Random & AWGN road for MC-CDMA & CDMA bus to phase hide — A MUX in MUX stego
暂无分享,去创建一个
K. Thenmozhi | P. Praveenkumar | R. Amirtharajan | Y. Ravishankar | J. Bosco | B. Rayappan | P. Praveenkumar | K. Thenmozhi | J. Bosco | B. Rayappan | Rengarajan Amirtharajan | Y. Ravishankar
[1] Junyi Shen,et al. A Novel CDMA-BLAST Space-Time Code Scheme , 2008 .
[2] . G.K.D.PrasannaVenkatesan,et al. Performance Analysis of MC-CDMA for Wide Band Channels , 2007 .
[3] Kevin Curran,et al. Digital image steganography: Survey and analysis of current methods , 2010, Signal Process..
[4] Paul Walter Baier. A critical review of CDMA , 1996, Proceedings of Vehicular Technology Conference - VTC.
[5] Ramjee Prasad,et al. An overview of multi-carrier CDMA , 1996, Proceedings of ISSSTA'95 International Symposium on Spread Spectrum Techniques and Applications.
[6] Fumiyuki Adachi,et al. SB-9-2 PERFORMANCE COMPARISON OF TURBO CODED MC-CDMA AND DS-CDMA WITH HIGHER LEVEL MODULATION(SB-9. Broadband wireless access techniques for the next generation wireless communications) , 2004 .
[7] Jasvir Singh,et al. Analysis of BER and Degradation Factor in WCDMA System at 5 MHz Bandwidth , 2007 .
[8] Panayiotis D. Papadimitriou,et al. Practical review of advanced CDMA receivers with emphasis in the downlink , 2006, 2006 IEEE International Symposium on Circuits and Systems.
[9] Peter Jorgensen,et al. Applied cryptography: Protocols, algorithm, and source code in C: By Bruce Schneier. New York: John Wiley, 1993. 618 p. $44.95 (paper). ISBN 0-471-59756-2 , 1996 .
[10] S. Suwa,et al. Performance comparison between MC/DS-CDMA and MC-CDMA for reverse link broadband packet wireless access , 2002, Proceedings IEEE 56th Vehicular Technology Conference.
[11] Fumiyuki Adachi,et al. Broadband CDMA techniques , 2005, IEEE Wireless Communications.
[12] . L.Nithyanandan,et al. Modified Frequency and Frame Synchronization Algorithms for MC-CDMA System , 2006 .
[13] R. Amirtharajan,et al. Tri-layer stego for enhanced security - a keyless random approach , 2009, 2009 IEEE International Conference on Internet Multimedia Services Architecture and Applications (IMSAA).
[14] Rengarajan Amirtharaj,et al. Stego on 2n:1 Platform for Users and Embedding , 2011 .
[15] Jeng-Shyang Pan,et al. Robust image watermarking based on multiple description vector quantisation , 2004 .
[16] Xue Jian-sheng,et al. OFDM Information Hiding Method by Preposition Embedded QIM , 2008, 2008 International Conference on Computational Intelligence for Modelling Control & Automation.
[17] K. Thenmozhi,et al. Multi Carrier Steg against Omni Attacks , 2010 .
[18] Lisa M. Marvel,et al. Spread spectrum image steganography , 1999, IEEE Trans. Image Process..
[19] D. Garg,et al. Performance comparison of turbo-coded DS-CDMA, MC-CDMA and OFDM with frequency-domain equalization and higher-level modulation , 2004, IEEE 60th Vehicular Technology Conference, 2004. VTC2004-Fall. 2004.
[20] Bernard P. Zajac. Applied cryptography: Protocols, algorithms, and source code in C , 1994 .
[21] Walter Bender,et al. Techniques for data hiding , 1995, Electronic Imaging.
[22] K. Thenmozhi,et al. Steg-OFDM blend for highly secure multi-user communication , 2011, 2011 2nd International Conference on Wireless Communication, Vehicular Technology, Information Theory and Aerospace & Electronic Systems Technology (Wireless VITAE).
[23] Rengarajan Amirtharajan,et al. Covered CDMA multi-user writing on spatially divided image , 2011, 2011 2nd International Conference on Wireless Communication, Vehicular Technology, Information Theory and Aerospace & Electronic Systems Technology (Wireless VITAE).
[24] R. Amirtharajan,et al. Wave (let) decide choosy pixel embedding for stego , 2011, 2011 International Conference on Computer, Communication and Electrical Technology (ICCCET).
[25] Feng-Wen Sun,et al. User identification for convolutionally/turbo-coded systems and its applications , 2003, IEEE Trans. Commun..
[26] Ahmad R. Badlishah,et al. Performance analysis of optical zero cross correlation in OCDMA system , 2007 .
[27] R. Amirtharajan,et al. Publication of Little Lion Scientific R & D , Islamabad PAKISTAN DATA BATTLE ON THE DIGITAL FIELD BETWEEN HORSE CAVALRY AND INTERLOPERS , 2011 .
[28] Gregory W. Wornell,et al. Quantization index modulation: A class of provably good methods for digital watermarking and information embedding , 2001, IEEE Trans. Inf. Theory.
[29] Rengarajan Amirtharajan,et al. Phase for Face saving-a multicarrier Stego , 2012 .
[30] O. Roeva,et al. Information Hiding: Techniques for Steganography and Digital Watermarking , 2000 .
[31] Bijan Jabbari,et al. Spreading codes for direct sequence CDMA and wideband CDMA cellular networks , 1998, IEEE Commun. Mag..