Recovery of Image through Alamouti Channel with Incorporation of RSA Algorithm

In many applications, it is necessary to transmit images at a remote station, where wired Internet service is not available. In this case, wireless local loop (WLL) can help in making wireless link between one end node of the internet and remote service center. In such link, the communication is heavily affected by large and small scale fading; hence the received signal experiences huge distortion in case of forward error correction. Otherwise, huge service delay arises due to frequent negative acknowledgements. To combat the situation, we can choose Alamouti channel of full rate and fully orthogonal space-time block code (OSTBC). Our aim is to transmit images through Alamouti channel and to observe the quality of the recovered image, in context of bit error rate (BER). We have also observed the impact of fading and additive white Gaussian noise (AWGN) on the image without application of error correction or detection technique of channel coding. To ensure security, we apply the RSA algorithm on each pixel prior transmitting and decrypt them at the receiving end, where we found no impairment from the algorithm. Finally, we observe that the relative performance of the system changes digital modulation schemes.


Introduction
Two most important limitations of wireless communication are: the range or length of link and data rate (related to channel capacity).To overcome these limitations, researchers have given their effort on space diversity and multicarrier parallel transmission called orthogonal frequency division multiplexing (OFDMA) of [1] [2].A number of algorithms are proposed on transmitting side in [2]- [7] for attaining space diversity hence getting high signal-to-noise ratio (SNR) at receiving end.A communication model, where space-time block code (STBC) at the physical layer, with channel coding (linear block code) at the data link layer is shown in [8]- [10] and performances were measured in context of BER.A diversity coding can be used in multiple-input multipleoutput (MIMO) to provide high data rate without requiring additional bandwidth and transmit power.It is noted that Alamouti space-time block coding has showed good performance than other techniques comparatively.This motivates us to use Alamouti channel for transmitting different types of images like "medical images", "secured watermark", "biometric identification" at a remote station.
Several digital modulation schemes i.e. binary phase-shift keying (BPSK), quadrature phase-shift keying (QPSK), quadrature amplitude modulation (QAM) are used to measure the performance of the system in [11] [12].It is observed that a well-known cryptographic algorithm RSA [13] is used by researchers [7] for ensuring security of the transmitted message.Research [14]- [16] on MIMO with maximal ratio combining (MRC), selection combining (SC) and equal gain combining (EGC) diversity reception over several correlated and uncorrelated fading channels is also going on.
In this research, Alamouti space-time block coding is applied on transmission channel with incorporation of RSA, for successful recovery of an image.We summarize our key contributions as follows:  We proposed an algorithm to transmit image through Alamouti channel because of its full spatial diversity gain and observe the quality of recovered image by measuring the bit error rate. Furthermore, to ensure security we apply the RSA algorithm on each pixel of the image. We perform a number of experiments over Rayleigh fading channels by varying SNR and by applying 16-QAM modulation schemes in order to measure the performance of the system.The remainder of this paper is organized as follows.Section 2 presents our proposed algorithm of recovering image through Alamouti scheme with incorporation of RSA.In Section 3, we present our experimental results in details with respect to a variety of parameters.Finally, Section 4 concludes the paper with future research directions.

System Model
The space-time block code (STBC) is used to achieve orthogonality among transmitted symbols of individual antenna of the MIMO system [17] [18].Alamouti scheme is a full rate OSTBC where two transmits and one receive antenna are used provided the receiver has the knowledge of channel gain.When more than two antennas are used, then orthogonality is possible but transmission rate become 1/2 or 3/4, for example, sporadic code.

Full Rate STBC
Full rate STBC is also possible for the case of transmitted antennas, n T = 2 k , 2,3, 4, k = ; but full orthogonality is not possible and the scheme is called QSTBC explained in [19]- [21].We can apply zero forcing (ZF) on QSTBC to convert its full orthogonal [21] at the expense of noise.In OSTBC the multiplication channel matrix and its conjugate transpose produces a diagonal matrix i.e. the off-diagonal elements are zero.In case of quasiorthogonal, the result produces a few non-zero off-diagonal elements like below:

h h h h h h h h h h h h h h h h h h h h h h
where, each element of the matrix h i indicates the channel gain, In zero forcing decoding technique, the quasi-orthogonal reception is made fully orthogonal.Here we can eliminate interferences at the expense of noise.From MIMO scheme, the received signal vector is [ ] The estimated received signal vector under ZF is where

Y HH H r HH H Hx n HH H H x HH H n I x HH H n x n n HH H n
Now we have to go for better STBC technique, which provides orthogonality among the received symbols at the same time noise is not enhanced like ZF algorithm of above.In this case, we can choose the simplest possible orthogonal STBC of two antenna systems, called Alamouti scheme discussed in next subsection.

