Next Article in Journal
Monitoring and Calibrating Building Materials Drying Kinetics with Capacitance Sensors
Next Article in Special Issue
Fast Fake: Easy-to-Train Face Swap Model
Previous Article in Journal
Soft Generative Adversarial Network: Combating Mode Collapse in Generative Adversarial Network Training via Dynamic Borderline Softening Mechanism
Previous Article in Special Issue
Transmission Removal from a Single OSN-Shared Glass Mixture Image
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Covert Surveillance Video Transmission with QAM Constellations Modulation

1
School of Electronics and Information Engineering, Nanjing University of Information Science and Technology, Nanjing 210044, China
2
Key Laboratory of Intelligent Support Technology for Complex Environments, Ministry of Education, Nanjing 210044, China
*
Author to whom correspondence should be addressed.
Appl. Sci. 2024, 14(2), 577; https://doi.org/10.3390/app14020577
Submission received: 23 November 2023 / Revised: 4 January 2024 / Accepted: 4 January 2024 / Published: 9 January 2024
(This article belongs to the Special Issue Multimedia Smart Security)

Abstract

:
This study explores the covert transmission of surveillance videos using QAM (quadrature amplitude modulation) constellations. By analyzing transmission strategies used in surveillance video systems, we adopt KL divergence as the constraint for covertness performance and mutual information to characterize transmission rates. Utilizing the Taylor series expansion method, we simplify the complex integral calculations of mutual information and KL divergence into summation operations. This simplification not only reduces computational complexity but also ensures precise calculations. Theoretical derivations establish the necessary conditions for the covert transmission of surveillance videos, optimizing modulation probabilities for constellation points. Experimental results and simulation validations demonstrate the superior performance of our proposed method in terms of both information transfer and precision.

1. Introduction

The widespread deployment of surveillance systems stands as a cornerstone for bolstering public safety, safeguarding property, and systematically monitoring diverse environments [1,2]. As the integration of these systems becomes increasingly pervasive, a paramount concern has emerged regarding the security of surveillance video transmissions, prompting the need for sophisticated and resilient solutions. Surveillance technologies, often shrouded in secrecy for operational efficiency [3], encounter distinct challenges, both in wired and wireless domains. Wired surveillance cameras, despite their discreet nature, are susceptible to exposure through the existence of signal lines [4]. On the other hand, the wireless transmission of surveillance videos confronts intricate challenges related to wireless signal detection and potential interruptions [5].
Considering the fact that the majority of existing video compression standards are tailored for relatively benign, nearly error-free environments, their direct applicability to hostile mobile domains, exemplified by standards such as H.265/HEVC (high-efficiency video coding) [6,7,8] and AV1 (AOMedia Video 1) [9,10], is limited. However, certain effective video compression methods, such as H.264/AVC, exhibit the capability of facilitating the transmission of multimedia services, even over channels with very low bit rates [11,12]. When coupled with advanced modulation schemes in wireless communication, such as Quadrature Amplitude Modulation, the allocation of more bits per transmitted symbol enhances overall transmission capacity [13].
As depicted in Figure 1a, the proposed 16−QAM phase constellation [14] showcases an intricate design strategy, leveraging the sophisticated maximum–minimum distance Gray code methodology presented in [15,16]. This innovative approach inherently gives rise to the establishment of two subchannels, each characterized by distinct integrities and tailored for specific functionalities within the communication system. The high-priority (HP) subchannel plays a pivotal role in the proposed constellation. It is uniquely characterized by the most significant bit (MSB) of both the in-phase (I) and quadrature-phase (Q) bits. This strategic allocation ensures that critical information is embedded in the most robust part of the signal, enhancing the resilience of the communication system to various environmental challenges. In stark contrast, the low-priority (LP) subchannel is formed by the remaining 2 bits of the 4-bit 16−QAM symbol; specifically, the least significant bits (LSBs). While inherently carrying less weight in terms of information content, the LP subchannel contributes to the overall versatility of the communication system by accommodating supplementary data and enhancing overall spectral efficiency. The transmission performance of both the HP and LP subchannels is intricately linked to channel conditions and noise characteristics, as highlighted in previous works [17,18,19]. The robustness and reliability of the communication system, particularly in scenarios with dynamic channel conditions, are contingent upon the optimization and adaptation of these subchannels. Expanding our exploration to the realm of 64−QAM, as illustrated in Figure 1b, the complexity of the phase constellation intensifies with the introduction of three subchannels: HP, medium priority (MP), and LP. This multifaceted design aims to strike a delicate balance between increasing transmission rates and ensuring reliability in the communication system [13]. The HP subchannel continues to serve as the backbone for critical information, while the introduction of the medium priority (MP) subchannel provides an additional tier for accommodating diverse data types, thereby enhancing the system’s adaptability to a variety of communication scenarios. In summary, the proposed phase constellations, whether 16−QAM or 64−QAM, represent a sophisticated amalgamation of innovative design principles, ensuring adaptability, reliability, and efficiency within the ever-evolving landscape of communication systems.
While ensuring the transmission reliability of surveillance systems, the security of the surveillance systems should also be well considered. Besides preventing information content from being eavesdropped, we can even hide the existence of the information transmission process. Both conventional encryption and physical-layer security techniques aim to prevent transmission content from being eavesdropped [20,21]. To enhance the security of wireless surveillance systems, covert communication technologies have attracted substantial attention. Covert communication aims not only to protect the content of surveillance transmission but also hide the very existence of the surveillance transmission. Within the realm of covert communication, the paramount objective extends beyond securing the content of communication from adversarial interception: the imperative to hide the very occurrence of communication activities from potential adversaries is equally crucial to ensure the covertness of these operations [22].
In previous works, covert communication has been a focal point for governmental and military entities aiming to regulate the activities of specific organizations or conceal the intentions of operations within defined geographical areas [23,24]. Early wireless covert channels were predominantly explored through spread spectrum techniques [25]. However, the foundational limits of covert communication within the realm of information theory remained largely unexplored until the investigation of the square root law (SRL) within channels affected by additive white Gaussian noise (AWGN) [26]. Subsequently, the SRL was extended to diverse communication systems, including binary symmetric channels [27,28], discrete memoryless channels [29,30], and multiple access channels [31,32]. It is noteworthy that the SRL posits that if more than O ( n ) bits are transmitted through n channels, then as n approaches infinity, there is a high probability of the transmitter being detected or the receiver incurring a nonzero probability of decoding error [22]. Furthermore, the covert rate approaches zero as n grows to infinity, i.e., lim n O ( n ) n = 0 . This finding has spurred researchers to investigate methods for achieving positive covert rates [33]. Various strategies have been proposed to attain positive covert rates, including utilizing uniformed jammers [34], introducing noise uncertainty to adversaries, enlisting external friendly helpers, and manipulating the timing of covert communications [24]. However, sustaining the functionality of these energy-intensive communication devices poses a challenge, especially in unsafe environments or complex, sensitive areas that are challenging to access. The presence of communication devices or conspicuous electricity consumption may attract the attention of adversaries, underscoring the intricacies of maintaining covert operations in such contexts [35].
To covertly transmit surveillance videos to a designated recipient, the overall process encompasses the following procedural steps. Surveillance cameras capture monitoring data to generate surveillance videos. Subsequently, these videos are subjected to compression using an appropriate protocol, such as H.264/AVC. The compressed surveillance videos then undergo a covert transmission phase, comprising three steps: (1) adopting an appropriate encoding method, such as 16−QAM, 64−QAM, or 256−QAM, based on channel conditions; (2) configuring suitable transmission power for the covert transmission of the surveillance videos; (3) the receiver decoding the videos according to the selected encoding method. Diverging from the Gaussian codebooks that are prevalent in many theoretical covert communication studies [22,23,33], we adopt QAM codebooks that are commonly employed in video transmission to explore the theoretical bounds of covert transmission. In [36], the authors analyzed the covert transmission performance of phase-shift keying modulation in intelligent reflection surface systems; however, the covertness performance of QAM has not yet been investigated. In this work, we aim to investigate the performance of covert surveillance video transmission with QAM modulation. Leveraging the Taylor series expansion theory, we systematically conduct a comprehensive analysis, encompassing both transmission rates and covert aspects. Our investigation yields theoretical insights into facilitating the derivation of the necessary conditions governing the optimal modulation probability of constellation points under QAM modulation. Following this theoretical groundwork, we conduct a series of experimental simulations to rigorously validate our derived conclusions. Remarkably, our approach demonstrates a commendable performance, exhibiting superior transmission rates and enhanced covertness compared to existing methodologies. This success underscores the efficacy of our optimized strategy in the covert transmission of surveillance videos.
The rest of this paper is organized as follows: Section 2 introduces the surveillance video transmission scheme at the transmitter and receiver, as well as the hypothesis test of covert surveillance video transmission at an adversary, and an optimization problem of constellation transmission probability and amplitude gain is also formulated, aiming to maximize the transmission rate; Section 3.1 analyzes the transmission rates of surveillance videos; Section 3.2 and Section 3.3 present the covertness performance of the surveillance video transmission and the theorem of the optimal conditions of QAM modulation; Section 4 provides the experiments and analysis to verify the performance of our research; Section 5 concludes the paper.

2. Transmission Scheme and Hypothesis Test

2.1. Transmission Scheme

Hierarchical modulations are initially proposed to provide different classes of data for users under different wireless signal reception conditions [37,38]. In Figure 1a,b, 16−QAM and 64−QAM square constellations are provided. In the 16−QAM square constellation, the distance of each constellation point from the boundary of its decision region for the two most significant bits (MSBs) is either “1” or “3” [15]. The 16−QAM coordinates sequence is given as
d 16 Q A M = 3 1 1 3 ,
and the coordinates of the constellation points of the in-phase (I) and quadrature-phase (Q) bits are selected from that sequence. In conventional coding schemes, constellation points are selected with equal probability [13]. In this work, we optimize the modulation probability of the constellation points. Furthermore, we can provide the general form of the coordinate sequence for QAM as
d = N + 1 N + 3 N 3 N 1
and the value of the i-th symbol is given by
d [ i ] = N + 2 i 1 ,
where N is the number of in-phase (I) and quadrature-phase (Q) coordinate value sets of constellation points. Specifically, when employing 16−QAM, the parameter N is 4; meanwhile, when utilizing 64−QAM, the parameter N is 8. Commonly recognized signal modulation techniques encompass four distinct QAM constellations: 4−QAM (N = 2), 16−QAM (N = 4), 64−QAM (N = 8), and 256−QAM (N = 16).
Assuming that the transmission probability of the constellation point in row j and column k is p j , k , the probability density function at the receiver can be expressed as
P b = j = 1 N k = 1 N p j , k · q j , k , b ( x , y ) ,
where
q j , k , b ( x , y ) = 1 2 π σ b 2 exp ( x + g b d [ j ] β ) 2 2 σ b 2 ( y + g b d [ k ] β ) 2 2 σ b 2 ,
and g b denotes the channel gain coefficient, σ b is the one-sided noise spectral density of the additive white Gaussian noise [15], and β denotes the amplitude gain of the transmitted symbols.
When the encoded surveillance videos are transmitted through AWGN channels, they are susceptible to being corrupted by Gaussian noise. In Figure 2, the blue constellation points represent the original constellation, while the red constellation points depict the constellation points that are corrupted by noise.
Assuming a surveillance video is transmitted with n symbols, the transmission rate can be measured with mutual information, which is given by
R b = I ( Z b n ; X n ) ,
where Z b denotes the symbols received by the receiver and X denotes the symbols sent by the transmitter.

2.2. Hypothesis Test

To determine whether a surveillance video is transmitted, the adversary performs a binary hypothesis test [22] based on n successive observations Z w n = [ Z w , 1 , , Z w , n ] R K × n . Let H 0 denote the null hypothesis and H 1 denote the alternative hypothesis. Then, the total detection error probability of the adversary is defined as [39,40,41]
Pr ( D 1 | H 0 ) + Pr ( D 0 | H 1 ) = 1 V ( Q 1 , w n Q 0 , w n ) ,
where Pr ( D 1 | H 0 ) denotes the probability of a false alarm (i.e., rejecting H 0 when it is true) and Pr ( D 0 | H 1 ) denotes the probability of a missed detection (i.e., accepting H 0 when it is false). Moreover, Q 1 , w n and Q 0 , w n denote the likelihood functions of Z w n under H 0 and H 1 , while V ( Q 1 , w n Q 0 , w n ) denotes the total variation distance between Q 1 , w n and Q 0 , w n .
Similar to Equation (4), the probability density functions of Q 1 , w n and Q 0 , w n at the adversary can be expressed as
Q 0 , w = 1 2 π σ w 2 exp x 2 + y 2 2 σ w 2 ,
and
Q 1 , w = j = 1 N k = 1 N p j , k · q j , k , w ( x , y ) ,
where
q j , k , w ( x , y ) = 1 2 π σ w 2 exp ( x + g w d [ j ] β ) 2 2 σ w 2 ( y + g w d [ k ] β ) 2 2 σ w 2 .
Based on the Pinsker inequality [22,29,42], we can obtain the upper bound of total variation
V ( Q 1 , w n Q 0 , w n ) 1 2 D ( Q 1 , w n Q 0 , w n ) ,
where D ( Q 1 , w n Q 0 , w n ) is the KL divergence between Q 1 , w n and Q 0 , w n . Let
V ( Q 1 , w n Q 0 , w n ) ϵ ,
where ϵ [ 0 , 1 ] denotes the covertness parameter. With some transformation, the covertness constraint can be expressed as
D ( Q 1 , w n Q 0 , w n ) 2 ϵ 2 .

