8 research outputs found

    An efficient algorithm for joint estimation of differential time delays and frequency offsets

    Get PDF
    Journal ArticleABSTRACT This paper introduces an efficient algorithm that jointly estimates differential time delays and frequency offsets between two signals. The approach is a two-step procedure. First, the differential frequency offsets are estimated from measurement of the autocorrelation functions of the received and transmitted signals. The time delays are estimated from estimates of the higher-order statistics of the two signals involved. The major advantage of the new approach is its remarkably reduced computational complexity over traditional approaches. The experimental resuits indicate that the algorithm performs better than the traditional methods in most cases of interest in spite of its reduced computational complexity

    A New Approach to Steganography using Sinc-Convolution Method

    No full text
    Abstract—Both image steganography and image encryption have advantages and disadvantages. Steganograhy allows us to hide a desired image containing confidential information in a covered or host image while image encryption is decomposing the desired image to a non-readable, non-comprehended manner. The encryption methods are usually much more robust than the steganographic ones. However, they have a high visibility and would provoke the attackers easily since it usually is obvious from an encrypted image that something is hidden! The combination of steganography and encryption will cover both of their weaknesses and therefore, it increases the security. In this paper an image encryption method based on sinc-convolution along with using an encryption key of 128 bit length is introduced. Then, the encrypted image is covered by a host image using a modified version of JSteg steganography algorithm. This method could be applied to almost all image formats including TIF, BMP, GIF and JPEG. The experiment results show that our method is able to hide a desired image with high security and low visibility
    corecore