Uneingeschränkter Zugang

New Compression–Encryption Algorithm Using Chaos-Based Dynamic Session Key


Zitieren

Abd El-Latif, A.A. and Niu, X. 2013. A hybrid chaotic system and cyclic elliptic curve for image encryption. AEU—International Journal of Electronics and Communications 67(2). Abd El-Latif A.A. Niu X. 2013 A hybrid chaotic system and cyclic elliptic curve for image encryption AEU—International Journal of Electronics and Communications 67210.1016/j.aeue.2012.07.004 Search in Google Scholar

Ahmad, J., Khan, M.A., Hwang, S.O. and Khan, J.S. 2017. A compression sensing and noise-tolerant image encryption scheme based on chaotic maps and orthogonal matrices. Neural Computing and Applications 28(S1): 953–967. Ahmad J. Khan M.A. Hwang S.O. Khan J.S. 2017 A compression sensing and noise-tolerant image encryption scheme based on chaotic maps and orthogonal matrices Neural Computing and Applications 28S1 953 967 10.1007/s00521-016-2405-6 Search in Google Scholar

Alleaume, R., Branciard, C., Bouda, J., Debuisschert, T., Dianati, M., Gisin, N., Godfrey, M., Grangier, P., Langer, T., Lutkenhaus, N., Monyk, C., Painchault, P., Peev, M., Poppe, A., Pornin, T., Rarity, J., Renner, R., Ribordy, G., Riguidel, M., Salvail, L., Shields, A., Weinfurter, H. and Zeilinger, A. 2014. Using quantum key distribution for cryptographic purposes: a survey. Theoretical Computer Science 560: 62–81. Alleaume R. Branciard C. Bouda J. Debuisschert T. Dianati M. Gisin N. Godfrey M. Grangier P. Langer T. Lutkenhaus N. Monyk C. Painchault P. Peev M. Poppe A. Pornin T. Rarity J. Renner R. Ribordy G. Riguidel M. Salvail L. Shields A. Weinfurter H. Zeilinger A. 2014 Using quantum key distribution for cryptographic purposes: a survey Theoretical Computer Science 560 62 81 10.1016/j.tcs.2014.09.018 Search in Google Scholar

Al-Maadeed, S., Al-Ali, A. and Abdalla, T. 2012. A new chaos-based image-encryption and compression algorithm. Journal of Electrical and Computer Engineering 2012: 1–11. Al-Maadeed S. Al-Ali A. Abdalla T. 2012 A new chaos-based image-encryption and compression algorithm Journal of Electrical and Computer Engineering 2012 1 11 10.1155/2012/179693 Search in Google Scholar

Ayele, A.A. and Screenivasarao, V. 2013. A modified RSA encryption technique based on multiple public keys. International Journal of Innovative Research in Computer and Communication Engineering 1(4): 859–864. Ayele A.A. Screenivasarao V. 2013 A modified RSA encryption technique based on multiple public keys International Journal of Innovative Research in Computer and Communication Engineering 14 859 864 Search in Google Scholar

Belazi, A., Abd El-Latif, A.A., Diaconu, A.-V., Rhouma, R. and Belghith, S. 2017. Chaos-based partial image encryption scheme based on linear fractional and lifting wavelet transforms. Optics and Lasers in Engineering 88: 37–50. Belazi A. Abd El-Latif A.A. Diaconu A.-V. Rhouma R. Belghith S. 2017 Chaos-based partial image encryption scheme based on linear fractional and lifting wavelet transforms Optics and Lasers in Engineering 88 37 50 10.1016/j.optlaseng.2016.07.010 Search in Google Scholar

Boriga, R., Dascalescu, A.C. and Priescu, I. 2014. A new hyperchaotic map and its application in an image encryption scheme. Signal Processing: Image Communication 29(8): 887–901. Boriga R. Dascalescu A.C. Priescu I. 2014 A new hyperchaotic map and its application in an image encryption scheme Signal Processing: Image Communication 298 887 901 10.1016/j.image.2014.04.001 Search in Google Scholar

Bull, D.R. 2014. Communicating pictures: a course in image and video coding. Academic Press, New York. Bull D.R. 2014 Communicating pictures: a course in image and video coding Academic Press New York 10.1016/B978-0-12-405906-1.00013-1 Search in Google Scholar

Chen, J., Zhou, J. and Wong, K.-W. 2011. A modified chaos-based joint compression and encryption scheme. IEEE Transactions on Circuits and Systems II Express Briefs 58(2): 110–114. Chen J. Zhou J. Wong K.-W. 2011 A modified chaos-based joint compression and encryption scheme IEEE Transactions on Circuits and Systems II Express Briefs 582 110 114 10.1109/TCSII.2011.2106316 Search in Google Scholar

Chen, T., Zhang, M., Wu, J., Yuen, C. and Tong, Y. 2016. Image encryption and compression based on kronecker compressed sensing and elementary cellular automata scrambling. Optics & Laser Technology 84: 118–133. Chen T. Zhang M. Wu J. Yuen C. Tong Y. 2016 Image encryption and compression based on kronecker compressed sensing and elementary cellular automata scrambling Optics & Laser Technology 84 118 133 10.1016/j.optlastec.2016.05.012 Search in Google Scholar

Chen, W., Wang, T. and Wang, B. 2014. Design of digital image encryption algorithm based on mixed chaotic sequences. International Journal on Smart Sensing and Intelligent Systems 7(4): pp. 1453–1469. Chen W. Wang T. Wang B. 2014 Design of digital image encryption algorithm based on mixed chaotic sequences International Journal on Smart Sensing and Intelligent Systems 74 1453 1469 10.21307/ijssis-2017-715 Search in Google Scholar

Deng, J., Zhao, S., Wang, Y., Wang, L., Wang, H. and Sha, H. 2017. Image compression–encryption scheme combining 2D compressive sensing with discrete fractional random transform. Multimedia Tools and Applications 76(7): 10097–10117. Deng J. Zhao S. Wang Y. Wang L. Wang H. Sha H. 2017 Image compression–encryption scheme combining 2D compressive sensing with discrete fractional random transform Multimedia Tools and Applications 767 10097 10117 10.1007/s11042-016-3600-2 Search in Google Scholar

Dhenakaran, S.S. and Ilayaraja, M. 2012. Extension of playfair cipher using 16X16 matrix. International Journal of Computer Application 48(7): 37–41. Dhenakaran S.S. Ilayaraja M. 2012 Extension of playfair cipher using 16X16 matrix International Journal of Computer Application 487 37 41 10.5120/7363-0192 Search in Google Scholar

Fira, M. 2015. Applications of compressed sensing: compression and encryption. 2015 E-Health andBioengineering Conference (EHB), pp. 1–4. Fira M. 2015 Applications of compressed sensing: compression and encryption 2015 E-Health andBioengineering Conference (EHB), pp. 1 4 Search in Google Scholar

Goel, N., Raman, B. and Gupta, I. 2014. Chaos based joint compression and encryption framework for end-to-end communication systems. Advances in Multimedia 2014: 1–10. Goel N. Raman B. Gupta I. 2014 Chaos based joint compression and encryption framework for end-to-end communication systems Advances in Multimedia 2014 1 10 10.1155/2014/910106 Search in Google Scholar

Gupta, K. and Silakari, S. 2012. Novel approach for fast compressed hybrid color image cryptosystem. Advances in Engineering Software 49(1): 29–42. Gupta K. Silakari S. 2012 Novel approach for fast compressed hybrid color image cryptosystem Advances in Engineering Software 491 29 42 10.1016/j.advengsoft.2012.03.001 Search in Google Scholar

