Random & AWGN road for MC-CDMA & CDMA bus to phase hide — A MUX in MUX stego

The safety of confidential information has always been a major concern everywhere ranging from the government, and defense details to our personal details. The increase in the illegal activities like financial theft, infringement, etc has necessitated the need for more secure systems. The level of safety required is also higher with the increase in the level of confidentiality of the data. In this paper, a novel information hiding method has been proposed for CDMA and MCCDMA in signal mapper block. In this paper different modulation scheme like BPSK, QPSK and 8-QAM are employed to study the performance of the proposed embedding method. It is found that introducing additional information in the signal mapper block is not affecting the performance of the regular transmission and also if the Signal to Noise Ration (SNR) is good enough then additional information would reveal itself in extraction on the receiver.

[1]  Junyi Shen,et al.  A Novel CDMA-BLAST Space-Time Code Scheme , 2008 .

[2]  . G.K.D.PrasannaVenkatesan,et al.  Performance Analysis of MC-CDMA for Wide Band Channels , 2007 .

[3]  Kevin Curran,et al.  Digital image steganography: Survey and analysis of current methods , 2010, Signal Process..

[4]  Paul Walter Baier A critical review of CDMA , 1996, Proceedings of Vehicular Technology Conference - VTC.

[5]  Ramjee Prasad,et al.  An overview of multi-carrier CDMA , 1996, Proceedings of ISSSTA'95 International Symposium on Spread Spectrum Techniques and Applications.

[6]  Fumiyuki Adachi,et al.  SB-9-2 PERFORMANCE COMPARISON OF TURBO CODED MC-CDMA AND DS-CDMA WITH HIGHER LEVEL MODULATION(SB-9. Broadband wireless access techniques for the next generation wireless communications) , 2004 .

[7]  Jasvir Singh,et al.  Analysis of BER and Degradation Factor in WCDMA System at 5 MHz Bandwidth , 2007 .

[8]  Panayiotis D. Papadimitriou,et al.  Practical review of advanced CDMA receivers with emphasis in the downlink , 2006, 2006 IEEE International Symposium on Circuits and Systems.

[9]  Peter Jorgensen,et al.  Applied cryptography: Protocols, algorithm, and source code in C: By Bruce Schneier. New York: John Wiley, 1993. 618 p. $44.95 (paper). ISBN 0-471-59756-2 , 1996 .

[10]  S. Suwa,et al.  Performance comparison between MC/DS-CDMA and MC-CDMA for reverse link broadband packet wireless access , 2002, Proceedings IEEE 56th Vehicular Technology Conference.

[11]  Fumiyuki Adachi,et al.  Broadband CDMA techniques , 2005, IEEE Wireless Communications.

[12]  . L.Nithyanandan,et al.  Modified Frequency and Frame Synchronization Algorithms for MC-CDMA System , 2006 .

[13]  R. Amirtharajan,et al.  Tri-layer stego for enhanced security - a keyless random approach , 2009, 2009 IEEE International Conference on Internet Multimedia Services Architecture and Applications (IMSAA).

[14]  Rengarajan Amirtharaj,et al.  Stego on 2n:1 Platform for Users and Embedding , 2011 .

[15]  Jeng-Shyang Pan,et al.  Robust image watermarking based on multiple description vector quantisation , 2004 .

[16]  Xue Jian-sheng,et al.  OFDM Information Hiding Method by Preposition Embedded QIM , 2008, 2008 International Conference on Computational Intelligence for Modelling Control & Automation.

[17]  K. Thenmozhi,et al.  Multi Carrier Steg against Omni Attacks , 2010 .

[18]  Lisa M. Marvel,et al.  Spread spectrum image steganography , 1999, IEEE Trans. Image Process..

[19]  D. Garg,et al.  Performance comparison of turbo-coded DS-CDMA, MC-CDMA and OFDM with frequency-domain equalization and higher-level modulation , 2004, IEEE 60th Vehicular Technology Conference, 2004. VTC2004-Fall. 2004.

[20]  Bernard P. Zajac Applied cryptography: Protocols, algorithms, and source code in C , 1994 .

[21]  Walter Bender,et al.  Techniques for data hiding , 1995, Electronic Imaging.

[22]  K. Thenmozhi,et al.  Steg-OFDM blend for highly secure multi-user communication , 2011, 2011 2nd International Conference on Wireless Communication, Vehicular Technology, Information Theory and Aerospace & Electronic Systems Technology (Wireless VITAE).

[23]  Rengarajan Amirtharajan,et al.  Covered CDMA multi-user writing on spatially divided image , 2011, 2011 2nd International Conference on Wireless Communication, Vehicular Technology, Information Theory and Aerospace & Electronic Systems Technology (Wireless VITAE).

[24]  R. Amirtharajan,et al.  Wave (let) decide choosy pixel embedding for stego , 2011, 2011 International Conference on Computer, Communication and Electrical Technology (ICCCET).

[25]  Feng-Wen Sun,et al.  User identification for convolutionally/turbo-coded systems and its applications , 2003, IEEE Trans. Commun..

[26]  Ahmad R. Badlishah,et al.  Performance analysis of optical zero cross correlation in OCDMA system , 2007 .

[27]  R. Amirtharajan,et al.  Publication of Little Lion Scientific R & D , Islamabad PAKISTAN DATA BATTLE ON THE DIGITAL FIELD BETWEEN HORSE CAVALRY AND INTERLOPERS , 2011 .

[28]  Gregory W. Wornell,et al.  Quantization index modulation: A class of provably good methods for digital watermarking and information embedding , 2001, IEEE Trans. Inf. Theory.

[29]  Rengarajan Amirtharajan,et al.  Phase for Face saving-a multicarrier Stego , 2012 .

[30]  O. Roeva,et al.  Information Hiding: Techniques for Steganography and Digital Watermarking , 2000 .

[31]  Bijan Jabbari,et al.  Spreading codes for direct sequence CDMA and wideband CDMA cellular networks , 1998, IEEE Commun. Mag..