Hiding Messages in Audio Files Using Direct Spread Spectrum

Author(s):  
Alexandr Kuznetsov ◽  
Oleksii Smirnov ◽  
Victor Zhora ◽  
Alexander Onikiychuk ◽  
Olha Pieshkova
Author(s):  
Maksim Zhmakin ◽  
Irina Chadyuk ◽  
Aleksey Nadymov

A variant of implementation of a communication system with direct spread spectrum is presented in this article, simulation results are also presented, the main parameters of the system are taken, and conclusions are drawn.


2013 ◽  
Vol 2013 ◽  
pp. 1-7 ◽  
Author(s):  
Guoqiang Wu ◽  
Yuguang Bai ◽  
Zhaowei Sun

For the formation of three microsatellites which fly in the same orbit and perform three-dimensional solid mapping for terra, this paper proposes an optimizing design method of space circular formation order based on improved generic algorithm and provides an intersatellite direct spread spectrum communication system. The calculating equation of LEO formation flying satellite intersatellite links is guided by the special requirements of formation-flying microsatellite intersatellite links, and the transmitter power is also confirmed throughout the simulation. The method of space circular formation order optimizing design based on improved generic algorithm is given, and it can keep formation order steady for a long time under various absorb impetus. The intersatellite direct spread spectrum communication system is also provided. It can be found that, when the distance is 1 km and the data rate is 1 Mbps, the input wave matches preferably with the output wave. And LDPC code can improve the communication performance. The correct capability of (512, 256) LDPC code is better than (2, 1, 7) convolution code, distinctively. The design system can satisfy the communication requirements of microsatellites. So, the presented method provides a significant theory foundation for formation-flying and intersatellite communication.


2019 ◽  
Vol 2019 ◽  
pp. 1-10
Author(s):  
Rohit Tanwar ◽  
Kulvinder Singh ◽  
Mazdak Zamani ◽  
Amit Verma ◽  
Prashant Kumar

Being easy to understand and simple to implement, substitution technique of performing steganography has gain wide popularity among users as well as attackers. Steganography is categorized into different types based on the carrier file being used for embedding data. The audio file is focused on hiding data in this paper. Human has associated an acute degree of sensitivity to additive random noise. An individual is able to detect noise in an audio file as low as one part in 10 million. Given this limitation, it seems that concealing information within audio files would be a pointless exercise. Human auditory system (HAS) experiences an interesting behavior known as masking effect, which says that the threshold of hearing of one type of sound is affected by the presence of another type of sound. Because of this property, it is possible to hide some data inside an audio file without being noticed. In this paper, the research problem for optimizing the audio steganography technique is laid down. In the end, a methodology is proposed that effectively resolves the stated research problem and finally the implementation results are analyzed to ensure the effectiveness of the given solution.


2019 ◽  
Vol 1237 ◽  
pp. 042006
Author(s):  
Fang Liu ◽  
Shiyao Jia ◽  
Xiaodan Xu ◽  
Minghao Tian

2014 ◽  
Vol 599-601 ◽  
pp. 1925-1929
Author(s):  
Hong Ling Li ◽  
Jing He Huo ◽  
Jin Liang Wu ◽  
Jian Kang Yang

The soft spread spectrum realizes its function through the Cyclic Code Shift Keying (CCSK) which is not distinguished from the direct spread spectrum system (DSSS) in more literature. In this paper, the performance of the soft spread spectrum with the single-tone jamming is analyzed and simulated compared with DS. The conclusion is drawn that the capability of the anti-noise is obvious but declined seriously to the man-made interference.


Sign in / Sign up

Export Citation Format

Share Document