Alamouti Scheme
Alamouti scheme is a space-time block code under MISO, where the transmitting end uses two antennas and the receiver side has only one antenna, hence the system has no scope of using combining scheme.It is the only full rate orthogonal STBC discussed in [22].In Alamouti scheme two symbols 1 S and 2 S are transmitted simultaneously by the antennas at instant t and t + T according to Table 1; where T is the duration of a symbol as discussed in [23].
The gain of two wireless links or multipath fading factors is complex expressed as: Now, the output of the linear combiner using the concept of channel knowledge of [24] [25], e e e e j j j j x y y x e e e e e e e e j j j j j j j j y S W 1 0 e e 0 1 e e In 1 y , there is no component of 2 S and in 2 y , there is no component of 1 S , hence the system is fully orthogonal.The simulation of entire Alamouti scheme under fading channel can be represented by the flowchart of Figure 2.

Algorithm
This subsection provides the algorithm of image processing and transmission of the image through fading channel.1. Select an RGB image and convert it to grayscale.Resize the image as the size of N × N. 2. Covert the image to a column vector Γ of size of 1 × N 2 .3. Divide the amplitude of each pixel of column vector by 16 and store the remainder R(i) and quotient Q(i) of ith pixel where Recover each constellation points using orthogonal space diversity algorithm at the receiving end.8. Convert the constellation points to Q(i) and R(i).9. Evaluate the amplitude of pixel using Γ(i) = 16 * Q(i) + R(i).10.Convert the column vector Γ to the matrix N × N in the reverse way of step 2. 11.Smooth the image using DWT with a threshold value.
We can apply RSA algorithm of [27] [28] on R(i) and Q(i) at step 5 to achieve secured communication.

Results
Let us first select a test image (main gate of Jahangirnagar University campus) and apply the algorithm on it for the fading channel of average SNR of 12, 15, 20, 25 and 30 dB.The corresponding results are shown in Figures 3-7.The recovered image is found appreciable at a glance for 20 dB or above.The quality of received image improves at higher SNR is visualized from the figures.We can get better results by applying lower modulation scheme like, BPSK, QPSK, 8-PSK instead of 16-QAM, although throughput is higher at higher modulation scheme.We measure the BER of the same image (main gate of JU campus) for four different modulation schemes shown in Figure 8, where we get the conventional results, i.e. performance is better for lower modulation scheme.Actually the algorithm has very small effect on different images in context of BER.The phenomenon is shown in Table 2, where we select 6 different images and measure BER under 16-QAM taking SNR

Conclusion
In this paper, we are able to recover an image transmitting through Alamouti channel with incorporation of RSA algorithm; where the quality of the image depends on the SNR of the channel.Although we reveal the results for grayscale images, we can also do the similar job for RGB images as well, sending the R, G and B components separately, then combining and at receiving end.We can apply channel coding scheme like linear block code, convolutional code or CRC (Cyclic Redundancy Code) scheme to enhance the performance of the system.MIMO and combining scheme (maximal ratio combining, equal gain, selection combining) can be considered an alternate technique of improvement of the system.

and 2 W
scenario of Alamouti scheme is visualized from Figure1.The complex received signal at time t t ′ > is expressed as are the AWGN noise.From (1) and (2),

4 .
Since the amplitude of each pixel is in the range of 0 -255 therefore both R(i) and Q(i) has the value in the range of 0 -15 hence we can use the values as the constellation points of 16-QAM.5. Assign each value of R(i) and Q(i) against a constellation point of 16-QAM.6. Transmit the constellation points or symbols against corresponding values of R(i) and Q(i) thorough a Alamouti simulator with Rayleigh fading channel contaminated by AWGN.The flowchart of simulator is shown in Figure 2. 7.

Figure 2 .
Figure 2. Flowchart of Alamouti Simulator.from 12 to 30 dB.Finally, for secured communication we apply RSA algorithm on Q(i) and R(i) of four images.The corresponding results are shown in Figure 9, where we show the original RGB image, its grayscale version, encrypted image and recovered/decrypted image.

Figure 8 .
Figure 8. BER of the image of JU Gate under four different modulation schemes.

Figure 9 .
Figure 9. Encryption and decryption of image.

Table 1 .
Symbol sequence of two antenna elements.

Table 2 .
BER of six test images under 16-QAM.