Fig. 3From: Binary phase hopping based spreading code authentication techniqueBinary phase hopping modulation constellationBack to article page