- Advanced Steganography and Watermarking Techniques
- Energy Efficient Wireless Sensor Networks
- Chaos-based Image/Signal Encryption
- Advanced Data Compression Techniques
- ECG Monitoring and Analysis
- Digital Media Forensic Detection
- Wireless Body Area Networks
- Energy Harvesting in Wireless Networks
- Security in Wireless Sensor Networks
- Wireless Communication Security Techniques
- Cooperative Communication and Network Coding
- Image and Signal Denoising Methods
- Image Enhancement Techniques
- Internet Traffic Analysis and Secure E-voting
- Mobile Ad Hoc Networks
- Video Coding and Compression Technologies
- Indoor and Outdoor Localization Technologies
- IoT and Edge/Fog Computing
- EEG and Brain-Computer Interfaces
- Molecular Communication and Nanonetworks
- Advanced Wireless Communication Techniques
- Analog and Mixed-Signal Circuit Design
- Advanced Wireless Network Optimization
- Embedded Systems Design Techniques
- Digital Filter Design and Implementation
University of Nebraska–Lincoln
2012-2024
Merchants Chongqing Communications Research and Design Institute
2023
University of Massachusetts Dartmouth
2010
Southwest Jiaotong University
2004-2009
National Cheng Kung University
2008-2009
Chongqing University of Technology
2008
Lincoln University - Pennsylvania
2006-2007
Texas A&M University
2000-2001
Mitchell Institute
2000-2001
Frequency hopping (FH) sequences have found wide applications in various modern FH spread-spectrum communications and radar systems. In communications, the interference occurs when two distinct transmitters use same frequency simultaneously. order to evaluate goodness of sequence design, Hamming correlation function is used as an important measure. this correspondence, by considering separately maximum autocorrelation sidelobe H/sub a/, cross c/, several new lower bounds on size p slot set...
Real-time medical data about patients' physiological status can be collected simply by using wearable sensors based on a body sensor network. However, we lack an efficient, reliable, and secure BSN platform that meet increasing needs in e-healthcare applications. Many such applications require to support multiple rates with reliable energyefficient transmission. In this article propose resource-aware architecture enable real-time healthcare monitoring, especially for wireless...
Advances in wireless multimedia communication technologies enable new types of pervasive and ubiquitous applications such as mobile health care, environmental monitoring, facility monitoring traffic surveillance. Among different factors concerned, energy efficiency is one the most challenging issues due to resource constraints, requirements for high bandwidth low transmission delay. In this survey, we provide a broad picture state-of-the-art efficient techniques that have been proposed...
<para xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink"> <?Pub Dtl=""?>Image transmissions in Wireless Multimedia Sensor Networks (WMSNs) are often energy constrained. They also have requirement on distortion minimization, which may be achieved through Unequal Error Protection (UEP) based communication approaches. In related literature with regard to wireless multimedia transmissions, significantly different importance levels between...
Selective encryption for video streaming was proposed efficient multimedia content protection. However, the issues on joint optimization of quality, protection, and communication energy efficiency in a wireless sensor network (WSN) have not been fully addressed literature. In this paper, we propose scheme to optimize energy, distortion, performance WSNs. The contribution work is twofold. First, channel-aware selective approach minimize extra dependency overhead at application layer. Second,...
With the technological advancement in body area sensor networks (BASNs), low cost high quality electrocardiographic (ECG) diagnosis systems have become important equipment for healthcare service providers. However, energy consumption and data security with ECG BASNs are still two major challenges to tackle. In this study, we investigate properties of compressed saving as an effort devise a selective encryption mechanism two-rate unequal error protection (UEP) scheme. The proposed provides...
Wireless multimedia sensor networks (WMSNs) support many acoustic applications for audio surveillance, animal tracking/vocalization, human health monitoring, etc. However, resource constraints in (such as limited battery power, bandwidth/computation capability, etc.) pose challenges the quality and security of data transmission processing. The is a critical issue since information can be accessed or even manipulated WMSNs. In order to ensure security, energy efficiency, we propose an...
The blood circulation system in a human body provides unique and natural trust zone for secure data communications wireless healthcare systems such as area networks. Unfortunately, biometric signal authentication using physiological attributes has not been extensively studied. In this paper, we propose approach utilizing electrocardiography (ECG) patterns reducing key exchange overhead. major contribution of research is to apply stochastic pattern recognition techniques healthcare. the...
Distributed Source Coding (DSC) is an effective means in reducing data redundancy Wireless Sensor Networks (WSNs). However, the issues on designing multirate DSC with transmission WSNs have not been well addressed literature. In this paper, we propose a cross-layer approach to achieve optimal quality while assuring energy efficiency and latency requirement through adjusting dependencies network parameters jointly. Specifically, coding dependency among source sensors are fine-tuned balance...
The advancement in Distributed Source Coding (DSC) for mission-driven wireless sensor networks (WSNs) has opened a new vista its wide applications multiple correlated such as real time target tracking and environment monitoring. features of the DSC offer many potential opportunities to utilize multirate transmissions network performance enhancement. In this paper, we propose methodology cross-layer optimization between routing WSNs, introduce based scheme that can considerably extend...
Media integrity, transmission quality, and energy efficiency are critical for secure wireless image streaming in a multimedia sensor network (WMSN). However, conventional data authentication resource allocation schemes cannot be applied directly to WMSN due the constraints on limited computing resources. In this paper, we propose quality-driven scheme optimize stream unequal error protection (UEP) jointly. This can provide digital authentication, quality optimization, high WMSN. The...
Remote electrocardiogram (ECG) diagnosis with continuous real-time or near-real-time performance via a wireless wearable computing system would have significant value since it will enable on-time alerts and interventions, leading to life-saving outcomes. In this paper, novel integration of open-loop closed-loop switch modes is proposed, where the entire ECG process accomplished in three steps. First, R-peak detection algorithm for initial local devices executed, 100% transmission energy...
Distributed source coding (DSC) based signal processing applications involve data transmissions at multirates in wireless sensor network (WSN). In this paper, we propose a novel cross layer approach WSN to achieve energy efficiency using desirable for the DSC and current conditions. Our can be summarized into two parts: first, efficient multirate MAC-PHY supporting applications; second, rate oriented interaction of applications. Multirate utilizes bit error (BER), channel attenuation,...
Transmissions of large sized images can be a bottleneck for wireless sensor network (WSN) due to its limited resources. Security another concern. This paper proposes collaborative transmission scheme image sensors utilize inter-sensor correlations decide the and security sharing patterns based on path diversities. Our proposed approach secret multiple node-disjoint paths delivery is achieve high without any key distribution management, thus management related problems do not exist. The...
In this paper, we have investigated Covert Channels in 3GPP LTE-A (Long Term Evolution-Advanced) for identifying headers and extension fields where covert data can be hidden communications. We also discuss the channel capacity specific of MAC (Medium Access Control), RLC (Radio Link Control) PDCP (Packet Data Convergence Protocol) layers are analyzed. review different scenarios coding rate, modulation schemes bandwidths present our results.
Video steganography is fast emerging as a next-generation steganographic medium that offers many advantages over traditional cover media such audio and images. Various schemes have recently emerged which take advantage of video specific properties for information hiding, most notably through the use motion vectors. Although been proposed exploit several possible domains within sequences, few attacks to combat schemes, no current shown be capable defeating multiple at once. In this paper, we...
Resource allocation for multimedia selective encryption and energy efficient transmission has not been fully investigated in literature wireless sensor networks (WSNs). In this article, we propose a new cross-layer approach to optimize selectively encrypted image quality WSNs with strict constraint. A favorable unequal error protection (UEP) is proposed, which reduces overhead considerably by controlling the structure of bitstreams. Also, novel UEP scheme based on cipher-plain-text diversity...
A secure image transmission mechanism is necessary when malicious intruders intend to access and modify content delivery over wireless networks. To assure data integrity, authentication required for multimedia delivered sensor Watermarking technique an effective vehicle assert the authentications. There have been recent works reported on watermarking, but few with consideration of energy cost in terms communication processing, which a key constraint many embedded systems Most watermarking...
Abstract In this paper, we propose an innovative adaptive secure image delivery approach, to achieve effective and efficient encryption based on optimal transmission rate in terms of energy efficiency wireless sensor networks (WSN). Our contribution is three folds—First, the proposed component selective scheme achieves high security, while incurring little overhead; furthermore, best security effort within delay bound; finally, optimization improves efficiency, feeds back path capacity...
In this paper, we propose a novel local framing preschedule scheme to improve energy saving in CSMA/TDMA hybrid MAC layer of wireless sensor network. This combines CSMA and TDMA functionalities together, while obviates their shortcomings. Usually, such as ZMAC, all the receivers have perform low power listening time wait for in-coming data. Although can achieve by reducing idle some extent, it is much more beneficial with smartly turn off radio when receiver does not receive any By...
Signal processing applications such as Distributed Source Coding (DSC) in Wireless Sensor Network (WSN) are often multirate nature, which provide additional significant opportunities WSN design for achieving energy efficiency. In this paper, we analyze the DSC traffic signal and propose a novel rate oriented approach with MAC PHY cross layer utilization to achieve high Simulation results show that proposed achieves efficiency by factor of three while maintaining transmission quality WSN....
In Wireless Multimedia Sensor Networks (WMSNs), low cost Complementary Metal Oxide Semiconductor (CMOS) camera sensors may only produce resolution images due to hardware limitations. However, super-resolution be constructed from these in a multiple sensor network, improving object pattern recognition success rates. There is critical image challenge reconstructed for accuracy, complexity and limited energy resource wireless networks. Artificial Immune Systems (AIS), particular those...
Digital steganography is often divided into two categories of research: steganographer and attacker, where a attempts to successfully hide the existence hidden data an attacker uncover destroy said data. Often steganographic attacks utilize passive techniques, monitors messages alters or destroys cover media only if suspected contain message. Passive are much more prevalent than active for variety reasons. Generally efficient effective in determining given media, however, most not generic...
Modern covert channel communication is the art of hiding secret information in legitimate network traffic a way that cannot normally be detected by anyone other than intended receiver. It growing its presence and sophistication. This type enables distribution malicious or sensitive poses significant security problem to individuals, organizations, governments. One popular method RTP streams transmission one more packets after significantly delaying them. As result, any normal receiver will...
QR codes have become increasingly integrated with blockchain-based digital supply chain management systems. The immutable and decentralized nature of a system improves transparency among stakeholders. However, there remains the issue counterfeiting codes, as hash counterfeit copied or reprinted code is same original. To bridge this security gap, we take advantage fact that at microscopic level, clear differences exist between authentic copies. printing process level reveals consistent traces...