Research Article
Multi (Carrier+Modulator) Adaptive System-an Anti Fading Stego Approach

Padmapriya Praveenkumar, Rengarajan Amirtharajan, R. Sai Janani, K. Thenmozhi and J.B.B. Rayappan

Journal of Applied Sciences, 2014, 14(16), 1836-1843.

Abstract

There are numerous criteria in running an enterprise. Apart from trading goods and services, or may be both to clients, emphasis should be laid on maintaining the business model that comprises of maintenance of intellectual properties and decisive testimonials as well. In this regard, up to date technological proficiencies be of great assist as everything is now digital and online. Though sound different, technology and administrative terms go hand in hand. Of all one domain that catch the attention instantly is secret sharing and secret communication. This study is one such work. Digital multimedia applications, coming into the limelight in the recent years have impacted the bandwidth requirements and caused an ever soaring demand for broadband wireless application. On the other hand, wireless communication that uses fixed modulation fails to satisfy the needs as its efficiency is stultified by the fading channels. This stydy proposes the adaptive modulation scheme in OFDM (Orthogonal Frequency Division Multiplexing) system to counteract fading in the transmission power and the transfer function of frequency selective channel. The prime aim is to maximise the total capacity and transmit power without vitiating the quality of service at the receiver. It can be achieved by making the system smart and subsume some intelligence into it. We make the system adapt itself to the channel conditions and choose the well-suited service at that instant. Simulation results have made it clear that adaptive modulation in OFDM system offers the choice of modulation and FEC (Forward Error Control Codes) with variable rates. The essence of adaptation is maintained even while embedding in wireless transmission to serve the security purposes. Bit Error Rate (BER) graph plotted prior to embedding is analyzed and compared with the one plotted for embedded data.

ASCI-ID: 35-5977

Cited References Fulltext

Similar Articles


Crosstalk Penalty in an OXC with Wavelength Converter in the Presence of Interferometric Intensity-Relative Output-ASE Noises

Journal of Applied Sciences, 2007, 7(23), 3705-3712.

Double Layer Encoded Encrypted Data on Multicarrier Channel

Journal of Applied Sciences, 2014, 14(15), 1689-1700.

Coded Crypted Converted Hiding (C3H)-A Stego Channel

Journal of Applied Sciences, 2014, 14(16), 1786-1797.

Performance Enhancement of OSTBC Applied OFDM Modulation for Wireless Communication Systems

Journal of Applied Sciences, 2016, 16(9), 419-428.

Sub Carriers Carry Secret: An Absolute Stego Approach

Journal of Applied Sciences, 2014, 14(15), 1728-1735.

PAPR Reduction Based on Weighted OFDM with Product Block Codes for Wireless Communication

Journal of Applied Sciences, 2008, 8(23), 4440-4444.

Regulated OFDM-Role of ECC and ANN: A Review

Journal of Applied Sciences, 2012, 12(4), 301-314.

Sub Carriers Carry Secret: An Absolute Stego Approach

Journal of Applied Sciences, 2014, 14(15), 1728-1735.

Double Layer Encoded Encrypted Data on Multicarrier Channel

Journal of Applied Sciences, 2014, 14(15), 1689-1700.

Coded Crypted Converted Hiding (C3H)-A Stego Channel

Journal of Applied Sciences, 2014, 14(16), 1786-1797.

Performance Enhancement of OSTBC Applied OFDM Modulation for Wireless Communication Systems

Journal of Applied Sciences, 2016, 16(9), 419-428.

A Novel Embedding Method to Increase Capacity and Robustness of Low-bit Encoding Audio Steganography Technique Using Noise Gate Software Logic Algorithm

Journal of Applied Sciences, 2010, 10(1), 59-64.

On the Capacity and Security of Steganography Approaches: An Overview

Journal of Applied Sciences, 2010, 10(16), 1825-1833.

On the Differences between Hiding Information and Cryptography Techniques: An Overview

Journal of Applied Sciences, 2010, 10(15), 1650-1655.

Hiding Data in Video File: An Overview

Journal of Applied Sciences, 2010, 10(15), 1644-1649.

An Overview on Hiding Information Technique in Images

Journal of Applied Sciences, 2010, 10(18), 2094-2100.

Investigate the Capability of Applying Hidden Data in Text File: An Overview

Journal of Applied Sciences, 2010, 10(17), 1916-1922.

Survey and Analysis of Hardware Cryptographic and Steganographic Systems on FPGA

Journal of Applied Sciences, 2012, 12(3), 201-210.

Brownian Motion of Binary and Gray-Binary and Gray Bits in Image for Stego

Journal of Applied Sciences, 2012, 12(5), 428-439.

Sub Carriers Carry Secret: An Absolute Stego Approach

Journal of Applied Sciences, 2014, 14(15), 1728-1735.

Coded Crypted Converted Hiding (C3H)-A Stego Channel

Journal of Applied Sciences, 2014, 14(16), 1786-1797.

Adaptive Data Hiding Based on Visual Cryptography

Journal of Applied Sciences, 2014, 14(15), 1674-1688.

Random Image Steganography using Pixel Indicator to Enhance Hiding Capacity

Journal of Applied Sciences, 2014, 14(16), 1798-1808.