Steganography Performance over AWGN Channel
Journal Title: International Journal of Advanced Computer Science & Applications - Year 2019, Vol 10, Issue 8
Abstract
Steganography can be performed using frequency domain or spatial domain. In spatial domain method, the least significant bits (LSB) is the mostly used method where the least significant bits of the image's pixels binary representation are used to carry the confidential data bits. On the other hand, secret data bits in the frequency domain technique are hidden using coefficients of the image frequency representation such as discrete cosine transform (DCT). Robustness against image attacks or channel's noise is a key requirement in steganography. In this paper, we study the performance of the steganography methods over a channel with Added White Gaussian Noise (AWGN). We use the bit error rate to evaluate the performance of each method over a channel with different noise levels. Simulation results show that the frequency domain technique is more robust and achieves better bit error rate in a noisy channel than the spatial domain method. Moreover, we enhanced the steganography system robustness by using convolution encoder and Viterbi decoder. The effect of the encoder’s parameters, such as rate and constraint length is evaluated.
Authors and Affiliations
Fahd Alharbi
Automatic Sign Language Recognition: Performance Comparison of Word based Approach with Spelling based Approach
Evolution of computer based interaction has been through a number of phases. From command line interface to menu driven environment to Graphics User Interface, the communication has evolved to a better user friendly envi...
Resources Management of Mobile Network IEEE 802.16e WiMAX
The evolution of the world of telecommunications towards the mobile multimedia following the technological advances has demonstrated that to provide access to the network is no longer sufficient. The need for users is to...
Modeling and Simulation Multi Motors Web Winding System
Web winding systems allow the operations of unwinding and rewinding of various products including plastic films, sheets of paper, sheets, and fabrics. These operations are necessary for the development and the treatment...
A Text based Authentication Scheme for Improving Security of Textual Passwords
User authentication through textual passwords is very common in computer systems due to its ease of use. However textual passwords are vulnerable to different kinds of security attacks, such as spyware and dictionary att...
FARM: Fuzzy Action Rule Mining
Action Mining is a sub-field of Data Mining that concerns about finding ready-to-apply action rules. The majority of the patterns discovered by traditional data mining methods require analysis and further work by domain...