2014
DOI: 10.1155/2014/910106
|View full text |Cite
|
Sign up to set email alerts
|

Chaos Based Joint Compression and Encryption Framework for End-to-End Communication Systems

Abstract: Augmentation in communication and coding technology has made encryption an integral part of secure multimedia communication systems. Security solution for end-to-end image transmission requires content adaptation at intermediate nodes, which consumes significant resources to decrypt, process, and reencrypt the secured data. To save the computational resources, this paper proposes a network-friendly encryption technique, which can be implemented in transparency to content adaptation techniques. The proposed enc… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

1
8
0

Year Published

2016
2016
2023
2023

Publication Types

Select...
9

Relationship

1
8

Authors

Journals

citations
Cited by 14 publications
(9 citation statements)
references
References 22 publications
1
8
0
Order By: Relevance
“…This process can save storage space for images and tight transmission security of pictorial information more efficiently. In contrast, Goel, N et al [35] combined a lossy compression technique using DCT method with a lossless compression technique using Huffman coding, followed by symmetric cryptosystem technique using Logistic Map method. This paper highlights anything to do with Huffman coding in the view of the proposed image encryption method.…”
Section: Combination Of Lossy and Lossless Compression Methods Withmentioning
confidence: 99%
“…This process can save storage space for images and tight transmission security of pictorial information more efficiently. In contrast, Goel, N et al [35] combined a lossy compression technique using DCT method with a lossless compression technique using Huffman coding, followed by symmetric cryptosystem technique using Logistic Map method. This paper highlights anything to do with Huffman coding in the view of the proposed image encryption method.…”
Section: Combination Of Lossy and Lossless Compression Methods Withmentioning
confidence: 99%
“…The results shows that the proposed algorithm giving better compression ratio with better security during transmission. Goel, N et al [16] has combined the lossy and lossless compression methods. DCT is used for lossy compression and Huffman coding is used for lossless compression methodology.…”
Section: Literature Reviewmentioning
confidence: 99%
“…So the quality of service mainly depends on fast and correct path search. To find the desired video stream by using the mechanism of minimum hop counts towards the storage peer and to avoid the unnecessary query forwarding as well as to minimize the inter server gossiping during the chunk transfer [12,13], the major routing protocols for wireless ad hoc networks have traditionally focused on finding paths with minimum hop count (MHC). However, such paths can include slow or lossy links, leading to poor throughput [14].…”
Section: Introductionmentioning
confidence: 99%
“…Run length coding (RLC) is used to do the first level of compression. Variable length coding (VLC) does the next level of compression [12,20]. After quantization, the majority of high-frequency DCT coefficients become zeroes.…”
Section: Introductionmentioning
confidence: 99%