Intersect embedding on OFDM channel — A stego perspective

The field of digital communication is gifted with OFDM, a very powerful technology that opened doors to several applications requiring higher bandwidth and data rates. It survives severe channel conditions like narrow band interference and frequency selective fading. However, the increasing rate of data piracy accentuates the need for a secure wireless transmission. In this paper, we propose a technique to increase the efficiency of OFDM by incorporating embedding in it. The data is embedded in the system following the steps of modulation and cyclic prefix in the OFDM process. The BER graphs for various modulation schemes like BPSK, QPSK and QAM are analyzed to arrive at the best modulation scheme having higher error tolerance than others.

[1]  J. Nandhini,et al.  Who decides hiding capacity? I, the pixel intensity , 2012, 2012 International Conference on Recent Advances in Computing and Software Systems.

[2]  Lisa M. Marvel,et al.  Spread spectrum image steganography , 1999, IEEE Trans. Image Process..

[3]  Kevin Curran,et al.  Digital image steganography: Survey and analysis of current methods , 2010, Signal Process..

[4]  V. Meena,et al.  Seeable visual but not sure of it , 2012, IEEE-International Conference On Advances In Engineering, Science And Management (ICAESM -2012).

[5]  Rengarajan Amirtharajan,et al.  Horse Riding & Hiding in Image for Data Guarding , 2012 .

[6]  Rengarajan Amirtharaj,et al.  Inverted Pattern in Inverted Time Domain for Icon Steganography , 2012 .

[7]  B. Saltzberg,et al.  Performance of an Efficient Parallel Data Transmission System , 1967, IEEE Transactions on Communication Technology.

[8]  K. Thenmozhi,et al.  Pixel Forefinger for Gray in Color: A Layer by Layer Stego , 2012 .

[9]  K. Thenmozhi,et al.  Steg-OFDM blend for highly secure multi-user communication , 2011, 2011 2nd International Conference on Wireless Communication, Vehicular Technology, Information Theory and Aerospace & Electronic Systems Technology (Wireless VITAE).

[10]  Rengarajan Amirtharaj,et al.  Stego on 2n:1 Platform for Users and Embedding , 2011 .

[11]  John Bosco Balaguru Rayappan,et al.  Wave (let) decide choosy pixel embedding for stego , 2011, 2011 International Conference on Computer, Communication and Electrical Technology (ICCCET).

[12]  A.,et al.  The Origins of Spread-Spectrum Communications , 2000 .

[13]  K. Thenmozhi,et al.  OFDM+CDMA+Stego = Secure Communication: A Review , 2012 .

[14]  K. Thenmozhi,et al.  Regulated OFDM-Role of ECC and ANN: A Review , 2012 .

[15]  Rengarajan Amirtharajan,et al.  Phase for Face saving-a multicarrier Stego , 2012 .

[16]  Jiaohua Qin,et al.  Random Image Steganography and Steganalysis: Present Status and Future Directions , 2012 .

[17]  Bruce Schneier,et al.  Applied cryptography : protocols, algorithms, and source codein C , 1996 .

[18]  Geoffrey Ye Li,et al.  OFDM and Its Wireless Applications: A Survey , 2009, IEEE Transactions on Vehicular Technology.

[19]  Rengarajan Amirtharajan,et al.  MSB over hides LSB — A dark communication with integrity , 2011, 2011 IEEE 5th International Conference on Internet Multimedia Systems Architecture and Application.

[20]  V. Mahalakshmi,et al.  Modulation of hiding intensity by channel intensity - Stego by pixel commando , 2012, 2012 International Conference on Computing, Electronics and Electrical Technologies (ICCEET).

[21]  Markus G. Kuhn,et al.  Information hiding-a survey , 1999, Proc. IEEE.

[22]  Rengarajan Amirtharaj,et al.  Survey and Analysis of Hardware Cryptographic and Steganographic Systems on FPGA , 2012 .

[23]  Robert A. Scholtz,et al.  The Origins of Spread-Spectrum Communications , 1982, IEEE Trans. Commun..

[24]  Ingemar J. Cox,et al.  Secure spread spectrum watermarking for multimedia , 1997, IEEE Trans. Image Process..

[25]  Laurence B. Milstein,et al.  Revisions to "Theory of Spread-Spectrum Communications-A Tutorial" , 1984, IEEE Trans. Commun..

[26]  Antonio Ruiz,et al.  Frequency domain data transmission using reduced computational complexity algorithms , 1980, ICASSP.

[27]  K. Thenmozhi,et al.  Firmware for Data Security: A Review , 2012 .

[28]  Bernard P. Zajac Applied cryptography: Protocols, algorithms, and source code in C , 1994 .

[29]  K. Thenmozhi,et al.  Random & AWGN road for MC-CDMA & CDMA bus to phase hide — A MUX in MUX stego , 2012, 2012 International Conference on Computer Communication and Informatics.

[30]  Rengarajan Amirtharajan,et al.  An intelligent chaotic embedding approach to enhance stego-image quality , 2012, Inf. Sci..

[31]  Rengarajan Amirtharajan,et al.  Covered CDMA multi-user writing on spatially divided image , 2011, 2011 2nd International Conference on Wireless Communication, Vehicular Technology, Information Theory and Aerospace & Electronic Systems Technology (Wireless VITAE).