message signal
Recently Published Documents


TOTAL DOCUMENTS

20
(FIVE YEARS 9)

H-INDEX

3
(FIVE YEARS 0)

2021 ◽  
Vol 2089 (1) ◽  
pp. 012066
Author(s):  
Rajeev Shrivastava ◽  
Mangal Singh ◽  
RakhiThakur ◽  
Kalluri Saidatta Subrahmanya Ravi Teja

Abstract Steganography can be described as approach of masking an undisclosed message with a normal message which is known as the Carrier message signal. DSP techniques, such as LSB encoding, have historically been implemented for secret information hiding. Utilization ofsteganography functions of deep neural networks for voice data is something this paper will present. This paper also demonstrate that the steganography techniques suggested for vision are less suitable for speech signals this paper present a implementation technique that involves the use of ISTFT and STFT as differentiablelayers in the network. Empirically, the efficacy of the proposed methods based on multiple datasets of speech should be demonstrated and the outcome are examined quantitatively and qualitatively. Using of multiple decoders or a single conditional decoder helps to hide multiple signals in a single carrier signal. Finally, under various channel distortion situations, this model Qualitative studies indicate that human listeners cannot detect changes made to the carrier and hence the decoded messages are highly intelligible.


2021 ◽  
Vol 11 (17) ◽  
pp. 7988
Author(s):  
Yury V. Kuznetsov ◽  
Andrey B. Baev ◽  
Maxim A. Konovalyuk ◽  
Anastasia A. Gorbunova

The theoretical and experimental evaluation of the cyclostationary random data transferring process corrupted by the individually and jointly cyclostationary crosstalk interference is presented. The interference and the message signals were measured by the real time digital oscilloscope. Autocorrelation functions were evaluated by synchronous cyclic averaging procedure. The analyzed periodic two-dimensional impulse response of the time-varying filter allows to obtain the output random process with the same cyclic frequency at the output of the filter by separation of orthogonal stationary waveforms constituting the input cyclostationary random process (CSRP). The filtering of the measured random process was implemented by the cyclic Wiener filter. The evaluation of the two-dimensional autocorrelation function and eye diagrams at the output of the cyclic Wiener filter showed significant reduction of the independent interference components in the estimated message signal.


Author(s):  
G.N Kareem ◽  
G.A Gbotoso ◽  
S.O Omogoye

Communication plays an indispensable part in several facets of the human existence. To communicate or transmit information over a long distance, modulation is required. This paper presents amplitude modulation (A.M) in which the amplitude of the carrier is altered in accordance to the input (message) signal, while we keep the frequency constant. The modulated signal (carrier) contains the spectral components which is in the frequency domain analysis. The key concept and principle of A.M are presented with several illustrations with MATLAB and Simulink model to make it easier to understand.


2021 ◽  
Author(s):  
Yonas Endailalu

Two integrating techniques and topologies for fiber optic network systems such as RoF and FTTH have been studied and presented in this project. Two digital signals with data rate 622Mb/s and 1.25Gb/s are considered as the two service signals to be hybrid. Both signals are first modulated in electrical domain by 25GHz and 5GHz sinusoidal sub carriers respectively, in order to give them enough spectral separation. Two architectures have been studied to modulate the optical carrier with these two service signals. The first model is to sum the two service signals in the electric domain and use a single leg Mach Zender Modulator (JlvlZM) to modulate the optical carrier with the electrical message signal. In the second case, the two service signals are first sent to a two leg MZM and separately modulate the light wave carrier, then the two emerging light wave signals mix at the other end of the Y branch of the MZM. The mathematical equations that represent the function of the two kinds of MZM have been formulated. Simulations of the integration of the two hybrid services have been made in MATLAB-Simulink environment and the results are shown. The developed mathematical models are used to represent the MZMs in the MATLAB program. Detector models for each architecture have been developed in order to evaluated the SNR and compare performance using Bit Error Rate (BER). The BER plots for different input setup have been plotted and presented in this project.


