Efficient Transmission of Watermarked Images with SC-FDMA | ||||
Menoufia Journal of Electronic Engineering Research | ||||
Article 3, Volume 30, Issue 2, July 2021, Page 17-27 PDF (661.14 K) | ||||
Document Type: Original Article | ||||
DOI: 10.21608/mjeer.2021.193082 | ||||
![]() | ||||
Authors | ||||
Fatma. Fadl Allah ![]() | ||||
1Dept. of Electronics and Communication Engineering, Faculty of Engineeing, Zagazig University, Zagazig, Egypt | ||||
2Communications and Electronics Department Faculty of Electronic Engineering,Manoufia University: Menouf, Egypt | ||||
3Dept. of Communications, Faculty of Electronic Engineeing, Menofia University, Menouf, Egypt | ||||
Abstract | ||||
This paper studies the transmission of watermarked images on wireless SC-FDMA systems. Different watermarking schemes are provided in this frame work for security and authentication purposes.SC-FDMA is accomplished for broadband wireless communications, for its advantages of low PAPR and low sensitivity to carrier frequency offsets. The SC-FDMA system is used for communication as it is the uplink standard in coefficient mobile communication system. In this paper, two types of equalizers(MMSE and ZF) is used to mitigate the effect of channel fading and noise at different subcarriers mapping schemes(localized and distributed).Watermark extraction is performed at the receiver and an evaluation process for the quality of extracted watermarks is performed. Simulation experiments were established in MATLAB program R2014a version. Simulation results approved that the interleaved system provides better performance than that of the localized systems. In addition the system performance has better enhancement when using the ZF equalizer than the MMSE equalizer. The quality of the received of extracted watermarks is investigated with different metrics like PSNR, correlation coefficient (Cr) , SSIM and the histogram . Simulation results also demonstrate an efficient of image clarity at extraction process. | ||||
Highlights | ||||
In this paper, the image watermarking performances | ||||
Keywords | ||||
SC-FDMA; Image Water marking; DCT; DWT | ||||
Full Text | ||||
By the quick growth of computer network in the latest years we can process digital contents and access to various digital media easily. Therefore media security became a highly important issue [1].Image watermarking is the process of embedding some useful information inside images for the purpose of security and authentication of the source. Different algorithms of digital image watermarking have been developed. In this paper, two different techniques of digital image watermarking have been used, DCT and DWT. 1 8 | ||||
References | ||||
References [1] Y. Shouyiand M. Xiaommi, “Performance Analysis of Digital Watermarking Through OFDM Channels,” IEEE International Symposium on Microwave, Antenna, Propagation and EMC Technologies for Wireless Communications Proceedings, 2005. [2] M. A. Abd El-Hamed, M. I. Dessouky, F. Shawki, M. K. Ibrahim, S.El-Rabaieand F. E. Abd El-Samie, “Wavelet-Based SC-FDMA System,” 29th National Radio Science Conference(NRSC 2012)April 10 -12, 2012, Faculty of Engineering/Cairo University, Egypt. [3] A. Akter and M. AhsanUllah, “Digital Watermarking With A New Algorithm,” IJRET: International Journal of Research in Engineering and Technology, eISSN: 2319-1163 | pISSN: 2321-7308 , Volume: 03 Issue: 03 | Mar-2014. [4] S. A. S. Abdelwahab, “Robust Watermarking Algorithms for Content Authentication and Secure ImageTransmission through Single Carrier Frequency DivisionMultiple Access,”Information Technology & Electrical Engineering,Volume 3, Issue1, ISSN: - 2306-708X, February 2014. [5] A. Elbehery, S. A. S. Abdelwahab, M. Abd EL Naby, E.S. Hassan, S. Elaraby, “Efficient Image Transmission Over the Single Carrier Frequency Division MultipleAccess System Using Chaotic Interleaving,” 29th National RadioScienceConference(NRSC 2012) , Faculty of Engineering/Cairo University, Egypt,April 10 -12, 2012. [6] F. S. Al-Kamali, A. A. Qasem, S. A. Abuasbaa, G. A. Qasem, “SCFDMA and OFDMA: An Efficient WirelessImage Transmission Schemes,” Journal of Control and Systems Engineering 2016, Vol. 4 Iss. 1, PP. 74-83 [7] F. E. Abd El-Samie, F. S. Al-kamali, A.Y. Al-nahari, M. I. Dessouky, “SC -FDMA for Mobile Communications,” Taylor and Francis Group, LLC, 2010. [8] P.Parashar and R. K. Singh, “A Survey: Digital Image Watermarking Techniques,”International Journal of Signal Processing, Image Processing and Pattern Recognition Vol. 7, No. 6 (2014) [9] P. Dabas and K. Khanna, “A Study on Spatial and Transform DomainWatermarking Techniques,” International Journal of Computer Applications (0975 – 8887),Volume 71– No.14, May 2013. [10] A. K.Jain, “Fundamentals of Digital Image Processing, Englewood Cliffs, NJ, Prentice Hall”, 1989, pp. 150-153. [11] M. A. M. El-Bendary, “FEC merged with double security approach based on encrypted image steganography for different purpose in the presence of noise and different attacks,” Springer Science+BusinessMedia New York 2017. [12] P. Ndajah, H. Kikuchi, M. Yukawa,H. Watanabe and S.Muramatsu, “SSIM Image Quality Metric ForDenoised Images,” Advances In Visualization, Imaging and Simulation, ISSN: 1792-6130, September, 2010. [13] A. N. Patel and D. J. Shah, “SSIM based image quality assessment for vector quantization based lossy image compression using LZW coding,” University Journal of Research Vol. 01, Issue 01 (2015). | ||||
Statistics Article View: 256 PDF Download: 215 |
||||