CN109412750B - Anti-eavesdrop transmission method based on fountain codes in multimedia communication - Google Patents

Anti-eavesdrop transmission method based on fountain codes in multimedia communication Download PDF

Info

Publication number
CN109412750B
CN109412750B CN201811097456.9A CN201811097456A CN109412750B CN 109412750 B CN109412750 B CN 109412750B CN 201811097456 A CN201811097456 A CN 201811097456A CN 109412750 B CN109412750 B CN 109412750B
Authority
CN
China
Prior art keywords
source
packet
legal
source data
packets
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201811097456.9A
Other languages
Chinese (zh)
Other versions
CN109412750A (en
Inventor
孙黎
黄丹彤
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Xian Jiaotong University
Original Assignee
Xian Jiaotong University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Xian Jiaotong University filed Critical Xian Jiaotong University
Priority to CN201811097456.9A priority Critical patent/CN109412750B/en
Publication of CN109412750A publication Critical patent/CN109412750A/en
Application granted granted Critical
Publication of CN109412750B publication Critical patent/CN109412750B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L1/00Arrangements for detecting or preventing errors in the information received
    • H04L1/004Arrangements for detecting or preventing errors in the information received by using forward error control
    • H04L1/0056Systems characterized by the type of code used
    • H04L1/0057Block codes
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04KSECRET COMMUNICATION; JAMMING OF COMMUNICATION
    • H04K1/00Secret communication
    • H04K1/02Secret communication by adding a second signal to make the desired signal unintelligible

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

The invention discloses an anti-eavesdrop transmission method based on fountain codes in multimedia communication, which comprises the following steps: 1) dividing a source file to be sent into N source data packets by a legal sender Alice; 2) the legal sender Alice sorts the importance of each source data packet based on the service characteristics, and simultaneously divides the channel quality into three channel quality intervals from good to bad; 3) the legal sender Alice utilizes the received source data packet mark fed back by the legal receiver Bob, then dynamically adjusts the fountain coding structure according to the importance of the source data packet to be sent and the current channel information, and then sends the coding packet tnSending the data to a legal receiver Bob; 4) and the legal receiver Bob decodes the received coded packet to obtain a source packet, and then feeds back the mark of the source packet to the legal transmitter Alice.

Description

Anti-eavesdrop transmission method based on fountain codes in multimedia communication
Technical Field
The invention belongs to the technical field of wireless communication, and relates to an anti-eavesdropping transmission method based on fountain codes in multimedia communication.
Background
Physical layer security has attracted extensive attention from researchers at home and abroad because it can utilize wireless channel characteristics to achieve secure transmission and does not rely on key encryption. However, the conventional physical layer security technology aiming at maximizing the private capacity and minimizing the private outage probability has the limitations of low transmission rate, high decoding delay and the like, which are not matched with the requirements of multimedia broadband service on high-speed transmission and delay constraint.
The fountain code has the following characteristics: the receiving end must accumulate enough code packets to recover the original file. That is, as long as the legal user can accumulate enough encoding packets before the eavesdropper, the information leakage can be avoided, and the secure communication is realized. And when the fountain codes realize safe transmission, the transmission rate of the system is only limited by the Shannon capacity of a legal link, and the decoding time delay is greatly reduced. Meanwhile, the generation of the channel quality self-adaptive adjustment coding packet of the legal link is obtained by utilizing the feedback channel, so that a receiving end can obtain more important information under the time delay constraint condition, and therefore, the research on the fountain code-based multimedia security transmission technology has great significance.
Disclosure of Invention
The invention aims to overcome the defects of the prior art and provides a fountain code-based anti-eavesdropping transmission method in multimedia communication, which can realize fountain-based multimedia secure transmission.
In order to achieve the above purpose, the anti-eavesdropping transmission method based on fountain codes in multimedia communication according to the present invention comprises the following steps:
1) dividing a source file to be sent into N source data packets by a legal sender Alice;
2) the legal sender Alice carries out importance sequencing on each source data packet based on service characteristics, wherein each source data packet is divided into three types of type-I, type-II and type-III in a decreasing mode according to the importance degree, the channel quality is divided into three channel quality intervals from good to poor, the channel quality is determined by the module value of a channel characteristic coefficient h, and the ratio of the probability of | h | belonging to the three channel quality intervals is equal to the ratio of the data quantity of the three types of source data packets;
3) the legal sender Alice utilizes the received source data packet mark fed back by the legal receiver Bob, and then dynamically adjusts the fountain coding structure according to the importance of the source data packet to be sent and the current channel information to obtain a coding packet tnThen encode the packet tnSending the data to a legal receiver Bob;
4) and the legal receiver Bob decodes the received coded packet to obtain a source packet, and then feeds back the mark of the source packet to the legal transmitter Alice.
In step 3), when | h tint>Th1When it is, then there are
Figure BDA0001805256000000021
Wherein sk1mIndicates the type-I source packet, sk1, that was last solvednRepresenting a source packet randomly selected from type-I source packets that have not been solved;
when Th is1>|h|≥Th2When it is, then there are
Figure BDA0001805256000000022
Wherein sk2mtype-II source packets representing the most recent solution, sk2nRepresents a source packet randomly selected from type-II source packets that have not yet been solved, Σ sk1iThe method comprises the steps of obtaining the data by carrying out XOR on parts randomly selected from type-I source data packets which are already solved;
when | h |<Th2If so, not sending the coded packet;
and when any source data packet is sent, the delay threshold is not reached yet, and the source data packet is not sent, the step 2) is carried out.
For multimedia service, each frame of video is divided to obtain a series of static images, each static image is regarded as a source file, and the static images are divided into N division images with the same size, namely N source data packets s1,s2…skFor the N source packets s1,s2…skThe specific operations for classification are:
11) calculate the mean significance of each segmentation map
Figure BDA0001805256000000031
Wherein S isiThe significance value of each pixel point in the segmentation graph is represented, and l represents the number of pixel points contained in each pixel block;
12) obtaining a binary image by edge detection, and calculating the amount of edge information contained in the divided region
Figure BDA0001805256000000032
SjRepresenting the value of each pixel point in the binary image;
13) calculating importance score S of each source data packetp
Figure BDA0001805256000000033
Wherein S ispThe larger the size, the more important the source packet is.
The invention has the following beneficial effects:
when the fountain code-based anti-eavesdropping transmission method in the multimedia communication is specifically operated, the fountain code structure is dynamically adjusted according to the importance of a source data packet to be sent and the current channel information to encode the source data packet to be sent, the channel quality of a legal link is not completely depended on and is better than that of an eavesdropping link, the method still has certain anti-eavesdropping performance when the channel quality of the legal link is worse than that of the eavesdropping link, and meanwhile, the anti-eavesdropping effectiveness is greatly improved when the channel quality of the legal link is better than that of the eavesdropping link, so that the information transmission safety is effectively improved. In addition, the invention carries on the code of the source data packet to be sent on the basis of the fountain code structure, in order to improve the information transmission rate of the system, and the information transmission rate is only limited by Shannon capacity of the legal link, effective reduction decodes the time delay, meet the high-speed transmission requirement of this broadband business of multimedia and strict time delay and limit the requirement. In addition, the invention adaptively selects the source data packet to be sent according to the current channel quality, and ensures the video receiving quality of the legal receiver Bob while expanding the advantages of the legal channel, so that the legal receiver Bob can acquire more important information as far as possible within the limited time delay.
Drawings
FIG. 1 is a diagram of a system model of the present invention;
FIG. 2 is a graph of intercept probability as a function of SNR;
fig. 3 is a graph of QoS violation probability versus number of source packets;
FIG. 4 is a graph of MSE as a function of average signal-to-noise ratio;
FIG. 5 is a graph of PSNR as a function of average signal-to-noise ratio;
fig. 6 is a diagram of the effect of actual video transmission according to the present invention.
Detailed Description
The invention is described in further detail below with reference to the accompanying drawings:
