Loading...
Search for: delay-aware
0.009 seconds

    On learning-assisted content-based secure image transmission for delay-aware systems with randomly-distributed eavesdroppers

    , Article IEEE Transactions on Communications ; 2021 ; 00906778 (ISSN) Letafati, M ; Behroozi, H ; Khalaj, B. H ; Jorswieck, E. A ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2021
    Abstract
    In this paper, a learning-aided content-based image transmission scheme is proposed, where a multi-antenna source wishes to securely deliver an image to a legitimate destination in the presence of randomly-distributed passive eavesdroppers (Eves). We take into account the fact that not all regions of an image have the same importance from the security perspective. Hence, we employ a hybrid method to realize both the error-free data delivery of public regions—containing less-important pixels; and an artificial noise (AN)-aided transmission scheme for securing the confidential packets. To reinforce system’s security, fountain-based packet delivery is also adopted, where the source node encodes... 

    On learning-assisted content-based secure image transmission for delay-aware systems with randomly-distributed eavesdroppers

    , Article IEEE Transactions on Communications ; Volume 70, Issue 2 , 2022 , Pages 1125-1139 ; 00906778 (ISSN) Letafati, M ; Behroozi, H ; Khalaj, B. H ; Jorswieck, E. A ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2022
    Abstract
    In this paper, a learning-aided content-based image transmission scheme is proposed, where a multi-antenna source wishes to securely deliver an image to a legitimate destination in the presence of randomly-distributed passive eavesdroppers (Eves). We take into account the fact that not all regions of an image have the same importance from the security perspective. Hence, we employ a hybrid method to realize both the error-free data delivery of public regions - containing less-important pixels; and an artificial noise (AN)-aided transmission scheme for securing the confidential packets. To reinforce system's security, fountain-based packet delivery is also adopted, where the source node...