Collusion Secure Fingerprinting. CMLab
|
|
- Cody Boone
- 5 years ago
- Views:
Transcription
1 Collusion Secure Fingerprinting CMLab
2 2 Outline Introduction Collusion attack Collusion-resilient fingerprinting Combinatorial designed code Error correction code Orthogonal signals Research issues
3 3 Introduction Two types of fingerprinting Type I: Embed fingerprints to contents Embed Type II: Extract fingerprints from contents Extract Extract
4 4 Introduction - Type I Fingerprinting What The process of assigning a unique key for each user' s content Why To identify the person who acquired a particular copy To prevent users from destroying the identification information To trace the traitors How Watermarking the contents with the unique keys
5 5 Introduction - Type II Fingerprinting What Extract unique and robust image descriptors from contents Why For the detection of replicas For content-based image retrieval How Select the features that best describe a given content
6 6 Introduction Talk focus Type I fingerprinting Some related terms Collusion attack Traitor tracing
7 Introduction- The Future of Multimedia Security What will be the major security problem at the dawn of the 22nd century? Ans: Trust (E. J. Delp, Multimedia security: the 22nd century approach, 2005) Who and what I do trust? Is the sensor valid? Is the data valid? Has the data been modified?
8 Introduction-Fingerprinting Successful application Hollywood film industry 2004 Oscars Successfully captured a few pirates (in the voting group) leaking the movie to the market The Last Samurai Carmine Caridi Russell Internet Challenging problem Collusion attack
9 9 Introduction Collusion attack A coalition of traitors collude to destroy the identification information and leak the content (keys) Collusion attack Extraction Pirate code
10 10 Introduction Traitor tracing Find at least one of the colluders {,,,, } Can not frame innocent users {,..} Related researches: From Broadcast Encryption to Fingerprinting
11 11 Collusion attack Broadcast encryption e.g. u 1 : {k 1,k 3,k 7 } u 2 :{k 3,k 5,k 7 } pirate decoder box: {k 1,k 5,k 7 } Digital fingerprinting Linear & non-linear collusion attacks Copy-and-paste attack
12 12 Collusion attack P d of the T N statistics under different attacks Z. J. Wang, M. Wu, H. Zhao, W. Trappe, & K. J. R. Liu, 2003 #of users: 100 code length : P fp : 1% y s d x+n T N y T 2 s / d s 2
13 13 Collusion attack Analyze the statistical features to improve the detection performance H. V. Zhao, M. Wu, Z. J. Wang, & K. J. R. Liu, 2004 e.g. Observe the histograms of sample means of extracted fingerprints under the average, minimum and randomized negative attacks, respectively 2 W 1 9, M 10000, K 45
14 14 Collusion-resilient fingerprinting Boneh-Shaw scheme D. Boneh & J. Shaw, Collusion-secure fingerprinting for digital data, CRYPTO 95 Watermarking the digital data (e.g. software, documents, music, and videos) with fingerprints Based on the Marking Assumption Too long (too many keys) B. Chor et al. claimed: It is much less efficient than our schemes
15 15 Collusion-resilient fingerprinting Marking Assumption Any coalition of c users is only capable of creating an object whose fingerprint lies in the feasible set of the coalition Feasible set F( C; ) F( C; ) { w( {?}} s.t. w, u C} ( is the code, C is the collusion coalition, R is the set of undetectable positions, and w is the pirate code) e.g. A: B: F= l R w ( u) R
16 16 Collusion-resilient fingerprinting <Definition>Totally c-secure code A code is totally c -secure if thereexists a tracingalgorithm A satisfying thefollowing condition:if a coalition C users generatesa word x then A( x) C. of at most c C U x c x A UC
17 17 Collusion-resilient fingerprinting Lemma Boneh & Shaw: There are no totally c-secure codes Clearly, it is enough to show that there are no totally 2 - secure codes. let be an arbitrary ( l,n) - code let w define themajority word M (1) (1) (2) (1) (3) wi, if wi wi or wi wi (2) (2) (3) Mi wi, if wi wi?, otherwise. One can readily verify that themajority word M { u,u 1 (1) 2,w }{, u (2) 1 If is a totally c - secure code then C for all colatiitons C,w 3 (3),u }{, u }. However, theintersection of thecoalitionsis empty. by thelast lemma, thecode be threedistinct codewords assigned to users u,u,u 2,u 3 1,... C r of MAJ ( w at most (1),w (2) 1 c... C users each.,w (3) ) by Γ is not toally2 - secure. r F( C 1, respectively is feasible for all threecoalitions 1 2 )... F( C 3 r )
18 18 Collusion-resilient fingerprinting n-secure code with -error 0 (n,d): l=d(n-1)=o(n 3 log(n/ )) too long! e.g. 0 (4,3) A: Random B: permutation C: D: Given 1)if weight ( x 2) if weight( x 3)for all s l x {01},, find a subset of B 1 B ) n-1 ) d 0 then output then output 2 ton-1do :let k thecoalition that produced "user 1is guilty" "user n is guilty" weight ( x B s ). x. if weight ( x B s-1 ) k 2 k 2 log 2n then output "user s is guilty"
19 19 Collusion-resilient fingerprinting c-secure code with -error of log length (L,N,n,d) Compose 0 (n,d) with an (L,N)-code C x=((1) (2) (L)) (i) 0 0 =alphabet size of C l=o(c 4 log(n/ )log(1/ )) l Given x {01},, find a member of thecoalition that produced 1) Apply algorithm1 toeach of for each component i outputsof that y 2) Find the word of i algorithm1.set position (tiesare broken arbitrarity). 3) Let u be theuser whose codeword is derived from wc output "user u is guilty" thel componentsof x. 1,...,Larbitrarily chooseoneof y i tobe the thischosen output.note is a number between 1and n. Next,form the word y wc which matches y in themost number x. y 1...y L.
