Reliable Transmission Parameter Signalling Detection for DTMB-A Standard

2017 ◽  
Vol E100.B (12) ◽  
pp. 2156-2163 ◽  
Author(s):  
Jingjing LIU ◽  
Chao ZHANG ◽  
Changyong PAN
2018 ◽  
Vol 68 (2) ◽  
pp. 498-516
Author(s):  
Neil O'Sullivan

Of the hundreds of Greek common nouns and adjectives preserved in our MSS of Cicero, about three dozen are found written in the Latin alphabet as well as in the Greek. So we find, alongside συμπάθεια, also sympathia, and ἱστορικός as well as historicus. This sort of variation has been termed alphabet-switching; it has received little attention in connection with Cicero, even though it is relevant to subjects of current interest such as his bilingualism and the role of code-switching and loanwords in his works. Rather than addressing these issues directly, this discussion sets out information about the way in which the words are written in our surviving MSS of Cicero and takes further some recent work on the presentation of Greek words in Latin texts. It argues that, for the most part, coherent patterns and explanations can be found in the alphabetic choices exhibited by them, or at least by the earliest of them when there is conflict in the paradosis, and that this coherence is evidence for a generally reliable transmission of Cicero's original choices. While a lack of coherence might indicate unreliable transmission, or even an indifference on Cicero's part, a consistent pattern can only really be explained as an accurate record of coherent alphabet choice made by Cicero when writing Greek words.


2020 ◽  
Vol 2020 (4) ◽  
pp. 76-1-76-7
Author(s):  
Swaroop Shankar Prasad ◽  
Ofer Hadar ◽  
Ilia Polian

Image steganography can have legitimate uses, for example, augmenting an image with a watermark for copyright reasons, but can also be utilized for malicious purposes. We investigate the detection of malicious steganography using neural networkbased classification when images are transmitted through a noisy channel. Noise makes detection harder because the classifier must not only detect perturbations in the image but also decide whether they are due to the malicious steganographic modifications or due to natural noise. Our results show that reliable detection is possible even for state-of-the-art steganographic algorithms that insert stego bits not affecting an image’s visual quality. The detection accuracy is high (above 85%) if the payload, or the amount of the steganographic content in an image, exceeds a certain threshold. At the same time, noise critically affects the steganographic information being transmitted, both through desynchronization (destruction of information which bits of the image contain steganographic information) and by flipping these bits themselves. This will force the adversary to use a redundant encoding with a substantial number of error-correction bits for reliable transmission, making detection feasible even for small payloads.


2021 ◽  
Vol 7 (1) ◽  
Author(s):  
Beatrice Da Lio ◽  
Daniele Cozzolino ◽  
Nicola Biagi ◽  
Yunhong Ding ◽  
Karsten Rottwitt ◽  
...  

AbstractQuantum key distribution (QKD) protocols based on high-dimensional quantum states have shown the route to increase the key rate generation while benefiting of enhanced error tolerance, thus overcoming the limitations of two-dimensional QKD protocols. Nonetheless, the reliable transmission through fiber links of high-dimensional quantum states remains an open challenge that must be addressed to boost their application. Here, we demonstrate the reliable transmission over a 2-km-long multicore fiber of path-encoded high-dimensional quantum states. Leveraging on a phase-locked loop system, a stable interferometric detection is guaranteed, allowing for low error rates and the generation of 6.3 Mbit/s of a secret key rate.


Sign in / Sign up

Export Citation Format

Share Document