Advertisement

Complexity considerations: efficient image transmission over mobile communications channels

  • Mohsen A. M. El-Bendary
  • A. E. Abou El-Azm
Article
  • 27 Downloads

Abstract

In this paper the computational complexity of the image transmission over mobile communications channel is investigated. The computational complexity due to the amount of transmitted data and the utilized data protection schemes is analyzed over wireless channel with the different image transmission scenarios. The proposed secured and efficient protection technique is presented in this research work with lower computational complexity. The presented technique is based on chaotic-Baker encryption which is utilized as an interleaver to randomize the data packet in the proposed secured interleaved channel coding technique. The proposed technique is evaluated utilizing convolutional codes with different constraint lengths and single error correction block code. Different images with the size variation are utilized for evaluating the proposed image transmission scenarios. Numerical analysis of the different scenarios is presented. The secret key generation of chaotic-Baker encryption is discussed; it can be generated automatically or manually. Several computer simulation experiments are carried out to evaluate the proposed techniques performance. Different objective measures error based metrics are used such as the Bit Error Rate (BER), Peak Signal to Noise Ratio (PSNR) and Number of Lost packet percentage (NLP%) to measure the error performance of the proposed technique and quality of the received images. Simulation results reveal a good performance and the superiority of the proposed technique with lower computational complexity of the proposed image transmission scenarios.

Keywords

Secured interleaved channel coding technique Data computational complexity Chaotic-Baker interleaver Wireless communications Mobility Image transmission 