20 Collusion-resilient fingerprinting Three main trends of collusion-resilient fingerprint codes Combinatorial designed code Error correction code Orthogonal signals
21 21 Collusion-resilient fingerprinting Combinatorial designs D. R. Stinson & R. Wei, Combinatorial properties and constructions of traceability schemes and frameproof codes, 1997 Give combinational descriptions of the following two objects in terms of set systems Traceability schemes for broadcast encryption Frameproof codes for digital fingerprinting <Definition> t-(v, k,λ) design A t-( v,k,λ)design is a set system( X, B), where B k for every BB, and every t - subset of exactly blocks in B. X X v, occurs in
22 22 Collusion-resilient fingerprinting t-design (t-(v,k,)) 2-design : BIBD (Balanced incomplete block design) (9,3,1)-BIBD {0,1,6},{0,2,5},{0,3,4},{1,2,4},{3,5,6},{1,5,7}, {5,4,8},{4,6,7},{6,2,8},{2,3,7},{3,1,8},{0,7,8} e.g. J. Dittmann, P. Schmitt, E. Saar and J. Ueberberg, Combining Digital Watermarks and Collusion Secure Fingerprints for Digital Images, detecting code
23 23 Collusion-resilient fingerprinting <Definition> c-traceability Scheme (c-ts(k,n,l)) Suppose any exposed user U is produced by C and denotedby c-ts( k,n,l). C is a member of thecoalition C whenever a piratedecoder c. Then thescheme is called a c - traceability scheme and it is C U c F F <Definition> c-frame Proof Codes (c-fpc(l,n)) A ( l,n) - code Γ is called a c - frameproof code if, for every C Γ such that C c, we have F( C) Γ C. Wesay that Γ is a c-fpc( l,n). C x c
24 Collusion-resilient fingerprinting 24 <Theorem> a c-fpc(v,b) a set system( X,Β) such that B theredoes not exist a block d i1 b and for any subset of B i B d i1 B i d c B B\{B blocks 1,B 2 B,B 1,...,B 2 d X,...,B d v, B, } such that
25 Collusion-resilient fingerprinting 25 <Theorem> a c-ts( k, b,v) a set system( X,Β) such that B b and B k-subset B B\{B F,B k for every choice of 1 2 d j1,...,b for every BB, with theproperty hat t d d B j c blocks, theredoes } such that B,B 1 F B j 2,...,B d not exist a block F B X for 1 v, B and for any j d
26 Collusion-resilient fingerprinting <Theorem>If there exists a c-ts(k,b,v), then there exists a c-fpc(v,b). <proof> Let ( X, Β) be We provethat ( Suppose and a Then block theset system corresponding toa c-ts( k,b,v). no; then there exist B B B Β\{B j X, Β) is a c-fpc( v,b). 1 B B, B 2 d,..., B for 1 26 d j c blocks, d. B, B 1 } such that B 2,..., B d i1 d B i B,.
27 27 Collusion-resilient fingerprinting Theorem t where c where c ( k <Theorem> v ( k Theorem t ( v, k,1)design 1) /( t 1) /( t 1) ( v, k,1)design 1) c-fpc( v,( c-ts ( k,( 1,3mod6 2 FPC( v, v( v 1) / 6) ) /( v 1,4 mod12 3 FPC( v, v( v 1) /12) v 1,5 mod20 4 FPC( v, v( v 1) / 20) v t v t ) /( k t k t )), ), v), <Theorem> primepower q 2 2 q TS ( q 1, q q 1, q q 1) It needs tricks to construct a suitable code
28 Collusion-resilient fingerprinting Error correcting code (ECC) Field A field F is a set that has two operations defined on it: addition and multiplication, such that the following axioms are satisfied. The set is an abelian group under addition The field is closed under multiplication, and the set of nonzero elements is an abelian group under multiplication The distribution law (a+b)c=ac+bc holds for all a, b, c in the field (An abelian group, also called a commutative group, is a group satisfying the requirement that the product of elements does not depend on their order)
29 Collusion-resilient fingerprinting Galois field A field with q elements Denoted by GF(q) The smallest field Must have zero and one GF(2)
30 Collusion-resilient fingerprinting A linear code is a subspace of GF(q) n The theory of vector spaces can be used to study these codes Any set of basis vectors for the subspace can be used as rows to form a k n matrix G called the generator matrix of the code The row space of G is the linear code C, any codeword is a linear combination of the rows of G The set of q k codewords is called an (n,k) linear code The dimension of the whole space GF(q) n is n There are q k codewords
31 Collusion-resilient fingerprinting Encoding Any one-to-one paring of k-tuples and codewords can be used as an encoding procedure c=ig c: codeword i: information word G: generator matrix
32 Collusion-resilient fingerprinting Example G i c ig
33 Collusion-resilient fingerprinting parity-check matrix H A generator matrix of C s dual code H T C=0 e.g. H specifies that for each codeword, digits 1 and 2 should sum to zero and digits 3 and 4 should sum to zero
34 Collusion-resilient fingerprinting G I P k T H [ P I ] nk G H Hx = 0 xc the syndrome of the received z = x + e is defined to be: Hz = H(x + e) = Hx + He = 0 + He = He
35 Collusion-resilient fingerprinting Syndrome decoding Syndrome Coset Leader 0: e 1 : e 6 : e e e e e e e 1 +e 4, e 2 +e 5, e 3 +e 6
36 36 Collusion-resilient fingerprinting Error correcting code (ECC) Has systematic encoding and decoding algorithms Distance-based decoding criterion Resilient to attacks for multimedia data Robust than the t-design codes
37 37 Collusion-resilient fingerprinting <Definition> c-ta codes (c-traceability codes) A code C if w desc( C for all z C C <Theorem> is a c - TA code if i ) then there exists i C i x for all coalitionsc c x C w i such that i of size at most c, I( x,w) z I( z,w) Suppose that C is an ( l,n) - code having minimum Hamming distance d l(1-1/c 2 ).Then C is c - TA code. Larger minimum distances imply higher tracing ability Unfortunately, it s not easy to find practical ECCs with so large minimum distances!!
38 38 Collusion-resilient fingerprinting e.g. 2-TA: (15,3,11) 4 -BCH (120,2,96) 4 -code It s not easy to find practical ECCs with so large minimum distances Reed-Solomon code (l,k,d)-rs over GF(q m ) : d=l-k+1=q m -1-k+1=q m -k A code for sequential traitor tracing R. Safavi-Naini & Y. Wang, 2003 ( Tr( x s 1 ), Tr( x s 2 ),..., Tr( x s q k )) k * GF( q ), { 1, 2,..., q} k / 21 k 2 t, s q,and r such that ( Tr( x) r t, q r x x q x q (mod s) x q k )
39 39 Collusion-resilient fingerprinting Assign one of the q versions for each movie segment (q-ary code) H. Jin, J. Lotspiech, & S. Nusser (IBM Almaden research), 2004
40 40 Collusion-resilient fingerprinting Orthogonal signals W. Trappe, M. Wu, Z. J. Wang, and K. J. R. Liu, Anti-collusion fingerprinting for multimedia, 2003 Orthogonal fingerprint Orthogonal modulation w j =u j # of fingerprints=# of ortho. bases Modulate the code based on BIBD by noiselike signals w j B i1 b ij u i # of fingerprints>># of orthogonal bases
41 41 Collusion-resilient fingerprinting <Theorem> Let (X,A) be a (v,k,1)-bibd and M the corresponding incidence matrix. If the codevectors are assigned as the bit complement of the columns of M, then the resulting scheme is a (k-1)-resilient AND-ACC. (7,3,1)-BIBD {{0,1,3},{0,2,5},{0,4,6},{1,2,4},{1,5,6},{2,3,6},{3,4,5}}
42 42 Collusion-resilient fingerprinting The bit-complement of the incidence matrix for a (7,3,1)- BIBD Modulate the codewords by 7 orthogonal bases
43 43 Collusion-resilient fingerprinting If user 1 and user 2 are colluders Average attack: the pirate code is (w 1 +w 2 )/2 The coefficient vector is (-1,0,0,0,1,0,1) 1 occurs in the fifth and seventh location uniquely identifies users 1 and 2 as colluders Experiments (16,4,1)-BIBD 20 users c=3
44 44 Collusion-resilient fingerprinting Tree-structured detection T N y T s U i 2 / d su i 2
45 45 Collusion-resilient fingerprinting Orthogonal signals Z. J. Wang, M. Wu, H. Zhao, W. Trappe, and K. J. Liu, 2003~ Gaussian signals (suitable for multimedia content) Performance is limited if the number of Gaussian signals is larger
46 46 Collusion-resilient fingerprinting Joint fingerprint embedding and decryption based on coefficient set scrambling D. Kundur & K. Karthik, 2004
47 47 Collusion-resilient fingerprinting PSNR=22dB Original, encrypted, and fingerprinted images PSNR=34dB
48 48 Collusion-resilient fingerprinting Make the colluded copy useless U. Celik, G. Sharma, & A. M. Tekalp, Collusion-resilient fingerprinting by random pre-warping, 2004 The host signal is warped randomly prior to watermarking
49 Collusion-resilient fingerprinting 49
50 50 Collusion-resilient fingerprinting Fingerprint multicast in secure video streaming H. V. Zhao & K. J. R. Liu, 2006 Tree-structure-based fingerprint scheme
51 51 Collusion-resilient fingerprinting MPEG-2-based joint fingerprint design and distribution scheme for video on demand applications The fingerprint embedding and distribution process at the server s side
52 Collusion-resilient fingerprinting 52 Hierarchical traceability code Y. T. Lin & J. L. Wu, w 0 w 1 w b- w 0 w... 1 w b Fingerprint-segment 1 (fs 1 ) Fingerprint-segment 2 (fs 2 )... Fingerprint-segment h (fs h ) b 1 u x b The fingerprint of u x is w 0 w i1 w i2 w i3 w i4 w 1
53 Collusion-resilient fingerprinting 53 Discriminate different groups Pseudorandomly modulate each group by a different sequence w i w i w... i group group group 2 j s j j, b level 1 level 2... level j level h ( ) w 1 w 2 b j Group b j w b w b w 1 w 2. Group 4. w 1 w 2 Group 3 s j,4 ( ) w b w 1 w 2 Group 1 w 1 w 2 Group 2 w b s j,1 ( ) s j,2 ( ) w b s j,3 ( )
54 54 Collusion-resilient fingerprinting Traitor-within-traitor behavior forensics H. V. Zhao & K. J. R. Liu, 2006 Investigate the precollusion processing strategies for selfish colluders to minimize their risk
55 55 Collusion-resilient fingerprinting Traitor-within-traitor behavior forensics
56 56 Collusion-resilient fingerprinting Traitor-within-traitor behavior forensics
57 57 Collusion-resilient fingerprinting Concatenated collusion-secure code Y. T. Lin & J. L. Wu, 2007 Outer code: resisting collusion attacks Inner code: satisfying the Strict Marking Assumption codeword 1 codeword 2 codeword i The outer code... codeword 1 codeword 2 codeword q The inner code... codeword n o... The ith outer codeword... A q-ary symbol... Each q-ary symbol is encoded by the inner code One example of the nested codewords
58 58 Collusion-resilient fingerprinting Outer code: encoding group numbers Inner code: encoding member numbers and symbols Group # Codeword g The octal outer code q Member # m The binary inner code e.g. g=1 m=2 outer code
59 59 Collusion-resilient fingerprinting Video fingerprinting for large user group S. He & M. Wu, 2007 A small (the correlation between fingerprint sequences), i.e. a large minimum distance, leads to higher detection accuracy
60 60 Collusion-resilient fingerprinting Two schemes ECCFP with building-block Video Group of frames Directly apply ECCFP q-ary symbol Embedding Permuted subsequences embedding (PSE) Binary symbol
61 61 Collusion-resilient fingerprinting Collusion resistance under interleaving collusion (copy-and-paste attack) Outer code: RS (62,2,61) 64 for 64 2 users Inner code: RS (6,2,5) 8 for 64 symbols
62 Collusion-resilient fingerprinting Collusion-resistant video fingerprinting based on temporal oscillation Y. T. Lin, C. H. Hwang, & J. L. Wu, 2008 Protect the traceable code Make the colluded version of the video useless
63 Collusion-resilient fingerprinting Original video Shot change detection Curve fingerprints producing Motion analysis Spatial warping Temporal fingerprint embedding Traceability code embedding Traceability fingerprint Fingerprinted video
64 Collusion-resilient fingerprinting Oscillation User1: User2: User3: User4: Number of colluders f ( i) f ( i 1) Average attack (PSNR) i 2 Oscillation= f() i, where f(i) is the i embedding curve function Copy-and-paste attack (Oscillation) db db db
65 Collusion-resilient fingerprinting Fingerprinting while demodulating S. Lian & Z. Wang, 2008 The multimedia content is modulated by pseudorandom sequences at the server side The encrypted content is then demodulated under the control of the fingerprint code at the customer side
66 Collusion-resilient fingerprinting Fingerprinting while demodulating
67 67 Research issues Collusion-resilient fingerprint scheme Robust against collusion attacks Fingerprint - Hard to be removed by collusion attacks Content - Useless after being attacked Traceability code Short l Large n Large c Tracing algorithm & detection strategy High hit ratio Low false alarm rate Fast Low computational overhead Applications Broadcast environment Streaming data
68 68 Collusion-resilient fingerprinting Dan Boneh Associate Professor, Computer Science and Electrical Engineering, Stanford University.
