May 21
Focus
Newer wireless technology standard and protocol development essentially requires an extensive theoretical and experimental research for its successful realization and implementation via prototype test bed testing and rigorous field trials. This issue contains three papers discussing the review and analysis related to future trends of wireless technology standards, security and reliability.
The growing demand for network data handling capacity always pushes the need for improvement in the 5G technology, and thus the concept of 6G network has emerged as a new way to proceed. The first paper, "Concepts, Technologies and Future Scope of 6G Cellular Network: A Review", by Rejwan Bin Sulaiman and Amer Kareem, reviews various trends followed by 6G network in terms of its operation and efficiency. The paper emphasizes its architectural design encompassing Machine Learning (ML) and Artificial Intelligence (AI) techniques to yield 3D featured coverage and higher efficiency. The paper discusses the various technologies, data handovers and methods that could be used potentially in the 6G network architecture especially with enhanced data security.
The second paper, "Comparison of Some of the Most Prominent QKD Protocols: A Review", by Rainu Nandal, Ashish Nandal, Kamaldeep Joshi and Arvind Kumar Rathee, reviews and discusses security issues related to various classical cryptographic algorithms with their related mathematical complexity and computation limitation. The paper emphasizes the computation potential of a quantum computer and its application in the implementation of Quantum Key Distribution (QKD) mechanism as an alternative to the classical encryption solutions. The paper discusses the proposed QKD protocols and further reports its comparative analysis with respect to other existing protocols.
The last paper, "Reversible Watermarking with Minimum Pixel Shifting and High Embedding Capacity Using Modified Histogram Shifting Method for All Images", by Navnath S Narawade, presents minimum pixel shifting and improved histogram changing method to show a better Peak Signal-to-Noise Ratio (PSNR) and embedding capacity, especially in medical image quality enhancement. The proposed forward algorithm is suitable for medical images and backward algorithm is suitable for cartoon images. The paper concludes that the proposed scheme may be suitable for secured reversible watermarking with better immunity to any attack.
|
|||
Article | Price (₹) | ||
Concepts, Technologies and Future Scope of 6G Cellular Network: A Review |
100
|
||
Comparison of Some of the Most Prominent QKD Protocols: A Review |
100
|
||
Reversible Watermarking with Minimum Pixel Shifting and High Embedding Capacity Using Modified Histogram Shifting Method for All Images |
100
|
Concepts, Technologies and Future Scope of 6G Cellular Network: A Review
The world is getting into the practice of implementing 5G network on a business scale and research is covering the limits Beyond 5G (B5G) and 6G. The concept of 6G network is based on the effective performance as compared with the previous network generations. Those performance parameters include higher Quality of Service (QoS), system capacity, higher data rate, low latency and high availability. The technology and concept of 6G network are considered by the researchers while taking into account the progression and advancement in mobile applications. The paper explores various trends followed by 6G network in terms of its operation and efficiency. It also considers the use of its architectural design which is supported by the combination of emerging technologies, notably, Machine Learning (ML) and Artificial Intelligence (AI), 3D featured coverage and advanced protocols to promise higher efficiency.
Comparison of Some of the Most Prominent QKD Protocols: A Review
Classical cryptographic system security relies on the complexity of mathematical problems and limited computational power available at the attacker's end. But with the advent of quantum computers that are assumed to have unlimited computational capability, classical cryptography is now proved to be no more unconditionally secure. It has been proved that the security of a cryptographic system depends on the key used for encryption, not the algorithm. Quantum Key Distribution (QKD) is a key sharing mechanism between two parties whose security relies on the very laws of nature (quantum mechanics), not on the computational capability of the eavesdropper. In QKD, if an eavesdropper tries to gain key information, then he will be detected immediately, and the key sharing procedure is aborted. In this paper, some of the most prominent QKD protocols proposed till now are studied and then a comparative analysis of those protocols depending on various factors is performed.
Reversible Watermarking with Minimum Pixel Shifting and High Embedding Capacity Using Modified Histogram Shifting Method for All Images
The histogram shifting method is a well-known method for reversible watermarking. But Hong's method is not suitable for medical and cartoon images. Even Hong's method of histogram shifting has less embedding capacity and does not provide enough quality of general purpose image. The shifting of pixels is more in Hong's method. The improved histogram changing method overcomes all these drawbacks of Hong's method. Generally, Peak Signal-to-Noise Ratio (PSNR) decreases when embedding capacity increases and shifting pixels increase. But the improved histogram changing method optimizes all these factors. The forward algorithm is more suitable for medical images and backward algorithm is more suitable for cartoon images. The improved histogram changing method shifts required pixel values to right or left by 'n - 1' numbers. 'n - 1' may be 1, 2, 3 and so on. This also increases embedding capacity approximately to n - 1 times maximum number of pixels in the histogram. The complexity of the improved histogram changing method is same as that of Hong's modified histogram shifting method as both scan image only twice.