3. Performance Analysis of Covert Surveillance Video Transmission

In previous works [40,43], the performance metrics of covert transmission, i.e., KL divergence and mutual information, have been approximated using intricate integration calculations or less stringent constraints. As depicted in Figure 3, in this section, we introduce a precise approximation method based on the Taylor series expansion theory. This method transforms intricate integration computations into straightforward summations, thereby reducing computational complexity while ensuring the accuracy of results.

3.1. Analysis of Transmission Rates

When a surveillance video is transmitted with QAM modulation, the transmission rate can be measured with mutual information. Recalling the probability density function given in (4), the mutual information can be expressed as
R b = n H ( Z b ) n H ( Z b | X )
= n t = 1 N s = 1 N p t , s q t , s , b ( x , y ) log j = 1 N k = 1 N p j , k q j , k , b ( x , y ) q t , s , b ( x , y ) d x d y .
Now, we define
F ( β ) log j = 1 N k = 1 N p j , k q j , k , b ( x , y ) q t , s , b ( x , y )
log j = 1 N k = 1 N p j , k exp G j , k ( β ) ,
where
G j , k 2 x β g b ( d [ j ] d [ t ] ) + 2 y β g b ( d [ k ] d [ s ] ) 2 σ b 2
β 2 g b 2 ( d [ j ] 2 d [ t ] 2 + d [ k ] 2 d [ s ] 2 ) 2 σ b 2 .
Taking the derivative of G j , k with respect to β and setting β to 0, we can obtain
G j , k ( 0 ) = 0 ,
G j , k ( 0 ) = x g b ( d [ j ] d [ t ] ) + y g b ( d [ k ] d [ s ] ) σ b 2 ,
G j , k ( 0 ) = g b 2 ( d [ j ] 2 d [ t ] 2 + d [ k ] 2 d [ s ] 2 ) σ b 2 .
Taking the derivative of F ( β ) and setting β to 0, we can obtain
F ( 0 ) = j = 1 N k = 1 N p j , k G j , k ( 0 ) ,
F ( 0 ) = j = 1 N k = 1 N p j , k G j , k ( 0 ) 2 + j = 1 N k = 1 N p j , k ( G j , k ( 0 ) ) 2 + G j , k ( 0 ) .
Using the Taylor series expansion, when β 0 , we have
t = 1 N s = 1 N p t , s q t , s , b ( x , y ) log j = 1 N k = 1 N p j , k q j , k , b ( x , y ) q t , s , b ( x , y ) d x d y = t = 1 N s = 1 N p t , s q t , s , b ( x , y ) β F ( 0 ) + β 2 2 F ( 0 ) + O ( β 3 ) d x d y .
Then, we can obtain
t = 1 N s = 1 N p t , s q t , s , b ( x , y ) β F ( 0 ) d x d y = β 2 g b 2 t = 1 N s = 1 N j = 1 N k = 1 N p j , k p t , s d [ j ] d [ t ] + d [ k ] d [ s ] d [ t ] 2 d [ s ] 2 σ b 2 ,
and
t = 1 N s = 1 N p t , s q t , s , b ( x , y ) β 2 2 F ( 0 ) d x d y = β 2 g b 2 t = 1 N s = 1 N p t , s d [ t ] 2 + d [ s ] 2 2 σ b 2 β 2 g b 2 t = 1 N s = 1 N p t , s p j , k d [ t ] 2 + t = 1 N s = 1 N p t , s d [ s ] 2 2 σ b 2 .
Combining (15), (23), (25), and (26), the covert transmission rate of a surveillance video can be expressed as
I ( Z b n ; X n ) = n β 2 g b 2 t = 1 N s = 1 N p t , s d [ t ] 2 + d [ s ] 2 2 σ b 2 n β 2 g b 2 t = 1 N s = 1 N p t , s d [ t ] 2 + t = 1 N s = 1 N p t , s d [ s ] 2 2 σ b 2 .

