Energy-Constrained Quality Optimization for Secure Image Transmission in Wireless Sensor Networks

被引:11
作者
Wang, Wei [1 ]
Peng, Dongming [1 ]
Wang, Honggang [1 ]
Sharif, Hamid [1 ]
Chen, Hsiao-Hwa [2 ]
机构
[1] Univ Nebraska Lincoln, Fac Comp & Elect Engn, Omaha, NE 68182 USA
[2] Natl Sun Yat Sen Univ, Inst Commun Engn, Kaohsiung 804, Taiwan
关键词
D O I
10.1155/2007/25187
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Resource allocation for multimedia selective encryption and energy efficient transmission has not been fully investigated in literature for wireless sensor networks (WSNs). In this article, we propose a new cross-layer approach to optimize selectively encrypted image transmission quality in WSNs with strict energy constraint. A new selective image encryption approach favorable for unequal error protection (UEP) is proposed, which reduces encryption overhead considerably by controlling the structure of image bitstreams. Also, a novel cross-layer UEP scheme based on cipher-plain-text diversity is studied. In this UEP scheme, resources are unequally and optimally allocated in the encrypted bitstream structure, including data position information and magnitude value information. Simulation studies demonstrate that the proposed approach can simultaneously achieve improved image quality and assured energy efficiency with secure transmissions over WSNs. Copyright (C) 2007 Wei Wang et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
引用
收藏
页数:9
相关论文
共 25 条
[1]   Partial encryption of compressed images and videos [J].
Cheng, H ;
Li, XB .
IEEE TRANSACTIONS ON SIGNAL PROCESSING, 2000, 48 (08) :2439-2451
[2]  
Cormen T. H., 2001, INTRO ALGORITHMS, P881
[3]   Multimedia selective encryption by means of randomized arithmetic coding [J].
Grangetto, Marco ;
Magli, Enrico ;
Olmo, Gabriella .
IEEE TRANSACTIONS ON MULTIMEDIA, 2006, 8 (05) :905-917
[4]   Optimized error protection of scalable image bit streams [J].
Hamzaoui, R ;
Stankovic, V ;
Xiong, ZX .
IEEE SIGNAL PROCESSING MAGAZINE, 2005, 22 (06) :91-107
[5]  
Haykin S., 1994, COMMUNICATION SYSTEM
[6]   Compressed-domain scrambler/descrambler for digital video [J].
Kankanhalli, MS ;
Guan, TT .
IEEE TRANSACTIONS ON CONSUMER ELECTRONICS, 2002, 48 (02) :356-365
[7]   The advantages of elliptic curve cryptography for wireless security [J].
Lauter, K .
IEEE WIRELESS COMMUNICATIONS, 2004, 11 (01) :62-67
[8]  
Lei Tang, 1996, Proceedings ACM Multimedia 96, P219, DOI 10.1145/244130.244209
[9]   Providing adaptive QoS to layered video over wireless local area networks through real-time retry limit adaptation [J].
Li, Q ;
van der Schaar, M .
IEEE TRANSACTIONS ON MULTIMEDIA, 2004, 6 (02) :278-290
[10]   Selective encryption for consumer applications [J].
Lookabaugh, T ;
Sicker, DC .
IEEE COMMUNICATIONS MAGAZINE, 2004, 42 (05) :124-129