Advertisement

Appendix

  • Mohsen A. M. El-Bendary
Chapter
Part of the Lecture Notes in Electrical Engineering book series (LNEE, volume 316)

Abstract

Many researches present the WSN implementation using the ZigBee technology. In the presented scenario 1, there several sub-scenarios are studied. The mobility effects, the different data randomizing improving degree, and the effectiveness of the convolutional code constraint length on the image transmission over the mobile channel. The scenario tried to find efficient technique alternative to the complex Convolutional decoder.

Keywords

Wireless Sensor Network Singular Value Decomposition Audio Signal Forward Error Correction Convolutional Code 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

References

  1. 1.
    Sklavos N, Zhang X (2007) Wireless security & cryptography: specifications and implementations. CRC Press/Taylor and Francis. ISBN:084938771XGoogle Scholar
  2. 2.
    Macq B, Dittmann J, Delp EJ (2004) Benchmarking of image watermarking algorithms for digital rights management. Proc IEEE 92(6):971–984CrossRefGoogle Scholar
  3. 3.
    Lu ZM, Xu DG, Sun SH (2006) Multipurpose image watermarking algorithm based on multistage vector quantization. IEEE Trans Image Process 14(6):822–831Google Scholar
  4. 4.
    Kim HS, Lee HK (2003) Invariant image watermark using Zernike moments. IEEE Trans Circuit Syst Video Technol 13(8):766–775CrossRefGoogle Scholar
  5. 5.
    Chu WC (2003) DCT-based image watermarking using subsampling. IEEE Trans WSN 5(1):34–38Google Scholar
  6. 6.
    Ghouti L, Bouridane A, Ibrahim MK, Boussakta S (2006) Digital image watermarking using balanced multiwavelets. IEEE Trans Signal Process 54(4):1519–1536CrossRefGoogle Scholar
  7. 7.
    Xiang S, Huang J (2007) Histogram-based audio watermarking against time-scale modification and cropping attacks. IEEE Trans WSN 9(7):1357–1372Google Scholar
  8. 8.
    Liu Z, Inoue A (2003) Audio watermarking techniques using sinusoidal patterns based on pseudorandom sequences. IEEE Trans Circuit Syst Video Technol 13(8):801–812CrossRefGoogle Scholar
  9. 9.
    Lemma AN, Aprea J, Oomen W, de Kerkhof LV (2003) A temporal domain audio watermarking technique. IEEE Trans Signal Process 51(4):1088–1097CrossRefMathSciNetGoogle Scholar
  10. 10.
    Li W, Xue X, Lu P (2006) Localized audio watermarking technique robust against time-scale modification. IEEE Trans WSN 8(1):60–69Google Scholar
  11. 11.
    Erküçük S, Krishnan S, Glu MZ (2006) A robust audio watermark representation based on linear chirps. IEEE Trans WSN 8(5):925–936Google Scholar
  12. 12.
    Wang X, Qi W, Niu P (2007) A new adaptive digital audio watermarking based on support vector regression. IEEE Trans Audio Speech Lang Process 15(8):2270–2277CrossRefGoogle Scholar
  13. 13.
    Özer H, Sankur B (2005) An SVD based audio watermarking technique. In: Proceedings of the IEEE 13th conference on signal processing and communications applications, pp 452–455Google Scholar
  14. 14.
    Han F, Yu X, Han S (2006) Improved Baker map for image encryption. In: Proceedings of the first international symposium on systems and control in aerospace and astronautics, ISSCAA 2006, pp 1273–1276Google Scholar
  15. 15.
    Fridrich J (1997) Image encryption based on chaotic maps. In: Proceedings of the IEEE international conference on systems, man, and cybernetics, pp 1105–1110Google Scholar
  16. 16.
    Qian Q, Chen Z, Yuan Z (2008) Video compression and encryption based-on multiple chaotic system. In: Proceedings of The 3rd international conference on innovative computing information and control (ICICIC’08)Google Scholar
  17. 17.
    Huang F, Lei F (2008) A novel symmetric image encryption approach based on a new invertible two-dimensional map. In: Proceedings of the international conference on intelligent information hiding and WSN signal processing IIHMSP 2008, pp 1340–1343Google Scholar
  18. 18.
    Koduru SC, Chandrasekaran V (2008) Integrated confusion-diffusion mechanisms for chaos based image encryption. In: Proceedings of the IEEE 8th international conference on computer and information technology workshops, pp 260–263Google Scholar
  19. 19.
    Usman K, Juzojil H, Nakajimal I (2007) Medical image encryption based on pixel arrangement and random permutation for transmission security. In: Proceedings of the 9th international conference on e-health networking, application and services, Taipei, pp 244–247Google Scholar
  20. 20.
    Elashry IF, Farag Allah OS, Abbas AM, El-Rabaie S, Abd El-Samie FE (2009) Homomorphic image encryption. J Electron Imaging 18(3):033002, SPIECrossRefGoogle Scholar
  21. 21.
    Ghazy RA, Hadhoud MM, Dessouky MI, El-Fishawy NA, Abd El-Samie FE (2008) Performance evaluation of block based SVD image watermarking. Progr Electromagn Res B 8:147–159CrossRefGoogle Scholar
  22. 22.
    Liu R, Tan T (2002) An SVD-based watermarking scheme for protecting rightful ownership. IEEE Trans WSN 4(1):121–128Google Scholar
  23. 23.
    Sun X, Liu J, Sun J, Zhang Q, Ji W (2008) A robust image watermarking scheme based-on the relationship of SVD. In: Proceedings of the international conference on intelligent information hiding and WSN signal processing, pp 731–734Google Scholar
  24. 24.
    Zhu X, Zhao J, Xu H (2006) A digital watermarking algorithm and implementation based on improved SVD. In: Proceedings of the IEEE 18th international conference on pattern recognition (ICPR’06), pp 651–656Google Scholar
  25. 25.
    Kubichek R (1993) Mel-cepstral distance measure for objective speech quality assessment. In: Proceedings of the IEEE Pacific Rim conference on communications, computers and signal processing, pp 125–128Google Scholar
  26. 26.
    Cordeiro CM, Abhyankar S, Toshiwal R, Agrawal DP (2004) BlueStar: enabling efficient integration between Bluetooth WPANs and IEEE 802.11 WLANs. Mobile Netw Appl 9:409–422CrossRefGoogle Scholar
  27. 27.
    Chen J-J, Sun T, Chen Y-C (2006) Improving Bluetooth throughput using FEC and interleaving. In: International conference on mobile ad hoc sensor networks, Hong Kong, pp 726–736Google Scholar
  28. 28.
    Waleed GM, Faizal M, Ahmed RB, Fareq M, Abd Malek B, Alif Ghani M (2009) Bluetooth wireless network authentication using radio frequency communication protocol. J Comput Sci 5(9):649–650Google Scholar
  29. 29.
    Kumar T (2009) Improving pairing mechanism in Bluetooth security. Int J Recent Trends Eng 2(2)Google Scholar
  30. 30.
    Albert J, Bissyandé TF, Bromberg YD, Chaumette S, Réveillère L (2010) UbiPAN: a Bluetooth extended personal area network. In: 2010 international conference on complex, intelligent and software intensive systems, pp 774–778Google Scholar
  31. 31.
    Wang S, Sekey A, Gersho A (2002) An objective measure for predicting subjective quality of speech coders. IEEE J Sel Areas Commun 10(5):819–829CrossRefGoogle Scholar
  32. 32.
    Yang W, Benbouchta M, Yantorno R (1998) Performance of the modified bark spectral distortion as an objective speech quality measure. In: Proceedings of the IEEE international conference on acoustic, speech and signal processing (ICASSP), Washington, vol 1, pp 541–544Google Scholar
  33. 33.
    McDermott BJ, Scaglia C, Goodman DJ (1978) Perceptual and objective evaluation of speech processed by adaptive differential PCM. In: Proceedings of the IEEE international conf. on acoustic, speech and signal processing (ICASSP), Tulsa, pp 581–585Google Scholar
  34. 34.
    Crochiere RE, Tribolet JE, Rabiner LR (1980) An interpretation of the log likelihood ratio as a measure of waveform coder performance. IEEE Trans Acoust Speech Signal Process Assp-28(3):318–323Google Scholar
  35. 35.
    Kai B, Yong P (2006) Performance study on Bluetooth-based wireless personal area networks for real-time health monitoring. ETRI J 28(4)Google Scholar
  36. 36.
    Lai C-C (2011) An improved SVD-based watermarking scheme using human visual characteristics. Optics Commun Sci Direct 284:938–944CrossRefGoogle Scholar

Copyright information

© Springer Japan 2015

Authors and Affiliations

  • Mohsen A. M. El-Bendary
    • 1
  1. 1.Helwan UniversityCairoEgypt

Personalised recommendations