22.01.2015 Views

Military Communications and Information Technology: A Trusted ...

Military Communications and Information Technology: A Trusted ...

Military Communications and Information Technology: A Trusted ...

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

504 <strong>Military</strong> <strong>Communications</strong> <strong>and</strong> <strong>Information</strong> <strong>Technology</strong>...<br />

Figure 6. Time synchronization mechanism<br />

After completing the time <strong>and</strong> frequency synchronization, the proper procedure<br />

of binary signature extraction takes place. Since the same bit is embedded in two<br />

adjacent frames (subframes) of the host signal, on the receiver side each assayed<br />

signal frame is divided into two further frames. The next step (9) is the determination<br />

of the scalar product value between the difference of amplitude spectra for<br />

two adjacent frames <strong>and</strong> the following formulation:<br />

where:<br />

R <br />

N1<br />

2 1<br />

Xi Xi Pi<br />

(9)<br />

i0<br />

10<br />

<br />

<br />

<br />

<br />

k<br />

k<br />

X 10log DFT x<br />

(10)<br />

P i – pattern.<br />

On the basis of the scalar product value (9) the value of the bit hidden in the given<br />

portion of the signal is determined:<br />

0, R 0<br />

BS<br />

(11)<br />

1, R 0<br />

III. Results of the analysis<br />

The first analysis concerned the efficiency of operation of the synchronization<br />

algorithm. Figs. 7 <strong>and</strong> 8 present the accuracy of synchronization in the function of drift

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!