Utilizing Pulse Pileup Effect in Development of Robust Low-SNR Covert Communication Links
Abstract
In contrast to other spread-spectrum techniques, wideband pulse trains with relatively low pulse arrival rates may be considered unsuitable for covert communications. The high crest factor of such trains can be extremely burdensome for the transmitter hardware, and it makes the pulse trains easily detectable even at very low signal-to-noise ratios. In addition, it may appear that sharing the wideband channel by multiple users would require explicit allocation of the pulse arrival times for each sub-channel, which would be impractical in most cases. On the other hand, messaging by wideband pulse trains has many appealing features. Among those are the ease of synchronous as well as asynchronous pulse detection, and on-the-fly channel reconfigurability (e.g. changing the spreading factor). Favorably, the crest factor of a pulse train, as well as its apparent temporal and amplitude structure, can be easily, and reversibly, controlled by simple linear filtering. For example, a transmitted pulse train can be made statistically indistinguishable from the Gaussian component of the channel noise (e.g. the thermal noise) observed in the same spectral band, while the received signal will be the designed high-crest-factor wideband pulse train. In this paper, we utilize the so-called pulse pileup effect to perform such reversible control of the pulse train structure, enabling a wider use of this approach for synthesis of robust low-SNR covert communication links. We place a particular focus on the synchronous pulse detection in the receiver, that provides a better utilization of the channel spectrum.
Index Terms:
Covert communications, hard-to-intercept communications, low-power communications, intermittently nonlinear filtering, physical layer, pileup effect, steganography.
I Introduction
The additive white Gaussian noise (AWGN) capacity of a channel operating in the power-limited regime (i.e. when the received signal-to-noise ratio (SNR) is small, dB) can be expressed as , where is the average received power and is the power spectral density (PSD) of the noise. This capacity is linear in power and insensitive to bandwidth and, therefore, by spreading the average transmitted power of the information-carrying signal over a large frequency band, the average PSD of the signal could be made much smaller than the PSD of the noise. This would “hide” the signal in the channel noise, making the transmission covert and insensitive to narrowband interference.
One of the common ways to achieve such “spreading” is frequency-hopping spread spectrum (FHSS) [1]. This technique is widely used, for example, in legacy military equipment for low-probability-of-intercept (LPI) communications. However, using frequency hopping for covert communications is nearly obsolete today, since modern wideband software-defined radio (SDR) receivers can capture all of the hops and put them back together (J. E. Gilley, personal communication, Feb. 9, 2020).
Another common and widely used spread-spectrum modulation technique is direct-sequence spread spectrum (DSSS) [2]. In DSSS, the narrow-band information-carrying signal of a given power is modulated by a wider-band, unit-power pseudorandom signal known as a spreading sequence. This results in a signal with the same total power but a larger bandwidth, and thus a smaller PSD. After demodulation (“de-spreading”) in the receiver, the original information-carrying signal is restored. However, such demodulation requires a precise synchronization, which is perhaps the most difficult and expensive aspect of a DSSS receiver design. Also, while de-spreading cannot be performed without the knowledge of the spreading sequence by the receiver, the spreading code by itself may not be usable to secure the channel. For example, linear spreading codes are easily decipherable once a short sequential set of chips from the sequence is known. To improve security, it would be desirable to perform a “code hopping” in a manner akin to the frequency hopping. However, synchronization can be an extremely slow process for pseudorandom sequences, especially for large spreading waveforms (long codes), and thus such DSSS code hopping may be difficult to realize in practice.
In this paper, we explore an alternative spread-spectrum approach that, among other appealing features, significantly simplifies and speeds up synchronization and enables on-the-fly link reconfigurability that combines the benefits of both DSSS and FHSS. A simplified explanation of this approach can be given as follows.
In the power-limited regime, we would normally use binary coding and modulation (e.g. binary phase-shift keying (BPSK) or quadrature phase-shift keying (QPSK)) for the narrow-band information-carrying signal, and this signal will be significantly oversampled to enable wideband spreading. Thus an idealized narrow-band information-carrying signal that is to be “spread” can be viewed as a discrete-level signal that is a linear combination of analog Heaviside unit step functions [3] delayed by multiples of the bit duration. Such a signal would have a limited bandwidth and a finite power. Since the derivative of the Heaviside unit step function is the Dirac -function [4], the derivative of this idealized signal will be a “pulse train” that is a linear combination of Dirac -functions. This pulse train will contain all the information encoded in the discrete-level signal, and it will have infinitely wide bandwidth and infinitely large power. Both the bandwidth and the power can then be reduced to the desired levels by filtering the pulse train with a lowpass filter. If the time-bandwidth product (TBP) of the filter is sufficiently small so that the pulses in the filtered pulse train do not overlap, these pulses will still contain all the intended information.
On the one hand, converting a narrow-band signal into a wideband pulse train has an apparent appeal of no need for “de-spreading”: One can simply obtain samples at the peaks of the pulses to obtain all the information encoded in the signal. On the other hand, at first glance such a pulse train is not suitable for practical communication systems, and especially for covert communications. Indeed, let us consider a pulse train with a given average pulse rate and power. The average PSD of this train can be made arbitrary small, since it is inversely proportional to the bandwidth. However, the peak-to-average power ratio (PAPR) of such a train would be proportional to the bandwidth, making the wideband signal extremely impulsive (super-Gaussian). First, such high crest factor of the pulse train puts a serious burden on the transmitter hardware, potentially making this burden prohibitive (e.g. for dB). Secondly, the high-PAPR structure of a pulse train makes it easily detectable by simple thresholding in the time domain, seemingly making it unsuitable for covert communications. Thirdly, it may appear that sharing the wideband channel by multiple users would require explicit allocation of the pulse arrival times for each sub-channel, which would be impractical in most cases.
Favorably, the temporal and amplitude structure of a pulse train is modifiable by linear filtering, and such filtering can convert a high-PAPR train into a low-PAPR signal, and vice versa. Therefore, such PAPR-modifying filtering enables us to use pulse trains for low-SNR covert communications. As illustrated in Fig. 1, large-TBP pulse shaping in the transmitter can “hide” the pulse train, obscuring its temporal and amplitude structure. It also reduces the PAPR of the signal, making it suitable for transmission. In the receiver, the distinct structure of the pulse train is restored by matched large-TBP filtering, and the high PAPR of the restored pulse train enables low-SNR messaging. To make such a link more robust to outlier interference and to increase the apparent SNR, analog-to-digital conversion in the receiver can be combined with intermittently nonlinear filtering (INF) [5, 6].

The focus of the rest of the paper is on the key components of such a link, and on the synchronous pulse detection in particular. Some of the additional aspects of this approach, such as asynchronous detection, multi-layer and multi-user configurations, and applications for physical-layer steganography and “friendly jamming” are outlined in [7].
II PAPR Control Utility of Pileup Effect
A pulse train is simply a sum of pulses with the same shape (impulse response) , same or different amplitudes , and distinct arrival times : . When the width of the pulses in a train becomes greater than the distance between them, the pulses begin to overlap and interfere with each other. This is illustrated in Fig. 2: For the same arrival times, the pulses in the sequence consisting of the narrow pulses remain separate, while the wider (more “spread out”) pulses are “piling up on top of each other.” In this example, and have the same spectral content, and thus the PSDs of the pulse sequences are identical. However, the “pileup effect” causes the temporal and amplitude structures of these sequences to be substantially different. For a random pulse train, when the ratio of the bandwidth and the pulse arrival rate becomes significantly smaller than the TBP of a pulse, the pileup effect causes the resulting signal to become effectively Gaussian [8, e.g.], making it impossible to distinguish between the individual pulses.
Indeed, let be an “ideal” pulse train: , where is the Dirac -function [4]. The moving average of this ideal train in a boxcar window of width can be represented by the convolution integral
(1) |
where is the Heaviside unit step function [3]. At any given time , the value of is proportional to the sum of for the pulses that occur within the interval . Then, if the amplitudes and/or the interarrival times are independent and identically distributed (i.i.d.) random variables with finite mean and variance, it follows from the Central Limit Theorem [9, e.g.] that the distribution of approaches Gaussian for a sufficiently large interval .
If we replace the boxcar weighting function in (1) with an arbitrary moving window , then (1) becomes a weighted moving average
(2) |
which is a “real” pulse train with the impulse response . If is normalized so that , is an averaging (i.e. lowpass) filter. Then, if has both the bandwidth and the TBP similar to that of the boxcar pulse of width , the distribution of would be similar to that of (e.g. Gaussian for a sufficiently large ).
II-A PAPR Control by Large-TBP Pulse Shaping
There are various ways to define the “time duration” and the “bandwidth” of a pulse. This can lead to a significant ambiguity in the definitions of the TBPs, especially for filters with complicated temporal structures and/or frequency responses. However, in the context of a PAPR control function of the pileup effect, our main concern is the change in the TBP that occurs only due to the change in the temporal structure of a filter, without the respective change in its spectral content. For a single pulse , its PAPR can be expressed as
(3) |
where the interval includes the effective time support of . Then for filters with the same spectral content and the impulse responses and , the ratio of their TBPs can be expressed as the reciprocal of the ratio of their PAPRs,
(4) |
where the PAPRs are calculated over a sufficiently long time interval that includes the effective time support of both filters. Note that from (4) it follows that, among all possible pulses with the same spectral content, the one with the smallest TBP will contain a dominating large-magnitude peak. Hence any reasonable definition of a finite TBP for a particular filter with a given frequency response allows us to obtain comparable numerical values for the TBPs of all other filters with the same frequency response, regardless of their temporal structures.


There are multiple ways to construct pulses with identical frequency responses yet significantly different TBPs. For example, given a “seed” small-TBP pulse with finite (FIR) or infinite (IIR) impulse response , a large-TBP pulse with the same spectral content can be “grown” from by applying a sequence of IIR allpass filters that leave the PSD of the seed pulse unmodified [10, e.g.]. Then an FIR filter for pulse shaping in the transmitter can be obtained by (i) “spreading” with an IIR allpass filter, (ii) truncating the pulse when it sufficiently decays to zero, and (iii) time-inverting the resulting waveform. Then applying the same IIR allpass filter in the receiver to this waveform will produce the matched filter to the original seed pulse.
In the illustration of Fig. 3, the transmitter waveform is composed as a “piled-up” sum of thus constructed large-TBP pulses, scaled and time-shifted. In the receiver, an IIR allpass filter recovers the underlying high-PAPR pulse train. The seed used in this illustration is an FIR root-raised-cosine (RRC) pulse symmetrical around , and thus is a raised-cosine (RC) pulse. RC pulses are perhaps not the best choice for shaping the pulse trains for communications, since their TBP is only about unity, and pulse shaping with Gaussian or Bessel filters (with ) may provide a better alternative. In the subsequent simulations and numerical examples, however, we use FIR RC pulses with roll-off factor for convenience of their well-defined bandwidth and numerical values associated with their symbol-rate.
Fig. 4 further illustrates how the pileup effect can be used to obscure (e.g. to mimic as Gaussian or sub-Gaussian) a large-PAPR (super-Gaussian) transmitted signal, while fully recovering its distinct temporal and amplitude structure in the receiver. In this example, pulse shaping with a large-TBP filter in the transmitter “hides” the original structure of the pulse train, and the pulses with larger TBPs perform this more effectively. This can be seen in Fig. 4 from both the time-domain traces and the normal probability plots shown in the lower left corner. For a sufficiently large TBP, the distribution of the filtered pulse train with random pulse polarities becomes effectively Gaussian, making it impossible to distinguish between the individual pulses.
III Pulse Trains for Low-SNR Communications
Having demonstrated how the information-carrying pulse train can be made transmittable and covert, we shall discuss how the message can be best recovered in the receiver.
III-A Synchronous Pulse Detection
Let us consider a pulse train consisting of pulses with the bandwidth and a small TBP, so that a single large-magnitude peak in a pulse dominates, and assume that the arrival rate of the pulses is sufficiently small so that pileup is negligible (e.g. ). When the arrival time of a pulse with the peak magnitude is known, the probability of correctly detecting the polarity of this pulse in the presence of additive white Gaussian noise (AWGN) with zero mean and variance can be expressed, using the complementary error function, as . Then the pulses with the magnitude will have a pulse identification error rate smaller than . For example, for , and for .

The pulse rate in a digitally sampled train with regular (periodic) arrival times is , where is the sampling frequency and is the number of samples between two adjacent pulses in the train. For that is sufficiently smaller than , the PAPR of a train of equal-magnitude pulses with regular arrival times is an increasing function of the number of samples between two adjacent pulses , and is proportional to :
(5) |
For example, for raised-cosine (RC) pulses , where is the symbol-period, and a “large ” would mean , where is the number of samples per symbol-period. As illustrated in Fig. 5, for for RC pulses with roll-off factor .
From the lower limit on the magnitude of a pulse for a given uncoded bit error rate (BER),
(6) |
we can then obtain the lower limit on the SNR for a given pulse rate:
(7) |
or
(8) |
for and RC pulses with . For example, , and .

Fig. 6 illustrates the SNR limits for different BER as functions of samples between pulses for RC pulses with and . For example, for the pulses separated by 128 symbol-periods, is achieved for dB. For comparison, the AWGN Shannon capacity limit [11] for the bandwidth , which is the nominal bandwidth of the respective RRC filter, is also shown.
III-B Asynchronous Detection (Pulse Counting)
The asynchronous pulse detection (pulse counting) is discussed in detail in [7], and it relies on synergistic combination of linear and nonlinear filtering. While the rate limit for pulse counting is approximately an order of magnitude lower than for synchronous pulse detection with a similar BER, pulse counting does not rely on any a priori knowledge of pulse arrival times, and can be used as a backbone method for pulse detection. In addition, randomizing the pulse arrival times allows us to more effectively hide the temporal structure of the pulse train, prioritizing security over the data rates. Further, intermittently nonlinear filtering used in combination with synchronous and/or asynchronous pulse detection enables “layering” of pulse trains with significantly different powers, physical-layer steganography, and “friendly jamming” applications. However, since synchronous detection enables much higher data rates for the same SNR, the focus of the next section is on the technique that can be used for synchronous detection of pulses in a train with a periodic structure. In practice, both pulse counting and synchronous pulse detection can be used in combination. For example, given a constraint on the total power of the pulse train, counting of relatively rare, higher-magnitude pulses can be used to establish the timing patterns for synchronization, and synchronous detection of smaller, more frequent pulses can be used for a higher data rate.

IV Synchronization
To enable synchronous detection for a train with the pulses separated by samples, the following modulo power averaging (MPA) function can be constructed as an exponentially decaying average of the instantaneous signal power in a window of size :
(9) | ||||
where is the sample index of the -th pulse, and . In (9), the double square brackets denote the Iverson bracket [12]
(10) |
where is a statement that can be true or false. Thus the window includes two transmitted pulses, and , and the index in takes the values . Note that using exponentially decaying average in (9) would roughly correspond to averaging of such windows. The exponentially decaying average, however, has the advantage of lower computational and memory burden, especially for large , and faster adaptability to dynamically changing conditions.
For a sufficiently large , the peak in corresponding to the pulses of the pulse train will dominate. Therefore, the index for sampling of the -th pulse can be obtained as
(11) |
where is given implicitly by
(12) |
Fig. 7 illustrates this synchronization procedure. The MPA function shown in the right-hand side of the figure is computed according to (9). To emphasize the robustness of this synchronization technique even when the bit error rates are very high, the SNR is chosen to be respectively low (dB, ).


For the link shown in Fig. 1, Fig. 8 compares the calculated (dashed lines) and the simulated (dots connected by solid lines) BERs, for the “ideal” synchronization (black dots), and for the synchronization with the MPA function described above. The AWGN noise is added at the receiver input, and the SNR is calculated at the output of the matched filter in the receiver. One can see that for (red dots) the errors in synchronization are relatively high, which increases the overall BER, but the MPA function with (blue dots) provides reliable yet still fast synchronization. The BERs and the respective SNRs in Fig. 8 are presented for the pulse repetition rates indicated by the vertical dashed lines in Fig. 6.
IV-A Modulo magnitude averaging
When a pulse train is used for communications rather than, say, radar applications, reliable synchronization may only need to be achievable for relatively low BER, e.g. . Then the following modulo magnitude averaging (MMA) function can replace the MPA function in the synchronization procedure, in order to reduce the computational burden by avoiding squaring operations:
(13) | ||||
Note that the window in (13) includes only the -th transmitted pulse, instead of two pulses used in (9). The reason behind this is illustrated in Fig. 9, which compares (for AWGN) the MPA function with the respective squared MMA function computed for the window that includes the “extra point” (the -th pulse). The relatively long averaging () is used to reduce the variations in the function values due to noise, and to make the comparison with the levels indicated by the dashed lines more apparent.
When a correct synchronization has already been obtained, and the maxima are “locked” at the correct values (black dots connected by solid lines), both the MPA and the MMA functions would adequately maintain the position of their maxima. However, an offset in the synchronization (e.g. by points shown in the figure) significantly more unfavorably affects the margin between the extrema at and in the MMA function, compared with the MPA function (blue dots connected by solid lines). Thus the “extra point” may cause the “failure to synchronize” even at a relatively high SNR, and it should be removed from the calculation of the MMA function. Then, as illustrated in Fig. 10, for synchronization with the MMA function would be effectively equivalent to synchronization with the MPA function . When reliable synchronization for larger BERs is desired (e.g. in timing and ranging applications), then the MPA given by (9) should be used.

Conclusion
Gaining control over the temporal and amplitude structures of the signals in the transmitter and the receiver, especially when combined with nonlinear filtering techniques such as INF [7], opens up intriguing opportunities in various spectrum sharing and coexistence applications. For example, as schematically illustrated in Fig. 11, the main message may be transmitted using one of the existing communication protocols (e.g. OFDM), but its temporal and amplitude structure can be obscured by employing a large-TBP filter in the transmitter, e.g., made to be effectively Gaussian. This alone enhances security of the transmission, since the intersymbol interference becomes excessively large and the signal cannot be recovered in the receiver without knowing the pulse shaping filter. Further, a jamming pulse train, disguised as Gaussian by a different large-TBP filter, can be added to the main signal. This jamming signal can have the same spectral content as the main signal, and its power can be sufficiently large (e.g. similar to the main signal) so that the main signal is unrecoverable even if the first pulse shaping filter is known. In the receiver, the jamming pulse train is removed from the mixture by an INF (and decoded, if it itself contains information), enabling the subsequent recovery of the main message without loosing its quality.
Even a simple single-channel link that is the focus of this paper (see Fig. 1) provides appealing practical applications. For example, an existing channel (say, a voice channel in a two-way radio) can be converted into a low-power, lower-rate (say, text) covert channel operating at the same range. This can be accomplished without significant hardware redesign, by modifying only the digital signal processing in both transmitter and the receiver. Alternatively, when transmitted at the original power, such a lower-rate, lower-SNR channel can extend (say, quadruple) the range of the link.
In a broader context, the approach outlined in this paper allows for many practical variations, ranging from simple and easily implementable to more elaborate, highly secure multi-level configurations that would require addressing additional conceptual and implementational challenges.

Acknowledgment
The authors would like to thank James E. Gilley of BK Technologies, West Melbourne, FL; Arlie Stonestreet II of Ultra Electronics ICE, Manhattan, KS, and Kyle D. Tidball of Textron Aviation, Wichita, KS, for their valuable suggestions and critical comments. This work was supported in part by Pizzi Inc., Denton, TX 76205 USA.
References
- [1] M. K. Simon, J. K. Omura, R. A. Scholtz, and B. K. Levitt, Spread Spectrum Communications Handbook (Revised Ed.). USA: McGraw-Hill, Inc., 1994.
- [2] D. Torrieri, Principles of Spread-Spectrum Communication Systems, 4th ed. Springer International Publishing, 2018.
- [3] R. N. Bracewell, The Fourier Transform and Its Applications, 3rd ed. New York: McGraw-Hill, 2000, ch. “Heaviside’s Unit Step Function, ”, pp. 61–65.
- [4] P. A. M. Dirac, The Principles of Quantum Mechanics, 4th ed. London: Oxford University Press, 1958.
- [5] A. V. Nikitin and R. L. Davidchack, “Hidden outlier noise and its mitigation,” IEEE Access, vol. 7, 2019.
- [6] ——, “Complementary intermittently nonlinear filtering for mitigation of hidden outlier interference,” in Proc. IEEE Military Commun. Conf. 2019 (MILCOM 2019), Norfolk, VA, 12-14 Nov. 2019.
- [7] ——, “Utilizing pileup effect and intermittently nonlinear filtering in synthesis of covert and hard-to-intercept communication links,” preprint, http://arxiv.org/abs/2004.13610, 2020.
- [8] A. V. Nikitin, “Pulse pileup effects in counting detectors,” PhD thesis, University of Kansas, Lawrence, 1998.
- [9] A. D. Aleksandrov, A. N. Kolmogorov, and M. A. Lavrent’ev, Eds., Mathematics: Its Content, Methods, and Meaning. Dover, 1999, unabridged reprint in one volume of the second edition of Mathematics: Its Content, Methods, and Meaning, published in three volumes by The M.I.T. Press, Cambridge, MA, in 1969. Translated from 1956 Russian edition.
- [10] P. A. Regalia, S. K. Mitra, and P. P. Vaidyanathan, “The digital all-pass filter: A versatile signal processing building block,” Proc. IEEE, vol. 76, no. 1, 1988.
- [11] C. E. Shannon, “Communication in the presence of noise,” Proc. Institute of Radio Engineers, vol. 37, no. 1, pp. 10–21, Jan. 1949.
- [12] D. E. Knuth, “Two notes on notation,” American Mathematical Monthly, vol. 99, no. 5, pp. 403–422, May 1992.