Chaos Encryption and Coding for Image Transmission Over Noisy Channel
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2015, Vol 17, Issue 6
Abstract
Abstract: The security and reliability of image transmission over wireless noisy channels are a big challenge. Ciphering techniques achieve security, but don’t consider the effect of errors occurring during wireless transmission. Error correction coding techniques must be used with ciphering to improve reliability and throughput. We will propose a combined ciphering and coding scheme based on the modified chaotic Logistic map with Low Density Parity-check Code (LDPC) as an error correction coding technique to overcome the limitation of wireless channel due to the factors that affect transmission such as noise and multipath propagation. The experimental results show that, this combined scheme enhanced the performance parameters such as PSNR and BER also achieved both security and reliability of image transmission through the wireless channel.
Authors and Affiliations
Noha Ramadan , HossamEldin H. Ahmed , Said E. Elkhamy , Fathi E. Abd ElSamie
Model of Computation-Turing Machine
: In theoretical computer science and mathematics , the theory of computation is the branch that deals with how efficiently problems can be solved on a model of computation, using an algorithm. The field is &nbs...
Color Based Image Retrieval System
Advances in the data storage and image acquisition technologies have enabled the creation of large datasets. It is necessary to develop appropriate information systems to efficiently manage these collections. T...
Video To Animated Cartoon Conversion
Abstract: the logic of animation making from real video fully depends on various image processing techniques and various kinds of filtering like Gaussian filtering, bilateral filtering, and flow based bilateral fil...
A New Approach for Improving Performance of Intrusion Detection System over MANET
A Mobile Ad-hoc Network (MANET) is one of the busy and public networks; Because of this the network suffers from the problems of different kind of attacks. In such attacks some malicious nodes are present that fa...
Finding Fast Changing Patterns In the presence of hierarchy
History Generalized Algorithm is used in this paper which is used to find the generalized as well as non generalized itemsets .after finding those itemsets find out the particular node in the tree structure and at...