Eureka AIR delivers breakthrough ideas for toughest innovation challenges, trusted by R&D personnel around the world.

Image Security Transmission Method Based on Fountain Code and Adaptive Resource Allocation

A technology for resource allocation and secure transmission, applied in the direction of link quality-based transmission modification, transmission system, digital transmission system, etc. The effect of reducing transmission delay, low complexity and improving transmission efficiency

Active Publication Date: 2019-05-10
XI AN JIAOTONG UNIV
View PDF4 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, due to the openness of the wireless environment itself, image transmission is also facing severe security issues.
Traditional wireless image transmission uses key-based encryption technology and digital watermarking technology to ensure security. The core of encryption technology is to continuously increase the complexity of decryption, but the performance of computers is improving rapidly. The security of this encryption technology has also been greatly challenged
Moreover, the security of key distribution and exchange is difficult to guarantee

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Image Security Transmission Method Based on Fountain Code and Adaptive Resource Allocation
  • Image Security Transmission Method Based on Fountain Code and Adaptive Resource Allocation
  • Image Security Transmission Method Based on Fountain Code and Adaptive Resource Allocation

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0052] In this embodiment, the human brain MRI image with a resolution of 352×512 is selected as the private image to be transmitted. Each pixel is represented by 8-bit binary. The original image is divided into 191 ROI original packets and 35 BG original packets. packs, each containing 410 symbols. Considering different delay constraints, the simulation verifies the effectiveness of the present invention. figure 2 is the image actually received by the legal receiving end Bob (the right of the figure) and the eavesdropping end Eve (the left of the figure) when using the method of the present invention to transmit under the given delay constraint T=210, where the white dots are because the present invention will The pixels corresponding to the missing packets are set to 255. From figure 2 It can be seen that the effect of the image received by the legitimate receiving end Bob is obviously better than that of the eavesdropping end Eve. image 3 is the security violation pro...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an image security transmission method based on fountain codes and adaptive resource allocation. The purpose of the present invention is to focus on ensuring the safety of the region of interest in the medical image under the condition of considering the time delay constraint. First, the image is segmented to extract the region of interest (ROI) and the background region (BG), and two types of original data packets of ROI and BG are obtained. Secondly, according to the channel quality of the legal link and the receiving state identification of the two types of data packets, the type of data packets to be transmitted is selected. Then, adaptive resource allocation is performed according to the channel quality of the legal link, so that the legal receiving end has a higher correct reception rate of data packets. Finally, perform RS fountain encoding on the raw data packet to be transmitted. In order to make up for the higher time delay caused by the transmission of BG packets when the channel is poor, when the channel quality is particularly good, the two types of packets are transmitted simultaneously by means of superposition coding. It is verified by simulation that the present invention can well realize the key protection of the region of interest in the image.

Description

Technical field: [0001] The present invention relates to a mechanism for ensuring image security in a wireless multimedia image transmission system, in particular to an image security transmission method based on fountain code and adaptive resource allocation, which uses fountain code technology and adaptive resource allocation to reduce image wireless The security violation probability and transmission delay in the transmission process realize the key protection of the area of ​​interest in the image. Background technique: [0002] With the rapid development of wireless communication, the wireless transmission of static multimedia images is becoming more and more frequent. However, due to the openness of the wireless environment itself, image transmission is also facing severe security issues. Traditional wireless image transmission uses key-based encryption technology and digital watermarking technology to ensure security. The core of encryption technology is to continuou...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L1/00H04W52/24H04W72/08
CPCH04L1/0003H04L1/0026H04W52/24H04W72/54
Inventor 孙黎韩彩虹任品毅王熠晨
Owner XI AN JIAOTONG UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Eureka Blog
Learn More
PatSnap group products