期刊文献+

随机区间置换的安全算术编码及应用

Image encryption based on key-controlled interval exchanging arithmetic coding
下载PDF
导出
摘要 基于压缩编码的加密方式能够同时完成加密和压缩的功能,通过压缩减少了信息的冗余,同时引入加密使对试图推测出明文信息和找到密钥的攻击具有非常好的鲁棒性。提出了一种基于随机区间置换的安全算术编码,在编码过程中通过随机密钥保证图像压缩编码的安全性,且不影响编码的效率,使其方便在网络中安全传输。实验结果和安全性分析表明该安全算术编码有较好的安全性和加密效率。 Encryption based on compression can provide compression and encryption in a single step,in which redundancy is removed by compression and security is guaranteed by encryption.A novel secure arithmetic coding scheme based on interval exchanging is proposed in this paper,and it is applied to image encryption.It’s found images can be transmitted securely on the Internet and the proposed algorithm dose not bring extra expense in terms of coding efficiency.Experimental results and security analyses indicate that the algorithm has good security strength as well as high encryption efficiency.
出处 《重庆大学学报(自然科学版)》 EI CAS CSCD 北大核心 2015年第6期159-164,共6页 Journal of Chongqing University
基金 国家自然科学基金资助项目(61170249)~~
关键词 算术编码 联合压缩加密 区间置换 BAKER映射 arithmetic coding joint compression and encryption interval exchange Baker map ping
  • 相关文献

参考文献18

  • 1Witten H, Radford M N, John G C, et al. Arithmetic coding for data compression[J]. Communications of the ACM. 1987, 30(6): 520-540.
  • 2Pande A, Mohapatra P, Zambren J, et al. Securing multimedia content using joint compression and encryp-tion[J]. IEEE Multimedia, 2013, 20 (4):50-61.
  • 3Lin Q Z, Wong K W, Chen J Y. An enhanced variable-length arithmetic coding and encryption scheme using chaotic map [J]. The Journal of Systems and Software, 2013, 86 (5)I 1384-1389.
  • 4Witten I H, Cleary J G. On the privacy afforded by adaptive text compression [J]. Computers & Security, 1988, 7(4) : 397-408.
  • 5Bergen H A, Hogan J M. Data security in a fixed-model arithmetic coding compression algorithm [J]. Computers Security, 1992, 11(5): 445-461.
  • 6Bergen H A, Hogan J M. A chosen plaintext attack on an adaptive arithmetic coding compression algorithm [J]. Computers Security, 1993, 12(2): 157-167.
  • 7赵风光,倪兴芳,姜峰.算术编码与数据加密[J].通信学报,1999,20(4):92-96. 被引量:12
  • 8谢冬青,谢志坚,李超,冷健.关于一种算术编码数据加密方案的密码分析[J].通信学报,2001,22(3):40-45. 被引量:6
  • 9郑浩然,金晨辉.对基于算术编码的一个数据加密算法的已知明文攻击[J].通信学报,2003,24(11):73-78. 被引量:6
  • 10Kim H J, Wen J T, ViUasenor J D. Secure arithmetic coding [J]. IEEE Transactions on Signal Processing, 2007,55(5) :2263-2272.

二级参考文献7

共引文献16

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部