• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    A covert communication method based on imitating bird calls

    2024-01-08 09:10:56JIANGJiajiaLUYinXUJunyuDUANFajieWANGXianquanLIUWeiFUXiao

    JIANG Jiajia,LU Yin,XU Junyu,DUAN Fajie,WANG Xianquan,LIU Wei,FU Xiao

    (1.State Key Lab of Precision Measuring Technology and Instruments,Tianjin University,Tianjin 300072,China; 2.Department of Electronic and Electrical Engineering,University of Sheffield,Sheffield UK)

    Abstract:When radio communication is interfered with or radio silence is required,the command and intelligence cannot be transmitted among the armed squads in the forest.So there is a great need for a communication method that can replace radio communication to transmit some important information.A novel acoustic covert communication method is proposed.This method encodes the communication information by imitating animals’ calls.Taking silvereye’s call as an example,silvereye’s syllables and the time intervals between syllables are used to encode the communication information.A syllable grouping method based on time-frequency characteristics is designed to improve encoding efficiency and reduce the amount of decoding computation.Meanwhile,various strategies are used to make the encoded communication pulse sequence as similar as possible to the true silvereye’s calls to improve the covert performance.The feasibility experiments are carried out in a forest with moderate noise to demonstrate the performance of the proposed covert communication method.The power of the acoustic source is fixed at 30 watts and the communication distance varies from 20 m to 60 m.The bit-error-rate (BER) of two communication modes are 1.98% and 1.39% at 60 m,respectively.Finally,the model of communication method is introduced,and the problems that may be encountered in practical applications,as well as solutions and future development directions are analyzed.The feasibility and covert performance of the proposed method are verified in the jungle environment,and the covert information transmission can be realized when radio communication is infeasible.

    Key words:imitating brid calls; acoustic covert communication; silvereye’s call; time-frequency characteristics; radio communication

    0 Introduction

    Due to the advantages of a high communication rate and long communication distance,radio communication has become the most commonly used wireless communication method in military applications.However,with the development of radio interference technology,the enemy can interfere with the radio through a radio interference bomb,disabling all radio devices in the area[1-4].If the radio communication among armed squad members fighting in the forest is interfered with by the enemy,it will leave them in a very dangerous situation.Therefore,when the radio cannot work effectively or radio silence is required,there is a great need for an emergency communication method.A brief message or instruction is needed at a critical moment,this communication method does not need a high communication rate,but it must be able to achieve a high degree of covertness.

    Although radio communication is interfered with,the acoustic wave can still play its role in communication.Existing researches show that sound waves are also an effective information carrier and can be used for wireless covert communication in the air.Michael Hanspach et al.[5]used sound waves near the ultrasonic frequency range as the communication carrier to realize covert communication among business laptops through a multi-hop communication modulation technology,which could achieve a rate of approximately 20 bit/s and a maximal communication distance of 19.7 m.Brent Carrara et al.[6]showed that the data could be communicated by using ultrasonic carriers and a bit-error-rate (BER) of 2% at the communication distance of 11 m and communication rate of 230 bit/s was obtained.Luke Deshotels[7]used ultrasound as a carrier and the frequency shift key (FSK) encoding method for effective communication.

    Covert communication is usually achieved by using ultrasonic waves which cannot be detected by the human ear,and digital modulation schemes such as FSK,amplitude shift key (ASK) and phase shift key (PSK) are generally used.The prerequisite for covert communication is based on not being recognized by the enemy.Otherwise,the communication signal will be easily interfered with or deciphered.And the existing communication signal recognition technology is mainly aimed at artificial signals (LFM,CW,etc.) encoded by traditional modulation methods (ASK,FSK,PSK,etc.)[8-11],and other signals are generally filtered as environmental noise[12-14].Therefore,the communication signal is easily discovered by communication signal recognition equipment.

    A camouflage covert communication method is proposed in this paper.The communication information is encoded into the camouflaged communication signal by imitating the animal’s calls.The core is to ensure the matching degree of the camouflaged communication signal with the communication environment and the similarity with the true animal calls,to trick the enemy into filtering out these animal calls as environmental noise,and then achieve covert communication.And in order to meet the communication requirements in different situations,it is necessary to select a variety of suitable animal calls and design corresponding encoding/decoding methods for the characteristics of these calls to construct a communication carrier library.In this way,the suitable animal call can be selected as the communication carrier for covert communication according to the actual communication conditions.

    It can be seen that the keys to improving covert performance are the matching degree of the camouflaged communication signal with the communication environment and the similarity with the true animal calls.So the first step is to choose an appropriate camouflage object,which is essential to the covert performance and effectiveness.After investigation and analysis,the principles of the choice of camouflage object are concluded.

    1) There must be some variable characteristics in the selected calls,and these characteristics change irregularly.In this way,the communication information can be effectively encoded and the original characteristics of the call can be retained,so as to obtain great covert performance.2) The body size of the selected animal should be small,and the living environment is the same as the expected communication environment.Such a small animal is hard to be found,making it difficult for the enemy to determine its location.3) It is better to choose the animal’s call with a lower frequency.Since the lower frequency sound can propagate farther.

    Given the communication environment in the forest,various animals’ calls that meet these points can be screened out,such as silvereye,willow warblers and sparrows.In this paper,silvereye’s call is chosen as an example,and the encoding/decoding method is combined based on its characteristics to introduce the design and performance of the covert communication method.

    1 Encoding/decoding method for silvereye’s call

    The covert communication method based on silvereye’s calls is taken as an example to introduce the encoding/decoding method adopted to ensure the similarity between the encoded communication signals and the true silvereye’s calls.

    1.1 Selection and analysis of communication carrier

    The silvereye is a kind of small bird with a length of about 90 mm-122 mm.They generally live in the forest and their calls could be heard 100 m away[15-16].As shown in Fig.1,each silvereye’s call segment is composed of many syllables,and there are random time intervals (TI) between adjacent call segments,which is generally 1 s to 5 s.The syllables in silvereye’s call are extracted for further observation and analysis,and the following characteristics are identified.1) The energy of silvereye’s call is concentrated in 2 kHz to 7 kHz.2) The duration of each syllable is randomly distributed between 20 ms and 300 ms.3) TI between adjacent syllables is randomly distributed between 20 ms and 150 ms.4) The number of syllables in each call segment is randomly 10 to 30.5) The time-frequency (t-f) characteristics of each syllable are complex and irregular.

    Fig.1 Characteristics of silvereye’s call

    Some extracted example syllables and their correlation results are shown in Fig.1.Mathematically cross-correlation and auto-correlation can be expressed as

    (1)

    (2)

    wherep1andp2are two different syllables;Rp1p2(n) is the cross-correlation function ofp1andp2; andRp1p1(n) is the auto-correlation function ofp1.As shown in Fig.1,the auto-correlation results have sharp peaks which are much higher than the peaks of their cross-correlation results.The correlation is a prominent characteristic of the silvereye’s calls that is favorable for coding.So the silvereye’s call can meet all the requirements.Therefore,it is selected as the communication carrier,and an encoding/decoding method is designed based on its characteristics to achieve covert communication.

    1.2 Construction of communication pulse database

    First,a communication pulse database (CPD)is established,which is composed of silvereye’s syllables with low cross-correlation characteristics.So that the identification of the received communication pulse can be achieved by performing cross-correlation among all pulses in the CPD.However,if these syllables with low cross-correlation value are directly input into the CPD without any processing,the correlation result between the received communication pulse and hundreds of communication pulses in the CPD is calculated during the decoding process.It would have an extremely high computational complexity.More importantly,some short syllables in silvereye’s call are very similar to a part of another long syllable,resulting in a good cross-correlation between the two syllables.So the short syllable cannot be used as a communication pulse.It will greatly reduce the available communication pulses,resulting in reduced encoding efficiency.And the number of short communication pulses in CPD is small,which is different from the characteristics of a true silvereye’s call and may affect the covert performance.

    A grouping method based ont-fcharacteristics is proposed.First,the syllables are divided into multiple groups according to the difference oft-fcharacteristics.And then the syllables with low cross-correlation with other syllables in the same group are selected as the candidate communication pulses.In the decoding process,thet-fcharacteristics of the received communication pulse are firstly calculated to determine its group.And then the correlation results between the received communication pulse and all communication pulses are calculated in the same group,instead of in the CPD.The pulse in the group that has a good correlation result with the received pulse is its original pulse before propagation.With this grouping method,it can greatly reduce the computational cost in the decoding process,and increase the number of silvereye’s syllables that can be used as communication pulses.

    As shown in Fig.2,the process of constructing the CPD is divided into grouping and screening.During the grouping process,all syllables extracted from silvereyes’ calls are grouped according to theirt-fcharacteristics,including pulse width,frequency span and average frequency.First,thet-fcharacteristics of syllables are analyzed by short-time Fourier transform (STFT).Then the frequency component with the strongest energy is found out in each frame and outline thet-fcharacteristics for further calculation.Thet-fdiagram and its outline of one syllable are shown in Fig.2.The pulse width defined in this paper is the duration of a syllable.The frequency span is the difference between the highest frequency and the lowest frequency in the outline of thet-fdiagram.The average frequency is the average of the frequencies of each frame in the outline of thet-fdiagram.

    Fig.2 Construction of CPD

    Fig.3 An example of IC encoding table,communication mode table and TI encoding table

    Meanwhile,it is necessary to select an appropriate threshold to make the number of communication pulses in each group approximate.Moreover,to accurately detect the grouping of pulses during the decoding process,the thresholds of thet-fcharacteristics of each group also need to be maintained some margin.As shown in Fig.2,all syllables are divided into four groups according to the pulse width of 0 ms-90 ms,110 ms-140 ms,160 ms-190 ms and 210 ms-300 ms.Then the four groups of syllables are further divided into eight groups according to the frequency span of >2.2 kHz and <2 kHz.Finally,the eight groups of syllables are further divided into sixteen groups according to the average frequency of >4 kHz and <4.1 kHz.

    During the screening process,the syllables with low cross-correlation with other syllables in the same group are selected as communication pulses to construct the CPD for each pulse group in the CPD.The syllables selected as communication pulses have high auto-correlation and low cross-correlation.For every pulse selected in the CPD,the peak of the auto-correlation result is at least three times larger than the peak of the cross-correlation results between themselves and other syllables in the same group.

    1.3 Encoding method

    Thet-fcharacteristics of the selected pulses are unique,which can be demonstrated by correlation results.Likewise,the distribution of TIs among the true silvereye’s call pulses is diversiform.In this section,the encoding method based on information code (IC) and TI will be introduced in detail.The encoding process is shown in Fig.4.

    Fig.4 Encoding process

    Since each communication pulse in the CPD has unique characteristics,its index number can be defined by grouping method and correlation results,which is the unique identifier of this pulse.In this way,each communication pulse can be used as a communication carrier to encode specific communication information,which is called IC encoding.To ensure the similarity between the encoded communication pulse signal (CPS) and the real silvereye’s call,each IC only consists of one single original silvereye’s call pulse.Before communication,the index number of ICs and the information represented by each IC must be determined in the IC encoding table as shown in Fig.3.The encoding process based on IC can be summarized as follows.First,assuming that each pulse can encodenbits of information,2ncommunication pulses are randomly selected from the CPD as the ICs (the number of communication pulses in the CPD is larger than 2n).Then,their index number (0,2n-1) and the information represented are determined.The information can be varied by changing different IC encoding tables.For example,the information could ben-bit binary data,which is numerically equal to the index number of the IC.Assuming thatn=7,the information represented by IC No.125 is ‘1111101’,the information represented by IC No.58 is ‘0111010’,and so on.The communication information could also be irregularn-bit data or specific instructions such as “forward” and “retreat” according to different IC encoding tables.