69 69 Collusion attack K. J. Ray Liu Min Wu Z. J. Wang H. V. Zhou
PERFORMANCE STUDY OF ECC-BASED COLLUSION-RESISTANT MULTIMEDIA FINGERPRINTING
PERFORMANCE STUDY OF ECC-BASED COLLUSION-RESISTANT MULTIMEDIA FINGERPRINTING Shan He and Min Wu ECE Department, University of Maryland, College Park ABSTRACT * Digital fingerprinting is a tool to protect
More informationPractical fingerprinting system for images
46 5, 057004 May 2007 Practical fingerprinting system for images Yu-Tzu Lin National Taiwan University Communications and Multimedia Laboratory Department of Computer Science and Information Engineering
More informationZero-Based Code Modulation Technique for Digital Video Fingerprinting
Zero-Based Code Modulation Technique for Digital Video Fingerprinting In Koo Kang 1, Hae-Yeoun Lee 1, Won-Young Yoo 2, and Heung-Kyu Lee 1 1 Department of EECS, Korea Advanced Institute of Science and
More informationAnti-Collusion Fingerprinting for Multimedia
Anti-Collusion Fingerprinting for Multimedia Wade Trappe, Min Wu, Zhen Wang, and K. J. Ray Liu Department of Electrical and Computer Engineering University of Maryland, College Park, MD 20742 E-mail: wxt,
More informationDigital Television Lecture 5
Digital Television Lecture 5 Forward Error Correction (FEC) Åbo Akademi University Domkyrkotorget 5 Åbo 8.4. Error Correction in Transmissions Need for error correction in transmissions Loss of data during
More informationECE 6640 Digital Communications
ECE 6640 Digital Communications Dr. Bradley J. Bazuin Assistant Professor Department of Electrical and Computer Engineering College of Engineering and Applied Sciences Chapter 8 8. Channel Coding: Part
More informationEncryption Data in Wireless Sensor Network
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology ISSN 2320 088X IMPACT FACTOR: 6.017 IJCSMC,
More informationECE 6640 Digital Communications
ECE 6640 Digital Communications Dr. Bradley J. Bazuin Assistant Professor Department of Electrical and Computer Engineering College of Engineering and Applied Sciences Chapter 8 8. Channel Coding: Part
More informationMULTIMEDIA content can be easily distributed over
302 IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 4, NO. 3, SEPTEMBER 2009 Robust MC-CDMA-Based Fingerprinting Against Time-Varying Collusion Attacks Byung-Ho Cha, Student Member, IEEE,
More informationOutline. Communications Engineering 1
Outline Introduction Signal, random variable, random process and spectra Analog modulation Analog to digital conversion Digital transmission through baseband channels Signal space representation Optimal
More informationNonlinear Multi-Error Correction Codes for Reliable MLC NAND Flash Memories Zhen Wang, Mark Karpovsky, Fellow, IEEE, and Ajay Joshi, Member, IEEE
IEEE TRANSACTIONS ON VERY LARGE SCALE INTEGRATION (VLSI) SYSTEMS, VOL. 20, NO. 7, JULY 2012 1221 Nonlinear Multi-Error Correction Codes for Reliable MLC NAND Flash Memories Zhen Wang, Mark Karpovsky, Fellow,
More informationDistributed Source Coding: A New Paradigm for Wireless Video?
Distributed Source Coding: A New Paradigm for Wireless Video? Christine Guillemot, IRISA/INRIA, Campus universitaire de Beaulieu, 35042 Rennes Cédex, FRANCE Christine.Guillemot@irisa.fr The distributed
More informationSingle Error Correcting Codes (SECC) 6.02 Spring 2011 Lecture #9. Checking the parity. Using the Syndrome to Correct Errors
Single Error Correcting Codes (SECC) Basic idea: Use multiple parity bits, each covering a subset of the data bits. No two message bits belong to exactly the same subsets, so a single error will generate
More informationCommutative reversible data hiding and encryption
SECURITY AND COMMUNICATION NETWORKS Security Comm. Networks 3; 6:396 43 Published online March 3 in Wiley Online Library (wileyonlinelibrary.com)..74 RESEARCH ARTICLE Xinpeng Zhang* School of Communication
More informationTHE use of balanced codes is crucial for some information
A Construction for Balancing Non-Binary Sequences Based on Gray Code Prefixes Elie N. Mambou and Theo G. Swart, Senior Member, IEEE arxiv:70.008v [cs.it] Jun 07 Abstract We introduce a new construction
More informationDigital Communications I: Modulation and Coding Course. Term Catharina Logothetis Lecture 12
Digital Communications I: Modulation and Coding Course Term 3-8 Catharina Logothetis Lecture Last time, we talked about: How decoding is performed for Convolutional codes? What is a Maximum likelihood
More informationPhysical Layer: Modulation, FEC. Wireless Networks: Guevara Noubir. S2001, COM3525 Wireless Networks Lecture 3, 1
Wireless Networks: Physical Layer: Modulation, FEC Guevara Noubir Noubir@ccsneuedu S, COM355 Wireless Networks Lecture 3, Lecture focus Modulation techniques Bit Error Rate Reducing the BER Forward Error
More informationChapter 4 Cyclotomic Cosets, the Mattson Solomon Polynomial, Idempotents and Cyclic Codes
Chapter 4 Cyclotomic Cosets, the Mattson Solomon Polynomial, Idempotents and Cyclic Codes 4.1 Introduction Much of the pioneering research on cyclic codes was carried out by Prange [5]inthe 1950s and considerably
More informationRevision of Lecture Eleven
Revision of Lecture Eleven Previous lecture we have concentrated on carrier recovery for QAM, and modified early-late clock recovery for multilevel signalling as well as star 16QAM scheme Thus we have
More informationDigital Transmission using SECC Spring 2010 Lecture #7. (n,k,d) Systematic Block Codes. How many parity bits to use?
