As a result of higher frequencies and increased user mobility, researchers and systems designers are shifting their focus from time-invariant models to channels that vary within a block. This book explains the latest theoretical advances and practical methods to give an understanding of rapidly time
Hybrid Encryption Algorithms Over Wireless Communication Channels
✍ Scribed by Mai H. Shahieen
- Year
- 2020
- Tongue
- English
- Leaves
- 269
- Category
- Library
No coin nor oath required. For personal study only.
✦ Table of Contents
Cover
Title Page
Copyright Page
Preface
Acknowledgements
Contents
List of Abbreviations
1. Introduction
1.1 Processing of Encrypted Data
1.2 Objectives of the Book
1.3 Book Organization
2. Fundamentals of Image Encryption for Wireless Communications
2.1 Introduction
2.2 Encryption System Model
2.3 Key Types
2.4 Diffusion-based Algorithms
2.4.1 The Advanced Encryption Standard (AES)
2.4.1.1 AES Encryption Algorithm
2.4.2 The RC6 Algorithm
2.4.2.1 RC6 Encryption Algorithm
2.5 Permutation-based Encryption
2.5.1 CBC, CFB, and OFB Chaotic Encryption Modes
2.6 Encryption Quality Metrics
2.6.1 Histogram
2.6.2 Deviation of an Encrypted Image
2.6.3 Immunity to Noise
3. Rubik’s Cube Encryption for Wireless Communications
3.1 Overview of the Proposed Hybrid Encryption Approach
3.2 Puzzle Concept
3.3 AES with Rubik’s Cube Algorithm
3.3.1 Histogram Analysis
3.3.2 Deviation
3.3.3 Correlation Coefficient
3.3.4 Processing Time
3.3.5 The Noise Immunity
3.4 RC6 with Rubik’s Cube Algorithm
3.4.1 Histogram Analysis
3.4.2 Deviation
3.4.3 Correlation Coefficient
3.4.4 Processing Time
3.3.5 Noise Immunity
3.5 Chaotic Encryption Algorithm in Different Modes with Rubik’s Cube Algorithm
3.5.1 Histogram Analysis
3.5.2 Deviation
3.5.3 Correlation Coefficient
3.5.4 Processing Time
3.5.5 Noise Immunity
3.6 Proposed Hybrid Encryption Framework
3.7 Simulation Results
3.7.1 AES with Rubik’s Cube Algorithm (Similar Faces)
3.7.2 AES with Rubik’s Cube Algorithm (Different Faces)
3.7.3 RC6 with Rubik’s Cube Algorithm (Similar Faces)
3.7.4 RC6 with Rubik’s Cube Algorithm (Different Faces)
3.7.5 Chaotic with Rubik’s Cube Algorithm (Similar Faces)
3.7.6 Chaotic with Rubik’s Cube Algorithm (Different Faces)
4. Hybrid Rubik’s Cube Algorithm for Wireless Communications
4.1 Introduction
4.2 Proposed Hybrid Encryption Framework
4.3 Encryption Quality Evaluation Metrics
4.3.1 Histogram Analysis
4.3.2 Deviation and Correlation Coefficient
4.3.3 Processing Time
4.4 Simulation Results
5. Proposed Hybrid Encryption Framework for Reliable 3-D Wireless Video Communications
5.1 Introduction
5.2 Proposed Hybrid Encryption Framework
5.3 Encryption Quality Evaluation Metrics
5.3.1 Histogram Analysis
5.3.2 Deviation and Correlation Coefficient
5.4 Simulation Results
6. Conclusions and Future Work
6.1 Conclusion
6.2 Future Work
References
Appendix A: MATLAB® Codes for Rubik’s Cube Encryption Algorithm
Appendix B: MATLAB® Codes for Encrypted Image Communication
Appendix C: MATLAB® Codes for Image Encryption
Index
📜 SIMILAR VOLUMES
<P>MIMO systems have been known to better the quality of service for wireless communication systems. This book discusses emerging techniques in MIMO systems to reduce complexities and keep benefits unaffected at the same time. It discusses about benefits and shortcomings of various MIMO technologies
Wireless Communications over MIMO Channels: Applications to CDMA and Multiple Antenna Systems covers both, state-of-the-art channel coding concepts and CDMA and multiple antenna systems, rarely found in other books on the subject.Furthermore, an information theoretical analysis of CDMA and SDMA syst