Search. Read. Cite.

Easy to search. Easy to read. Easy to cite with credible sources.

Research Article
Secret Link Through Simulink: A Stego on OFDM Channel

Padmapriya Praveenkumar, G.S. Hemalatha, Bharathsimha Reddy, K. Thenmozhi, J.B.B. Rayappan and Rengarajan Amirtharajan

Information Technology Journal, 2014, 13(12), 1999-2004.

Abstract

The prerequisite of internet and multimedia communication in the present wireless age is impregnability and higher data rata. In this study, a pragmatic approach was accomplished by the Simulink model of Orthogonal Frequency Division Multiplexing (OFDM) using image steganography incorporating BPSK and QPSK modulation schemes. To contemplate the distortion in the image, the discerning distortion metrics called as Mean Square Error (MSE) and Peak Signal to Noise Ratio (PSNR) were computed. The BER of OFDM system was also analysed.

ASCI-ID: 28-1981

Cited References Fulltext

Related Articles


Spread and Hide-A Stego Transceiver

Information Technology Journal, 2014, 13(12), 2061-2064.

Performance Evaluation of a Hiperlan Type 2 Standard Based on Arithmetic Formats

Information Technology Journal, 2004, 3(1), 1-5.

Modified Frequency and Frame Synchronization Algorithms for MC-CDMA System

Information Technology Journal, 2006, 5(2), 273-280.

Performance Analysis of MC-CDMA for Wide Band Channels

Information Technology Journal, 2007, 6(2), 267-270.

Design of TDD/TDMA 4G System with Link Adaptation

Information Technology Journal, 2009, 8(5), 770-775.

An Improved Water-filling Power Allocation Method in MIMO OFDM Systems

Information Technology Journal, 2011, 10(3), 639-647.

Efficient 16-points FFT/IFFT Architecture for OFDM Based Wireless Broadband Communication

Information Technology Journal, 2012, 11(1), 118-125.

A Novel OFDM Timing Synchronization Algorithm Based on Stochastic Approximation and ML Algorithm

Information Technology Journal, 2012, 11(8), 1138-1140.

Sparse Underwater Acoustic Channel Estimation Based on Compressive Sensing

Information Technology Journal, 2013, 12(5), 1040-1044.

Purposeful Error on OFDM: A Secret Channel

Information Technology Journal, 2014, 13(12), 1985-1991.

Inserted Embedding in OFDM Channel: A Multicarrier Stego

Information Technology Journal, 2014, 13(12), 2017-2021.

Reversible Steganography on OFDM Channel-A Role of RS Coding

Information Technology Journal, 2014, 13(12), 2052-2056.

A Difference Timing Synchronization Method Based on Cyclic Prefix for OFDM Systems

Information Technology Journal, 2014, 13(2), 388-392.

A High-performance Implementation of OFDM-MIMO Base-band in Wireless Video System

Information Technology Journal, 2014, 13(10), 1678-1685.

Data Puncturing in OFDM Channel: A Multicarrier Stego

Information Technology Journal, 2014, 13(12), 2037-2041.

A New Steiner Channel Estimation Method in MIMO OFDM Systems

Information Technology Journal, 2007, 6(8), 1238-1244.

A Quasi-newton Acceleration EM Algorithm for OFDM Systems Channel Estimation

Information Technology Journal, 2006, 5(4), 749-752.

BCH Coding Performance Evaluation on a Land Mobile Channel Based OFDM System

Information Technology Journal, 2006, 5(5), 930-936.

Performance Evaluation of M-APSK Modulation in the Nonlinearly Distorted LTE Uplink

Information Technology Journal, 2012, 11(10), 1418-1425.

Stego in Multicarrier: A Phase Hidden Communication

Information Technology Journal, 2014, 13(12), 2011-2016.

Spread and Hide-A Stego Transceiver

Information Technology Journal, 2014, 13(12), 2061-2064.

Reversible Steganography on OFDM Channel: A Role of Cyclic Codes

Information Technology Journal, 2014, 13(12), 2047-2051.

Empirical Mode Decomposition for BER Improvement in Cellular Network

Information Technology Journal, 2010, 9(1), 146-151.

Reversible Steganography on OFDM Channel: A Role of Cyclic Codes

Information Technology Journal, 2014, 13(12), 2047-2051.

Spread and Hide-A Stego Transceiver

Information Technology Journal, 2014, 13(12), 2061-2064.

Stego in Multicarrier: A Phase Hidden Communication

Information Technology Journal, 2014, 13(12), 2011-2016.

Multi-Blogs Steganographic Algorithm Based on Directed Hamiltonian Path Selection

Information Technology Journal, 2008, 7(3), 450-457.

High Quality Steganography Model with Attacks Detection

Information Technology Journal, 2003, 2(2), 116-127.

Proving Poverty of Steganography System

Information Technology Journal, 2005, 4(3), 284-288.

A Review on Detection of LSB Matching Steganography

Information Technology Journal, 2010, 9(8), 1725-1738.

Steganography in Ms Excel Document using Text-rotation Technique

Information Technology Journal, 2011, 10(4), 889-893.

A Secure Steganographic Method via Multiple Choice Questions

Information Technology Journal, 2011, 10(5), 992-1000.

A Huffman Coding Section-based Steganography for AAC Audio

Information Technology Journal, 2011, 10(10), 1983-1988.

Stego on 2n:1 Platform for Users and Embedding

Information Technology Journal, 2011, 10(10), 1896-1907.

Inverted Pattern in Inverted Time Domain for Icon Steganography

Information Technology Journal, 2012, 11(5), 587-595.

Steganalysis Based on Least Square Method for Multiple Least Significant Bits Steganography

Information Technology Journal, 2013, 12(6), 1233-1238.

Reversible Steganography on OFDM Channel-A Role of RS Coding

Information Technology Journal, 2014, 13(12), 2052-2056.

Purposeful Error on OFDM: A Secret Channel

Information Technology Journal, 2014, 13(12), 1985-1991.

Reversible Steganography on OFDM Channel: A Role of Cyclic Codes

Information Technology Journal, 2014, 13(12), 2047-2051.

A Client-side Fingerprinting Method for Text Document Distribution

Information Technology Journal, 2014, 13(2), 251-259.

Stego in Multicarrier: A Phase Hidden Communication

Information Technology Journal, 2014, 13(12), 2011-2016.

Spread and Hide-A Stego Transceiver

Information Technology Journal, 2014, 13(12), 2061-2064.

Cover as Key and Key as Data: An Inborn Stego

Information Technology Journal, 2014, 13(12), 1969-1976.

Data Puncturing in OFDM Channel: A Multicarrier Stego

Information Technology Journal, 2014, 13(12), 2037-2041.

Inserted Embedding in OFDM Channel: A Multicarrier Stego

Information Technology Journal, 2014, 13(12), 2017-2021.

Cryptic Cover for Covered Writing: A Pre-Layered Stego

Information Technology Journal, 2014, 13(16), 2524-2533.

Comparative Analysis of (5/3) and Haar IWT Based Steganography

Information Technology Journal, 2014, 13(16), 2534-2543.

Steganalysis Based on Difference Statistics for LSB Matching Steganography

Information Technology Journal, 2009, 8(8), 1281-1286.

A High-capacity Steganographic Scheme for 3D Point Cloud Models

Information Technology Journal, 2010, 9(3), 412-421.

Steganography-The Art of Hiding Data

Information Technology Journal, 2004, 3(3), 245-269.