{"id":"https://openalex.org/W3133293134","doi":"https://doi.org/10.4018/ijdcf.2021030108","title":"Design a Wireless Covert Channel Based on Dither Analog Chaotic Code","display_name":"Design a Wireless Covert Channel Based on Dither Analog Chaotic Code","publication_year":2021,"publication_date":"2021-02-16","ids":{"openalex":"https://openalex.org/W3133293134","doi":"https://doi.org/10.4018/ijdcf.2021030108","mag":"3133293134"},"language":"en","primary_location":{"id":"doi:10.4018/ijdcf.2021030108","is_oa":true,"landing_page_url":"https://doi.org/10.4018/ijdcf.2021030108","pdf_url":"https://www.igi-global.com/ViewTitle.aspx?TitleId=272837&isxn=9781799860358","source":{"id":"https://openalex.org/S8943243","display_name":"International Journal of Digital Crime and Forensics","issn_l":"1941-6210","issn":["1941-6210","1941-6229"],"is_oa":true,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320424","host_organization_name":"IGI Global","host_organization_lineage":["https://openalex.org/P4310320424"],"host_organization_lineage_names":["IGI Global"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of Digital Crime and Forensics","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"diamond","oa_url":"https://www.igi-global.com/ViewTitle.aspx?TitleId=272837&isxn=9781799860358","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5009858724","display_name":"Pengcheng Cao","orcid":"https://orcid.org/0000-0001-9982-9465"},"institutions":[{"id":"https://openalex.org/I36399199","display_name":"Nanjing University of Science and Technology","ror":"https://ror.org/00xp9wg62","country_code":"CN","type":"education","lineage":["https://openalex.org/I36399199"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Pengcheng Cao","raw_affiliation_strings":["Nanjing University of Science and Technology, China"],"affiliations":[{"raw_affiliation_string":"Nanjing University of Science and Technology, China","institution_ids":["https://openalex.org/I36399199"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101622252","display_name":"Weiwei Liu","orcid":"https://orcid.org/0000-0003-0985-4072"},"institutions":[{"id":"https://openalex.org/I36399199","display_name":"Nanjing University of Science and Technology","ror":"https://ror.org/00xp9wg62","country_code":"CN","type":"education","lineage":["https://openalex.org/I36399199"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Weiwei Liu","raw_affiliation_strings":["Nanjing University of Science and Technology, China"],"affiliations":[{"raw_affiliation_string":"Nanjing University of Science and Technology, China","institution_ids":["https://openalex.org/I36399199"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5062243742","display_name":"Guangjie Liu","orcid":"https://orcid.org/0000-0003-4729-7406"},"institutions":[{"id":"https://openalex.org/I200845125","display_name":"Nanjing University of Information Science and Technology","ror":"https://ror.org/02y0rxk19","country_code":"CN","type":"education","lineage":["https://openalex.org/I200845125"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Guangjie Liu","raw_affiliation_strings":["Nanjing University of Information Science and Technology, China"],"affiliations":[{"raw_affiliation_string":"Nanjing University of Information Science and Technology, China","institution_ids":["https://openalex.org/I200845125"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5064502956","display_name":"Jiangtao Zhai","orcid":"https://orcid.org/0000-0001-8557-9899"},"institutions":[{"id":"https://openalex.org/I200845125","display_name":"Nanjing University of Information Science and Technology","ror":"https://ror.org/02y0rxk19","country_code":"CN","type":"education","lineage":["https://openalex.org/I200845125"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jiangtao Zhai","raw_affiliation_strings":["Nanjing University of Information Science and Technology, China"],"affiliations":[{"raw_affiliation_string":"Nanjing University of Information Science and Technology, China","institution_ids":["https://openalex.org/I200845125"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5077994211","display_name":"Xiaopeng Ji","orcid":"https://orcid.org/0000-0001-6094-4626"},"institutions":[{"id":"https://openalex.org/I200845125","display_name":"Nanjing University of Information Science and Technology","ror":"https://ror.org/02y0rxk19","country_code":"CN","type":"education","lineage":["https://openalex.org/I200845125"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xiao-Peng Ji","raw_affiliation_strings":["Nanjing University of Information Science and Technology, China"],"affiliations":[{"raw_affiliation_string":"Nanjing University of Information Science and Technology, China","institution_ids":["https://openalex.org/I200845125"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5080275149","display_name":"Yuewei Dai","orcid":"https://orcid.org/0000-0003-1522-9257"},"institutions":[{"id":"https://openalex.org/I200845125","display_name":"Nanjing University of Information Science and Technology","ror":"https://ror.org/02y0rxk19","country_code":"CN","type":"education","lineage":["https://openalex.org/I200845125"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yuewei Dai","raw_affiliation_strings":["Nanjing University of Information Science and Technology, China"],"affiliations":[{"raw_affiliation_string":"Nanjing University of Information Science and Technology, China","institution_ids":["https://openalex.org/I200845125"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5048188687","display_name":"Huiwen Bai","orcid":"https://orcid.org/0000-0002-8985-6977"},"institutions":[{"id":"https://openalex.org/I36399199","display_name":"Nanjing University of Science and Technology","ror":"https://ror.org/00xp9wg62","country_code":"CN","type":"education","lineage":["https://openalex.org/I36399199"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Huiwen Bai","raw_affiliation_strings":["Nanjing University of Science and Technology, China"],"affiliations":[{"raw_affiliation_string":"Nanjing University of Science and Technology, China","institution_ids":["https://openalex.org/I36399199"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":7,"corresponding_author_ids":["https://openalex.org/A5009858724"],"corresponding_institution_ids":["https://openalex.org/I36399199"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":true,"cited_by_count":0,"citation_normalized_percentile":{"value":0.02078431,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"13","issue":"2","first_page":"115","last_page":"133"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12357","display_name":"Digital Media Forensic Detection","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9991000294685364,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8153895735740662},{"id":"https://openalex.org/keywords/dither","display_name":"Dither","score":0.5725444555282593},{"id":"https://openalex.org/keywords/wireless","display_name":"Wireless","score":0.5318989753723145},{"id":"https://openalex.org/keywords/chaotic","display_name":"Chaotic","score":0.5117976069450378},{"id":"https://openalex.org/keywords/noise","display_name":"Noise (video)","score":0.45929354429244995},{"id":"https://openalex.org/keywords/covert","display_name":"Covert","score":0.4555668830871582},{"id":"https://openalex.org/keywords/code","display_name":"Code (set theory)","score":0.44799110293388367},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.24893394112586975},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.17862406373023987}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8153895735740662},{"id":"https://openalex.org/C70451592","wikidata":"https://www.wikidata.org/wiki/Q376493","display_name":"Dither","level":3,"score":0.5725444555282593},{"id":"https://openalex.org/C555944384","wikidata":"https://www.wikidata.org/wiki/Q249","display_name":"Wireless","level":2,"score":0.5318989753723145},{"id":"https://openalex.org/C2777052490","wikidata":"https://www.wikidata.org/wiki/Q5072826","display_name":"Chaotic","level":2,"score":0.5117976069450378},{"id":"https://openalex.org/C99498987","wikidata":"https://www.wikidata.org/wiki/Q2210247","display_name":"Noise (video)","level":3,"score":0.45929354429244995},{"id":"https://openalex.org/C2779338814","wikidata":"https://www.wikidata.org/wiki/Q5179285","display_name":"Covert","level":2,"score":0.4555668830871582},{"id":"https://openalex.org/C2776760102","wikidata":"https://www.wikidata.org/wiki/Q5139990","display_name":"Code (set theory)","level":3,"score":0.44799110293388367},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.24893394112586975},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.17862406373023987},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.0},{"id":"https://openalex.org/C2776257435","wikidata":"https://www.wikidata.org/wiki/Q1576430","display_name":"Bandwidth (computing)","level":2,"score":0.0},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0},{"id":"https://openalex.org/C41895202","wikidata":"https://www.wikidata.org/wiki/Q8162","display_name":"Linguistics","level":1,"score":0.0},{"id":"https://openalex.org/C115961682","wikidata":"https://www.wikidata.org/wiki/Q860623","display_name":"Image (mathematics)","level":2,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.4018/ijdcf.2021030108","is_oa":true,"landing_page_url":"https://doi.org/10.4018/ijdcf.2021030108","pdf_url":"https://www.igi-global.com/ViewTitle.aspx?TitleId=272837&isxn=9781799860358","source":{"id":"https://openalex.org/S8943243","display_name":"International Journal of Digital Crime and Forensics","issn_l":"1941-6210","issn":["1941-6210","1941-6229"],"is_oa":true,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320424","host_organization_name":"IGI Global","host_organization_lineage":["https://openalex.org/P4310320424"],"host_organization_lineage_names":["IGI Global"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of Digital Crime and Forensics","raw_type":"journal-article"}],"best_oa_location":{"id":"doi:10.4018/ijdcf.2021030108","is_oa":true,"landing_page_url":"https://doi.org/10.4018/ijdcf.2021030108","pdf_url":"https://www.igi-global.com/ViewTitle.aspx?TitleId=272837&isxn=9781799860358","source":{"id":"https://openalex.org/S8943243","display_name":"International Journal of Digital Crime and Forensics","issn_l":"1941-6210","issn":["1941-6210","1941-6229"],"is_oa":true,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320424","host_organization_name":"IGI Global","host_organization_lineage":["https://openalex.org/P4310320424"],"host_organization_lineage_names":["IGI Global"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of Digital Crime and Forensics","raw_type":"journal-article"},"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","score":0.4300000071525574,"id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W3133293134.pdf","grobid_xml":"https://content.openalex.org/works/W3133293134.grobid-xml"},"referenced_works_count":25,"referenced_works":["https://openalex.org/W1471507","https://openalex.org/W9827866","https://openalex.org/W1550165678","https://openalex.org/W1738992959","https://openalex.org/W1897081267","https://openalex.org/W1993704367","https://openalex.org/W2028197392","https://openalex.org/W2063100290","https://openalex.org/W2063735333","https://openalex.org/W2074155084","https://openalex.org/W2087619997","https://openalex.org/W2112828494","https://openalex.org/W2123170991","https://openalex.org/W2151185692","https://openalex.org/W2161439181","https://openalex.org/W2320352807","https://openalex.org/W2579213442","https://openalex.org/W2739646665","https://openalex.org/W2783685961","https://openalex.org/W2963199173","https://openalex.org/W2963610365","https://openalex.org/W2964286662","https://openalex.org/W3103461411","https://openalex.org/W6600407745","https://openalex.org/W6700115198"],"related_works":["https://openalex.org/W2389128124","https://openalex.org/W2364812720","https://openalex.org/W2138725603","https://openalex.org/W3001913892","https://openalex.org/W2050335563","https://openalex.org/W2273639645","https://openalex.org/W2050646564","https://openalex.org/W1507581877","https://openalex.org/W2024780258","https://openalex.org/W2367707867"],"abstract_inverted_index":{"To":[0],"conceal":[1],"the":[2,7,22,27,36,50,60,75,79,88,91,96,98,131,139,144],"very":[3],"existence":[4],"of":[5,53,116],"communication,":[6],"noise-based":[8],"wireless":[9,24,64],"covert":[10,54,65],"channel":[11,66],"modulates":[12],"secret":[13,103],"messages":[14,104],"into":[15,107],"artificial":[16,124],"noise,":[17],"which":[18],"is":[19],"added":[20],"to":[21,49,73,123],"normal":[23],"signal.":[25],"Although":[26],"state-of-the-art":[28,140],"work":[29],"based":[30,67],"on":[31,46,68,147],"constellation":[32,55],"modulation":[33],"has":[34],"made":[35],"composite":[37],"and":[38,113],"legitimate":[39],"signal":[40],"undistinguishable,":[41],"there":[42],"exists":[43],"an":[44],"imperfection":[45],"reliability":[47,76,137],"due":[48],"dense":[51],"distribution":[52],"points.":[56],"In":[57,95],"this":[58],"study,":[59],"authors":[61],"design":[62],"a":[63],"dither":[69,82,114],"analog":[70,83,99],"chaotic":[71,84,111],"code":[72,85],"improve":[74],"without":[77],"damaging":[78],"undetectability.":[80,148],"The":[81,118],"(DACC)":[86],"plays":[87],"role":[89],"as":[90],"error":[92],"correcting":[93],"code.":[94],"modulation,":[97],"variables":[100],"converted":[101],"from":[102],"are":[105,121],"encode":[106],"joint":[108,119],"codewords":[109,120],"by":[110],"mapping":[112],"derivation":[115],"DACC.":[117],"mapped":[122],"noise":[125],"later.":[126],"Simulation":[127],"results":[128],"show":[129],"that":[130],"proposed":[132],"scheme":[133,141],"can":[134],"achieve":[135],"better":[136],"than":[138],"while":[142],"maintaining":[143],"similar":[145],"performance":[146]},"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
