OFDM+CDMA+Stego = Secure Communication: A Review
نویسندگان
چکیده
منابع مشابه
Secure Speech Communication – A Review
Secure speech communication has been of great importance in civil, commercial and military communication systems. As speech communication becomes widely used and even more vulnerable, the importance of providing a high level of security becomes a major issue. The main objective of this paper is to increase the security, and to remove the redundancy for speech communication system under the glob...
متن کاملSecure Communication in Shotgun Cellular Systems
In this paper, we analyze the secure connectivity in Shotgun cellular systems (SCS: Wireless communication systems with randomly placed base stations) by Poisson intrinsically secure communication graph (IS-graph), i.e., a random graph which describes the connections that are secure over a network. For a base-station in SCS, a degree of secure connections is determined over two channel models: ...
متن کاملA Review on Digital Watermarking in Video for Secure Communication
In today’s life need of security is require in digital media due to the extensive use of digital media applications, multimedia security and copyright protection has gained tremendous importance. Digital watermarking is technology used for various applications. In field of digital media like copyright protection, Authentication etc. A lot of techniques are available for protecting the copyright...
متن کاملA Secure Certificate for Secure Group Communication
Security is a primary concern in group communication, and secure authentication is essential to establishing a secure group communication. Most conventional authentications consist of knowledge-based and token-based methods. One of the token-based methods is a X.509 certificate, which is used under a Public Key Infrastructure (PKI); it is the most well-known authentication system in a distribut...
متن کاملDistance-Aware Beamforming for Multiuser Secure Communication Systems
Typical cryptography schemes are not well suited for low complexity types of equipment, e.g., Internet of things (IoT) devices, as they may need high power or impose high computational complexity on the device. Physical (PHY) layer security techniques such as beamforming (in multiple antennas systems) are possible alternatives to provide security for such applications. In this paper, we consid...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Research Journal of Information Technology
سال: 2012
ISSN: 1815-7432
DOI: 10.3923/rjit.2012.31.46