2021 ◽  
Author(s):  
Yonas Endailalu

Two integrating techniques and topologies for fiber optic network systems such as RoF and FTTH have been studied and presented in this project. Two digital signals with data rate 622Mb/s and 1.25Gb/s are considered as the two service signals to be hybrid. Both signals are first modulated in electrical domain by 25GHz and 5GHz sinusoidal sub carriers respectively, in order to give them enough spectral separation. Two architectures have been studied to modulate the optical carrier with these two service signals. The first model is to sum the two service signals in the electric domain and use a single leg Mach Zender Modulator (JlvlZM) to modulate the optical carrier with the electrical message signal. In the second case, the two service signals are first sent to a two leg MZM and separately modulate the light wave carrier, then the two emerging light wave signals mix at the other end of the Y branch of the MZM. The mathematical equations that represent the function of the two kinds of MZM have been formulated. Simulations of the integration of the two hybrid services have been made in MATLAB-Simulink environment and the results are shown. The developed mathematical models are used to represent the MZMs in the MATLAB program. Detector models for each architecture have been developed in order to evaluated the SNR and compare performance using Bit Error Rate (BER). The BER plots for different input setup have been plotted and presented in this project.


Author(s):  
Hamid Reza Kaheni ◽  
Mahdi Yaghoobi

Chaotic systems have wide applications in secure communication engineering and cryptography. In this paper, improved nonlinear predictive control with whale algorithm for anti-synchronization of a fractional-order economic hyper-chaotic system is used for increasing the security of wireless sensor networks and preventing intrusion. By chaotic masking method and the T-S fuzzy model, the message signal is encoded at the wireless sensor side and it is placed along the transmitter route. In the central station, the message signal is decoded using the T-S fuzzy model and the predictive control by anti-synchronizing the fractional-order hyper-chaotic slave system. To reduce the effect of disturbances, a sign function of error is added to the predictive control. Finally, simulation results indicate the proper performance of the proposed nonlinear predictive control for anti-synchronizing the fractional-order hyper-chaotic systems in secure communications.


Author(s):  
Aleksandar Lebl ◽  
Mladen Mileusnić ◽  
Predrag Petrović ◽  
Branislav Pavić ◽  
Verica Marinković-Nedelicki

This paper presents the development of the method for accurate successful jamming rate calculation when MPSK modulated RCIED activation message is jammed using sweep signal. Opposite to classical methods of error modelling where it is taken that only one bit in a symbol may be altered, it is supposed in this paper that any number of bits in a symbol is the subject of eventual modification. The derived formulas are achieved for QPSK, 8PSK and 16PSK modulated signals jamming. The results calculated by these formulas are verified and obtained by our originally developed simulation method. The results of calculation and simulation agree very well and the maximum difference between calculated and simulated successful jamming rate for any of three analyzed jamming methods and any level ratio between activation message signal and jamming signal does not overcome 1.1%. It is proved that successful jamming rate tends to maximum value 0.5 when jamming signal power increases and that only 20% lower successful jamming rate value is obtained for less than 7dB higher jamming signal level than it is the level of RCIED activation signal. These results point out that it is not necessary to apply too high emission power to achieve acceptable jamming effect. As a consequence, jammer practical implementation is easier and its dimensions are smaller.


2019 ◽  
Vol 07 (01) ◽  
pp. 74-78
Author(s):  
Muhammad Ali Raza ◽  
Muhammad Hassan Raza ◽  
Mohsin Raza

2018 ◽  
Vol 36 (2) ◽  
pp. 583-602 ◽  
Author(s):  
Sonia Hammami

Abstract In this paper, encrypted audio communication based on original synchronization form is proposed for a class of discrete-time hyperchaotic systems. The new studied scheme of synchronization presents an extension of the multi-switching one to the combination synchronization, for which, the state variables of two driving systems synchronize with different state variables of the response system, simultaneously. With that in mind, at the outset, a theoretical approach for non-linear control, using aggregation techniques associated to one specific characteristic matrix description, namely, the arrow form, is developed. Then, the feasibility as well as the performance of the proposed approach of multi-switching combination synchronization is checked through its practical application in information transmission field to ensure more security of the message signal by means of hyperchaotic masking. Finally, experimental simulations are carried out in order to assess the security analysis and demonstrate that the suggested cryptosystem is large enough to resist to the noise attack thanks to its excellent encryption robustness.


Sign in / Sign up

Export Citation Format

Share Document