    In this paper,the TI is defined as the time difference between the end of the previous call pulse and the beginning of the next call pulse.since TIs among adjacent communication pulses are variable and irregular,they can also be used to encode communication information,which is called TI encoding.Similarly,before communication,the index number of TIs and the information represented by each TI must be determined in the TI encoding tables as in the example shown in Fig.3.The encoding process based on TI can be summarized as follows.Firstly,the maximum TI(Tmax) and the minimum TI(Tmin) are determined according to the TI distribution rule in silvereye’s call.Assuming that each TI is used to encodem-bit data,then the time rangeTmin-Tmaxis divided into 2msections of equal length to get 2mtime range.Then,the index number (0,2m-1) of each TI range is determined,which is the unique identifier of TI range.And the information represented by TI range can be varied by changing different TI encoding tables.For example,the information represented can bem-bit binary data,which is numerically equal to the serial number.Of course,the information could also be irregularm-bit binary data or specific instructions such as “start” and “attack” according to different TI encoding tables.

    Different encoding methods are proposed based on IC or TI.Considering that when only TI encoding is used,the range of TI will limit the choice ofm,which causes a low communication rate.However,IC and TI can be combined for encoding.For this reason,two encoding methods are determined based on IC only or IC &TI.It is worth mentioning that when only IC encoding is used,the distribution of TI in the encoded CPS is the same as that in true silvereye’s call,which ensures the communication signal has a better covert performance.If IC encoding and TI encoding are both used,the communication rate can be greatly increased.Meanwhile,TI in the encoded CPS is discretely distributed for encoding,which may affect the covert performance of the communication signal.Therefore,in the communication process,the encoding method should be determined according to the requirements of the communication rate and the covert performance.And multiple encoding tables should be switched in time according to the communication requirements.It will greatly increase the difficulty for the enemy to decipher the communication information and further ensure the security of communication.

    According to the requirement,each communication frame needs to contain the information of the encoding method and encoding table used in this frame.Mode code (MC) is used as the frame header of the communication frame to indicate the encoding method and encoding table used in the communication frame.Therefore,it is necessary to design a communication mode table as in the example shown in Fig.3 before communication.First,Zcommunication pulses that are not used as IC are randomly selected from the CPD as MCs (index numbers are 1-Z),and the communication modes represented by each MC are determined.For example,assuming that the frame header is MC #5,it means that IC encoding with IC encoding Table 1 abbreviated as IC(#1) is used in this frame.And if the frame header is MC #1,it means that IC(#1) and TI(#2) are used in this frame.Noting that if a communication mode is used for a long time,the MC used as the frame header may always be the same,which may be exposed.Therefore,multiple MCs are used to represent the same communication mode to avoid the issue,which further guarantees the covertness of communication.In addition,the mode of invalid communication frames can be added.In this way,when there is no need for communication,the communication transmitter also transmits sound signals by imitating silvereye’s call,further imitating the sound in a real environment.

    Each silvereye’s call segment contains 10-30 call syllables,and the time interval between adjacent call segments is 1 s-5 s.So a silvereye’s call segment can be regarded as a communication frame,and the time interval between adjacent communication frames is randomly distributed within 1 s-5 s.The structure of the communication frame after encoding is shown in Fig.5.

    Fig.5 Structure of a communication frame

    The frame header is MC,followed by several ICs (IC1-ICk),and the TIs between adjacent communication pulses are TI1-TIk.The process of constructing a communication frame is concluded as follows.First,the communication mode used in this communication frame is determined,and the corresponding MC is selected as the frame header.Then the information is encoded into a CPS by looking up the IC encoding table and the TI encoding table.For example,when the communication mode is IC(#2),the corresponding MC is inserted as the frame header,then IC encoding Table 2 is looked up to determine the corresponding ICs.Finally,these ICs are sequentially inserted to form a CPS,and the TIs:TI1,TI2,TI3,… among adjacent pulses are randomly distributed between 20 ms-150 ms.When the communication mode is IC(#1) &TI(#2),the corresponding MC is inserted as the frame header,then IC encoding Table 1 and TI encoding Table 2 are looked up to determine TI1,IC1,TI2,IC2,TI3,IC3,… Then the corresponding ICs are inserted at the corresponding TIs in the above order to form a CPS.When the communication mode is an invalid communication frame,the corresponding MC is first inserted as the frame header,and then ICs is randomly inserted to form a CPS.In addition,the number of ICs in a communication frame should be between 10 and 30.

    1.4 Decoding method

    Due to channel fading and multipath,spatial diversity and spectral subtraction filtering techniques[17-19]are adopted to process the received signal to improve the decoding performance.

    The proposed covert communication method is to encode communication information by ICs and TIs among adjacent pulses.Therefore,in simple terms,the decoding process is actually to determine the index number of received ICs and TIs among adjacent pulses.And then the encoding table used in the encoding process is looked up to determine its corresponding communication information.

    The process of decoding is summarized and shown in Fig.6.First,the short-term energy spectrum[20]of the CPS after filtering and equalization is calculated to distinguish communication pulses from TIs.The short-term energy spectrum can be expressed as

    (3)

    Fig.6 Decoding process

    2 Experiment

    Experiments are carried out to verify the feasibility and covert performance of the proposed covert communication method.

    2.1 Feasibility of communication

    The communication bit-error-rate(BER) is tested first through a series of experiments conducted in a forest,where the loudspeaker (Alpha 3-8) is used as the acoustic source,and the microphone is used as the receiver.The experiment is conducted in the forest with a moderate density of trees,covering an area of about 100 m×150 m,and the height of the trees is about 8 m.The model and environment of forest experiment is shown in Fig.7.

