Results 11 to 20 of about 1,174,103 (294)
Rapid growth of machine-type communications devices challenges the future network with a significant aggregated data traffic. Distributed source coding is a promising technique that compresses data sources and decreases required aggregated data ...
Wen Wang +3 more
doaj +1 more source
Secured Watermarking Image Using Spread Spectrum
Due to the increased development in technique of data transfer over internet and transmission media, the access and copy to these data in unathentical manner became a big challenge in the transmission media.
Abdulkareem Mohammed Salih
doaj +1 more source
A chaotic spread spectrum system for underwater acoustic communication [PDF]
The work is supported in part by NSFC (Grant no.
Bai, Chao +4 more
core +1 more source
Enhanced Index Modulated OFDM Spread Spectrum
Index modulated OFDM spread spectrum (OFDM-IM-SS) is a recently proposed scheme, which transmits the additional bits (index bits) through the code domain.
Jun Li +4 more
doaj +1 more source
Chaotic iterations versus Spread-spectrum: chaos and stego security [PDF]
A new framework for information hiding security, called chaos-security, has been proposed in a previous study. It is based on the evaluation of unpredictability of the scheme, whereas existing notions of security, as stego-security, are more linked to ...
Bahi, Jacques M. +2 more
core +3 more sources
Spread spectrum-based video watermarking algorithms for copyright protection [PDF]
Merged with duplicate record 10026.1/2263 on 14.03.2017 by CS (TIS)Digital technologies know an unprecedented expansion in the last years. The consumer can now benefit from hardware and software which was considered state-of-the-art several years ago ...
Serdean, Cristian Vasile
core +2 more sources
Compressive Sampling with Multiple Bit Spread Spectrum-Based Data Hiding
We propose a novel data hiding method in an audio host with a compressive sampling technique. An over-complete dictionary represents a group of watermarks.
Gelar Budiman +2 more
doaj +1 more source
Presenting a Method for Improving Echo Hiding [PDF]
In this article, one of the most important methods of steganography on VoIP called echo hiding is improved. This method has advantages in maintaining the statistical and perceptual characteristics of audio signals as well as security against the ...
hanieh rafiee, mohammad fakhredanesh
doaj +1 more source
A direct-sequence spread-spectrum super-regenerative receiver [PDF]
Current applications of the super-regenerative receiver use narrowband modulations. In this paper a new architecture that allows incoherent detection of spread-spectrum signals is presented.
Mas Casals, Orestes Miquel +2 more
core +1 more source
The exchange of traffic information in cyberspace grows fast. In all areas of life utilize technology to exchange information. One of the media owned by many people is mobile device such as mobile phone and tablet computer. In fact many people have been
Rojali Rojali +2 more
doaj +1 more source

