Subscribe Now Subscribe Today
Science Alert
 
Blue
   
Curve Top
Information Technology Journal
  Year: 2014 | Volume: 13 | Issue: 12 | Page No.: 2061-2064
DOI: 10.3923/itj.2014.2061.2064
 
Facebook Twitter Digg Reddit Linkedin StumbleUpon E-mail

Spread and Hide-A Stego Transceiver

Padmapriya Praveenkumar, K. Thenmozhi, J.B.B. Rayappan and Rengarajan Amirtharajan

Abstract:
We live in an era where hacking and unauthorized access attempts to data are so common. There is a need to secure data before it is transmitted. Addition of overhead bits and modulation techniques decrease the capacity and increase the cost. Both the channel capacity and the cost to set up the communication system have to be optimal. So intimidating is a feature called multiple access used for this purpose. Multiple access also improves capacity by simultaneously transmitting large number of messages. There is very less or no interference between the signals since each of them is polarized orthogonally or encoded using different coding sequences or sent as bursts in different time slots. Particularly Code Division Multiple Access (CDMA) makes it more difficult for the hacker to access the transmitted data. If the message is thrown to all the users only the intended receiver has the same coding sequence to decode it. So, others can’t access the message. Even if the message is detected, use of steganography makes it all the more difficult for the hacker to decode the message. This increases the security multifold. The aesthetic appeal of CDMA and steganography together has revolutionized the present world communication systems. In this study, the performance of CDMA is analysed by embedding confidential information at three levels namely after interleaving, spreading and modulator. The Bit Error Rate (BER) performance comparison graphs with and without information hiding at three levels are analysed using BPSK, QPSK and QAM schemes.
PDF Fulltext XML References Citation Report Citation
 RELATED ARTICLES:
  •    Inbuilt Image Encryption and Steganography Security Solutions for Wireless Systems: A Survey
  •    Graphical Password Authentication Scheme for Embedded Platform
  •    Comparative Analysis of (5/3) and Haar IWT Based Steganography
  •    Comparative Analysis of (5/3) and Haar IWT Based Steganography
  •    Brownian Motion of Binary and Gray-Binary and Gray Bits in Image for Stego
  •    Inverted Pattern in Inverted Time Domain for Icon Steganography
  •    Pixel Authorized by Pixel to Trace with SFC on Image to Sabotage Data Mugger: A Comparative Study on PI Stego
  •    Pixel Forefinger for Gray in Color: A Layer by Layer Stego
How to cite this article:

Padmapriya Praveenkumar, K. Thenmozhi, J.B.B. Rayappan and Rengarajan Amirtharajan, 2014. Spread and Hide-A Stego Transceiver. Information Technology Journal, 13: 2061-2064.

DOI: 10.3923/itj.2014.2061.2064

URL: https://scialert.net/abstract/?doi=itj.2014.2061.2064

COMMENT ON THIS PAPER
 
 
 

 

 
 
 
 
 
 
 
 
 

 
 
 
 
 

Curve Bottom