A Modified Chaos-Based Joint Compression and Encryption Scheme

An approach for improving the compression performance of an existing chaos-based joint compression and encryption scheme is proposed. The lookup table used for encryption is dynamically updated in the searching process. Once a partition not matched with the target symbol is visited, this and other partitions mapped to the same symbol are reallocated to a nonvisited symbol. Therefore, the target symbol eventually associates with more partitions and fewer number of iterations are needed to find it. As a result, expansion of the ciphertext is avoided, and the compression ratio is improved. Simulation results show that the proposed modification leads to a better compression performance, whereas the execution efficiency is comparable. The security of the modified scheme is also analyzed in detail.

[1]  Hyungjin Kim,et al.  Secure Arithmetic Coding , 2007, IEEE Transactions on Signal Processing.

[2]  Massimo Alioto,et al.  A Class of Maximum-Period Nonlinear Congruential Generators Derived From the Rényi Chaotic Map , 2007, IEEE Transactions on Circuits and Systems I: Regular Papers.

[3]  Elaine B. Barker,et al.  A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications , 2000 .

[4]  Oscar C. Au,et al.  Adaptive Chosen-Ciphertext Attack on Secure Arithmetic Coding , 2009, IEEE Transactions on Signal Processing.

[5]  Enrico Magli,et al.  Multimedia Selective Encryption by Means of Randomized Arithmetic Coding , 2006, IEEE Transactions on Multimedia.

[6]  K. P. Subbalakshmi,et al.  Cryptanalysis of Some Multimedia Encryption Schemes , 2008, IEEE Transactions on Multimedia.

[7]  Kwok-Wo Wong,et al.  Embedding Compression in Chaos-Based Cryptography , 2008, IEEE Transactions on Circuits and Systems II: Express Briefs.

[8]  M. Baptista Cryptography with chaos , 1998 .

[9]  Hyungjin Kim,et al.  Binary arithmetic coding with key-based interval splitting , 2006, IEEE Signal Processing Letters.

[10]  Oscar C. Au,et al.  Security Analysis of Multimedia Encryption Schemes Based on Multiple Huffman Table , 2007, IEEE Signal Processing Letters.

[11]  手塚 集 Uniform random numbers : theory and practice , 1995 .

[12]  C.-C. Jay Kuo,et al.  Design of integrated multimedia compression and encryption systems , 2005, IEEE Transactions on Multimedia.

[13]  Gonzalo Álvarez,et al.  Some Basic Cryptographic Requirements for Chaos-Based Cryptosystems , 2003, Int. J. Bifurc. Chaos.

[14]  Shu Tezuka,et al.  Uniform Random Numbers , 1995 .

[15]  Chung-Ming Ou Design of block ciphers by simple chaotic functions , 2008, IEEE Computational Intelligence Magazine.