communications...
This paper proposes a superimposed training method for low probability of detection underwater acous...
International audienceRecent theoretical results show that use of chaotic dynamics can significantly...