Muutke küpsiste eelistusi

Hybrid Encryption Algorithms over Wireless Communication Channels [Kõva köide]

  • Formaat: Hardback, 258 pages, kõrgus x laius: 234x156 mm, kaal: 666 g, 25 Tables, black and white; 8 Illustrations, color; 85 Illustrations, black and white
  • Ilmumisaeg: 05-Mar-2021
  • Kirjastus: CRC Press
  • ISBN-10: 036750815X
  • ISBN-13: 9780367508159
  • Formaat: Hardback, 258 pages, kõrgus x laius: 234x156 mm, kaal: 666 g, 25 Tables, black and white; 8 Illustrations, color; 85 Illustrations, black and white
  • Ilmumisaeg: 05-Mar-2021
  • Kirjastus: CRC Press
  • ISBN-10: 036750815X
  • ISBN-13: 9780367508159
"Encryption and processing of digital data, has recently attracted the interest of researchers in the field of information security due to need for securing the information contents even through the processing stage. This thesis is concerned with different topics as survey study for data encryption algorithms and their drawbacks, study of encrypted data processing techniques, proposal of an efficient data processing techniques, proposal of an efficient data encryption algorithm that is robust to communication channel degradation, attacks and signal processing tools, providing a mathematical model for the proposed data encryption algorithm, proposal of data compression and authentication tools that can be performed on encrypted data without variation of the data content, and comparison study between the proposed approaches and the state of the art approaches"--

This book presents novel hybrid encryption algorithms that possess many different characteristics. In particular, “Hybrid Encryption Algorithms over Wireless Communication Channels”, examines encrypted image and video data for the purpose of secure wireless communications. A study of two different families of encryption schemes are introduced: namely, permutation-based and diffusion-based schemes. The objective of the book is to help the reader selecting the best suited scheme for the transmission of encrypted images and videos over wireless communications channels, with the aid of encryption and decryption quality metrics. This is achieved by applying number-theory based encryption algorithms, such as chaotic theory with different modes of operations, the Advanced Encryption Standard (AES), and the RC6 in a pre-processing step in order to achieve the required permutation and diffusion. The Rubik’s cube is used afterwards in order to maximize the number of permutations.

Transmission of images and videos is vital in today’s communications systems. Hence, an effective encryption and modulation schemes are a must. The author adopts Orthogonal Frequency Division Multiplexing (OFDM), as the multicarrier transmission choice for wideband communications. For completeness, the author addresses the sensitivity of the encrypted data to the wireless channel impairments, and the effect of channel equalization on the received images and videos quality.

Complete simulation experiments with MATLAB® codes are included. The book will help the reader obtain the required understanding for selecting the suitable encryption method that best fulfills the application requirements.

Arvustused

In this clearly written book, Shaheen studies methods of encrypting images and video for transmission over wireless communication systems, and methodically demonstrates several encryption algorithms. This text will certainly be of interest to graduate students and researchers in the field of wireless communications.

J. M. Smith, Sonoma State University, Choice Feb 2022 Vol 59

Preface iii
Acknowledgements iv
List of Abbreviations
viii
1 Introduction
1(4)
1.1 Processing of Encrypted Data
2(1)
1.2 Objectives of the Book
3(1)
1.3 Book Organization
3(2)
2 Fundamentals of Image Encryption for Wireless Communications
5(11)
2.1 Introduction
5(1)
2.2 Encryption System Model
6(1)
2.3 Key Types
6(1)
2.4 Diffusion-based Algorithms
7(3)
2.4.1 The Advanced Encryption Standard (AES)
7(1)
2.4.1.1 AES Encryption Algorithm
7(2)
2.4.2 The RC6 Algorithm
9(1)
2.4.2.1 RC6 Encryption Algorithm
9(1)
2.5 Permutation-based Encryption
10(3)
2.5.1 CBC, CFB, and OFB Chaotic Encryption Modes
11(2)
2.6 Encryption Quality Metrics
13(3)
2.6.1 Histogram
13(1)
2.6.2 Deviation of an Encrypted Image
13(2)
2.6.3 Immunity to Noise
15(1)
3 Rubik's Cube Encryption for Wireless Communications
16(43)
3.1 Overview of the Proposed Hybrid Encryption Approach
16(2)
3.2 Puzzle Concept
18(2)
3.3 AES with Rubik's Cube Algorithm
20(5)
3.3.1 Histogram Analysis
21(2)
3.3.2 Deviation
23(1)
3.3.3 Correlation Coefficient
24(1)
3.3.4 Processing Time
24(1)
3.3.5 The Noise Immunity
25(1)
3.4 RC6 with Rubik's Cube Algorithm
25(7)
3.4.1 Histogram Analysis
26(4)
3.4.2 Deviation
30(1)
3.4.3 Correlation Coefficient
30(1)
3.4.4 Processing Time
30(1)
3.3.5 Noise Immunity
31(1)
3.5 Chaotic Encryption Algorithm in Different Modes with Rubik's Cube Algorithm
32(8)
3.5.1 Histogram Analysis
32(6)
3.5.2 Deviation
38(1)
3.5.3 Correlation Coefficient
38(1)
3.5.4 Processing Time
39(1)
3.5.5 Noise Immunity
39(1)
3.6 Proposed Hybrid Encryption Framework
40(1)
3.7 Simulation Results
41(18)
3.7.1 AES with Rubik's Cube Algorithm (Similar Faces)
42(2)
3.7.2 AES with Rubik's Cube Algorithm (Different Faces)
44(2)
3.7.3 RC6 with Rubik's Cube Algorithm (Similar Faces)
46(4)
3.7.4 RC6 with Rubik's Cube Algorithm (Different Faces)
50(4)
3.7.5 Chaotic with Rubik's Cube Algorithm (Similar Faces)
54(2)
3.7.6 Chaotic with Rubik's Cube Algorithm (Different Faces)
56(3)
4 Hybrid Rubik's Cube Algorithm for Wireless Communications
59(23)
4.1 Introduction
59(2)
4.2 Proposed Hybrid Encryption Framework
61(2)
4.3 Encryption Quality Evaluation Metrics
63(9)
4.3.1 Histogram Analysis
64(5)
4.3.2 Deviation and Correlation Coefficient
69(2)
4.3.3 Processing Time
71(1)
4.4 Simulation Results
72(10)
5 Proposed Hybrid Encryption Framework for Reliable 3-D Wireless Video Communications
82(22)
5.1 Introduction
82(3)
5.2 Proposed Hybrid Encryption Framework
85(2)
5.3 Encryption Quality Evaluation Metrics
87(3)
5.3.1 Histogram Analysis
89(1)
5.3.2 Deviation and Correlation Coefficient
89(1)
5.4 Simulation Results
90(14)
6 Conclusions and Future Work
104(2)
6.1 Conclusion
104(1)
6.2 Future Work
105(1)
References 106(6)
Appendix A MATLAB® Codes for Rubik's Cube Encryption Algorithm 112(15)
Appendix B MATLAB® Codes for Encrypted Image Communication 127(85)
Appendix C MATLAB® Codes for Image Encryption 212(45)
Index 257
Mai Helmy Shaheen graduated in 2005 from Faculty of Electronic Engineering, Menofia University, Egypt. She obtained a M.Sc. degree in Electronic and Electrical Communication engineering which specialized in Encrypted Image Transmission over Wireless Channels in 2011, and a Ph.D. degree in Electronic engineering and Electrical Communications engineering in 2019. Her interest is security over wired, Broadband Wireless Distribution Systems, Image and Video Compression, Multimedia System and wireless networks. Encryption algorithms, OFDM communication system, Digital Communication Techniques, Audio Encryption, Cyber Security, and Convolutional Neural Network.