Secure image transmission over wireless network

  • Authors

    • Salah A. Aliesawi University of AnbarCollege of Computer
    • Dena S. Alani
    • Abdullah M. Awad
    2018-10-06
    https://doi.org/10.14419/ijet.v7i4.15691
  • Chaotic Henon Map, Turbo Code, Image Transmission, Image Compression.
  • The advances recently seen in data compression, and communication systems, have made it viable to design wireless image transmission systems. For many applications such as confidential transmission, military and medical applications, data encryption techniques should be also used to protect the confidential data from intruders. For these applications, both encryption and compression need to be performed to transmit a message in a fast and secure way. Further, the wireless channels have fluctuating channel qualities and high bit error rates. In this paper, a new scheme based on encryption and channel coding has been proposed for secure image transmission over wireless channels. In the proposed scheme, the encryption process is based on keys generator and Chaotic Henon map. Turbo codes are utilized as channel coding to deal effectively with the channel errors, multipath signal propagation and delay spread. Simulation results show that the proposed system achieves a high level of robustness against wide different of attacks and channel impairments. Further, it improves image quality with acceptable data rates.

     

  • References

    1. [1] Hammond, M. M., Yoshiro, K., & Sigher, A. M. (2013). RC4 stream cipher with a random initial state. In Information Technology Convergence (pp. 407-415). Springer, Dordrecht.†https://doi.org/10.1007/978-94-007-6996-0_42.

      [2] El-Iskandarani, M. A., Darwish, S. M., & Abuguba, S. M. (2010). Combination of 2D chaotic encryption and turbo coding for secure image transmission. IJCSNS, 10 (11), 179.â€

      [3] Sagheer, A. M., & Abed, L. H. (2015). Visual secret sharing without pixel expansion. International Journal of Digital Crime and Forensics (IJDCF), 7(2), 20-30.†https://doi.org/10.4018/IJDCF.2015040102.

      [4] Pande, A. P., & Thakur, N. V. (2018). A Survey on Different Ways of Secure Image Transmission.â€

      [5] Ramasamy, K., Siddiqi, M. U., & Alias, M. Y. (2006). Performance of JPEG image transmission using proposed asymmetric turbo code. EURASIP Journal on Advances in Signal Processing, 2007(1), 075757.†https://doi.org/10.1155/2007/75757.

      [6] Setyaningsih, E., & Wardoyo, R. (2017). Review of image compression and encryption techniques. International Journal of Advanced Computer Science and Applications, 8 (2).†https://doi.org/10.14569/IJACSA.2017.080212.

      [7] Mohamed, M. A., Zaki, F. W., & El-Mohandes, A. M. (2013). Improved mobile WiMAX image privacy using novel encryption techniques. International Journal of Computer Science Issues (IJCSI), 10 (Part 2), 488.â€

      [8] Hammood, M. M., Yoshigoe, K., & Sagheer, A. M. (2013). RC4-2S: RC4 stream cipher with two state tables. In Information Technology Convergence (pp. 13-20). Springer, Dordrecht.†https://doi.org/10.1007/978-94-007-6996-0_2.

      [9] Jiang, Y., & Li, B. (2016, December). A novel image encryption algorithm based on logistic and henon map. In Wavelet Active Media Technology and Information Processing (ICCWAMTIP), 2016 13th IEEE International Computer Conference (pp. 66-69).â€

      [10] Mishra, A., Sharma, K., & De, A. (2014). Quality image transmission through AWGN channel using polar codes. International Journal of Computer Science and Telecommunications, 5(1).â€

      [11] Kadir, R., Shahril, R., & Maarof, M. A. (2010, May). A modified image encryption scheme based on 2D chaotic map. In Computer and Communication Engineering (ICCCE), 2010 International IEEE Conference (pp. 1-5).â€

      [12] Aliesawi, S. A., & Rajab, M. A. (2015). Joint Source-Channel Coding for Wireless Image Transmission based OFDM-IDMA Systems. Iraqi Journal of Science, 56 (2A), 1185-1197.â€

      [13] Aliesawi, S. A., Mustafa, S. S., & GATHBAN, S. A. (2017). Motion estimation and convolutional coding for video streaming over wireless channels. Journal of Theoretical & Applied Information Technology, 95 (22).

  • Downloads

  • How to Cite

    A. Aliesawi, S., S. Alani, D., & M. Awad, A. (2018). Secure image transmission over wireless network. International Journal of Engineering & Technology, 7(4), 2758-2764. https://doi.org/10.14419/ijet.v7i4.15691