Invisible Encryption Communication Method based on WFRFT

Author(s):  
Fang Liu ◽  
Lizhi Chen ◽  
Yongxin Feng

Abstract Considering that the open signal transmission mode can lead to the potential risk of interception, identification, decoding, and interference, high confidentiality is imperative for wireless communication. The security of communication process is typically ensured by encrypting and concealing transmitted information. The weighted fractional Fourier transform (WFRFT) technology can substantially change the signal characteristics, and the statistical characteristics of the signal diversify to effectively hide the communication information. In this paper, considering a single parameter-WFRFT as the breakthrough point, the in-depth investigation of the mechanism of a single-parameter fractional domain and the analysis of its potential micro-features and dark features are presented; accordingly, an invisible encryption method with vector jumping is proposed. The relationship between modulation order and constellation diagram is utilized, the jumping matrix and vector are thereafter established, and the control rules are formulated accordingly; furthermore, the dynamic modulation order is obtained by the jumping vector control. The new method can improve the security performance of the system and provide a technical basis for securing communication with anti-jamming, anti-interception, and anti-deception capability.

PhotoniX ◽  
2021 ◽  
Vol 2 (1) ◽  
Author(s):  
Deming Peng ◽  
Zhaofeng Huang ◽  
Yonglei Liu ◽  
Yahong Chen ◽  
Fei Wang ◽  
...  

AbstractInformation encryption with optical technologies has become increasingly important due to remarkable multidimensional capabilities of light fields. However, the optical encryption protocols proposed to date have been primarily based on the first-order field characteristics, which are strongly affected by interference effects and make the systems become quite unstable during light–matter interaction. Here, we introduce an alternative optical encryption protocol whereby the information is encoded into the second-order spatial coherence distribution of a structured random light beam via a generalized van Cittert–Zernike theorem. We show that the proposed approach has two key advantages over its conventional counterparts. First, the complexity of measuring the spatial coherence distribution of light enhances the encryption protocol security. Second, the relative insensitivity of the second-order statistical characteristics of light to environmental noise makes the protocol robust against the environmental fluctuations, e.g, the atmospheric turbulence. We carry out experiments to demonstrate the feasibility of the coherence-based encryption method with the aid of a fractional Fourier transform. Our results open up a promising avenue for further research into optical encryption in complex environments.


2021 ◽  
Author(s):  
Demin Peng ◽  
Zhaofeng Huang ◽  
Yonglei Liu ◽  
Yahong Chen ◽  
Fei Wang ◽  
...  

Abstract Information encryption with optical technologies has become increasingly important due to remarkable multidimensional capabilities of light fields. However, the optical encryption protocols proposed to date have been primarily based on the first-order field characteristics, such as the optical field amplitude and phase as well as its polarization. As the said first-order characteristics of light fields are strongly affected by interference effects, the conventional encoding protocols become quite unstable during light propagation and interaction with the matter. Here, we introduce an alternative optical encryption protocol whereby the information is encoded into the spatial coherence distribution of a structured random light beam via a generalized van Cittert--Zernike theorem. We show that the proposed approach has two key advantages over its conventional counterparts. First, the complexity of measuring the spatial coherence distribution of light enhances the encryption protocol security. Second, the relative insensitivity of the second-order statistical characteristics of light to environmental noise makes the protocol robust against the environmental fluctuations, e.g, the atmospheric turbulence. We carry out experiments to demonstrate the feasibility of the coherence-based encryption method with the aid of a fractional Fourier transform. Our results open up a promising avenue for further research into optical encryption in complex environments.


2015 ◽  
Vol 727-728 ◽  
pp. 948-950
Author(s):  
Lei Sun ◽  
Wei Du ◽  
Na Che

With the development of the Botnet, new botnets use the peer-to-peer (P2P) protocol (such as for eMule download) appear, which have brought great challenges in detecting and preventing of botnet in the data center.27100Point to point protocol uses more decentralized control method, so information between each node can be shared, and each node has the function of connecting and recovering, which leads to that the class of Botnet is hard to be closed. In the protection of Botnet the data center also found that there are more and more botnet uses the high strength encryption technology after implanting into hosting, which makes the application layer information of the whole communication process be invisible to zombie network protection system for data centers , resulting in many missing events on the recognition and Influences the safety management effect. The specific point of view, point to point protocol and communication method based on encryption led to the that a data center in the botnet protection system is difficult to deal with effectively


Author(s):  
Nikoaj Kushnir ◽  
Anatoly Semenko ◽  
Georgij Kosovan ◽  
Natalija Bokla ◽  
Yevhen Shestopal

