• [email protected]
  • +971 507 888 742
Submit Manuscript
SciAlert
  • Home
  • Journals
  • Information
    • For Authors
    • For Referees
    • For Librarian
    • For Societies
  • Contact
  1. Information Technology Journal
  2. Vol 13 (12), 2014
  3. 1999-2004
  • Online First
  • Current Issue
  • Previous Issues
  • More Information
    Aims and Scope Editorial Board Guide to Authors Article Processing Charges
    Submit a Manuscript

Information Technology Journal

Year: 2014 | Volume: 13 | Issue: 12 | Page No.: 1999-2004
DOI: 10.3923/itj.2014.1999.2004

Facebook Twitter Digg Reddit Linkedin StumbleUpon E-mail

Article Trend



Total views 278

Authors


Padmapriya Praveenkumar

Country: India

G.S. Hemalatha

Country: India

Bharathsimha Reddy

Country: India

K. Thenmozhi

Country: India

J.B.B. Rayappan

Country: India

Rengarajan Amirtharajan

Country: India

Keywords


  • OFDM
  • QPSK
  • BPSK
  • steganography
  • QAM
  • simulink
Research Article

Secret Link Through Simulink: A Stego on OFDM Channel

Padmapriya Praveenkumar, G.S. Hemalatha, Bharathsimha Reddy, K. Thenmozhi, J.B.B. Rayappan and Rengarajan Amirtharajan
The prerequisite of internet and multimedia communication in the present wireless age is impregnability and higher data rata. In this study, a pragmatic approach was accomplished by the Simulink model of Orthogonal Frequency Division Multiplexing (OFDM) using image steganography incorporating BPSK and QPSK modulation schemes. To contemplate the distortion in the image, the discerning distortion metrics called as Mean Square Error (MSE) and Peak Signal to Noise Ratio (PSNR) were computed. The BER of OFDM system was also analysed.
PDF Fulltext XML References Citation

How to cite this article

Padmapriya Praveenkumar, G.S. Hemalatha, Bharathsimha Reddy, K. Thenmozhi, J.B.B. Rayappan and Rengarajan Amirtharajan, 2014. Secret Link Through Simulink: A Stego on OFDM Channel. Information Technology Journal, 13: 1999-2004.

DOI: 10.3923/itj.2014.1999.2004

URL: https://scialert.net/abstract/?doi=itj.2014.1999.2004

Related Articles

Graphical Password Authentication Scheme for Embedded Platform
Least Significant Bit but Quantum Bit: A Quasi Stego
Comparative Analysis of (5/3) and Haar IWT Based Steganography
Why Information Security Demands Transform Domain, Compression and Encryption?
Image Encryption: An Information Security Perceptive
Brownian Motion of Binary and Gray-Binary and Gray Bits in Image for Stego
Inverted Pattern in Inverted Time Domain for Icon Steganography
Pixel Authorized by Pixel to Trace with SFC on Image to Sabotage Data Mugger: A Comparative Study on PI Stego
Random Image Steganography and Steganalysis: Present Status and Future Directions
Stego on 2n:1 Platform for Users and Embedding

Leave a Comment


Your email address will not be published. Required fields are marked *

Useful Links

  • Journals
  • For Authors
  • For Referees
  • For Librarian
  • For Socities

Contact Us

Office Number 1128,
Tamani Arts Building,
Business Bay,
Deira, Dubai, UAE

Phone: +971 507 888 742
Email: [email protected]

About Science Alert

Science Alert is a technology platform and service provider for scholarly publishers, helping them to publish and distribute their content online. We provide a range of services, including hosting, design, and digital marketing, as well as analytics and other tools to help publishers understand their audience and optimize their content. Science Alert works with a wide variety of publishers, including academic societies, universities, and commercial publishers.

Follow Us
© Copyright Science Alert. All Rights Reserved