Embedding adaptive arithmetic coder in chaos-based cryptography

被引:4
|
作者
Li Heng-Jian [1 ]
Zhang Jia-Shu [1 ]
机构
[1] SW Jiaotong Univ, Sichuan Prov Key Lab Signal & Informat Proc, Chengdu 610031, Peoples R China
基金
中国国家自然科学基金;
关键词
chaos; cryptography; compression; arithmetic coding; COMPRESSION; SCHEME; CRYPTANALYSIS; SECURE;
D O I
10.1088/1674-1056/19/5/050508
中图分类号
O4 [物理学];
学科分类号
0702 ;
摘要
In this study an adaptive arithmetic coder is embedded in the Baptista-type chaotic cryptosystem for implementing secure data compression. To build the multiple lookup tables of secure data compression, the phase space of chaos map with a uniform distribution in the search mode is divided non-uniformly according to the dynamic probability estimation of plaintext symbols. As a result, more probable symbols are selected according to the local statistical characters of plaintext and the required number of iterations is small since the more probable symbols have a higher chance to be visited by the chaotic search trajectory. By exploiting non-uniformity in the probabilities under which a number of iteration to be coded takes on its possible values, the compression capability is achieved by adaptive arithmetic code. Therefore, the system offers both compression and security. Compared with original arithmetic coding, simulation results on Calgary Corpus files show that the proposed scheme suffers from a reduction in compression performance less than 12% and is not susceptible to previously carried out attacks on arithmetic coding algorithms.
引用
收藏
页码:0505018 / 0505089
页数:9
相关论文
共 50 条
  • [1] Embedding adaptive arithmetic coder in chaos-based cryptography
    李恒建
    张家树
    ChinesePhysicsB, 2010, 19 (05) : 125 - 133
  • [2] Cryptanalysis of a chaos-based cryptosystem with an embedded adaptive arithmetic coder
    王兴元
    谢旖欣
    Chinese Physics B, 2011, (08) : 101 - 109
  • [3] Cryptanalysis of a chaos-based cryptosystem with an embedded adaptive arithmetic coder
    Wang Xing-Yuan
    Xie Yi-Xin
    CHINESE PHYSICS B, 2011, 20 (08)
  • [4] Embedding Compression in Chaos-Based Cryptography
    Wong, Kwok-Wo
    Yuen, Ching-Hung
    IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS II-EXPRESS BRIEFS, 2008, 55 (11) : 1193 - 1197
  • [5] A Survey of Chaos-based Cryptography
    Zhen, Ping
    Zhao, Geng
    Min, Lequan
    Li, Xiaodong
    2014 NINTH INTERNATIONAL CONFERENCE ON P2P, PARALLEL, GRID, CLOUD AND INTERNET COMPUTING (3PGCIC), 2014, : 237 - 244
  • [6] Chaos-based Cryptography for Color Images
    Cangea, Otilia
    Paraschiv, Nicolae
    2018 22ND INTERNATIONAL CONFERENCE ON SYSTEM THEORY, CONTROL AND COMPUTING (ICSTCC), 2018, : 510 - 515
  • [7] Chaos-based Cryptography for Cloud Computing
    Tobin, P.
    Tobin, L.
    Mc Keever, M.
    Blackledge, J.
    2016 27TH IRISH SIGNALS AND SYSTEMS CONFERENCE (ISSC), 2016,
  • [8] Hardware Trojans detection in chaos-based cryptography
    Melosik, M.
    Sniatala, P.
    Marszalek, W.
    BULLETIN OF THE POLISH ACADEMY OF SCIENCES-TECHNICAL SCIENCES, 2017, 65 (05) : 725 - 732
  • [9] Chaos-based Cryptography Using an Underactuated Synchronizer
    Gularte, Kevin H. M.
    Gomez, Juan C. G.
    Vargas, Jose A. R.
    dos Santos, Rogerio R.
    2021 14TH IEEE INTERNATIONAL CONFERENCE ON INDUSTRY APPLICATIONS (INDUSCON), 2021, : 1303 - 1308
  • [10] An Adaptive Control Approach to Securely Transmit Colored Images using Chaos-based Cryptography
    Zaher, Ashraf A.
    Yousafzai, Jibran
    2019 IEEE 62ND INTERNATIONAL MIDWEST SYMPOSIUM ON CIRCUITS AND SYSTEMS (MWSCAS), 2019, : 953 - 956