    Fig.7 Experiment model and environment

    Communication interference is mainly caused by natural noise and channel fading effect.In the experiment,the natural sound of the experimental environment is about 43 dB-50 dB,including sounds of wind,bird calls and traffic.The effect of channel fading is analyzed by changing the communication distance.In addition,nin the IC encoding is set to 7,andmin the TI encoding is set to 3.The power of the acoustic source is fixed at 30 watts and the communication distance varied from 20 m-60 m by changing the position of the microphone.In the experiment,the amount of communication data at each communication distance is 10 000 bit.The BER results at different communication distances of two communication modes,one with both IC encoding and TI encoding and one with IC encoding only,are shown in Fig.8.At the communication distance of 60 m,the amplitude range of the received signal is 0.03 V-0.2 V and the signal-to-noise ratio is about 10 dB.Under such experimental conditions,the BER of two communication modes are 1.98% and 1.39%,respectively.The BER increases significantly with the increase of communication distance.The communication method based on IC has better performance in accuracy than that based on IC &TI.

    Fig.8 BER at different distances

    Since the communication method encodes information with ICs and TIs,and the pulse width of IC and the length of TI are related to the communication information,the communication rate of the method cannot be calculated accurately.In the experiment,the average communication rate is 43 bits/s when the communication is based on IC &TI,and the average communication rate is about 30 bits/s when the communication is based on IC only.

    2.2 Analysis and testing of covert performance

    The key to realizing the camouflage covert communication method is that the communication signal cannot be discovered by the enemy.And its core is to ensure the matching degree of the camouflaged communication signal with the communication environment and the similarity with the true animal calls.

    First of all,the theoretical analysis and evaluation of the similarity between the camouflaged communication signal and the real silvereye’s calls are carried out,which is essential to evaluate the covert performance of the camouflaged communication.Based on the encoding principle of the covert communication method,the theoretical analysis of the similarity can be carried out in terms of both individual communication code element pulses and the encoded CPS.The similarity between individual communication pulses and real call’s syllables is analyzed first.According to the coding method,the pulses used for covert communication are extracted from the real silvereye’s calls without any modification.That is,any pulse in the CPS is identical to its corresponding syllable of the silvereye’s calls.Then the similarity between the encoded CPS and the call string of silvereyes is analyzed.

    In the encoded CPS,the features such as the range of the length of the TIs,the range of the number of pulses in the communication frame and the structure of the CPS are determined exactly according to the features of the silvereye’s calls,which is consistent with the real calls.In the IC-based coding method,the TIs between pulses are consistent with those of the real calls,while the combination situation and arrangement order of the communication pulses depend on the communication content and coding table,which will be different from that of the original call sample.In the IC &TI-based coding method,both the combination of communication pulses and the TI distribution of the CPS are different from those of the original silvereye’s calls.

    According to the analysis of real silvereye’s calls,there is no significant pattern of syllable combination and TI distribution,and there are regional and individual differences in the calls of Silvereyes,which means that the syllable combination and TI distribution of the calls are variable.Therefore,it is theoretically difficult to distinguish the encoded CPS from the real silvereye’s calls by the combination and arrangement of syllables and their TIs.The analysis of communication pulse and the CPS shows that the covert communication method uses original call syllables as communication code elements and follows the characteristics of the silvereye’s calls as much as possible.Therefore,the camouflaged communication signal has a high similarity with real silvereye’s calls in theory.In addition,since the CPS with IC encoding does not modify the TIs of the syllables,its camouflage effect is better than that of the CPS with IC &TI encoding.

    To further test whether the camouflaged communication signal will be recognized as a communication signal,a signal classification system based on a neural network is designed based on the existing communication signal classification technology.First,a fifth-order polynomial is used to fit the ridge of thet-fdiagram of the traditional communication pulse (LFM,CW) and silvereye’s syllables.The coefficients and residual error of the polynomial are used as feature parameters to train the classifier.Then the communication pulse (LFM,CW) extracted from the received traditional communication signal is used as input to test the effectiveness of the classifier.Then the communication pulse extracted from the received camouflaged communication signal is used as an input to test whether the camouflaged communication signal will be classified as a traditional communication signal.

    In the test results,the classification accuracy rates of LFM and CW communication pulses are 98% and 98.5%,respectively,which proves that the classifier is effective.And only 0.5% of the camouflaged communication pulses are classified as traditional communication pulses,which proves that the camouflaged communication signals are obviously different from the traditional communication signals and will not be recognized as communication signals.

    In addition,the camouflaged communication signal can be perceived by humans,so it is also very important to test people’s judgment on the camouflaged communication signal.Participants from various backgrounds (teacher,doctor,veteran,etc.)are invited to conduct tests through online surveys.First,the encoded CPS and true silvereye’s call are played to theme.Then they are asked two questions.(1) Are these two sounds the same animal’s call,or is there a clear difference between them? (2) One of the two sounds contains communication information,which one do you think? Finally,286 valid results are received,and 98.3% of them say that the two sounds are the same animal sound,no difference.The rest of the people say that they do not know what the animal’s voice is and can not decide.For the second question,54.7% of them think that the first sound contains communication information,while the remaining thinks otherwise.In fact,the first sound is silvereye’s call,and the second sound is the encoded CPS.Based on the experimental results,it can be concluded that it is very difficult for the human ears to distinguish between the two sounds,which demonstrates that the proposed bio-inspired communication method has a strong covert performance.

    3 Discussion

    The bio-inspired covert communication method based on silvereye’s call is taken as an example to introduce the corresponding encoding and decoding method,and the feasibility of the covert communication method is verified through point-to-point communication tests.But there are still some problems to be solved in the actual communication environment.

    As shown in Fig.9,in the actual communication model,there are communication transmitter (A),communication receiver (B) and enemy (C),as well as other interferers (D) (animal calls in the environment,etc.).A needs to transmit information to B by using animal calls as communication carriers under C’s recognition,interference,intercept and D’s interference.

