Loading...
Search for:
delay-aware
0.009 seconds
On learning-assisted content-based secure image transmission for delay-aware systems with randomly-distributed eavesdroppers
, Article IEEE Transactions on Communications ; 2021 ; 00906778 (ISSN) ; Behroozi, H ; Khalaj, B. H ; Jorswieck, E. A ; Sharif University of Technology
Institute of Electrical and Electronics Engineers Inc
2021
Abstract
In this paper, a learning-aided content-based image transmission scheme is proposed, where a multi-antenna source wishes to securely deliver an image to a legitimate destination in the presence of randomly-distributed passive eavesdroppers (Eves). We take into account the fact that not all regions of an image have the same importance from the security perspective. Hence, we employ a hybrid method to realize both the error-free data delivery of public regions—containing less-important pixels; and an artificial noise (AN)-aided transmission scheme for securing the confidential packets. To reinforce system’s security, fountain-based packet delivery is also adopted, where the source node encodes...
On learning-assisted content-based secure image transmission for delay-aware systems with randomly-distributed eavesdroppers
, Article IEEE Transactions on Communications ; Volume 70, Issue 2 , 2022 , Pages 1125-1139 ; 00906778 (ISSN) ; Behroozi, H ; Khalaj, B. H ; Jorswieck, E. A ; Sharif University of Technology
Institute of Electrical and Electronics Engineers Inc
2022
Abstract
In this paper, a learning-aided content-based image transmission scheme is proposed, where a multi-antenna source wishes to securely deliver an image to a legitimate destination in the presence of randomly-distributed passive eavesdroppers (Eves). We take into account the fact that not all regions of an image have the same importance from the security perspective. Hence, we employ a hybrid method to realize both the error-free data delivery of public regions - containing less-important pixels; and an artificial noise (AN)-aided transmission scheme for securing the confidential packets. To reinforce system's security, fountain-based packet delivery is also adopted, where the source node...