2014
DOI: 10.1049/iet-ipr.2013.0598
|View full text |Cite
|
Sign up to set email alerts
|

Lossless chaos‐based crypto‐compression scheme for image protection

Abstract: In this study, the authors proposed a new scheme which performs both lossless compression and encryption of images. Lossless compression is done by arithmetic coding (AC) while encryption is based on a chaos-based pseudorandom bit generator. Hence, they proposed to incorporate recent results of chaos theory into AC in order to shuffle the cumulative frequency vector of input symbols chaotically to make AC secure and the decoding process completely key-dependent. Many other techniques based on varying the stati… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
13
0
2

Year Published

2015
2015
2022
2022

Publication Types

Select...
6
1

Relationship

1
6

Authors

Journals

citations
Cited by 21 publications
(15 citation statements)
references
References 38 publications
0
13
0
2
Order By: Relevance
“…The AC implementation used during the experiment analysis was based on [9,22]. In this paper, we proposed to analyze our method on three well-known 8-bit grayscale image sets which are:…”
Section: Resultsmentioning
confidence: 99%
“…The AC implementation used during the experiment analysis was based on [9,22]. In this paper, we proposed to analyze our method on three well-known 8-bit grayscale image sets which are:…”
Section: Resultsmentioning
confidence: 99%
“…The second one is the chaos based theory. It is known that the chaotic system can offer an efficient encryption method in cryptography . If the initial keys are not known to the legitimate receiver, they can not decrypt the permutation encryption.…”
Section: Simulations and Analysismentioning
confidence: 99%
“…Many cryptosystems based on EC have been developed. Among them we have encryption schemes such as Elliptic Curve Integrated Encryption Scheme (ECIES) [5] [11], ElGamal's analog [9] and Massey-Omura's analog [9]; key agreement protocols like Elliptic Curve Diffie-Hellman (ECDH) key exchange [5]; digital signatures protocols like Elliptic Curve Digital Signature Algorithm (ECDSA) and Edwards curve Digital Signature Algorithm (EdDSA) [5]; pseudo-random generators [5], etc.…”
Section: Introductionmentioning
confidence: 99%
“…The execution time needed in decompression is also a limit in schemes based on DWT. Another platform, chaos-based cryptography, has also been used for image crypto-compression ( [8], [11]). However, although it is fast, it lacks robustness and good security, as mentioned in [18].…”
Section: Introductionmentioning
confidence: 99%