In this paper, auditory cryptography (k, n) threshold watermarking algorithm is proposed. By binary halftone pretreatment, one-dimensional meaningful audio watermarking is pretreated to high-fidelity binary audio. The binary audio is encrypted to n cryptographic audios and embedded in scrambled host audio signal hierarchically. Less than k of the cryptographic audios ...Download Now
A rudimentary problem in wireless sensor networks is localization - the determination of the geographical locations of sensors. Most existing localization algorithms were designed to work well either in networks of static sensors or networks in which all sensors are mobile. The authors think over the problem of estimating the ...Download Now
In wireless ad hoc networks environment, Bellovin and Merritt first developed a password-based Encrypted Key Exchange (EKE) protocol against offline dictionary attacks using both symmetric and public-key cryptography independent of the Public Key Infrastructure (PKI). In this paper, the authors first discover that there exist some weaknesses in EKE protocol ...Download Now
This paper presents a spectrally efficient distributed coded cooperation based on opportunistic relaying for multi-relay. The proposed scheme chooses the best relay to participate in the cooperation depending on the instantaneous channel information. The authors adopt distributed Rate-compatible punctured convolutional code. The relay operates on DF mode. After the single ...Download Now
Submit Your Content
Get your content listed in our directory for free!
Our directory is the largest library of vendor-supplied technical content on the web. It's also the first place IT decision makers turn to when researching technology solutions. Our members are already finding your competitors' papers here - shouldn't they find yours too?