The data transmitted over a noisy channel is almost altered and corrupted, for this reason the aim of the error detection methods is to help the receiver to discover the corrupted data and even corrected it. This methodology assumes that the algorithm that computes the checksum will not produce the same checksum for two different data values. If the values are different, it means that the data is changed. After calculating the total checksum interval repeatedly and comparing them with the stored test. To verify any change in the data, the checksum that can be visualized as a unique representative value for a given set of data values is calculated using a particular methodology. This algorithm reduce or eliminate the visibility of noise by smoothing the entire image, leaving areas near the contrast limits. Noise Means, the pixel in the image shows different intensity values instead of the actual pixel values, the noise removal algorithm is the process of removing or reducing noise from the image. The implementation of AES for data security provides the benefits of less memory consumption and less time calculation compared to other algorithms. In order to maintain high-quality service QoS, the security mechanism should provide three viable characteristics: high-speed processing, high compression rate and adequate security level. To provide a secure area as much as possible, it shouldbe chosen appropriate security algorithm in order to send multimedia in real time due to the unique characteristics of real-time multimedia data such as large data size, high bandwidth and real-time requirements. The fact that the quality of service (QoS) must be met to provide high-quality media and low latency even when securing media transfer. As a result, securing the transfer of multimedia has become a difficult issue. Introduction Many multimedia an applications, such as video surveillance, satellite communications and web cameras, have been derived from the rapid growth of multimedia technologies and networks. The obtained results shown that the small size of the image the large CRC64 affected by noise while the large size of image yields a stable or fixed number of affected CRC64. The noise added on single and multi bits position and study the effect on the output results. The proposed algorithm uses different tested images by added different noise ratios (1% and 5%) of total images size to study the noise effect on the encrypted images.
Furthermore, it is suitable for implementing in software rather than in hardware.
The goal of the proposed algorithm optimizes the size of the redundant bits needed to attach to the original data for the purpose of error detection this reduction is considered necessary to meet the restriction for some computer architectures. The proposed algorithm for the encryption and error detection using parallel CRC64 (Slicing-by-4 algorithm) implementation with multiple look table approach for the encrypted image.
This paper presents an error detection method uses Cyclic Redundancy Check (CRC), the CRC value can be generated by two methods: Serial and Parallel CRC Implementation. This algorithm combined with error detections using Cyclic Redundancy Check (CRC) to preserve the integrity of the encrypted data.
To achieve confidentiality for color image transmission over the noisy communication channels a proposed algorithm is presented for image encryption using AES algorithm. Communication is one of the vast and rapidly growing fields of engineering, where increasing the efficiency of communication by overcoming the external electromagnetic sources and noise is considered a challenging task.