This paper investigates the image communications in two-hop wireless relay networks (TH-WRNs) where a source node sends images to a destination node with the assistance of a relay node via two hops, i.e. source-to-relay and relay-to-destination links. Due to the broadcast nature of wireless media, there exists an eavesdropper who tries to overhear and recover the images. Aiming to enhance the security and also to save transmission bandwidth of the image communications, we propose a secure relaying transmission (SRT) protocol by exploiting both random linear network coding (RLNC) and image super-resolution (ISR) techniques. In the proposed protocol, the original high-resolution (HR) images are downscaled at the source node and the RLNC is em...
<p> This article examines secrecy coding aided wireless communications from a source to a destinati...
In this work, a dual-hop cooperative system, in which there are a Source-Destination (S-D) pair, a r...
This paper investigates a new secure relaying scheme, namely physical layer network coding based mod...
The image transmission over wireless media experiences not only unavailable performance loss caused ...
Visual communications have played an important part in our daily life as a non-verbal way of conveyi...
Images play an important part in our daily life. They convey our personal stories and maintain meani...
Opportunistic relaying has the potential to achieve full diversity gain, while random linear network...
In this paper, we consider communication on a two-hop channel in which a source wants to send inform...
This paper investigates the security at the physical layer in cooperative wireless networks (CWNs) w...
This paper investigates the security at the physical layer of cooperative relay communications. Insp...
We investigate physical layer security design, which employs random linear network coding with oppor...
In this paper, we quantify the physical layer security of a dual-hop regenerative relaying-based wir...
This paper studies the design and secrecy performance of linear multihop networks, in the presence ...
This article examines secrecy coding aided wireless communications from a source to a destination in...
Wireless sensor networks (WSNs) have up until now faced many challenges because of their open, wide-...
<p> This article examines secrecy coding aided wireless communications from a source to a destinati...
In this work, a dual-hop cooperative system, in which there are a Source-Destination (S-D) pair, a r...
This paper investigates a new secure relaying scheme, namely physical layer network coding based mod...
The image transmission over wireless media experiences not only unavailable performance loss caused ...
Visual communications have played an important part in our daily life as a non-verbal way of conveyi...
Images play an important part in our daily life. They convey our personal stories and maintain meani...
Opportunistic relaying has the potential to achieve full diversity gain, while random linear network...
In this paper, we consider communication on a two-hop channel in which a source wants to send inform...
This paper investigates the security at the physical layer in cooperative wireless networks (CWNs) w...
This paper investigates the security at the physical layer of cooperative relay communications. Insp...
We investigate physical layer security design, which employs random linear network coding with oppor...
In this paper, we quantify the physical layer security of a dual-hop regenerative relaying-based wir...
This paper studies the design and secrecy performance of linear multihop networks, in the presence ...
This article examines secrecy coding aided wireless communications from a source to a destination in...
Wireless sensor networks (WSNs) have up until now faced many challenges because of their open, wide-...
<p> This article examines secrecy coding aided wireless communications from a source to a destinati...
In this work, a dual-hop cooperative system, in which there are a Source-Destination (S-D) pair, a r...
This paper investigates a new secure relaying scheme, namely physical layer network coding based mod...