Asian Science Citation Index is committed to provide an authoritative, trusted and significant information by the coverage of the most important and influential journals to meet the needs of the global scientific community.  
ASCI Database
308-Lasani Town,
Sargodha Road,
Faisalabad, Pakistan
Fax: +92-41-8815544
Contact Via Web
Suggest a Journal
Articles by John Bosco Balaguru Rayappan
Total Records ( 3 ) for John Bosco Balaguru Rayappan
  Padmapriya Praveenkumar , Rengarajan Amirtharajan , K. Thenmozhi and John Bosco Balaguru Rayappan
  With the rabid development of the wireless technology, the gadgets that were once a luxury, have now become a necessity. The wireless technology was first developed for army utilisation. But later, because of the wide applications it had, it became a global obligation. But, today, with the advent of internet, the security of the wireless networks has been at a great stake. And also, the new generation of wireless network demands higher data requirements which is achieved by higher data bits per unit bandwidth because of a variety of multimedia applications, cost efficiency, spectral efficiency and security. In this study all of these challenging requirements are met by Orthogonal Frequency Division Multiplexing (OFDM) along with steganography. It is an attractive and explorative area for the next and future generation of wireless multimedia applications. The major challenging issue in the design of an OFDM transceiver is its high Peak-to-Average Power Ratio (PAPR). In this study, design of an OFDM system adopting Partial Transmit Sequence (PTS) and Selected Mapping (SLM) techniques were concentrated. We analyse the system performance for various values of subcarriers and modulation schemes by computing Complementary Cumulative Distribution Function (CCDF) and analysing the Bit Error Rate (BER). PAPR value is low as the number of subcarriers has been increased. PTS outperforms SLM when complexity is considered and SLM is preferred when the redundant bits in the information are high and data embedding algorithm is included after modulation to ensure wireless security.
  Rengarajan Amirtharajan , Jiaohua Qin and John Bosco Balaguru Rayappan
  In the current corporate scenario, data or information security is the most significant asset because loss of information will lead to financial and market loss which in-turn will be the end of business. Though, the security guards like cryptography, watermarking, steganography have armed on the electromagnetic pathway against hackers, the concern on data protection is growing in parallel with the up-to-the-minute electronic technology. In this review, the role, strength and weakness of steganography especially different random image steganography techniques in protecting the data have been analyzed and in addition how random techniques can be made smarter and effective have also been explored.
  Balakrishnan Ramalingam , Rengarajan Amirtharajan and John Bosco Balaguru Rayappan
  Information trouncing implants the secret info within a cover file making the former imperceptible. This study suggests an unexampled steganography construct to embed encrypted message bit in a (digital) color image taking up Linear Congruential Generator (LCC) for producing the arbitrary plot in support of pixel preference and elementary Least Significant Bit (LSB) routine for data infixing. This proposal also witnesses optimum embedding competence along with minimum computation complexness and superior image excellence. In order to prove the complexness and superiority of the proposed algorithm, Mean Square Error (MSE) and Peak Signal to Noise Ratio (PSNR) of the stego image has become calculated and results are reported. The proposed algorithm was implemented in ALTERA cyclone ii FPGA for which design and performance results are presented in the study.
Copyright   |   Desclaimer   |    Privacy Policy   |   Browsers   |   Accessibility