3.2. Analysis of Covertness Performance

In Equation (13), we measure the covertness performance with KL divergence. For any QAM modulation, the KL divergence can be expressed as
D ( Q 1 , w n Q 0 , w n ) = n D ( Q 1 , w Q 0 , w ) .
Then, we have
D ( Q 1 , w Q 0 , w ) = Q 1 , w ( x , y ) log Q 1 , w ( x , y ) Q 0 , w ( x , y ) d x d y
= t = 1 N s = 1 N p t , s q t , s , w ( x , y ) log j = 1 N k = 1 N p j , k q j , k , w ( x , y ) q 0 ( x , y ) d x d y ,
where
q j , k , w ( x , y ) = 1 2 π σ w 2 exp ( x + g w d [ j ] β ) 2 2 σ w 2 ( y + g w d [ k ] β ) 2 2 σ w 2 ,
q 0 ( x , y ) = 1 2 π σ w 2 exp x 2 + y 2 2 σ w 2 .
For ease of notation, we define the functions as
T ( β ) log j = 1 N k = 1 N p j , k , w q j , k , w ( x , y ) q 0 ( x , y )
log j = 1 N k = 1 N p j , k , w exp K j , k ( β ) ,
where
K j , k 2 x d [ j ] g w β + 2 y d [ k ] g w β + β 2 g w 2 ( d [ j ] 2 + d [ k ] 2 ) 2 σ w 2 .
Differentiating with respect to β in the function g ( β ) , we can obtain
T ( β ) = 1 j = 1 N k = 1 N p j , k , w exp K j , k i = 1 N p j , k exp K j , k K j , k , T ( β ) = 1 j = 1 N k = 1 N p j , k , w exp K j , k 2 j = 1 N k = 1 N p j , k , w exp K j , k K j , k 2
+ 1 j = 1 N k = 1 N p j , k , w exp K j , k j = 1 N k = 1 N p j , k , w exp K j , k ( K j , k ) 2 + K j , k .
Given the constraints imposed by space limitations, the nuanced expressions for K j , k ( β ) and T ( β ) concerning the derivative with respect to β are regrettably omitted.
Consequently, we proceed to derive the expressions for T ( 0 ) , T ( 0 ) , T ( 0 ) , and T ( 0 ) . Leveraging the Taylor series expansion, we arrive at
D ( Q 1 , w Q 0 , w ) = Q 1 , w ( x , y ) log Q 1 , w ( x , y ) Q 0 , w ( x , y ) d x d y
= t = 1 N s = 1 N p t , s q t , s , w ( x , y ) β T ( 0 ) + β 2 2 ! T ( 0 ) + β 3 3 ! T ( 0 ) + β 4 4 ! T ( 0 ) d x d y .
Based on (39), we can calculate the first and second terms, which are given by
t = 1 N s = 1 N p t , s q t , s , w ( x , y ) β T ( 0 ) d x d y = β 2 g w 2 t = 1 N s = 1 N j = 1 N k = 1 N p j , k p t , s d [ j ] d [ t ] + d [ k ] d [ s ] σ w 2 ,
and
t = 1 N s = 1 N p t , s q t , s , w ( x , y ) β 2 2 T ( 0 ) d x d y = β 2 g w 2 2 t = 1 N s = 1 N j = 1 N k = 1 N p j , k p t , s d [ j ] d [ t ] + d [ k ] d [ s ] σ w 2 + β 4 g w 4 2 σ w 4 t = 1 N s = 1 N j = 1 N k = 1 N p j , k p t , s d [ j ] 2 d [ t ] 2 + d [ k ] 2 d [ s ] 2 + 2 d [ t ] d [ s ] d [ j ] d [ k ] .
Then, we consider two cases.
(a) Case 1: If we have j = 1 N k = 1 N p j , k d [ j ] 0 and j = 1 N k = 1 N p j , k d [ k ] 0 , the KL divergence can be expressed as
D ( P 1 , w n P 0 , w n ) = n g w 2 2 σ w 2 t = 1 N s = 1 N p t , s d [ t ] ) 2 + ( t = 1 N s = 1 N p t , s d [ s ] 2 β 2 = O ( β 2 ) ,
and the transmission rate is given by
I ˜ ( Z b n ; D n ) = ϵ g b 2 σ w 2 [ t = 1 N s = 1 N p t , s d [ t ] 2 + d [ s ] 2 ( t = 1 N s = 1 N p t , s d [ t ] ) 2 t = 1 N s = 1 N p t , s d [ s ] ) 2 g w 2 σ b 2 t = 1 N s = 1 N p t , s d [ t ] ) 2 + ( t = 1 N s = 1 N p t , s d [ s ] 2
= O ( 1 ) .
It is imperative to emphasize that the mutual information is represented as O ( 1 ) , indicating a fixed value that remains invariant with changes in encoding length. This produces an exceptionally low covert signal transmission rate, typically in the order of O ( n ) in traditional signal transmission scenarios. It is also a significantly low rate within the domain of covert communication, often characterized by O ( n ) . In this case, the covertness of video transmission relies on the adoption of extremely low video signal transmission rates. This implies that within the parameters outlined in Case 1, the scenario falls short of attaining the standard covert communication rate, i.e., O ( n ) .
(b) Case 2: If we have j = 1 N k = 1 N p j , k d [ j ] = 0 and j = 1 N k = 1 N p j , k d [ k ] = 0 , we can obtain
t = 1 N s = 1 N p t , s q t , s , w ( x , y ) β T ( 0 ) d x d y = 0 , t = 1 N s = 1 N p t , s q t , s , w ( x , y ) β 2 2 ! T ( 0 ) d x d y
= β 4 g w 4 2 σ w 4 t = 1 N s = 1 N j = 1 N k = 1 N p j , k p t , s d [ j ] 2 d [ t ] 2 + d [ k ] 2 d [ s ] 2 + 2 d [ t ] d [ s ] d [ j ] d [ k ] ,
t = 1 N s = 1 N p t , s q t , s , w ( x , y ) β 3 3 ! T ( 0 ) d x d y = 0 , t = 1 N s = 1 N p t , s q t , s , w ( x , y ) β 4 4 ! T ( 0 ) d x d y
= β 4 g w 4 4 σ w 4 t = 1 N s = 1 N j = 1 N k = 1 N p j , k p t , s d [ j ] 2 d [ t ] 2 + d [ k ] 2 d [ s ] 2 + 2 d [ t ] d [ s ] d [ j ] d [ k ] .
Combining (39) with (45)–(48), we have
D ( Q 1 , w n Q 0 , w n ) = n β 4 g w 4 4 σ w 4 t = 1 N s = 1 N p t , s d [ t ] 2 2 + t = 1 N s = 1 N p t , s d [ s ] 2 2 + 2 t = 1 N s = 1 N p t , s d [ t ] d [ s ] 2
= O ( β 4 ) ,
and the transmission rate is given by
I ( Z b n ; D n ) = n ϵ g b 2 σ w 2 t = 1 N s = 1 N p t , s d [ t ] 2 + d [ s ] 2 σ b 2 g w 2 t = 1 N s = 1 N p t , s d [ t ] 2 2 + t = 1 N s = 1 N p t , s d [ s ] 2 2 + 2 t = 1 N s = 1 N p t , s d [ t ] d [ s ] 2
= O ( n ) .
As discussed in Case 1, the typical rate for covert communication is characterized by O ( n ) . Building upon the conditions outlined in Case 2, we can ascertain a transmission rate of O ( n ) . This implies that the conditions specified in Case 2 are prerequisite for achieving covert communication.

3.3. Theorem of the Necessary Conditions for Covert Surveillance Video Transmission

In Section 3.1 and Section 3.2, we characterize transmission rates based on mutual information and covertness performance based on KL divergence. Through derivation based on mutual information, we can obtain the maximum theoretical rate of the covert transmission of surveillance videos, providing theoretical support for the selection and setting of transmission protocols. Through derivation based on KL divergence, we can determine the covertness indicator of the covert transmission of surveillance videos, thus characterizing the covertness and security of transmission. The rate, covertness, and security of the covert transmission of surveillance videos are important parameters and necessary conditions for transmission. Specifically, through the optimization of the probability distributions of QAM modulation constellation points, we can achieve optimal covertness performance while maximizing covert transmission rates.
In the preceding subsection, we presented covert transmission rate and covertness analyses for two different cases. It can be seen in (49) and (51) that when the necessary conditions (i.e., j = 1 N k = 1 N p j , k d [ j ] = 0 and j = 1 N k = 1 N p j , k d [ k ] = 0 ) are satisfied, a surveillance video can be transmitted with a rate of O ( n ) and a covertness parameter of O ( β 4 ) . As shown in (42) and (43), if the necessary conditions are not satisfied, the transmission rate deteriorates to O ( 1 ) and covertness deteriorates to O ( β 2 ) . In previous research, the covert transmission rate is O ( n ) and the covertness performance measured by KL divergence is O ( β 4 ) . Thus, we obtain the necessary conditions for surveillance video transmission based on QAM modulation in the following theorem.
Theorem 1.
For any surveillance video transmitted using the QAM modulation method, the prerequisite for achieving optimal covert transmission is that j = 1 N k = 1 N p j , k d [ j ] = 0 and j = 1 N k = 1 N p j , k d [ k ] = 0 .
Building upon the theorem presented, we can design the modulation probabilities of QAM constellation points to improve transmission rates and covertness. This optimization facilitates the attainment of accelerated transmission rates while maintaining commensurate levels of covertness. It is imperative to emphasize that these fundamental conditions, anchored in QAM modulation, are not limited to conventional sets, such as 16−QAM, 64−QAM, and 256−QAM. Instead, they establish a broad-reaching conclusion that holds applicability across a diverse spectrum of constellation point modulation methodologies.

4. Experiments and Analysis

In this section, we present simulation results based on test conditions, showcasing the transmission rates of surveillance videos under different transmission powers and the covertness performance metrics corresponding to these power levels. Throughout all subsequent tests, the 16−QAM modulation scheme, as employed in the H.264/AVC protocol, is utilized. Additionally, we conduct comparisons of transmission rates and covertness metric values based on various channel coefficients and receiver noise levels. To assess the effectiveness and superiority of the proposed optimal probability theory, we compare optimization results obtained using the backtracking line method from [40].
To enhance the effectiveness and authenticity of the experimental results, we set the experimental parameters as follows: the covert signal detection channel coefficient g w is set to 0.4 and 0.8 and the covert communication detection channel noise variance σ w is set to 1.5 and 1, respectively; the covert signal receiver channel coefficient g b is set to 0.4 and 0.8 and the covert signal receiver channel noise variance σ w is set to 1.5 and 1, respectively. Additionally, we set the code block length n to 1 × 10 6 and the number of symbols in a single-axis constellation set N to 4.
Figure 4a provides a visual comparison of the outcomes obtained using our novel Taylor expansion method and the exact values. The covertness metric ϵ , spanning from 0 to 1, serves as an indicator of covertness performance, with smaller values denoting enhanced concealment. As depicted in the visual representation, there is a noticeable decline in transmission rate as the covertness metric diminishes. Remarkably, our proposed Taylor expansion approximation method exhibits a remarkable concordance with the computationally derived exact values. This alignment underscores the high degree of accuracy achieved by our approximation approach. Such close correspondence not only validates the precision of our proposed method but also underscores the efficacy of the theoretical framework derived from this approximation. Figure 4b illustrates the relationship between absolute error and the covertness metric ϵ . As the covertness metric decreases, the fitting accuracy exhibits exponential improvement. In the considered scenarios ( ϵ 0.01 ), the fitting accuracy reaches 10 5 , fully satisfying the precision requirements for our experimental objectives. This validation further solidifies the practical applicability and robustness of our proposed approach within the context of covert communication systems.
Figure 5a provides a comprehensive depiction of the intricate trade-off between the covertness metric and transmission power across varying detection channel coefficients. To benchmark the efficacy of our proposed theoretical framework, we systematically contrast its outcomes to optimization results derived using the backtracking line method. Specifically, we investigate covert transmission scenarios for surveillance videos by setting the detection channel coefficient g w to the values of 0.4 and 0.8. At g w = 0.4, our proposed methodology reveals a discernible decline in covertness performance with increasing transmission power. Notably, at lower power levels, our approach consistently outshines the comparative backtracking line method, as evidenced by lower covertness metric values. This observation underscores the superiority of our method in achieving enhanced covertness, particularly when confronted with constraints on power levels. Conversely, at higher transmission power levels, both methodologies converge to approximately equal covertness metric values. This convergence suggests that relying solely on the design of QAM constellation probabilities may not be sufficient to ensure the covert transmission of surveillance videos at elevated power levels. However, even in this regime, our proposed method maintains a competitive covertness performance. Furthermore, at g w = 0.4, our approach showcases superior covertness, indicating a substantial enhancement in performance as the channel gain coefficient decreases. This resilience underscores the effectiveness of our proposed method under diverse channel conditions. In both low- and high-power scenarios, our method consistently outperforms the comparative approach, emphasizing its robust covertness performance under varying operational conditions. This comprehensive analysis reinforces the practical relevance and efficacy of our proposed methodology within the realm of covert communication for surveillance applications.
Figure 5b depicts the relationship between the covertness metric and transmission power across varying levels of detection channel noise power. Notably, our proposed method consistently surpasses the comparative backtracking line method in terms of covertness performance. This observed superiority is particularly evident as the detection channel noise power escalates, leading to a substantial enhancement in covertness. With a discerning eye on the dynamics of covertness performance, it becomes apparent that at lower power levels, our proposed method demonstrates notable superiority in maintaining effective concealment. The inherent robustness of our approach is especially pronounced in scenarios characterized by limited power availability. However, it is crucial to note that with an increase in transmission power, there is a discernible deterioration in covertness performance. This phenomenon emphasizes the intricate interplay between transmission power and covertness, highlighting the challenges posed by higher power scenarios. Further insights into the trade-offs and optimal strategies under varying conditions can be gleaned from a nuanced examination of the results. Our findings underscore the effectiveness of the proposed methodology in covert surveillance video transmission, showcasing its resilience in the presence of variations in detection channel noise power levels. The observed trends provide valuable insights for practitioners seeking to optimize covertness performance in real-world surveillance applications.
Figure 6a provides a visual representation of the dynamic interplay between transmission rate and transmission power for various receiver channel coefficients. The graph prominently illustrates that with an escalation in transmission power, there is a substantial improvement in transmission rate. This observation underscores the pivotal role of power in influencing the efficiency of covert surveillance video transmission. Whether examining scenarios with a receiver channel coefficient of g b = 0.4 or g b = 0.8, our proposed method consistently outperforms the comparative method, yielding higher transmission rates. This consistency across different channel coefficients reaffirms the robustness and versatility of our approach, making it well suited for a spectrum of operational conditions. Furthermore, as the channel coefficient increases, we observe a notable enhancement in transmission rate. This behavior aligns with the expected trend, indicating that a higher channel coefficient contributes to improved communication efficiency. These results illuminate the positive correlation between transmission power and transmission rate, emphasizing the significance of power optimization strategies in enhancing the efficiency of covert surveillance video communication. The insights gained from this analysis provide valuable guidance for practitioners seeking to optimize transmission rates in covert surveillance video communication systems under varying channel conditions.
Figure 6b provides a detailed portrayal of the nuanced relationship between transmission rate and transmission power for different receiver noise power levels. It is discernible that as channel noise increases, there is a noteworthy reduction in transmission rate. Our proposed method consistently outshines the comparative approach, showcasing higher transmission rates at both low and high power levels. It is also noteworthy that at transmission power levels below 0.2 watts, our proposed method exhibits a higher transmission rate when the noise variance σ b is 1.5 compared to existing methods at σ b =1. This suggests that our proposed method achieves faster transmission rates under low power conditions, with more pronounced improvements in transmission rates compared to high-power scenarios.
Figure 7 illustrates transmission rates under different levels of covertness using our proposed method and the comparative approach. This figure illuminates a trend wherein as covertness increases, both methods experience declines in transmission rates. Notably, our proposed method consistently maintains a superior position compared to the comparative approach, effectively enhancing covertness while sustaining competitive transmission rates. A critical consideration arises from the comparison of results in Figure 5a,b. The substantial divergence in covertness metrics between the proposed method and the comparative approach underscores the challenge of directly comparing transmission rates under equivalent covertness conditions. Our proposed method stands out by simultaneously achieving superior covertness and higher transmission rates, underscoring its effectiveness in optimizing both aspects of covert communication. In summary, our findings demonstrate the intricate interplay between transmission rate, transmission power, and covertness, with our proposed method consistently achieving enhanced covertness and superior transmission rates across diverse operational scenarios.
In this section, we first validated the accuracy of our Taylor series expansion method. Subsequently, we compared existing methods to our proposed optimization method in terms of covertness performance under different channel coefficients and noise conditions for the sender, as well as transmission rates under different channel coefficients and noise conditions for the receiver. Finally, in the same environment, we compared the covertness performance and transmission rate of our proposed method to those of existing methods. Under the same covertness indicator, our proposed method has a higher transmission rate. This implies that surveillance videos can be covertly transmitted at a higher rate, corresponding to higher video clarity and shorter video transmission times.

