Techniques for detecting & characterising covert communication signals

被引:0
|
作者
Hill, PCJ [1 ]
Comley, VE [1 ]
Adams, ER [1 ]
机构
[1] Cranfield Univ, Royal Mil Coll Sci, Sch Engn & Appl Sci, Swindon SN6 8LA, Wilts, England
关键词
D O I
暂无
中图分类号
V [航空、航天];
学科分类号
08 ; 0825 ;
摘要
Conventional linear and non-linear receivers are generally ineffective in detecting direct-sequence spread spectrum (DS/SS) signals if the spreading sequences are unavailable. State-of-the-art techniques based on short-time Fourier analysis and its modem variants are reviewed. An investigation into using correlation-based processing is also reported showing that the cyclostationary property of DS/SS provides detection capability. Finally we describe with results an emerging technique based on higher-order statistics where bispectral analysis is used for detection together with triple correlation for identification leading to an estimation of the DS/SS modulated chip code sequence(s) operating in noisy channels.
引用
收藏
页码:1361 / 1365
页数:5
相关论文
共 50 条
  • [1] Detecting Covert Communication on Android
    Hansen, Michael
    Hill, Raquel
    Wimberly, Seth
    37TH ANNUAL IEEE CONFERENCE ON LOCAL COMPUTER NETWORKS (LCN 2012), 2012, : 300 - 303
  • [2] Key dependent covert communication system for audio signals
    Cherukuri, Ravindranath C.
    Agaian, Sos S.
    Atluri, Chinni. V. C.
    2007 IEEE INTERNATIONAL CONFERENCE ON SYSTEMS, MAN AND CYBERNETICS, VOLS 1-8, 2007, : 1024 - 1028
  • [3] On the Limits of Covert Backscatter Communication Over Undecodable Ambient Signals
    Chen, Weiyu
    Ding, Haiyang
    Wang, Shilian
    Gong, Fengkui
    Xia, Guojiang
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2023, 18 : 4198 - 4213
  • [4] OPTIMUM TECHNIQUES FOR DETECTING PULSE SIGNALS IN NOISE
    DRUKEY, DL
    PROCEEDINGS OF THE INSTITUTE OF RADIO ENGINEERS, 1952, 40 (02): : 217 - 217
  • [5] A comprehensive survey of covert communication techniques, limitations and future challenges
    Makhdoom, Imran
    Abolhasan, Mehran
    Lipman, Justin
    COMPUTERS & SECURITY, 2022, 120
  • [6] Survey of capacity limits and implementation techniques in wireless covert communication
    Chen, Weiyu
    Luo, Junshan
    Wang, Fanggang
    Ding, Haiyang
    Wang, Shilian
    Xia, Guojiang
    Tongxin Xuebao/Journal on Communications, 2022, 43 (08): : 203 - 218
  • [7] ETHICAL USE OF COVERT VIDEOING TECHNIQUES IN DETECTING MUNCHAUSEN-SYNDROME BY PROXY
    FOREMAN, DM
    FARSIDES, C
    BMJ-BRITISH MEDICAL JOURNAL, 1993, 307 (6904): : 611 - 613
  • [8] Detecting UWB Radar Signals with UWB Communication Interference
    Cho, Hyunwoo
    Wang, Yiyin
    Ma, Xiaoli
    2014 IEEE MILITARY COMMUNICATIONS CONFERENCE: AFFORDABLE MISSION SUCCESS: MEETING THE CHALLENGE (MILCOM 2014), 2014, : 813 - 817
  • [9] Covert Communication Based on Waveform Overlay with Weighted Fractional Fourier Transform Signals
    Mei, Lin
    Sha, Xuejun
    Zhang, Naitong
    2010 IEEE INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND INFORMATION SECURITY (WCNIS), VOL 1, 2010, : 472 - 475
  • [10] Covert communication model for speech signals based on an indirect and adaptive encryption technique
    Shahadi, Haider Ismael
    COMPUTERS & ELECTRICAL ENGINEERING, 2018, 68 : 425 - 436