• [email protected]
  • +971 507 888 742
Submit Manuscript
SciAlert
  • Home
  • Journals
  • Information
    • For Authors
    • For Referees
    • For Librarian
    • For Societies
  • Contact
  1. Information Technology Journal
  2. Vol 13 (12), 2014
  3. 1985-1991
  • Online First
  • Current Issue
  • Previous Issues
  • More Information
    Aims and Scope Editorial Board Guide to Authors Article Processing Charges
    Submit a Manuscript

Information Technology Journal

Year: 2014 | Volume: 13 | Issue: 12 | Page No.: 1985-1991
DOI: 10.3923/itj.2014.1985.1991

Facebook Twitter Digg Reddit Linkedin StumbleUpon E-mail

Article Trend



Total views 296

Search


Authors


Padmapriya Praveenkumar

Country: India

K. Thenmozhi

Country: India

John Bosco Balaguru Rayappan

Country: India

Rengarajan Amirtharajan

Country: India

Keywords


  • steganography
  • ANN
  • OFDM
  • FEC
  • viterbi decoders
Research Article

Purposeful Error on OFDM: A Secret Channel

Padmapriya Praveenkumar, K. Thenmozhi, John Bosco Balaguru Rayappan and Rengarajan Amirtharajan
Improved Signal to Noise Ratio (SNR) and variable higher data rates will pave a way to a brighter future for the next generation broadband applications of wireless communication. The OFDM system tolerates robustness against the multipath effects encountered by the fading channels. Enhanced system is achieved by using Forward Error Correction (FEC) codes. The attrition of errors in signals will increase the reliability of the system. In this study, secret data has been embedded after encoding the data using Convolutional encoders and passed over OFDM system. At the receiver end, Artificial Neural Network (ANN) helps better BER. The signals are passed over an OFDM receiver and decoded using Viterbi decoders.
PDF Fulltext XML References Citation

How to cite this article

Padmapriya Praveenkumar, K. Thenmozhi, John Bosco Balaguru Rayappan and Rengarajan Amirtharajan, 2014. Purposeful Error on OFDM: A Secret Channel. Information Technology Journal, 13: 1985-1991.

DOI: 10.3923/itj.2014.1985.1991

URL: https://scialert.net/abstract/?doi=itj.2014.1985.1991

Related Articles

Graphical Password Authentication Scheme for Embedded Platform
Least Significant Bit but Quantum Bit: A Quasi Stego
Least Significant Bit but Quantum Bit: A Quasi Stego
Why Information Security Demands Transform Domain, Compression and Encryption?
Image Encryption: An Information Security Perceptive
A Novel Embedding Method to Increase Capacity and Robustness of Low-bit Encoding Audio Steganography Technique Using Noise Gate Software Logic Algorithm
Brownian Motion of Binary and Gray-Binary and Gray Bits in Image for Stego
Pixel Authorized by Pixel to Trace with SFC on Image to Sabotage Data Mugger: A Comparative Study on PI Stego
Inverted Pattern in Inverted Time Domain for Icon Steganography
Random Image Steganography and Steganalysis: Present Status and Future Directions

Leave a Comment


Your email address will not be published. Required fields are marked *

Useful Links

  • Journals
  • For Authors
  • For Referees
  • For Librarian
  • For Socities

Contact Us

Office Number 1128,
Tamani Arts Building,
Business Bay,
Deira, Dubai, UAE

Phone: +971 507 888 742
Email: [email protected]

About Science Alert

Science Alert is a technology platform and service provider for scholarly publishers, helping them to publish and distribute their content online. We provide a range of services, including hosting, design, and digital marketing, as well as analytics and other tools to help publishers understand their audience and optimize their content. Science Alert works with a wide variety of publishers, including academic societies, universities, and commercial publishers.

Follow Us
© Copyright Science Alert. All Rights Reserved