Skip to main content

Improvement of Security and Feasibility for Chaos-Based Multimedia Cryptosystem

  • Conference paper
Computational Science and Its Applications - ICCSA 2011 (ICCSA 2011)

Part of the book series: Lecture Notes in Computer Science ((LNTCS,volume 6785))

Included in the following conference series:

  • 1320 Accesses

Abstract

Nonlinear dynamic filter (NDF) has been used in chaos-based multimedia cryptosystem. However, our study shows that the key of randomized arithmetic coding (RAC) based on NDF can be successfully recovered under chosen plaintext attack. Moreover, current ciphertext block can’t be decoded unless preceding plaintext is available. In order to enhance the security and feasibility used in multimedia applications, the algorithm is improved by building a new correlation between ciphertext and coefficients. Its security is enhanced that can effectively resist chosen plaintext attack. Its feasibility is also improved that can decode ciphertext block without availability of preceding plaintext with which a user can play multimedia data starting at any place. The analysis and simulations show that the improved algorithm can evidently enhance both security and feasibility

This work was supported by Shenzhen University Research and Development Fund (SZU R/D) with Grant No. 200903.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Wong, K.W., Yuen, C.H.: Embedding compression in chaos-based cryptography. IEEE Transactions on Circuits and Systems II-Express Briefs 55(11), 1193–1197 (2008)

    Article  Google Scholar 

  2. Wu, C.P., Kuo, C.C.J.: Design of integrated multimedia compression and encryption systems. IEEE Transactions on Multimedia 7(5), 828–839 (2005)

    Article  Google Scholar 

  3. Zhou, J.T., Au, O.C., Wong, P.H.W.: Adaptive chosen-ciphertext attack on secure arithmetic coding. IEEE Transactions on Signal Processing 57(5), 1825–1838 (2009)

    Article  MathSciNet  Google Scholar 

  4. Witten, I.H., Neal, R.M., Cleary, J.G.: Arithmetic coding for data compression. Communications of the ACM 30(6), 520–540 (1987)

    Article  Google Scholar 

  5. Chen, R.C., Pai, P.Y., Chan, Y.K., Chang, C.C.: Lossless image compression based on multiple-tables arithmetic coding. Mathematical Problems in Engineering 2009, Article ID 128317 (2009)

    Google Scholar 

  6. Grangetto, M., Magli, E., Olmo, G.: Multimedia selective encryption by means of randomized arithmetic coding. IEEE Transactions on Multimedia 8(5), 905–917 (2006)

    Article  Google Scholar 

  7. Mi, B., Liao, X.F., Chen, Y.: A novel chaotic encryption scheme based on arithmetic coding. Chaos Solitons & Fractals 38(5), 1523–1531 (2008)

    Article  Google Scholar 

  8. Li, H.J., Zhang, J.S.: A secure and efficient entropy coding based on arithmetic coding. Communications in Nonlinear Science and Numerical Simulation 14(12), 4304–4318 (2009)

    Article  MathSciNet  MATH  Google Scholar 

  9. Wen, J.T., Kim, H., Villasenor, J.D.: Binary arithmetic coding with key-based interval splitting. IEEE Signal Processing Letters 13(2), 69–72 (2006)

    Article  Google Scholar 

  10. Kim, H., Wen, J.T., Villasenor, J.D.: Secure arithmetic coding. IEEE Transactions on Signal Processing 55(5), 2263–2272 (2007)

    Article  MathSciNet  Google Scholar 

  11. Bose, R., Pathak, S.: A novel compression an encryption scheme using variable model arithmetic coding and coupled chaotic system. IEEE Transactions on Circuits and Systems I-Regular Papers 53(4), 848–857 (2006)

    Article  MathSciNet  Google Scholar 

  12. Li, M.: Generation of teletraffic of generalized cauchy type. Physica Scripta 81(2), 025007, 10 (2010)

    Article  MATH  Google Scholar 

  13. Zhou, J.T., Au, O.C.: Comments on ‘a novel compression and encryption scheme using variable model arithmetic coding and coupled chaotic system’. IEEE Transactions on Circuits and Systems I-Regular Papers 55(10), 3368–3369 (2008)

    Article  MathSciNet  Google Scholar 

  14. Kelber, K.: N-Dimensional uniform probability distribution in nonlinear autoregressive filter structures. IEEE Transactions on Circuits and Systems I-Fundamental Theory and Applications 47(9), 1413–1417 (2000)

    Article  MathSciNet  MATH  Google Scholar 

  15. Rukhin, A., et al.: A statistical test suite for the validation of random number generators and pseudo-random number generators for cryptographic applications Nat. Inst. Stand. Technol (NIST). Gaithersburg, MD, NIST Special Publication 800-22, May 15 (2001), http://csrc.nist.gov/groups/ST/toolkit/rng/documentation_software.html

  16. Kelber, K., Gotz, M., Schwarz, W.: Generation of chaotic signals with n-dimensional uniform probability distribution by digital filter structures. In: Digital Signal Processing Workshop Proceedings, pp. 486–489 (1996)

    Google Scholar 

  17. Wang, X.M., Zhang, J.S.: Chaotic secure communication based on nonlinear autoregressive filter with changeable parameters. Physics Letters A 357(4-5), 323–329 (2006)

    Article  MATH  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2011 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Chen, J., Zhou, J. (2011). Improvement of Security and Feasibility for Chaos-Based Multimedia Cryptosystem. In: Murgante, B., Gervasi, O., Iglesias, A., Taniar, D., Apduhan, B.O. (eds) Computational Science and Its Applications - ICCSA 2011. ICCSA 2011. Lecture Notes in Computer Science, vol 6785. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-21898-9_50

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-21898-9_50

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-21897-2

  • Online ISBN: 978-3-642-21898-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics