Search In this Thesis
   Search In this Thesis  
العنوان
Secure Multi-Media Transmission Over Mobile Communication channels /
المؤلف
Ahmed, SHaimaa Ahmed EL-said.
هيئة الاعداد
باحث / شيماء أحمد السيد أحمد
مشرف / محمد محمد فؤاد
مشرف / خالد فوزي أحمد حسين
مشرف / خالد فوزي أحمد حسين
الموضوع
Mobile communication systems. Electronics.
تاريخ النشر
2011.
عدد الصفحات
175 p. :
اللغة
الإنجليزية
الدرجة
الدكتوراه
التخصص
الهندسة الكهربائية والالكترونية
تاريخ الإجازة
1/1/2011
مكان الإجازة
جامعة الزقازيق - كلية الهندسة - اتصالات والكترونيات
الفهرس
Only 14 pages are availabe for public view

from 171

from 171

Abstract

Secure Multi-Media Transmission over Mobile
Communication Channels
PhD. Thesis by Eng. Shaimaa Ahmed El-said Ahmed
Electronics and Communications Engineering Department,
Faculty of Engineering -Zagazig University.
ABSTRACT
Multimedia is one of the most popular data transmitted over mobile and wireless
communication channels. Image encryption is often achieved by using one of three
approaches; traditional, selective, or in-compression encryption techniques. The most
suitable one for multimedia encryption approach is the in-compression encryption
approach since it has the advantages of both traditional and selective techniques. As an
important way of designing a secure video encryption schemes, secret Multiple Huffman
Tables (MHT) technique has been suggested as an in-compression encryption technique.
However, the MHT technique suffers from high visual degradation at low bit rate and the
multiple Huffman tables may be vulnerable to be known.
In this thesis, a new in-compression encryption technique For efficient and secure
multimedia transmission is proposed. It is a general-purpose technique meaning that it can
be used with any bit-string. It depends on a statistical model of the images to be encrypted
and compressed to generate Optimized Multiple Huftinan Tables (OMHT). In this method,
a set of images or videos, randomly selected from the entire set of images or videos to be
transmitted, are used as a training data set to generate such optimized multiple Huffman
tables. As these tables are generated from a set of images or videos of the same nature as
those to be transmitted they will be the optimal tables to encrypt and compress the
transmitted data, and hence, the name ”Optimized” is used. These tables are used to
encode-encrypt the compressed image according to a secret order (secret key) whose
length is equal to the number of the generated Huffman tables. Only receivers that have the
secret key can decode/decrypt the received bit stream. The effectiveness of this scheme is
verified through a series of experiments, and the robustness of developed approach is
demonstrated by comparing its performance with those of the traditional, selective.