2021.7.21 吴志强教授:Bio-inspired Low Probability of Detection RF Steganography via Joint Radar/Communication Waveform Design

讲座题目:Bio-inspired Low Probability of Detection RF Steganography via Joint Radar/Communication Waveform Design

主讲人:吴志强 教授

开始时间:2021-7-21 下午14

讲座地点:闵行校区信息楼133会议室

主讲人简介:

吴志强教授1993年毕业于北京邮电大学无线电工程系,获学士学位;1996年毕业于北京大学信息科学中心,获硕士学位;2002年毕业于美国科罗拉多州立大学电子与计算机工程系,获博士学位。1996年到1998年,在中国信息产业部电信科学研究院担任工程师,参与了国家光纤骨干网网管标准和CDMA移动通信网网管标准的制定工作。2003年到2005年,他在美国西弗吉尼亚大学理工学院担任助理教授。2005年他加入美国莱特州立大学执教,现任正教授、莱特传感器系统工程中心主任。吴教授于2018年加入西藏大学,担任珠峰研究院副院长。他的研究领域包括无线通信、雷达信号处理、大数据和人工智能等,他的研究团队已发表学术论文200余篇,他也担任了厦门大学讲座教授、北京大学、哈尔滨工程大学等大学的客座教授。

讲座摘要:

 The chirp signal is one of the first bio-inspired signals commonly used in radio frequency (RF) applications where the term chirp is a reference to the chirping sound made by birds. It has since been recognized that birds communicate through such chirping sounds to attract other birds of the same species, to transmit an alarm for specific threats, etc. However birds of a different species, or sometime even birds in a different social group within a species, will be unable to connect a specific meaning to certain calls - they will simply hear a bird chirping. Inspired by such, this talk discusses recent research at Wright State University, in collaboration with Air Force Research Laboratory and Office of Naval Research, on a novel RF steganography scheme to conceal digital communication in linear chirp radar signals. We first provide a review of the linear chirp signal and existing communication systems using chirp waveforms. Next we discuss how to implement the RF steganography and hide digitally modulated communication information inside a linear chirp radar signal to prevent the enemy from detecting the existence of such hidden information. A new modulation called reduced phase shift keying is employed to make the modulated chirp waveform almost identical to the unmodulated chirp signal. Furthermore, variable symbol durations are employed to eliminate cyclostationary features that might otherwise be exploited by enemy to detect the existence of the hidden information.