the invention discloses a data transmission system, which comprises a legal transmitter Alice and a legal receiver Bob, wherein the legal transmitter Alice and the legal receiver Bob are both provided with a single antenna, the system works in a time division duplex mode, the legal transmitter Alice transmits data according to frames, and the transmission of each frame of data comprises three stages: the first stage, a legal receiver Bob feeds back the current channel quality to a legal transmitter Alice through a feedback channel; in the second stage, the legal transmitter Alice adaptively selects a source data packet which needs to participate in coding according to the channel quality and a source data packet which is already received by the current legal receiver Bob to carry out coding to obtain a coded packet, and then sends the obtained data packet to the legal receiver Bob; in the third stage, the legal receiver Bob feeds back the label of the source packet to the legal transmitter Alice, which specifically includes the following steps:
1) dividing a source file to be sent into N source data packets by a legal sender Alice;
2) the legal sender Alice carries out importance sequencing on each source data packet based on service characteristics, wherein each source data packet is divided into three types of type-I, type-II and type-III in a decreasing mode according to the importance degree, the channel quality is divided into three channel quality intervals from good to poor, the channel quality is determined by the module value of a channel characteristic coefficient h, and the ratio of the probability of | h | belonging to the three channel quality intervals is equal to the ratio of the data quantity of the three types of source data packets;
for multimedia service, each frame of video is divided to obtain a series of static images, each static image is regarded as a source file, and the static images are divided into N division graphs with the same size, namely N source data packets s1,s2…skFor the N source packets s1,s2…skThe specific operations for classification are:
11) meterCalculate the mean significance of each segmentation map
Figure BDA0001805256000000051
Wherein S isiThe significance value of each pixel point in the segmentation graph is represented, and l represents the number of pixel points contained in each pixel block;
12) using FT algorithm to carry out edge detection to obtain binary image, and then calculating edge information content contained in the divided region
Figure BDA0001805256000000052
SjRepresenting the value of each pixel point in the binary image;
13) calculating importance score S of each source data packetp
Figure BDA0001805256000000053
Wherein S ispThe larger the size, the more important the source packet is.
3) The legal sender Alice dynamically adjusts the fountain coding structure according to the importance of the data packet to be transmitted and the current channel information to encode the source data packet to be transmitted to obtain an encoded packet tnThen encode the packet tnSending the data to a legal receiver Bob;
4) and the legal receiver Bob decodes the received coded packet to obtain a source packet, and then feeds back the mark of the source packet to the legal transmitter Alice.
In step 3), when | h tint>Th1When it is, then there are
Figure BDA0001805256000000061
Wherein sk1mIndicates the type-I source packet, sk1, that was last solvednRepresenting a source packet randomly selected from type-I source packets that have not been solved;
when Th is1>|h|≥Th2When it is, then there are
Figure BDA0001805256000000062
Wherein sk2mtype-II source packets representing the most recent solution, sk2nRepresents a source packet randomly selected from type-II source packets that have not yet been solved, Σ sk1iThe method comprises the steps of obtaining the data by carrying out XOR on parts randomly selected from type-I source data packets which are already solved;
when | h |<Th2If so, not sending the coded packet;
and when any source data packet is sent, the delay threshold is not reached yet, and the source data packet is not sent, the step 2) is carried out.
The specific operation of dividing the channel quality into three channel quality intervals from good to bad in the step 2) is as follows: let P be the ratio of good channel quality interval1The ratio of the general channel quality interval is P2,Th1And Th2Represents a channel gain threshold, where Th1=(1/λln(1-P1)-1)1/2,Th2=(1/λln(1-P1-P2)-1)1/2When | h |>Th1The channel quality is good; when Th is1≥|h|>Th2The channel quality is normal; when | h | ≦ Th2The channel quality is poor.
In step 4), the legal receiver Bob demodulates by using the maximum likelihood criterion, and then the source data packet is obtained by using a BP iterative decoding algorithm.
Simulation experiment
For convenience of description, firstly, introducing several definitions, wherein the interception probability 1 is defined as the probability that an eavesdropper Eve receives the whole file under the condition that a legal receiver Bob decodes all K source data packets; the interception probability 2 is defined as the probability that an eavesdropper Eve solves K-1 source data packets under the condition that a legal receiver Bob solves all K source data packets, and the QoS violation probability is defined as:
Figure BDA0001805256000000071
wherein, TreqIndicating the number of allowed coded packets, Ttot,BAnd Ttot,EThe number of coding packets needed by a legal receiver and an eavesdropper to recover all source data packets respectively represents, a first item in a formula defines the delay violation probability, and a second item calculates the information interception probability of the eavesdropper Eve.
The effectiveness of the invention mainly depends on the difference of the two link channels, and the channel quality advantage of the legal link is enlarged by adjusting the coding strategy according to the channel quality of the legal link through the feedback of the legal receiver Bob, so that when the channel condition is poor, namely the SNR is low, the gain obtained by adjusting the coding structure is not large, and the interception probability is relatively high. With the increase of SNR, the advantages of the invention begin to play, and the interception probability is reduced to a certain extent; when the SNR is increased to a certain degree, the optimization gain of the channel quality of a legal user is not large relative to the quality of the channel, the anti-eavesdropping effectiveness is deteriorated to a certain extent, and the interception probability is increased again. However, the interception probability is generally low and the anti-interception performance is better, as shown in fig. 2, the interception probability is first decreased and then increased with the increase of SNR.
For the QoS violation probability, when the SNR is extremely low, the delay violation probability is extremely high, and the QoS violation probability is larger; as the SNR increases, the probability of delay violation decreases and the present invention advantageously provides that the probability of information interception decreases, so the QoS violation probability decreases. When the SNR continues to increase, the delay violation probability of the legitimate receiver Bob is low and remains substantially unchanged due to good channel conditions, and the information interception probability increases and the QoS violation probability increases due to the reduced advantages of the present invention, as shown in fig. 3, the QoS violation probability first decreases rapidly and then increases with increasing SNR.
Fig. 4 and 5 show the applicability of the present invention to the anti-eavesdropping performance in multimedia applications, and referring to fig. 6a, 6b, and 6c, the video recovery quality of the legal receiver Bob is better, and although there is also local distortion, the pixels in the important area can be recovered well without affecting the subjective feeling; and the recovery video of the eavesdropper Eve has a large amount of mosaics, so that the video content is difficult to understand, and the applicability of the invention to multimedia transmission is fully shown.

Claims (2)

1. An anti-eavesdrop transmission method based on fountain codes in multimedia communication is characterized by comprising the following steps:
1) dividing a source file to be sent into N source data packets by a legal sender Alice;
2) the legal sender Alice carries out importance sequencing on each source data packet based on service characteristics, wherein each source data packet is divided into three types of type-I, type-II and type-III in a decreasing mode according to the importance degree, the channel quality is divided into three channel quality intervals from good to bad, the channel quality is determined by the module value of a channel characteristic coefficient h, and the ratio of the probability of | h | belonging to the three channel quality intervals is equal to the ratio of the data quantity of the three types of source data packets;
3) the legal sender Alice utilizes the mark of the received source data packet fed back by the legal receiver Bob, and then dynamically adjusts the fountain coding structure according to the importance of the source data packet to be sent and the current channel information to obtain a coding packet tnThen encode the packet tnSending the data to a legal receiver Bob;
4) the legal receiver Bob decodes the received coded packet to obtain a source packet, and then the mark of the source packet is fed back to the legal transmitter Alice;
in step 3), when | h tint>Th1When it is, then there are
Figure FDA0002343350740000011
Wherein sk1mIndicates the type-I source packet, sk1, that was last solvednRepresenting a source packet randomly selected from type-I source packets which are not solved;
when Th is1>|h|≥Th2When it is, then there are
Figure FDA0002343350740000012
Wherein sk2mtype-II source packets representing the most recent solution, sk2nRepresents a source packet randomly selected from type-II source packets that have not yet been solved, Σ sk1iThe method comprises the steps that XOR is carried out on parts randomly selected from type-I source data packets which are already solved;
when | h |<Th2If so, not sending the coded packet;
and when any source data packet is sent, the delay threshold is not reached yet, and the source data packet is not sent, the step 2) is carried out.
2. The method as claimed in claim 1, wherein for the multimedia service, each frame of the video is divided into a series of still images, each still image is regarded as a source file, and the still images are divided into N division maps with the same size, i.e. N source packets s1,s2…skFor the N source packets s1,s2…skThe specific operations for classification are:
11) calculate the mean significance of each segmentation map
Figure FDA0002343350740000021
Wherein S isiThe significance value of each pixel point in the segmentation graph is represented, and l represents the number of pixel points contained in each pixel block;
12) obtaining a binary image by edge detection, and calculating the amount of edge information contained in the divided region
Figure FDA0002343350740000022
SjRepresenting the value of each pixel point in the binary image;
13) calculating importance score S of each source data packetp
Figure FDA0002343350740000023
Wherein S ispThe larger the size, the more important the source packet is.
CN201811097456.9A 2018-09-19 2018-09-19 Anti-eavesdrop transmission method based on fountain codes in multimedia communication Active CN109412750B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811097456.9A CN109412750B (en) 2018-09-19 2018-09-19 Anti-eavesdrop transmission method based on fountain codes in multimedia communication

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811097456.9A CN109412750B (en) 2018-09-19 2018-09-19 Anti-eavesdrop transmission method based on fountain codes in multimedia communication

Publications (2)

Publication Number Publication Date
CN109412750A CN109412750A (en) 2019-03-01
CN109412750B true CN109412750B (en) 2020-03-31

Family

ID=65465045

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811097456.9A Active CN109412750B (en) 2018-09-19 2018-09-19 Anti-eavesdrop transmission method based on fountain codes in multimedia communication

Country Status (1)

Country Link
CN (1) CN109412750B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111556222B (en) * 2020-04-22 2022-01-14 之江实验室 Fountain code-based image data variable-rate safe transmission method

Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101478373A (en) * 2009-01-16 2009-07-08 北京航空航天大学 Signal source and channel combined optimized adaptive error control method
CN101567755A (en) * 2009-05-25 2009-10-28 北京理工大学 Network coding method based on fountain codes
CN103856304A (en) * 2014-02-21 2014-06-11 北京神舟航天软件技术有限公司 Reliable file transmission protocol with selectable safety levels
CN103886272A (en) * 2014-03-20 2014-06-25 北京邮电大学 Safety storage technology based on fountain codes
CN105306168A (en) * 2015-09-18 2016-02-03 西安交通大学 Method for guaranteeing secure transmission of wireless data based on fountain codes
CN105553618A (en) * 2015-12-22 2016-05-04 西安交通大学 Secure image transmission method based on fountain code and self-adaptive resource distribution
CN107196732A (en) * 2017-04-24 2017-09-22 辽宁工业大学 The anti-eavesdrop coding method encoded based on fountain codes
CN107222284A (en) * 2017-07-27 2017-09-29 西安交通大学 A kind of fountain coding anti-eavesdropping transmission method in Internet of Things based on channel feedback
CN107360568A (en) * 2017-08-24 2017-11-17 西安交通大学 The method that symmetric cryptography guarantee wireless data safe transmission is realized using fountain codes
CN108259138A (en) * 2018-04-25 2018-07-06 中国人民解放军战略支援部队信息工程大学 A kind of safe transmission method repeatedly fed back using fountain codes

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8385947B2 (en) * 2008-08-11 2013-02-26 Research In Motion Limited System and method for communicating using an in-vehicle system

