CFP last date
20 May 2024
Reseach Article

Multi Carrier Steg against Omni Attacks

by R.John Bosco Balaguru, K.Thenmozhi, R.Amirtharajan
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 5 - Number 11
Year of Publication: 2010
Authors: R.John Bosco Balaguru, K.Thenmozhi, R.Amirtharajan
10.5120/952-1329

R.John Bosco Balaguru, K.Thenmozhi, R.Amirtharajan . Multi Carrier Steg against Omni Attacks. International Journal of Computer Applications. 5, 11 ( August 2010), 35-40. DOI=10.5120/952-1329

@article{ 10.5120/952-1329,
author = { R.John Bosco Balaguru, K.Thenmozhi, R.Amirtharajan },
title = { Multi Carrier Steg against Omni Attacks },
journal = { International Journal of Computer Applications },
issue_date = { August 2010 },
volume = { 5 },
number = { 11 },
month = { August },
year = { 2010 },
issn = { 0975-8887 },
pages = { 35-40 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume5/number11/952-1329/ },
doi = { 10.5120/952-1329 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T19:54:03.373955+05:30
%A R.John Bosco Balaguru
%A K.Thenmozhi
%A R.Amirtharajan
%T Multi Carrier Steg against Omni Attacks
%J International Journal of Computer Applications
%@ 0975-8887
%V 5
%N 11
%P 35-40
%D 2010
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Information is considered as the most valuable resource in today's data-centric world. In recent times there has been a prodigious growth in information transmission. Parallel to it the data hiding techniques have also developed to sustain information authentication and confidentiality. Traditionally data was hidden in covers such as text, images and audio. But, all these enclosed the data before transmission, thereby creating a necessary evil of time lag between information origination and information transmission. This paper proposes a novel steganographic methodology to overcome the drawback with the help of modern multiplexing technology. Here the physical layer of the Orthogonal Frequency Division Multiplexing (OFDM) is used to embed data. Observations are made by testing this methodology along with Additive white Gaussian Noise and random noise. The experimental results validate the superiority of this data hiding scheme, while retaining the normal functionality of the OFDM technique. This just-in-time data hiding method works well in random noise channel and AWGN channel and the result are presented.

References
  1. R.Amirtharajan, Krishnendra Nathella and J Harish, “Info Hide – A Cluster Cover Approach” International Journal of Computer Applications 3(5) (2010)11–18.
  2. W. Bender, D. Gruhl, N. Morimoto, A. Lu, Techniques for data hiding, IBM Syst. J. 35 (3&4) (1996) 313–336.
  3. S. Katzenbeisser, F.A.P. Petitcolas, Information Hiding Techniques for Steganography and Digital Watermarking, Artech House, Norwood, MA, 2000
  4. J.S. Pan, Y.-C. Hsin, H.-C. Huang and K.-C.Huang, "Robust image watermarking based on multiple description vector quantisation," Electronics letters, vol. 40(22) October 2004.
  5. Po-Yueh Chen, Hung-Ju Lin, A DWT Based Approach for Image Steganography, International Journal of Applied Science and Engineering 4(3) (2006) 275-290.
  6. Roy Chapman and Tariq S. Durrani, "IP Protection of DSP algorithms for system on chip implementation," IEEE Transactions on signal processing, 48(3) (2000) 854-861.
  7. K. Thenmozhi , R. Varadarajan , V.Prithiviraj, "IEEE 802.11a Physical layer implementation using OFDM" International Journal of Systemics, Cybernetics and Informatics (IJSCI), October 2006, 57-60.
  8. Van Nee, Richard & Ramjee Prasad, “OFDM for Wireless Multimedia Communications”, Boston: Artech House, 2000.
  9. Yimin Jiang, and Feng-Wen Sun, “User Identification for convolutionally/turbo-coded systems and its applications,” IEEE Transactions on communications, 51(11) (2003)1796-1808
Index Terms

Computer Science
Information Sciences

Keywords

BPSK Steganography OFDM