5. Conclusions

In this paper, we delved into the intricacies of optimization techniques for the covert transmission of surveillance videos. Our primary focus centered on a meticulous exploration of the optimal probability of covert surveillance video transmission within the framework of QAM modulation. We employed mutual information as a metric for assessing covert transmission rate, leveraging its ability to quantify information shared between transmitted signals and the corresponding received signals. Simultaneously, we employed KL divergence as a measure to evaluate the covertness performance of transmitted signals. Based on the Taylor series expansion theory, we systematically conducted a thorough analysis, encompassing both the transmission rate and covertness aspects. In the considered scenarios, the fitting accuracy reached 10 5 , fully satisfying the precision requirements for our experimental objectives.
Our investigation resulted in theoretical insights into the requisite conditions governing the optimal modulation probability of constellation points under QAM modulation. The covert transmission rate is O ( n ) when our proposed theoretical conditions are satisfied; otherwise, it is O ( 1 ) , representing a significant disparity. Subsequent to this theoretical groundwork, we embarked on a series of experimental simulations, which were designed to rigorously validate our derived conclusions. Notably, our approach exhibited a commendable performance, showcasing superior transmission rates and increased covertness compared to existing methodologies. This success underscores the efficacy of our optimized strategy for the covert transmission of surveillance videos.
In future work, our research trajectory includes an expansion of our focus beyond QAM modulation to encompass diverse transmission protocols for surveillance videos. This extension aims to develop additional covert transmission strategies and methodologies, contributing to the broader advancement of covert communication in surveillance scenarios.

Author Contributions

Conceptualization, S.Q. and G.L.; methodology, S.Q. and G.L.; software, J.Z. and X.J.; validation, S.Q. and X.J.; writing—original draft preparation, H.D. and G.L.; writing—review and editing, J.Z. and H.D.; visualization, H.D. and X.J.; supervision, S.Q. and J.Z.; funding acquisition, G.L. All authors have read and agreed to the published version of the manuscript.

Funding

This research was funded by the National Natural Science Foundation of China (grant numbers U1836104, 61801073, 61931004, and 62072250), the National Key Research and Development Program of China (grant number 2021QY0700), and The Startup Foundation for Introducing Talent of NUIST (grant number 2021r039).

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

The data presented in this study are available in article.

Conflicts of Interest

The authors declare no conflicts of interest. The funders had no role in the design of the study, the collection, analyses, or interpretation of the data, the writing of the manuscript, or the decision to publish the results.

Abbreviations

The following abbreviations are used in this manuscript:
HEVCHigh-efficiency video coding
AV1AOMedia Video 1
QAMQuadrature amplitude modulation
AWGNAdditive white Gaussian noise
AVCAdvanced video coding

References

  1. Shao, Z.; Cai, J.; Wang, Z. Smart Monitoring Cameras Driven Intelligent Processing to Big Surveillance Video Data. IEEE Trans. Big Data 2018, 4, 105–116. [Google Scholar] [CrossRef]
  2. Dbouk, M.; Mcheick, H.; Sbeity, I. CityPro: An Integrated City-protection Collaborative Platform. Procedia Comput. Sci. 2014, 37, 72–79. [Google Scholar] [CrossRef]
  3. Purohit, M.; Singh, M.; Yadav, S.; Singh, A.K.; Kumar, A.; Kaushik, B.K. Multi-Sensor Surveillance System Based on Integrated Video Analytics. IEEE Sens. J. 2022, 22, 10207–10222. [Google Scholar] [CrossRef]
  4. Räty, T.D. Survey on Contemporary Remote Surveillance Systems for Public Safety. IEEE Trans. Syst. Man Cybern. Part C (Appl. Rev.) 2010, 40, 493–515. [Google Scholar] [CrossRef]
  5. Hu, S.; Ni, W.; Wang, X.; Jamalipour, A.; Ta, D. Joint optimization of trajectory, propulsion, and thrust powers for covert UAV-on-UAV video tracking and surveillance. IEEE Trans. Inf. Forensics Secur. 2020, 16, 1959–1972. [Google Scholar] [CrossRef]
  6. Yuan, H.; Wang, Q.; Liu, Q.; Huo, J.; Li, P. Hybrid distortion-based rate-distortion optimization and rate control for H. 265/HEVC. IEEE Trans. Consum. Electron. 2021, 67, 97–106. [Google Scholar] [CrossRef]
  7. Chen, Z.; Pan, X. An optimized rate control for low-delay H. 265/HEVC. IEEE Trans. Image Process. 2019, 28, 4541–4552. [Google Scholar] [CrossRef]
  8. Pastuszak, G. Multisymbol architecture of the entropy coder for H. 265/HEVC video encoders. IEEE Trans. Very Large Scale Integr. (VLSI) Syst. 2020, 28, 2573–2583. [Google Scholar] [CrossRef]
  9. Siqueira, Í.; Corrêa, G.; Grellert, M. Complexity and Coding Efficiency Assessment of AOMedia Video 1. In Proceedings of the 2023 IEEE 14th Latin America Symposium on Circuits and Systems (LASCAS), Quito, Ecuador, 28 February–3 March 2023; IEEE: Piscataway, NJ, USA, 2023; pp. 1–4. [Google Scholar]
  10. Bender, I.; Borges, A.; Agostini, L.; Zatt, B.; Correa, G.; Porto, M. Complexity and compression efficiency analysis of libaom AV1 video codec. J. Real-Time Image Process. 2023, 20, 50. [Google Scholar] [CrossRef]
  11. Barmada, B.; Ghandi, M.; Jones, E.; Ghanbari, M. Prioritized transmission of data partitioned H.264 video with hierarchical QAM. IEEE Signal Process. Lett. 2005, 12, 577–580. [Google Scholar] [CrossRef]
  12. Wiegand, T.; Schwarz, H.; Joch, A.; Kossentini, F.; Sullivan, G. Rate-constrained coder control and comparison of video coding standards. IEEE Trans. Circuits Syst. Video Technol. 2003, 13, 688–703. [Google Scholar] [CrossRef]
  13. Gharavi, H. Pilot-assisted 16-level QAM for wireless video. IEEE Trans. Circuits Syst. Video Technol. 2002, 12, 77–89. [Google Scholar] [CrossRef]
  14. Mvone, R.; Hannachi, C.; Hammou, D.; Moldovan, E.; Tatu, S. Optimization of 16-QAM and 32-QAM constellations for mitigating impairments of phase noise in millimeter-wave receivers. IEEE Trans. Wirel. Commun. 2021, 21, 3605–3616. [Google Scholar] [CrossRef]
  15. Stedman, R.; Gharavi, H.; Hanzo, L.; Steele, R. Transmission of subband-coded images via mobile channels. IEEE Trans. Circuits Syst. Video Technol. 1993, 3, 15–26. [Google Scholar] [CrossRef]
  16. Webb, W.T.; Hanzo, L. Modern Quadrature Amplitude Modulation: Principles and Applications for Fixed and Wireless Channels: One; IEEE Press: Piscataway, NJ, USA; John Wiley: Hoboken, NJ, USA, 1994. [Google Scholar]
  17. Bai, C.; Ren, H.P.; Kolumbán, G. Double-Sub-Stream M-ary Differential Chaos Shift Keying Wireless Communication System Using Chaotic Shape-Forming Filter. IEEE Trans. Circuits Syst. I Regul. Pap. 2020, 67, 3574–3587. [Google Scholar] [CrossRef]
  18. Maharaj, B.T.; Awoyemi, B.S.; Maharaj, B.T.; Awoyemi, B.S. Queuing systems in resource allocation optimisation for cognitive radio networks. In Developments in Cognitive Radio Networks: Future Directions for Beyond 5G; Springer: Cham, Switzerland, 2022; pp. 121–139. [Google Scholar]
  19. Shirin Abkenar, F.; Rahbar, A.G. The energy minimization algorithm for elastic optical networks. Photonic Netw. Commun. 2021, 42, 15–26. [Google Scholar] [CrossRef]
  20. Hamamreh, J.M.; Furqan, H.M.; Arslan, H. Classifications and Applications of Physical Layer Security Techniques for Confidentiality: A Comprehensive Survey. IEEE Commun. Surv. Tutor. 2019, 21, 1773–1828. [Google Scholar] [CrossRef]
  21. Hu, M.; Qiao, S.; Ji, X. Wireless Covert Communication with Polarization Dirty Constellation. Appl. Sci. 2023, 13, 3451. [Google Scholar] [CrossRef]
  22. Bash, B.A.; Goeckel, D.; Towsley, D. Limits of Reliable Communication with Low Probability of Detection on AWGN Channels. IEEE J. Sel. Areas Commun. 2013, 31, 1921–1930. [Google Scholar] [CrossRef]
  23. Shahzad, K.; Zhou, X.; Yan, S.; Hu, J.; Shu, F.; Li, J. Achieving Covert Wireless Communications Using a Full-Duplex Receiver. IEEE Trans. Wirel. Commun. 2018, 17, 8517–8530. [Google Scholar] [CrossRef]
  24. Bash, B.A.; Goeckel, D.; Towsley, D. Covert communication gains from adversary’s ignorance of transmission time. IEEE Trans. Wirel. Commun. 2016, 15, 8394–8405. [Google Scholar] [CrossRef]
  25. Marvin, S.; Jim, O.; Robert, S.; Barry, L. Spread Spectrum Communications Handbook, Electronic Edition, 1st ed.; McGraw-Hill Education: New York, NY, USA, 2002. [Google Scholar]
