This article discusses various research papers related to wireless communication and network. It includes a summary and critique of each paper. The subject is related to the field of cryptography, biometric key generation, and watermarking schemes. The course codes, names, and universities are not mentioned.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
Running head: WIRELESS COMMUNICATION AND NETWORK WIRELESS COMMUNICATION AND NETWORK Name of the Student Name of the University Author Note
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
2WIRELESS COMMUNICATION AND NETWORK Table of Contents Article 6...........................................................................................................................................3 Article 7...........................................................................................................................................3 Article 8...........................................................................................................................................3 Article 9...........................................................................................................................................4 Article 10.........................................................................................................................................4 Bibliography....................................................................................................................................6
3WIRELESS COMMUNICATION AND NETWORK Article 6 Anees, A., & Chen, Y. P. P. (2018). Discriminative binary feature learning and quantization in biometric key generation.Pattern Recognition,77, 289-305. Summary The concept which is related to the biometric key generation can be considered by far more complex technology than face recognition technology. The main problem which is seen in the sector of the working is related to no relevant information are saved in the concept of the database for the aspect of matching features of facial in the system of key generation. The paper directly takes into consideration a method which has a unified framework for stable generation, secure cryptography based on the concept of facial features. Critique It can be stated here that the author directly puts focus on the different security implication which can be put in the sector of the face recognition technology. On the other authors have stated that there are security implementations which can be involved into the working of the concept. The main concept is the delivering of the standard of working which includes security implications which can safeguard the system. Article 7 Hussain, I., Anees, A., Aslam, M., Ahmed, R., & Siddiqui, N. (2018). A noise resistant symmetric key cryptosystem based on S 8 S-boxes and chaotic maps.The European Physical Journal Plus,133, 1-23. Summary
4WIRELESS COMMUNICATION AND NETWORK The main approach which is seen in the paper is related to the concept of generation of an algorithm which is encrypted. The concept can be used in the sector of encrypting any data in the concept. The algorithm which is proposed in the concept is based on the approach of substitution permutation in which the process of substitution. Critique As compared to other algorithm it can be stated that the proposed system can be considered to be very much secured. The data which is seen in the sector can be very much be secured with the working of the concept. There are many other algorithms which can be stated in the context of the working but according to the most of the research it can be stated that enhancement of the security can be considered to be very much important. Article 8 Anees, A., Hussain, I., Algarni, A., & Aslam, M. (2018). A Robust Watermarking Scheme for Online Multimedia Copyright Protection Using New Chaotic Map.Security and Communication Networks,2018. Summary The article mainly focusses on the aspect of the protection of copyright relating to the digital media to the concept of the internet. This concept can be stated as one of the problem in the sector of the working. The main focus point of the report can be stated to be a unified framework relating to the detecting and the embedding watermark in the data which is digital. Critique
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
5WIRELESS COMMUNICATION AND NETWORK Comparing to other factors it can be stated that extended logistic map can be directly used in the sector of the securing the communication. The check which is related to the robustness of the proposed scheme of watermarking can be stated to be one of the secured concept. This is mainly taken into consideration by means of generating standard attacks and series of analysis. Article 9 Hussain, I., Anees, A., AlKhaldi, A. H., Algarni, A., & Aslam, M. (2018). Construction of chaotic quantum magnets and matrix Lorenz systems S-boxes and their applications.Chinese Journal of Physics. Summary The main concept which is related to the paper can be related to the connection which is generated in the sector of the cryptographic cipher and physics. It can be considered from the paper that the concept of the cryptographic is one of the most popular topic in the field of research which can be focused. In this concept it can be stated that topic of quantum magnets and Lorenz matrix system in recent times is evolving in the different areas of research. Critique According to the research it can be stated that in the concept of the cryptography some of the technique of encryption is very much important in the sector of the utilization of the different areas of access of the data. The encryption algorithm can be stated to be based on the concept of the substitution purpose by iteration of the special kind of process relating to the cipher images.
6WIRELESS COMMUNICATION AND NETWORK Article 10 Hussain,I.,Anees,A.,&Algarni,A.(2018).Anovelalgorithmforthermalimage encryption.Journal of integrative neuroscience, (Preprint), 1-15. Summary In the paper it is stated that thermal images can be stated to be playing a very vital role in the sector of the nuclear plant, power station. In the working, the security aspect can be considered to be very much important. Due to the sector of the growth of the relating to the information and the communication technology there are a wide range of path relating to the communication. Critique The papers main focus which directly discriminates it from other paper is that it directly gives an overview of the concept of the images which have some unique features for example homogeneity, contrast, intensity and correlation. These features can be stated to be very much important in the sector of the working of the concept which would be directly enhancing the security of the image when it is processed.
7WIRELESS COMMUNICATION AND NETWORK Bibliography Anees, A., & Chen, Y. P. P. (2018). Discriminative binary feature learning and quantization in biometric key generation.Pattern Recognition,77, 289-305. Anees, A., Hussain, I., Algarni, A., & Aslam, M. (2018). A Robust Watermarking Scheme for OnlineMultimediaCopyrightProtectionUsingNewChaoticMap.Securityand Communication Networks,2018. Hussain,I.,Anees,A.,&Algarni,A.(2018).Anovelalgorithmforthermalimage encryption.Journal of integrative neuroscience, (Preprint), 1-15. Hussain, I., Anees, A., AlKhaldi, A. H., Algarni, A., & Aslam, M. (2018). Construction of chaoticquantummagnetsandmatrixLorenzsystemsS-boxesandtheir applications.Chinese Journal of Physics. Hussain, I., Anees, A., Aslam, M., Ahmed, R., & Siddiqui, N. (2018). A noise resistant symmetric key cryptosystem based on S 8 S-boxes and chaotic maps.The European Physical Journal Plus,133, 1-23.