CN109412750A - Anti- eavesdropping transmission method based on fountain codes in a kind of multimedia communication - Google Patents

Anti- eavesdropping transmission method based on fountain codes in a kind of multimedia communication Download PDF

Info

Publication number
CN109412750A
CN109412750A CN201811097456.9A CN201811097456A CN109412750A CN 109412750 A CN109412750 A CN 109412750A CN 201811097456 A CN201811097456 A CN 201811097456A CN 109412750 A CN109412750 A CN 109412750A
Authority
CN
China
Prior art keywords
data packet
source data
coding
type
channel quality
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201811097456.9A
Other languages
Chinese (zh)
Other versions
CN109412750B (en
Inventor
孙黎
黄丹彤
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Xian Jiaotong University
Original Assignee
Xian Jiaotong University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Xian Jiaotong University filed Critical Xian Jiaotong University
Priority to CN201811097456.9A priority Critical patent/CN109412750B/en
Publication of CN109412750A publication Critical patent/CN109412750A/en
Application granted granted Critical
Publication of CN109412750B publication Critical patent/CN109412750B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L1/00Arrangements for detecting or preventing errors in the information received
    • H04L1/004Arrangements for detecting or preventing errors in the information received by using forward error control
    • H04L1/0056Systems characterized by the type of code used
    • H04L1/0057Block codes
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04KSECRET COMMUNICATION; JAMMING OF COMMUNICATION
    • H04K1/00Secret communication
    • H04K1/02Secret communication by adding a second signal to make the desired signal unintelligible

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

The invention discloses the anti-eavesdropping transmission methods in a kind of multimedia communication based on fountain codes, comprising: 1) source file to be sent is divided into N number of source data packet by legal transmitter Alice;2) legal transmitter Alice by each source data packet be based on business feature carry out importance ranking, while by channel quality by well arrive difference be three channel quality sections;3) legal transmitter Alice is marked using the source data packet having been received that legitimate receiver Bob is fed back to, and the importance and current channel information dynamic further according to source data packet to be sent adjust the structure of fountain coding, and coding is then wrapped tnIt is sent to legitimate receiver Bob;4) legitimate receiver Bob is decoded the coding packet received, obtains source data packet, and the label of source data packet is then fed back to legal transmitter Alice, and this method can be realized the transmission of the multi-media safety based on fountain.

Description

Anti- eavesdropping transmission method based on fountain codes in a kind of multimedia communication
Technical field
The invention belongs to wireless communication technology field, it is related to the anti-eavesdropping transmission based on fountain codes in a kind of multimedia communication Method.
Background technique
Safety of physical layer causes since it can realize safe transmission using characteristics of radio channels and encrypt independent of code key The extensive concerns of researchers at home and abroad.But the biography of target is minimised as with secret maximum capacity and secret outage probability The safety of physical layer technology of system has transmission rate low, the limitations such as decoding delay height, this broadband services pair of this and multimedia The requirement of high-speed transfer and delay constraint does not match that.
Fountain codes have the property that: receiving end, which must accumulate enough coding packets, could restore original. As long as that is legitimate user can accumulate to enough codings prior to eavesdropping side and wrap, it is avoided that information leakage, realizes safety Communication.And fountain codes, when realizing safe transmission, the transmission rate of system is only limited by the Shannon capacity of legal link, when decoding Prolong and substantially reduces.Meanwhile using the generation of the adaptive adjustment coding packet of the channel quality that feedback channel obtains legal link, make It obtains receiving end and obtains even more important information under the conditions of delay constraint, therefore, study the multi-media safety based on fountain codes and pass Transferring technology is of great significance.
Summary of the invention
It is an object of the invention to overcome the above-mentioned prior art, provide in a kind of multimedia communication based on fountain The anti-eavesdropping transmission method of code, this method can be realized the transmission of the multi-media safety based on fountain.
In order to achieve the above objectives, the anti-eavesdropping transmission method in multimedia communication of the present invention based on fountain codes includes Following steps:
1) source file to be sent is divided into N number of source data packet by legal transmitter Alice;
2) each source data packet is based on business feature and carries out importance ranking by legal transmitter Alice, wherein according to important Each source data packet is divided into three classes type- I, type- II and type- III by property degree in a manner of successively decreasing, while by channel quality By to difference being well three channel quality sections, wherein channel quality determines by the modulus value of characteristic of channel coefficient h, and | h | belong to The ratio between the probability in three channel quality sections is equal to the ratio between the data volume of three classes source data packet;
3) legal transmitter Alice is marked using the source data packet having been received that legitimate receiver Bob is fed back to, then The structure that fountain coding is adjusted according to the importance of source data packet to be sent and current channel information dynamic, must encode packet tn, Then coding is wrapped into tnIt is sent to legitimate receiver Bob;
4) legitimate receiver Bob is decoded the coding packet received, obtains source data packet, then by the mark of source data packet Note feeds back to legal transmitter Alice.
In step 3), when | h | > Th1When, then have
Wherein, sk1mIndicate the last I class source data packet of type- for solving out, sk1nIt indicates from also not solving out The source data packet picked out at random in I class source data packet of type-;
Work as Th1>|h|≥Th2When, then have
Wherein, sk2mRepresent the last II class source data packet of type- for solving out, sk2nIt indicates from also not solving out The source data packet picked out at random in II class source data packet of type-, ∑ sk1iBy from I class of type- for having solved out The part that source data packet is selected at random carries out exclusive or and obtains;
When | h | < Th2When, then the transmission without coding packet;
When any sort source data packet is sent, and time delay thresholding has not been reached yet, and does not send there are also source data packet, Then go to step 2).
For multimedia service, each frame of video is divided, a series of still images are obtained, by each width still image Regard a source file as, still image is divided into the identical N number of segmentation figure of size, i.e., N number of source data packet s1,s2…sk, to this N number of source data packet s1,s2…skThe concrete operations classified are as follows:
11) the conspicuousness average value of each segmentation figure is calculatedWherein, SiIndicate each in segmentation figure The significance value of pixel, l indicate pixel number contained by each block of pixels;
12) binary map is sought using edge detection, then calculates marginal information amount contained by cut zone SjIndicate the value of each pixel in binary map;
13) the importance score S of each source data packet is calculatedp,Wherein, SpIt is bigger, then The importance degree of the source data packet is higher.
The invention has the following advantages:
Anti- eavesdropping transmission method in multimedia communication of the present invention based on fountain codes when specific operation, according to The importance and current channel information dynamic adjustment fountain codes structure that send source data packet carry out the coding of source data packet to be sent, The channel quality for being not entirely dependent on legal link is centainly better than eavesdropping link, is inferior to eavesdrop link in legal Link Channel Quality When channel quality, still there is certain anti-eavesdropping energy, while when the channel quality of legal link is better than eavesdropping link, resisting The validity of eavesdropping is significantly promoted, to effectively promote the safety of information transmission.In addition, the present invention is based on fountains Code structure carries out the coding of source data packet to be sent, to improve the rate of information throughput of system, and the rate of information throughput only by The Shannon capacity of legal link limits, and effectively reduces decoding delay, meets the requirement of this broadband services high-speed transfer of multimedia And stringent time delay is limited and is required.In addition, the source data packet that the present invention is to be sent according to the adaptive selection of present channel quality, While expanding legitimate channel advantage, guarantee that the video of legitimate receiver Bob receives quality, so that legitimate receiver Bob exists Prior information is obtained in limited time delay as far as possible.
Detailed description of the invention
Fig. 1 is system model figure of the invention;
Fig. 2 is change curve of the intercept probability with SNR;
Fig. 3 is that QoS violates probability with the change curve of source data packet number;
Fig. 4 is the graph of relation that MSE changes with average signal-to-noise ratio;
Fig. 5 is variation relation curve graph of the PSNR with average signal-to-noise ratio;
Fig. 6 is actual video laser propagation effect figure of the invention.
Specific embodiment
The invention will be described in further detail with reference to the accompanying drawing:
