Multi Carrier Steg against Omni Attacks

نویسندگان

  • R. Amirtharajan
  • Bosco Balaguru
  • W. Bender
  • D. Gruhl
  • N. Morimoto
  • A. Lu
  • Po-Yueh Chen
  • Hung-Ju Lin
  • Tariq S. Durrani
  • K. Thenmozhi
  • Ramjee Prasad
  • Feng-Wen Sun
چکیده

Information is considered as the most valuable resource in today's data-centric world. In recent times there has been a prodigious growth in information transmission. Parallel to it the data hiding techniques have also developed to sustain information authentication and confidentiality. Traditionally data was hidden in covers such as text, images and audio. But, all these enclosed the data before transmission, thereby creating a necessary evil of time lag between information origination and information transmission. This paper proposes a novel steganographic methodology to overcome the drawback with the help of modern multiplexing technology. Here the physical layer of the Orthogonal Frequency Division Multiplexing (OFDM) is used to embed data. Observations are made by testing this methodology along with Additive white Gaussian Noise and random noise. The experimental results validate the superiority of this data hiding scheme, while retaining the normal functionality of the OFDM technique. This just-in-time data hiding method works well in random noise channel and AWGN channel and the result are presented.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Performance Analysis of WiMAX under Single and Multi-Carrier Jamming

WiMAX is at the peak of communication technology as it is gaining a great position in the next generation of wireless networks. With the development of various wireless networks rapidly, they have turn into necessary infrastructure in our networking atmosphere. The main challenge for WiMAX is the problems associated with various jamming attacks that make them unavailable. Jamming attack is easy...

متن کامل

Genetic Algorithm Based Substitution Technique of Image Steganography

Steganography is the act of hiding a message inside another message in such a way that can only be detected by its intended recipient. Naturally, there are security agents who would like to fight these data hiding systems by steganalysis, i.e. discovering covered messages and rendering them useless. There is currently no steganography system which can resist all steganalysis attacks. The most n...

متن کامل

Using BELBIC based optimal controller for omni-directional threewheel robots model identified by LOLIMOT

In this paper, an intelligent controller is applied to control omni-directional robots motion. First, the dynamics of the three wheel robots, as a nonlinear plant with considerable uncertainties, is identified using an efficient algorithm of training, named LoLiMoT. Then, an intelligent controller based on brain emotional learning algorithm is applied to the identified model. This emotional l...

متن کامل

Effective Mechatronic Models and Methods for Implementation an Autonomous Soccer Robot

  Omni directional mobile robots have been popularly employed in several applications especially in soccer player robots considered in Robocup competitions. However, Omni directional navigation system, Omni-vision system and solenoid kicking mechanism in such mobile robots have not ever been combined. This situation brings the idea of a robot with no head direction into existence, a comprehensi...

متن کامل

Omni-directional Multi-baseline Stereo without Similarity Measures

This paper proposes a novel method for estimating depth from long-baseline image sequences captured by a precalibrated moving omni-directional multi-camera system (OMS). Our idea for estimating an omni-directional depth map is very simple; only counting interest points in images is integrated with the framework of conventional multibaseline stereo. Even by a simple algorithm, depth can be deter...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2010