2019
DOI: 10.1016/j.optcom.2018.09.045
|View full text |Cite
|
Sign up to set email alerts
|

Encrypted image transmission in OFDM-based VLC systems using symbol scrambling and chaotic DFT precoding

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
12
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
6

Relationship

0
6

Authors

Journals

citations
Cited by 11 publications
(12 citation statements)
references
References 28 publications
0
12
0
Order By: Relevance
“…5, to detect the current OFDM frame S ( ), with index th , Eavesdropper requires to detect the previous OFDM frame S −1 ( ), with index ( − 1) th , to generate − which was employed to encrypt and spread the current OFDM frame S ( ), accordingly, the complete historical OFDM signals are required to detect the subsequent signal. Unlike the methods in [33]- [37], where they provide static chaotic keys with statistical characteristics that are helpful for the malicious nodes, our method provides dynamic cypher keys, associated with the random input data, that can destroy this type of (23) statistics, therefore our method supports high security against statistical attacks.…”
Section: System Designmentioning
confidence: 99%
See 4 more Smart Citations
“…5, to detect the current OFDM frame S ( ), with index th , Eavesdropper requires to detect the previous OFDM frame S −1 ( ), with index ( − 1) th , to generate − which was employed to encrypt and spread the current OFDM frame S ( ), accordingly, the complete historical OFDM signals are required to detect the subsequent signal. Unlike the methods in [33]- [37], where they provide static chaotic keys with statistical characteristics that are helpful for the malicious nodes, our method provides dynamic cypher keys, associated with the random input data, that can destroy this type of (23) statistics, therefore our method supports high security against statistical attacks.…”
Section: System Designmentioning
confidence: 99%
“…Despite the confidentiality support, these techniques need to estimate the channel or physical position of the eavesdropper throughout communication, which involves an elaborate implementation. In [25]- [37], authors proposed secret key-based security techniques to enhance the confidentiality of VLC networks. These techniques provide computational security and have lower complexity when compared with keyless security techniques.…”
Section: Introductionmentioning
confidence: 99%
See 3 more Smart Citations