Catalogue Search | MBRL
Search Results Heading
Explore the vast range of titles available.
MBRLSearchResults
-
DisciplineDiscipline
-
Is Peer ReviewedIs Peer Reviewed
-
Item TypeItem Type
-
SubjectSubject
-
YearFrom:-To:
-
More FiltersMore FiltersSourceLanguage
Done
Filters
Reset
11,625
result(s) for
"Image transmission"
Sort by:
Intelligent Secured Two-Way Image Transmission Using Corvus Corone Module over WSN
by
Alhayani Bilal
,
Jasim, Mohammed Husam
,
Mahajan, Hemant B
in
Clutter
,
Computing time
,
Data transfer (computers)
2021
Two-way image communication in a wireless channel needs to be viable with channel properties such as transfer speed, energy-effective, time usage, and security because image capability consumes a huge space in the gadget and is quite effective. Is required in a manner. The figure goes through attacks. In addition, the quiesical issue for additional time of pressure is that the auxiliary interaction of pressure occurs through the dewar receiving extra time. To address these issues, compressed sensing emerges, which packs the image into hours of sensing, is generated in an expedient manner that reduces time usage and saves the use of data transfer capability, however Bomb in transmission. A variety of examinations cleared a way for dealing with security issues in compressive sensing (CS) through giving security as an alternative negotiation. In addition, univariate factors opted for CS as the issue of rearranging image quality is because of the aggregation of clutter. Along these lines related to the above issues, this paper proposed two-way image transmission to the Corvus Coron module, which presents an energy-effective with the CS model, as an inbuilt interaction in the CS transmission through the security framework. Receives what was designated as the pack-protected plot. Impeccable entertainment with the famous arbitrary network conjecture in CS. The result of the test is that the practical module presents energy-efficient and conserved transmission in the form of low error rate with low computational time.
Journal Article
Manufacturing intelligent Corvus corone module for a secured two way image transmission under WSN
2021
Purpose
The manufacturing of intelligent and secure visual data transmission over the wireless sensor network is key requirement nowadays to many applications. The two-way transmission of image under a wireless channel needed image must compatible along channel characteristics such as band width, energy-efficient, time consumption and security because the image adopts big space under the device of storage and need a long time that easily undergoes cipher attacks. Moreover, Quizzical the problem for the additional time under compression results that, the secondary process of the compression followed through the acquisition consumes more time.
Design/methodology/approach
Hence, for resolving these issues, compressive sensing (CS) has emerged, which compressed the image at the time of sensing emerges as a speedy manner that reduces the time consumption and saves bandwidth utilization but fails under secured transmission. Several kinds of research paved path to resolve the security problems under CS through providing security such as the secondary process.
Findings
Thus, concerning the above issues, this paper proposed the Corvus corone module two-way image transmission that provides energy efficiency along CS model, secured transmission through a matrix of security under CS such as inbuilt method, which was named as compressed secured matrix and faultless reconstruction along that of eminent random matrix counting under CS.
Originality/value
Experimental outputs shows intelligent module gives energy efficient, secured transmission along lower computational timing also decreased bit error rate.
Journal Article
A block-wise cyclic shifting-based reversible data hiding scheme (BCS-RDH) for secure medical image transmission
by
Kim, Byung-Gyu
,
Vazhora Malayil, Manikandan
,
Ahmed, Shakeel
in
Biometrics
,
Cloud computing
,
Confidentiality
2026
Reversible data hiding (RDH) has received serious attention from researchers in the past few years. The RDH method that can store additional details in encrypted images is a challenging area since the concealing rate is too low for such approaches. This research work introduces a new RDH method called block-wise cyclic shifting-based RDH (BCS-RDH), which can embed additional data in an image through a block-wise right cyclic shifting operation on the partitions of size S × S pixels. The BCS-RDH can embed any integer value in the range [0−( S 2 −1)] and it ensures a concealing rate of (Log 2 S 2 )/ S 2 bits per pixel (bpp). The BCS-RDH ensures the retention of the histogram and entropy of the encrypted image since the spatial rearrangement does not alter these two parameters, ensuring that the RDH process does not compromise the security aspects. The image reconstruction and the retrieval of the hidden details are done at the recipient by analyzing all the left-cyclic shifted partitions after attempting the decryption. The experimental study is carried out on standard images, and we rigorously analyzed all the key parameters. The study shows that the BCS-RDH surpasses several existing well-known RDH approaches.
Journal Article
Secure transmission cryptographic approach for remote-sensing image based on discrete memristor-coupled Rulkov neuron map and TIMG
2025
Remote-sensing imagery plays an important role in areas such as geographic information systems (GIS), environmental monitoring and resource management. In order to enhance the reliability of remote-sensing image transmission, a chaotic image cryptosystem is proposed in this paper. The algorithm employs the discrete memristor-coupled Rulkov neuron map with rich dynamic behavior, in conjunction with Knuth-Morria-Pratt (KMP), Three-Input Majority Gate (TIMG), and DNA operations. The original image is associated with the cryptosystem through SHA-256 as the key. The KMP algorithm is employed in the confusion process to obtain the next array for sliding selection and position mapping confusion. Additionally, a diffusion operation is designed to control TIMG by the next array, aiming to choose the DNA operation method in a flexible manner. The results are: key space reaches 2
790
, correlation coefficients are almost 0, average entropy = 7.9979, average NPCR = 99.6137%, and average UACI = 33.4940%. Moreover, experimental simulations demonstrate that our solution exhibits a degree of resilience to noise interference and data loss. In summary, through grayscale and color image analysis, it is evident that the proposed algorithm can achieve a cryptosystem that is both flexible and secure.
Journal Article
A prediction error based reversible data hiding scheme in encrypted image using block marking and cover image pre-processing
by
Panchikkil, Shaiju
,
Manikandan, V. M.
in
Computer Communication Networks
,
Computer Science
,
Coronaviruses
2024
A drastic change in communication is happening with digitization. Technological advancements will escalate its pace further. The human health care systems have improved with technology, remodeling the traditional way of treatments. There has been a peak increase in the rate of telehealth and e-health care services during the coronavirus disease 2019 (COVID-19) pandemic. These implications make reversible data hiding (RDH) a hot topic in research, especially for medical image transmission. Recovering the transmitted medical image (MI) at the receiver side is challenging, as an incorrect MI can lead to the wrong diagnosis. Hence, in this paper, we propose a MSB prediction error-based RDH scheme in an encrypted image with high embedding capacity, which recovers the original image with a peak signal-to-noise ratio (PSNR) of
∞
dB and structural similarity index (SSIM) value of 1. We scan the MI from the first pixel on the top left corner using the snake scan approach in dual modes: i) performing a rightward direction scan and ii) performing a downward direction scan to identify the best optimal embedding rate for an image. Banking upon the prediction error strategy, multiple MSBs are utilized for embedding the encrypted PHR data. The experimental studies on test images project a high embedding rate with more than 3 bpp for 16-bit high-quality DICOM images and more than 1 bpp for most natural images. The outcomes are much more promising compared to other similar state-of-the-art RDH methods.
Journal Article
MNTSCC: A VMamba-Based Nonlinear Joint Source-Channel Coding for Semantic Communications
2025
Deep learning-based semantic communication has achieved remarkable progress with CNNs and Transformers. However, CNNs exhibit constrained performance in high-resolution image transmission, while Transformers incur high computational cost due to quadratic complexity. Recently, VMamba, a novel state space model with linear complexity and exceptional long-range dependency modeling capabilities, has shown great potential in computer vision tasks. Inspired by this, we propose MNTSCC, an efficient VMamba-based nonlinear joint source-channel coding (JSCC) model for wireless image transmission. Specifically, MNTSCC comprises a VMamba-based nonlinear transform module, an MCAM entropy model, and a JSCC module. In the encoding stage, the input image is first encoded into a latent representation via the nonlinear transformation module, which is then processed by the MCAM for source distribution modeling. The JSCC module then optimizes transmission efficiency by adaptively assigning transmission rate to the latent representation according to the estimated entropy values. The proposed MCAM enhances the channel-wise autoregressive entropy model with attention mechanisms, which enables the entropy model to effectively capture both global and local information within latent features, thereby enabling more accurate entropy estimation and improved rate-distortion performance. Additionally, to further enhance the robustness of the system under varying signal-to-noise ratio (SNR) conditions, we incorporate SNR adaptive net (SAnet) into the JSCC module, which dynamically adjusts the encoding strategy by integrating SNR information with latent features, thereby improving SNR adaptability. Experimental results across diverse resolution datasets demonstrate that the proposed method achieves superior image transmission performance compared to existing CNN- and Transformer-based semantic communication models, while maintaining competitive computational efficiency. In particular, under an Additive White Gaussian Noise (AWGN) channel with SNR = 10 dB and a channel bandwidth ratio (CBR) of 1/16, MNTSCC consistently outperforms NTSCC, achieving a 1.72 dB Peak Signal-to-Noise Ratio (PSNR) gain on the Kodak24 dataset, 0.79 dB on CLIC2022, and 2.54 dB on CIFAR-10, while reducing computational cost by 32.23%. The code is available at (accessed on 09 July 2025).
Journal Article
Distributed Images Transmission with Related Feature Assistance: A DeepJSCC Approach
2026
With the rapid development of emerging applications such as the Internet of Things (IoT) and distributed visual perception, massive amounts of correlated image data require efficient transmission under constrained bandwidth and noisy channel conditions. Although Shannon’s separation theorem provides a theoretically optimal basis for independent source-channel design, end-to-end joint optimization methods demonstrate higher performance potential in finite block length scenarios. This paper addresses the distributed image transmission problem with source correlation by proposing a Deep Joint Source-Channel Coding (DeepJSCC)-based framework. The scheme introduces a correlation feature extraction module at the receiver to uncover similarities among multiple sources and assist image reconstruction. Experimental results demonstrate that this method significantly improves reconstruction quality across various signal-to-noise ratios (SNRs), particularly excelling under small bandwidth ratios.
Journal Article
Image transmission in mobile wireless multimedia sensor networks using cat swarm optimization
by
Maganti, Sushanth Babu
,
Rachapogula, Sumalatha
,
Devulapalli, Praveen Kumar
in
Bit error rate
,
Computer Communication Networks
,
Computer Science
2024
High-quality picture transmission over intelligent devices in Mobile Multimedia Sensor Networks (MWMSN) requires fast transmission rates, throughput, and a low Bit Error Rate (BER). Energy efficiency is always a top priority for battery-powered intelligent devices like smartphones and tablets. The Multiple Input and Multiple Output (MIMO) technology is extensively used in MWMSN with cooperative communication (CC). In order to increase the effectiveness of multimedia sensor networks, diverse network techniques are driven by cooperative communications because these systems are more likely to be built with traditional limited resources and scattered hardware. Since each node in the network is mobile, energy consumption and routing pose significant problems for cooperative mobile multimedia sensor networks. An optimisation model is developed to select the minimum number of multi-hops between the source and destination for the cooperative MWMSN network to address these challenges. This paper adopts a new Modified Cat Swarm Optimisation (MCSO) to solve a multi-objective function involving target throughput, mobility, energy consumption and outage probability. The simulation shows that the proposed approach has achieved better performance against state-of-art approaches regarding aggregate throughput, peak signal-to-noise ratio and structural similarity index.
Journal Article
Secure image transmission through LTE wireless communications systems
by
AL-Bouthigy, Radwan
,
Al-Shamri, Mohammad Yahya H
,
Abdulkareem, Safwan
in
Algorithms
,
Communications systems
,
Cryptography
2024
Secure transmission of images over wireless communications systems can be done using RSA, the most known and efficient cryptographic algorithm, and OFDMA, the most preferred signal processing choice in wireless communications. This paper aims to investigate the performance of OFDMA system for wireless transmission of RSA-based encrypted images. In fact, the performance of OFDMA systems; based on different signal processing techniques, such as, discrete sine transforms (DST) and discrete cosine transforms (DCT), as well as the conventional discrete Fourier transforms (DFT) are tested for wireless transmission of gray-scale images with/without RSA encryption. The progress of transmitting the image is carried by firstly, encrypting the image with RSA algorithm. Then, the encrypted image is modulated with DFT-based, DCT-based, and DST-based OFDMA systems. After that, the modulated images are transmitted over a wireless multipath fading channel. The reverse operations will be carried at the receiver, in addition to the frequency domain equalization to overcome the channel effect. Exhaustive numbers of scenarios are performed for study and investigation of the performance of the different OFDMA systems in terms of PSNR and MSE, with different subcarriers mapping and modulation techniques, is done. Results indicate that the ability of different OFDMA systems for wireless secure transmission of images. However, the DCT-OFDMA system showed superiority over the DST-OFDMA and the conventional DFT-OFDMA systems.
Journal Article
Review of Terahertz Tomography Techniques
by
Recur, B.
,
Canioni, L.
,
Frederique, L.
in
Classical Electrodynamics
,
Computed tomography
,
Dielectrics
2014
Terahertz and millimeter waves penetrate various dielectric materials, including plastics, ceramics, crystals, and concrete, allowing terahertz transmission and reflection images to be considered as a new imaging tool complementary to X-Ray or Infrared. Terahertz imaging is a well-established technique in various laboratory and industrial applications. However, these images are often two-dimensional. Three-dimensional, transmission-mode imaging is limited to thin samples, due to the absorption of the sample accumulated in the propagation direction. A tomographic imaging procedure can be used to acquire and to render three-dimensional images in the terahertz frequency range, as in the optical, infrared or X-ray regions of the electromagnetic spectrum. In this paper, after a brief introduction to two dimensional millimeter waves and terahertz imaging we establish the principles of tomography for Terahertz Computed tomography (CT), tomosynthesis (TS), synthetic aperture radar (SAR) and time-of-flight (TOF) terahertz tomography. For each technique, we present advantages, drawbacks and limitations for imaging the internal structure of an object.
Journal Article