首页 | 本学科首页   官方微博 | 高级检索  
     


Implementation of an encrypted-compressed image wireless transmission scheme based on chaotic fractional-order systems
Affiliation:1. School of Physics and Optoelectronic Engineering, Ludong University, Yantai 264025, PRChina;2. Hunan Key Laboratory for High-Microstructure and Ultrafast Process, College of Physics and Electronics, Central South University, Changsha 410083, PR China;1. Department of Mathematical and Physical Sciences, College of Arts and Science, University of Nizwa, Nizwa, Sultanate of Oman;2. Department of Physics, National Defence Academy, Khadakwasla, Pune 411023, India;3. Department of Physics, Government College of Engineering and Ceramic Technology, Kolkata 700010, West Bengal, India;1. Department of Physics, Indira Gandhi Institute of Technology, Sarang, Dhenkanal 759146, Odisha, India;2. Department of Mathematics, Birla Institute of Technology and Science-Pilani, Hyderabad Campus, Hyderabad 500078, India;3. Department of Physics, Government College of Engineering and Ceramic Technology, Kolkata 700 010, West Bengal, India;4. Department of Physics, Government College of Engineering and Ceramic Technology, Kolkata 700 010, West Bengal, India;1. Department of Physics, National Taiwan Normal University, Taipei 11677, Taiwan;2. Department of Physics and Center for High Energy Physics, Chung-Yuan Christian University, Chung-Li 32023, Taiwan;3. Department of Physics, Pukyong National University (PKNU), Busan 608–737, Republic of Korea
Abstract:In this paper, an encryption, compression and transmission scheme is proposed. The scheme is based on fractional-order chaotic systems combined with Discrete Wavelet Transform (DWT) and Quadrature Phase Shift Keying (QPSK) modulation. The cipher performs rounds of digital operations between the vector states of the fractional-order system and the image to be encrypted. The implementation of the transmission process is made between a pair of software defined radio modules through a QPSK modulation scheme. The experimental results and security analysis show adequate performances for several applications in the presence of multiple attacks and environmental noise.
Keywords:
本文献已被 ScienceDirect 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号