2018
DOI: 10.1016/j.optcom.2017.09.095
|View full text |Cite
|
Sign up to set email alerts
|

A two layer chaotic encryption scheme of secure image transmission for DCT precoded OFDM-VLC transmission

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
18
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
8

Relationship

0
8

Authors

Journals

citations
Cited by 28 publications
(19 citation statements)
references
References 24 publications
0
18
0
Order By: Relevance
“…In addition, the comparative analysis of the BER, PAPR and CPAs resistance among other schemes and ours are given in Table 2. The schemes such as the WHT [9], DFT [13] and DCT [14] based on chaotic precoding can achieve the PAPR reduction for improving the system performance, while the CPAs resistance are not involved. Our scheme and the CPR in [16] can achieve the good capacity of CPAs resistance without improving PAPR.…”
Section: Results Analysis and Further Discussionmentioning
confidence: 99%
See 1 more Smart Citation
“…In addition, the comparative analysis of the BER, PAPR and CPAs resistance among other schemes and ours are given in Table 2. The schemes such as the WHT [9], DFT [13] and DCT [14] based on chaotic precoding can achieve the PAPR reduction for improving the system performance, while the CPAs resistance are not involved. Our scheme and the CPR in [16] can achieve the good capacity of CPAs resistance without improving PAPR.…”
Section: Results Analysis and Further Discussionmentioning
confidence: 99%
“…However, all the above schemes [4]- [7] need additional bandwidth to transmit the optimal phase factor, which increases the system complexity and reduces the realtime processing capability of system. As an improvement, the low computational complexity schemes were proposed for secure transmission in OFDM-PON, such as chaotic coding IQ encryption [8], chaotic Walsh-Hadamard Transform [9], chaotic constellation transformation and pilot-aided [10], hybrid chaotic confusion and diffusion (HCCD) [11], chaotic completely frequency/time permutation [12], chaotic modified-DFT (discrete Fourier transform) [13], discrete cosine transform (DCT) [14], etc. In these schemes, transmission security was originated from the chaotic IQ encryption, processed matrix or frequency/time permutations, which can achieve better security and large key space simultaneously.…”
Section: Introductionmentioning
confidence: 99%
“…Al-Moliki et al [27]- [32] proposed to generate secret keys from the real-valued bipolar samples of the optical OFDM scheme for encrypting the signal upon transmission. Wang et al [33], [35], [37] proposed chaotic encryption methods for encrypting the images input type. Yang et al [34] proposed a chaotic encryption method to secure non-orthogonal multiple access (NOMA)-based VLC systems.…”
Section: Introductionmentioning
confidence: 99%
“…Therefore, the channel equalization is simplified so that they are considered as the advantages of OFDM. OFDM presents low symbol rate, which makes a guard interval between symbols, and also it has the capability to eliminate Inter-Symbol Interference (ISI), echoes, and time-spreading [7][8][9]. This work is divided into two parts, The objective of the first part is performing steganography approach, which achieves high security and high capacity with keeping the quality of steganography image.…”
Section: Introductionmentioning
confidence: 99%