Subscribe Now Subscribe Today
Science Alert
 
FOLLOW US:     Facebook     Twitter
Blue
   
Curve Top
Journal of Applied Sciences
  Year: 2014 | Volume: 14 | Issue: 16 | Page No.: 1786-1797
DOI: 10.3923/jas.2014.1786.1797
Coded Crypted Converted Hiding (C3H)-A Stego Channel
Padmapriya Praveenkumar, Rengarajan Amirtharajan, K. Thenmozhi and J.B.B. Rayappan

Abstract:
Wireless communication with its enhanced efficiency, greater flexibility, mobility and reduced cost has encompassed human needs and sophistications to a greater extent. Several techniques adopted in the wireless standards solely contribute to its heightened demand. Orthogonal Frequency Division Multiplexing (OFDM) is one such technique adopted to provide robust and high speed networks by countenancing signal overlap. The data transmission over wireless, in general, is unsecure and open to the hands of the hackers. A method has to be devised to uniquely identify the copyright owner of the data and prevent the misuse of it. However, on the negative side, the hackers are on par with the experts in this field to combat against piracy. This necessitates the introduction of a method to impart security to the data being transmitted. This study embeds secret data bits in punctured convolutional encoder’s output which are then encrypted using Chaotic means to uphold discretion and then traversed through OFDM system. Integrity is made certain by four-level encryption of secret bits and is stored as key in Cyclic Prefix’s (CP) output. Comparison graphs for the performance of Bit Error Rate (BER) are plotted for different modulation schemes with different rates of punctured convolutional codes. These plots are for puncture patterns with convolutional encoder before and after infixing the secret data. Widespread metrics for performance measurement like BER and correlation values are computed. This estimation reveals the security and arbitrariness of data encryption both with and without embedding the secret.
 [Fulltext PDF]   [Fulltext HTML]   [XML: Abstract + References]   [References]   [View Citation]  [Report Citation]
 RELATED ARTICLES:
  •    Graphical Password Authentication Scheme for Embedded Platform
  •    Least Significant Bit but Quantum Bit: A Quasi Stego
  •    Comparative Analysis of (5/3) and Haar IWT Based Steganography
  •    Why Information Security Demands Transform Domain, Compression and Encryption?
  •    Arabic Text Steganography using Kashida Extensions with Huffman Code
  •    Hiding Data in Video File: An Overview
  •    Secure Topology for Electronic Medical Record Transmissions
  •    Brownian Motion of Binary and Gray-Binary and Gray Bits in Image for Stego
How to cite this article:

Padmapriya Praveenkumar, Rengarajan Amirtharajan, K. Thenmozhi and J.B.B. Rayappan, 2014. Coded Crypted Converted Hiding (C3H)-A Stego Channel. Journal of Applied Sciences, 14: 1786-1797.

DOI: 10.3923/jas.2014.1786.1797

URL: https://scialert.net/abstract/?doi=jas.2014.1786.1797

 
COMMENT ON THIS PAPER
 
 
 

 

 
 
 
 
 
 
 
 
 

 
 
 
 
 
 

Curve Bottom