Search. Read. Cite.

Easy to search. Easy to read. Easy to cite with credible sources.

Research Article
Data Puncturing in OFDM Channel: A Multicarrier Stego

Padmapriya Praveenkumar, K. Thenmozhi, J.B.B. Rayappan and Rengarajan Amirtharajan

Information Technology Journal, 2014, 13(12), 2037-2041.

Abstract

The prospects of the next generation wireless broadband applications will be enhanced by the features like improved Signal to Noise Ratio (SNR) and variable higher data rates. The Orthogonal Frequency Division Multiplexing (OFDM) system offers better tolerance against multipath effects faced by fading channels. Forward Error Correction (FEC) codes meliorate the system performance. In this study, firstly the data is encoded using Convolution encoders with Puncture codes in OFDM system. Then, the secret message is embedded and passed through Rayleigh and Rician fading channels. The BER graph prior and after embedding the confidential data are compared and simulated using BPSK modulation scheme. The system is made more reliable by reducing the redundancy, errors in the signals and making it more secure and robust in fading environment.

ASCI-ID: 28-1987

Cited References Fulltext

Similar Articles


Empirical Mode Decomposition for BER Improvement in Cellular Network

Information Technology Journal, 2010, 9(1), 146-151.

Study on Unified S Band Receiver Performance with Impulse Radio Ultra-wideband Disturbance

Information Technology Journal, 2013, 12(10), 1941-1949.

Reversible Steganography on OFDM Channel-A Role of RS Coding

Information Technology Journal, 2014, 13(12), 2052-2056.

Spread and Hide-A Stego Transceiver

Information Technology Journal, 2014, 13(12), 2061-2064.

Inserted Embedding in OFDM Channel: A Multicarrier Stego

Information Technology Journal, 2014, 13(12), 2017-2021.

Performance Evaluation of a Hiperlan Type 2 Standard Based on Arithmetic Formats

Information Technology Journal, 2004, 3(1), 1-5.

Modified Frequency and Frame Synchronization Algorithms for MC-CDMA System

Information Technology Journal, 2006, 5(2), 273-280.

Performance Analysis of MC-CDMA for Wide Band Channels

Information Technology Journal, 2007, 6(2), 267-270.

Design of TDD/TDMA 4G System with Link Adaptation

Information Technology Journal, 2009, 8(5), 770-775.

An Improved Water-filling Power Allocation Method in MIMO OFDM Systems

Information Technology Journal, 2011, 10(3), 639-647.

Efficient 16-points FFT/IFFT Architecture for OFDM Based Wireless Broadband Communication

Information Technology Journal, 2012, 11(1), 118-125.

A Novel OFDM Timing Synchronization Algorithm Based on Stochastic Approximation and ML Algorithm

Information Technology Journal, 2012, 11(8), 1138-1140.

Sparse Underwater Acoustic Channel Estimation Based on Compressive Sensing

Information Technology Journal, 2013, 12(5), 1040-1044.

Purposeful Error on OFDM: A Secret Channel

Information Technology Journal, 2014, 13(12), 1985-1991.

Inserted Embedding in OFDM Channel: A Multicarrier Stego

Information Technology Journal, 2014, 13(12), 2017-2021.

Reversible Steganography on OFDM Channel-A Role of RS Coding

Information Technology Journal, 2014, 13(12), 2052-2056.

A Difference Timing Synchronization Method Based on Cyclic Prefix for OFDM Systems

Information Technology Journal, 2014, 13(2), 388-392.

A High-performance Implementation of OFDM-MIMO Base-band in Wireless Video System

Information Technology Journal, 2014, 13(10), 1678-1685.

Secret Link Through Simulink: A Stego on OFDM Channel

Information Technology Journal, 2014, 13(12), 1999-2004.

A New Steiner Channel Estimation Method in MIMO OFDM Systems

Information Technology Journal, 2007, 6(8), 1238-1244.

A Quasi-newton Acceleration EM Algorithm for OFDM Systems Channel Estimation

Information Technology Journal, 2006, 5(4), 749-752.

BCH Coding Performance Evaluation on a Land Mobile Channel Based OFDM System

Information Technology Journal, 2006, 5(5), 930-936.

Multi-Blogs Steganographic Algorithm Based on Directed Hamiltonian Path Selection

Information Technology Journal, 2008, 7(3), 450-457.

High Quality Steganography Model with Attacks Detection

Information Technology Journal, 2003, 2(2), 116-127.

Proving Poverty of Steganography System

Information Technology Journal, 2005, 4(3), 284-288.

A Review on Detection of LSB Matching Steganography

Information Technology Journal, 2010, 9(8), 1725-1738.

Steganography in Ms Excel Document using Text-rotation Technique

Information Technology Journal, 2011, 10(4), 889-893.

A Secure Steganographic Method via Multiple Choice Questions

Information Technology Journal, 2011, 10(5), 992-1000.

A Huffman Coding Section-based Steganography for AAC Audio

Information Technology Journal, 2011, 10(10), 1983-1988.

Stego on 2n:1 Platform for Users and Embedding

Information Technology Journal, 2011, 10(10), 1896-1907.

Inverted Pattern in Inverted Time Domain for Icon Steganography

Information Technology Journal, 2012, 11(5), 587-595.

Steganalysis Based on Least Square Method for Multiple Least Significant Bits Steganography

Information Technology Journal, 2013, 12(6), 1233-1238.

Reversible Steganography on OFDM Channel-A Role of RS Coding

Information Technology Journal, 2014, 13(12), 2052-2056.

Purposeful Error on OFDM: A Secret Channel

Information Technology Journal, 2014, 13(12), 1985-1991.

Reversible Steganography on OFDM Channel: A Role of Cyclic Codes

Information Technology Journal, 2014, 13(12), 2047-2051.

A Client-side Fingerprinting Method for Text Document Distribution

Information Technology Journal, 2014, 13(2), 251-259.

Stego in Multicarrier: A Phase Hidden Communication

Information Technology Journal, 2014, 13(12), 2011-2016.

Spread and Hide-A Stego Transceiver

Information Technology Journal, 2014, 13(12), 2061-2064.

Cover as Key and Key as Data: An Inborn Stego

Information Technology Journal, 2014, 13(12), 1969-1976.

Secret Link Through Simulink: A Stego on OFDM Channel

Information Technology Journal, 2014, 13(12), 1999-2004.

Inserted Embedding in OFDM Channel: A Multicarrier Stego

Information Technology Journal, 2014, 13(12), 2017-2021.

Cryptic Cover for Covered Writing: A Pre-Layered Stego

Information Technology Journal, 2014, 13(16), 2524-2533.

Comparative Analysis of (5/3) and Haar IWT Based Steganography

Information Technology Journal, 2014, 13(16), 2534-2543.

Steganalysis Based on Difference Statistics for LSB Matching Steganography

Information Technology Journal, 2009, 8(8), 1281-1286.

A High-capacity Steganographic Scheme for 3D Point Cloud Models

Information Technology Journal, 2010, 9(3), 412-421.

Steganography-The Art of Hiding Data

Information Technology Journal, 2004, 3(3), 245-269.