Search. Read. Cite.

Easy to search. Easy to read. Easy to cite with credible sources.

Research Article
Reversible Steganography on OFDM Channel: A Role of Cyclic Codes

Padmapriya Praveenkumar, R. Deepak, K. Thenmozhi, John Bosco Balaguru Rayappan and Rengarajan Amirtharajan

Information Technology Journal, 2014, 13(12), 2047-2051.

Abstract

In the era of wireless communication, the World Wide Web is the brain child of all the new technological development. This digital world has speeded up the data transfer and communication speed a manifold, creating new goods and services all along. Along with the development of internet, developed ways of hacking, modifying and stealing it also increased. There is an increasing demand to augment the data rates and to provide greater fidelity. Thus, technology provides us the finesse for increasing robustness over fading channels. The most prominent solution for increased speed is OFDM. And the security issues can be taken care of by embedding confidential data after encoding the message using cyclic codes.

ASCI-ID: 28-1974

Cited References Fulltext

Related Articles


Comparison of Bit Error Rate Performance of Multi Carrier DE-APSK Systems and Single Carrier DE-APSK in Presence of AWGN and Rician Fading Channels

Information Technology Journal, 2005, 4(1), 63-68.

Stego in Multicarrier: A Phase Hidden Communication

Information Technology Journal, 2014, 13(12), 2011-2016.

Data Security and Cryptographic Techniques: A Review

Information Technology Journal, 2004, 3(1), 106-132.

Implementation of One-Time Pad Cryptography

Information Technology Journal, 2005, 4(1), 87-95.

Implementation of Elliptic Curve Diffie-Hellman and EC Encryption Schemes

Information Technology Journal, 2005, 4(2), 132-139.

Theory and Implementation of Data Encryption Standard: A Review

Information Technology Journal, 2005, 4(4), 307-325.

An Enhanced Scheme against Node Capture Attack using Hash-Chain for Wireless Sensor Networks

Information Technology Journal, 2012, 11(1), 102-109.

Humming Bird with Coloured Wings: A Feedback Security Approach

Information Technology Journal, 2014, 13(12), 2022-2026.

Hybrid Encryption Algorithms in Cloud Computing

Information Technology Journal, 2013, 12(14), 3015-3019.

Elliptic Curve Cryptography over Binary Finite Field GF(2m)

Information Technology Journal, 2006, 5(1), 204-229.

Performance Evaluation of M-APSK Modulation in the Nonlinearly Distorted LTE Uplink

Information Technology Journal, 2012, 11(10), 1418-1425.

Stego in Multicarrier: A Phase Hidden Communication

Information Technology Journal, 2014, 13(12), 2011-2016.

Spread and Hide-A Stego Transceiver

Information Technology Journal, 2014, 13(12), 2061-2064.

Secret Link Through Simulink: A Stego on OFDM Channel

Information Technology Journal, 2014, 13(12), 1999-2004.

Empirical Mode Decomposition for BER Improvement in Cellular Network

Information Technology Journal, 2010, 9(1), 146-151.

Spread and Hide-A Stego Transceiver

Information Technology Journal, 2014, 13(12), 2061-2064.

Secret Link Through Simulink: A Stego on OFDM Channel

Information Technology Journal, 2014, 13(12), 1999-2004.

Stego in Multicarrier: A Phase Hidden Communication

Information Technology Journal, 2014, 13(12), 2011-2016.

Multi-Blogs Steganographic Algorithm Based on Directed Hamiltonian Path Selection

Information Technology Journal, 2008, 7(3), 450-457.

High Quality Steganography Model with Attacks Detection

Information Technology Journal, 2003, 2(2), 116-127.

Proving Poverty of Steganography System

Information Technology Journal, 2005, 4(3), 284-288.

A Review on Detection of LSB Matching Steganography

Information Technology Journal, 2010, 9(8), 1725-1738.

Steganography in Ms Excel Document using Text-rotation Technique

Information Technology Journal, 2011, 10(4), 889-893.

A Secure Steganographic Method via Multiple Choice Questions

Information Technology Journal, 2011, 10(5), 992-1000.

A Huffman Coding Section-based Steganography for AAC Audio

Information Technology Journal, 2011, 10(10), 1983-1988.

Stego on 2n:1 Platform for Users and Embedding

Information Technology Journal, 2011, 10(10), 1896-1907.

Inverted Pattern in Inverted Time Domain for Icon Steganography

Information Technology Journal, 2012, 11(5), 587-595.

Steganalysis Based on Least Square Method for Multiple Least Significant Bits Steganography

Information Technology Journal, 2013, 12(6), 1233-1238.

Reversible Steganography on OFDM Channel-A Role of RS Coding

Information Technology Journal, 2014, 13(12), 2052-2056.

Purposeful Error on OFDM: A Secret Channel

Information Technology Journal, 2014, 13(12), 1985-1991.

A Client-side Fingerprinting Method for Text Document Distribution

Information Technology Journal, 2014, 13(2), 251-259.

Stego in Multicarrier: A Phase Hidden Communication

Information Technology Journal, 2014, 13(12), 2011-2016.

Spread and Hide-A Stego Transceiver

Information Technology Journal, 2014, 13(12), 2061-2064.

Cover as Key and Key as Data: An Inborn Stego

Information Technology Journal, 2014, 13(12), 1969-1976.

Secret Link Through Simulink: A Stego on OFDM Channel

Information Technology Journal, 2014, 13(12), 1999-2004.

Data Puncturing in OFDM Channel: A Multicarrier Stego

Information Technology Journal, 2014, 13(12), 2037-2041.

Inserted Embedding in OFDM Channel: A Multicarrier Stego

Information Technology Journal, 2014, 13(12), 2017-2021.

Cryptic Cover for Covered Writing: A Pre-Layered Stego

Information Technology Journal, 2014, 13(16), 2524-2533.

Comparative Analysis of (5/3) and Haar IWT Based Steganography

Information Technology Journal, 2014, 13(16), 2534-2543.

Steganalysis Based on Difference Statistics for LSB Matching Steganography

Information Technology Journal, 2009, 8(8), 1281-1286.

A High-capacity Steganographic Scheme for 3D Point Cloud Models

Information Technology Journal, 2010, 9(3), 412-421.

Steganography-The Art of Hiding Data

Information Technology Journal, 2004, 3(3), 245-269.