2019
DOI: 10.3390/sym11060752
|View full text |Cite
|
Sign up to set email alerts
|

Symmetry Oriented Covert Acoustic Communication by Mimicking Humpback Whale Song

Abstract: To meet the increasing demand of covert underwater acoustic communication, biologically inspired mimicry communication watermarking the data in symmetrical humpback whale song is presented. Mimicry is an entirely different approach from traditional covert communication where data are transmitted by spreading the waveform at a low signal to noise ratio. In this innovative technique, the carrier signal is imitated symmetrical to the ocean background noise, which can be shipping noise, anthropological noise, or t… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
10
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
5
4

Relationship

0
9

Authors

Journals

citations
Cited by 17 publications
(10 citation statements)
references
References 38 publications
0
10
0
Order By: Relevance
“…Dealing with uncertainty is an important issue when making decisions, inferences, and predictions in various situations [8]. Here are some common methods to handle uncertainty.…”
Section: Handling Of Uncertaintymentioning
confidence: 99%
“…Dealing with uncertainty is an important issue when making decisions, inferences, and predictions in various situations [8]. Here are some common methods to handle uncertainty.…”
Section: Handling Of Uncertaintymentioning
confidence: 99%
“…This is the most vital parameter in mimicry covert underwater acoustic communication. The main key of biologically inspired covert communication is the likeness of a man-made signal with real sea ocean noise [4]. The mimicked signal containing a watermark should be akin to the original ocean noise.…”
Section: Imperceptibilitymentioning
confidence: 99%
“…The demand of secretly transmitting data in underwater acoustic channels is rapidly increasing in oceanography, military and naval operations [2,3]. Mariners desire to transmit their information clandestinely to secure it from data theft and malicious attacks [4]. Military and naval personnel need to hide their communication to prevent the leakage of such information to the enemy [5].…”
Section: Introductionmentioning
confidence: 99%
“…One is to avoid mistakes, that is to avoid failures, which requires strict screening of computer components, improving design, improving manufacturing technology, and strengthening quality management. However, even such a communication system cannot avoid failure due to its working environment with various environmental stresses, such as electromagnetic interference, humidity, temperature, strong vibration [3]. This requires that the communication network can tolerate faults in the event of faults, that is, the second method: fault-tolerant technology.…”
Section: Introductionmentioning
confidence: 99%