Chaos Based Joint Compression and Encryption Framework for End-to-End Communication Systems

被引:10
作者
Goel, Nidhi [1 ]
Raman, Balasubramanian [2 ]
Gupta, Indra [3 ]
机构
[1] Delhi Technol Univ, Dept Elect & Commun Engn, New Delhi 110042, India
[2] Indian Inst Technol, Dept Comp Sci Engn, Roorkee 247667, Uttar Pradesh, India
[3] Indian Inst Technol, Dept Elect Engn, Roorkee 247667, Uttar Pradesh, India
关键词
D O I
10.1155/2014/910106
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Augmentation in communication and coding technology has made encryption an integral part of secure multimedia communication systems. Security solution for end-to-end image transmission requires content adaptation at intermediate nodes, which consumes significant resources to decrypt, process, and reencrypt the secured data. To save the computational resources, this paper proposes a network-friendly encryption technique, which can be implemented in transparency to content adaptation techniques. The proposed encryption technique maintains the compression efficiency of underlying entropy coder, and enables the processing of encrypted data. Thorough analysis of the technique, as regards various standard evaluation parameters and attack scenarios, demonstrates its ability to withstand known-plaintext, ciphertext-only, and approximation attacks. This justifies its implementation for secure image transmission for end-to-end communication systems.
引用
收藏
页数:10
相关论文
共 50 条
[41]   Deep Learning Based End-to-End Wireless Communication Systems Without Pilots [J].
Ye, Hao ;
Li, Geoffrey Ye ;
Juang, Biing-Hwang .
IEEE TRANSACTIONS ON COGNITIVE COMMUNICATIONS AND NETWORKING, 2021, 7 (03) :702-714
[42]   PyTFHE: An End-to-End Compilation and Execution Framework for Fully Homomorphic Encryption Applications [J].
Ma, Jiaao ;
Xu, Ceyu ;
Wills, Lisa Wu .
2023 IEEE INTERNATIONAL SYMPOSIUM ON PERFORMANCE ANALYSIS OF SYSTEMS AND SOFTWARE, ISPASS, 2023, :24-34
[43]   Overfitting and Underfitting Analysis for Deep Learning Based End-to-end Communication Systems [J].
Zhang, Haotian ;
Zhang, Lin ;
Jiang, Yuan .
2019 11TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS AND SIGNAL PROCESSING (WCSP), 2019,
[44]   State-free End-to-End Encrypted Storage and Chat Systems based on Searchable Encryption [J].
Emura, Keita ;
Ito, Ryoma ;
Kanamori, Sachiko ;
Nojima, Ryo ;
Watanabe, Yohei .
ICEIS: PROCEEDINGS OF THE 24TH INTERNATIONAL CONFERENCE ON ENTERPRISE INFORMATION SYSTEMS - VOL 2, 2022, :106-113
[45]   POLYNOMIAL END-TO-END COMMUNICATION [J].
AWERBUCH, B ;
MANSOUR, Y ;
SHAVIT, N .
30TH ANNUAL SYMPOSIUM ON FOUNDATIONS OF COMPUTER SCIENCE, 1989, :358-363
[46]   Computational imaging systems: joint design and end-to-end optimality [J].
Mirani, Tejaswini ;
Rajan, Dinesh ;
Christensen, Marc P. ;
Douglas, Scott C. ;
Wood, Sally L. .
APPLIED OPTICS, 2008, 47 (10) :B86-B103
[47]   Analytical framework for end-to-end channel capacity in molecular communication system [J].
Aya El-Fatyany ;
Hongzhi Wang ;
Mehak Khan ;
Saied M. Abd El-atty .
Multimedia Tools and Applications, 2024, 83 :527-550
[48]   Analytical framework for end-to-end channel capacity in molecular communication system [J].
El-Fatyany, Aya ;
Wang, Hongzhi ;
Khan, Mehak ;
El-atty, Saied M. Abd .
Multimedia Tools and Applications, 2024, 83 (01) :527-550
[49]   Analytical framework for end-to-end channel capacity in molecular communication system [J].
El-Fatyany, Aya ;
Wang, Hongzhi ;
Khan, Mehak ;
El-atty, Saied M. Abd .
MULTIMEDIA TOOLS AND APPLICATIONS, 2023, 83 (1) :527-550
[50]   On Track of Sigfox Confidentiality with End-to-End Encryption [J].
Fujdiak, Radek ;
Blazek, Petr ;
Mikhaylov, Konstantin ;
Malina, Lukas ;
Mlynek, Petr ;
Misurec, Jiri ;
Blazek, Vojtech .
13TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY (ARES 2018), 2019,