{"title":"Performance Analysis of Wireless Steganography based on OFDM and DFT-s-OFDM Signals over Frequency-Selective Rayleigh Fading Channels","authors":"Yuto Hama, H. Ochiai, Junji Shikata","doi":"10.1109/wpmc52694.2021.9700466","DOIUrl":null,"url":null,"abstract":"We study the performance of a secure wireless communication technique based on the combination of OFDM and DFT-spread OFDM (DFT-s-OFDM) signaling over practical frequency-selective Rayleigh fading channels. The approach is based on a wireless steganography, where DFT-s-OFDM signals are used as cover signals and secret information is embedded in the OFDM signals, which are superposed with the cover signals. We theoretically analyze the performance of unintended receiver, which attempts to detect the existence of the embedded signal by the power or moment detector, in terms of its detection probability. We also study the bit error rate achieved by a legitimate receiver through computer simulations.","PeriodicalId":299827,"journal":{"name":"2021 24th International Symposium on Wireless Personal Multimedia Communications (WPMC)","volume":"40 2","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2021-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2021 24th International Symposium on Wireless Personal Multimedia Communications (WPMC)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/wpmc52694.2021.9700466","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1
Abstract
We study the performance of a secure wireless communication technique based on the combination of OFDM and DFT-spread OFDM (DFT-s-OFDM) signaling over practical frequency-selective Rayleigh fading channels. The approach is based on a wireless steganography, where DFT-s-OFDM signals are used as cover signals and secret information is embedded in the OFDM signals, which are superposed with the cover signals. We theoretically analyze the performance of unintended receiver, which attempts to detect the existence of the embedded signal by the power or moment detector, in terms of its detection probability. We also study the bit error rate achieved by a legitimate receiver through computer simulations.