• [email protected]
  • +971 507 888 742
Submit Manuscript
SciAlert
  • Home
  • Journals
  • Information
    • For Authors
    • For Referees
    • For Librarian
    • For Societies
  • Contact
  1. Information Technology Journal
  2. Vol 13 (12), 2014
  3. 2061-2064
  • Online First
  • Current Issue
  • Previous Issues
  • More Information
    Aims and Scope Editorial Board Guide to Authors Article Processing Charges
    Submit a Manuscript

Information Technology Journal

Year: 2014 | Volume: 13 | Issue: 12 | Page No.: 2061-2064
DOI: 10.3923/itj.2014.2061.2064

Facebook Twitter Digg Reddit Linkedin StumbleUpon E-mail

Article Trend



Total views 54

Authors


Padmapriya Praveenkumar

Country: India

K. Thenmozhi

Country: India

J.B.B. Rayappan

Country: India

Rengarajan Amirtharajan

Country: India

Keywords


  • BER
  • BPSK
  • CDMA
  • QAM
  • QPSK
  • steganography
Research Article

Spread and Hide-A Stego Transceiver

Padmapriya Praveenkumar, K. Thenmozhi, J.B.B. Rayappan and Rengarajan Amirtharajan
We live in an era where hacking and unauthorized access attempts to data are so common. There is a need to secure data before it is transmitted. Addition of overhead bits and modulation techniques decrease the capacity and increase the cost. Both the channel capacity and the cost to set up the communication system have to be optimal. So intimidating is a feature called multiple access used for this purpose. Multiple access also improves capacity by simultaneously transmitting large number of messages. There is very less or no interference between the signals since each of them is polarized orthogonally or encoded using different coding sequences or sent as bursts in different time slots. Particularly Code Division Multiple Access (CDMA) makes it more difficult for the hacker to access the transmitted data. If the message is thrown to all the users only the intended receiver has the same coding sequence to decode it. So, others can’t access the message. Even if the message is detected, use of steganography makes it all the more difficult for the hacker to decode the message. This increases the security multifold. The aesthetic appeal of CDMA and steganography together has revolutionized the present world communication systems. In this study, the performance of CDMA is analysed by embedding confidential information at three levels namely after interleaving, spreading and modulator. The Bit Error Rate (BER) performance comparison graphs with and without information hiding at three levels are analysed using BPSK, QPSK and QAM schemes.
PDF Fulltext XML References Citation

How to cite this article

Padmapriya Praveenkumar, K. Thenmozhi, J.B.B. Rayappan and Rengarajan Amirtharajan, 2014. Spread and Hide-A Stego Transceiver. Information Technology Journal, 13: 2061-2064.

DOI: 10.3923/itj.2014.2061.2064

URL: https://scialert.net/abstract/?doi=itj.2014.2061.2064

Related Articles

Inbuilt Image Encryption and Steganography Security Solutions for Wireless Systems: A Survey
Graphical Password Authentication Scheme for Embedded Platform
Comparative Analysis of (5/3) and Haar IWT Based Steganography
Comparative Analysis of (5/3) and Haar IWT Based Steganography
Comparative Analysis of (5/3) and Haar IWT Based Steganography
Brownian Motion of Binary and Gray-Binary and Gray Bits in Image for Stego
Inverted Pattern in Inverted Time Domain for Icon Steganography
Pixel Authorized by Pixel to Trace with SFC on Image to Sabotage Data Mugger: A Comparative Study on PI Stego
Pixel Forefinger for Gray in Color: A Layer by Layer Stego
Regulated OFDM-Role of ECC and ANN: A Review

Leave a Comment


Your email address will not be published. Required fields are marked *

Useful Links

  • Journals
  • For Authors
  • For Referees
  • For Librarian
  • For Socities

Contact Us

Office Number 1128,
Tamani Arts Building,
Business Bay,
Deira, Dubai, UAE

Phone: +971 507 888 742
Email: [email protected]

About Science Alert

Science Alert is a technology platform and service provider for scholarly publishers, helping them to publish and distribute their content online. We provide a range of services, including hosting, design, and digital marketing, as well as analytics and other tools to help publishers understand their audience and optimize their content. Science Alert works with a wide variety of publishers, including academic societies, universities, and commercial publishers.

Follow Us
© Copyright Science Alert. All Rights Reserved