Chaos Based Joint Compression and Encryption Framework for End-to-End Communication Systems

被引:8
作者
Goel, Nidhi [1 ]
Raman, Balasubramanian [2 ]
Gupta, Indra [3 ]
机构
[1] Delhi Technol Univ, Dept Elect & Commun Engn, New Delhi 110042, India
[2] Indian Inst Technol, Dept Comp Sci Engn, Roorkee 247667, Uttar Pradesh, India
[3] Indian Inst Technol, Dept Elect Engn, Roorkee 247667, Uttar Pradesh, India
关键词
D O I
10.1155/2014/910106
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Augmentation in communication and coding technology has made encryption an integral part of secure multimedia communication systems. Security solution for end-to-end image transmission requires content adaptation at intermediate nodes, which consumes significant resources to decrypt, process, and reencrypt the secured data. To save the computational resources, this paper proposes a network-friendly encryption technique, which can be implemented in transparency to content adaptation techniques. The proposed encryption technique maintains the compression efficiency of underlying entropy coder, and enables the processing of encrypted data. Thorough analysis of the technique, as regards various standard evaluation parameters and attack scenarios, demonstrates its ability to withstand known-plaintext, ciphertext-only, and approximation attacks. This justifies its implementation for secure image transmission for end-to-end communication systems.
引用
收藏
页数:10
相关论文
共 50 条
  • [21] Machine Learning Based End-to-End Constellation Training for Communication Systems
    Lin, Po-Chiang
    PROCEEDINGS OF 2022 ASIA-PACIFIC SIGNAL AND INFORMATION PROCESSING ASSOCIATION ANNUAL SUMMIT AND CONFERENCE (APSIPA ASC), 2022, : 1768 - 1773
  • [22] Towards Efficient End-to-End Encryption for Container Checkpointing Systems
    Stoyanov, Radostin
    Reber, Adrian
    Ueno, Daiki
    Clapinski, Michal
    Vagin, Andrei
    Bruno, Rodrigo
    PROCEEDINGS OF THE 15TH ACM SIGOPS ASIA-PACIFIC WORKSHOP ON SYSTEMS, APSYS 2024, 2024, : 60 - 66
  • [23] End-to-end multispectral image compression framework based on adaptive multiscale feature extraction
    Kong, Fanqiang
    Zhao, Shunmin
    Li, Yunsong
    Li, Dan
    JOURNAL OF ELECTRONIC IMAGING, 2021, 30 (01)
  • [24] An End-to-End Framework for Joint Denoising and Classification of Hyperspectral Images
    Li, Xian
    Ding, Mingli
    Gu, Yanfeng
    Pizurica, Aleksandra
    IEEE TRANSACTIONS ON NEURAL NETWORKS AND LEARNING SYSTEMS, 2023, 34 (07) : 3269 - 3283
  • [25] SDNS ARCHITECTURE AND END-TO-END ENCRYPTION
    NELSON, R
    HEIMANN, J
    LECTURE NOTES IN COMPUTER SCIENCE, 1990, 435 : 356 - 366
  • [26] A European right to end-to-end encryption?
    Shurson, Jessica
    COMPUTER LAW & SECURITY REVIEW, 2024, 55
  • [27] Anonymous Traceback for End-to-End Encryption
    Kenney, Erin
    Tang, Qiang
    Wu, Chase
    COMPUTER SECURITY - ESORICS 2022, PT II, 2022, 13555 : 42 - 62
  • [28] Research on end-to-end encryption of TETRA
    Beijing FORICH Software Technology Co. Ltd., Network Security Division, Beijing 100083, China
    不详
    J. China Univ. Post Telecom., 2006, 2 (70-73): : 70 - 73
  • [29] Research on End-to-End Encryption of TETRA
    ZHANG Zhi-hui 1
    2.Information Security Center
    The Journal of China Universities of Posts and Telecommunications, 2006, (02) : 70 - 73
  • [30] A general end-to-end diagnosis framework for manufacturing systems
    Ye Yuan
    Guijun Ma
    Cheng Cheng
    Beitong Zhou
    Huan Zhao
    Hai-Tao Zhang
    Han Ding
    NationalScienceReview, 2020, 7 (02) : 418 - 429