    Fig.9 Communication model

    First of all,even if C received communication signals disguised as silvereye’s calls,as long as the camouflaged communication signal is sufficiently similar to the true silvereye’s calls,it will also be difficult for C to recognize it,let alone deciphering.In general,C will only ignore camouflaged communications as background noise.What’s more,C can only interfere with the communication by continuously sending interference signals.But audible sound waves are different from the radio.They are perceivable by the human body.If C continuously sends high-power audible sound,it will not only expose its position but also may cause permanent damage to the hearing of C’s members and surrounding animals.So judging from the current technology,the proposed covert communication method is difficult to interfere with.

    D refers to other interferers in the environment,such as natural animal calls.If these sounds overlap the frequency range of the communication signal,it may interfere with the communication between A and B.It is similar to the bandwidth conflict in traditional communication.At this time,other suitable animals that do not exist in the environment temporarily can be selected as camouflage objects.And it is necessary to select the camouflaged object according to the actual situation to ensure the matching degree between the camouflaged communication signal and the communication environment.That is,the camouflage covert communication method based on specific animals is not universal.Therefore,it needs to design covert communication methods based on different animals’ calls,so that an animal call that does not conflict with environmental sounds can be selected as the communication carrier in actual communication.And it is also necessary to design more effective encoding methods to increase the communication rate.

    In fact,the covert communication method based on insects’ calls has already been done before,and the covert communication methods is being designed based on other animals’ calls.It is hoped that a rich communication carrier library can be established to meet the demand for covert communication in different environments and different situations as much as possible.

    4 Conclusions

    For effective communication when radio communication is not feasible,a bio-inspired covert communication method by imitating animals’ calls is proposed.And the covert communication method based on silvereye’s call is used as an example to introduce this novel covert communication method.Based on the strategy of camouflage,the true silvereye’s syllables are extracted as the communication pulses,and these pulses and TIs between adjacent communication pulses are used to encode information.Meanwhile,various strategies are employed to ensure the similarity between the encoded CPS and the silvereye’s calls.In this way,it is difficult for the enemy to distinguish the encoded CPS from true silvereye’s calls.Experimental results shows that the BER of this communication method at a distance of 60 m is less than 2%.Therefore it provides a novel and effective solution to solve the covert communication problem when radio communication is infeasible.The proposed approach is not limited to forests but can also be applied to other similar areas requiring covert communication.And there are still some problems to be solved in the actual communication environment.In the following research,it is necessary to design more encoding/decoding methods based on other animals’ calls to improve the performance of covert communication.

