A B C D E F G H I J K L M N O P Q R S T U V W X Y Z All
El-Bendary, M. A. M.
- WSN ZigBee Based Performance
Authors
1 Department of Electronics Technology, Helwan University, Cairo, EG
Source
Wireless Communication, Vol 5, No 12 (2013), Pagination: 458-465Abstract
The Wireless Personal Area Networks (WPANs) technologies are merged to implement the Wireless Sensor Network (WSN). The ZigBee technology is the most one is utilized for WSN implementing. The mobility of Wireless Sensor Networks is one of the future features of this network in different applications. This paper studies the WSN performance based on the ZigBee network. Also, it presents powerful data randomizing tool based on chaotic Baker map encryption tool. The mobility capability of WSN is considered. There are many scenarios are presented to evaluate the presented technique using many different metrics. The computer experiments simulation results reveal that the superiority of the presented technique over the traditional techniques.
Keywords
Mobile WSN, Data Randomization, Chaotic Interleaving, Burst Error, Fading Channels.- Comparison Study of Medical Image Compression
Authors
1 Communications and Electrictronics Engineering Department, El-Safwa Institute, EG
2 Department of Communications, Menofia University, IN
3 Department of Electronics Technology, Helwan University, Cairo, EG
Source
Digital Image Processing, Vol 6, No 9 (2014), Pagination: 353-358Abstract
Medical images transmission has many constraints such as, bandwidth and image size, it due to the limited channel capacity of the used wireless technologies which is utilized for the medical purposes for example, Zigbee or Bluetooth technologies. Thus image compression is a key factor to improve transmission speed and storage, but it risks losing relevant medical information. Nowadays a large number of various medical images are generated from hospitals and medical centers with sophisticated image acquisition devices. So the researchers deal about the techniques to decrease the communication bandwidth and to save the transmitting power in the wireless medical devices. Digital image consumes huge memory and thus digital image data compression is necessary in order to solve this problem. In medical applications such as disease diagnostic, the loss of information is unacceptable; hence medical images should be compressed lossless. Complexity of the compression algorithm is directly related to the power consumption and hence there is a need for simple compression algorithms. In this paper, different lossless compression techniques are shown and compared to clear the suitable one for medical image compression.
Keywords
Medical Image, Compression, Bandwidth, Complexity, Adaptive Compression Algorithm System.- Multi-level Security Technique Using Steganography with Chaotic Encryption
Authors
1 Nuclear Research Center, Atomic Energy Authority, Inshas, P. O. Box-13759, EG
2 Nuclear Research Center, Atomic Energy Authority, Inshas, P. O. Box 13759, EG
3 Menoufia University, Menouf, EG
4 Helwan University, EG
Source
Digital Image Processing, Vol 6, No 3 (2014), Pagination: 142-148Abstract
This paper proposes two novel multi-layer security techniques that exploit the advantages of two important security techniques–steganography and image encryption. Image steganography technique presents an important task for the data transmission; it provides transferring the embedded information to the destination without being detected by concealing the existence of hidden secret data inside a cover image. Unlike the text, images have different characteristics such as bulk data capacity and high data redundancy, so the encryption of images is different from that used with texts. This paper presents two powerful encrypted steganogrophic techniques using the chaotic encryption. The chaos based cryptographic algorithms are considered an efficient and secured image encryption technique. In this work, the steganography firstly, is used with 2D Logistic map and secondly used with Chaotic Baker map as two proposed multi-layer security techniques. Once the secret image is embedded in a cover image using Least Significant Bit (LSB) based Steganography it is encrypted using 2D Logistic map or Chaotic Baker map to produce a higher security algorithm. Different image analyses were verified and the results of the algorithms prove that, the proposed techniques can be implemented practically and efficiently to protect a high sensitive and secure data such as nuclear and military information.
Keywords
Steganography, Image Encryption, LSB Replacement, 2D Logistic Map, Chaotic Baker Map.- Mobility Effects Combating through Efficient Low Complexity Technique
Authors
1 Department of Electronics Technology, Helwan University, Cairo, EG
Source
Digital Image Processing, Vol 5, No 12 (2013), Pagination: 547-553Abstract
In this paper, efficient techniques are presented for reducing the mobility bad effects with enhancing the computational complexity of the overall system. It proposes the chaotic interleaver algorithm for the convolutional codes with the Viterbi decoding is presented. The presented interleaver is based on chaotic Baker map. It is applied with the (2,1,3) convolutional codes and compared with the (2,1,7) convolutional codes. The proposed interleaver is applied to different bits stream lengths of 1024, 2048, 4096, 8192, and 16384 bits. The simulation results show the superiority of the proposed chaotic interleaved convolutional codes scheme over the traditional schemes in the image transmission over the mobile channels with respect the shorter constraint length of the encoder. Also, the chaotic interleaver performs better with the packet length increasing. The chaotic interleaver enhances the security with the different secret key for every transmitted packet. The computer simulations are carried out using the widely accepted Jakes’ model. The results reveal that the proposed scenarios can be applied to the long bit stream packets technologies such as Wimax.