Research Article

A Wireless Covert Channel Based on Constellation Shaping Modulation

Figure 3

Adversary model on the condition that the detector is closer to the sender.