2018
DOI: 10.1109/mcom.2018.1601228
|View full text |Cite
|
Sign up to set email alerts
|

Bio-Inspired Steganography for Secure Underwater Acoustic Communications

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
19
0

Year Published

2019
2019
2021
2021

Publication Types

Select...
7

Relationship

1
6

Authors

Journals

citations
Cited by 37 publications
(19 citation statements)
references
References 14 publications
0
19
0
Order By: Relevance
“…Compared with the existing methods presented in Section 1, the proposed method shows a better classification performance for both whale species. Moreover, although the proposed method is used here for whistle detection and classification of only killer whales and long-finned pilot whales, it is not limited to this application and can be easily adapted for other whale or dolphin species that can produce whistles or other sounds; it can also be employed to perform some preliminary work in passive acoustic observation applications for whale or dolphin species, such as range and seasonal occurrence measurement, abundance estimation, and population structure determination, together with some bio-inspired underwater detection or communication systems [32][33][34][35][36][37][38][39].…”
Section: Resultsmentioning
confidence: 99%
“…Compared with the existing methods presented in Section 1, the proposed method shows a better classification performance for both whale species. Moreover, although the proposed method is used here for whistle detection and classification of only killer whales and long-finned pilot whales, it is not limited to this application and can be easily adapted for other whale or dolphin species that can produce whistles or other sounds; it can also be employed to perform some preliminary work in passive acoustic observation applications for whale or dolphin species, such as range and seasonal occurrence measurement, abundance estimation, and population structure determination, together with some bio-inspired underwater detection or communication systems [32][33][34][35][36][37][38][39].…”
Section: Resultsmentioning
confidence: 99%
“…Besides, as [38], the SC is composed of single original click and used to serve as the time reference of decoding the GNI, GHI and IC. Communication codes c sc , c gn1 , .…”
Section: B Structure Design Of the Bbiccfmentioning
confidence: 99%
“…Inspired by this, we design a BBICCF ( Fig.1) to provide strong support for solving the secure communication and communication network problems for MUP formations, by using killer whales' call pulses and learning the bionic communication idea in [38], and then to extent its application for different formation requirements. The BBICCF considers each underwater platform as a killer whale, then picked out some original long duration call pulses (whistles and pulsed calls) with different features from the original killer whales' call pulse trains, and then allocates the selected unique long duration call pulse as communication address code for each platform.…”
mentioning
confidence: 99%
See 1 more Smart Citation
“…In marine archeology, they are used for the exploration of underwater pools of toxic brine [20] and observation of underwater structures [21]. Regarding underwater communication, the authors of [22] proposed the use of a secure communication framework concealing the information under certain characteristics of pulses used by mammals. In addition, ROVs can be used to capture underwater images, of which nowadays there are open research lines [23][24][25][26].…”
Section: Introductionmentioning
confidence: 99%