Digital Transmission using SECC 6.02 Spring 2010 Lecture #7 How many parity bits? Dealing with burst errors Reed-Solomon codes message Compute Checksum # message chk Partition Apply SECC Transmit errors
More informationMATHEMATICS IN COMMUNICATIONS: INTRODUCTION TO CODING. A Public Lecture to the Uganda Mathematics Society
Abstract MATHEMATICS IN COMMUNICATIONS: INTRODUCTION TO CODING A Public Lecture to the Uganda Mathematics Society F F Tusubira, PhD, MUIPE, MIEE, REng, CEng Mathematical theory and techniques play a vital
More informationHamming Codes as Error-Reducing Codes
Hamming Codes as Error-Reducing Codes William Rurik Arya Mazumdar Abstract Hamming codes are the first nontrivial family of error-correcting codes that can correct one error in a block of binary symbols.
More information6. FUNDAMENTALS OF CHANNEL CODER
82 6. FUNDAMENTALS OF CHANNEL CODER 6.1 INTRODUCTION The digital information can be transmitted over the channel using different signaling schemes. The type of the signal scheme chosen mainly depends on
More informationDigital Image Watermarking by Spread Spectrum method
Digital Image Watermarking by Spread Spectrum method Andreja Samčovi ović Faculty of Transport and Traffic Engineering University of Belgrade, Serbia Belgrade, november 2014. I Spread Spectrum Techniques
More informationChannel Coding/Decoding. Hamming Method
Channel Coding/Decoding Hamming Method INFORMATION TRANSFER ACROSS CHANNELS Sent Received messages symbols messages source encoder Source coding Channel coding Channel Channel Source decoder decoding decoding
More informationPerformance of Reed-Solomon Codes in AWGN Channel
International Journal of Electronics and Communication Engineering. ISSN 0974-2166 Volume 4, Number 3 (2011), pp. 259-266 International Research Publication House http://www.irphouse.com Performance of
More informationRobust Reed Solomon Coded MPSK Modulation
ITB J. ICT, Vol. 4, No. 2, 2, 95-4 95 Robust Reed Solomon Coded MPSK Modulation Emir M. Husni School of Electrical Engineering & Informatics, Institut Teknologi Bandung, Jl. Ganesha, Bandung 432, Email:
More informationBasics of Error Correcting Codes
Basics of Error Correcting Codes Drawing from the book Information Theory, Inference, and Learning Algorithms Downloadable or purchasable: http://www.inference.phy.cam.ac.uk/mackay/itila/book.html CSE
More informationLab/Project Error Control Coding using LDPC Codes and HARQ
Linköping University Campus Norrköping Department of Science and Technology Erik Bergfeldt TNE066 Telecommunications Lab/Project Error Control Coding using LDPC Codes and HARQ Error control coding is an
More informationFREDRIK TUFVESSON ELECTRICAL AND INFORMATION TECHNOLOGY
1 Information Transmission Chapter 5, Block codes FREDRIK TUFVESSON ELECTRICAL AND INFORMATION TECHNOLOGY 2 Methods of channel coding For channel coding (error correction) we have two main classes of codes,
More informationError Control Codes. Tarmo Anttalainen
Tarmo Anttalainen email: tarmo.anttalainen@evitech.fi.. Abstract: This paper gives a brief introduction to error control coding. It introduces bloc codes, convolutional codes and trellis coded modulation
More informationInternational Journal of Engineering Research in Electronics and Communication Engineering (IJERECE) Vol 1, Issue 5, April 2015
Implementation of Error Trapping Techniqe In Cyclic Codes Using Lab VIEW [1] Aneetta Jose, [2] Hena Prince, [3] Jismy Tom, [4] Malavika S, [5] Indu Reena Varughese Electronics and Communication Dept. Amal
More informationA Source and Channel-Coding Framework for Vector-Based Data Hiding in Video
630 IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, VOL. 10, NO. 4, JUNE 2000 A Source and Channel-Coding Framework for Vector-Based Data Hiding in Video Debargha Mukherjee, Member, IEEE,
More informationDigital Communication Systems ECS 452
Digital Communication Systems ECS 452 Asst. Prof. Dr. Prapun Suksompong prapun@siit.tu.ac.th 5. Channel Coding 1 Office Hours: BKD, 6th floor of Sirindhralai building Tuesday 14:20-15:20 Wednesday 14:20-15:20
More informationETSI TS V1.1.2 ( )
Technical Specification Satellite Earth Stations and Systems (SES); Regenerative Satellite Mesh - A (RSM-A) air interface; Physical layer specification; Part 3: Channel coding 2 Reference RTS/SES-25-3
More informationCOMBINING GALOIS WITH COMPLEX FIELD CODING FOR HIGH-RATE SPACE-TIME COMMUNICATIONS. Renqiu Wang, Zhengdao Wang, and Georgios B.
COMBINING GALOIS WITH COMPLEX FIELD CODING FOR HIGH-RATE SPACE-TIME COMMUNICATIONS Renqiu Wang, Zhengdao Wang, and Georgios B. Giannakis Dept. of ECE, Univ. of Minnesota, Minneapolis, MN 55455, USA e-mail:
More informationVisual Secret Sharing Based Digital Image Watermarking
www.ijcsi.org 312 Visual Secret Sharing Based Digital Image Watermarking B. Surekha 1, Dr. G. N. Swamy 2 1 Associate Professor, Department of ECE, TRR College of Engineering, Hyderabad, Andhra Pradesh,
More informationA New Compression Method for Encrypted Images
Technology, Volume-2, Issue-2, March-April, 2014, pp. 15-19 IASTER 2014, www.iaster.com Online: 2347-5099, Print: 2348-0009 ABSTRACT A New Compression Method for Encrypted Images S. Manimurugan, Naveen
More informationENERGY-EFFICIENT ALGORITHMS FOR SENSOR NETWORKS
ENERGY-EFFICIENT ALGORITHMS FOR SENSOR NETWORKS Prepared for: DARPA Prepared by: Krishnan Eswaran, Engineer Cornell University May 12, 2003 ENGRC 350 RESEARCH GROUP 2003 Krishnan Eswaran Energy-Efficient
More informationRecovering Lost Sensor Data through Compressed Sensing
Recovering Lost Sensor Data through Compressed Sensing Zainul Charbiwala Collaborators: Younghun Kim, Sadaf Zahedi, Supriyo Chakraborty, Ting He (IBM), Chatschik Bisdikian (IBM), Mani Srivastava The Big
More informationIMPERIAL COLLEGE of SCIENCE, TECHNOLOGY and MEDICINE, DEPARTMENT of ELECTRICAL and ELECTRONIC ENGINEERING.
