메뉴 건너뛰기




Volumn 31, Issue 9, 2013, Pages 1921-1930

Limits of reliable communication with low probability of detection on AWGN channels

Author keywords

covert communication; Low probability of detection communication; spread spectrum communication

Indexed keywords

ADDITIVE WHITE GAUSSIAN NOISE CHANNEL; AMOUNT OF INFORMATION; COVERT COMMUNICATIONS; DECODING ERRORS; LOW PROBABILITY OF DETECTIONS; MISSED DETECTIONS; NON-ZERO PROBABILITY; RELIABLE COMMUNICATION;

EID: 84883395039     PISSN: 07338716     EISSN: None     Source Type: Journal    
DOI: 10.1109/JSAC.2013.130923     Document Type: Article
Times cited : (815)

References (30)
  • 4
    • 84890522850 scopus 로고
    • Communication theory of security
    • C. E. Shannon, "Communication theory of security," Bell System Technical J., vol. 28, pp. 656-715, 1949.
    • (1949) Bell System Technical J , vol.28 , pp. 656-715
    • Shannon, C.E.1
  • 8
    • 3042519430 scopus 로고    scopus 로고
    • An information-theoretic model for steganography
    • C. Cachin, "An information-theoretic model for steganography," Information and Computation, vol. 192, no. 1, pp. 41-56, 2004.
    • (2004) Information and Computation , vol.192 , Issue.1 , pp. 41-56
    • Cachin, C.1
  • 10
    • 0004137446 scopus 로고    scopus 로고
    • 2nd Ed. New York NY: Springer Verlag
    • S. Lang, Undergraduate Analysis, 2nd ed. New York, NY: Springer-Verlag, 1997.
    • (1997) Undergraduate Analysis
    • Lang, S.1
  • 13
    • 3042753402 scopus 로고    scopus 로고
    • New exponential bounds and approximations for the computation of error probability in fading channels
    • Jul
    • M. Chiani, D. Dardari, and M. K. Simon, "New exponential bounds and approximations for the computation of error probability in fading channels," IEEE Transactions on Wireless Communications, vol. 2, no. 4, pp. 840-845, Jul. 2003.
    • (2003) IEEE Transactions on Wireless Communications , vol.2 , Issue.4 , pp. 840-845
    • Chiani, M.1    Dardari, D.2    Simon, M.K.3
  • 15
    • 0036713329 scopus 로고    scopus 로고
    • Random codes: Minimum distances and error exponents
    • Sep
    • A. Barg and G. D. Forney, Jr., "Random codes: minimum distances and error exponents," IEEE Trans. Inf. Theory, vol. 48, no. 9, pp. 2568-2573, Sep. 2002.
    • (2002) IEEE Trans. Inf. Theory , vol.48 , Issue.9 , pp. 2568-2573
    • Barg, A.1    Forney Jr., G.D.2
  • 17
    • 34547881527 scopus 로고    scopus 로고
    • A capacity result for batch steganography
    • Aug
    • A. D. Ker, "A capacity result for batch steganography," IEEE Signal Process. Lett., vol. 14, no. 8, pp. 525-528, Aug. 2007.
    • (2007) IEEE Signal Process. Lett , vol.14 , Issue.8 , pp. 525-528
    • Ker, A.D.1
  • 18
    • 70350562893 scopus 로고    scopus 로고
    • The square root law of steganographic capacity for markov covers
    • T. Filler, A. D. Ker, and J. Fridrich, "The square root law of steganographic capacity for markov covers," Media Forensics and Security, vol. 7254, no. 1, 2009.
    • (2009) Media Forensics and Security , vol.7254 , Issue.1
    • Filler, T.1    Ker, A.D.2    Fridrich, J.3
  • 21
    • 70350445582 scopus 로고    scopus 로고
    • Fisher information determines capacity of -secure steganography
    • S. Katzenbeisser and A.-R. Sadeghi, Eds. Springer Berlin / Heidelberg
    • T. Filler and J. Fridrich, "Fisher information determines capacity of -secure steganography," in Information Hiding, ser. Lecture Notes in Computer Science, S. Katzenbeisser and A.-R. Sadeghi, Eds. Springer Berlin / Heidelberg, 2009, vol. 5806, pp. 31-47.
    • (2009) Information Hiding, Ser. Lecture Notes in Computer Science , vol.5806 , pp. 31-47
    • Filler, T.1    Fridrich, J.2
  • 22
    • 70350440358 scopus 로고    scopus 로고
    • Estimating steganographic fisher information in real images
    • S. Katzenbeisser and A.-R. Sadeghi, Eds. Springer Berlin / Heidelberg
    • A. D. Ker, "Estimating steganographic fisher information in real images," in Information Hiding, ser. Lecture Notes in Computer Science, S. Katzenbeisser and A.-R. Sadeghi, Eds. Springer Berlin / Heidelberg, 2009, vol. 5806, pp. 73-88.
    • (2009) Information Hiding, Ser. Lecture Notes in Computer Science , vol.5806 , pp. 73-88
    • Ker, A.D.1
  • 24
  • 25
    • 0017973511 scopus 로고
    • Broadcast channels with confidential messages
    • May
    • I. Csiszar and J. Korner, "Broadcast channels with confidential messages," IEEE Trans. Inf. Theory, vol. 24, no. 3, pp. 339-348, May 1978.
    • (1978) IEEE Trans. Inf. Theory , vol.24 , Issue.3 , pp. 339-348
    • Csiszar, I.1    Korner, J.2
  • 28
    • 84873934451 scopus 로고    scopus 로고
    • The embedding capacity of information flows under renewal traffic
    • S. Marano, V. Matta, T. He, and L. Tong, "The embedding capacity of information flows under renewal traffic," IEEE Trans. Inf. Theory, vol. 59, no. 3, pp. 1724-1739, 2013.
    • (2013) IEEE Trans. Inf. Theory , vol.59 , Issue.3 , pp. 1724-1739
    • Marano, S.1    Matta, V.2    He, T.3    Tong, L.4
  • 29
    • 70349185618 scopus 로고    scopus 로고
    • A survey of spectrum sensing algorithms for cognitive radio applications
    • First Qtr
    • T. Yucek and H. Arslan, "A survey of spectrum sensing algorithms for cognitive radio applications," IEEE Commun. Surveys & Tutorials, vol. 11, no. 1, pp. 116-130, First Qtr 2009.
    • (2009) IEEE Commun. Surveys & Tutorials , vol.11 , Issue.1 , pp. 116-130
    • Yucek, T.1    Arslan, H.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.