scispace - formally typeset
Journal ArticleDOI

Embedding Compression in Chaos-Based Cryptography

Reads0
Chats0
TLDR
An algorithm for embedding compression in the Baptista-type chaotic cryptosystem is proposed and it is shown that the compression performance on standard test files is satisfactory while the security is not compromised.
Abstract
An algorithm for embedding compression in the Baptista-type chaotic cryptosystem is proposed. The lookup table used for encryption is determined adaptively by the probability of occurrence of plaintext symbols. As a result, more probable symbols will have a higher chance to be visited by the chaotic search trajectory. The required number of iterations is small and can be represented by a short code. The compression capability is thus achieved. Simulation results show that the compression performance on standard test files is satisfactory while the security is not compromised. Our scheme also guarantees that the ciphertext is not longer than the plaintext.

read more

Citations
More filters
Journal ArticleDOI

Breaking a modified substitution-diffusion image cipher based on chaotic standard and logistic maps

TL;DR: The modified Patidar et al. scheme is still insecure against the same known/chosen-plaintext attack, and some other security defects existing in both the original and the modified schemes are reported.
Posted Content

Embedding Cryptographic Features in Compressive Sensing

TL;DR: It is demonstrated that random permutation is an acceptable permutation with overwhelming probability, which can effectively relax the Restricted Isometry Constant for parallel compressive sensing and is utilized to design a secure parallel compression sensing scheme.
Journal ArticleDOI

Embedding cryptographic features in compressive sensing

TL;DR: Wang et al. as discussed by the authors proposed some possible encryption models for CS and demonstrated that random permutation is an acceptable permutation with overwhelming probability, which can effectively relax the Restricted Isometry Constant for parallel compressive sensing.
Journal ArticleDOI

A chaos-based joint image compression and encryption scheme using DCT and SHA-1

TL;DR: A chaos-based joint image compression and encryption algorithm using discrete cosine transformation (DCT) and Secure Hash Algorithm-1 (SHA-1) is proposed that is efficient and highly sensitive to both the key and the plain-image.
Journal ArticleDOI

Simultaneous Arithmetic Coding and Encryption Using Chaotic Maps

TL;DR: A simultaneous compression and encryption scheme is proposed in which the chaotic map model for arithmetic coding is determined by a secret key and keeps changing, and the compressed sequence is masked by a pseudorandom keystream generated by another chaotic map.
References
More filters
ReportDOI

A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications

TL;DR: Some criteria for characterizing and selecting appropriate generators and some recommended statistical tests are provided, as a first step in determining whether or not a generator is suitable for a particular cryptographic application.
Journal ArticleDOI

Some basic cryptographic requirements for chaos-based cryptosystems

TL;DR: The suggested guidelines address three main issues: implementation, key management and security analysis, aiming at assisting designers of new cryptosystems to present their work in a more systematic and rigorous way to fulfill some basic cryptographic requirements.
Journal ArticleDOI

Cryptographic requirements for chaotic secure communications

TL;DR: In this paper, the authors provide a set of guidelines that new cryptosystems would benefit from adhering to, such as correct key management and security analysis, and some practical aspects of communications such as channel noise, limited bandwith, and attenuation.
Journal ArticleDOI

Cryptography with chaos

TL;DR: It is possible to encrypt a message using the ergodic property of the simple low-dimensional and chaotic logistic equation, in order to transfer the trajectory from an initial condition towards an ϵ-interval inside the logistic chaotic attractor.
Journal ArticleDOI

Design of integrated multimedia compression and encryption systems

TL;DR: This research examines the limitations of selective encryption using cryptanalysis, and proposes another approach that turns entropy coders into encryption ciphers using multiple statistical models that can be applied to most modern compressed audio/video such as MPEG audio, MPEG video, and JPEG/JPEG2000 images.
Related Papers (5)