In telecommunications, a particular place belongs to systems with a wideband noise-free signal, the undisputed advantage of which is increased by both narrowband and wideband interference, confidentiality of information transmission, as well as electromagnetic compatibility with adjacent electronic devices. A wideband noise-free signal is formed using a number of known modulated sequences - m-, Kasam-, Gold sequences, typically by direct spreading.Systems using known pseudo-random sequences cannot be considered protected from unauthorized access.An effective way to increase the confidentiality of signal transmission in a noise-free TSC is to use a chaotic signal-based PVP.Pseudorandom sequence generators are based on one-dimensional chaotic reflections such as logistics, quadratic, and cubic. Researches have shown the undeniable advantage of logistical reflection. The construction of hidden communication systems using the deterministic chaos phenomenon is progressive issue nowadays. Several main stages should be carried out for achieving the goal. These are providing of the stability degree of synchronization between the drive and response generators of the transmitter and receiver respectively, investigation of chaotic oscillation to estimate the noise similarity and hardware design of communication system. It is known that the stable synchronization mode is needed for the quality level of data recovery. Therefore the basic conditions were computed for unidirectional coupled chaotic generators for the purpose of providing of generalized synchronization. To construct the communication system with high hiding degree first of all it is necessary to select the chaotic carrier signal the spectral and statistical characteristics of which were similar to noise. Using the obtained results the hardware prototype of hidden communication system was constructed


2016 ◽  
Vol 6 (2) ◽  
pp. 206-223 ◽  
Author(s):  
Linda Wilks

Purpose The purpose of this paper is to test and refine the long-established signal transmission model of the communication process by examining the ways in which a newly formed nonprofit arts foundation communicated its professed values to its stakeholders. Design/methodology/approach The study uses a mixed method case study approach. Interviews with key informants and observations of the foundation’s webpages enabled the identification of the professed values of the arts foundation. Next, a questionnaire survey established whether these values had been successfully decoded by stakeholders and identified the channels via which the values-related signals had been received. Findings The transmission model was found to be relevant as a model. However, to improve its fit within a nonprofit arts context, a modification to the model is suggested which highlights the importance of multi-sensory channels, the importance of context and the increasingly important role of the stakeholder. Research limitations/implications This study is a small-scale case study, although its mixed methods help to ensure validity. Practical implications The findings will help nonprofit arts organisations to decide how to best communicate their values to their stakeholders. Social implications The improved communications model will contribute to the enabling of organisations to uphold and transmit their values and thus improve society’s overall quality of life. Originality/value Literature which provides in-depth examination of the communication of values within a nonprofit arts context via a range of channels, including traditional, online and multi-sensory, is sparse. The opportunity to study a newly formed nonprofit arts organisation is also rare. The results of this study provide valuable evidence that even in today’s social media-rich world, people, sounds, sights and material objects in physical space still have a vital role to play in the communication of values.


Author(s):  
Mahendra D. Rana ◽  
George B. Rawls ◽  
J. Robert Sims ◽  
Elmar Upitis

As a part of an ongoing activity to develop ASME Code rules for the hydrogen infrastructure, the ASME Boiler and Pressure Vessel Code Committee approved new fracture control rules for Section VIII, Division 3 vessels in 2006. These rules have been incorporated into new Article KD-10 in Division 3. The new rules require determining fatigue crack growth rate and fracture resistance properties of materials in high pressure hydrogen gas. Test methods have been specified to measure these fracture properties, which are required to be used in establishing the vessel fatigue life. An example has been given to demonstrate the application of these new rules.


2020 ◽  
Vol 6 (4) ◽  
pp. 66-73
Author(s):  
Nikolay Afanasiev ◽  
Stanislav Chudaev

We propose a method for direct diagnostics of a stochastic ionospheric radio channel. This method can recalculate probe signal characteristics into transmitted signal characteristics. We derive analytical equations of second-order statistical moments for trajectory characteristics of the main and probe signals propagating in a three-dimensional randomly inhomogeneous ionosphere. We take into account boundary conditions at signal transmission and reception points. As a model of random irregularities of permittivity of the ionosphere, we utilize the concept of a changing space-time correlation ellipsoid, which is self-consistent with spatial changes in the average ionosphere. Time fluctuations of random irregularities are taken into account by the hypothesis of frozen transfer. We use analytical relationships to calculate the expected statistical characteristics of decameter signals along oblique probing paths of the ionosphere. An operational numerical algorithmization of the formulas derived is proposed. We report results of numerical experiments to determine the expected phase variances, group delay, and Doppler frequency shift of the main signal on a given single-hop path, based on measurements of these characteristics of a probe signal on a secondary path. We demonstrate the efficiency of the proposed method for diagnosing statistical trajectory characteristics of a decameter signal along single-hop paths under conditions when ground points of transmission and reception of the main and probe signals are outside the vicinity of focusing points of the wave field.


Sign in / Sign up

Export Citation Format

Share Document