Simulation Scenarios of Pseudo-coding Techniques

Chapter
Part of the Signals and Communication Technology book series (SCT)

Abstract

The pseudo-coding can be considered of the coding techniques which are utilized for combating the effects of noise on the transmitted signals. This chapter presents the pseudo-coding using different interleaving techniques. The traditional and proposed randomizing techniques are presented in this chapter. The historical note of the chaotic encryption is discussed. It is employed in this chapter as the proposed pseudo-code. The image transmission over the WPAN Bluetooth networks is discussed in this chapter.

Keywords

Pseudo-coding Interleaving techniques Chaotic encryption Baker map Image transmission Bust error 

References

  1. 1.
    Howitt I (2001) WLAN and WPAN coexistence in UL band. IEEE Trans Vehicular Technol, 50(4)Google Scholar
  2. 2.
    Viterbi AJ (1971) Convolutional codes and their performance in communication systems. IEEE Trans Commun Technol 19(5)Google Scholar
  3. 3.
    Howitt I (2001) WLAN and WPAN Coexistence in UL Band. IEEE Trans Vehicular Technology 50(4)Google Scholar
  4. 4.
    Viterbi AJ (1971) Convolutional codes and their performance in communication systems. IEEE Trans Commun Technol 19:5Google Scholar
  5. 5.
    Heller JA (1968) Short constraint length convolutional codes, Jet Propulsion Lab, California Inst Technol, space programs Summary 37–54, vol III,, pp 171–177Google Scholar
  6. 6.
    Omura JK (1969) On the Viterbi decoding algorithm. IEEE Trans Inform Theory IT-15Google Scholar
  7. 7.
    Soliman NF, Albagory Y, Elbendary MA, Al-Hanafy W, El-Rabaie E-SM, Alshebeili SA, El-Samie FEA (2014) Chaotic interleaving for robust image transmission with LDPC coded OFDM. Wireless personal communications, Springer, 79(3):2141–2154Google Scholar
  8. 8.
    El-Bendary MAM, Abou-El-Azm AE, El-Fishawy NA, Shawki F, Abd El-Samie FE, El-Tokhy MAR, Kazemian HB (2012) Performance of the audio signals transmission over wireless networks with the channel interleaving considerations. EURASIP J Audio, Speech, and Music Processing, Springer, 1(4)Google Scholar
  9. 9.
    El-Bendary MA, El-Azm AA (2011) An efficient chaotic interleaver for image transmission over IEEE 802.15. 4 Zigbee network. J Telecommunications Inf Technol, 2011, pp 67–73Google Scholar
  10. 10.
    Mohamed M, El-Azm AA, El-Fishwy N, El-Tokhy M, El-Samie FA, Shawki F (2008) Bluetooth performance improvement with existing convolutional codes over AWGN channel. Proceedings 2nd international conference on electrical engin. design & technologies ICEEDT’08Google Scholar
  11. 11.
    El-Bendary MA (2017) FEC merged with double security approach based on encrypted image steganography for different purpose in the presence of noise and different attacks. Multimedia Tools and ApplicationsGoogle Scholar
  12. 12.
    Nassar SS, Ayad NM, Kelash HM, El-Sayed HS, El-Bendary MA, El-Samie FEA, Faragallah OS (2016) Content verification of encrypted images transmitted over wireless AWGN channels. Wireless Personal Commun 88(3):479–491Google Scholar
  13. 13.
    El-Bendary MAM, El-Azm AEA, El-Fishawy NA, Al-Hosarey FSM, Eltokhy MA, El-Samie FEA, Kazemian HB (2012) JPEG image transmission over mobile network with an efficient channel coding and interleaving. Int J Electron 99(11):1497–1518CrossRefGoogle Scholar
  14. 14.
    Abouelfadl AA, El-Bendary MAM, Shawki F (2014) Enhancing transmission over wireless image sensor networks based on ZigBee network. Life Sci J 11(8):342–354Google Scholar
  15. 15.
    El-Bendary MA, Abou-El-Azm AE, El-Fishawy NA, Shawki F, El-Tokhy M, El-Samie FA, Kazemian HB (2013) Image transmission over mobile Bluetooth networks with enhanced data rate packets and chaotic interleaving. Wireless Networks 19(4):517–532CrossRefGoogle Scholar
  16. 16.
    Nassar SS, Ayad NM, Kelash HM, El-Sayed HS, El-Bendary MA (2016) Secure wireless image communication using LSB steganography and chaotic baker ciphering. Wireless Personal Commun 91(3):1023–1049CrossRefGoogle Scholar
  17. 17.
    Nassar SS, Ayad NM, Kelash HM, El-Sayed HS, El-Bendary MA (2016) Efficient audio integrity verification algorithm using discrete cosine transform. Int J Speech Technol 19(1):1–8CrossRefGoogle Scholar
  18. 18.
    Eldokany I, El-Rabaie ESM, Elhalafawy SM, Eldin MAZ, Shahieen MH, El-Bendary MAM (2015) Efficient transmission of encrypted images with OFDM in the presence of carrier frequency offset. Wireless Personal Commun 84(1):475–521CrossRefGoogle Scholar
  19. 19.
    Fridrich J (1998) Symmetric ciphers based on two-dimensional chaotic maps. Int J Bifurcation Chaos 8(6):1259–1284Google Scholar
  20. 20.
    El-Gohary NM, El-Bendary MAM, El-Samie FEA Foud MM, Utilization of Raptor Codes for OFDM-System Performance Enhancing. Wireless Personal Communications. Springer, https://doi.org/10.1007/s11277–017-4248-6
  21. 21.
    Kasban H, Mohsen AM,  El-Bendary (2016) Performance Improvement of Digital Image Transmission over Mobile WiMAX Networks,Wireless Personal Communications, SpringerGoogle Scholar

Copyright information

© Springer Nature Singapore Pte Ltd. 2018

Authors and Affiliations

  1. 1.Department of Electronics TechnologyHelwan UniversityCairoEgypt

Personalised recommendations