Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A variable-rate safe transmission method of image data based on fountain code

A technology for image data and secure transmission, applied in the field of wireless communication, can solve the problems of only concerned about the security of bit stream transmission, inapplicability of image services, waste of resources, etc., to reduce decoding delay, meet high-speed transmission, and expand channel advantages. Effect

Active Publication Date: 2022-01-14
ZHEJIANG LAB +1
View PDF5 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, due to the randomness of the wireless channel, when the channel condition is good, sending only one encoded packet is likely to cause a waste of resources
In addition, most existing fountain code-based transmission schemes mainly focus on the intercept probability of the system, that is, they only care about the transmission security of the bit stream
However, these methods are not suitable for image services that need to fully consider the mutual coupling and restrictive relationship between security constraints and diverse service quality requirements

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A variable-rate safe transmission method of image data based on fountain code
  • A variable-rate safe transmission method of image data based on fountain code
  • A variable-rate safe transmission method of image data based on fountain code

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0029] The purpose and effects of the present invention will become clearer by describing the present invention in detail according to the accompanying drawings and preferred embodiments. It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.

[0030] Assuming that the system bandwidth is B, the system contains three nodes Alice, Bob and Eve, representing the legal sender, legal receiver and eavesdropper respectively. Assuming that the wireless channel is a block fading channel model, the channel coefficient h ij is a circular symmetric complex Gaussian random variable with mean zero and variance which is where α and d ij represent the path loss exponent and the distance between nodes i and j, respectively. The average transmit power of the transmitter The noise at the receiver is the variance N 0 The additive white Gaussian noise of , the SNR is defined as

[0031] Th...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a variable-rate secure transmission method of image data based on fountain codes. The method adjusts the number of coded packets sent in each time slot according to legal link channel conditions, so as to make full use of channel resources and reduce decoding time delay. At the same time, the channel quality advantage of the legal link is expanded to ensure the safe transmission of information, and the source data packets participating in the encoding process are selected according to the importance of the source data packets, the delay constraints of the system, and the channel quality. The method of the invention can enable legal receivers to accumulate important data as soon as possible, and at the same time prevent eavesdroppers from intercepting these data, while ensuring the communication security of legal users, it can also take into account the user's requirements for time delay and service quality.

Description

technical field [0001] The invention belongs to the technical field of wireless communication, and in particular relates to a method for safely transmitting image data at variable rates based on fountain codes. Background technique [0002] In fountain code-based transmission, the source file is divided into N source packets of equal length. The sending end performs a bitwise XOR operation on different source data packets to construct an infinite number of fountain packets, and then transmits them to the receiving end until the receiving end successfully accumulates N mutually independent encoded packets to restore the entire file. This feature of fountain codes means that as long as legitimate users accumulate enough encoded packets before eavesdroppers, they will not leak information. Compared with traditional physical layer security strategies designed mainly to maximize the privacy rate or minimize the probability of privacy outage, the anti-eavesdropping technology bas...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04N1/333H04N1/44H04L1/00
CPCH04N1/33323H04N1/3333H04N1/33361H04N1/44H04L1/0002H04L1/0057
Inventor 孙黎黄丹彤吴迎笑
Owner ZHEJIANG LAB
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products