IMPERIAL COLLEGE of SCIENCE, TECHNOLOGY and MEDICINE, DEPARTMENT of ELECTRICAL and ELECTRONIC ENGINEERING. COMPACT LECTURE NOTES on COMMUNICATION THEORY. Prof. Athanassios Manikas, version Spring 22 Digital
More informationChapter 3 LEAST SIGNIFICANT BIT STEGANOGRAPHY TECHNIQUE FOR HIDING COMPRESSED ENCRYPTED DATA USING VARIOUS FILE FORMATS
44 Chapter 3 LEAST SIGNIFICANT BIT STEGANOGRAPHY TECHNIQUE FOR HIDING COMPRESSED ENCRYPTED DATA USING VARIOUS FILE FORMATS 45 CHAPTER 3 Chapter 3: LEAST SIGNIFICANT BIT STEGANOGRAPHY TECHNIQUE FOR HIDING
More informationHigh Diffusion Cipher: Encryption and Error Correction in a Single Cryptographic Primitive
High Diffusion Cipher: Encryption and Error Correction in a Single Cryptographic Primitive Chetan Nanjunda Mathur, Karthik Narayan and K.P. Subbalakshmi Department of Electrical and Computer Engineering
More informationExercises to Chapter 2 solutions
Exercises to Chapter 2 solutions 1 Exercises to Chapter 2 solutions E2.1 The Manchester code was first used in Manchester Mark 1 computer at the University of Manchester in 1949 and is still used in low-speed
More informationA Combinatorial Framework for Frequency Hopping Multiple Access
Fourteenth International Workshop on Algebraic and Combinatorial Coding Theory September 7 13, 2014, Svetlogorsk (Kaliningrad region), Russia pp. 271 276 A Combinatorial Framework for Frequency Hopping
More informationDecoding of Block Turbo Codes
Decoding of Block Turbo Codes Mathematical Methods for Cryptography Dedicated to Celebrate Prof. Tor Helleseth s 70 th Birthday September 4-8, 2017 Kyeongcheol Yang Pohang University of Science and Technology
More informationCommunication Theory II
Communication Theory II Lecture 13: Information Theory (cont d) Ahmed Elnakib, PhD Assistant Professor, Mansoura University, Egypt March 22 th, 2015 1 o Source Code Generation Lecture Outlines Source Coding
More informationSOME CONSTRUCTIONS OF MUTUALLY ORTHOGONAL LATIN SQUARES AND SUPERIMPOSED CODES
Discrete Mathematics, Algorithms and Applications Vol 4, No 3 (2012) 1250022 (8 pages) c World Scientific Publishing Company DOI: 101142/S179383091250022X SOME CONSTRUCTIONS OF MUTUALLY ORTHOGONAL LATIN
More informationPerformance of Combined Error Correction and Error Detection for very Short Block Length Codes
Performance of Combined Error Correction and Error Detection for very Short Block Length Codes Matthias Breuninger and Joachim Speidel Institute of Telecommunications, University of Stuttgart Pfaffenwaldring
More informationLocal prediction based reversible watermarking framework for digital videos
Local prediction based reversible watermarking framework for digital videos J.Priyanka (M.tech.) 1 K.Chaintanya (Asst.proff,M.tech(Ph.D)) 2 M.Tech, Computer science and engineering, Acharya Nagarjuna University,
More informationcode V(n,k) := words module
Basic Theory Distance Suppose that you knew that an English word was transmitted and you had received the word SHIP. If you suspected that some errors had occurred in transmission, it would be impossible
More informationSpace engineering. Space data links - Telemetry synchronization and channel coding. ECSS-E-ST-50-01C 31 July 2008
ECSS-E-ST-50-01C Space engineering Space data links - Telemetry synchronization and channel coding ECSS Secretariat ESA-ESTEC Requirements & Standards Division Noordwijk, The Netherlands Foreword This
More informationENGN8637, Semster-1, 2018 Project Description Project 1: Bit Interleaved Modulation
ENGN867, Semster-1, 2018 Project Description Project 1: Bit Interleaved Modulation Gerard Borg gerard.borg@anu.edu.au Research School of Engineering, ANU updated on 18/March/2018 1 1 Introduction Bit-interleaved
More informationEfficient Scheme for Secret Hiding in QR Code by Improving Exploiting Modification Direction
KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS VOL. 12, NO. 5, May. 2018 2348 Copyright c 2018 KSII Efficient Scheme for Secret Hiding in QR Code by Improving Exploiting Modification Direction Peng-Cheng
More informationLecture 2. 1 Nondeterministic Communication Complexity
Communication Complexity 16:198:671 1/26/10 Lecture 2 Lecturer: Troy Lee Scribe: Luke Friedman 1 Nondeterministic Communication Complexity 1.1 Review D(f): The minimum over all deterministic protocols
More informationARTICLE IN PRESS. Signal Processing
Signal Processing 9 (1) 467 479 Contents lists available at ScienceDirect Signal Processing journal homepage: www.elsevier.com/locate/sigpro Watermarking via zero assigned filter banks Zeynep Yücel,A.Bülent
More informationBackground Dirty Paper Coding Codeword Binning Code construction Remaining problems. Information Hiding. Phil Regalia
Information Hiding Phil Regalia Department of Electrical Engineering and Computer Science Catholic University of America Washington, DC 20064 regalia@cua.edu Baltimore IEEE Signal Processing Society Chapter,
More informationError Protection: Detection and Correction
Error Protection: Detection and Correction Communication channels are subject to noise. Noise distorts analog signals. Noise can cause digital signals to be received as different values. Bits can be flipped
More informationSome constructions of mutually orthogonal latin squares and superimposed codes
University of Wollongong Research Online Faculty of Engineering and Information Sciences - Papers: Part A Faculty of Engineering and Information Sciences 2012 Some constructions of mutually orthogonal
More informationImprovement Of Block Product Turbo Coding By Using A New Concept Of Soft Hamming Decoder
European Scientific Journal June 26 edition vol.2, No.8 ISSN: 857 788 (Print) e - ISSN 857-743 Improvement Of Block Product Turbo Coding By Using A New Concept Of Soft Hamming Decoder Alaa Ghaith, PhD
More informationProblem Sheet 1 Probability, random processes, and noise
Problem Sheet 1 Probability, random processes, and noise 1. If F X (x) is the distribution function of a random variable X and x 1 x 2, show that F X (x 1 ) F X (x 2 ). 2. Use the definition of the cumulative
More informationExploration of Least Significant Bit Based Watermarking and Its Robustness against Salt and Pepper Noise
Exploration of Least Significant Bit Based Watermarking and Its Robustness against Salt and Pepper Noise Kamaldeep Joshi, Rajkumar Yadav, Sachin Allwadhi Abstract Image steganography is the best aspect
More informationAdvanced channel coding : a good basis. Alexandre Giulietti, on behalf of the team
Advanced channel coding : a good basis Alexandre Giulietti, on behalf of the T@MPO team Errors in transmission are fowardly corrected using channel coding e.g. MPEG4 e.g. Turbo coding e.g. QAM source coding
More informationERROR CONTROL CODING From Theory to Practice
ERROR CONTROL CODING From Theory to Practice Peter Sweeney University of Surrey, Guildford, UK JOHN WILEY & SONS, LTD Contents 1 The Principles of Coding in Digital Communications 1.1 Error Control Schemes
More informationA Reversible Data Hiding Scheme Based on Prediction Difference
2017 2 nd International Conference on Computer Science and Technology (CST 2017) ISBN: 978-1-60595-461-5 A Reversible Data Hiding Scheme Based on Prediction Difference Ze-rui SUN 1,a*, Guo-en XIA 1,2,
More informationApplication of QAP in Modulation Diversity (MoDiv) Design
Application of QAP in Modulation Diversity (MoDiv) Design Hans D Mittelmann School of Mathematical and Statistical Sciences Arizona State University INFORMS Annual Meeting Philadelphia, PA 4 November 2015
More informationA New Adaptive Two-Stage Maximum- Likelihood Decoding Algorithm for Linear Block Codes
IEEE TRANSACTIONS ON COMMUNICATIONS 0 A New Adaptive Two-Stage Maximum- Likelihood Decoding Algorithm for Linear Block Codes Xianren Wu 1, Hamid R. Sadjadpour 2 (contact author) and Zhi Tian 1 Suggested
More informationInternational Journal of Research and Review E-ISSN: ; P-ISSN:
International Journal of Research and Review www.ijrrjournal.com E-ISSN: 2349-9788; P-ISSN: 2454-2237 Research Paper An Improvement of Scrambling Technique by Using Modified Selected Mapping in W.A.F.W.
More informationPhysical-Layer Network Coding Using GF(q) Forward Error Correction Codes
Physical-Layer Network Coding Using GF(q) Forward Error Correction Codes Weimin Liu, Rui Yang, and Philip Pietraski InterDigital Communications, LLC. King of Prussia, PA, and Melville, NY, USA Abstract
More informationPermutation group and determinants. (Dated: September 19, 2018)
Permutation group and determinants (Dated: September 19, 2018) 1 I. SYMMETRIES OF MANY-PARTICLE FUNCTIONS Since electrons are fermions, the electronic wave functions have to be antisymmetric. This chapter
More informationThe ternary alphabet is used by alternate mark inversion modulation; successive ones in data are represented by alternating ±1.
Alphabets EE 387, Notes 2, Handout #3 Definition: An alphabet is a discrete (usually finite) set of symbols. Examples: B = {0,1} is the binary alphabet T = { 1,0,+1} is the ternary alphabet X = {00,01,...,FF}
More informationControl Channel Jamming: Resilience and Identification of Traitors
Control Channel Jamming: Resilience and Identification of Traitors Agnes Chan, Xin Liu, Guevara Noubir, Bishal Thapa College of Computer and Information Scinece Northeastern University, Boston, MA 02115
More informationLDPC Decoding: VLSI Architectures and Implementations
LDPC Decoding: VLSI Architectures and Implementations Module : LDPC Decoding Ned Varnica varnica@gmail.com Marvell Semiconductor Inc Overview Error Correction Codes (ECC) Intro to Low-density parity-check
More informationInternational Journal of Advance Research in Computer Science and Management Studies
Volume 3, Issue 2, February 2015 ISSN: 2321 7782 (Online) International Journal of Advance Research in Computer Science and Management Studies Research Article / Survey Paper / Case Study Available online
More informationHybrid ARQ Using Serially Concatenated Block Codes for Real-Time Communication - An Iterative Decoding Approach
Hybrid ARQ Using Serially Concatenated Block Codes for Real-Time Communication - An Iterative Decoding Approach ELISABETH UHLEMANN School of Information Science, Computer and Electrical Engineering, Halmstad
More informationPD-SETS FOR CODES RELATED TO FLAG-TRANSITIVE SYMMETRIC DESIGNS. Communicated by Behruz Tayfeh Rezaie. 1. Introduction
Transactions on Combinatorics ISSN (print): 2251-8657, ISSN (on-line): 2251-8665 Vol. 7 No. 1 (2018), pp. 37-50. c 2018 University of Isfahan www.combinatorics.ir www.ui.ac.ir PD-SETS FOR CODES RELATED
More informationImplementation of Reed Solomon Encoding Algorithm
Implementation of Reed Solomon Encoding Algorithm P.Sunitha 1, G.V.Ujwala 2 1 2 Associate Professor, Pragati Engineering College,ECE --------------------------------------------------------------------------------------------------------------------
More informationPerformance Evaluation of Error Correcting Techniques for OFDM Systems
Performance Evaluation of Error Correcting Techniques for OFDM Systems Yasir Javed Qazi Email: p060059@gmail.com Safwan Muhammad Email:safwan.mu11@gmail.com Jawad Ahmed Malik Email: reply.jawad@gmail.com
More informationLecture 17 Components Principles of Error Control Borivoje Nikolic March 16, 2004.
EE29C - Spring 24 Advanced Topics in Circuit Design High-Speed Electrical Interfaces Lecture 17 Components Principles of Error Control Borivoje Nikolic March 16, 24. Announcements Project phase 1 is posted
More informationChapter 10 Error Detection and Correction 10.1
Data communication and networking fourth Edition by Behrouz A. Forouzan Chapter 10 Error Detection and Correction 10.1 Note Data can be corrupted during transmission. Some applications require that errors
More informationAd Hoc Networks - Routing and Security Issues
Ad Hoc Networks - Routing and Security Issues Mahalingam Ramkumar Mississippi State University, MS January 25, 2005 1 2 Some Basic Terms Basic Terms Ad Hoc vs Infrastructured AHN MANET (Mobile Ad hoc NETwork)
More informationLow Correlation Zone Signal Sets
Low Correlation Zone Signal Sets Guang Gong Department of Electrical & Computer Engineering University of Waterloo CANADA Joint work with Solomon W. Golomb and Hong-Yeop Song Outline of Presentation Outline
More informationReversible Data Hiding in Encrypted color images by Reserving Room before Encryption with LSB Method
ISSN (e): 2250 3005 Vol, 04 Issue, 10 October 2014 International Journal of Computational Engineering Research (IJCER) Reversible Data Hiding in Encrypted color images by Reserving Room before Encryption
More information6.450: Principles of Digital Communication 1
6.450: Principles of Digital Communication 1 Digital Communication: Enormous and normally rapidly growing industry, roughly comparable in size to the computer industry. Objective: Study those aspects of
More informationWhite Paper FEC In Optical Transmission. Giacomo Losio ProLabs Head of Technology
White Paper FEC In Optical Transmission Giacomo Losio ProLabs Head of Technology 2014 FEC In Optical Transmission When we introduced the DWDM optics, we left out one important ingredient that really makes
More informationSpreading Codes and Characteristics. Error Correction Codes
Spreading Codes and Characteristics and Error Correction Codes Global Navigational Satellite Systems (GNSS-6) Short course, NERTU Prasad Krishnan International Institute of Information Technology, Hyderabad
More informationHigh-Capacity Reversible Data Hiding in Encrypted Images using MSB Prediction
High-Capacity Reversible Data Hiding in Encrypted Images using MSB Prediction Pauline Puteaux and William Puech; LIRMM Laboratory UMR 5506 CNRS, University of Montpellier; Montpellier, France Abstract
More informationCapacity of collusion secure fingerprinting a tradeoff between rate and efficiency
Capacity of collusion secure fingerprinting a tradeoff between rate and efficiency Gábor Tardos School of Computing Science Simon Fraser University and Rényi Institute, Budapest tardos@cs.sfu.ca Abstract
More informationThe Capability of Error Correction for Burst-noise Channels Using Error Estimating Code
The Capability of Error Correction for Burst-noise Channels Using Error Estimating Code Yaoyu Wang Nanjing University yaoyu.wang.nju@gmail.com June 10, 2016 Yaoyu Wang (NJU) Error correction with EEC June
More informationPerformance Optimization of Hybrid Combination of LDPC and RS Codes Using Image Transmission System Over Fading Channels
European Journal of Scientific Research ISSN 1450-216X Vol.35 No.1 (2009), pp 34-42 EuroJournals Publishing, Inc. 2009 http://www.eurojournals.com/ejsr.htm Performance Optimization of Hybrid Combination
More informationReview: Theorem of irrelevance. Y j φ j (t) where Y j = X j + Z j for 1 j k and Y j = Z j for
Review: Theorem of irrelevance Given the signal set { a 1,..., a M }, we transmit X(t) = j k =1 a m,jφ j (t) and receive Y (t) = j=1 Y j φ j (t) where Y j = X j + Z j for 1 j k and Y j = Z j for j>k. Assume
More informationInternational Journal of Digital Application & Contemporary research Website: (Volume 1, Issue 7, February 2013)
Performance Analysis of OFDM under DWT, DCT based Image Processing Anshul Soni soni.anshulec14@gmail.com Ashok Chandra Tiwari Abstract In this paper, the performance of conventional discrete cosine transform
More informationHYBRID MATRIX CODING AND ERROR-CORRECTION CODING SCHEME FOR REVERSIBLE DATA HIDING IN BINARY VQ INDEX CODESTREAM
International Journal of Innovative Computing, Information and Control ICIC International c 2013 ISSN 1349-4198 Volume 9, Number 6, June 2013 pp. 2521 2531 HYBRID MATRIX CODING AND ERROR-CORRECTION CODING
More informationA Lossless Large-Volume Data Hiding Method Based on Histogram Shifting Using an Optimal Hierarchical Block Division Scheme *
JOURNAL OF INFORMATION SCIENCE AND ENGINEERING 27, 1265-1282 (2011) A Lossless Large-Volume Data Hiding Method Based on Histogram Shifting Using an Optimal Hierarchical Block Division Scheme * CHE-WEI
More informationDesign of Reed Solomon Encoder and Decoder
Design of Reed Solomon Encoder and Decoder Shital M. Mahajan Electronics and Communication department D.M.I.E.T.R. Sawangi, Wardha India e-mail: mah.shital@gmail.com Piyush M. Dhande Electronics and Communication
More informationBER Analysis of BPSK and QAM Modulation Schemes using RS Encoding over Rayleigh Fading Channel
BER Analysis of BPSK and QAM Modulation Schemes using RS Encoding over Rayleigh Fading Channel Faisal Rasheed Lone Department of Computer Science & Engineering University of Kashmir Srinagar J&K Sanjay
More informationSimulink Modelling of Reed-Solomon (Rs) Code for Error Detection and Correction
Simulink Modelling of Reed-Solomon (Rs) Code for Error Detection and Correction Okeke. C Department of Electrical /Electronics Engineering, Michael Okpara University of Agriculture, Umudike, Abia State,
More informationCH 4. Air Interface of the IS-95A CDMA System
CH 4. Air Interface of the IS-95A CDMA System 1 Contents Summary of IS-95A Physical Layer Parameters Forward Link Structure Pilot, Sync, Paging, and Traffic Channels Channel Coding, Interleaving, Data
More informationDegrees of Freedom of Multi-hop MIMO Broadcast Networks with Delayed CSIT
Degrees of Freedom of Multi-hop MIMO Broadcast Networs with Delayed CSIT Zhao Wang, Ming Xiao, Chao Wang, and Miael Soglund arxiv:0.56v [cs.it] Oct 0 Abstract We study the sum degrees of freedom (DoF)
More informationSpread Spectrum. Chapter 18. FHSS Frequency Hopping Spread Spectrum DSSS Direct Sequence Spread Spectrum DSSS using CDMA Code Division Multiple Access
Spread Spectrum Chapter 18 FHSS Frequency Hopping Spread Spectrum DSSS Direct Sequence Spread Spectrum DSSS using CDMA Code Division Multiple Access Single Carrier The traditional way Transmitted signal
More information