• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    A Hybrid Cybersecurity Algorithm for Digital Image Transmission over Advanced Communication Channel Models

    2024-05-25 14:39:06NaglaaSolimanFatmaFadlAllahWalidElShafaiMahmoudAlyMaaliAlabdulhafithandFathiAbdElSamie
    Computers Materials&Continua 2024年4期

    Naglaa F.Soliman ,Fatma E.Fadl-Allah ,Walid El-Shafai ,Mahmoud I.Aly ,Maali Alabdulhafith and Fathi E.Abd El-Samie

    1Department of Information Technology,College of Computer and Information Sciences,Princess Nourah bint Abdulrahman University,P.O.Box 84428,Riyadh,11671,Saudi Arabia

    2Department of Electronics and Communications,Faculty of Engineering,Zagazig University,Zagazig,44519,Egypt

    3Security Engineering Lab,Computer Science Department,Prince Sultan University,Riyadh,11586,Saudi Arabia

    4Department of Electronics and Electrical Communications Engineering,Faculty of Electronic Engineering,Menoufia University,Menouf,32952,Egypt

    ABSTRACT The efficient transmission of images,which plays a large role in wireless communication systems,poses a significant challenge in the growth of multimedia technology.High-quality images require well-tuned communication standards.The Single Carrier Frequency Division Multiple Access(SC-FDMA)is adopted for broadband wireless communications,because of its low sensitivity to carrier frequency offsets and low Peak-to-Average Power Ratio(PAPR).Data transmission through open-channel networks requires much concentration on security,reliability,and integrity.The data need a space away from unauthorized access,modification,or deletion.These requirements are to be fulfilled by digital image watermarking and encryption.This paper is mainly concerned with secure image communication over the wireless SC-FDMA system as an adopted communication standard.It introduces a robust image communication framework over SC-FDMA that comprises digital image watermarking and encryption to improve image security,while maintaining a high-quality reconstruction of images at the receiver side.The proposed framework allows image watermarking based on the Discrete Cosine Transform(DCT)merged with the Singular Value Decomposition (SVD) in the so-called DCT-SVD watermarking.In addition,image encryption is implemented based on chaos and DNA encoding.The encrypted watermarked images are then transmitted through the wireless SC-FDMA system.The linear Minimum Mean Square Error(MMSE)equalizer is investigated in this paper to mitigate the effect of channel fading and noise on the transmitted images.Two subcarrier mapping schemes,namely localized and interleaved schemes,are compared in this paper.The study depends on different channel models,namely Pedestrian A and Vehicular A,with a modulation technique named Quadrature Amplitude Modulation (QAM).Extensive simulation experiments are conducted and introduced in this paper for efficient transmission of encrypted watermarked images.In addition,different variants of SC-FDMA based on the Discrete Wavelet Transform(DWT),Discrete Cosine Transform(DCT),and Fast Fourier Transform(FFT)are considered and compared for the image communication task.The simulation results and comparison demonstrate clearly that DWT-SC-FDMA is better suited to the transmission of the digital images in the case of Pedestrian A channels,while the DCT-SC-FDMA is better suited to the transmission of the digital images in the case of Vehicular A channels.

    KEYWORDS Cybersecurity applications;image transmission;channel models;modulation techniques;watermarking and encryption

    1 Introduction

    Wireless image transmission is widely employed in many different applications in our lives such as remote sensing via satellite,nuclear medicine,telemedicine,teleconferencing,broadcast television,and accessing Internet services on mobile phones.Therefore,the increasing demands for wireless image transmission have recently attracted the attention of a lot of researchers.Hence,much research work and studies have been done to develop numerous techniques for image transmission over wireless noisy channels.These techniques are improved from one generation to another[1].One of the most recent techniques that were developed is the Single Carrier Frequency Division Multiple Access(SC-FDMA)[2,3].

    Since the Internet has grown in popularity,and individuals can share whatever they want to share like images,videos,documents,etc.,there has been a need to preserve publishing copyright.Additionally,there has been a high demand for information security.For these and other reasons,digital image watermarking has gained a large popularity in recent years as a good solution in such cases.Much researchers have worked in this field to create new techniques,and to improve existing procedures as proper solutions for the above-mentioned problems[4].To increase the security to some extent,sometimes an encryption procedure is also used along with a watermarking algorithm.The combination of digital watermarking and encryption techniques can be used to achieve a higher degree of security.

    In the contemporary era,the surge in multimedia applications and smart devices has exponentially amplified the demand for efficient transmission of digital images.As image transmission constitutes a substantial portion of wireless communication systems,it has become imperative to ensure that communication standards are optimized for high-quality image transmission.However,while the technical specifications are being advanced,it has become increasingly evident that security cannot be sidelined.Recent statistics indicate that nearly 95% of multimedia data breaches were attributed to the insecure transmission of digital images [5].Furthermore,real-world scenarios,such as the dissemination of critical surveillance imagery,telemedicine where patients’diagnostic imagery is transmitted,or even satellite image communications,emphasize the paramount need for secure transmission methodologies.Any compromise in these domains can lead to devastating consequences,ranging from privacy invasion to national security threats.In the broader landscape of wireless communication,SC-FDMA has garnered attention,particularly as an uplink standard in mobile communication systems.This underscores the pertinence of studying secure image communication tailored for this system.While open-channel networks facilitate a multitude of data transmission,they are also prone to vulnerabilities.Unauthorized access,inadvertent modifications,or even unintentional deletions can jeopardize the integrity and reliability of the transmitted data.Such challenges are further amplified in the realm of image transmission,making it a critical area of research.Considering the above-mentioned issues,this paper delves into the intricacies of secure image communication over the wireless SC-FDMA system.We have anchored our research on a robust image communication framework optimized for SC-FDMA,aiming to strike a balance between enhanced image security and impeccable quality at the receiving end.Thus,through this research,we aim to bridge the existing gaps and offer a fortified,efficient,and reliable solution for digital image transmission in the current digital age,where both quality and security are of utmost importance.

    With the burgeoning growth in multimedia technology and the paramount importance of digital image transmission in wireless communication systems,there exists a persistent challenge: How can we ensure both efficient transmission and robust security for images in an SC-FDMA system,which remains a pivotal standard in mobile communications?

    This research,therefore,aims to:

    ? Introduce a Robust Framework:We propose a novel framework for secure image communication over the SC-FDMA system.This framework should not only safeguard images from unauthorized access,modification,or deletion but also guarantee their high-quality reconstruction at the receiver end.

    ? Merge Watermarking&Encryption:We implement a unique hybrid approach of digital image watermarking,based on the Discrete Cosine Transform (DCT) merged with the Singular Value Decomposition(SVD)(DCT-SVD watermarking),and encryption based on chaos and Deoxyribonucleic Acid (DNA) encoding.The amalgamation of these techniques is hypothesized to provide an enhanced level of security for image data,a feat that individual methods might fall short of.

    ? Evaluate Performance in Diverse Conditions:We study the efficiency and security of our proposed method under different channel conditions,modulation techniques,and SC-FDMA variants.The goal is to ascertain the adaptability and reliability of our method in real-world scenarios,which is vital for practical applications.

    ? Optimize Performance for Channel Types:We determine the most suitable SC-FDMA variant for specific channel models,such as Pedestrian A and Vehicular A channels,to ensure optimal performance based on the environment.

    In essence,our primary objective is to address the dual challenge of ensuring robust cybersecurity while maintaining the integrity and quality of digital images during transmission over advanced communication channel models,specifically the SC-FDMA system.We believe that a successful implementation of our proposed methods will significantly advance the field of secure image communication and set new benchmarks for future endeavors.

    Therefore,this paper is directed to the study of image communication over the wireless SCFDMA system.Different tools are investigated for this task to send images with high quality and high security over the SC-FDMA system.The digital images are processed through a two-level security mechanism before the communication process.These two levels depend on the DCT-SVD hybrid image watermarking algorithm as the first stage followed by image encryption as a second stage.Chaos and DNA encoding rules are considered for the task of image encryption.The resulting encrypted watermarked image is then transmitted over the SC-FDMA system.The communication tool considered to mitigate the channel effects is equalization.Linear Minimum Mean Squared Error(MMSE)equalizer is considered in this work.

    The linear MMSE equalizer is an essential tool in modern communication systems,particularly in mitigating the adverse effects of channel fading and noise.Unlike other linear equalizers,the MMSE equalizer aims to minimize the mean square error between the estimated and actual transmitted signals.This approach offers an advantage,especially in environments with considerable noise and interference.To understand its operation,let us briefly discuss the underlying principle.In a communication channel,the transmitted signal gets distorted due to various factors,including fading and noise.The equalizer role is to reverse or compensate for this distortion to retrieve the original signal at the receiver side.The linear MMSE equalizer does so by adapting its filter coefficients in a way that the Mean Square Error(MSE)between the original and estimated signals is minimized.In the context of our study,where image transmission is of paramount importance,the MMSE equalizer plays a pivotal role.Images are inherently high data-rate signals,making them more susceptible to errors due to channel impairments.The MMSE equalizer,with its adaptive nature,ensures that these images are received with minimum distortion,maintaining their integrity and quality.This is especially crucial in wireless communication scenarios,where channel conditions may vary rapidly.For the SC-FDMA system,which inherently has a low Peak-to-Average Power Ratio(PAPR)and low sensitivity to carrier frequency offsets,the role of the MMSE equalizer becomes even more relevant.It not only combats the effects of channel fading and noise but also synergizes with the SC-FDMA system properties,ensuring secure and efficient transmission of images.In conclusion,the linear MMSE equalizer is not just a tool but a vital component in our proposed framework,ensuring that the transmitted images are received with the highest possible fidelity even in challenging channel conditions.

    In our pursuit to address the challenges of digital image transmission over advanced communication channels,this research contributes in several novel ways.The main contributions of the paper can be summarized in the following points:

    ? Hybrid Security Mechanism:While individual methodologies for watermarking and encryption have been explored in past research,our work introduces a hybrid model that synergistically integrates the DCT with the SVD(DCT-SVD)watermarking and chaos-based DNA encoding for image encryption.This layered approach ensures enhanced robustness against potential security threats.

    ? Optimization for SC-FDMA:Tailoring a cybersecurity algorithm specifically for the SCFDMA system,which is a cornerstone in modern broadband wireless communications,is a distinguishing aspect of this research.By tapping into the inherent advantages of SC-FDMA,we ensure that our security solutions are not only potent but also in sync with prevalent communication standards.

    ? In-Depth Channel Model Analysis:A unique feature of our study is the comprehensive assessment performed on different types of channel models,specifically‘Pedestrian A’and‘Vehicular A’.This granular analysis offers insights into how our algorithm performs under varying transmission conditions,ensuring its wide applicability.

    ? Comparative Study of SC-FDMA Variants:An added dimension of novelty is our comparative study on the different variants of SC-FDMA based on Fast Fourier Transform(FFT),DCT,and Discrete Wavelet Transform (DWT).To the best of our knowledge,such an exhaustive comparative analysis,specifically in the context of digital image transmission,has not been undertaken before.Our results highlight the most efficient variant for specific channel conditions,providing practical insights for real-world deployments.

    ? The encrypted digital watermarked image is transmitted over a wireless SC-FDMA system.Different arrangements and scenarios are considered for the communication segment of the proposed framework to set up the communication architecture.These scenarios include:

    ○Two subcarrier mapping schemes,namely localized and interleaved subcarrier mapping,

    ○MMSE equalizer to mitigate the channel effects at the receiver part,

    ○Three versions of the SC-FDMA system,namely DWT-SC-FDMA,DCT-SC-FDMA,and FFT-SC-FDMA,to select the most appropriate modulation scenario for image communication,and

    ○Two different wireless channel models,namely Pedestrian A and Vehicular A,to investigate the effect of channel degradations on images in each scenario.

    ? The decrypted watermarks are extracted after the communication scenario and the effects of all processes adopted in the suggested framework are studied.

    In summary,our work bridges the gap between robust cybersecurity measures and efficient digital image transmission in wireless communication systems,making a significant stride in the domain of multimedia technology.

    2 Related Works

    This paper presents a powerful security algorithm for image communication through merging digital image watermarking with image encryption techniques.The goal of this merging technique is to enhance and strengthen image security through its transmission over the wireless SC-FDMA system[5].In the literature,several methods have been proposed to develop image transmission over wireless communication systems.Some of these methods are reviewed in this section.

    Bahaddad et al.proposed a modified Orthogonal Frequency-Division Multiplexing (OFDM)scheme for the transmission of images[6].This proposal is based on modifying the OFDM structure by using unequal power allocation for the successive OFDM symbols.With unequal power allocation,an unequal cyclic time guard is also used.A comparison is carried out between this method and the conventional OFDM.Results demonstrate that the performance is enhanced with lower average powers and lower average cyclic extension periods when using this method.With and without Forward Error Correction (FEC),the performance of the OFDM scheme was examined.Simulation results proved that the utilization of FEC enhances the process of image communication.

    Bhowmik and Acharyya studied watermarked image transmission in an OFDM system over the wireless Additive White Gaussian Noise(AWGN)channel using a 256-Phase-Shift Keying(PSK)modulation scheme.The transmission performance analysis has been carried out[7].The Peak Signal-to-Noise Ratio(PSNR)has been used to assess the visual quality of watermarked images.Cox’s algorithm has been used to extract the watermark from the received image.The statistical correlation parameter and the Bit Error Rate(BER)have been used as assessment tools for the recovered watermarks.Two distinct modulation schemes,namely 16-PSK and 16-Quadrature Amplitude Modulation (QAM),have been considered in this study for watermarked image communication.Simulation experiments at different Signal-to-Noise Ratio (SNR) values proved that 16-QAM is superior to 16-PSK for watermarked image communication to maintain the ability to recover the watermarks.The simulation results for the 16-QAM modulation scheme are further improved upon applying the Hamming(7,4)for error correction to preserve the high quality of reconstructed images.

    Faragallah et al.presented a robust procedure for medical image transmission with hidden patient information as a watermark [8].The patient information is encoded as a watermark into the Least-Significant Bits(LSBs)of the medical image pixels in this procedure.This technique is some sort of spatial-domain digital watermarking.The watermark is encrypted to prevent unauthorized access to data.The encrypted watermark is coded by concatenation of Reed Solomon (RS) codes and Low-Density Parity Check (LDPC) codes to enhance the embedded information robustness.Even in the absence of noise,the accuracy of watermark extraction is dependent on the region of the medical image into which the watermark is embedded.As a result,the quality of the extracted watermark is assessed for three different regions of the image without noise.A wireless channel with burst errors has been considered in this study.Turbo coding has also been considered as a way to correct transmission errors over the channels with impulsive noise.Simulation results proved the importance of Turbo coding for extracting highly-accurate watermarks.

    Eichelberg et al.presented a study for secure color image communication over the SC-FDMA wireless communication system [9].Chaos-based image encryption has been considered for this task.In addition,different decomposition equalization schemes have been considered and compared for the image communication task.Different modulation schemes have also been considered and compared for the task of encrypted image communication.Simulation results proved that a framework comprising chaos-encrypted images,QAM and convolutional coding with rate1/2at the transmitter with ZF equalizer at the receiver is successful for image communication over Rayleigh multipath fading channels.

    Eichelberg et al.proposed a Multi-Input Multi-Output Space Frequency Block Coding Orthogonal Frequency Division Multiplexing(MIMO-SFBC-OFDM)scheme for the transmission of medical images over frequency selective fading channels[10].Its performance has been analyzed in comparison with that of the Single-Input Single-Output Orthogonal Frequency Division Multiplexing (SISOOFDM) using Vertical-Bell Laboratories Layered Space-Time (V-BLAST) detection scheme at the receiver.The presented structure in this paper has been utilized for transmitting watermarked medical images with patient information as watermarks.Simulation results proved the superiority of the MIMO-SFBC-OFDM to the SISO-OFDM scheme in guaranteeing a secure and high-fidelity medical image communication process.

    Hassan et al.proposed an efficient approach for the transmission of encrypted images with a Fast Fourier Transform(FFT)version of the OFDM system[11].El-Shafai et al.presented a secured transmission scheme for watermarked images over the Long-Term Evolution(LTE)downlink physical layer [12].The watermark images are first scrambled for better security.Then,they are embedded into the transform coefficients of the host image using a hybrid transform-domain technique.The watermarked image is transmitted over the OFDM downlink physical layer.Medical images have been transmitted over this scheme for remote automated diagnosis purposes.Hence,a classification task is performed on the received images.A Support Vector Machine(SVM)is used for the classification of the Non-Region of Interest(NRoI)and the Region of Interest(RoI)in the medical images.The results obtained with this framework have shown a 10-6Bit Error Rate(BER)level for images transmitted at about 10 dB SNR.This is translated to high PSNR values of received images,and hence high quality of received image segmentation and classification.

    Hassan et al.proposed an image transmission scheme with two levels of encryption to send images over OFDM channels.In this scheme,both bit-level scrambling and symbol scrambling are considered and combined [13].Hassan et al.proposed an encryption scheme for image communication over OFDM [14].Rubik’s cube encryption technique has been adopted in this study to achieve better security and also to have better-quality received images.Two OFDM implementations based on FFT and DCT have been considered in the modulation process in this study.Different variants of modulation schemes have also been considered and compared in this work.It was observed from the numerical and visual inspection results that the Rubik’s cube encryption algorithm is successful for image communication over DCT-OFDM.The DCT implementation of OFDM allows better energy compaction of transmitted signals in addition to less effect of frequency and phase offsets.

    Faheem et al.presented an efficient transmission scheme for encrypted images through a MIMO–OFDM system over an AWGN channel [15].Different encryption schemes have been considered and compared.Different encryption algorithms have been combined to improve the security of image communication.Jayakokela et al.proposed a methodology for embedding secret messages in binary images.This methodology depends on LSB image steganography[16].The stego-image is then transmitted over the SC-FDMA system.The embedded binary message is further extracted from the received stego-image at the receiver.Both PSNR and MSE have been considered to assess the quality of the stego image.To enhance the security of embedding,a double embedding process is adopted.Hence,secrecy is maintained during the communication process.A comparison between the SC-FDMA and the OFDMA for stego-image communication has proved that the SC-FDMA is preferred from the quality perspective.

    As the quantum computing frontier rapidly advances,the traditional cryptographic algorithms,notably ECC and RSA,are exposed to vulnerabilities.Recognizing this,the arena of Post-Quantum Cryptography(PQC)has emerged,offering algorithms that anticipate and aim to counteract quantum computation threats.This evolution is vital for our research,as digital image transmission necessitates utmost security,especially in the quantum era.Integrating PQC into our proposed digital image watermarking and encryption methodologies ensures robustness against potential quantum attacks [17].The work of[17]presented innovative approaches to ensuring security,emphasizing the significance of proactive measures in the wake of quantum computing advancements.

    Side-channel attacks exploit physical information leaked during the execution of cryptographic operations.These can be power consumption patterns,electromagnetic radiations,and even execution times.Given our context of image transmission,it is imperative to consider these attacks,especially when such transmissions are performed on wireless devices susceptible to physical leakages.Lightweight cryptography offers a balanced approach,ensuring security while optimizing for efficiency—a crucial requirement for devices with resource constraints.We aim to delve into the nuances of lightweight cryptographic techniques and their applicability in the domain of digital image transmission over wireless networks.Given the resource limitations of many wireless devices,lightweight cryptography provides a promising direction for secure image transmission,while ensuring minimal overheads.The advent of quantum computers mandates the need for quantum-resistant cryptographic solutions.Within this subsection,we intend to expound on how PQC methods can be harmonized with our security framework,ensuring robustness against evolving quantum threats,especially when considering the transmission of sensitive images over advanced communication channels[17,18].

    In modern wireless communication systems,there is a growing emphasis on conserving energy and ensuring low-power consumption,especially in mobile and edge devices.Lightweight Cryptography(LWC)becomes essential in such contexts as it offers cryptographic solutions that are optimized for power,energy,and area efficiency,without compromising security.The Camellia block cipher,as mentioned in [19],presents an excellent case for LWC.The paper delves into reliable architectures designed for the Camellia cipher,showcasing its adaptability for different variants of substitution boxes.Such design considerations are vital in ensuring that the cryptographic operations are not just secure but also energy-efficient,aligning with the objectives of LWC.As our proposed framework is foccused on the secure transmission of digital images,leveraging principles from LWC,like those exhibited by the Camellia block cipher,can greatly enhance the energy efficiency of our solution.Future implementations of our framework will indeed benefit from integrating these principles,ensuring a balance between robust,security and power conservation.

    3 Preliminaries

    3.1 SVD-Based Image Watermarking

    In numerous applications,including watermarking,the SVD is extensively employed.Many methodologies for watermarking utilizing SVD have been introduced.These techniques involve embedding watermarks through alterations to the singular valuesSor the orthogonal vectorsUandVin digital watermarking.The use of SVD in watermarking offers multiple benefits.A notable attribute of SVD is the robust stability of its singular valueS.This characteristic ensures that the visual integrity of an image remains largely unaffected,even in the face of significant modifications due to attacks[17,18].

    whereSrepresents the singular values of the host image,αdenotes the scale factor used to control the strength of the watermark to be inserted andWis the watermark.The embedding method expressed by Eq.(1)is shown in Fig.1.Finally the watermarked imageAwis obtained from the modified singular valuesSWHostand the vectorsUandVTof the host image according to Eq.(2)[17–19].

    Figure 1: SVD-based image watermarking

    3.2 DNA Sequence and Encoding

    DNA is a molecule that contains the genetic information used in the growth,development,functioning,and reproduction of any living organism or virus [20].In biology,a DNA sequence consists of four nucleotides,adenine (A),thymine (T),cytosine (C),and guanine (G).According to the complementary pairing rules of DNA,A is paired with T,and C is paired with G as shown in the double helix structure of the DNA in Fig.2[21].In binary encoding,0 and 1 are complementary.So,00 and 11 are complementary,similar to 01 and 10.By using four bases A,C,G and T to encode 00,01,10 and 11,eight rules satisfy the complementary relations among the bases[20].DNA coding rules are shown in Table 1[22].

    Table 1: Encoding and decoding rules

    Figure 2: Double helix structure of the DNA

    The XOR rule used by this algorithm for DNA sequences is similar to the traditional XOR rule.Therefore,the DNA XOR rule is shown in Table 2.

    Table 2: DNA XOR operation

    3.3 PWLCM and Logistic Map

    The Piecewise Linear Chaotic Map(PWLCM)and logistic map are used to generate all parameters the algorithm requires.The PWLCM is described in Eq.(3),while the logistic map is defined by Eq.(4)[22–24].

    wherexn∈(0,1)andp∈(0,0.5).In experiments,we usep=0.25678900[25,26].

    3.4 MD5 Hash Function

    The Message-Digest(MD5)hash function is commonly used in encryption.It generates a 128-bit hash value typically presented as a 32-digit hexadecimal number,literally.The initial values are given by Eq.(5)[27–29].

    wherex0is the initial value of the chaos map.d1,d2,d3,andd4are extracted from the MD5 hash value of the plain image.We only need to transformd1,d2,d3andd4from binary to decimal,before using Eq.(5).

    4 The Proposed Hybrid DCT-SVD Image Watermarking Algorithm

    The continuous and rapid growth of multimedia technology has accentuated the criticality of efficient image transmission,especially in the realm of wireless communication systems.Achieving high-quality images in transmission,while essential,is only part of the puzzle;ensuring that security against an array of cyber threats is equally imperative.As a dominant force in broadband wireless communications,the Single Carrier Frequency Division Multiple Access(SC-FDMA)boasts features such as a low PAPR and diminished sensitivity to carrier frequency offsets.This makes it a focal point of our investigation,particularly as it remains a pivotal uplink standard in mobile communication systems.

    Amid the myriad of challenges encompassing data transmission in open-channel networks,some stand out: ensuring data security,upholding its integrity,and guaranteeing its reliability.When we narrow this down to the domain of image transmission,the intricate nature of images demands robust measures to thwart unauthorized access,modification,or erasure.It is this very serious challenge that this paper addresses.

    ? Roadmap of Our Research:

    ? Robust Framework for Image Security:At the heart of our study is the introduction of an innovative framework for secure image communication over the SC-FDMA system.This is not just about bolstering security but also ensuring that the images,once received,retain their quality.

    ? Hybrid Approach with DCT-SVD Watermarking and Encryption:We employ a dualpronged approach by merging digital image watermarking,leveraging the DCT combined with the SVD,with an encryption method rooted in chaos theory and DNA encoding principles.

    ? Evaluating MMSE Equalization:A pivotal component of our research will delve into the linear MMSE equalizer.Our goal is to ascertain and counteract the detrimental effects of channel fading and noise on images during their transmission phase.

    ? Comparative Analysis of SC-FDMA Variants:Given the diverse nature of communication channels,we will juxtapose different SC-FDMA variants:FFT,DCT,and DWT to deduce their efficacy in specific channel scenarios.

    ? Subcarrier Mapping Schemes and Channel Models:Our research will also encompass a comparative study of subcarrier mapping schemes,specifically localized and interleaved schemes.Furthermore,we will extend our investigation to different channel models,including Pedestrian A and Vehicular A,to ensure that our findings are applicable in real-world scenarios.

    As we navigate through the intricate labyrinths of image transmission in the subsequent sections,we hope to provide readers with comprehensive insights,backed by extensive simulation experiments,into the most effective methods for secure and efficient image communication over advanced channel models.

    The proposed algorithm has several significant contributions to the field of secure image communication over the SC-FDMA system:

    ? Hybrid Watermarking Technique:By merging DCT with SVD (DCT-SVD),we introduce a novel watermarking scheme.This approach not only enhances the robustness against various attacks but also retains a higher image quality,a balance rarely achieved by existing methods.

    ? Innovative Image Encryption:The paper presents a unique combination of chaos and DNA encoding techniques for image encryption.To our knowledge,this is the first work that synergistically integrates these two methods,resulting in enhanced security levels,especially for high-resolution images that are common in today’s multimedia applications.

    ? Linear MMSE Equalizer Exploration:While the MMSE equalizer is known,its application in the context of SC-FDMA for secure image transmission,particularly with the challenges posed by watermarking and encryption,is a fresh area of exploration.Our findings provide valuable insights into mitigating channel fading and noise,crucial for real-world deployments.

    ? Comprehensive Analysis with SC-FDMA Variants:Our study is among the few that rigorously compare FFT,DCT,and DWT variants of SC-FDMA for the specific task of image communication.Our results present clear guidelines for practitioners on the choice of SC-FDMA variants based on channel conditions.

    ? Simulation-Driven Insights:Through extensive simulations,our research offers empirical evidence on the performance of different techniques across different channel models.These findings fill a gap in the literature,offering clear,actionable insights for researchers and industry professionals alike.

    By addressing these areas,our research not only introduces novel methodologies but also serves as a comprehensive guide for secure image communication over the SC-FDMA system,paving the way for future investigations and practical implementations in this domain.

    The DCT has found extensive applications in image processing due to its capability to transform an image into its constituent frequency components.SVD,on the other hand,is a mathematical operation that can decompose matrices in a way that makes them easier to analyze.When combined,DCTSVD watermarking embeds watermark information into the significant frequency components of an image,ensuring that the watermark is robust against various attacks,while remaining imperceptible to the human eye.For a detailed understanding,readers are directed to[24].A watermarking scheme using DCT and SVD is introduced where the host image is transformed into Y,Cb,Crplanes using the popular RGB—YCbCrlinear color transformation.Then,the DCT is performed on the Y component as the cover image,because the human eye is less sensitive to the luminance Y in YCbCrspace than other color channels in the RGB space.The SVD is performed on the DCT coefficients obtained from the luminance component Y.The SVs (S matrix) is then divided intoblocks with each block size of 128×128,for anM×Ncover image.The watermark image is pre-processed before embedding into each block using a scaling factor.Finally,the watermarked image is transformed to the spatial domain using the inverse DCT(IDCT).Consider a 3D doctor image of size 256×256 for each channel as a cover image[23]and as MRI image of size 128×128 as a watermark image[24].The next two sections depict embedding and extraction algorithms to distinctly define the flow of the proposed technique.

    4.1 Embedding Algorithm

    The watermark embedding procedure is depicted in Fig.3,and it is described in detail in the following steps:

    Figure 3: Embedding algorithm

    Step 1:The cover image is transformed into YCbCrplane.

    Step 2:The DCT is applied to the luminance image Y.

    Step 3:The SVD is applied to the matrix obtained after applying DCT to obtain:

    whereU1andare the orthonormal unitary matrices ofA1.The termS1constitutes the singular values of the matrixA1.

    Step 4:TheS1component is divided into 128×128 blocks.Step 5:The watermark image is embedded into each block.The embedding process can be defined mathematically as:

    wherekdenotes the scale factor used to control the strength of the watermark to be inserted.

    Step 6:The SVD is applied to the result to getA2w=

    Step 7:The inverse SVD(ISVD)is applied by multiplying the orthogonal matricesU1andwith the matrixS2,as given in Eq.(8).

    Step 8:Finally,the IDCT is applied onA1newto obtain the watermarked imageAw.

    4.2 Extraction Algorithm

    The watermark extraction procedure is depicted in Fig.4,and it is described in detail in the following steps:

    Step 1:SVD is applied on the watermarked image Awto obtainaccording to

    Step 2:Dis obtained according toD=

    Step 3:Dis divided into blocks,each with a size of 128×128.

    Step 4:The watermark is extracted according to

    Figure 4: Extraction algorithm

    5 Chaos and DNA-Based Ciphering Algorithm

    The next two sections depict encryption and decryption algorithms to distinctly define the flow of these algorithms.

    5.1 Encryption Algorithm

    Chaos-based encryption methods rely on the unpredictable and sensitive nature of chaotic systems.When used for encryption,tiny changes in the initial conditions of the system can produce vastly different outcomes,making chaos a strong tool against cyber-attacks.DNA encoding,inspired by biological DNA sequences,provides a novel way of representing and processing information.The use of chaos and DNA encoding together combines the unpredictability of chaotic systems with the vast encoding potential of DNA sequences,offering a robust encryption method.A comprehensive discussion of this method can be found in[25].The detailed steps of the encryption based on DNA are explained through the following steps:

    Step 1:Eqs.(3)and(11)are used to generate the key image.

    wherepixelis the pixel value of the key image,xis the iteration value of the PWLCM,andx∈(0,1).The initial value of Eq.(3)is calculated with the help of Eq.(5).

    Step 2:The plain and key images are encoded using DNA rules determined by Eqs.(4)and(12).

    Rule=[x×8]+1 (12)

    whereRuleis the specified rule controlling the encoding progress,and the initial value of Eq.(4) is provided by Eq.(5).The details about DNA rules are shown in Table 1.

    According to DNA encoding rules,the gray-scale plain image is encoded using 4 kinds of nucleobases,as it consists of 8 bits.When a plain image of sizeM×Nis used,the encoded image size will be 4×M×N.

    Step 3:The DNA operation is conducted between the encoded plain image and the encoded key image.Here,the XOR operation is performed row by row until the encoded intermediate image is generated.The size of the encoded intermediate image is 4×M×N.Details on XOR operation are presented in Table 2.

    Step 4:The encoded intermediate image is decoded to obtain a decoded intermediate image.The decoding rule depends on Eq.(12).This step produces a primary cipher image with sizeM×N.

    Step 5:The primary cipher image is rotated by 90°anticlockwise.This step produces a new plain image to be used in the next step.

    Step 6:Steps 1 to 4 are repeated to obtain the final cipher image.The encryption based on DNA sequences is illustrated in Figs.5 and 6.

    5.2 Decryption Algorithm

    The procedure of acquiring the original image from the encrypted image is the inverse operation with a slight difference as illustrated in the following steps:

    Step 1:The cipher image is encoded according to DNA rules as described in Step 2 in the encryption algorithm.

    Step 2:The key image is generated and encoded,according to the same Steps 1 and 2 in the encryption algorithm.

    Step 3:The encoded key image and the encoded cipher image produced from Steps 1 and 2 are used to generate the intermediate encoded image.The DNA XOR operation described in the encryption process is performed in the deciphering process as it has a symmetric nature as shown in Table 2.

    Step 4:The intermediate encoded image generated from Step 3 is decoded.

    Step 5:The decoded image obtained from Step 4 is rotated by 90°clockwise.

    Step 6:Steps 1 to 4 are repeated to obtain the plain image.The decryption procedure is depicted in Fig.6.

    5.3 FFT-Based SC-FDMA System

    The block diagram of the FFT-based SC-FDMA system for encrypted watermarked image transmission is shown in Fig.7.One base station andUuplink users are assumed.There are totallyMsubcarriers,and each user is assigned a subset of subcarriers for the uplink transmission.For simplicity,we assume that each user has the same number of subcarriers,N.

    Figure 5: Encryption algorithm

    At the transmitter side,the encoded data is transformed into a multilevel sequence of complex numbers in one of several possible modulation formats.The resulting modulated symbols are then grouped into blocks,each containingNsymbols and the FFT is performed.The signal after the FFT can be expressed as follows[30–32]:

    whereNis the input block size,andx(n):n=0,...,N-1 represents the modulated data symbols.

