Combination of Hybrid Chaotic Encryption and LDPC for Secure Transmission of Images over Wireless Networks

Full Text (PDF, 535KB), PP.8-16

Views: 0 Downloads: 0

Author(s)

Mona F. M. Mursi 1,* Hossam Eldin H. Ahmed 2 Fathi E. Abd El-samie 2 Ayman H. Abd El-aziem 1

1. Electrical Engineering, Shubra Faculty of Engineering, Benha University, Egypt.

2. Faculty of Electronic Eng. Menouf-32952, Menufiya University, Egypt

* Corresponding author.

DOI: https://doi.org/10.5815/ijigsp.2014.12.02

Received: 17 Jul. 2014 / Revised: 30 Aug. 2014 / Accepted: 7 Oct. 2014 / Published: 8 Nov. 2014

Index Terms

LDPC, Turbo, Chaotic Ma, Network security, error corrections

Abstract

Robust and secure transmission strategy for high quality image through wireless networks is considered a great challenge. However, the majority of encrypted image transmission schemes don't consider well the effect of bit errors occurring during transmission. These errors are due to the factors that affect the information such as noise and multipath propagation. That should be handled by an efficient channel coding scheme. Our proposed scheme is based on combining hybrid chaotic encryption, which is based on two-dimensional chaotic maps which is utilized for data security, with an error correction technique based on the Low Density Parity Check (LDPC) code. The LDPC is employed as channel coding for data communication in order to solve the problem of the channel’s limited bandwidth and improve throughput. Simulation results show that the proposed scheme achieves a high degree of robustness against channel impairments and wide varieties of attacks as wells as improved reliability of the wireless channel. In addition, LDPC is utilized for error correction in order to solve the limitations of wireless channels.

Cite This Paper

Mona F. M. Mursi, Hossam Eldin H. Ahmed, Fathi E. Abd El-samie, Ayman H. Abd El-aziem,"Combination of Hybrid Chaotic Encryption and LDPC for Secure Transmission of Images over Wireless Networks", IJIGSP, vol.6, no.12, pp.8-16, 2014. DOI: 10.5815/ijigsp.2014.12.02

Reference

[1]M. A. El-Iskandarani, Saad M. Darwish, Saad M. Abuguba, Combination of 2D chaotic Encryption and Turbo Coding for Secure Image Transmission, IJCSNS International Journal of Computer Science and Network Security, VOL.10 No.11, November 2010.

[2]Daniel J. Costello, Jr. and G. David Forney, Jr, Channel Coding: The Road to Channel Capacity, IEEE, Vol. 95, No. 6, June 2007.

[3]Deergha Rao“A Robust and Secure Scheme for Image Communication over Wireless Channels”, IEEE CAS on ETW Conference, pp.88-91, 2005.

[4]A. Padmaja and M. Shameem, “Secure Image Transmission over Wireless Channels”, IEEE ICCIMA Conference, Sivakasi, Tamil Nadu, pp.44-48, January 2007.

[5]D. Gligoroski, S. Knapskog, and S. Andova, “Cryptcoding - Encryption and Error Correction Coding in a Single Step” International Conference on Security and Management, pp. 1-7, June 2006.

[6]Mona F. M. Mursi, Hossam Eldin H. Ahmed, Fathi E. Abd El-samie, Ayman H. Abd El-aziem" Image Security With Different Techniques Of Cryptography And Coding: A Survey" IOSR Journal of Computer Engineering (IOSR-JCE) e-ISSN: 2278-0661,Volume 16, Issue 3, Ver. I (May-Jun. 2014), PP 39-45.

[7]Mr. Vishal G. Jadhao, Prof. Prafulla D. Gawande, Performance Analysis of Linear Block Code, Convolution code and Concatenated code to Study Their Comparative Effectiveness, IOSR Journal of Electrical and Electronics Engineering (IOSRJEEE), SSN: 2278-1676 Volume 1, Issue 1 (May-June 2012), PP 53-61.

[8]Jorge C. Moreira and Patrick G. Farrell "Essential of Error Control Coding," John Wiley & Sons Ltd, The Atrium, Southern Gate, Chichester, West Sussex PO19 8SQ, England. 2006.

[9]A Tutorial on Low Density Parity-Check Codes, Tuan Ta, The University of Texas at Austin, Internet resources.

[10]Bernhard M. J. Leiner, "LDPC Codes- a brief Tutorial", April 8, 2005.

[11]C.Berrou and A. Glavieux,"Near Optimum Error Correcting Coding and Decoding: Turbo Codes" IEEE transactions on communications Vol.44, No: 10, pp.1261-1271, 1996.

[12]C. Shannon, “A Mathematical Theory of Communication”, Bell System Technical Journal, Vol. 27, pp. 379–423, 1948.

[13]Arpita Ray Sarkar, Subhankar Majhi "Comparison of Channel Coding Techniques Reference to Image Storage and Retrieval" International Journal of Engineering and Innovative Technology (IJEIT) Volume 1, Issue 5, 2012.

[14]Mona F. M. Mursi, Hossam Eldin H. Ahmed, Ayman H. Abd El-aziem "Image Encryption Based On Development of Hénon Chaotic Maps Using Fractional Fourier Transform" Accepted for publish at (MCSI 2014) Varna, Bulgaria, September 13-15, 2014.

[15]H. E. H. Ahmed, H. M. Kalash, and O. S. Faragallah, “Encryption Efficiency Analysis and Security Evaluation of RC6 Block Cipher for Digital Images”, International Conference on Electrical Engineering, pp. 1-7, April 2007.

[16]J. Fridrich. Image encryption based on chaotic ma.ps. In Proc. IEEE Int. Conference on systems, Man and Cybernet-ics, volume 2, pages 1105–1110, 1997.

[17]Zhu Liehuang, Li Wenzhuo, Liao Lejian, Li Hong. 2006. A Novel Algorithm for Scrambling Digital Image Based on Cat Chaotic Mapping. Proceedings of the 2006 International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP'06), 0-7695-2745-0/06 ? IEEE.