Hamdi, M., Rhouma, R. and Belghith, S. 2017. A selective compression–encryption of images based on SPIHT coding and Chirikov Standard Map. Signal Processing 131: 514–526. Hamdi M. Rhouma R. Belghith S. 2017 A selective compression–encryption of images based on SPIHT coding and Chirikov Standard Map Signal Processing 131 514 526 10.1016/j.sigpro.2016.09.011 Search in Google Scholar

Hassan, N.S. and Younis, H.A. 2013. Approach for partial encryption of compressed images. Journal of Babylon University Application Science 21(3): 1–10. Hassan N.S. Younis H.A. 2013 Approach for partial encryption of compressed images Journal of Babylon University Application Science 213 1 10 Search in Google Scholar

Hua, Z. and Zhou, Y. 2017. Design of image cipher using block-based scrambling and image filtering. Information Sciences (NY). 396: 97–113. Hua Z. Zhou Y. 2017 Design of image cipher using block-based scrambling and image filtering Information Sciences (NY). 396 97 113 10.1016/j.ins.2017.02.036 Search in Google Scholar

Huang, R., Rhee, K.H.H. and Uchida, S. 2014. A parallel image encryption method based on compressive sensing. Multimedia Tools and Applications 72(1): 71–93. Huang R. Rhee K.H.H. Uchida S. 2014 A parallel image encryption method based on compressive sensing Multimedia Tools and Applications 721 71 93 10.1007/s11042-012-1337-0 Search in Google Scholar

Jolfaei, A. and Mirghadri, A. 2011. Image encryption using chaos and block cipher. Computer and Information Science 4(1): 172–185. Jolfaei A. Mirghadri A. 2011 Image encryption using chaos and block cipher Computer and Information Science 41 172 185 10.5539/cis.v4n1p172 Search in Google Scholar

Karthikeyan, T., Praburaj, B. and Kesavapandian, K. 2014. Embedded zero tree wavelet and orthogonal polynomial based transformation coding. Journal of Theoretical and Applied Information Technology 68(1): 215–223. Karthikeyan T. Praburaj B. Kesavapandian K. 2014 Embedded zero tree wavelet and orthogonal polynomial based transformation coding Journal of Theoretical and Applied Information Technology 681 215 223 Search in Google Scholar

Koops, B. 1999. The crypto controversy a key conflict in the information society. Kluwer Law International, The Netherlands. Koops B. 1999 The crypto controversy a key conflict in the information society Kluwer Law International The Netherlands Search in Google Scholar

Kumar, M. and Vaish, A. 2016. Prediction error based compression of color images using WDR coding. AEU—International Journal of Electronics and Communications 70(9): 1164–1171. Kumar M. Vaish A. 2016 Prediction error based compression of color images using WDR coding AEU—International Journal of Electronics and Communications 709 1164 1171 10.1016/j.aeue.2016.05.014 Search in Google Scholar

Kumar, M. and Vaish, A. 2017. An efficient encryption-then-compression technique for encrypted images using SVD. Digital Signal Processing 60: 81–89. Kumar M. Vaish A. 2017 An efficient encryption-then-compression technique for encrypted images using SVD Digital Signal Processing 60 81 89 10.1016/j.dsp.2016.08.011 Search in Google Scholar

Li, P. and Lo, K. 2015. Joint image compression and encryption based on alternating transforms with quality control. in 2015 Visual Communications and Image Processing (VCIP), pp. 1-4. Li P. Lo K. 2015 Joint image compression and encryption based on alternating transforms with quality control in 2015 Visual Communications and Image Processing (VCIP), pp. 1-4 10.1109/VCIP.2015.7457867 Search in Google Scholar

Mahaveerakannan, R. and Dhas, C.S.G. 2016. Customized RSA public key cryptosystem using digital signature of secure data transfer natural number algorithm. International Journal of Circuit Theory and Applications 9(5): 2627–2632. Mahaveerakannan R. Dhas C.S.G. 2016 Customized RSA public key cryptosystem using digital signature of secure data transfer natural number algorithm International Journal of Circuit Theory and Applications 95 2627 2632 Search in Google Scholar

Morales-Sandoval, M. and Feregrino-Uribe, C. 2005. A hardware architecture for elliptic curve cryptography and lossless data compression. 15th International Conference on Electronics, Communications and Computers (CONIELECOMP'05), pp. 113–118. Morales-Sandoval M. Feregrino-Uribe C. 2005 A hardware architecture for elliptic curve cryptography and lossless data compression 15th International Conference on Electronics, Communications and Computers (CONIELECOMP'05), pp. 113 118 Search in Google Scholar

Munir, R. 2012. Security analysis of selective image encryption algorithm based on chaos and CBC-like mode. 2012 7th International Conference on Telecommunication Systems, Services, and Applications (TSSA), no. 2, pp. 142–146. Munir R. 2012 Security analysis of selective image encryption algorithm based on chaos and CBC-like mode 2012 7th International Conference on Telecommunication Systems, Services, and Applications (TSSA), no. 2 142 146 Search in Google Scholar

Murillo-Escobar, M.A., Cruz-Hernandez, C., Abundiz-Perez, F., Lopez-Gutierrez, R.M. and Acosta Del Campo, O.R. 2015. A RGB image encryption algorithm based on total plain image characteristics and chaos. Signal Processing 109: 119–131. Murillo-Escobar M.A. Cruz-Hernandez C. Abundiz-Perez F. Lopez-Gutierrez R.M. Acosta Del Campo O.R. 2015 A RGB image encryption algorithm based on total plain image characteristics and chaos Signal Processing 109 119 131 10.1016/j.sigpro.2014.10.033 Search in Google Scholar

Patrick, T.K. 2011. One way functions and public key cryptography. African Journal of Mathematics and Computer Science Research 4(6): 213–216. Patrick T.K. 2011 One way functions and public key cryptography African Journal of Mathematics and Computer Science Research 46 213 216 Search in Google Scholar

Rahmawati, W.M., Saikhu, A. and Kompresi, A.E. 2013. Implementasi Algoritma Penggabungan Kompresi dan Enkripsi Citra dengan DCT dan SHA-1. J. Tek. POMITS 2(1): 1–4. Rahmawati W.M. Saikhu A. Kompresi A.E. 2013 Implementasi Algoritma Penggabungan Kompresi dan Enkripsi Citra dengan DCT dan SHA-1 J. Tek. POMITS 21 1 4 Search in Google Scholar

Santhosh, M., Charles, B.S. and Giriprasad, M.N. 2013. Lossless image compression using new biorthogonal wavelets. Signal and Image Processing: An International Journal 4(6): 4553. Santhosh M. Charles B.S. Giriprasad M.N. 2013 Lossless image compression using new biorthogonal wavelets Signal and Image Processing: An International Journal 46 4553 Search in Google Scholar

Santoso, A.J., Nugroho, L.E., Suparta, G.B. and Hidayat, R. 2011. Color image compression using orthogonal wavelet viewed from decomposition level and peak signal to noise ratio. International Journal of Advanced Science and Technology 31: 81–92. Santoso A.J. Nugroho L.E. Suparta G.B. Hidayat R. 2011 Color image compression using orthogonal wavelet viewed from decomposition level and peak signal to noise ratio International Journal of Advanced Science and Technology 31 81 92 Search in Google Scholar

Setyaningsih, E. and Harjoko, A. 2017. Survey of hybrid image compression techniques. International Journal of Electrical and Computer Engineering 7(4): 2206–2214. Setyaningsih E. Harjoko A. 2017 Survey of hybrid image compression techniques International Journal of Electrical and Computer Engineering 74 2206 2214 10.11591/ijece.v7i4.pp2206-2214 Search in Google Scholar

Setyaningsih, E. and Wardoyo, R. 2017. Review of image compression and encryption techniques. International Journal of Advanced Computer Science and Applications 8(2): 83–94. Setyaningsih E. Wardoyo R. 2017 Review of image compression and encryption techniques International Journal of Advanced Computer Science and Applications 82 83 94 10.14569/IJACSA.2017.080212 Search in Google Scholar

Sharadha, R. and Bhanuprakash, C. 2013. Image compression technique for color images using wavelets. International Journal of Advanced. Research in Computer Science and Software Engineering 3(11): 322327. Sharadha R. Bhanuprakash C. 2013 Image compression technique for color images using wavelets International Journal of Advanced. Research in Computer Science and Software Engineering 311 322327 Search in Google Scholar

Sharma, S. 2012. Modified RSA public key cryptosystem using short range natural number algorithm. International Journal of Advanced. Research in Computer Science and Software Engineering 2(8): 134138. Sharma S. 2012 Modified RSA public key cryptosystem using short range natural number algorithm International Journal of Advanced. Research in Computer Science and Software Engineering 28 134138 Search in Google Scholar

Somani, N. and Mangal, D. 2014. An improved RSA cryptographic system. International Journal of Computer Application 105(16): 18–22. Somani N. Mangal D. 2014 An improved RSA cryptographic system International Journal of Computer Application 10516 18 22 Search in Google Scholar

Teng, L., Wang, X. and Meng, J. 2017. A Chaotic color image encryption using integrated bit-level permutation. Multimedia Tools and Applications, pp. 1–14. Teng L. Wang X. Meng J. 2017 A Chaotic color image encryption using integrated bit-level permutation Multimedia Tools and Applications 1 14 10.1007/s11042-017-4605-1 Search in Google Scholar

Tong, X.-J., Chen, P. and Zhang, M. 2017. A joint image lossless compression and encryption method based on chaotic map. Multimedia Tools and Applications 76(12): 13995–14020. Tong X.-J. Chen P. Zhang M. 2017 A joint image lossless compression and encryption method based on chaotic map Multimedia Tools and Applications 7612 13995 14020 10.1007/s11042-016-3775-6 Search in Google Scholar

Tong, X.-J., Wang, Z., Zhang, M. and Liu, Y. 2013. A new algorithm of the combination of image compression and encryption technology based on cross chaotic map. Nonlinear Dynamics 72(1-2): 229–241. Tong X.-J. Wang Z. Zhang M. Liu Y. 2013 A new algorithm of the combination of image compression and encryption technology based on cross chaotic map Nonlinear Dynamics 721-2 229 241 10.1007/s11071-012-0707-5 Search in Google Scholar

Vaish, A., Gautam, S. and Kumar, M. 2017. A wavelet based approach for simultaneous compression and encryption of fused images. Journal of King Saud Univ.—Computer and Information Science, pp. 1–10. Vaish A. Gautam S. Kumar M. 2017 A wavelet based approach for simultaneous compression and encryption of fused images Journal of King Saud Univ.—Computer and Information Science 1 10 10.1016/j.jksuci.2017.01.005 Search in Google Scholar

Wang, B. and Gao, Y. 2015. An image compression scheme based on fuzzy neural network. TELKOMMNIKA (Telecommunication Computing Electronics and Control) 13(1): 137. Wang B. Gao Y. 2015 An image compression scheme based on fuzzy neural network TELKOMMNIKA (Telecommunication Computing Electronics and Control) 131 137 10.12928/telkomnika.v13i1.1270 Search in Google Scholar

Wang, C., Ni, J. and Huang, Q. 2015. A new encryption then compression algorithm using the rate distortion optimization. Signal Processing: Image Communication 39: 141–150. Wang C. Ni J. Huang Q. 2015 A new encryption then compression algorithm using the rate distortion optimization Signal Processing: Image Communication 39 141 150 10.1016/j.image.2015.09.009 Search in Google Scholar

Wang, X. and Zhao, J. 2010. An improved key agreement protocol based on chaos. Communications in Nonlinear Science and Numerical Simulation 15(12): 4052–4057. Wang X. Zhao J. 2010 An improved key agreement protocol based on chaos Communications in Nonlinear Science and Numerical Simulation 1512 4052 4057 10.1016/j.cnsns.2010.02.014 Search in Google Scholar

Wang, X., Liu, L. and Zhang, Y. 2015. A novel chaotic block image encryption algorithm based on dynamic random growth technique. Optics and Lasers in Engineering 66: 10–18. Wang X. Liu L. Zhang Y. 2015 A novel chaotic block image encryption algorithm based on dynamic random growth technique Optics and Lasers in Engineering 66 10 18 10.1016/j.optlaseng.2014.08.005 Search in Google Scholar

Xiang, T., Qu, J. and Xiao, D. 2014. Joint SPIHT compression and selective encryption. Applied Soft Computing 21: 159–170. Xiang T. Qu J. Xiao D. 2014 Joint SPIHT compression and selective encryption Applied Soft Computing 21 159 170 10.1016/j.asoc.2014.03.009 Search in Google Scholar

Xiaoyong, J., Sen, B., Guibin, Z. and Bing, Y. 2017. Image encryption and compression based on the generalized knight’s tour, discrete cosine transform and chaotic maps. Multimedia Tools and Applications 76(10): 12965–12979. Xiaoyong J. Sen B. Guibin Z. Bing Y. 2017 Image encryption and compression based on the generalized knight’s tour, discrete cosine transform and chaotic maps Multimedia Tools and Applications 7610 12965 12979 10.1007/s11042-016-3684-8 Search in Google Scholar

Younes, M.A.B. and Jantan, A. 2008. Image encryption using block-based transformation algorithm. International Journal of Computer Science 35(1): 1–9. Younes M.A.B. Jantan A. 2008 Image encryption using block-based transformation algorithm International Journal of Computer Science 351 1 9 Search in Google Scholar

Zhang, M. and Tong, X. 2017. Joint image encryption and compression scheme based on IWT and SPIHT. Optics and Lasers in Engineering. 90: 254–274. Zhang M. Tong X. 2017 Joint image encryption and compression scheme based on IWT and SPIHT Optics and Lasers in Engineering. 90 254 274 10.1016/j.optlaseng.2016.10.025 Search in Google Scholar

Zhang, Y., Xu, B. and Zhou, N. 2017. A novel image compression–encryption hybrid algorithm based on the analysis sparse representation. Optics Communications 392: 223–233. Zhang Y. Xu B. Zhou N. 2017 A novel image compression–encryption hybrid algorithm based on the analysis sparse representation Optics Communications 392 223 233 10.1016/j.optcom.2017.01.061 Search in Google Scholar

Zhou, N., Zhang, A., Zheng, F. and Gong, L. 2014. Novel image compression–encryption hybrid algorithm based on key-controlled measurement matrix in compressive sensing. Optics and Laser Technology 62: 152–160. Zhou N. Zhang A. Zheng F. Gong L. 2014 Novel image compression–encryption hybrid algorithm based on key-controlled measurement matrix in compressive sensing Optics and Laser Technology 62 152 160 10.1016/j.optlastec.2014.02.015 Search in Google Scholar

Zhu, Z., Zhang, W., Wong, K. and Yu, H. 2011. A chaos-based symmetric image encryption scheme using a bit-level permutation. Information Sciences (NY). 181(6): 1171–1186. Zhu Z. Zhang W. Wong K. Yu H. 2011 A chaos-based symmetric image encryption scheme using a bit-level permutation Information Sciences (NY). 1816 1171 1186 10.1016/j.ins.2010.11.009 Search in Google Scholar

eISSN:
1178-5608
Sprache:
Englisch
Zeitrahmen der Veröffentlichung:
Volume Open
Fachgebiete der Zeitschrift:
Technik, Einführungen und Gesamtdarstellungen, andere