{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,28]],"date-time":"2026-04-28T00:09:10Z","timestamp":1777334950522,"version":"3.51.4"},"reference-count":51,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2015,7,6]],"date-time":"2015-07-06T00:00:00Z","timestamp":1436140800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Wireless Pers Commun"],"published-print":{"date-parts":[[2015,9]]},"DOI":"10.1007\/s11277-015-2645-2","type":"journal-article","created":{"date-parts":[[2015,7,5]],"date-time":"2015-07-05T05:54:50Z","timestamp":1436075690000},"page":"475-521","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":31,"title":["Efficient Transmission of Encrypted Images with OFDM in the Presence of Carrier Frequency Offset"],"prefix":"10.1007","volume":"84","author":[{"given":"Ibrahim","family":"Eldokany","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"El-Sayed M.","family":"El-Rabaie","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Said M.","family":"Elhalafawy","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Mohamed A.","family":"Zein Eldin","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Mai H.","family":"Shahieen","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Naglaa F.","family":"Soliman","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Mohsen A. M.","family":"El-Bendary","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Mohammed Abd","family":"El-Naby","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Faisal S.","family":"Al-kamali","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Ibrahim F.","family":"Elashry","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Fathi E.","family":"Abd El-Samie","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2015,7,6]]},"reference":[{"issue":"11","key":"2645_CR1","doi-asserted-by":"crossref","first-page":"2113","DOI":"10.1109\/TCOMM.2006.884852","volume":"54","author":"P Tan","year":"2006","unstructured":"Tan P., & Beaulieu, N. C. (2006). A comparison of DCT-based OFDM and DFT-based OFDM in frequency offset and fading channels. IEEE Transactions on Communications, 54(11), 2113\u20132125.","journal-title":"IEEE Transactions on Communications"},{"key":"2645_CR2","unstructured":"Andrews, J. G., Ghosh, A. & Muhamed, R. (2007). Fundamentals of WiMAX understanding broadband wireless networking. In Prentice Hall communications engineering and emerging technologies series (pp. 113\u2013145)."},{"key":"2645_CR3","doi-asserted-by":"crossref","unstructured":"Gao, F., Cui, T., Nallanathan, A., & Tellambura, C. (2008). Maximum likelihood based estimation of frequency and phase offset in DCT OFDM systems under non circular transmissions: Algorithms, analysis and comparisons. IEEE Transactions on Communications, 56(9), 1425\u20131429.","DOI":"10.1109\/TCOMM.2008.060411"},{"issue":"8","key":"2645_CR4","doi-asserted-by":"crossref","first-page":"473","DOI":"10.1109\/LSP.2006.873658","volume":"13","author":"R Merched","year":"2006","unstructured":"Merched, R. (2006). On OFDM and signal-carrier frequency-domain systems based on trigonometric transforms. IEEE Signal Processing Letters, 13(8), 473\u2013476.","journal-title":"IEEE Signal Processing Letters"},{"key":"2645_CR5","unstructured":"Tan, P., & Beaulieu, N. C. (2005). Precise bit error probability analysis of DCT OFDM in the presence of carrier frequency offset on AWGN channels. In Proceedings of the IEEE Globcom 2005 (pp. 1429\u20131434)."},{"key":"2645_CR6","unstructured":"Lawrey, E. P. (2001). Adaptive techniques for multiuser OFDM. Ph.D. thesis, James Cook University."},{"key":"2645_CR7","unstructured":"Lawrey, E. (1997). The suitability of OFDM as a modulation technique for wireless telecommunications, with a CDMA comparison. Bachelor thesis, James Cook University."},{"key":"2645_CR8","doi-asserted-by":"crossref","unstructured":"Dachselt, F., Kelber, K., & Schwarz, W. (1997). Chaotic coding and cryptoanalysis. Proceedings of IEEE international symposium on circuits and systems, Hong Kong, 9\u201312 June 1997 (pp. 1061\u20131064).","DOI":"10.1109\/ISCAS.1997.621926"},{"key":"2645_CR9","unstructured":"Asiml, M., & Jeotil, V. (2007). On image encryption: Comparison between AES and a novel chaotic encryption scheme. In IEEE\u2013ICSCN 2007, MIT Campus, Anna University, Chennai, India, 22\u201324 February 2007 (pp. 65\u201369)."},{"key":"2645_CR10","doi-asserted-by":"crossref","first-page":"145","DOI":"10.1002\/0470017406","volume-title":"Theory and application of OFDM and CDMA wideband wireless communications","author":"H Schulze","year":"2005","unstructured":"Schulze, H., & Luders, C. (2005). Theory and application of OFDM and CDMA wideband wireless communications (pp. 145\u2013264). London: Wiley."},{"key":"2645_CR11","doi-asserted-by":"crossref","unstructured":"Al-Dhahir, N., & Minn, H. (2005). A new multicarrier transceiver based on the discrete cosine transform. In Proceedings of the IEEE wireless communications and networking conference, 13\u201317 March 2005 (Vol. 1, pp. 45\u201350).","DOI":"10.1109\/WCNC.2005.1424474"},{"key":"2645_CR12","unstructured":"Tan, P., & Beaulieu, N. C. (2005). An improved DCT-based OFDM data transmission scheme. In Proceedings of the IEEE 16th PIMRC\u201905."},{"key":"2645_CR13","volume-title":"Simulation and software radio for mobile communications","author":"H Harada","year":"2002","unstructured":"Harada, H., & Prasad, R. (2002). Simulation and software radio for mobile communications. London: House Universal Personal Communications Library."},{"key":"2645_CR14","doi-asserted-by":"crossref","unstructured":"Abdullah, K., & Hussain, Z. M. (2007). Performance of Fourier-based and wavelet-based OFDM for DVB-T systems. In Proceedings of the 2007 Australasian telecommunication networks and applications conference, Christchurch, New Zealand.","DOI":"10.1109\/ATNAC.2007.4665248"},{"key":"2645_CR15","unstructured":"Vats, V. B., Garg, K. K., & Abad, A. (2008). Performance analysis of DFT-OFDM, DCT-OFDM, and DWT-OFDM systems in AWGN. In Proceedings of the IEEE fourth international conference on wireless and mobile communications."},{"issue":"7","key":"2645_CR16","doi-asserted-by":"crossref","first-page":"1155","DOI":"10.1109\/TCOMM.2005.851558","volume":"53","author":"D Huang","year":"2005","unstructured":"Huang, D., & Letaief, K. B. (2005). An interference-cancellation scheme for carrier frequency offsets correction in OFDMA systems. IEEE Transactions on Communications, 53(7), 1155\u20131165.","journal-title":"IEEE Transactions on Communications"},{"key":"2645_CR17","doi-asserted-by":"crossref","unstructured":"Coppersmith, D. (1994). The data encryption standard (DES) and its strength against attacks. IBM Journal of Research and Development, 38(3), 243\u2013250.","DOI":"10.1147\/rd.383.0243"},{"key":"2645_CR18","unstructured":"Nechvatal, J. (2000). Report on the development of the advanced encryption standard (AES). National Institute of Standards and Technology."},{"key":"2645_CR19","unstructured":"Kim, G. H., Kim, J. N., & Cho, G. Y. (2009). An improved RC6 algorithm with the same structure of encryption and decryption. In ICACT."},{"key":"2645_CR20","first-page":"288","volume-title":"The block cipher Rijndael, smart card research and applications, LNCS 1820","author":"J Daemen","year":"2000","unstructured":"Daemen, J., & Rijmen, V. (2000). The block cipher Rijndael, smart card research and applications, LNCS 1820 (pp. 288\u2013296). Berlin: Springer."},{"key":"2645_CR21","unstructured":"Federal Information Processing Standards Publication 197. Advanced Encryption Standard, November 2001."},{"key":"2645_CR22","unstructured":"Daemen, J., & Rijmen, V. (1999). The Rijndael block cipher. AES Proposal: Rijndael, Document version 2."},{"key":"2645_CR23","unstructured":"Buchholz, J. J. (2001). Matlab implementation of the advanced encryption standard."},{"issue":"3","key":"2645_CR24","first-page":"241","volume":"5","author":"N El-Fishawy","year":"2007","unstructured":"El-Fishawy, N., & Abu Zaid, O. M. (2007). Quality of encryption measurement of bitmap images with RC6, MRC6, and Rijndael block cipher algorithms. International Journal of Network Security, 5(3), 241\u2013251.","journal-title":"International Journal of Network Security"},{"key":"2645_CR25","volume-title":"Cryptography: Theory and practice","author":"D Stinson","year":"2002","unstructured":"Stinson, D. (2002). Cryptography: Theory and practice (2nd ed.). Boca Raton, USA: Chapman and Hall CRC.","edition":"2"},{"key":"2645_CR26","doi-asserted-by":"crossref","unstructured":"Li, S., Zheng, X., Mou, X., & Cai, Y. (2002). Chaotic encryption scheme for real-time digital video. In Proceedings of SPIE (Vol. 4666, pp. 149\u2013160).","DOI":"10.1117\/12.458527"},{"issue":"3\u20134","key":"2645_CR27","doi-asserted-by":"crossref","first-page":"127","DOI":"10.1016\/S0375-9601(01)00612-0","volume":"290","author":"S Li","year":"2001","unstructured":"Li, S., Mou, X., & Cai, Y. (2001). Improving security of a chaotic encryption approach. Physics Letters A, 290(3\u20134), 127\u2013133.","journal-title":"Physics Letters A"},{"key":"2645_CR28","unstructured":"Han, F., Yu, X., & Han, S. (2006). Improved baker map for image encryption. In The 1st international symposium on systems and control in aerospace and astronautics (ISSCAA), 19\u201321 January 2006 (pp. 1273\u20131276)."},{"issue":"2\u20134","key":"2645_CR29","doi-asserted-by":"crossref","first-page":"645","DOI":"10.1016\/j.physa.2005.01.001","volume":"351","author":"S Lian","year":"2005","unstructured":"Lian, S., Sun, J., & Wang, Z. (2005). Security analysis of a chaos-based image encryption algorithm. Physica A: Statistical and Theoretical Physics, 351(2\u20134), 645\u2013661.","journal-title":"Physica A: Statistical and Theoretical Physics"},{"issue":"7","key":"2645_CR30","doi-asserted-by":"crossref","first-page":"715","DOI":"10.1016\/j.cnsns.2004.03.006","volume":"10","author":"NK Pareek","year":"2005","unstructured":"Pareek, N. K., Patidar, V., & Sud, K. K. (2005). Cryptography using multiple one-dimensional chaotic maps. Communications in Nonlinear Science and Numerical Simulation, 10(7), 715\u2013723.","journal-title":"Communications in Nonlinear Science and Numerical Simulation"},{"key":"2645_CR31","volume-title":"Chaos-based encryption for digital images and videos. Multimedia Security Handbook","author":"G Chen","year":"2004","unstructured":"Chen, G., Zheng, X., & Li, S. (2004). Chaos-based encryption for digital images and videos. Multimedia Security Handbook. Boca Raton, USA: CRC Press."},{"key":"2645_CR32","volume-title":"Encyclopedia of cryptography and security","author":"CA Henk","year":"2005","unstructured":"Henk, C. A., & Tilborg, V. (2005). Encyclopedia of cryptography and security. Berlin: Springer."},{"key":"2645_CR33","doi-asserted-by":"crossref","unstructured":"Kim, D., & St\u00fcber, G. L. (1998). Residual ISI cancellation for OFDM with applications to HDTV broadcasting. IEEE Journal on Selected Areas in Communications, 16(8), 1590\u20131599.","DOI":"10.1109\/49.730464"},{"key":"2645_CR34","doi-asserted-by":"crossref","unstructured":"Yang, G. H., Shen, D., & Li, V. O. K. (2004). UEP for video transmission in space\u2013time coded OFDM systems. In IEEE INFOCOM.","DOI":"10.1109\/INFCOM.2004.1357006"},{"key":"2645_CR35","unstructured":"Rahman, M. I., Das, S. S., & Fitzek, F. H. P. (2005). OFDM based WLAN systems. Center for TeleInFrastruktur (CTiF), Technical report R-04-1002; v1.2, 18 February 2005."},{"key":"2645_CR36","unstructured":"Andrews, J. G., Ghosh, A., & Muhamed, R. (2007). Fundamentals of WiMAX understanding broadband wireless networking. Prentice Hall communications engineering and emerging technologies series (pp. 113\u2013145)."},{"key":"2645_CR37","doi-asserted-by":"crossref","unstructured":"Zhang, J., & Li, B. (2008). New modulation identification scheme for OFDM in multipath Rayleigh fading channel. In International symposium on computer science and computational technology.","DOI":"10.1109\/ISCSCT.2008.192"},{"key":"2645_CR38","unstructured":"Chu, H. S., Park, B. S., An, C. K., Kang, J. S. & Son, H. G. (2007). Wireless image transmission based on adaptive OFDM system. In IEEE."},{"key":"2645_CR39","doi-asserted-by":"crossref","unstructured":"Mandyam, G. D. (2003). On the discrete cosine transform and OFDM systems. Nokia Research Center. 6000 Connection Drive, Irving, TX 75039 USA, IEEE, ICASSP 2003.","DOI":"10.1109\/ICASSP.2003.1202700"},{"key":"2645_CR40","doi-asserted-by":"crossref","unstructured":"Misiti, M., Misiti, Y., & Oppenheim, G. (2007). Wavelets and their applications. Jean-Michel Poggi published in Great Britain and the United States by ISTE Ltd.","DOI":"10.1002\/9780470612491"},{"key":"2645_CR41","doi-asserted-by":"crossref","DOI":"10.1007\/978-1-4612-1768-8","volume-title":"Signal analysis and prediction","author":"A Prochazka","year":"1998","unstructured":"Prochazka, A., Uhlir, J., Rayner, P. J. W., & Kingsbury, N. J. (1998). Signal analysis and prediction. Basel: Birkhauser."},{"key":"2645_CR42","doi-asserted-by":"crossref","unstructured":"Muquet, B., Wang, Z., Giannakis, G. B., Courville, M., & Duhamel, P. (2002). Cyclic prefixing or zero padding for wireless multicarrier transmissions. IEEE Transactions on Communications, 50(12).","DOI":"10.1109\/TCOMM.2002.806518"},{"key":"2645_CR43","doi-asserted-by":"crossref","unstructured":"Li, B., Zhou, S., Stojanovic, M., Freitag, L., Willett, P. (2007). Non-uniform Doppler compensation for zero-padded OFDM over fast-varying under water acoustic channels. In OCEANS 2007\u2014Europe, IEEE.","DOI":"10.1109\/OCEANSE.2007.4302478"},{"key":"2645_CR44","doi-asserted-by":"crossref","unstructured":"Athaudage, C. R. N., & Angiras, R. R. V. (2005). Sensitivity of FFT-equalised zero-padded OFDM systems to time and frequency synchronization errors. IEE Proceedings-Communications, 152(6).","DOI":"10.1049\/ip-com:20045333"},{"key":"2645_CR45","doi-asserted-by":"crossref","unstructured":"Fridrich, J. (1998). Symmetric ciphers based on two-dimensional chaotic maps. International Journal of Bifurcation and Chaos, 8(6), 1259\u20131284.","DOI":"10.1142\/S021812749800098X"},{"key":"2645_CR46","doi-asserted-by":"crossref","unstructured":"Yun-Peng, Z., Wei, L., Shui-Ping, C., Zheng-Jun, Z., Xuan, N., & Wei-Di, D. (2009). Digital image encryption algorithm based on chaos and improved DES. In IEEE international conference on systems, man and cybernetics (pp. 474\u2013479).","DOI":"10.1109\/ICSMC.2009.5346839"},{"key":"2645_CR47","doi-asserted-by":"crossref","unstructured":"Wei-bin, C., & Xin, Z. (2009). Image encryption algorithm based on Henon chaotic system. In IEEE.","DOI":"10.1109\/IASP.2009.5054653"},{"key":"2645_CR48","doi-asserted-by":"crossref","unstructured":"Wang, X., & Zhao, D. (2006). Image encryption based on anamorphic fractional Fourier transform and three-step phase-shifting interferometry. Optics Communications, 268(2), 240\u2013244.","DOI":"10.1016\/j.optcom.2006.07.024"},{"key":"2645_CR49","doi-asserted-by":"crossref","unstructured":"Liu, S., Sun, J., Xu, Z., & Liu, J. (2008). Analysis on an image encryption algorithm. In IEEE international workshop on education technology and training and 2008 international workshop on geoscience and remote sensing.","DOI":"10.1109\/ETTandGRS.2008.239"},{"key":"2645_CR50","doi-asserted-by":"crossref","first-page":"2141","DOI":"10.1007\/s11277-014-1977-7","volume":"79","author":"NF Soliman","year":"2014","unstructured":"Soliman, N. F., Albagory, Y., Elbendary, M. A. M., Al-Hanafy, W., El-Rabaie, E.-S. M., Alshebeili, S. A., & Abd El-Samie, F. E. (2014). Chaotic interleaving for robust image transmission with LDPC coded OFDM. Wireless Personnel Communications, 79, 2141\u20132154. doi: 10.1007\/s11277-014-1977-7 .","journal-title":"Wireless Personnel Communications"},{"key":"2645_CR51","doi-asserted-by":"crossref","unstructured":"Cao, P., Hu, X. F., Wu, J., Zhang, L., Jiang, X., & Su, Y. (2014). Physical layer encryption in OFDM-PON employing time variable keys from ONUs. IEEE Photonics Journal, 6(2).","DOI":"10.1109\/JPHOT.2014.2311451"}],"container-title":["Wireless Personal Communications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-015-2645-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11277-015-2645-2\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-015-2645-2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,8,28]],"date-time":"2019-08-28T00:32:39Z","timestamp":1566952359000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11277-015-2645-2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,7,6]]},"references-count":51,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2015,9]]}},"alternative-id":["2645"],"URL":"https:\/\/doi.org\/10.1007\/s11277-015-2645-2","relation":{},"ISSN":["0929-6212","1572-834X"],"issn-type":[{"value":"0929-6212","type":"print"},{"value":"1572-834X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2015,7,6]]}}}