Chaos Based Joint Compression and Encryption Framework for End-to-End Communication Systems

被引:10
作者
Goel, Nidhi [1 ]
Raman, Balasubramanian [2 ]
Gupta, Indra [3 ]
机构
[1] Delhi Technol Univ, Dept Elect & Commun Engn, New Delhi 110042, India
[2] Indian Inst Technol, Dept Comp Sci Engn, Roorkee 247667, Uttar Pradesh, India
[3] Indian Inst Technol, Dept Elect Engn, Roorkee 247667, Uttar Pradesh, India
关键词
D O I
10.1155/2014/910106
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Augmentation in communication and coding technology has made encryption an integral part of secure multimedia communication systems. Security solution for end-to-end image transmission requires content adaptation at intermediate nodes, which consumes significant resources to decrypt, process, and reencrypt the secured data. To save the computational resources, this paper proposes a network-friendly encryption technique, which can be implemented in transparency to content adaptation techniques. The proposed encryption technique maintains the compression efficiency of underlying entropy coder, and enables the processing of encrypted data. Thorough analysis of the technique, as regards various standard evaluation parameters and attack scenarios, demonstrates its ability to withstand known-plaintext, ciphertext-only, and approximation attacks. This justifies its implementation for secure image transmission for end-to-end communication systems.
引用
收藏
页数:10
相关论文
共 50 条
[21]   Machine Learning Based End-to-End Constellation Training for Communication Systems [J].
Lin, Po-Chiang .
PROCEEDINGS OF 2022 ASIA-PACIFIC SIGNAL AND INFORMATION PROCESSING ASSOCIATION ANNUAL SUMMIT AND CONFERENCE (APSIPA ASC), 2022, :1768-1773
[22]   Optical Fiber Communication Systems Based on End-to-End Deep Learning [J].
Karanov, Boris ;
Chagnon, Mathieu ;
Aref, Vahid ;
Lavery, Domanic ;
Bayvel, Polina ;
Schmalen, Laurent .
2020 IEEE PHOTONICS CONFERENCE (IPC), 2020,
[23]   Towards Efficient End-to-End Encryption for Container Checkpointing Systems [J].
Stoyanov, Radostin ;
Reber, Adrian ;
Ueno, Daiki ;
Clapinski, Michal ;
Vagin, Andrei ;
Bruno, Rodrigo .
PROCEEDINGS OF THE 15TH ACM SIGOPS ASIA-PACIFIC WORKSHOP ON SYSTEMS, APSYS 2024, 2024, :60-66
[24]   End-to-end deep learning-based asymmetric encryption scheme for optical fiber communication [J].
Yao, Yueyi ;
Ma, Jie ;
Lu, Jia ;
Liu, Jianfei ;
Zeng, Xiangye ;
Luo, Mingming .
Optics Communications, 2025, 591
[25]   End-to-end multispectral image compression framework based on adaptive multiscale feature extraction [J].
Kong, Fanqiang ;
Zhao, Shunmin ;
Li, Yunsong ;
Li, Dan .
JOURNAL OF ELECTRONIC IMAGING, 2021, 30 (01)
[26]   An End-to-End Framework for Joint Denoising and Classification of Hyperspectral Images [J].
Li, Xian ;
Ding, Mingli ;
Gu, Yanfeng ;
Pizurica, Aleksandra .
IEEE TRANSACTIONS ON NEURAL NETWORKS AND LEARNING SYSTEMS, 2023, 34 (07) :3269-3283
[27]   Research on end-to-end encryption of TETRA [J].
Beijing FORICH Software Technology Co. Ltd., Network Security Division, Beijing 100083, China ;
不详 .
J. China Univ. Post Telecom., 2006, 2 (70-73) :70-73
[28]   Research on End-to-End Encryption of TETRA [J].
ZHANG Zhihui YANG YixianBeijing FORICH Software Technology Co Ltd Network Security Division Beijing P R ChinaInformation Security Center Beijing University of Posts and Telecommunications Beijing P R China .
The Journal of China Universities of Posts and Telecommunications, 2006, (02) :70-73
[29]   SDNS ARCHITECTURE AND END-TO-END ENCRYPTION [J].
NELSON, R ;
HEIMANN, J .
LECTURE NOTES IN COMPUTER SCIENCE, 1990, 435 :356-366
[30]   Anonymous Traceback for End-to-End Encryption [J].
Kenney, Erin ;
Tang, Qiang ;
Wu, Chase .
COMPUTER SECURITY - ESORICS 2022, PT II, 2022, 13555 :42-62