[1]
G. J. Simmons, A survey of information authentication, Proc. IEEE, vol. 76, no. 5, p.603 –620, May (1988).
Google Scholar
[2]
A. J. Menezes,P. C. van Oorschot, and S. A. Vanstone, Handbook of Applied Cryptography. Boca Raton, FL: CRC, (2001).
Google Scholar
[3]
S. H. Supangkat, T. Eric, and A. S. Pamuji, A public key signature for authentication in telephone, in Proc. APCCAS, 2002, p.495–498.
DOI: 10.1109/apccas.2002.1115320
Google Scholar
[4]
J. E. Kleider, S. Gifford, S. Chuprun, and B. Fette, Radio frequency watermarking for OFDM wireless networks, in Proc. ICASSP, Montreal, QC, Canada, 2004, p.397–400.
DOI: 10.1109/icassp.2004.1327131
Google Scholar
[5]
X. Wang, Y. Wu, and B. Caron, Transmitter identification using embedded pseudo random sequences, IEEE Trans. Broadcast., vol. 50, no. 3, p.244–252, Sep. (2004).
DOI: 10.1109/tbc.2004.834027
Google Scholar
[6]
L. -F. Wei, Coded modulation with unequal error protection, IEEE Trans. Commun., vol. 41, no. 10, p.1439–1449, Oct. (1993).
DOI: 10.1109/26.237878
Google Scholar
[7]
P. K. Vitthaladevuni and M. -S. Alouini, Exact BER computation of generalized hierarchical PSK constellations, IEEE Trans. Commun., vol. 51, no. 12, p.2030–2037, Dec. (2003).
DOI: 10.1109/tcomm.2003.820748
Google Scholar
[8]
M. Morimoto, M. Okada, and S. Komaki, A hierarchical image transmission system in a fading channel, in Proc. 4th IEEE Int. Conf. UniversalPersonal Communications, Nov. 1995, p.769–772.
DOI: 10.1109/icupc.1995.497113
Google Scholar
[9]
M. Dong, L. Tong, and B. M. Sadler, Optimal insertion of pilot symbols for transmissions over time-varying flat fading channels, IEEEJ. Sel. Areas Commun., vol. 52, no. 5, p.1403–1418, May (2004).
DOI: 10.1109/tsp.2004.826182
Google Scholar
[10]
J. E. Kleider, G. Maalouli, S. Gifford, and S. Chuprun, Preamble and embedded synchronization for RF carrier frequency-hopped OFDM, IEEE J. Sel. Areas Commun., vol. 23, no. 5, p.920–931, May (2005).
DOI: 10.1109/jsac.2005.845421
Google Scholar
[11]
J. Fridrich and M. Goljan, Robush hash functions for digital watermarking, inProc. Int. Conf. Information Technology: Coding andComputing, Las Vegas, NV, Mar. 2000, p.178–183.
DOI: 10.1109/itcc.2000.844203
Google Scholar
[12]
A. Swaminathan, Y. Mao, and M. Wu, Robust and secure imagehashing, IEEE Trans. Inf. Forensics Security, vol. 1, no. 2, p.215–230, Jun. (2006).
Google Scholar
[13]
Paul L. Yu, John S. Baras, and Brian M. Sadler, Physical-Layer Authentication, IEEE Transactions On Information Forensics AND Security, Vol. 3, no. 1, Mar (2008).
DOI: 10.1109/tifs.2007.916273
Google Scholar