    国产精品女同一区二区软件| 男女边吃奶边做爰视频| 欧美日韩在线观看h| 久久人人精品亚洲av| 我要搜黄色片| 女人十人毛片免费观看3o分钟| 俄罗斯特黄特色一大片| 欧美性感艳星| 欧美成人一区二区免费高清观看| 最近2019中文字幕mv第一页| 亚洲一区高清亚洲精品| 97超级碰碰碰精品色视频在线观看| 晚上一个人看的免费电影| 直男gayav资源| 尤物成人国产欧美一区二区三区| 91精品国产九色| 内地一区二区视频在线| 国产综合懂色| 亚洲第一电影网av| 亚洲三级黄色毛片| 两性午夜刺激爽爽歪歪视频在线观看| 成人特级黄色片久久久久久久| 日本免费一区二区三区高清不卡| 自拍偷自拍亚洲精品老妇| 12—13女人毛片做爰片一| av在线观看视频网站免费| 久久精品国产自在天天线| 深夜精品福利| 少妇裸体淫交视频免费看高清| 色吧在线观看| 噜噜噜噜噜久久久久久91| 女人十人毛片免费观看3o分钟| 99riav亚洲国产免费| 成人av在线播放网站| 国产v大片淫在线免费观看| av黄色大香蕉| 亚洲中文日韩欧美视频| 女同久久另类99精品国产91| 国产精品久久久久久亚洲av鲁大| 少妇丰满av| 五月玫瑰六月丁香| 在线观看美女被高潮喷水网站| 18禁在线无遮挡免费观看视频 | 久久精品国产鲁丝片午夜精品| 男人狂女人下面高潮的视频| 天堂网av新在线| 亚洲精品乱码久久久v下载方式| 亚洲av中文字字幕乱码综合| 1000部很黄的大片| 精品国产三级普通话版| av在线播放精品| 免费搜索国产男女视频| 麻豆乱淫一区二区| 男女那种视频在线观看| 亚洲人成网站高清观看| 国产午夜精品论理片| 婷婷亚洲欧美| 深夜a级毛片| 色吧在线观看| 校园人妻丝袜中文字幕| 成人性生交大片免费视频hd| 欧美极品一区二区三区四区| 看片在线看免费视频| 国内精品一区二区在线观看| 久久热精品热| 自拍偷自拍亚洲精品老妇| 我的女老师完整版在线观看| 69人妻影院| 春色校园在线视频观看| 美女高潮的动态| 99热这里只有是精品50| 天天一区二区日本电影三级| 看十八女毛片水多多多| 亚洲精品一区av在线观看| 丰满的人妻完整版| 舔av片在线| 成人无遮挡网站| 中文字幕精品亚洲无线码一区| 欧洲精品卡2卡3卡4卡5卡区| 人妻丰满熟妇av一区二区三区| 久久精品国产亚洲av涩爱 | 国内揄拍国产精品人妻在线| 国国产精品蜜臀av免费| 午夜福利在线观看吧| 亚洲精品国产av成人精品 | 欧美人与善性xxx| 在线观看66精品国产| 国产精品福利在线免费观看| 狠狠狠狠99中文字幕| 免费黄网站久久成人精品| 国产综合懂色| 国产探花极品一区二区| 神马国产精品三级电影在线观看| 国产成年人精品一区二区| 俄罗斯特黄特色一大片| 亚洲欧美中文字幕日韩二区| 中文字幕人妻熟人妻熟丝袜美| 伦精品一区二区三区| 国产女主播在线喷水免费视频网站 | 亚洲国产精品成人综合色| 精品欧美国产一区二区三| 成人二区视频| 人妻丰满熟妇av一区二区三区| 黄色一级大片看看| 欧美+亚洲+日韩+国产| 高清日韩中文字幕在线| 日韩成人av中文字幕在线观看 | 成人三级黄色视频| 亚洲欧美精品综合久久99| videossex国产| 国产探花极品一区二区| 精品一区二区三区av网在线观看| 99热这里只有精品一区| 国产69精品久久久久777片| 国模一区二区三区四区视频| 久久国内精品自在自线图片| 一级毛片电影观看 | 国产中年淑女户外野战色| 国产私拍福利视频在线观看| 99热只有精品国产| 国产一区二区激情短视频| 99久久中文字幕三级久久日本| 日韩三级伦理在线观看| 天堂√8在线中文| 99热只有精品国产| 麻豆国产97在线/欧美| 国产男人的电影天堂91| 亚洲av免费在线观看| 日韩欧美一区二区三区在线观看| 亚洲熟妇中文字幕五十中出| 欧美一区二区亚洲| 国产一区二区激情短视频| 久久精品影院6| 成人漫画全彩无遮挡| 黄色欧美视频在线观看| 在线天堂最新版资源| 美女高潮的动态| 欧美日韩乱码在线| 欧美区成人在线视频| 免费在线观看成人毛片| 人妻夜夜爽99麻豆av| 久久精品91蜜桃| 国产午夜福利久久久久久| 欧美又色又爽又黄视频| 国产不卡一卡二| 美女黄网站色视频| 国产一区二区三区在线臀色熟女| 村上凉子中文字幕在线| 国产真实伦视频高清在线观看| 91av网一区二区| 2021天堂中文幕一二区在线观| 男女啪啪激烈高潮av片| 伦理电影大哥的女人| 国产精品乱码一区二三区的特点| 伊人久久精品亚洲午夜| 天天一区二区日本电影三级| 国产毛片a区久久久久| 永久网站在线| 日本与韩国留学比较| 日本色播在线视频| 最新中文字幕久久久久| 99久久精品热视频| 日韩欧美三级三区| 国产精品日韩av在线免费观看| 一级毛片电影观看 | 精品人妻熟女av久视频| 麻豆精品久久久久久蜜桃| 99热这里只有精品一区| 一级毛片aaaaaa免费看小| 最近最新中文字幕大全电影3| 搡老熟女国产l中国老女人| 变态另类成人亚洲欧美熟女| 三级国产精品欧美在线观看| av在线观看视频网站免费| 免费电影在线观看免费观看| 成人漫画全彩无遮挡| 国产亚洲av嫩草精品影院| 久久精品国产亚洲网站| 中文字幕人妻熟人妻熟丝袜美| 99久久精品一区二区三区| 黄色一级大片看看| 日韩一本色道免费dvd| 久久精品国产清高在天天线| 一级毛片电影观看 | 国产精品一区二区三区四区免费观看 | 麻豆av噜噜一区二区三区| 成熟少妇高潮喷水视频| 又黄又爽又刺激的免费视频.| 午夜日韩欧美国产| 国产精品1区2区在线观看.| 国产乱人视频| 精品一区二区免费观看| 97在线视频观看| 性插视频无遮挡在线免费观看| 久久久国产成人免费| 亚洲美女搞黄在线观看 | 成年女人永久免费观看视频| 卡戴珊不雅视频在线播放| 可以在线观看的亚洲视频| 99久国产av精品| 欧美一级a爱片免费观看看| 免费无遮挡裸体视频| 欧美+亚洲+日韩+国产| 色吧在线观看| 日日摸夜夜添夜夜爱| 少妇人妻精品综合一区二区 | 亚洲va在线va天堂va国产| 久久久国产成人免费| 国产91av在线免费观看| 日韩欧美国产在线观看| 日韩在线高清观看一区二区三区| 一级黄色大片毛片| eeuss影院久久| 我的女老师完整版在线观看| 日日干狠狠操夜夜爽| 熟女人妻精品中文字幕| 亚洲天堂国产精品一区在线| 尾随美女入室| 1000部很黄的大片| 一进一出好大好爽视频| 观看美女的网站| 一级黄片播放器| 亚洲天堂国产精品一区在线| 不卡视频在线观看欧美| 国产极品精品免费视频能看的| 欧美日韩在线观看h| 亚洲最大成人av| 亚洲欧美清纯卡通| 久久久国产成人精品二区| 在线国产一区二区在线| 亚洲欧美精品自产自拍| www日本黄色视频网| 欧美精品国产亚洲| 99久久精品国产国产毛片| 成人亚洲精品av一区二区| 精品一区二区免费观看| 91在线观看av| 看黄色毛片网站| 少妇高潮的动态图| 亚洲国产精品合色在线| 亚洲av中文字字幕乱码综合| 免费av不卡在线播放| 欧美+亚洲+日韩+国产| 亚洲18禁久久av| 一本久久中文字幕| 亚洲国产精品国产精品| 老熟妇乱子伦视频在线观看| 亚洲精品日韩av片在线观看| 国产一区二区激情短视频| 1024手机看黄色片| 亚洲人成网站高清观看| av福利片在线观看| 色噜噜av男人的天堂激情| 69人妻影院| 国产精品一二三区在线看| 中文字幕人妻熟人妻熟丝袜美| h日本视频在线播放| 色在线成人网| 国产精品爽爽va在线观看网站| 国产片特级美女逼逼视频| 亚洲美女搞黄在线观看 | 老司机福利观看| 午夜视频国产福利| 在线观看66精品国产| 一a级毛片在线观看| 91精品国产九色| 国产v大片淫在线免费观看| 色5月婷婷丁香| 国产精品福利在线免费观看| 99九九线精品视频在线观看视频| 成人性生交大片免费视频hd| 欧美潮喷喷水| 成人特级黄色片久久久久久久| 色综合亚洲欧美另类图片| 少妇裸体淫交视频免费看高清| 在线看三级毛片| av在线老鸭窝| 小说图片视频综合网站| 久久这里只有精品中国| 久久6这里有精品| 女人被狂操c到高潮| 国产探花极品一区二区| 亚洲精品日韩在线中文字幕 | 国产高清激情床上av| 国产精品日韩av在线免费观看| 国产人妻一区二区三区在| 99热精品在线国产| 国产午夜福利久久久久久| 日韩三级伦理在线观看| 一边摸一边抽搐一进一小说| 成年av动漫网址| 精品福利观看| www.色视频.com| 18禁在线无遮挡免费观看视频 | 欧美+亚洲+日韩+国产| 变态另类丝袜制服| 午夜免费激情av| 最近最新中文字幕大全电影3| 插逼视频在线观看| 久久精品国产亚洲av香蕉五月| 免费大片18禁| 国产91av在线免费观看| 日本成人三级电影网站| 日韩三级伦理在线观看| 精品人妻熟女av久视频| 欧美最黄视频在线播放免费| ponron亚洲| 日本免费a在线| 亚洲精品456在线播放app| av在线亚洲专区| 搡老岳熟女国产| 色播亚洲综合网| 亚洲av成人精品一区久久| 精品人妻偷拍中文字幕| 露出奶头的视频| 桃色一区二区三区在线观看| 精品少妇黑人巨大在线播放 | 久久久国产成人精品二区| 久久久久国产精品人妻aⅴ院| 最新中文字幕久久久久| 亚洲精品国产av成人精品 | 美女免费视频网站| 综合色丁香网| 午夜精品国产一区二区电影 | 女生性感内裤真人,穿戴方法视频| 成人性生交大片免费视频hd| 99久久精品一区二区三区| 亚洲精品在线观看二区| 69人妻影院| 国产精品永久免费网站| 身体一侧抽搐| 欧美性猛交黑人性爽| 99热这里只有是精品在线观看| 日韩在线高清观看一区二区三区| 免费看a级黄色片| 久久综合国产亚洲精品| 亚洲人成网站在线播| 久久久久国产网址| 亚州av有码| 免费看av在线观看网站| 在线播放无遮挡| 少妇人妻一区二区三区视频| 91在线精品国自产拍蜜月| 午夜福利成人在线免费观看| 国产午夜福利久久久久久| 色吧在线观看| 少妇熟女欧美另类| 亚洲精华国产精华液的使用体验 | 国产人妻一区二区三区在| 日本精品一区二区三区蜜桃| АⅤ资源中文在线天堂| 在现免费观看毛片| 成人综合一区亚洲| 蜜臀久久99精品久久宅男| 免费人成视频x8x8入口观看| 欧美另类亚洲清纯唯美| 看黄色毛片网站| 日韩欧美精品v在线| 美女内射精品一级片tv| 一本精品99久久精品77| 少妇熟女aⅴ在线视频| 久久久久久伊人网av| 国产淫片久久久久久久久| 大又大粗又爽又黄少妇毛片口| 在线观看av片永久免费下载| 91久久精品国产一区二区三区| 久99久视频精品免费| 赤兔流量卡办理| 美女大奶头视频| 高清毛片免费观看视频网站| 日本在线视频免费播放| 国产女主播在线喷水免费视频网站 | 日韩国内少妇激情av| 菩萨蛮人人尽说江南好唐韦庄 | 日韩成人伦理影院| 无遮挡黄片免费观看| 一本久久中文字幕| 午夜视频国产福利| 男人舔女人下体高潮全视频| 禁无遮挡网站| 亚洲无线观看免费| 色噜噜av男人的天堂激情| 国产亚洲av嫩草精品影院| 天堂影院成人在线观看| 熟女电影av网| 亚洲内射少妇av| 国产麻豆成人av免费视频| 人妻制服诱惑在线中文字幕| 最新中文字幕久久久久| 久久久国产成人免费| 国产亚洲精品综合一区在线观看| 在线观看一区二区三区| 好男人在线观看高清免费视频| 中国美白少妇内射xxxbb| 少妇人妻一区二区三区视频| 18禁在线无遮挡免费观看视频 | 国产精品久久久久久精品电影| 夜夜爽天天搞| 免费一级毛片在线播放高清视频| 亚洲av中文av极速乱| videossex国产| 日韩在线高清观看一区二区三区| 亚洲欧美成人综合另类久久久 | 在线天堂最新版资源| 亚洲精品色激情综合| 国产亚洲精品久久久com| 看黄色毛片网站| 国产一区二区在线观看日韩| 久久久国产成人免费| 黄色配什么色好看| 男人舔女人下体高潮全视频| 麻豆国产av国片精品| 欧美日韩国产亚洲二区| 看非洲黑人一级黄片| 免费观看的影片在线观看| 欧美绝顶高潮抽搐喷水| 天堂√8在线中文| 亚洲一区高清亚洲精品| 国产一级毛片七仙女欲春2| 日韩欧美免费精品| 亚洲三级黄色毛片| 18禁黄网站禁片免费观看直播| 成人av在线播放网站| .国产精品久久| 精品免费久久久久久久清纯| 欧美高清成人免费视频www| 精华霜和精华液先用哪个| 国产精品一区www在线观看| 伦理电影大哥的女人| 露出奶头的视频| 十八禁国产超污无遮挡网站| 99国产极品粉嫩在线观看| 亚洲va在线va天堂va国产| 国产伦精品一区二区三区四那| 欧美一区二区精品小视频在线| 亚洲七黄色美女视频| 一级毛片aaaaaa免费看小| 黄片wwwwww| 简卡轻食公司| 变态另类成人亚洲欧美熟女| 嫩草影院精品99| 日韩欧美国产在线观看| 日产精品乱码卡一卡2卡三| 俄罗斯特黄特色一大片| 老司机午夜福利在线观看视频| 人妻夜夜爽99麻豆av| 免费搜索国产男女视频| 欧美潮喷喷水| 久久久久久伊人网av| 成年女人毛片免费观看观看9| 欧美一区二区精品小视频在线| 一级a爱片免费观看的视频| 岛国在线免费视频观看| 小蜜桃在线观看免费完整版高清| www.色视频.com| 性欧美人与动物交配| 91午夜精品亚洲一区二区三区| 一边摸一边抽搐一进一小说| 熟妇人妻久久中文字幕3abv| 国产亚洲91精品色在线| 国内久久婷婷六月综合欲色啪| 精华霜和精华液先用哪个| 熟女人妻精品中文字幕| 插逼视频在线观看| 久久6这里有精品| 搡老熟女国产l中国老女人| 麻豆国产97在线/欧美| 亚洲第一电影网av| 国产真实伦视频高清在线观看| 亚洲欧美日韩高清专用| 免费av不卡在线播放| 精品免费久久久久久久清纯| 成人欧美大片| 国产成年人精品一区二区| 欧洲精品卡2卡3卡4卡5卡区| 日本与韩国留学比较| 国产中年淑女户外野战色| av在线蜜桃| 国产亚洲av嫩草精品影院| 欧美日韩综合久久久久久| 国产高清不卡午夜福利| 欧美日韩乱码在线| a级一级毛片免费在线观看| 国产伦精品一区二区三区视频9| 极品教师在线视频| 久久精品人妻少妇| 久久午夜亚洲精品久久| 一级黄色大片毛片| 国产高清有码在线观看视频| 亚洲中文日韩欧美视频| 有码 亚洲区| 精品国内亚洲2022精品成人| 香蕉av资源在线| 色尼玛亚洲综合影院| 国产不卡一卡二| 蜜桃亚洲精品一区二区三区| 亚洲乱码一区二区免费版| 中文字幕精品亚洲无线码一区| 国内精品美女久久久久久| 午夜免费激情av| 在线观看66精品国产| 女人十人毛片免费观看3o分钟| 精品久久久久久久人妻蜜臀av| 国产一区亚洲一区在线观看| 一本精品99久久精品77| 日韩欧美一区二区三区在线观看| 成人鲁丝片一二三区免费| 国产av在哪里看| 午夜爱爱视频在线播放| 日本熟妇午夜| 亚洲av成人av| 国产精品伦人一区二区| 亚洲国产高清在线一区二区三| 久久久精品94久久精品| 人妻久久中文字幕网| 亚洲人成网站在线播放欧美日韩| 国产乱人视频| 深爱激情五月婷婷| 性欧美人与动物交配| 一个人看的www免费观看视频| 国产国拍精品亚洲av在线观看| 午夜精品国产一区二区电影 | 亚洲在线自拍视频| 欧美+亚洲+日韩+国产| 成人午夜高清在线视频| 免费黄网站久久成人精品| 国产极品精品免费视频能看的| 中文字幕熟女人妻在线| 精品99又大又爽又粗少妇毛片| 久久精品91蜜桃| 国产精品爽爽va在线观看网站| 欧美国产日韩亚洲一区| 亚洲激情五月婷婷啪啪| 黄色视频,在线免费观看| 精品久久久久久久久久久久久| 欧美bdsm另类| 女的被弄到高潮叫床怎么办| av国产免费在线观看| 午夜福利成人在线免费观看| 国产一区二区三区av在线 | 成人鲁丝片一二三区免费| 亚洲真实伦在线观看| 韩国av在线不卡| 婷婷精品国产亚洲av在线| 欧美xxxx性猛交bbbb| 在线观看av片永久免费下载| 老司机影院成人| 国内精品美女久久久久久| 禁无遮挡网站| 亚洲欧美精品自产自拍| 亚洲最大成人手机在线| 夜夜看夜夜爽夜夜摸| 一区二区三区免费毛片| 白带黄色成豆腐渣| 亚洲av熟女| 亚洲av二区三区四区| 卡戴珊不雅视频在线播放| 成人亚洲欧美一区二区av| 午夜老司机福利剧场| 欧美日韩一区二区视频在线观看视频在线 | 国内精品宾馆在线| 国产午夜福利久久久久久| 亚洲国产色片| 91久久精品电影网| 国产黄色视频一区二区在线观看 | 亚洲精品456在线播放app| 亚洲真实伦在线观看| 久久人人爽人人片av| 无遮挡黄片免费观看| 老司机福利观看| 精品一区二区免费观看| 久久久a久久爽久久v久久| 亚洲自偷自拍三级| 亚洲人成网站高清观看| 亚洲自偷自拍三级| 啦啦啦韩国在线观看视频| 综合色av麻豆| 国产精品不卡视频一区二区| 观看美女的网站| 大香蕉久久网| 18禁裸乳无遮挡免费网站照片| 国内精品美女久久久久久| 亚洲人与动物交配视频| 人人妻人人澡欧美一区二区| 亚洲成a人片在线一区二区| 黄片wwwwww| av黄色大香蕉| 长腿黑丝高跟| 国产精品不卡视频一区二区| 观看美女的网站| 人人妻人人澡人人爽人人夜夜 | 91在线精品国自产拍蜜月| 黄色日韩在线| 成年女人永久免费观看视频| 国产在线男女| 久久久久久大精品| 亚洲,欧美,日韩| 男女视频在线观看网站免费| 三级经典国产精品| 男人的好看免费观看在线视频| 人妻夜夜爽99麻豆av| 中文字幕精品亚洲无线码一区| 午夜福利18| 久久精品国产亚洲av天美| 亚洲一级一片aⅴ在线观看| 一级毛片aaaaaa免费看小| 中国国产av一级| 欧美人与善性xxx| 中国美女看黄片| 悠悠久久av| 日本黄色片子视频| 日本色播在线视频| av黄色大香蕉| 少妇的逼好多水| 欧美+日韩+精品|