    The resulting signal after the IFFT can be given as follows[2]:

    At the receiver side,the Cyclic Prefix (CP) is removed from the received signal and the signal is then transformed into the frequency domain via anM-point FFT.

    Figure 6: Decryption algorithm

    Figure 7: FFT-based SC-FDMA system

    5.4 DCT-Based SC-FDMA System

    Due to the nature of DCT of energy compaction and real implementation,a DCT-based SCFDMA system can be used for image communication to avoid the large PAPR and synchronization problems as depicted in Fig.8 [25].The spectral energy compaction allows symbol transmission with low power,which means that the ISI problem will be significantly reduced.In addition,the implementation needs only real arithmetics rather than the complex arithmetics used in the FFT.This reduces the signal processing complexity,and the in-phase/quadrature imbalance,and also makes the system more stable than the FFT-based SC-FDMA system[25,26].

    Figure 8: DCT-based SC-FDMA system

    Note that although the DCT-based system performs better than the FFT-based system for realvalued functions of input signals,it requires DFT and inverse DFT at the receiver side to achieve one-tap frequency-domain equalization[25].

    The minimumFΔ,required to satisfy the orthogonality condition,is 1/2T.This condition is defined by[26]:

    A schematic block diagram of the DCT SC-FDMA system is shown in Fig.8.The signal after the DCT operation can be expressed as follows[26]:

    wherexnis the modulated data symbols,andβkis given by[26–28]:

    After the IDCT,the signal can be expressed as follows:

    5.5 DWT-Based SC-FDMA System

    Letxndenote the modulated data symbols.Then,we can describe the signal after the DWT as follows[32–34]:

    where ψ(t)denotes the wavelet basis function anddenotes the wavelet coefficients(See Fig.9).

    Figure 9: DWT-based SC-FDMA system

    6 Simulation Results and Analysis

    The process of encrypted watermarked image communication over the SC-FDMA system is studied and analyzed.Different experiments are carried out with different scenarios to evaluate and test the effects of channel models on image quality.The results are presented to assess the performance of different SC-FDMA schemes (FFT SC-FDMA,DCT SC-FDMA and DWT SC-FDMA) over Pedestrian A and Vehicular A channel models.The MMSE equalizer is considered in this study.In addition,two subcarrier mapping schemes,namely localized and interleaved schemes,are studied.

    6.1 Simulation Parameters

    Experimental results have been obtained using MATLAB simulator to study how efficient the different versions of SC-FDMA are for the transmission of encrypted watermarked images.The details of the simulation parameters are given in Table 3[35–37].

    Table 3: Simulation parameters

    6.2 Simulation Scenario and System Block Diagram

    A block diagram is given in Fig.10 for the image communication system.The system operation has five stages[37]:

    ? The first stage:The watermark image is embedded in the cover image using the embedding process explained earlier in Section 3.1.

    ? The second stage:The watermarked image is now encrypted using the encryption algorithm explained earlier in Section 4.1.

    ? The third stage:The encrypted watermarked image is now transmitted through either FFT SCFDMA,DCT SC-FDMA or DWT SC-FDMA system.The MMSE equalizer is considered in the simulation.One of the two subcarrier mapping schemes,either localized or interleaved,is considered.Two different wireless channel models,namely Pedestrian A and Vehicular A,are investigated and compared in this evaluation.

    ? The fourth stage:The received encrypted watermarked image at the other end of the wireless channel is passed through the SC-FDMA receiver,and then decrypted using the decryption algorithm explained earlier in Section 3.2.

    ? The fifth stage:Finally,the original image is retrieved,and the watermark is extracted from the decrypted watermarked image using the watermark extraction process implemented in Section 4.2.

    6.2.1 Subcarrier Mapping Schemes:Localized vs.Interleaved

    Subcarrier mapping schemes play an essential role in the operation of SC-FDMA systems,affecting both the system performance and the computational complexity.Here,we briefly discuss the rationale behind choosing the localized and interleaved schemes for comparison and differentiate between them based on their inherent advantages and disadvantages:

    ?Localized Mapping:

    ? Advantages:

    ○Simplicity: One of the main advantages of the localized mapping scheme is its simplicity.The subcarriers are allocated contiguously to each user,making the allocation straightforward.

    ○Channel Adaptation: Due to contiguous allocation,localized mapping can exploit the channel frequency selectivity.When used in conjunction with adaptive modulation and coding,it can provide significant performance improvements over frequency-selective channels.

    ? Disadvantages:

    ○Localized mapping might result in a higher PAPR,which can be a drawback for power-limited systems.

    ?Interleaved Mapping:

    ? Advantages:

    ○Diversity: This scheme offers frequency diversity as it allocates subcarriers in a non-contiguous manner.This scattered allocation can be beneficial in flat-fading scenarios,providing a more uniform performance across the frequency spectrum.

    ○Reduced PAPR:Interleaved mapping generally results in a lower PAPR compared to localized mapping,which can lead to power savings.

    ? Disadvantages:

    ○Complexity: The non-contiguous allocation makes the system somewhat more complex,both in terms of subcarrier allocation and signal processing.

    Figure 10: System block diagram

    In the context of our study,comparing these two schemes allows us to understand better how they impact the transmission of digital images over different channel models.Considering the unique characteristics of image signals and the challenges associated with their transmission over wireless channels,examining the performance of these schemes is crucial to determining the optimal choice for specific scenarios.By offering insights into the trade-offs associated with each mapping scheme,we aim to provide a comprehensive guide for practitioners and researchers in the field,aiding in making informed decisions when setting up SC-FDMA systems for image transmission tasks.

    6.2.2 Channel Models and Modulation Technique:Rationale

    ?Channel Models:Pedestrian A and Vehicular A

    The decision to consider both Pedestrian A and Vehicular A channel models stems from the real-world scenarios that they represent.

    ? Pedestrian A Model:This model is primarily designed to emulate scenarios where the primary source of signal impairment comes from time dispersion caused by multi-path propagation.Given the increase in pedestrian users of mobile communication,especially in urban environments,it is crucial to understand how image transmission behaves in such conditions.

    ? Vehicular A Model:Vehicular scenarios,on the other hand,introduce higher doppler shifts due to the high mobility involved.Given the rise in vehicle-to-vehicle and vehicle-to-infrastructure communications,ensuring secure image transmissions in such environments becomes essential.

    By contrasting the performance of our algorithm across these two distinct scenarios,we aim to provide a comprehensive evaluation that caters to a broader range of real-world applications.

    ?Quadrature Amplitude Modulation

    QAM was chosen as the modulation technique due to its wide adoption in wireless communication and its ability to transmit a larger amount of data for a given bandwidth,making it highly efficient.With the increase in demand for data-intensive tasks such as image transmission,QAM provides a good balance between bandwidth efficiency and performance.In our study,understanding how QAM interacts with our proposed cybersecurity algorithm can give valuable insights into potential practical deployments.

    In essence,our choice of channel models and modulation technique is rooted in the aspiration to make our findings as applicable and relevant as possible to the evolving landscape of wireless communication.By considering real-world scenarios and widely-adopted modulation techniques,we aim to bridge the gap between academic research and practical implementation.

    6.3 PSNR-Based Image Communication Assessment

    The PSNR can be mathematically calculated with Eq.(20)[5].

    wherePMaxis the highest pixel value given asPMax=2b-1,andbis the number of bits per sample.The MSE is calculated mathematically with Eq.(21)[5].

    wheref(i,j)is the original cover image andf′(i,j)is the received decrypted watermarked image.

    The PSNR performance of the system is evaluated for different SNRs.The PSNR is evaluated between the decrypted watermarked image at the receiver and the original image.It is measured for performance assessment for all different studied schemes: DWT SC-FDMA,DCT SC-FDMA,and FFT SC-FDMA,an MMSE equalizer and two subcarrier mapping schemes (localized and interleaved).The PSNR performance of all schemes is studied over two different channel models:Pedestrian A and Vehicular A.

    6.3.1 PSNR Performance over Pedestrian A Channel

    For the Pedestrian A channel,Fig.11 shows that the DWT SC-FDMA scheme outperforms the DCT SC-FDMA and FFT SC-FDMA schemes.The DCT SC-FDMA and FFT SC-FDMA have approximately the same performance.The DWT-LFDMA outperforms the DWT-IFDMA.Generally,the DWT-LFDMA has the best performance.Generally,For the Pedestrian A channel,the DWT-LFDMA is the best of all studied cases.

    Figure 11: PSNR performance of FFT/DCT/DWT-based IFDMA and LFDMA systems over Pedestrian A channel,with MMSE equalizer

    6.3.2 PSNR Performance over Vehicular A Channel

    For the Vehicular A channel,Fig.12 shows that the DCT-LFDMA has the best performance.The DWT-IFDMA and the DWT-LFDMA have a satisfactory performance unlike the DCT-IFDMA and FFT-IFDMA,which give the worst performance for the Vehicular A channel.Generally,for the Vehicular A channel,the DCT-LFDMA is by far the best performance of all studied cases.

    Figure 12: PSNR performance of FFT/DCT/DWT-based IFDMA and LFDMA systems over Vehicular A channel,with MMSE equalizer

    The complete set of results of all simulation experiments is tabulated in Tables 4 and 5.These tables provide the PSNRvs.channel SNR in all simulation scenarios.It is noticed that as SNR is increased,there is an improvement in the PSNR values for the decrypted watermarked images.A PSNR value approaching infinity indicates that the MSE between the original and the decrypted watermarked images is zero,i.e.,the original image quality is achieved in the decrypted watermarked image.

    For Pedestrian A channel,it can be noticed from Table 4 that the PSNR gets its maximum value at a channel SNR equal to 12 dB for the DWT-LFDMA scheme.On the other hand,the PSNR gets its maximum at a channel SNR equal to 15 dB for the DWT-IFDMA scheme.It can be noticed that DCTIFDMA,DCT-LFDMA and the FFT-LFDMA schemes have approximately the same performance over the Pedestrian A channel,as they reach their maximum PSNR at a channel SNR equal to 18 dB.The FFT-LFDMA has the worst performance compared to all the studied cases.The DWT-LFDMA achieves the best performance over the Pedestrian A channel as an SNR of 12 dB only is required to transmit images with high quality.

    Table 4: PSNR values of the received decrypted watermarked images over the SC-FDMA system for all studied cases at different SNR values over Pedestrian A channel

    For the Vehicular A channel,it can be noticed from Table 5 that PSNR gets the optimum value at a channel SNR equal to 18 dB for the DCT-LFDMA scheme.The PSNR gets 40.961 and 37.1968 dB values at a channel SNR equal to 18 dB for the DWT-IFDMA and DWT-LFDMA schemes,respectively,which are satisfactory values to transmit images over Vehicular A channel.It can be noticed also that the worst cases are for the FFT-IFDMA and DCT-IFDMA.

    Table 5: PSNR values of the received decrypted watermarked image over the SC-FDMA system for all studied cases at different SNR values over Vehicular A channel

    6.4 Image Communication Assessment Based on Bit Error Rate

    In digital transmission,the BER is a key parameter that is used in assessing the system performance in the transmission of digital data from one location to another.There is a possibility of errors being introduced into the system,when data is transmitted over the link.As a result,it is necessary to evaluate the performance of the system,and the BER provides an ideal way in which this can be achieved.The BER reflects the performance of the whole system including the transmitter,receiver and the medium between them[30].

    The BER is the number of bits with errors divided by the total number of bits that have been transmitted,received or processed over a given period[30].That is:

    The BER is decreased with the increase in the channel SNR,which means that the BER is inversely proportional to channel SNR.The BER performance of the different schemes is shown in Figs.13 and 14.

    Figure 13: BER performance of FFT/DCT/DWT-based IFDMA and LFDMA schemes over pedestrian A channel with MMSE equalizer

    Figure 14: BER performance of FFT/DCT/DWT-based IFDMA and LFDMA schemes over vehicular A channel with MMSE equalizer

    6.4.1 BER Performance over Pedestrian A Channel

    Fig.13 demonstrates the BER performance of all the studied cases over the Pedestrian A channel with MMSE equalizers.Fig.13 indicates that the DWT SC-FDMA has lower BER than the FFT SCFDMA and DCT SC-FDMA schemes.The DWT-LFDMA just needs 12 dB SNR for the BER to be zero.It can be noticed that DWT-IFDMA,DCT-LFDMA and the FFT-LFDMA schemes need larger SNR values of up to 15 dB to reach the zero BER value.DCT-IFDMA and the FFT-IFDMA need an SNR value equal to 18 dB for a BER equal to zero.

    The complete set of results of all simulation experiments is tabulated in Table 6.Table 6 provides the BERvs.channel SNR in all simulation scenarios over the Pedestrian A channel.It is clear that over the Pedestrian A channel,the DWT-LFDMA is by far the best considering all studied cases as it reaches a BER of zero value at the smallest value of SNR of 12 dB.It is also observed that the localized subcarrier mapping scheme has better performance than that of the interleaved subcarrier mapping scheme.

    Table 6: BER values of the received decrypted watermarked images with the SC-FDMA system for all studied cases at different SNR values over Pedestrian A channel

    6.4.2 BER Performance over Vehicular A Channel

    Fig.14 shows the BER performance over the Vehicular A channel for the MMSE equalizer.Fig.14 indicates that the DCT-LFDMA scheme gives lower BER than the DCT-IFDMA,FFTSCFDMA and DWT-SCFDMA schemes.The DCT-LFDMA gets a BER value of zero at an SNR value equal to 15 dB.The DWT-LFDMA needs 18 dB SNR for a BER of zero.DCT-IFDMA and FFT-IFDMA have the worst BER values.The complete set of results of all simulation experiments is tabulated in Table 7.

    Table 7: BER values of the received decrypted watermarked images with the SC-FDMA system for all studied cases at different SNR values over Vehicular A channel

    Table 7 provides the BERvs.channel SNR in all simulation scenarios over the Vehicular A channel.It is clear that over the Vehicular A channel,the DCT-LFDMA is by far the best of all studied cases as it reaches a BER of zero value at the smallest value of SNR of 15 dB.On the other hand,other schemes require higher SNR values of 18 dB or above to reach the BER of zero.

    6.5 Image Communication Assessment Based on Correlation Coefficients(Cr)

    The correlation coefficient of two images is given as follows:

    At the receiver side,the watermark is extracted from the decrypted watermarked image.The correlation performance is analyzed by considering all different studied schemes over Pedestrian A and Vehicular A channels.Figs.15 and 16 show the bar chart that reveals the plot of the correlation coefficient between original and extracted watermarksvs.SNR for all the studied cases in this simulation.

    Figure 15: Correlation coefficient performance of FFT/DCT/DWT-based IFDMA and LFDMA systems over Pedestrian A channel with MMSE equalizer

    Figure 16: Correlation coefficient performance of FFT/DCT/DWT-based IFDMA and LFDMA systems over Vehicular A channel with MMSE equalizer

    6.5.1 Correlation Performance over Pedestrian A Channel

    Fig.15 demonstrates the correlation performance of all the studied cases over the Pedestrian A channel with MMSE equalizer.Fig.15 indicates that the DWT SC-FDMA scheme achieves better correlation values than those of the FFT SC-FDMA and DCT SC-FDMA schemes.The localized subcarrier mapping achieves better correlation values than those of the interleaved subcarrier mapping scheme.

    The complete set of results of all simulation experiments is tabulated in Table 8.For Pedestrian A channel,Table 8 demonstrates that the DWT-LFDMA is by far the best of all studied cases as it gives the optimum correlation coefficient value ofCr=0.929 at a value of SNR equal to 12 dB.It is also observed that the localized subcarrier mapping scheme has a better performance than that of the interleaved subcarrier mapping scheme.

    Table 8: Correlation coefficient values of the received decrypted watermarked images with the SCFDMA system for all studied cases at different SNR values over Pedestrian A channel

    6.5.2 Correlation Coefficient Performance over Vehicular A Channel

    Fig.16 shows the correlation coefficient performance over the Vehicular A channel for MMSE equalizer.Fig.16 indicates that DCT-LFDMA achieves better correlation values than those of the FFT-SCFDMA and DWT-SCFDMA,particularly with the localized subcarrier mapping.

    The complete set of results of all simulation experiments is tabulated in Table 9.Table 9 demonstrates that for the Vehicular A channel,the DCT-LFDMA is by far the best of all studied cases,as it gives the optimum correlation coefficient value ofCr=0.929 at an 18 dB value of SNR.

    Table 9: Correlation coefficient values of the received decrypted watermarked images with the SCFDMA system for all studied cases at different SNR values over Vehicular A channel

    6.6 Imperceptibility Analysis

    To validate the watermark embedding into the original image,perceptual quality analysis is considered.In a good embedding technique,the watermarked image should be visibly identical to the original image.The perceptual transparency or imperceptibility of the proposed technique is measured with PSNR.Watermarked and original images should be very similar.Higher PSNR values indicate higher imperceptibility and less distortion.

    A 3D image of size 256 × 256 has been considered to be an original image in this simulation experiment.Figs.17a and 17b show the original image and its histogram.Figs.17c and 17d show the watermarked image and its histogram and Figs.17c and 17d show the encrypted watermarked image and its histogram,respectively.

    6.6.1 Imperceptibility Analysis over Pedestrian A Channel

    To analyze the imperceptibility or perform visual inspection of the decrypted watermarked images over all different studied schemes over Pedestrian A channel,a value of SNR=12 dB is considered as shown in Fig.18.It is clear that the quality of the received decrypted watermarked image with the DWT-LFDMA system is better than those of the FFT SC-FDMA,DCT SC-FDMA,and the other case of the DWT SC-FDMA systems.The transparency of the received images obtained through DWT-LFDMA is by far the best of all studied cases.

    Figure 17: Original,watermarked and encrypted watermarked images and their histograms

    Figure 18: Simulation results of encrypted/decrypted watermarked images and their histograms at SNR=12 dB over Pedestrian A channel for different schemes

    6.6.2 Imperceptibility Analysis over Vehicular A Channel

    To analyze the imperceptibility or perform visual inspection of the decrypted watermarked images over all different studied schemes over the Vehicular A channel,a value of SNR=18 dB is considered as shown in Fig.19.It is clear that the quality of the received decrypted watermarked image using the DCT-LFDMA scheme is better than those of the FFT SC-FDMA,DWT SC-FDMA and the other case of DCT-SCFDMA.The transparency of the received images obtained through the DCT SCFDMA scheme is the best over the vehicular A channel for the localized subcarrier mapping scheme(DCT-LFDMA).

    Figure 19: Simulation results of encrypted/decrypted watermarked images and their histograms at SNR=18 dB over Vehicular A channel for different schemes

    6.7 Robustness Analysis

    The robustness of extracted watermarks is evaluated using correlation coefficientsCrbetween the original and extracted watermark image at the receiver.As mentioned earlier,the optimum case producesCrvalues close to unity,which means a great similarity between the original and the extracted watermarks.Fig.20 shows the original watermark image used in the simulation experiments and its histogram.

    6.7.1 Robustness Analysis over Pedestrian A Channel

    To see whether the watermark has been extracted exactly and to study the robustness of the extracted watermark image at the receiver side of all different studied schemes over Pedestrian A channel,a value of SNR=12 dB is chosen as shown in Fig.21.From comparative analysis depicted in Fig.21,it is quite obvious that the quality of the extracted watermark image using the DWT-LFDMA scheme is better than those of the FFT SC-FDMA and DCT SC-FDMA and the other cases of DWT SC-FDMA schemes.The DWT-LFDMA system delivers the best correlation value ofCr=0.929,which signifies higher robustness than those of other schemes.

    Figure 20: Original watermark image and its histogram

    Figure 21: Simulation results of extracted watermark images and their histograms at SNR=12 dB over Pedestrian A channel for different schemes

    6.7.2 Robustness Analysis over Vehicular A Channel

    To see whether the watermark has been extracted exactly and to study the robustness of extracted watermark images at the receiver side for all different studied schemes over Vehicular A channel,a value of SNR=16 dB is chosen as shown in Fig.22.From comparative analysis depicted in Fig.22,it is quite obvious that the quality of the extracted watermark image using the DCT-LFDMA scheme is better than those of the FFT SC-FDMA and DWT SC-FDMA and the other cases of DCT SCFDMA schemes.The DCT-LFDMA delivers the best correlation value ofCr=0.929,which signifies higher robustness for the localized subcarrier mapping method(DCT-LFDMA).

    Figure 22: Simulation results of extracted watermark images and their histograms at SNR=18 dB over Vehicular A channel for different schemes

    6.8 Performance Analysis in Terms of Histograms

    6.8.1 Histogram Overview

    A histogram is a graphical illustration of the pixel levels of an image.It is the representation of variation in the perception of a tone.It describes the distribution of gray levels of a given image[31].The x-axis represents the tonal variations of the image and the y-axis represents the number of pixels of a particular tone[32].

    6.8.2 Histogram Analysis

    The histograms of the original,watermarked and encrypted watermarked images are shown in Figs.17b,17d and 17f,respectively.It is quite obvious that the original and watermarked image histograms are similar to each other.Fig.17f shows that the histogram of the encrypted watermarked image is uniform.

    To analyze the histograms of the received encrypted and decrypted (retrieved) watermarked images over all different studied schemes over Pedestrian A channel and Vehicular A channel,values of SNR=12 dB and SNR=18 dB are considered as shown in Figs.18 and 19,respectively.It is quite evident from these figures that the received encrypted watermarked images still maintain their uniform histogram nature,and this makes the schemes stronger against different attacks.It is also evident that decrypted (retrieved) watermarked images are similar to the original and watermarked images,which means that the histogram gives a clear significance that the decryption has produced the original image.

    The histograms of the extracted watermark images at the receiver side for all different studied schemes over Pedestrian A channel and Vehicular A channel at values of SNR=12 dB and SNR=18 dB are considered as shown in Figs.21 and 22,respectively.It is quite evident from these figures compared with Fig.20 that the extracted watermark image is highly correlated with the original watermark image,which means that the watermark has been extracted significantly at the receiver side.

    6.9 Comparison with Previous Works

    To provide a clearer understanding of the advances and distinctions of our proposed method,we present a comparative study between our work and previous related methodologies in the domain of image transmission over SC-FDMA systems.Table 10 offers a side-by-side comparison based on various crucial metrics and parameters.

    Table 10: Comparison with previous works

    From the table,it becomes evident that our proposed method is a holistic tool by integrating advanced watermarking and encryption techniques,ensuring both the security and quality of transmitted images.Moreover,the robustness of our approach against potential transmission errors and attacks further emphasizes the relevance and novelty of our research in the context of SC-FDMAbased image communication systems.

    6.10 Complexity Analysis of the Proposed Algorithms

    In this section,we present a comprehensive complexity analysis of the various algorithms introduced in our paper.This includes the DCT-SVD-based watermarking,chaos and DNA-based image encryption,and the linear MMSE equalizer.The intention behind this analysis is to provide insights into the computational demands of each algorithm,aiding potential implementers in understanding the trade-offs involved in their application.

    ? DCT-SVD-Based Watermarking:

    ? Time Complexity:

    ? Discrete Cosine Transform(DCT):Since we employ a 2D-DCT on images of sizeM×N,the time complexity is of O(N log(MN)).

    ? Singular Value Decomposition(SVD):On a square matrix of sizeM×M,SVD complexity is of O(M3).

    Thus,the overall complexity of DCT-SVD watermarking is of O(MNlog(MN)+M3).

    ? Space Complexity:The space complexity remains of O(MN) as we only need to store the transformed image and singular values.

    ? Chaos and DNA-Based Image Encryption:

    ? Time Complexity:

    ? Chaos encryption typically has a linear time complexity,O(MN),for an image of sizeM×N.

    ? DNA encoding: Since each pixel undergoes a specific DNA sequence conversion,its time complexity is also of O(MN).

    Thus,the combined time complexity is of O(2MN),which can be approximated to O(MN) for large images.

    ? Space Complexity:The space complexity is of O(MN),which is needed for the DNA-encoded and encrypted image.

    ? MMSE Linear Equalizer:

    ? Time Complexity:Considering the matrix inversion operation required for the MMSE equalizer,if the matrix is of sizeM×M,the complexity is of O(M2)using the best-known matrix multiplication algorithms.

    ? Space Complexity:Since we need to store the inverse matrix,the space complexity is O(M2).

    ? Conclusions of Complexity Analysis:

    When considering the implementation of our algorithms in real-world scenarios,the time complexities indicate the computational demand for processing each image,with the MMSE equalizer being the most computationally intensive due to matrix inversion.However,in terms of space requirements,all algorithms only need to allocate space proportional to the image size,making them feasible for most modern systems.

    It is also essential to consider that these complexities provide a worst-case scenario.In many practical applications and with the assistance of optimized libraries and hardware,the computational demands may be significantly reduced.

    We believe that understanding these complexities will guide practitioners in choosing the appropriate systems and resources when implementing the proposed cybersecurity algorithms for image transmission over advanced communication channel models.

    6.11 Discussions

    This section delves deeper into the broader implications,challenges,and potential future avenues of our research.

    ? Broader Implications

    Our research highlights the critical need for advanced cybersecurity mechanisms in the realm of digital image transmission over complex communication channels.Given the exponential growth of multimedia data transmission and the increased reliance on mobile communication systems,ensuring robust security has never been more pivotal.

    ? Challenges in Real-World Implementation

    While our proposed solution demonstrates promising results in a simulated environment,realworld challenges,such as hardware limitations,varying noise levels,and diverse channel conditions,can influence the performance.Addressing these challenges would require adaptive algorithms and hardware-software co-designs for optimal results.

    ? Scalability and Adaptability

    The proposed hybrid cybersecurity algorithm is designed to be both scalable and adaptable.Its modular structure allows for integration with other communication standards,making it a potential candidate for broader applications beyond SC-FDMA systems.

    ? Future Research Directions

    Building upon the foundations laid in this paper,future research could explore the integration of quantum-resistant algorithms,delve deeper into lightweight cryptographic solutions suitable for resource-constrained devices,and investigate the potential of applying deep learning techniques for enhanced watermarking and encryption processes.Another intriguing direction would be to evaluate the performance of our proposed solution under different types of adversarial attacks,ensuring its robustness against sophisticated cyber threats.

    Furthermore,the overall comparison between schemes has been conducted in terms of PSNR,BER,andCrmetrics.The comparative study demonstrates that:

    ? For Pedestrian A channel,the DWT-LFDMA is the best of all studied cases as it reaches a BER of zero and a PSNR value approaching infinity at the smallest value of SNR of 12 dB compared to the other studied cases.It is also observed that the localized subcarrier mapping scheme has better performance than the interleaved subcarrier mapping scheme.

    ? For the Vehicular A channel,the DCT-LFDMA is the best of all studied cases as it reaches a BER of zero at the smallest value of SNR of 15 dB and a PSNR value approaching infinity at the smallest value of SNR of 18 dB compared to the other cases.

    ? The outcomes from the experiments reveal high-quality imperceptibility of the received decrypted watermarked images at SNR values of 12,and 18 dB,when Pedestrian A and Vehicular A channels are considered,respectively,which are sufficiently good values.

    ? The outcomes of the experiments also reveal the high correlation between the extracted watermark image at the receiver side and the original watermark image as it gives high correlation values at SNR values of 12,and 18 dB,over Pedestrian A and Vehicular A channels,which signifies high robustness.

    ? The histograms of the received encrypted and decrypted watermarked images show that the received encrypted watermarked images still maintain their uniform nature,and this makes the schemes stronger against different attacks.It is also evident that decrypted (retrieved)watermarked images are similar to the original ones.This means that the histogram gives a clear significance that the decryption has produced the original image.

    ? The histograms of extracted watermark images at the receiver side reveal that the extracted watermark images are highly correlated with the original watermark images.This means that the watermark has been extracted significantly at the receiver side.

    ? Basis for Conclusions on DWT-SC-FDMA and DCT-SC-FDMA Suitability

    ? DWT-SC-FDMA in Pedestrian A Channels:

    The suitability of DWT-SC-FDMA for the transmission of digital images over Pedestrian A channels emerged from the following observations:

    1.Resilience to Multi-Path Propagation:Pedestrian A channels often exhibit time dispersion due to multi-path propagation.DWT inherently provides multi-resolution analysis,which allows better representation of signal in such environments.In our simulations,this translated to a higher PSNR for transmitted images,indicating better image quality.

    2.Lower Latency:The decomposition nature of DWT resulted in reduced computational complexity,especially in dense urban pedestrian scenarios.This allowed for faster image transmission and decoding.

    ? DCT-SC-FDMA in Vehicular A Channels:

    Our choice of DCT-SC-FDMA for vehicular A channels was based on:

    1.Handling Doppler Shifts:Vehicular A channels introduce higher Doppler shifts due to rapid mobility.DCT capability to represent signals in the frequency domain ensured that such shifts had minimal impact on the transmitted images.This was evident from the reduced BER in our simulation results for vehicular scenarios.

    2.Robustness to Noise:DCT energy compaction property ensured that the image essential features were maintained in fewer coefficients.This proved beneficial in vehicular environments,where noise is more erratic.The transmitted images,when subjected to DCT-SC-FDMA,had fewer visible artifacts compared to other variants.

    In summary,the selection of DWT-SC-FDMA for Pedestrian A channels and DCT-SC-FDMA for Vehicular A channels was driven by a combination of theoretical underpinnings of these transforms and the empirical results from our extensive simulations.

    ? Scope and Limitations:

    ? Scope:

    This study primarily focuses on:

    1.Analyzing the secure transmission of digital images over the SC-FDMA wireless communication system.

    2.Investigating the effectiveness of the DCT-SVD watermarking technique combined with chaos and DNA-based image encryption.

    3.Evaluating the performance of different SC-FDMA variants,particularly FFT-SC-FDMA,DCT-SC-FDMA,and DWT-SC-FDMA,in the context of Pedestrian A and Vehicular A channel models using QAM.

    ? Limitations:

    1.Encryption Techniques:While we implemented encryption based on chaos and DNA encoding,other contemporary encryption methods were not explored.

    2.Channel Models:This research is confined to Pedestrian A and Vehicular A channel models.Other potential channel models may yield different results.

    3.Watermarking:The watermarking technique was centered on DCT-SVD.Alternative watermarking strategies might present varying efficacy levels in image security.

    4.Modulation:The study employed QAM.Other modulation schemes could affect the system performance and were not part of this research.

    By highlighting these areas,we aim to guide readers in understanding the specific focus of our research and the areas where caution should be exercised when generalizing our findings.Future work can address these limitations,broadening the research spectrum in the domain of digital image transmission over wireless communication channels.

    7 Conclusions and Future Work

    Efficient,reliable,and secure means of wireless communication for the transfer of digital data(text,images,audio,and video) from source to destination is becoming a prime requirement in present-day wireless communications.This paper considered the development of different schemes for encrypted watermarked image transmission over a wireless SC-FDMA system and the analysis of their performances through simulations.The image transmission from one place to another using wireless communication systems requires more security.The study presented two security stages for image transmission over the wireless SC-FDMA system.The first stage is the watermarking.The watermark image shows itself in the cover image with the proposed hybrid DCT-SVD algorithm.As a result,it gives birth to a robust watermarked image.The second stage is to encrypt the watermarked image using the image encryption algorithm based on chaos and DNA encoding introduced earlier in this study.The encrypted watermarked image is then transmitted on a wireless SC-FDMA system.Three different schemes have been considered:FFT-based SC-FDMA,DCT-based SC-FDMA,and DWT-based SCFDMA.Each scheme is simulated considering either localized or interleaved subcarrier mapping and MMSE equalizer.This study depends on two wireless channel models,Pedestrian A and Vehicular A.The foundational concepts in this paper provide several potential avenues for future exploration and development:

    ? Integration with Other Communication Standards:While our study primarily focused on the SC-FDMA system,it would be intriguing to test and adapt our hybrid cybersecurity algorithm for other emerging communication standards.It would ascertain the versatility and scalability of our proposed solutions.

    ? Enhancing Encryption Techniques:The current implementation depends on chaos and DNA encoding for image encryption.Exploring the fusion of quantum encryption methods or leveraging advanced cryptographic techniques could further strengthen the security facet of our framework.

    ? Advanced Watermarking Methods: Although the DCT-SVD watermarking technique showed promising results,integrating deep-learning-based watermarking could provide more robustness against sophisticated watermark removal or tampering attacks.

    ? Real-world Testing and Deployment:Conducting real-world experiments beyond simulations,especially in diverse environmental conditions and variable hardware configurations,would validate the practical applicability and robustness of our algorithm.

    ? Optimization for Real-time Transmission:Considering the ever-growing demand for real-time multimedia communications,optimizing the proposed algorithm for lower latency without compromising security would be a significant advancement.

    We anticipate that pursuing these future research directions will significantly enhance the impact and applicability of our work in the broader domain of secure digital image transmission.

    Acknowledgement:This work is funded by the Deanship of Scientific Research,Princess Nourah bint Abdulrahman University,Riyadh,Saudi Arabia.The authors are very grateful to all the institutions in the affiliation list for successfully performing this research work.The authors would like to thank Prince Sultan University for their support.

    Funding Statement:This research project was funded by the Deanship of Scientific Research,Princess Nourah bint Abdulrahman University,through the Program of Research Project Funding After Publication,Grant No.(44-PRFA-P-131).

    Author Contributions:Study conception and design: Naglaa F.Soliman,Fatma S.Fadl,Walid El-Shafai;data collection: Naglaa F.Soliman,Maali Alabdulhafith and Fathi E.Abd El-Samie;analysis and interpretation of results: Naglaa F.Soliman,Walid El-Shafai,Mahmoud I.Aly,Maali Alabdulhafith;draft manuscript preparation:Naglaa F.Soliman,Walid El-Shafai,Mahmoud I.Aly.supervision and funding acquisition: Naglaa F.Soliman,Walid El-Shafai.All authors reviewed the results and approved the final version of the manuscript.

    Availability of Data and Materials:Data will be available from the corresponding author upon reasonable request.

    Conflicts of Interest:The authors declare that hey have no conflicts of interest to report regarding the present study.

    亚洲最大成人av| 天堂网av新在线| 成人高潮视频无遮挡免费网站| 久久热精品热| a级毛片免费高清观看在线播放| 性色avwww在线观看| 亚洲欧美精品综合久久99| 国产色婷婷99| 两个人的视频大全免费| 色哟哟·www| 一本一本综合久久| 成人欧美大片| 91字幕亚洲| 色吧在线观看| 午夜精品在线福利| 亚洲欧美日韩高清在线视频| 91久久精品电影网| 国产一区二区在线av高清观看| 国产精华一区二区三区| 亚洲欧美日韩高清在线视频| 久久热精品热| 国内毛片毛片毛片毛片毛片| 特大巨黑吊av在线直播| 亚洲av五月六月丁香网| 国内揄拍国产精品人妻在线| 午夜老司机福利剧场| 国产成人啪精品午夜网站| 在线十欧美十亚洲十日本专区| av在线观看视频网站免费| 亚洲av日韩精品久久久久久密| 日韩亚洲欧美综合| 亚洲在线自拍视频| 成人特级黄色片久久久久久久| 国产欧美日韩一区二区三| 亚洲黑人精品在线| 亚洲第一电影网av| 成人特级黄色片久久久久久久| 91麻豆精品激情在线观看国产| 久久天躁狠狠躁夜夜2o2o| 搡女人真爽免费视频火全软件 | 久久热精品热| 国产一区二区亚洲精品在线观看| 老司机午夜十八禁免费视频| 国产免费男女视频| 国内揄拍国产精品人妻在线| 男人的好看免费观看在线视频| 国产在视频线在精品| 亚洲精品一卡2卡三卡4卡5卡| 男女下面进入的视频免费午夜| 欧美性感艳星| 中文字幕免费在线视频6| 少妇熟女aⅴ在线视频| 无遮挡黄片免费观看| 俄罗斯特黄特色一大片| 色视频www国产| 91九色精品人成在线观看| 欧美又色又爽又黄视频| 嫩草影院精品99| 一级黄片播放器| 午夜日韩欧美国产| 久久欧美精品欧美久久欧美| 日本a在线网址| 国产成人欧美在线观看| 国语自产精品视频在线第100页| 最新中文字幕久久久久| 久久亚洲真实| 成人美女网站在线观看视频| 神马国产精品三级电影在线观看| 国产精品爽爽va在线观看网站| x7x7x7水蜜桃| 亚洲国产日韩欧美精品在线观看| 欧美bdsm另类| a在线观看视频网站| 成熟少妇高潮喷水视频| av专区在线播放| 黄色一级大片看看| 欧美+亚洲+日韩+国产| 欧美黄色片欧美黄色片| 可以在线观看的亚洲视频| a级一级毛片免费在线观看| 国产爱豆传媒在线观看| 亚洲av一区综合| 国产v大片淫在线免费观看| 757午夜福利合集在线观看| av国产免费在线观看| 欧美激情在线99| 久久伊人香网站| 小说图片视频综合网站| 久久人人爽人人爽人人片va | 少妇熟女aⅴ在线视频| 国产不卡一卡二| 国产精品久久久久久人妻精品电影| 亚洲男人的天堂狠狠| h日本视频在线播放| 亚洲美女视频黄频| 真人一进一出gif抽搐免费| 国产av麻豆久久久久久久| 97碰自拍视频| 我要搜黄色片| 亚洲国产精品久久男人天堂| 色哟哟哟哟哟哟| 国产黄a三级三级三级人| 可以在线观看的亚洲视频| 91在线观看av| eeuss影院久久| 天天躁日日操中文字幕| 中文字幕人妻熟人妻熟丝袜美| 动漫黄色视频在线观看| 国产精品自产拍在线观看55亚洲| 色av中文字幕| 国产一区二区三区视频了| АⅤ资源中文在线天堂| 久久精品国产99精品国产亚洲性色| 国内精品一区二区在线观看| 欧美午夜高清在线| 国产麻豆成人av免费视频| 一本综合久久免费| 久久精品国产清高在天天线| 午夜激情福利司机影院| 国产精品一区二区三区四区免费观看 | 久久久久久久久中文| 日本五十路高清| 搡老妇女老女人老熟妇| 日本一本二区三区精品| 久久久久久九九精品二区国产| 国产一区二区三区在线臀色熟女| 亚洲美女搞黄在线观看 | 少妇熟女aⅴ在线视频| 九九久久精品国产亚洲av麻豆| 久久久久九九精品影院| a级一级毛片免费在线观看| 日本与韩国留学比较| 亚洲欧美日韩卡通动漫| 精品久久久久久久久久免费视频| av天堂在线播放| 狠狠狠狠99中文字幕| 日本在线视频免费播放| 午夜福利高清视频| 两个人视频免费观看高清| 99久久成人亚洲精品观看| 国产一区二区三区视频了| 90打野战视频偷拍视频| 欧美国产日韩亚洲一区| 三级国产精品欧美在线观看| 国产伦人伦偷精品视频| 人妻丰满熟妇av一区二区三区| 亚洲av成人不卡在线观看播放网| 中亚洲国语对白在线视频| 日本一本二区三区精品| 亚洲国产精品999在线| 色精品久久人妻99蜜桃| 午夜日韩欧美国产| 精品乱码久久久久久99久播| 麻豆av噜噜一区二区三区| 国产黄片美女视频| 国产三级黄色录像| 国产精品久久久久久久久免 | 男女之事视频高清在线观看| 国产色婷婷99| 午夜a级毛片| 给我免费播放毛片高清在线观看| 国产成+人综合+亚洲专区| 久久这里只有精品中国| 国产麻豆成人av免费视频| 在线十欧美十亚洲十日本专区| 免费电影在线观看免费观看| 欧美黄色淫秽网站| 色哟哟哟哟哟哟| 免费观看人在逋| 午夜久久久久精精品| ponron亚洲| 搡老妇女老女人老熟妇| 丁香六月欧美| 欧美bdsm另类| 99热6这里只有精品| 欧美日韩瑟瑟在线播放| 有码 亚洲区| 精品久久久久久成人av| 欧美一区二区精品小视频在线| 亚洲av一区综合| 国产在视频线在精品| 大型黄色视频在线免费观看| 性色avwww在线观看| 午夜日韩欧美国产| 久久久成人免费电影| 国产真实乱freesex| 一个人看视频在线观看www免费| www日本黄色视频网| 欧美乱妇无乱码| 国产伦一二天堂av在线观看| 国产高清视频在线观看网站| 亚洲av电影不卡..在线观看| 大型黄色视频在线免费观看| 亚洲五月婷婷丁香| 国产亚洲精品av在线| 亚洲精品在线观看二区| 国产亚洲欧美在线一区二区| 久久精品国产99精品国产亚洲性色| 全区人妻精品视频| 亚洲最大成人av| 在线播放国产精品三级| 色在线成人网| 国产真实乱freesex| 国内精品一区二区在线观看| or卡值多少钱| 怎么达到女性高潮| 国产伦精品一区二区三区视频9| 午夜精品久久久久久毛片777| 日韩国内少妇激情av| 波多野结衣高清作品| 国产成人欧美在线观看| 又粗又爽又猛毛片免费看| 亚洲国产精品成人综合色| 国内精品久久久久精免费| 精品人妻视频免费看| 成年人黄色毛片网站| 一个人看视频在线观看www免费| 亚洲精品色激情综合| 成人鲁丝片一二三区免费| 亚洲国产高清在线一区二区三| 极品教师在线免费播放| 99热精品在线国产| 亚洲精品成人久久久久久| 日韩亚洲欧美综合| 女同久久另类99精品国产91| 女人十人毛片免费观看3o分钟| 国产探花在线观看一区二区| 久久精品国产清高在天天线| 精品久久久久久成人av| 精品人妻视频免费看| 亚洲欧美日韩高清专用| av福利片在线观看| 亚洲七黄色美女视频| 窝窝影院91人妻| 久久亚洲精品不卡| 欧美中文日本在线观看视频| 成人特级黄色片久久久久久久| 日本免费a在线| 中文字幕久久专区| 高清日韩中文字幕在线| 日本撒尿小便嘘嘘汇集6| 亚洲人成网站在线播放欧美日韩| 国产黄色小视频在线观看| 日韩大尺度精品在线看网址| 欧美午夜高清在线| 精品99又大又爽又粗少妇毛片 | a级毛片免费高清观看在线播放| 高清在线国产一区| av国产免费在线观看| 久99久视频精品免费| 国语自产精品视频在线第100页| 噜噜噜噜噜久久久久久91| 真实男女啪啪啪动态图| 精品人妻视频免费看| 久9热在线精品视频| 婷婷精品国产亚洲av| 极品教师在线免费播放| 国产在线男女| 国产国拍精品亚洲av在线观看| 一卡2卡三卡四卡精品乱码亚洲| 日韩免费av在线播放| 一区二区三区免费毛片| 亚洲av五月六月丁香网| 狠狠狠狠99中文字幕| a级一级毛片免费在线观看| 欧美午夜高清在线| 亚洲美女搞黄在线观看 | ponron亚洲| 午夜老司机福利剧场| 国产探花极品一区二区| 中文字幕熟女人妻在线| 亚洲av中文字字幕乱码综合| 亚洲熟妇熟女久久| 男女那种视频在线观看| 久久久久久久久大av| 亚洲第一欧美日韩一区二区三区| 人人妻人人澡欧美一区二区| 国产成人av教育| 动漫黄色视频在线观看| 天天躁日日操中文字幕| 老熟妇乱子伦视频在线观看| 最近中文字幕高清免费大全6 | 国内精品一区二区在线观看| 午夜亚洲福利在线播放| 国内精品久久久久精免费| 国产伦精品一区二区三区视频9| 成人鲁丝片一二三区免费| 在线观看av片永久免费下载| 1024手机看黄色片| 亚洲人成网站在线播放欧美日韩| 中国美女看黄片| 亚洲欧美日韩东京热| 噜噜噜噜噜久久久久久91| 高潮久久久久久久久久久不卡| 国产蜜桃级精品一区二区三区| 免费看日本二区| 日韩欧美国产一区二区入口| 少妇人妻精品综合一区二区 | 色精品久久人妻99蜜桃| 少妇熟女aⅴ在线视频| 嫩草影院精品99| 国产精品电影一区二区三区| 波多野结衣高清作品| 精品久久久久久久久久久久久| 亚洲精品日韩av片在线观看| 国产69精品久久久久777片| 中文字幕av成人在线电影| 男插女下体视频免费在线播放| 国产白丝娇喘喷水9色精品| 国产黄色小视频在线观看| 99久久99久久久精品蜜桃| 亚洲熟妇熟女久久| 欧美最黄视频在线播放免费| 床上黄色一级片| 精品久久久久久久久久免费视频| 美女高潮喷水抽搐中文字幕| 国产色爽女视频免费观看| 国产蜜桃级精品一区二区三区| 色综合欧美亚洲国产小说| 午夜免费成人在线视频| 亚洲欧美激情综合另类| 亚洲精品一区av在线观看| 亚洲人成电影免费在线| 免费在线观看影片大全网站| 别揉我奶头~嗯~啊~动态视频| 一区二区三区激情视频| 午夜福利视频1000在线观看| 成人特级黄色片久久久久久久| 最近最新免费中文字幕在线| 婷婷亚洲欧美| 嫩草影院入口| 亚洲经典国产精华液单 | 日本黄大片高清| 俺也久久电影网| 免费av不卡在线播放| 欧美zozozo另类| 两性午夜刺激爽爽歪歪视频在线观看| 免费大片18禁| 久久久久久久久久成人| 最近中文字幕高清免费大全6 | 三级男女做爰猛烈吃奶摸视频| 欧美成人性av电影在线观看| 伦理电影大哥的女人| 一二三四社区在线视频社区8| 国产单亲对白刺激| 亚洲一区二区三区色噜噜| 亚洲国产精品成人综合色| 人妻制服诱惑在线中文字幕| 一夜夜www| 国产精品亚洲美女久久久| 舔av片在线| 小蜜桃在线观看免费完整版高清| 亚洲最大成人av| 午夜免费男女啪啪视频观看 | 亚州av有码| 中文字幕人妻熟人妻熟丝袜美| 久久99热这里只有精品18| 成熟少妇高潮喷水视频| 草草在线视频免费看| 亚洲一区高清亚洲精品| 亚洲精品成人久久久久久| 蜜桃亚洲精品一区二区三区| 午夜福利欧美成人| 国产精品永久免费网站| 亚洲av.av天堂| 久久伊人香网站| 男女做爰动态图高潮gif福利片| 亚洲av不卡在线观看| 精品久久久久久久久亚洲 | 少妇高潮的动态图| 亚洲五月天丁香| 白带黄色成豆腐渣| 午夜老司机福利剧场| 国产老妇女一区| a在线观看视频网站| 在线天堂最新版资源| 一区二区三区免费毛片| 一区二区三区激情视频| av女优亚洲男人天堂| 老熟妇仑乱视频hdxx| 国产美女午夜福利| 人人妻人人澡欧美一区二区| 国产v大片淫在线免费观看| 亚洲精品成人久久久久久| 色综合欧美亚洲国产小说| 国产不卡一卡二| 欧洲精品卡2卡3卡4卡5卡区| 国产私拍福利视频在线观看| 高潮久久久久久久久久久不卡| 长腿黑丝高跟| 日韩欧美在线乱码| 国产伦人伦偷精品视频| 精品福利观看| 日韩高清综合在线| 欧美日韩黄片免| 亚洲国产色片| 国产av在哪里看| 首页视频小说图片口味搜索| 婷婷色综合大香蕉| 国产av一区在线观看免费| 色吧在线观看| 免费人成在线观看视频色| 国产一区二区在线av高清观看| 精品久久久久久久人妻蜜臀av| 一个人免费在线观看的高清视频| 国产免费男女视频| 亚洲精品影视一区二区三区av| 国产精品98久久久久久宅男小说| 日本一二三区视频观看| 老熟妇仑乱视频hdxx| 中文字幕精品亚洲无线码一区| 男人舔奶头视频| 欧美丝袜亚洲另类 | 午夜亚洲福利在线播放| a级一级毛片免费在线观看| 国产高清视频在线观看网站| 久久精品国产亚洲av天美| 香蕉av资源在线| 亚洲av成人精品一区久久| 床上黄色一级片| 久久久久久久久中文| 一级毛片久久久久久久久女| 国产黄片美女视频| 亚洲av免费高清在线观看| 成人毛片a级毛片在线播放| 在线免费观看不下载黄p国产 | 国产黄色小视频在线观看| 欧美不卡视频在线免费观看| a在线观看视频网站| 麻豆久久精品国产亚洲av| 国产成人aa在线观看| 免费看a级黄色片| 色综合欧美亚洲国产小说| 国产蜜桃级精品一区二区三区| 男女那种视频在线观看| 九九热线精品视视频播放| 国产伦一二天堂av在线观看| 欧美黑人巨大hd| 国产精品亚洲一级av第二区| 亚洲人成电影免费在线| 亚洲国产精品sss在线观看| 人妻久久中文字幕网| 日韩欧美一区二区三区在线观看| 成人美女网站在线观看视频| 国产一区二区三区在线臀色熟女| 日韩精品中文字幕看吧| 男人的好看免费观看在线视频| 午夜久久久久精精品| 黄片小视频在线播放| 国产av麻豆久久久久久久| 黄色视频,在线免费观看| 国内精品一区二区在线观看| 美女cb高潮喷水在线观看| 成人毛片a级毛片在线播放| 欧美色欧美亚洲另类二区| 少妇被粗大猛烈的视频| 国产色爽女视频免费观看| 久久久久久国产a免费观看| 欧美+日韩+精品| 欧美黑人巨大hd| 午夜福利在线观看免费完整高清在 | 欧美不卡视频在线免费观看| 免费观看的影片在线观看| 在线观看av片永久免费下载| 99久国产av精品| 色综合亚洲欧美另类图片| 午夜精品一区二区三区免费看| 亚洲av日韩精品久久久久久密| 久久精品国产亚洲av涩爱 | 日韩欧美 国产精品| 桃色一区二区三区在线观看| 黄色女人牲交| av专区在线播放| 观看美女的网站| 小说图片视频综合网站| 国产麻豆成人av免费视频| 97人妻精品一区二区三区麻豆| 欧美国产日韩亚洲一区| 色哟哟·www| 搞女人的毛片| 男插女下体视频免费在线播放| 大型黄色视频在线免费观看| 亚洲av不卡在线观看| 久久久久久久久久黄片| 在线观看舔阴道视频| 91久久精品国产一区二区成人| 亚洲精品在线美女| 国产69精品久久久久777片| 九九久久精品国产亚洲av麻豆| 国产探花在线观看一区二区| 一夜夜www| 国产精品久久久久久久电影| 国产成人av教育| 色噜噜av男人的天堂激情| 真实男女啪啪啪动态图| 黄色视频,在线免费观看| 国产精品1区2区在线观看.| 好男人在线观看高清免费视频| 午夜影院日韩av| 在线播放国产精品三级| a级毛片免费高清观看在线播放| 又黄又爽又免费观看的视频| 久久久色成人| 丁香欧美五月| 男女那种视频在线观看| 超碰av人人做人人爽久久| 国产精品亚洲一级av第二区| 99热6这里只有精品| 国产主播在线观看一区二区| 国产欧美日韩精品一区二区| 岛国在线免费视频观看| 欧美日韩黄片免| 国产精品亚洲av一区麻豆| 国产精品久久久久久精品电影| 窝窝影院91人妻| av视频在线观看入口| 精品一区二区三区人妻视频| 国产单亲对白刺激| 亚洲18禁久久av| 特级一级黄色大片| 欧美成狂野欧美在线观看| 亚洲成人精品中文字幕电影| 又黄又爽又刺激的免费视频.| 我要看日韩黄色一级片| 变态另类成人亚洲欧美熟女| 美女 人体艺术 gogo| av欧美777| av专区在线播放| 欧美在线一区亚洲| 精品人妻偷拍中文字幕| 一卡2卡三卡四卡精品乱码亚洲| 天堂√8在线中文| 成人高潮视频无遮挡免费网站| 一本一本综合久久| 婷婷色综合大香蕉| 99精品在免费线老司机午夜| 日韩av在线大香蕉| 国产精品综合久久久久久久免费| 国产精品久久电影中文字幕| 亚洲精品粉嫩美女一区| 黄色一级大片看看| 国产精品美女特级片免费视频播放器| 国产高清激情床上av| 日日摸夜夜添夜夜添小说| 69av精品久久久久久| 日韩欧美 国产精品| 中文字幕免费在线视频6| 精品久久国产蜜桃| 婷婷精品国产亚洲av| 午夜激情福利司机影院| 欧美午夜高清在线| 国产伦在线观看视频一区| 国产色爽女视频免费观看| 欧美性猛交╳xxx乱大交人| 亚洲人成网站在线播放欧美日韩| 日本黄色片子视频| 久久久久久久久久黄片| 亚洲va日本ⅴa欧美va伊人久久| 最近在线观看免费完整版| 少妇丰满av| 窝窝影院91人妻| 天天躁日日操中文字幕| 午夜福利在线在线| 日韩欧美国产在线观看| 在线观看美女被高潮喷水网站 | 色播亚洲综合网| 亚洲精品亚洲一区二区| 精品人妻一区二区三区麻豆 | 精品人妻视频免费看| 人妻丰满熟妇av一区二区三区| 欧美激情在线99| 好男人电影高清在线观看| 精品久久久久久久久久久久久| 欧美性感艳星| 三级国产精品欧美在线观看| 精品99又大又爽又粗少妇毛片 | 亚洲欧美激情综合另类| 99热只有精品国产| 757午夜福利合集在线观看| 亚洲成人久久爱视频| 精品一区二区免费观看| 国产午夜精品论理片| 好男人在线观看高清免费视频| 男女下面进入的视频免费午夜| 中文字幕av在线有码专区| a在线观看视频网站| 搡老岳熟女国产| 国产av麻豆久久久久久久| 18美女黄网站色大片免费观看| 人人妻人人澡欧美一区二区| 天堂网av新在线| 男女视频在线观看网站免费| 亚洲真实伦在线观看| 淫妇啪啪啪对白视频| 丝袜美腿在线中文| av天堂在线播放| 午夜精品一区二区三区免费看| 啪啪无遮挡十八禁网站| 免费看a级黄色片| 中文字幕久久专区| 色精品久久人妻99蜜桃| 无遮挡黄片免费观看| 国产欧美日韩精品一区二区| 午夜老司机福利剧场| 亚洲国产精品999在线| 麻豆一二三区av精品| 十八禁人妻一区二区| 国产一区二区在线观看日韩| 国产亚洲精品综合一区在线观看| 久久午夜亚洲精品久久| 一区福利在线观看| 韩国av一区二区三区四区| 最近在线观看免费完整版| 他把我摸到了高潮在线观看| 国产精品乱码一区二三区的特点|