Patent Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101478373A (en) * 2009-01-16 2009-07-08 北京航空航天大学 Signal source and channel combined optimized adaptive error control method
CN101567755A (en) * 2009-05-25 2009-10-28 北京理工大学 Network coding method based on fountain codes
CN103856304A (en) * 2014-02-21 2014-06-11 北京神舟航天软件技术有限公司 Reliable file transmission protocol with selectable safety levels
CN103886272A (en) * 2014-03-20 2014-06-25 北京邮电大学 Safety storage technology based on fountain codes
CN105306168A (en) * 2015-09-18 2016-02-03 西安交通大学 Method for guaranteeing secure transmission of wireless data based on fountain codes
CN105553618A (en) * 2015-12-22 2016-05-04 西安交通大学 Secure image transmission method based on fountain code and self-adaptive resource distribution
CN107196732A (en) * 2017-04-24 2017-09-22 辽宁工业大学 The anti-eavesdrop coding method encoded based on fountain codes
CN107222284A (en) * 2017-07-27 2017-09-29 西安交通大学 A kind of fountain coding anti-eavesdropping transmission method in Internet of Things based on channel feedback
CN107360568A (en) * 2017-08-24 2017-11-17 西安交通大学 The method that symmetric cryptography guarantee wireless data safe transmission is realized using fountain codes
CN108259138A (en) * 2018-04-25 2018-07-06 中国人民解放军战略支援部队信息工程大学 A kind of safe transmission method repeatedly fed back using fountain codes

Non-Patent Citations (3)

* Cited by examiner, † Cited by third party
Title
"一种基于反馈的喷泉码安全传输方法";汪立康; 彭建华; 易鸣;《计算机应用研究》;20170614;全文 *
"喷泉码与无线网络防窃听技术研究";刘政;《中国优秀硕士学位论文全文数据库信息科技辑》;20180301;全文 *
"喷泉码无线安全传输应用的传输功率控制改进方案";吕超; 任品毅; 杜清河; 孙黎;《陕西省通信学会2016年学术年会论文集》;20161122;全文 *

Also Published As

Publication number Publication date
CN109412750A (en) 2019-03-01

Similar Documents

Publication Publication Date Title
CN101385357B (en) Method and system for application of unequal error protection to uncompressed video for transmission over wireless channels
Wu et al. Cross-layer optimization for video summary transmission over wireless networks
CN101213780B (en) Adaptive modulation for cooperative coded systems
Lu et al. QoE-driven multi-user video transmission over SM-NOMA integrated systems
CN109412750B (en) Anti-eavesdrop transmission method based on fountain codes in multimedia communication
CN113746766B (en) Channel self-adaptive noise aggregation wireless secure transmission method
Liang et al. Superimposed modulation for soft video delivery with hidden resources
CN108093263B (en) Video transmission method based on minimum distortion optimization in free space optical communication
CN107222284B (en) The anti-eavesdropping transmission method of fountain coding based on channel feedback in a kind of Internet of Things
Jiao et al. Spectrum efficiency of jointing adaptive modulation coding and truncated ARQ with QoS constraints
CN103812615A (en) Coding method for Luby transform code in distributed communication system, and relay communication method
Liu et al. Real-time implementation and evaluation of sdr-based deep joint source-channel coding
CN111556222B (en) Fountain code-based image data variable-rate safe transmission method
CN102843579A (en) Wireless video distributing method with self-adapting image quality and system thereof
Torki et al. Unequal power allocation for transmission of JPEG2000 images over wireless channels
Hou et al. Near-optimal cross-layer forward error correction using raptor and RCPC codes for prioritized video transmission over wireless channels
Tassi et al. Optimized network-coded scalable video multicasting over eMBMS networks
Chung et al. Unequal error protection for H. 264 video using RCPC codes and hierarchical QAM
KR102631694B1 (en) System and Method for encryption/decription and channel-coding
Lu et al. MDUCAST: Multi-device uplink uncoded video transmission in Internet of Video Things
CN102984110B (en) The high efficient coding of orthogonal frequency-division multiplex singal, modulation and framing method and system
CN101415208B (en) Self-adapting modulation encode method adapting for mobile multicast system
CN106028033B (en) A kind of adaptive cross-layer forward error correction suitable for wireless video transmission
CN105554500B (en) The video transmission method and system of symbol unequal distribution are decoded based on RCM
CN109495216B (en) Fountain coding safety transmission method based on interruption prediction and limited feedback in cellular network

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant