Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Secure image transmission method based on fountain code and self-adaptive resource distribution

A resource allocation and secure transmission technology, applied in the direction of transmission modification based on link quality, transmission system, digital transmission system, etc., can solve the problems of image transmission security, key distribution and exchange security are difficult to guarantee, and achieve The effect of reducing transmission delay, low complexity, and improving transmission efficiency

Active Publication Date: 2016-05-04
XI AN JIAOTONG UNIV
View PDF4 Cites 12 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, due to the openness of the wireless environment itself, image transmission is also facing severe security issues.
Traditional wireless image transmission uses key-based encryption technology and digital watermarking technology to ensure security. The core of encryption technology is to continuously increase the complexity of decryption, but the performance of computers is improving rapidly. The security of this encryption technology has also been greatly challenged
Moreover, the security of key distribution and exchange is difficult to guarantee

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Secure image transmission method based on fountain code and self-adaptive resource distribution
  • Secure image transmission method based on fountain code and self-adaptive resource distribution
  • Secure image transmission method based on fountain code and self-adaptive resource distribution

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0052] In this embodiment, the human brain MRI image with a resolution of 352×512 is selected as the private image to be transmitted. Each pixel is represented by 8-bit binary. The original image is divided into 191 ROI original packets and 35 BG original packets. packs, each containing 410 symbols. Considering different delay constraints, the simulation verifies the effectiveness of the present invention. figure 2 is the image actually received by the legal receiving end Bob (the right of the figure) and the eavesdropping end Eve (the left of the figure) when using the method of the present invention to transmit under the given delay constraint T=210, where the white dots are because the present invention will The pixels corresponding to the missing packets are set to 255. From figure 2 It can be seen that the effect of the image received by the legitimate receiving end Bob is obviously better than that of the eavesdropping end Eve. image 3 is the security violation pro...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a secure image transmission method based on a fountain code and self-adaptive resource distribution. The invention aims at specifically ensuring the security of a region-of-interest in a medical image under delay constraint. Firstly, the image is subjected to region segmentation to extract the region-of-interest (ROI) and a background region (BG), thus two kinds of original data packages ROI and BG are obtained. Secondly, the type of the data package to be transmitted is selected according to the channel quality of a legal link and the receiving state identifiers of the two kinds of data packages. Then the self-adaptive resource distribution is performed according to the channel quality of the legal link, thus a legal receiving end achieves higher data package correct receiving rate. At last, the RS fountain code is performed on the original data package to be transmitted. In order to compensate relatively high time delay due to the fact that the BG package is transmitted when the channel quality is poor, the two kinds of packages are simultaneously transmitted in a superimposed coding manner when the channel quality is especially good. By simulation verifying, the secure image transmission method can well achieve key protection on the ROI in the image.

Description

Technical field: [0001] The present invention relates to a mechanism for ensuring image security in a wireless multimedia image transmission system, in particular to an image security transmission method based on fountain code and adaptive resource allocation, which uses fountain code technology and adaptive resource allocation to reduce image wireless The security violation probability and transmission delay in the transmission process realize the key protection of the area of ​​interest in the image. Background technique: [0002] With the rapid development of wireless communication, the wireless transmission of static multimedia images is becoming more and more frequent. However, due to the openness of the wireless environment itself, image transmission is also facing severe security issues. Traditional wireless image transmission uses key-based encryption technology and digital watermarking technology to ensure security. The core of encryption technology is to continuou...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L1/00H04W52/24H04W72/08H04W72/54
CPCH04L1/0003H04L1/0026H04W52/24H04W72/54
Inventor 孙黎韩彩虹任品毅王熠晨
Owner XI AN JIAOTONG UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products