|
|
Articles
by
John Bosco Balaguru Rayappan |
Total Records (
3 ) for
John Bosco Balaguru Rayappan |
|
 |
|
|
|
Padmapriya Praveenkumar
,
Rengarajan Amirtharajan
,
K. Thenmozhi
and
John Bosco Balaguru Rayappan
|
|
With the rabid development of the wireless technology, the gadgets that were
once a luxury, have now become a necessity. The wireless technology was first
developed for army utilisation. But later, because of the wide applications
it had, it became a global obligation. But, today, with the advent of internet,
the security of the wireless networks has been at a great stake. And also, the
new generation of wireless network demands higher data requirements which is
achieved by higher data bits per unit bandwidth because of a variety of multimedia
applications, cost efficiency, spectral efficiency and security. In this study
all of these challenging requirements are met by Orthogonal Frequency Division
Multiplexing (OFDM) along with steganography. It is an attractive and explorative
area for the next and future generation of wireless multimedia applications.
The major challenging issue in the design of an OFDM transceiver is its high
Peak-to-Average Power Ratio (PAPR). In this study, design of an OFDM system
adopting Partial Transmit Sequence (PTS) and Selected Mapping (SLM) techniques
were concentrated. We analyse the system performance for various values of subcarriers
and modulation schemes by computing Complementary Cumulative Distribution Function
(CCDF) and analysing the Bit Error Rate (BER). PAPR value is low as the number
of subcarriers has been increased. PTS outperforms SLM when complexity is considered
and SLM is preferred when the redundant bits in the information are high and
data embedding algorithm is included after modulation to ensure wireless security. |
|
|
|
|
|
Rengarajan Amirtharajan
,
Jiaohua Qin
and
John Bosco Balaguru Rayappan
|
|
In the current corporate scenario, data or information security is the most significant asset because loss of information will lead to financial and market loss which in-turn will be the end of business. Though, the security guards like cryptography, watermarking, steganography have armed on the electromagnetic pathway against hackers, the concern on data protection is growing in parallel with the up-to-the-minute electronic technology. In this review, the role, strength and weakness of steganography especially different random image steganography techniques in protecting the data have been analyzed and in addition how random techniques can be made smarter and effective have also been explored. |
|
|
|
|
|
Balakrishnan Ramalingam
,
Rengarajan Amirtharajan
and
John Bosco Balaguru Rayappan
|
|
Information trouncing implants the secret info within a cover
file making the former imperceptible. This study suggests an unexampled steganography
construct to embed encrypted message bit in a (digital) color image taking up
Linear Congruential Generator (LCC) for producing the arbitrary plot in support
of pixel preference and elementary Least Significant Bit (LSB) routine for data
infixing. This proposal also witnesses optimum embedding competence along with
minimum computation complexness and superior image excellence. In order to prove
the complexness and superiority of the proposed algorithm, Mean Square Error
(MSE) and Peak Signal to Noise Ratio (PSNR) of the stego image has become calculated
and results are reported. The proposed algorithm was implemented in ALTERA cyclone
ii FPGA for which design and performance results are presented in the study. |
|
|
|
|
|
|