Complexity considerations: efficient image transmission over mobile communications channels
dc.Affiliation | October University for modern sciences and Arts (MSA) | |
dc.contributor.author | El-Bendary, Mohsen A. M | |
dc.contributor.author | Abou El-Azm, A. E | |
dc.date.accessioned | 2019-11-13T06:17:41Z | |
dc.date.available | 2019-11-13T06:17:41Z | |
dc.date.issued | 2019-06 | |
dc.description | Accession Number: WOS:000472094500041 | en_US |
dc.description.abstract | In this paper the computational complexity of the image transmission over mobile communications channel is investigated. The computational complexity due to the amount of transmitted data and the utilized data protection schemes is analyzed over wireless channel with the different image transmission scenarios. The proposed secured and efficient protection technique is presented in this research work with lower computational complexity. The presented technique is based on chaotic-Baker encryption which is utilized as an interleaver to randomize the data packet in the proposed secured interleaved channel coding technique. The proposed technique is evaluated utilizing convolutional codes with different constraint lengths and single error correction block code. Different images with the size variation are utilized for evaluating the proposed image transmission scenarios. Numerical analysis of the different scenarios is presented. The secret key generation of chaotic-Baker encryption is discussed; it can be generated automatically or manually. Several computer simulation experiments are carried out to evaluate the proposed techniques performance. Different objective measures error based metrics are used such as the Bit Error Rate (BER), Peak Signal to Noise Ratio (PSNR) and Number of Lost packet percentage (NLP%) to measure the error performance of the proposed technique and quality of the received images. Simulation results reveal a good performance and the superiority of the proposed technique with lower computational complexity of the proposed image transmission scenarios. | en_US |
dc.identifier.citation | Al-kamali FS, Al-fuhaidy FA, Al-soufy KA (2018) Wireless Image Transmissions over Frequency Selective Channel Using Recent OFDMA Systems. Am J Comput Commun Control 5(1):30–38 Google Scholar 2. Al-Najjar YAY, Soong DC (2012) Comparison of Image Quality Assessment: PSNR, HVS, SSIM, UIQI. International Journal of Scientific & Engineering Research, Vol. 3, Issue 8 Google Scholar 3. S. M. Aziz, Duc Minh Pham (2013) Energy Efficient Image Transmission in Wireless Multimedia Sensor Networks. IEEE Communications Letters, Vol. 17, Issue 6 4. Bhargava V, Haccoun D, Matyas R, Nuspl P (1981) Digital Communications by Satellite. Wiley, New York Google Scholar 5. Bouchemel A, Abed D, Moussaoui A (2018) Enhancement of Compressed Image Transmission in WMSNs Using Modifiedμ-Nonlinear Transformation. IEEE Commun Lett 22(5):934–937. https://doi.org/10.1109/LCOMM.2018.2812821 CrossRefGoogle Scholar 6. Chan F, Haccoun D (1997) Adaptive Viterbi Decoding of Convolutional Codes over Memoryless Channels. IEEE Transactions on Communications 45(11) Google Scholar 7. Chen Z, Hou X, Qian X, Gong C (2018) Efficient and Robust Image Coding and Transmission Based on Scrambled Block Compressive Sensing. IEEE Trans Multimedia 20(7):1610–1621. https://doi.org/10.1109/TMM.2017.2774004 CrossRefGoogle Scholar 8. Dent P, Bottomley GE, Croft T (1993) Jakes Fading Model Revised. Electronics Letters 24th, Vol. 29 No. 13 Google Scholar 9. El-Bendary MAM (2017) FEC Merged with Double Security Approach based on Encrypted Image Steganography for Different Purpose in the presence of noise and different attacks. Multimed Tools Appl, Int J. https://doi.org/10.1007/s11042-016-4177-5 10. Mohsen A. M. El-Bendary (2018) Wireless Personal Communications: Simulation and Complexity', Springer, Signals and Communication Technology series 11. Farag EN, Elmasry MI (1999) Mixed Signal VLSI Wireless Design Circuits and System, 1st Edition, Kluwer Academic Publishers Google Scholar 12. Fridrich J (1997) Image Encryption Based On Chaotic Maps. Proceedings of the IEEE International Conference on Systems, Man and Cybernetics, PP. 1105–1110 Google Scholar 13. Gao, Wei (2017) Energy and Bandwidth-Efficient Wireless Transmission. Springer, Signals and Communication Technology Series. https://doi.org/10.1007/978-3-319-44222-8 14. Gazi O, Yılmaz AO (2006) Turbo product codes based on convolutional codes. ETRI Journal, Vol. 28, No. 4 Google Scholar 15. Hagenauer J, Offer E, Papke L (1996) Iterative Decoding of Binary Block and Convolutional Codes. IEEE Trans Inf Theory 42(2):429–445 Google Scholar 16. Han F, Yu X, Han S (2006) Improved Baker Map for Image Encryption. Proceedings of the First International Symposium on Systems and Control In Aerospace and Astronautics, ISSCAA, PP.1273–1276 Google Scholar 17. Hemalatha R, Radha S, Sudharsan S (2015) Energy-efficient image transmission in wireless multimedia sensor networks using block-based Compressive Sensing. El-Sevier Computers & Electrical Engineering 44(C):67–79 CrossRefGoogle Scholar 18. Himeur Y, Boukabou A (2017) Robust image transmission over power line channel with impulse noise. Springer, Multimedia Tools Applications Journal 76(2):2813–2835 CrossRefGoogle Scholar 19. Hore A, Ziou D (2013) Is there a relationship between peak-signal-to-noise ratio and structural similarity index measure?. IET Image Processing, Vol. 7, Issue: 1 20. Huang F, Lei F (2008) A Novel Symmetric Image Encryption Approach Based on a New Invertible Two-dimensional Map. IEEE, 2008 International Conference on Intelligent Information Hiding and Multimedia Signal Processing, pp 1340–1343. https://doi.org/10.1109/IIH-MSP.2008.227 21. Jiang N, Zhuang Y, Chiu DKW (2017) Multiple transmission optimization of medical images in recourse-constraint mobile telemedicine systems. Comput Methods Prog Biomed 145:103–113 CrossRefGoogle Scholar 22. M. Kaiser, W. Fong, M. Sikora (2009) A Comparison of Decoding Latency for Block and Convolutional Codes. Proceeding, ISCTA'09, Ambleside, UK Google Scholar 23. Kasban H, El-Bendary MAM (2017) Performance Improvement of Digital Image Transmission Over Mobile WiMAX Networks. Wirel Pers Commun 94(3):1087–1103 CrossRefGoogle Scholar 24. Khan MA, Ahmad J, Javaid Q, Saqib NA (2017) An efficient and secure partial image encryption for wireless multimedia sensor networks using discrete wavelet transform, chaotic maps and substitution box. Journal of Modern Optics , Volume 64, Issue 5 25. Koduru SC, Chandrasekaran V (2008) Integrated Confusion-Diffusion Mechanisms for Chaos Based Image Encryption. Proceedings of the IEEE 8th International Conference on Computer and Information Technology Workshops, pp 260–263. https://doi.org/10.1109/CIT.2008.Workshops.33 26. Kong JJ, Parhi KK (2003) Interleaved Convolutional Code and Its Viterbi Decoder Architecture. EURASIP J Appl Signal Process 13:1328–1334. https://doi.org/10.1155/S1110865703309126 zbMATHGoogle Scholar 27. Lee SH, Joo EK (2006) The Effect of Block Interleaving in an LDPC-Turbo Concatenated Code. ETRI Journal, 28(5) Google Scholar 28. Lee JS, Wei Su Y, Shen CC (2007) A Comparative Study of Wireless Protocols: Bluetooth, UWB, ZigBee, and Wi-Fi. The 33rd Annual Conference of the IEEE Industrial Electronics Society (IECON), Taipei, Taiwan Google Scholar 29. Lentmaier M, Zigangirov KSH (1999) On Generalized Low-Density Parity-Check Codes Based on Hamming Component Codes. IEEE Communications Letters, Vol. 3, No. 8 Google Scholar 30. Lin S, Costello DJ (1983) Error Control Coding: Fundamentals and Applications. Prentice-Hall, Englewood Cliff, NJ zbMATHGoogle Scholar 31. Loukil H, Hadj Kacem M, BouhleL MS (2012) A New Image Quality Metric using System Visual Human Characteristics. Int J Comput Appl 60(6):0975–8887 Google Scholar 32. S. S. Nassar, N. M. Ayad, H. M. Kelash, H. S. El-Sayed, M. A. M. El-Bendary, F. E. Abd El-Samie, O. S. Faragallah (2016) Secure wireless image communication using LSB steganography and chaotic baker ciphering. Wirel Pers Commun, Springer, Vol. No. 91(3), PP. 1023–1049 Google Scholar 33. Olanigan S, Cao L, Viswanathan R (2016) Rate and power efficient image compressed sensing and transmission. J Electron Imaging 25(1):13–24. https://doi.org/10.1117/1.JEI.25.1.013024 CrossRefGoogle Scholar 34. Pekhteryev G, Sahinoglu Z, Orlik P, Bhatti G (1998) Error Protection for Progressive Image Transmission Over Memoryless and Fading Channels. IEEE Transactions on Communications 46(12) Google Scholar 35. Sidhu B, Singh H, Chhabra A (2007) Emerging Wireless Standards - WiFi, ZigBee and WiMAX. World Academy of Science, Engineering and Technology 25 Google Scholar 36. Tao D, Yang G, Chen H, Wu H, Liu P (2016) Efficient Image Transmission Schemes over Zigbee-Based Image Sensor Networks. Chin J Electron 25(2):284–289. https://doi.org/10.1049/cje.2016.03.014 37. Usman K, Juzojil H, Nakajimal I (2007) Medical Image Encryption Based on Pixel Arrangement and Random Permutation for Transmission Security. Proceedings of the 9th International Conference on e-Health Networking, Application and Services, pp. 244–247 Google Scholar 38. Vafi S, Wysocki T (2005) Performance of convolutional interleavers with different spacing parameters in turbo codes. Proc. 6th Australian Workshop on Communications Theory, pp. 8–12 Google Scholar 39. Xu C (2007) Soft decoding algorithm for RS-CC concatenated codes in WIMAX system. Vehicular Technology Conference Google Scholar 40. H. Xu, K. Hua, H. Wang (2015) Adaptive FEC coding and cooperative relayed wireless image transmission. Digital Commun Netw, Vol. 1, Issue 3, Aug., PP. 213–221 Google Scholar 41. Xuelan Z, Weiyan L, Guangzeng F (2010) Applying Chaotic Maps to Interleaving Scheme Design in BICM-ID. Chin J Electron 19(3) Google Scholar 42. Yahong Zheng R, Xiao C (2002) Improved Models for the Generation of Multiple Uncorrelated Rayleigh Fading Waveforms. IEEE Communications letters, Vol. 6, No. 6 Google Scholar 43. Yan Z, Xin F, Zhicheng J, Hongmei T (2012) The Application of Fountain Code in Image Wireless Transmission. Procedia Eng 29:3322–3326 CrossRefGoogle Scholar 44. Yin J, Ou B, Liu X, Peng F (2018) Mosaic secret-fragment-visible data hiding for secure image transmission based on two-step energy matching. El-Sevier, Digital Signal Process 81:173–185 CrossRefGoogle Scholar 45. Yuan D (1991) The estimating on performance to interleaved BCH codes applied to the mobile communication channel. IEEE TENCON’91 India Google Scholar 46. Yuan DF, Li ZW, Sui A, Luo J (2000) Performance of interleaved (2, 1, 7) convolutional codes in mobile image communication system. Proc. IEEE Wireless Communications and Networking Conference (WCNC ‘00), Vol. No. 2, PP. 634–637, Chicago, Ill, USA Google Scholar 47. Zhang H, Wang L, Yuan Q, Wang H, Yu L (2004) A Chaotic Interleaver Used in Turbo Codes. ICCCAS, Int. Conference of Communications, Circuits, and Systems Google Scholar 48. Zheng Y, Ye C, Velipasalar S, Gursoy MC (2014) Energy efficient image transmission using wireless embedded smart cameras. IEEE,11th IEEE International Conference on Advanced Video and Signal Based Surveillance (AVSS). https://doi.org/10.1109/AVSS.2014.6918645 49. Zhuang Y, Jiang N, Li Q, Chiu DKW, Hu H (2016) Personalized and efficient social image transmission scheme in mobile wireless network. Multimed Tools Appl 75(6):2931–2968 CrossRefGoogle Scholar 50. El-Bendary MA, Abou-El-Azm EA, El-Fishawy NA, Shawki F, El-Tokhy M, Abd El-Samie FE, Kazemian HB (2012) Image transmission over mobile Bluetooth networks with enhanced data rate packets and chaotic interleaving. Springer, Wireless Networks 19(4):517–532 Google Scholar 51. Mohamed MAM ,El-Azm AA, El-Fishwy N, El-Tokhy MAR, Abd El-Samie FE, Shawki F (2008) Bluetooth performance improvement with existing convolutional codes over AWGN channel. Proc. 2nd Int. Conf. Elec. Engin. Design and Technol. ICEEDT’08 Google Scholar 52. Abouelfadl AA, El-Bendary MAM, Shawki F (2014) Enhancing transmission over wireless image sensor networks based on ZigBee network. Life Science Journal 11(8):342–354 | en_US |
dc.identifier.issn | 1380-7501 | |
dc.identifier.uri | https://cutt.ly/3eJZpTB | |
dc.language.iso | en_US | en_US |
dc.publisher | Springer | en_US |
dc.relation.ispartofseries | MULTIMEDIA TOOLS AND APPLICATIONS;Volume: 78 Issue: 12 Pages: 16633-16664 | |
dc.relation.uri | https://cutt.ly/heJZfoZ | |
dc.subject | University for Secured interleaved channel coding technique | en_US |
dc.subject | Data computational complexity | en_US |
dc.subject | Chaotic-Baker interleaver | en_US |
dc.subject | Wireless communications | en_US |
dc.subject | Mobility | en_US |
dc.subject | Image transmission | en_US |
dc.title | Complexity considerations: efficient image transmission over mobile communications channels | en_US |
dc.type | Article | en_US |
Files
Original bundle
1 - 1 of 1
Loading...
- Name:
- avatar_scholar_256.png
- Size:
- 6.31 KB
- Format:
- Portable Network Graphics
- Description: