Secure Multi-Media Transmission Over Mobile Communication channels

Faculty Engineering Year: 2011
Type of Publication: Theses Pages: 175
Authors:
BibID 11424049
Keywords : Mobile communication systems    
Abstract:
Secure Multi-Media Transmission over MobileCommunication ChannelsPhD. Thesis by Eng. Shaimaa Ahmed El-said AhmedElectronics and Communications Engineering Department,Faculty of Engineering -Zagazig University.ABSTRACTMultimedia is one of the most popular data transmitted over mobile and wirelesscommunication channels. Image encryption is often achieved by using one of threeapproaches; traditional, selective, or in-compression encryption techniques. The mostsuitable one for multimedia encryption approach is the in-compression encryptionapproach since it has the advantages of both traditional and selective techniques. As animportant way of designing a secure video encryption schemes, secret Multiple HuffmanTables (MHT) technique has been suggested as an in-compression encryption technique.However, the MHT technique suffers from high visual degradation at low bit rate and themultiple Huffman tables may be vulnerable to be known.In this thesis, a new in-compression encryption technique For efficient and securemultimedia transmission is proposed. It is a general-purpose technique meaning that it canbe used with any bit-string. It depends on a statistical model of the images to be encryptedand compressed to generate Optimized Multiple Huftinan Tables (OMHT). In this method,a set of images or videos, randomly selected from the entire set of images or videos to betransmitted, are used as a training data set to generate such optimized multiple Huffmantables. As these tables are generated from a set of images or videos of the same nature asthose to be transmitted they will be the optimal tables to encrypt and compress thetransmitted data, and hence, the name ”Optimized” is used. These tables are used toencode-encrypt the compressed image according to a secret order (secret key) whoselength is equal to the number of the generated Huffman tables. Only receivers that have thesecret key can decode/decrypt the received bit stream. The effectiveness of this scheme isverified through a series of experiments, and the robustness of developed approach isdemonstrated by comparing its performance with those of the traditional, selective. 
   
     
PDF  
       

Author Related Publications

  • Shaimaa Ahmed El-Said Ahmed, "Secure Multi-Media Transmission Over Mobile Communication channels", 2011 More

Department Related Publications

    Tweet