Comprehensive Review: Recent Advancements in Wireless Communication
VerifiedAdded on  2023/06/04
|7
|1254
|351
Literature Review
AI Summary
This assignment presents a literature review of several articles focusing on wireless communication and network security. The reviewed articles cover topics such as biometric key generation using facial features, noise-resistant symmetric key cryptosystems based on chaotic maps, robust watermarking schemes for online multimedia copyright protection, construction of chaotic quantum magnets and matrix Lorenz systems S-boxes, and novel algorithms for thermal image encryption. Each article's summary and critique are provided, highlighting the security implications and advancements in encryption techniques. The review emphasizes the importance of security in wireless communication, especially concerning digital media copyright and thermal image protection, and points out the relevance of chaotic maps and encryption algorithms in enhancing data security. Desklib provides access to this and other solved assignments for students.

Running head: WIRELESS COMMUNICATION AND NETWORK
WIRELESS COMMUNICATION AND NETWORK
Name of the Student
Name of the University
Author Note
WIRELESS COMMUNICATION AND NETWORK
Name of the Student
Name of the University
Author Note
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

2WIRELESS COMMUNICATION AND NETWORK
Table of Contents
Article 6...........................................................................................................................................3
Article 7...........................................................................................................................................3
Article 8...........................................................................................................................................3
Article 9...........................................................................................................................................4
Article 10.........................................................................................................................................4
Bibliography....................................................................................................................................6
Table of Contents
Article 6...........................................................................................................................................3
Article 7...........................................................................................................................................3
Article 8...........................................................................................................................................3
Article 9...........................................................................................................................................4
Article 10.........................................................................................................................................4
Bibliography....................................................................................................................................6

3WIRELESS COMMUNICATION AND NETWORK
Article 6
Anees, A., & Chen, Y. P. P. (2018). Discriminative binary feature learning and quantization in
biometric key generation. Pattern Recognition, 77, 289-305.
Summary
The concept which is related to the biometric key generation can be considered by far
more complex technology than face recognition technology. The main problem which is seen in
the sector of the working is related to no relevant information are saved in the concept of the
database for the aspect of matching features of facial in the system of key generation. The paper
directly takes into consideration a method which has a unified framework for stable generation,
secure cryptography based on the concept of facial features.
Critique
It can be stated here that the author directly puts focus on the different security
implication which can be put in the sector of the face recognition technology. On the other
authors have stated that there are security implementations which can be involved into the
working of the concept. The main concept is the delivering of the standard of working which
includes security implications which can safeguard the system.
Article 7
Hussain, I., Anees, A., Aslam, M., Ahmed, R., & Siddiqui, N. (2018). A noise resistant
symmetric key cryptosystem based on S 8 S-boxes and chaotic maps. The European Physical
Journal Plus, 133, 1-23.
Summary
Article 6
Anees, A., & Chen, Y. P. P. (2018). Discriminative binary feature learning and quantization in
biometric key generation. Pattern Recognition, 77, 289-305.
Summary
The concept which is related to the biometric key generation can be considered by far
more complex technology than face recognition technology. The main problem which is seen in
the sector of the working is related to no relevant information are saved in the concept of the
database for the aspect of matching features of facial in the system of key generation. The paper
directly takes into consideration a method which has a unified framework for stable generation,
secure cryptography based on the concept of facial features.
Critique
It can be stated here that the author directly puts focus on the different security
implication which can be put in the sector of the face recognition technology. On the other
authors have stated that there are security implementations which can be involved into the
working of the concept. The main concept is the delivering of the standard of working which
includes security implications which can safeguard the system.
Article 7
Hussain, I., Anees, A., Aslam, M., Ahmed, R., & Siddiqui, N. (2018). A noise resistant
symmetric key cryptosystem based on S 8 S-boxes and chaotic maps. The European Physical
Journal Plus, 133, 1-23.
Summary
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

4WIRELESS COMMUNICATION AND NETWORK
The main approach which is seen in the paper is related to the concept of generation of an
algorithm which is encrypted. The concept can be used in the sector of encrypting any data in the
concept. The algorithm which is proposed in the concept is based on the approach of substitution
permutation in which the process of substitution.
Critique
As compared to other algorithm it can be stated that the proposed system can be
considered to be very much secured. The data which is seen in the sector can be very much be
secured with the working of the concept. There are many other algorithms which can be stated in
the context of the working but according to the most of the research it can be stated that
enhancement of the security can be considered to be very much important.
Article 8
Anees, A., Hussain, I., Algarni, A., & Aslam, M. (2018). A Robust Watermarking Scheme for
Online Multimedia Copyright Protection Using New Chaotic Map. Security and Communication
Networks, 2018.
Summary
The article mainly focusses on the aspect of the protection of copyright relating to the
digital media to the concept of the internet. This concept can be stated as one of the problem in
the sector of the working. The main focus point of the report can be stated to be a unified
framework relating to the detecting and the embedding watermark in the data which is digital.
Critique
The main approach which is seen in the paper is related to the concept of generation of an
algorithm which is encrypted. The concept can be used in the sector of encrypting any data in the
concept. The algorithm which is proposed in the concept is based on the approach of substitution
permutation in which the process of substitution.
Critique
As compared to other algorithm it can be stated that the proposed system can be
considered to be very much secured. The data which is seen in the sector can be very much be
secured with the working of the concept. There are many other algorithms which can be stated in
the context of the working but according to the most of the research it can be stated that
enhancement of the security can be considered to be very much important.
Article 8
Anees, A., Hussain, I., Algarni, A., & Aslam, M. (2018). A Robust Watermarking Scheme for
Online Multimedia Copyright Protection Using New Chaotic Map. Security and Communication
Networks, 2018.
Summary
The article mainly focusses on the aspect of the protection of copyright relating to the
digital media to the concept of the internet. This concept can be stated as one of the problem in
the sector of the working. The main focus point of the report can be stated to be a unified
framework relating to the detecting and the embedding watermark in the data which is digital.
Critique
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

5WIRELESS COMMUNICATION AND NETWORK
Comparing to other factors it can be stated that extended logistic map can be directly
used in the sector of the securing the communication. The check which is related to the
robustness of the proposed scheme of watermarking can be stated to be one of the secured
concept. This is mainly taken into consideration by means of generating standard attacks and
series of analysis.
Article 9
Hussain, I., Anees, A., AlKhaldi, A. H., Algarni, A., & Aslam, M. (2018). Construction of
chaotic quantum magnets and matrix Lorenz systems S-boxes and their applications. Chinese
Journal of Physics.
Summary
The main concept which is related to the paper can be related to the connection which is
generated in the sector of the cryptographic cipher and physics. It can be considered from the
paper that the concept of the cryptographic is one of the most popular topic in the field of
research which can be focused. In this concept it can be stated that topic of quantum magnets and
Lorenz matrix system in recent times is evolving in the different areas of research.
Critique
According to the research it can be stated that in the concept of the cryptography some of
the technique of encryption is very much important in the sector of the utilization of the different
areas of access of the data. The encryption algorithm can be stated to be based on the concept of
the substitution purpose by iteration of the special kind of process relating to the cipher images.
Comparing to other factors it can be stated that extended logistic map can be directly
used in the sector of the securing the communication. The check which is related to the
robustness of the proposed scheme of watermarking can be stated to be one of the secured
concept. This is mainly taken into consideration by means of generating standard attacks and
series of analysis.
Article 9
Hussain, I., Anees, A., AlKhaldi, A. H., Algarni, A., & Aslam, M. (2018). Construction of
chaotic quantum magnets and matrix Lorenz systems S-boxes and their applications. Chinese
Journal of Physics.
Summary
The main concept which is related to the paper can be related to the connection which is
generated in the sector of the cryptographic cipher and physics. It can be considered from the
paper that the concept of the cryptographic is one of the most popular topic in the field of
research which can be focused. In this concept it can be stated that topic of quantum magnets and
Lorenz matrix system in recent times is evolving in the different areas of research.
Critique
According to the research it can be stated that in the concept of the cryptography some of
the technique of encryption is very much important in the sector of the utilization of the different
areas of access of the data. The encryption algorithm can be stated to be based on the concept of
the substitution purpose by iteration of the special kind of process relating to the cipher images.

6WIRELESS COMMUNICATION AND NETWORK
Article 10
Hussain, I., Anees, A., & Algarni, A. (2018). A novel algorithm for thermal image
encryption. Journal of integrative neuroscience, (Preprint), 1-15.
Summary
In the paper it is stated that thermal images can be stated to be playing a very vital role in
the sector of the nuclear plant, power station. In the working, the security aspect can be
considered to be very much important. Due to the sector of the growth of the relating to the
information and the communication technology there are a wide range of path relating to the
communication.
Critique
The papers main focus which directly discriminates it from other paper is that it directly
gives an overview of the concept of the images which have some unique features for example
homogeneity, contrast, intensity and correlation. These features can be stated to be very much
important in the sector of the working of the concept which would be directly enhancing the
security of the image when it is processed.
Article 10
Hussain, I., Anees, A., & Algarni, A. (2018). A novel algorithm for thermal image
encryption. Journal of integrative neuroscience, (Preprint), 1-15.
Summary
In the paper it is stated that thermal images can be stated to be playing a very vital role in
the sector of the nuclear plant, power station. In the working, the security aspect can be
considered to be very much important. Due to the sector of the growth of the relating to the
information and the communication technology there are a wide range of path relating to the
communication.
Critique
The papers main focus which directly discriminates it from other paper is that it directly
gives an overview of the concept of the images which have some unique features for example
homogeneity, contrast, intensity and correlation. These features can be stated to be very much
important in the sector of the working of the concept which would be directly enhancing the
security of the image when it is processed.
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

7WIRELESS COMMUNICATION AND NETWORK
Bibliography
Anees, A., & Chen, Y. P. P. (2018). Discriminative binary feature learning and quantization in
biometric key generation. Pattern Recognition, 77, 289-305.
Anees, A., Hussain, I., Algarni, A., & Aslam, M. (2018). A Robust Watermarking Scheme for
Online Multimedia Copyright Protection Using New Chaotic Map. Security and
Communication Networks, 2018.
Hussain, I., Anees, A., & Algarni, A. (2018). A novel algorithm for thermal image
encryption. Journal of integrative neuroscience, (Preprint), 1-15.
Hussain, I., Anees, A., AlKhaldi, A. H., Algarni, A., & Aslam, M. (2018). Construction of
chaotic quantum magnets and matrix Lorenz systems S-boxes and their
applications. Chinese Journal of Physics.
Hussain, I., Anees, A., Aslam, M., Ahmed, R., & Siddiqui, N. (2018). A noise resistant
symmetric key cryptosystem based on S 8 S-boxes and chaotic maps. The European
Physical Journal Plus, 133, 1-23.
Bibliography
Anees, A., & Chen, Y. P. P. (2018). Discriminative binary feature learning and quantization in
biometric key generation. Pattern Recognition, 77, 289-305.
Anees, A., Hussain, I., Algarni, A., & Aslam, M. (2018). A Robust Watermarking Scheme for
Online Multimedia Copyright Protection Using New Chaotic Map. Security and
Communication Networks, 2018.
Hussain, I., Anees, A., & Algarni, A. (2018). A novel algorithm for thermal image
encryption. Journal of integrative neuroscience, (Preprint), 1-15.
Hussain, I., Anees, A., AlKhaldi, A. H., Algarni, A., & Aslam, M. (2018). Construction of
chaotic quantum magnets and matrix Lorenz systems S-boxes and their
applications. Chinese Journal of Physics.
Hussain, I., Anees, A., Aslam, M., Ahmed, R., & Siddiqui, N. (2018). A noise resistant
symmetric key cryptosystem based on S 8 S-boxes and chaotic maps. The European
Physical Journal Plus, 133, 1-23.
1 out of 7
Related Documents

Your All-in-One AI-Powered Toolkit for Academic Success.
 +13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
Copyright © 2020–2025 A2Z Services. All Rights Reserved. Developed and managed by ZUCOL.