Please wait a minute...
Computer & Telecommunication
Current Issue | Archive | Adv Search |
A Digital Fingerprinting System Based on Multicarrier Non-orthogonal Spread Spectrum
HUANG Ling-zhen
Guangzhou Research Institute of O-M-E Technology
Download:   PDF(0KB)
Export: BibTeX | EndNote (RIS)      
Abstract  This paper introduces a digital fingerprinting system based on multicarrier non-orthogonal spread spectrum. Firstly,the application of digital fingerprinting and traditional techniques are briefly introduced, followed by descriptions of the different parts, key technologies and advantages of the non-orthogonal spread spectrum digital fingerprinting system. Finally, some open issues in this field are discussed.
Key wordsdigital fingerprinting      non-orthogonal spread spectrum      multicarrier modulation     
ZTFLH:  TP309  

Cite this article:

HUANG Ling-zhen. A Digital Fingerprinting System Based on Multicarrier Non-orthogonal Spread Spectrum. Computer & Telecommunication, 2017, 1(12): 71-73.

URL:

http://www.computertelecom.com.cn/EN/     OR     http://www.computertelecom.com.cn/EN/Y2017/V1/I12/71

[1] ZUO Wen-tao LUO Guo-qiang. Analysis of Data Security and Privacy Protection in the Background of "Artificial Intelligence+"[J]. 电脑与电信, 2019, 1(3): 39-41.
[2] GONG Yong-gangWANG Xin-yuLI Yu-yingWANG Yun-qi. Research on Automatic Proofreading Method of Chinese Text Sensitive Information[J]. 电脑与电信, 2018, 1(12): 66-69.
[3] WENG Yue-xin ZHU Yi-hong. Research on Drug Counterfeiting System Based on Trusted Two-dimensional Code[J]. 电脑与电信, 2018, 1(11): 57-59.
[4] YE Zheng-qiang , LI Jia . Design and Deployment of Enterprise Network Security Scheme[J]. 电脑与电信, 2018, 1(1-2): 53-54.
[5] HUANG Ling-zhen. Development in the Research on Steganalysis[J]. 电脑与电信, 2018, 1(1-2): 79-81.
[6] ZHANG Yuan-yuan. Discussion on Data Security in Cloud Computing Environment[J]. 电脑与电信, 2017, 1(12): 64-66.
[7] LIU Li-ping. An Anomaly Detection Algorithm Based on Artificial Immune Intelligence[J]. 电脑与电信, 2017, 1(12): 67-70.
[8] XU Da-xin. Research on Single Sign-on Model in Cloud Computing Environment[J]. 电脑与电信, 2017, 1(12): 85-87.
[9] HAN Lei, CHEN Han, HAO Xiao-xue. Research on Security Management Scheme of Enterprise Hadoop Big Data Platform[J]. 电脑与电信, 2017, 1(11): 40-43.
[10] Li Ruiqiang. Research on Cloud Computing Data Security Protection[J]. 电脑与电信, 2017, 1(10): 89-91.
[11] . [J]. 电脑与电信, 2017, 1(8): 81-.
[12] Zhang Shuai, Zhao Yan. Research on Scenario Privacy Protection Design for Mobile Terminal[J]. 电脑与电信, 2017, 1(5): 38-40.
[13] Yang Shuguo, Zhang Bo, Wang Yuxin, Li Tianying, Xue Mingyu. An Image Fractal Zero-watermark Algorithm in DWT Domain[J]. 电脑与电信, 2017, 1(4): 7-10.
[14] Wang Rongbin, Wu Ying, Zhou Lihui. Design and Analysis of Large Data Security Technology Laboratory for Social Public Service[J]. 电脑与电信, 2017, 1(4): 16-18.
[15] Ge Lan. The Principle and Implementation of Vigenere Encryption Algorithm[J]. 电脑与电信, 2017, 1(4): 64-65.
Copyright © Computer & Telecommunication, All Rights Reserved.
Powered by Beijing Magtech Co. Ltd