Fixing, padding and Embedding – A Modulated Stego

نویسندگان

  • Padmapriya Praveenkumar
  • Rengarajan Amirtharajan
چکیده

Broadband application of wireless communication calls for good signal to noise ratio (SNR) and variable high data rates. In the midst of a spate of available techniques, Orthogonal Frequency Division Multiplexing (OFDM) has proven to be effective. OFDM systems have high tolerance towards multipath effects in fading channels. Wireless communication will become tortuous in the presence of Inter Symbol Interference (ISI). This complex situation is un-raveled by introducing Cyclic Prefix (CP) prior to transmission over fading channels. In this paper, an idea has been proposed for incorporating Cyclic Prefix (CP), Cyclic Post Fix (CPOF), Zero Padding (ZP) schemes in OFDM system while embedding the secret data for secure data transmission. BER graphs are simulated and compared for various modulation techniques like Binary Phase Shift Keying (BPSK), Quadrature Phase Shift Keying (QPSK) and Quadrature Amplitude Modulation (QAM) prior to embedding and after embedding the secret data. Keyword Cyclic prefix (CP), Cyclic Post Fix (CPOF), Zero Padding (ZP) schemes, OFDM, Steganography.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

An extended feature set for blind image steganalysis in contourlet domain

The aim of image steganalysis is to detect the presence of hidden messages in stego images. We propose a blind image steganalysis method in Contourlet domain and then show that the embedding process changes statistics of Contourlet coefficients. The suspicious image is transformed into Contourlet space, and then the statistics of Contourlet subbands coefficients are extracted as features. We us...

متن کامل

Singular Value Decomposition based Steganography Technique for JPEG2000 Compressed Images

In this paper, a steganography technique for JPEG2000 compressed images using singular value decomposition in wavelet transform domain is proposed. In this technique, DWT is applied on the cover image to get wavelet coefficients and SVD is applied on these wavelet coefficients to get the singular values. Then secret data is embedded into these singular values using scaling factor. Different com...

متن کامل

Image Steganography Based on Cellular Automata

In this paper, a new approach of image steganography using twodimensional Cellular Automata (2D-CA) has been proposed for a confidential message. We convert the message in such a way that message length becomes 1024 bits after padding some bits. If message size is more than 1024 bits, we subdivide the message of length 1024 bits using padding technique. Convert original message by XORing with s...

متن کامل

Steganalysis of embedding in difference of image pixel pairs by neural network

In this paper a steganalysis method is proposed for pixel value differencing method. This steganographic method, which has been immune against conventional attacks, performs the embedding in the difference of the values of pixel pairs. Therefore, the histogram of the differences of an embedded image is di_erent as compared with a cover image. A number of characteristics are identified in the di...

متن کامل

Eigenvalues-based LSB steganalysis

So far, various components of image characteristics have been used for steganalysis, including the histogram characteristic function, adjacent colors distribution, and sample pair analysis. However, some certain steganography methods have been proposed that can thwart some analysis approaches through managing the embedding patterns. In this regard, the present paper is intended to introduce a n...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2013