  26. Bash, B.A.; Goeckel, D.; Towsley, D. Square root law for communication with low probability of detection on AWGN channels. In Proceedings of the IEEE International Symposium on Information Theory, Cambridge, MA, USA, 1–6 July 2012; pp. 448–452. [Google Scholar]
  27. Che, P.H.; Bakshi, M.; Jaggi, S. Reliable deniable communication: Hiding messages in noise. In Proceedings of the 2013 IEEE International Symposium on Information Theory, Istanbul, Turkey, 7–12 July 2013; pp. 2945–2949. [Google Scholar]
  28. Wang, S.Y.; Bloch, M.R. Explicit Design of Provably Covert Channel Codes. In Proceedings of the IEEE International Symposium on Information Theory, Melbourne, Australia, 12–20 July 2021; pp. 190–195. [Google Scholar] [CrossRef]
  29. Wang, L.; Wornell, G.W.; Zheng, L. Fundamental limits of communication with low probability of detection. IEEE Trans. Inf. Theory 2016, 62, 3493–3503. [Google Scholar] [CrossRef]
  30. Tahmasbi, M.; Bloch, M.R.; Tan, V.Y. Error exponent for covert communications over discrete memoryless channels. In Proceedings of the 2017 IEEE Information Theory Workshop (ITW), Kaohsiung, Taiwan, 6–10 November 2017; pp. 304–308. [Google Scholar]
  31. Arumugam, K.S.K.; Bloch, M.R. Keyless covert communication over multiple-access channels. In Proceedings of the IEEE International Symposium on Information Theory, Barcelona, Spain, 10–15 July 2016; pp. 2229–2233. [Google Scholar]
  32. Arumugam, K.S.K.; Bloch, M.R. Covert Communication Over a K-User Multiple-Access Channel. IEEE Trans. Inf. Theory 2019, 65, 7020–7044. [Google Scholar] [CrossRef]
  33. Zheng, T.X.; Wang, H.M.; Ng, D.W.K.; Yuan, J. Multi-Antenna Covert Communications in Random Wireless Networks. IEEE Trans. Wirel. Commun. 2019, 18, 1974–1987. [Google Scholar] [CrossRef]
  34. Sobers, T.V.; Bash, B.A.; Guha, S.; Towsley, D.; Goeckel, D. Covert communication in the presence of an uninformed jammer. IEEE Trans. Wirel. Commun. 2017, 16, 6193–6206. [Google Scholar] [CrossRef]
  35. Shahzad, K.; Zhou, X. Covert communication in backscatter radio. In Proceedings of the ICC 2019—2019 IEEE International Conference on Communications (ICC), Shanghai, China, 20–24 May 2019; pp. 1–6. [Google Scholar]
  36. Qiao, S.; Cao, D.; Zhang, Q.; Xu, Y.; Liu, G. Covert Communication Gains From Adversary’s Uncertainty of Phase Angles. IEEE Trans. Inf. Forensics Secur. 2023, 18, 2899–2912. [Google Scholar] [CrossRef]
  37. O’Leary, S. Hierarchical transmission and COFDM systems. IEEE Trans. Broadcast. 1997, 43, 166–174. [Google Scholar] [CrossRef]
  38. Chang, Y.C.; Lee, S.W.; Komiya, R. A Low Complexity Hierarchical QAM Symbol Bits Allocation Algorithm for Unequal Error Protection of Wireless Video Transmission. IEEE Trans. Consum. Electron. 2009, 55, 1089–1097. [Google Scholar] [CrossRef]
  39. Cover, T.M. Elements of Information Theory; John Wiley & Sons: Hoboken, NJ, USA, 1999. [Google Scholar]
  40. Ma, S.; Zhang, Y.; Sheng, H.; Li, H.; Shi, J.; Yang, L.; Wu, Y.; Al-Dhahir, N.; Li, S. Optimal Probabilistic Constellation Shaping for Covert Communications. IEEE Trans. Inf. Forensics Secur. 2022, 17, 3165–3178. [Google Scholar] [CrossRef]
  41. Lehmann, E.L.; Romano, J.P.; Casella, G. Testing Statistical Hypotheses; Springer: Berlin/Heidelberg, Germany, 1986; Volume 3. [Google Scholar]
  42. Chen, X.; An, J.; Xiong, Z.; Xing, C.; Zhao, N.; Yu, F.R.; Nallanathan, A. Covert Communications: A Comprehensive Survey. IEEE Commun. Surv. Tutor. 2023, 25, 1173–1198. [Google Scholar] [CrossRef]
  43. Yan, S.; Cong, Y.; Hanly, S.V.; Zhou, X. Gaussian Signalling for Covert Communications. IEEE Trans. Wirel. Commun. 2019, 18, 3542–3553. [Google Scholar] [CrossRef]
Figure 1. Some QAM constellation sets adopted in surveillance video transmission.
Figure 1. Some QAM constellation sets adopted in surveillance video transmission.
Applsci 14 00577 g001
Figure 2. Constellation points corrupted by AWGN channels.
Figure 2. Constellation points corrupted by AWGN channels.
Applsci 14 00577 g002
Figure 3. Comparison between previous methods and our proposed covert surveillance video transmission performance analysis method.
Figure 3. Comparison between previous methods and our proposed covert surveillance video transmission performance analysis method.
Applsci 14 00577 g003
Figure 4. Approximation of our Taylor expansion method.
Figure 4. Approximation of our Taylor expansion method.
Applsci 14 00577 g004
Figure 5. Covertness metric versus transmission power.
Figure 5. Covertness metric versus transmission power.
Applsci 14 00577 g005
Figure 6. Transmission rate versus transmission power.
Figure 6. Transmission rate versus transmission power.
Applsci 14 00577 g006
Figure 7. Transmission rates using the different methods.
Figure 7. Transmission rates using the different methods.
Applsci 14 00577 g007
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Qiao, S.; Liu, G.; Ji, X.; Zhao, J.; Ding, H. Covert Surveillance Video Transmission with QAM Constellations Modulation. Appl. Sci. 2024, 14, 577. https://doi.org/10.3390/app14020577

AMA Style

Qiao S, Liu G, Ji X, Zhao J, Ding H. Covert Surveillance Video Transmission with QAM Constellations Modulation. Applied Sciences. 2024; 14(2):577. https://doi.org/10.3390/app14020577

Chicago/Turabian Style

Qiao, Sen, Guangjie Liu, Xiaopeng Ji, Junjie Zhao, and Huihui Ding. 2024. "Covert Surveillance Video Transmission with QAM Constellations Modulation" Applied Sciences 14, no. 2: 577. https://doi.org/10.3390/app14020577

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop