Channel Capacity Analysis of Spread Spectrum Watermarking in Radio Frequency Signals
暂无分享,去创建一个
Zhengguang Xu | Hui Xie | Xu Xie | Zheng-guang Xu | Hui Xie | Xu Xie
[1] Xiang Li,et al. Physical Layer Watermarking of Direct Sequence Spread Spectrum Signals , 2013, MILCOM 2013 - 2013 IEEE Military Communications Conference.
[2] Frank Hartung,et al. Multimedia watermarking techniques , 1999, Proc. IEEE.
[3] Yuhong Yang. Elements of Information Theory (2nd ed.). Thomas M. Cover and Joy A. Thomas , 2008 .
[4] Darko Kirovski,et al. Robust spread-spectrum audio watermarking , 2001, 2001 IEEE International Conference on Acoustics, Speech, and Signal Processing. Proceedings (Cat. No.01CH37221).
[5] Henrique S. Malvar,et al. Improved spread spectrum: a new modulation technique for robust watermarking , 2003, IEEE Trans. Signal Process..
[6] A.Z. Tirkel,et al. Image watermarking-a spread spectrum application , 1996, Proceedings of ISSSTA'95 International Symposium on Spread Spectrum Techniques and Applications.
[7] Kaigui Bian,et al. Blind Transmitter Authentication for Spectrum Security and Enforcement , 2014, CCS.
[8] Jae Young Lee,et al. Transmitter Identification Signal Analyzer for Single Frequency Network , 2008, IEEE Transactions on Broadcasting.
[9] John E. Kleider,et al. Radio frequency watermarking for OFDM wireless networks , 2004, 2004 IEEE International Conference on Acoustics, Speech, and Signal Processing.
[10] Xianbin Wang,et al. Transmitter identification using embedded pseudo random sequences , 2004, IEEE Transactions on Broadcasting.
[11] Max H. M. Costa,et al. Writing on dirty paper , 1983, IEEE Trans. Inf. Theory.
[12] Ingemar J. Cox,et al. Watermarking as communications with side information , 1999, Proc. IEEE.
[13] Mani Mina,et al. Physical-Layer Identification of Wired Ethernet Devices , 2012, IEEE Transactions on Information Forensics and Security.
[14] Kaigui Bian,et al. PHY-layer authentication by introducing controlled inter symbol interference , 2013, 2013 IEEE Conference on Communications and Network Security (CNS).
[15] Joshua R. Smith,et al. ID Modulation: Embedding Sensor Data in an RFID Timeseries , 2005, Information Hiding.
[16] Ying Zhang,et al. Channel Capacity Analysis of the Generalized Spread Spectrum Watermarking in Audio Signals , 2015, IEEE Signal Processing Letters.
[17] Benxiong Huang,et al. Channel Capacity Analysis of the Multiple Orthogonal Sequence Spread Spectrum Watermarking in Audio Signals , 2016, IEEE Signal Processing Letters.
[18] Ingemar J. Cox,et al. The First 50 Years of Electronic Watermarking , 2002, EURASIP J. Adv. Signal Process..
[19] Miodrag Potkonjak,et al. Real-time watermarking techniques for sensor networks , 2003, IS&T/SPIE Electronic Imaging.
[20] Zhen Yang,et al. Artificial-Noise-Aided Physical Layer Phase Challenge-Response Authentication for Practical OFDM Transmission , 2016, IEEE Transactions on Wireless Communications.
[21] Brian M. Sadler,et al. Wireless physical layer authentication via fingerprint embedding , 2015, IEEE Communications Magazine.
[22] Kaigui Bian,et al. PHY-Layer Authentication Using Duobinary Signaling for Spectrum Enforcement , 2016, IEEE Transactions on Information Forensics and Security.
[23] Sung Ik Park,et al. RF Watermark Backward Compatibility Tests for the ATSC Terrestrial DTV Receivers , 2011, IEEE Transactions on Broadcasting.
[24] Bernd Girod,et al. Spread spectrum watermarking: malicious attacks and counterattacks , 1999, Electronic Imaging.