In the present invention, data transmission system includes legal transmitter Alice and legitimate receiver Bob, wherein legal transmission Machine Alice and legitimate receiver Bob configures single antenna, and system works in TDD mode, legal transmitter Alice Send data by frame, the transmission of every frame data includes three phases: first stage, legitimate receiver Bob by feedback channel to Legal transmitter Alice feeds back present channel quality;Second stage, legal transmitter Alice is according to channel quality and current conjunction The source data packet that method receiver Bob has been received, adaptive selection need the source data packet for participating in coding to be encoded, obtain Coding packet, then obtained data packet is sent to legitimate receiver Bob;Phase III, the source that legitimate receiver Bob comes out solution The label of data packet feeds back to legal transmitter Alice, specifically includes the following steps:
1) source file to be sent is divided into N number of source data packet by legal transmitter Alice;
2) each source data packet is based on business feature and carries out importance ranking by legal transmitter Alice, wherein according to important Each source data packet is divided into three classes type- I, type- II and type- III by property degree in a manner of successively decreasing, while by channel quality By to difference being well three channel quality sections, wherein channel quality determines by the modulus value of characteristic of channel coefficient h, and | h | belong to The ratio between the probability in three channel quality sections is equal to the ratio between the data volume of three classes source data packet;
Wherein, for multimedia service, each frame of video is divided, a series of still images are obtained, it is quiet by each State image regards a source file as, and still image is divided into the identical N number of segmentation figure of size, i.e., N number of source data packet s1,s2… sk, to N number of source data packet s1,s2…skThe concrete operations classified are as follows:
11) the conspicuousness average value of each segmentation figure is calculatedWherein, SiIndicate each in segmentation figure The significance value of pixel, l indicate pixel number contained by each block of pixels;
12) edge detection is carried out using FT algorithm and seek binary map, then calculate marginal information amount contained by cut zoneSjIndicate the value of each pixel in binary map;
13) the importance score S of each source data packet is calculatedp,Wherein, SpIt is bigger, then The importance degree of the source data packet is higher.
3) legal transmitter Alice adjusts fountain according to importance and the current channel information dynamic of data to be transmitted packet and compiles The structure of code carries out the coding of source data packet to be sent, must encode packet tn, coding is then wrapped into tnIt is sent to legitimate receiver Bob;
4) legitimate receiver Bob is decoded the coding packet received, obtains source data packet, then by the mark of source data packet Note feeds back to legal transmitter Alice.
In step 3), when | h | > Th1When, then have
Wherein, sk1mIndicate the last I class source data packet of type- for solving out, sk1nIt indicates from also not solving out The source data packet picked out at random in I class source data packet of type-;
Work as Th1>|h|≥Th2When, then have
Wherein, sk2mRepresent the last II class source data packet of type- for solving out, sk2nIt indicates from also not solving out The source data packet picked out at random in II class source data packet of type-, ∑ sk1iBy from I class of type- for having solved out The part that source data packet is selected at random carries out exclusive or and obtains;
When | h | < Th2When, then the transmission without coding packet;
When any sort source data packet is sent, and time delay thresholding has not been reached yet, and does not send there are also source data packet, Then go to step 2).
In step 2) by channel quality by well to difference be three channel quality sections concrete operations are as follows: set good letter Road quality section proportion is P1, general channel quality section proportion is P2, Th1And Th2Indicate channel gain threshold Value, wherein Th1=(1/ λ ln (1-P1)-1)1/2, Th2=(1/ λ ln (1-P1-P2)-1)1/2, when | h | > Th1When channel quality be it is good It is good;Work as Th1≥|h|>Th2When, channel quality is general;When | h |≤Th2When, channel quality is poor.
In step 4), legitimate receiver Bob is demodulated using maximum-likelihood criterion, then utilizes BP iterative decoding algorithm Solve source data packet.
Emulation experiment
For convenience of description, introduce several definition first, by intercept probability 1 be defined as when legitimate receiver Bob solve it is all K source data packet in the case where, listener-in Eve also receives the probability of entire file;Intercept probability 2 is defined as when legal In the case that receiver Bob solves K all source data packets, listener-in Eve has solved the probability of K-1 source data packet, QoS Violate probability is defined as:
Wherein, TreqExpression allows to transmit coding packet number, Ttot,BAnd Ttot,EIt respectively represents legitimate receiver and listener-in is extensive Packet quantity is encoded required for multiple all source data packets, the first item in formula defines time delay and violates probability, and Section 2 calculates The information acquisition probability of listener-in Eve.
Effectiveness of the invention depends on the difference of both links channel, by the feedback of legitimate receiver Bob, according to The strategy that coding is adjusted according to the channel quality of legal link expands the channel quality advantage of legal link, therefore in channel item Part is poor, i.e., when SNR is lower, little come the gain obtained by adjustment coding structure, intercept probability is relatively high.And with SNR is increased, and advantage of the invention starts to play, and intercept probability has certain decline;When SNR is increased to a certain extent, this hair Bright little for the quality of the optimized gain Relative channel of legal user channel quality itself, the validity of anti-eavesdropping occurs one Fixed to deteriorate, intercept probability increases again.But on the whole, intercept probability is all lower, and anti-eavesdropping can be preferable, as shown in Fig. 2, Intercept probability is first reduced and is increased afterwards with the increase of SNR.
For QoS violates probability, when SNR is extremely low, time delay violates Probability maximum, and it is bigger that QoS violates probability;With SNR increase, time delay violate probability reduce, and advantage of the present invention play so that information acquisition probability reduction, so QoS Violating probability reduces.When SNR is continued growing, since good channel condition violates the time delay of legitimate receiver Bob generally Rate is very low and is held essentially constant, and since advantage of the invention is declined, and information acquisition probability increases, and QoS violates probability It improves, as shown in figure 3, QoS violation probability is increased after first quickly reducing with the increase of SNR.
Fig. 4 and Fig. 5 illustrates being applicable in for the anti-eavesdropping energy of the invention in multimedia application, with reference to Fig. 6 a, Fig. 6 b and figure The video recovery quality of 6c, legitimate receiver Bob are preferable, although the pixel of important area can there is also the distortion of part Restore well, does not influence subjective feeling;And then there are a large amount of mosaics in the recovery video of listener-in Eve, it is difficult to understand video Content sufficiently shows the present invention for the applicability of multimedia transmission.

