The trade off between the energy consumption and the quality of the
received image should be considered as a main point in the techniques design in
Wireless Sensor Network (WSN). This paper analyzes the performance of multiple
image encryption algorithms with different approaches. And also, it introduces
two proposed modulation techniques to enhance the performance of WSN. These two
techniques merge both the image and the audio in one signal. The merging
process enhances the energy consumption data rate. In addition, it removes the
effectiveness of the jamming completely from both the reconstructed image and
reconstructed audio signal at the receiver. So, the receiver will reconstruct
the image without jamming effectiveness. The paper introduces a proposed audio
encryption algorithm. The use of encryption algorithms for both image and audio
signals with the merging process enhances the security level. Popular metrics
are used to compare between these image encryption algorithms and also to show
the benefits from these enhancements. The results show the preference of one of
these image encryption algorithms to others. And also, the merging process
enhances the bit rate to high level.
References
[1]
Kishk, A.M., Messiha, N.W., Elfishawy, N.A., Elkafs, A.A. and Madian, A.H. (2014) Channel Encryption in Wireless Camera Sensor Network. Journal of Advances in Computer Networks, 2, 125-128.
http://dx.doi.org/10.7763/JACN.2014.V2.95
[2]
Liu, R. and Tian, X. (2012) New Algorithm for Color Image Encryption Using Chaotic Map and Spatial Bit-Level Permutation. Journal of Theoretical and Applied Information Technology, 43, 89.
[3]
Wang, L.H. and Liao, X.B. (2012) A Novel Image Encryption Approach Based on Chaotic Piecewise Map. Journal of Theoretical physics & Cryptography, 1, 37-40.
[4]
Khade, P. and Narnaware, M. (2012) 3D Chaotic Functions for Image Encryption. International Journal of Computer Science, 9, 323-328.
[5]
Kishk, A., Messiha, N., Ayad, N., El-Fishawy, N. and Abdel-Samie, F. (2010) Fast and Flexible Symmetrical Encryption Algorithm Based on Key-Updating. Presented at the National Radio Science Conference.
[6]
Chen, S., Zhong, X. and Wu, Z. (2008) Block Chaos Cipher for Wireless Sensor Network. Science in China Series F: Information Sciences, 51, 1055-1063. http://dx.doi.org/10.1007/s11432-008-0102-5
[7]
Kishk, A., Messiha, N., El-Fishawy, N., Alkafs, A. and Madian, A. (2014) Channel Encryption in Wireless Camera Sensor Network. Journal of Advances in Computer Networks, 2, 125-128.
http://dx.doi.org/10.7763/JACN.2014.V2.95
[8]
Francois, M., Grosges, T., Barchiesi, D. and Erra, R. (2012) A New Image Encryption Scheme Based on a Chaotic Function. Signal Processing: Image Communication, 27, 249-259. http://dx.doi.org/10.1016/j.image.2011.11.003
[9]
Chattopadhyay, S. and Sanyal, S. (2009) Comparison of Performance Metrics for QPSK and OQPSK Transmission Using Root Raised Cosine & Raised Cosine Pulse-Shaping Filters for Applications in Mobile Communication. International Journal of Computer Science and Information Security, 6, 106-112.
[10]
Boiroju, N., Yerukala, R., Venugopala, M. and Krishna, M. (2011) A Bootstrap Test for Equality of Mean Absolute Errors. ARPN Journal of Engineering and Applied Sciences, 6, 9-11.