Notes

References

  1. 1.
    Al-kamali FS, Al-fuhaidy FA, Al-soufy KA (2018) Wireless Image Transmissions over Frequency Selective Channel Using Recent OFDMA Systems. Am J Comput Commun Control 5(1):30–38Google Scholar
  2. 2.
    Al-Najjar YAY, Soong DC (2012) Comparison of Image Quality Assessment: PSNR, HVS, SSIM, UIQI. International Journal of Scientific & Engineering Research, Vol. 3, Issue 8Google Scholar
  3. 3.
    S. M. Aziz, Duc Minh Pham (2013) Energy Efficient Image Transmission in Wireless Multimedia Sensor Networks. IEEE Communications Letters, Vol. 17, Issue 6
  4. 4.
    Bhargava V, Haccoun D, Matyas R, Nuspl P (1981) Digital Communications by Satellite. Wiley, New YorkGoogle Scholar
  5. 5.
    Bouchemel A, Abed D, Moussaoui A (2018) Enhancement of Compressed Image Transmission in WMSNs Using Modifiedμ-Nonlinear Transformation. IEEE Commun Lett 22(5):934–937.  https://doi.org/10.1109/LCOMM.2018.2812821 CrossRefGoogle Scholar
  6. 6.
    Chan F, Haccoun D (1997) Adaptive Viterbi Decoding of Convolutional Codes over Memoryless Channels. IEEE Transactions on Communications 45(11)Google Scholar
  7. 7.
    Chen Z, Hou X, Qian X, Gong C (2018) Efficient and Robust Image Coding and Transmission Based on Scrambled Block Compressive Sensing. IEEE Trans Multimedia 20(7):1610–1621.  https://doi.org/10.1109/TMM.2017.2774004 CrossRefGoogle Scholar
  8. 8.
    Dent P, Bottomley GE, Croft T (1993) Jakes Fading Model Revised. Electronics Letters 24th, Vol. 29 No. 13Google Scholar
  9. 9.
    El-Bendary MAM (2017) FEC Merged with Double Security Approach based on Encrypted Image Steganography for Different Purpose in the presence of noise and different attacks. Multimed Tools Appl, Int J.  https://doi.org/10.1007/s11042-016-4177-5
  10. 10.
    Mohsen A. M. El-Bendary (2018) Wireless Personal Communications: Simulation and Complexity', Springer, Signals and Communication Technology series
  11. 11.
    Farag EN, Elmasry MI (1999) Mixed Signal VLSI Wireless Design Circuits and System, 1st Edition, Kluwer Academic PublishersGoogle Scholar
  12. 12.
    Fridrich J (1997) Image Encryption Based On Chaotic Maps. Proceedings of the IEEE International Conference on Systems, Man and Cybernetics, PP. 1105–1110Google Scholar
  13. 13.
    Gao, Wei (2017) Energy and Bandwidth-Efficient Wireless Transmission. Springer, Signals and Communication Technology Series.  https://doi.org/10.1007/978-3-319-44222-8
  14. 14.
    Gazi O, Yılmaz AO (2006) Turbo product codes based on convolutional codes. ETRI Journal, Vol. 28, No. 4Google Scholar
  15. 15.
    Hagenauer J, Offer E, Papke L (1996) Iterative Decoding of Binary Block and Convolutional Codes. IEEE Trans Inf Theory 42(2):429–445Google Scholar
  16. 16.
    Han F, Yu X, Han S (2006) Improved Baker Map for Image Encryption. Proceedings of the First International Symposium on Systems and Control In Aerospace and Astronautics, ISSCAA, PP.1273–1276Google Scholar
  17. 17.
    Hemalatha R, Radha S, Sudharsan S (2015) Energy-efficient image transmission in wireless multimedia sensor networks using block-based Compressive Sensing. El-Sevier Computers & Electrical Engineering 44(C):67–79CrossRefGoogle Scholar
  18. 18.
    Himeur Y, Boukabou A (2017) Robust image transmission over power line channel with impulse noise. Springer, Multimedia Tools Applications Journal 76(2):2813–2835CrossRefGoogle Scholar
  19. 19.
    Hore A, Ziou D (2013) Is there a relationship between peak-signal-to-noise ratio and structural similarity index measure?. IET Image Processing, Vol. 7, Issue: 1
  20. 20.
    Huang F, Lei F (2008) A Novel Symmetric Image Encryption Approach Based on a New Invertible Two-dimensional Map. IEEE, 2008 International Conference on Intelligent Information Hiding and Multimedia Signal Processing, pp 1340–1343.  https://doi.org/10.1109/IIH-MSP.2008.227
  21. 21.
    Jiang N, Zhuang Y, Chiu DKW (2017) Multiple transmission optimization of medical images in recourse-constraint mobile telemedicine systems. Comput Methods Prog Biomed 145:103–113CrossRefGoogle Scholar
  22. 22.
    M. Kaiser, W. Fong, M. Sikora (2009) A Comparison of Decoding Latency for Block and Convolutional Codes. Proceeding, ISCTA'09, Ambleside, UKGoogle Scholar
  23. 23.
    Kasban H, El-Bendary MAM (2017) Performance Improvement of Digital Image Transmission Over Mobile WiMAX Networks. Wirel Pers Commun 94(3):1087–1103CrossRefGoogle Scholar
  24. 24.
    Khan MA, Ahmad J, Javaid Q, Saqib NA (2017) An efficient and secure partial image encryption for wireless multimedia sensor networks using discrete wavelet transform, chaotic maps and substitution box. Journal of Modern Optics , Volume 64, Issue 5
  25. 25.
    Koduru SC, Chandrasekaran V (2008) Integrated Confusion-Diffusion Mechanisms for Chaos Based Image Encryption. Proceedings of the IEEE 8th International Conference on Computer and Information Technology Workshops, pp 260–263.  https://doi.org/10.1109/CIT.2008.Workshops.33
  26. 26.
    Kong JJ, Parhi KK (2003) Interleaved Convolutional Code and Its Viterbi Decoder Architecture. EURASIP J Appl Signal Process 13:1328–1334.  https://doi.org/10.1155/S1110865703309126 CrossRefzbMATHGoogle Scholar
  27. 27.
    Lee SH, Joo EK (2006) The Effect of Block Interleaving in an LDPC-Turbo Concatenated Code. ETRI Journal, 28(5)Google Scholar
  28. 28.
    Lee JS, Wei Su Y, Shen CC (2007) A Comparative Study of Wireless Protocols: Bluetooth, UWB, ZigBee, and Wi-Fi. The 33rd Annual Conference of the IEEE Industrial Electronics Society (IECON), Taipei, TaiwanGoogle Scholar
  29. 29.
    Lentmaier M, Zigangirov KSH (1999) On Generalized Low-Density Parity-Check Codes Based on Hamming Component Codes. IEEE Communications Letters, Vol. 3, No. 8Google Scholar
  30. 30.
    Lin S, Costello DJ (1983) Error Control Coding: Fundamentals and Applications. Prentice-Hall, Englewood Cliff, NJzbMATHGoogle Scholar
  31. 31.
    Loukil H, Hadj Kacem M, BouhleL MS (2012) A New Image Quality Metric using System Visual Human Characteristics. Int J Comput Appl 60(6):0975–8887Google Scholar
  32. 32.
    S. S. Nassar, N. M. Ayad, H. M. Kelash, H. S. El-Sayed, M. A. M. El-Bendary, F. E. Abd El-Samie, O. S. Faragallah (2016) Secure wireless image communication using LSB steganography and chaotic baker ciphering. Wirel Pers Commun, Springer, Vol. No. 91(3), PP. 1023–1049Google Scholar
  33. 33.
    Olanigan S, Cao L, Viswanathan R (2016) Rate and power efficient image compressed sensing and transmission. J Electron Imaging 25(1):13–24.  https://doi.org/10.1117/1.JEI.25.1.013024 CrossRefGoogle Scholar
  34. 34.
    Pekhteryev G, Sahinoglu Z, Orlik P, Bhatti G (1998) Error Protection for Progressive Image Transmission Over Memoryless and Fading Channels. IEEE Transactions on Communications 46(12)Google Scholar
  35. 35.
    Sidhu B, Singh H, Chhabra A (2007) Emerging Wireless Standards - WiFi, ZigBee and WiMAX. World Academy of Science, Engineering and Technology 25Google Scholar
  36. 36.
    Tao D, Yang G, Chen H, Wu H, Liu P (2016) Efficient Image Transmission Schemes over Zigbee-Based Image Sensor Networks. Chin J Electron 25(2):284–289.  https://doi.org/10.1049/cje.2016.03.014
  37. 37.
    Usman K, Juzojil H, Nakajimal I (2007) Medical Image Encryption Based on Pixel Arrangement and Random Permutation for Transmission Security. Proceedings of the 9th International Conference on e-Health Networking, Application and Services, pp. 244–247Google Scholar
  38. 38.
    Vafi S, Wysocki T (2005) Performance of convolutional interleavers with different spacing parameters in turbo codes. Proc. 6th Australian Workshop on Communications Theory, pp. 8–12Google Scholar
  39. 39.
    Xu C (2007) Soft decoding algorithm for RS-CC concatenated codes in WIMAX system. Vehicular Technology ConferenceGoogle Scholar
  40. 40.
    H. Xu, K. Hua, H. Wang (2015) Adaptive FEC coding and cooperative relayed wireless image transmission. Digital Commun Netw, Vol. 1, Issue 3, Aug., PP. 213–221Google Scholar
  41. 41.
    Xuelan Z, Weiyan L, Guangzeng F (2010) Applying Chaotic Maps to Interleaving Scheme Design in BICM-ID. Chin J Electron 19(3)Google Scholar
  42. 42.
    Yahong Zheng R, Xiao C (2002) Improved Models for the Generation of Multiple Uncorrelated Rayleigh Fading Waveforms. IEEE Communications letters, Vol. 6, No. 6Google Scholar
  43. 43.
    Yan Z, Xin F, Zhicheng J, Hongmei T (2012) The Application of Fountain Code in Image Wireless Transmission. Procedia Eng 29:3322–3326CrossRefGoogle Scholar
  44. 44.
    Yin J, Ou B, Liu X, Peng F (2018) Mosaic secret-fragment-visible data hiding for secure image transmission based on two-step energy matching. El-Sevier, Digital Signal Process 81:173–185CrossRefGoogle Scholar
  45. 45.
    Yuan D (1991) The estimating on performance to interleaved BCH codes applied to the mobile communication channel. IEEE TENCON’91 IndiaGoogle Scholar
  46. 46.
    Yuan DF, Li ZW, Sui A, Luo J (2000) Performance of interleaved (2, 1, 7) convolutional codes in mobile image communication system. Proc. IEEE Wireless Communications and Networking Conference (WCNC ‘00), Vol. No. 2, PP. 634–637, Chicago, Ill, USAGoogle Scholar
  47. 47.
    Zhang H, Wang L, Yuan Q, Wang H, Yu L (2004) A Chaotic Interleaver Used in Turbo Codes. ICCCAS, Int. Conference of Communications, Circuits, and SystemsGoogle Scholar
  48. 48.
    Zheng Y, Ye C, Velipasalar S, Gursoy MC (2014) Energy efficient image transmission using wireless embedded smart cameras. IEEE,11th IEEE International Conference on Advanced Video and Signal Based Surveillance (AVSS).  https://doi.org/10.1109/AVSS.2014.6918645
  49. 49.
    Zhuang Y, Jiang N, Li Q, Chiu DKW, Hu H (2016) Personalized and efficient social image transmission scheme in mobile wireless network. Multimed Tools Appl 75(6):2931–2968CrossRefGoogle Scholar
  50. 50.
    El-Bendary MA, Abou-El-Azm EA, El-Fishawy NA, Shawki F, El-Tokhy M, Abd El-Samie FE, Kazemian HB (2012) Image transmission over mobile Bluetooth networks with enhanced data rate packets and chaotic interleaving. Springer, Wireless Networks 19(4):517–532Google Scholar
  51. 51.
    Mohamed MAM ,El-Azm AA, El-Fishwy N, El-Tokhy MAR, Abd El-Samie FE, Shawki F (2008) Bluetooth performance improvement with existing convolutional codes over AWGN channel. Proc. 2nd Int. Conf. Elec. Engin. Design and Technol. ICEEDT’08Google Scholar
  52. 52.
    Abouelfadl AA, El-Bendary MAM, Shawki F (2014) Enhancing transmission over wireless image sensor networks based on ZigBee network. Life Science Journal 11(8):342–354Google Scholar

Copyright information

© Springer Science+Business Media, LLC, part of Springer Nature 2018

Authors and Affiliations

  1. 1.Department of Electronics Technology, Faculty of Industrial Education Helwan UniversityCairoEgypt
  2. 2.Department of Electronics and Electrical Communications, Faculty of Electronics EgineeringMenofia UniversityMenofEgypt

Personalised recommendations