Claims (3)

1. the anti-eavesdropping transmission method in a kind of multimedia communication based on fountain codes, which comprises the following steps:
1) source file to be sent is divided into N number of source data packet by legal transmitter Alice;
2) each source data packet is based on business feature and carries out importance ranking by legal transmitter Alice, wherein according to importance journey Each source data packet is divided into three classes type- I, type- II and type- III by degree in a manner of successively decreasing, while by channel quality by good It is three channel quality sections to difference, wherein channel quality determines by the modulus value of characteristic of channel coefficient h, and | h | described in belonging to The ratio between the probability in three channel quality sections is equal to the ratio between the data volume of three classes source data packet;
3) label of the legal transmitter Alice using the legitimate receiver Bob source data packet having been received fed back to, then root The structure that fountain coding is adjusted according to importance and the current channel information dynamic of source data packet to be sent must encode packet tn, then Coding is wrapped into tnIt is sent to legitimate receiver Bob;
4) legitimate receiver Bob is decoded the coding packet received, obtains source data packet, then that the label of source data packet is anti- Feed legal transmitter Alice.
2. the anti-eavesdropping transmission method in multimedia communication according to claim 1 based on fountain codes, which is characterized in that step It is rapid 3) in, as | h | > Th1When, then have
Wherein, sk1mIndicate the last I class source data packet of type- for solving out, sk1nIt indicates from the type- I not solved out also The source data packet picked out at random in class source data packet;
Work as Th1>|h|≥Th2When, then have
Wherein, sk2mRepresent the last II class source data packet of type- for solving out, sk2nIt indicates from the type- not solved out also The source data packet picked out at random in II class source data packet, ∑ sk1iBy from the I class source data of type- for having solved out The part progress exclusive or selected at random is wrapped to obtain;
When | h | < Th2When, then the transmission without coding packet;
When any sort source data packet is sent, and time delay thresholding has not been reached yet, and does not send there are also source data packet, then turn To step 2).
3. the anti-eavesdropping transmission method in multimedia communication according to claim 1 based on fountain codes, which is characterized in that right In multimedia service, each frame of video is divided, a series of still images are obtained, regards each width still image as a source Still image is divided into the identical N number of segmentation figure of size, i.e., N number of source data packet s by file1,s2…sk, to N number of source data Wrap s1,s2…skThe concrete operations classified are as follows:
11) the conspicuousness average value of each segmentation figure is calculatedWherein, SiIndicate each pixel in segmentation figure Significance value, l indicates pixel number contained by each block of pixels;
12) binary map is sought using edge detection, then calculates marginal information amount contained by cut zoneSjTable Show the value of each pixel in binary map;
13) the importance score S of each source data packet is calculatedp,Wherein, SpIt is bigger, then the source The importance degree of data packet is higher.
CN201811097456.9A 2018-09-19 2018-09-19 Anti-eavesdrop transmission method based on fountain codes in multimedia communication Active CN109412750B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811097456.9A CN109412750B (en) 2018-09-19 2018-09-19 Anti-eavesdrop transmission method based on fountain codes in multimedia communication

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811097456.9A CN109412750B (en) 2018-09-19 2018-09-19 Anti-eavesdrop transmission method based on fountain codes in multimedia communication

Publications (2)

Publication Number Publication Date
CN109412750A true CN109412750A (en) 2019-03-01
CN109412750B CN109412750B (en) 2020-03-31

Family

ID=65465045

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811097456.9A Active CN109412750B (en) 2018-09-19 2018-09-19 Anti-eavesdrop transmission method based on fountain codes in multimedia communication

Country Status (1)

Country Link
CN (1) CN109412750B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111556222A (en) * 2020-04-22 2020-08-18 之江实验室 Fountain code-based image data variable-rate safe transmission method

Citations (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101478373A (en) * 2009-01-16 2009-07-08 北京航空航天大学 Signal source and channel combined optimized adaptive error control method
CN101567755A (en) * 2009-05-25 2009-10-28 北京理工大学 Network coding method based on fountain codes
US20130148705A1 (en) * 2008-08-11 2013-06-13 Sean Simmons System and method for communicating using an in-vehicle system
CN103856304A (en) * 2014-02-21 2014-06-11 北京神舟航天软件技术有限公司 Reliable file transmission protocol with selectable safety levels
CN103886272A (en) * 2014-03-20 2014-06-25 北京邮电大学 Safety storage technology based on fountain codes
CN105306168A (en) * 2015-09-18 2016-02-03 西安交通大学 Method for guaranteeing secure transmission of wireless data based on fountain codes
CN105553618A (en) * 2015-12-22 2016-05-04 西安交通大学 Secure image transmission method based on fountain code and self-adaptive resource distribution
CN107196732A (en) * 2017-04-24 2017-09-22 辽宁工业大学 The anti-eavesdrop coding method encoded based on fountain codes
CN107222284A (en) * 2017-07-27 2017-09-29 西安交通大学 A kind of fountain coding anti-eavesdropping transmission method in Internet of Things based on channel feedback
CN107360568A (en) * 2017-08-24 2017-11-17 西安交通大学 The method that symmetric cryptography guarantee wireless data safe transmission is realized using fountain codes
CN108259138A (en) * 2018-04-25 2018-07-06 中国人民解放军战略支援部队信息工程大学 A kind of safe transmission method repeatedly fed back using fountain codes

Patent Citations (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20130148705A1 (en) * 2008-08-11 2013-06-13 Sean Simmons System and method for communicating using an in-vehicle system
CN101478373A (en) * 2009-01-16 2009-07-08 北京航空航天大学 Signal source and channel combined optimized adaptive error control method
CN101567755A (en) * 2009-05-25 2009-10-28 北京理工大学 Network coding method based on fountain codes
CN103856304A (en) * 2014-02-21 2014-06-11 北京神舟航天软件技术有限公司 Reliable file transmission protocol with selectable safety levels
CN103886272A (en) * 2014-03-20 2014-06-25 北京邮电大学 Safety storage technology based on fountain codes
CN105306168A (en) * 2015-09-18 2016-02-03 西安交通大学 Method for guaranteeing secure transmission of wireless data based on fountain codes
CN105553618A (en) * 2015-12-22 2016-05-04 西安交通大学 Secure image transmission method based on fountain code and self-adaptive resource distribution
CN107196732A (en) * 2017-04-24 2017-09-22 辽宁工业大学 The anti-eavesdrop coding method encoded based on fountain codes
CN107222284A (en) * 2017-07-27 2017-09-29 西安交通大学 A kind of fountain coding anti-eavesdropping transmission method in Internet of Things based on channel feedback
CN107360568A (en) * 2017-08-24 2017-11-17 西安交通大学 The method that symmetric cryptography guarantee wireless data safe transmission is realized using fountain codes
CN108259138A (en) * 2018-04-25 2018-07-06 中国人民解放军战略支援部队信息工程大学 A kind of safe transmission method repeatedly fed back using fountain codes

Non-Patent Citations (3)

* Cited by examiner, † Cited by third party
Title
刘政: ""喷泉码与无线网络防窃听技术研究"", 《中国优秀硕士学位论文全文数据库信息科技辑》 *
吕超; 任品毅; 杜清河; 孙黎: ""喷泉码无线安全传输应用的传输功率控制改进方案"", 《陕西省通信学会2016年学术年会论文集》 *
汪立康; 彭建华; 易鸣: ""一种基于反馈的喷泉码安全传输方法"", 《计算机应用研究》 *

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111556222A (en) * 2020-04-22 2020-08-18 之江实验室 Fountain code-based image data variable-rate safe transmission method
CN111556222B (en) * 2020-04-22 2022-01-14 之江实验室 Fountain code-based image data variable-rate safe transmission method

Also Published As

Publication number Publication date
CN109412750B (en) 2020-03-31

Similar Documents

Publication Publication Date Title
Wu et al. Cross-layer optimization for video summary transmission over wireless networks
US7797014B2 (en) Apparatus and method for performing uplink power control in broadband wireless access system
Lu et al. QoE-driven multi-user video transmission over SM-NOMA integrated systems
CN105553618A (en) Secure image transmission method based on fountain code and self-adaptive resource distribution
CN104284375B (en) A kind of method of wireless network rate adaptation regulation
Leung et al. Link adaptation and power control for streaming services in EGPRS wireless networks
US20050122912A1 (en) Link adaptation method using feedback information for wireless communication system
CN109412750A (en) Anti- eavesdropping transmission method based on fountain codes in a kind of multimedia communication
CN107222284B (en) The anti-eavesdropping transmission method of fountain coding based on channel feedback in a kind of Internet of Things
Bafghi et al. Joint optimization of power consumption and transmission delay in a cache-enabled C-RAN
Choudhury et al. Throughput optimization for wireless LANs in the presence of packet error rate constraints
CN111556222B (en) Fountain code-based image data variable-rate safe transmission method
KR102631694B1 (en) System and Method for encryption/decription and channel-coding
CN110381561B (en) Safe transmission method based on energy efficiency in cache-assisted multi-relay transmission system
CN108809515B (en) Fountain code-based multicast secure transmission method in wireless cache network
EP3753229B1 (en) Devices and methods for coded caching
CN102957510B (en) AMC (Adaptive Modulation and Coding) method based on SC-FDE (Single Carrier-Frequency Domain Equalization) system
CN101415208B (en) Self-adapting modulation encode method adapting for mobile multicast system
Hwang et al. An adaptive modulation method for integrated voice/data traffic over Nakagami fading channels
Shin et al. Dual-hop transmission scheme based on hierarchical modulation in wireless networks
Aljohani et al. Exit-chart-aided joint source coding, channel coding, and modulation design for two-way relaying
Tang et al. Notice of Violation of IEEE Publication Principles: Adaptive modulation for fading channels
Du et al. Joint Power and Constellation Size Adaptation for Mobile Multicast Employing MQAM Over Wireless Fading Channels
CN105744489B (en) The multicast rate optimization method of honeycomb VANET heterogeneous networks
Atici et al. Improving the performance of wireless H. 264 video broadcasting through a cross-layer design

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant