Secure binary arithmetic coding based on digitalized modified logistic map and linear feedback shift register

•The proposed arithmetic coding is based on digitalized modified logistic map.•The security is improved due to the architecture of shift–perturbance.•The scheme possesses high sensitivity and strong randomness.•The appended computational complexity is very small. In this paper, we propose a novel se...

Full description

Saved in:
Bibliographic Details
Published in:Communications in nonlinear science & numerical simulation Vol. 27; no. 1-3; pp. 22 - 29
Main Authors: Zhang, Yushu, Xiao, Di, Wen, Wenying, Nan, Hai, Su, Moting
Format: Journal Article
Language:English
Published: Elsevier B.V 01.10.2015
Subjects:
ISSN:1007-5704, 1878-7274
Online Access:Get full text
Tags: Add Tag
No Tags, Be the first to tag this record!
Abstract •The proposed arithmetic coding is based on digitalized modified logistic map.•The security is improved due to the architecture of shift–perturbance.•The scheme possesses high sensitivity and strong randomness.•The appended computational complexity is very small. In this paper, we propose a novel secure arithmetic coding based on digitalized modified logistic map (DMLM) and linear feedback shift register (LFSR). An input binary sequence is first mapped into a table, which is then scrambled by two cyclic shift steps driven by the keys resulting from DMLM–LFSR. Next, each column is encoded using traditional arithmetic coding (TAC) and randomized arithmetic coding (RAC). During the RAC process, the exchange of two intervals is controlled by the keystream generated from the DMLM. At the same time, a few bits of the present column sequence are extracted to interfere the generation of new keystream used for the next column. The final ciphertext sequence is obtained by XORing the compressed sequence and the keystream generated by the LFSR. Results show the compression ratio of our scheme is slightly higher than that of TAC, but the security is improved due to the architecture of shift–perturbance. DMLM and LFSR theories also ensure high sensitivity and strong randomness. The appended complexity is only O(N), where N is the number of the input symbols.
AbstractList In this paper, we propose a novel secure arithmetic coding based on digitalized modified logistic map (DMLM) and linear feedback shift register (LFSR). An input binary sequence is first mapped into a table, which is then scrambled by two cyclic shift steps driven by the keys resulting from DMLM-LFSR. Next, each column is encoded using traditional arithmetic coding (TAC) and randomized arithmetic coding (RAC). During the RAC process, the exchange of two intervals is controlled by the keystream generated from the DMLM. At the same time, a few bits of the present column sequence are extracted to interfere the generation of new keystream used for the next column. The final ciphertext sequence is obtained by XORing the compressed sequence and the keystream generated by the LFSR. Results show the compression ratio of our scheme is slightly higher than that of TAC, but the security is improved due to the architecture of shift-perturbance. DMLM and LFSR theories also ensure high sensitivity and strong randomness. The appended complexity is only O(N), where N is the number of the input symbols.
•The proposed arithmetic coding is based on digitalized modified logistic map.•The security is improved due to the architecture of shift–perturbance.•The scheme possesses high sensitivity and strong randomness.•The appended computational complexity is very small. In this paper, we propose a novel secure arithmetic coding based on digitalized modified logistic map (DMLM) and linear feedback shift register (LFSR). An input binary sequence is first mapped into a table, which is then scrambled by two cyclic shift steps driven by the keys resulting from DMLM–LFSR. Next, each column is encoded using traditional arithmetic coding (TAC) and randomized arithmetic coding (RAC). During the RAC process, the exchange of two intervals is controlled by the keystream generated from the DMLM. At the same time, a few bits of the present column sequence are extracted to interfere the generation of new keystream used for the next column. The final ciphertext sequence is obtained by XORing the compressed sequence and the keystream generated by the LFSR. Results show the compression ratio of our scheme is slightly higher than that of TAC, but the security is improved due to the architecture of shift–perturbance. DMLM and LFSR theories also ensure high sensitivity and strong randomness. The appended complexity is only O(N), where N is the number of the input symbols.
Author Nan, Hai
Wen, Wenying
Xiao, Di
Zhang, Yushu
Su, Moting
Author_xml – sequence: 1
  givenname: Yushu
  surname: Zhang
  fullname: Zhang, Yushu
  organization: School of Electronics and Information Engineering, Southwest University, Chongqing 400715, China
– sequence: 2
  givenname: Di
  surname: Xiao
  fullname: Xiao, Di
  email: xiaodi_cqu@hotmail.com
  organization: College of Computer Science, Chongqing University, Chongqing 400044, China
– sequence: 3
  givenname: Wenying
  surname: Wen
  fullname: Wen, Wenying
  organization: School of Information Technology, Jiangxi University of Finance and Economics, Nanchang 330013, China
– sequence: 4
  givenname: Hai
  surname: Nan
  fullname: Nan, Hai
  organization: College of Computer Science, Chongqing University, Chongqing 400044, China
– sequence: 5
  givenname: Moting
  surname: Su
  fullname: Su, Moting
  organization: School of Economics and Business Administration, Chongqing University, Chongqing 400044, China
BookMark eNqFkE2PFCEQholZE3dXf4EXjl56BBr64-DBbPxKNvGgnglUF7M1dsMIjIn-ehnHkwdNKqmCep86PDfsKqaIjD2XYieFHF4edhBLLDslpNkJ1co8YtdyGqduVKO-arMQY2dGoZ-wm1IOolGz0dds-4Rwysg9RZd_cJepPmxYCTikheKee1dw4SnyhfZU3Uo_23Nru0BtWNOeyjm9uSN3sX1QRJd5QFy8g6-8PFCoPOM5hvkpexzcWvDZn37Lvrx98_nufXf_8d2Hu9f3HfT9UDsJQSivdIBe9MNiwuxBz3qeEFQQgwzSBOn1gNOkET2AF84pr9H4flBS9LfsxeXuMadvJyzVblQA19VFTKdi5TgoMZp-li3aX6KQUykZgz1m2poLK4U9y7UH-1uuPcu1QrUyjZr_oqDJqZRizY7W_7CvLiw2A98Jsy1AGAEXygjVLon-yf8C0f-bOA
CitedBy_id crossref_primary_10_1016_j_optlaseng_2016_10_025
crossref_primary_10_1080_01611194_2018_1548390
crossref_primary_10_3390_e23060671
crossref_primary_10_1109_ACCESS_2018_2815567
crossref_primary_10_1002_sec_1378
crossref_primary_10_1186_s42400_024_00352_3
crossref_primary_10_1007_s11071_018_4689_9
crossref_primary_10_1080_09500340_2021_1968054
crossref_primary_10_3390_e23081096
crossref_primary_10_1109_ACCESS_2018_2844184
crossref_primary_10_1007_s11071_018_4076_6
crossref_primary_10_1016_j_sigpro_2020_107525
Cites_doi 10.1016/j.physleta.2005.09.060
10.1016/j.chaos.2007.01.133
10.1142/S0218127412502562
10.1109/TSP.2007.892710
10.1016/j.physleta.2007.12.026
10.1109/TCSI.2005.859617
10.1109/TIFS.2009.2031944
10.1016/j.sigpro.2010.03.022
10.1016/j.cnsns.2013.06.031
10.1016/j.asoc.2011.05.050
10.1049/el:19980680
10.1016/j.cnsns.2012.08.010
10.1109/TCSI.2008.924117
10.1016/j.cnsns.2009.03.003
10.1016/0167-4048(92)90011-F
10.1109/TSP.2009.2013901
10.1109/TMM.2006.879919
10.1109/TMM.2008.917355
10.1109/TIFS.2010.2096809
10.1109/TCSVT.2003.815165
10.1109/79.952804
10.1109/LSP.2005.861589
10.1109/TIFS.2012.2187514
10.1016/0167-4048(88)90580-9
10.1109/TCOM.1981.1095052
10.1016/j.jss.2011.08.032
10.1016/0167-4048(95)97050-K
10.1016/j.asoc.2009.12.011
10.1109/TCSII.2010.2083170
10.1109/TCSII.2010.2040315
10.1016/0167-4048(93)90099-Q
10.1145/214762.214771
10.1016/j.asoc.2011.09.003
ContentType Journal Article
Copyright 2015 Elsevier B.V.
Copyright_xml – notice: 2015 Elsevier B.V.
DBID AAYXX
CITATION
7SC
7TB
8FD
FR3
JQ2
KR7
L7M
L~C
L~D
DOI 10.1016/j.cnsns.2015.02.025
DatabaseName CrossRef
Computer and Information Systems Abstracts
Mechanical & Transportation Engineering Abstracts
Technology Research Database
Engineering Research Database
ProQuest Computer Science Collection
Civil Engineering Abstracts
Advanced Technologies Database with Aerospace
Computer and Information Systems Abstracts – Academic
Computer and Information Systems Abstracts Professional
DatabaseTitle CrossRef
Civil Engineering Abstracts
Technology Research Database
Computer and Information Systems Abstracts – Academic
Mechanical & Transportation Engineering Abstracts
ProQuest Computer Science Collection
Computer and Information Systems Abstracts
Engineering Research Database
Advanced Technologies Database with Aerospace
Computer and Information Systems Abstracts Professional
DatabaseTitleList Civil Engineering Abstracts

DeliveryMethod fulltext_linktorsrc
Discipline Applied Sciences
EISSN 1878-7274
EndPage 29
ExternalDocumentID 10_1016_j_cnsns_2015_02_025
S1007570415000726
GroupedDBID --K
--M
-01
-0A
-0I
-0Y
-SA
-S~
.~1
0R~
1B1
1RT
1~.
1~5
29F
4.4
457
4G.
5GY
5VR
5VS
7-5
71M
8P~
92M
9D9
9DA
AACTN
AAEDT
AAEDW
AAIAV
AAIKJ
AAKOC
AALRI
AAOAW
AAQFI
AAQXK
AAXUO
ABAOU
ABFNM
ABJNI
ABMAC
ABNEU
ABXDB
ABYKQ
ACAZW
ACDAQ
ACFVG
ACGFS
ACNNM
ACRLP
ADBBV
ADEZE
ADGUI
ADMUD
ADTZH
AEBSH
AECPX
AEKER
AENEX
AFKWA
AFTJW
AFUIB
AGHFR
AGUBO
AGYEJ
AHJVU
AIEXJ
AIGVJ
AIKHN
AITUG
AIVDX
AJBFU
AJOXV
ALMA_UNASSIGNED_HOLDINGS
AMFUW
AMRAJ
ARUGR
ASPBG
AVWKF
AXJTR
AZFZN
BJAXD
BKOJK
BLXMC
CAJEA
CAJUS
CCEZO
CCVFK
CHBEP
CS3
CUBFJ
DU5
EBS
EFJIC
EFLBG
EJD
EO8
EO9
EP2
EP3
FA0
FDB
FEDTE
FGOYB
FIRID
FNPLU
FYGXN
G-Q
GBLVA
HVGLF
HZ~
IHE
J1W
JJJVA
JUIAU
KOM
M41
MHUIS
MO0
N9A
O-L
O9-
OAUVE
OGIMB
OZT
P-8
P-9
P2P
PC.
Q--
Q-0
Q38
R-A
R-I
R2-
RIG
ROL
RPZ
RT1
RT9
S..
SDF
SDG
SES
SEW
SPC
SPCBC
SPD
SSQ
SST
SSW
SSZ
T5K
T8Q
T8Y
U1F
U1G
U5A
U5I
U5K
UHS
~G-
~LA
9DU
AATTM
AAXKI
AAYWO
AAYXX
ABWVN
ACLOT
ACRPL
ACVFH
ADCNI
ADNMO
AEIPS
AEUPX
AFJKZ
AFPUW
AGQPQ
AIGII
AIIUN
AKBMS
AKRWK
AKYEP
ANKPU
APXCP
CITATION
EFKBS
~HD
7SC
7TB
8FD
FR3
JQ2
KR7
L7M
L~C
L~D
ID FETCH-LOGICAL-c336t-1cf02b24fc3036d5f9bc49498ec2f061f15f1b46e884eebccb0aa2b4e5b362103
ISICitedReferencesCount 14
ISICitedReferencesURI http://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=Summon&SrcAuth=ProQuest&DestLinkType=CitingArticles&DestApp=WOS_CPL&KeyUT=000353774500003&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D
ISSN 1007-5704
IngestDate Sat Sep 27 18:39:34 EDT 2025
Tue Nov 18 22:35:27 EST 2025
Sat Nov 29 02:22:49 EST 2025
Fri Feb 23 02:25:45 EST 2024
IsPeerReviewed true
IsScholarly true
Issue 1-3
Keywords Shift
Randomized arithmetic coding
Perturbance
Linear feedback shift register
Digitalized modified logistic map
Language English
LinkModel OpenURL
MergedId FETCHMERGED-LOGICAL-c336t-1cf02b24fc3036d5f9bc49498ec2f061f15f1b46e884eebccb0aa2b4e5b362103
Notes ObjectType-Article-1
SourceType-Scholarly Journals-1
ObjectType-Feature-2
content type line 23
PQID 1762075391
PQPubID 23500
PageCount 8
ParticipantIDs proquest_miscellaneous_1762075391
crossref_primary_10_1016_j_cnsns_2015_02_025
crossref_citationtrail_10_1016_j_cnsns_2015_02_025
elsevier_sciencedirect_doi_10_1016_j_cnsns_2015_02_025
PublicationCentury 2000
PublicationDate 2015-10-01
PublicationDateYYYYMMDD 2015-10-01
PublicationDate_xml – month: 10
  year: 2015
  text: 2015-10-01
  day: 01
PublicationDecade 2010
PublicationTitle Communications in nonlinear science & numerical simulation
PublicationYear 2015
Publisher Elsevier B.V
Publisher_xml – name: Elsevier B.V
References Lin, Wong, Chen (b0150) 2012; 22
Zhou, Liao (b0190) 2012; 85
Witten, Neal, Cleary (b0010) 1987; 30
Moo, Wu (b0050) 1999; vol. 2
Yuen, Wong (b0120) 2011; 11
Wen, Kim, Villasenor (b0070) 2006; 13
Jakimoski, Subbalakshmi (b0080) 2008; 10
Wang, Wong, Liao, Chen (b0140) 2011; 11
Zhou, Au (b0175) 2008; 10
Liao, Lai, Zhou (b0130) 2010; 90
Sun, Wang, Ting (b0095) 2009; 4
Wong, Kwok, Law (b0135) 2008; 372
Chen, Hwang, Lin (b0180) 2010; 57
Zhang, Wong, Yu, Zhu (b0110) 2013; 18
Bergen, Hogan (b0040) 1993; 12
Sang, Wang, Yan (b0185) 1998; 34
Langdon, Rissanen (b0005) 1981; 29
Katti, Srinivasan, Vosoughi (b0085) 2011; 6
Lui, Wong, Chen, Zhou (b0125) 2012; 12
Masmoudi, Puech, Bouhlel (b0170) 2010; 8
Witten, Cleary (b0025) 1988; 7
Katti, Vosoughi (b0100) 2012; 7
Li, Li, Halang, Chen (b0115) 2006; 349
Li, Zhang (b0165) 2009; 14
Zhang, Xiao (b0105) 2014; 19
Cleary, Irvine, Rinsma-Melchert (b0030) 1995; 14
Wong, Lin, Chen (b0145) 2010; 57
Barbir (b0045) 1997
Grangetto, Magli, Olmo (b0065) 2006; 8
Wiegand, Sullivan, Bjontegaard, Luthra (b0020) 2003; 13
Bergen, Hogan (b0035) 1992; 11
Wu, Moo (b0055) 1999; vol. 2
Skodras, Christopoulos, Ebrahimi (b0015) 2001; 18
Liu, Farrell, Boyd (b0060) 1999
Zhou, Au, Wong (b0090) 2009; 57
Mi, Liao, Chen (b0160) 2008; 38
Kim, Wen, Villasenor (b0075) 2007; 55
Bose, Pathak (b0155) 2006; 53
Liu (10.1016/j.cnsns.2015.02.025_b0060) 1999
Wiegand (10.1016/j.cnsns.2015.02.025_b0020) 2003; 13
Bergen (10.1016/j.cnsns.2015.02.025_b0035) 1992; 11
Lin (10.1016/j.cnsns.2015.02.025_b0150) 2012; 22
Zhou (10.1016/j.cnsns.2015.02.025_b0175) 2008; 10
Zhou (10.1016/j.cnsns.2015.02.025_b0090) 2009; 57
Grangetto (10.1016/j.cnsns.2015.02.025_b0065) 2006; 8
Katti (10.1016/j.cnsns.2015.02.025_b0085) 2011; 6
Cleary (10.1016/j.cnsns.2015.02.025_b0030) 1995; 14
Moo (10.1016/j.cnsns.2015.02.025_b0050) 1999; vol. 2
Wong (10.1016/j.cnsns.2015.02.025_b0135) 2008; 372
Wong (10.1016/j.cnsns.2015.02.025_b0145) 2010; 57
Katti (10.1016/j.cnsns.2015.02.025_b0100) 2012; 7
Li (10.1016/j.cnsns.2015.02.025_b0165) 2009; 14
Lui (10.1016/j.cnsns.2015.02.025_b0125) 2012; 12
Langdon (10.1016/j.cnsns.2015.02.025_b0005) 1981; 29
Skodras (10.1016/j.cnsns.2015.02.025_b0015) 2001; 18
Zhang (10.1016/j.cnsns.2015.02.025_b0105) 2014; 19
Sun (10.1016/j.cnsns.2015.02.025_b0095) 2009; 4
Liao (10.1016/j.cnsns.2015.02.025_b0130) 2010; 90
Witten (10.1016/j.cnsns.2015.02.025_b0025) 1988; 7
Bose (10.1016/j.cnsns.2015.02.025_b0155) 2006; 53
Barbir (10.1016/j.cnsns.2015.02.025_b0045) 1997
Mi (10.1016/j.cnsns.2015.02.025_b0160) 2008; 38
Jakimoski (10.1016/j.cnsns.2015.02.025_b0080) 2008; 10
Kim (10.1016/j.cnsns.2015.02.025_b0075) 2007; 55
Chen (10.1016/j.cnsns.2015.02.025_b0180) 2010; 57
Zhou (10.1016/j.cnsns.2015.02.025_b0190) 2012; 85
Witten (10.1016/j.cnsns.2015.02.025_b0010) 1987; 30
Zhang (10.1016/j.cnsns.2015.02.025_b0110) 2013; 18
Sang (10.1016/j.cnsns.2015.02.025_b0185) 1998; 34
Li (10.1016/j.cnsns.2015.02.025_b0115) 2006; 349
Masmoudi (10.1016/j.cnsns.2015.02.025_b0170) 2010; 8
Wen (10.1016/j.cnsns.2015.02.025_b0070) 2006; 13
Bergen (10.1016/j.cnsns.2015.02.025_b0040) 1993; 12
Wu (10.1016/j.cnsns.2015.02.025_b0055) 1999; vol. 2
Yuen (10.1016/j.cnsns.2015.02.025_b0120) 2011; 11
Wang (10.1016/j.cnsns.2015.02.025_b0140) 2011; 11
References_xml – volume: 85
  start-page: 400
  year: 2012
  end-page: 407
  ident: b0190
  article-title: Collision-based flexible image encryption algorithm
  publication-title: J Syst Softw
– volume: 22
  start-page: 1250256
  year: 2012
  ident: b0150
  article-title: Generalized arithmetic coding using discrete chaotic maps
  publication-title: Int J Bifur Chaos
– volume: vol. 2
  start-page: 545
  year: 1999
  end-page: 549
  ident: b0050
  article-title: Resynchronization properties of arithmetic coding
  publication-title: International conference on image processing, ICIP 99. Proceedings
– volume: 8
  start-page: 170
  year: 2010
  end-page: 175
  ident: b0170
  article-title: A new joint lossless compression and encryption scheme combining a binary arithmetic coding with a pseudo random bit generator
  publication-title: Int J Comput Sci Inf Secur
– volume: 13
  start-page: 560
  year: 2003
  end-page: 576
  ident: b0020
  article-title: Overview of the H.264/AVC video coding standard
  publication-title: IEEE Trans Circuits Syst Video Tech
– volume: 11
  start-page: 5092
  year: 2011
  end-page: 5098
  ident: b0120
  article-title: A chaos-based joint image compression and encryption scheme using DCT and SHA-1
  publication-title: Appl Soft Comput
– volume: 57
  start-page: 146
  year: 2010
  end-page: 150
  ident: b0145
  article-title: Simultaneous arithmetic coding and encryption using chaotic maps
  publication-title: IEEE Trans Circuits Syst II Express Briefs
– volume: 14
  start-page: 167
  year: 1995
  end-page: 180
  ident: b0030
  article-title: On the insecurity of arithmetic coding
  publication-title: Comput Secur
– volume: 7
  start-page: 895
  year: 2012
  end-page: 903
  ident: b0100
  article-title: On the security of key-based interval splitting arithmetic coding with respect to message indistinguishability
  publication-title: IEEE Trans Inf Forensics Secur
– volume: 349
  start-page: 467
  year: 2006
  end-page: 473
  ident: b0115
  article-title: A multiple pseudorandom-bit generator based on a spatiotemporal chaotic map
  publication-title: Phys Lett A
– volume: 372
  start-page: 2645
  year: 2008
  end-page: 2652
  ident: b0135
  article-title: A fast image encryption scheme based on chaotic standard map
  publication-title: Phys Lett A
– volume: 29
  start-page: 858
  year: 1981
  end-page: 867
  ident: b0005
  article-title: Compression of black–white images with arithmetic coding
  publication-title: IEEE Trans Commun
– volume: 18
  start-page: 36
  year: 2001
  end-page: 58
  ident: b0015
  article-title: The jpeg 2000 still image compression standard
  publication-title: IEEE Signal Processing Mag
– volume: 10
  start-page: 330
  year: 2008
  end-page: 338
  ident: b0080
  article-title: Cryptanalysis of some multimedia encryption schemes
  publication-title: IEEE Trans Multimedia
– volume: 38
  start-page: 1523
  year: 2008
  end-page: 1531
  ident: b0160
  article-title: A novel chaotic encryption scheme based on arithmetic coding
  publication-title: Chaos Solitons Fractals
– volume: 4
  start-page: 781
  year: 2009
  end-page: 789
  ident: b0095
  article-title: On the security of the secure arithmetic code
  publication-title: IEEE Trans Inf Forensics Secur
– volume: 30
  start-page: 520
  year: 1987
  end-page: 540
  ident: b0010
  article-title: Arithmetic coding for data compression
  publication-title: Commun ACM
– start-page: 266
  year: 1997
  end-page: 270
  ident: b0045
  article-title: A methodology for performing secure data compression
  publication-title: Proceedings of the twenty-ninth southeastern symposium on system theory
– volume: 90
  start-page: 2714
  year: 2010
  end-page: 2722
  ident: b0130
  article-title: A novel image encryption algorithm based on self-adaptive wave transmission
  publication-title: Signal Processing
– volume: 53
  start-page: 848
  year: 2006
  end-page: 857
  ident: b0155
  article-title: A novel compression and encryption scheme using variable model arithmetic coding and coupled chaotic system
  publication-title: IEEE Trans Circuits Syst I Regular Pap
– volume: 14
  start-page: 4304
  year: 2009
  end-page: 4318
  ident: b0165
  article-title: A secure and efficient entropy coding based on arithmetic coding
  publication-title: Commun Nonlinear Sci Numer Simul
– volume: 55
  start-page: 2263
  year: 2007
  end-page: 2272
  ident: b0075
  article-title: Secure arithmetic coding
  publication-title: IEEE Trans Signal Processing
– volume: 11
  start-page: 514
  year: 2011
  end-page: 522
  ident: b0140
  article-title: A new chaos-based fast image encryption algorithm
  publication-title: Appl Soft Comput
– volume: 7
  start-page: 397
  year: 1988
  end-page: 408
  ident: b0025
  article-title: On the privacy afforded by adaptive text compression
  publication-title: Comput Secur
– volume: 12
  start-page: 125
  year: 2012
  end-page: 132
  ident: b0125
  article-title: Chaos-based joint compression and encryption algorithm for generating variable length ciphertext
  publication-title: Appl Soft Comput
– volume: vol. 2
  start-page: 908
  year: 1999
  end-page: 912
  ident: b0055
  article-title: Joint image/video compression and encryption via high-order conditional entropy coding of wavelet coefficients
  publication-title: IEEE international conference on multimedia computing and systems
– volume: 8
  start-page: 905
  year: 2006
  end-page: 917
  ident: b0065
  article-title: Multimedia selective encryption by means of randomized arithmetic coding
  publication-title: IEEE Trans Multimedia
– volume: 11
  start-page: 445
  year: 1992
  end-page: 461
  ident: b0035
  article-title: Data security in a fixed-model arithmetic coding compression algorithm
  publication-title: Comput Secur
– volume: 18
  start-page: 584
  year: 2013
  end-page: 600
  ident: b0110
  article-title: A symmetric color image encryption algorithm using the intrinsic features of bit distributions
  publication-title: Commun Nonlinear Sci Numer Simul
– volume: 57
  start-page: 1825
  year: 2009
  end-page: 1838
  ident: b0090
  article-title: Adaptive chosen-ciphertext attack on secure arithmetic coding
  publication-title: IEEE Trans Signal Processing
– volume: 57
  start-page: 996
  year: 2010
  end-page: 1000
  ident: b0180
  article-title: Randomness enhancement using digitalized modified logistic map
  publication-title: IEEE Trans Circuits Syst II Express Briefs
– volume: 34
  start-page: 873
  year: 1998
  end-page: 874
  ident: b0185
  article-title: Perturbance-based algorithm to expand cycle length of chaotic key stream
  publication-title: Electron Lett
– volume: 10
  start-page: 3368
  year: 2008
  end-page: 3369
  ident: b0175
  article-title: Comments on a novel compression and encryption scheme using variable model arithmetic coding and coupled chaotic system
  publication-title: IEEE Trans. on Circuits Syst
– volume: 12
  start-page: 157
  year: 1993
  end-page: 167
  ident: b0040
  article-title: A chosen plaintext attack on an adaptive arithmetic coding compression algorithm
  publication-title: Comput Secur
– start-page: 84
  year: 1999
  end-page: 93
  ident: b0060
  article-title: A unified code
  publication-title: Cryptography and coding
– volume: 13
  start-page: 69
  year: 2006
  end-page: 72
  ident: b0070
  article-title: Binary arithmetic coding with key-based interval splitting
  publication-title: IEEE Signal Processing Lett
– volume: 6
  start-page: 19
  year: 2011
  end-page: 27
  ident: b0085
  article-title: On the security of randomized arithmetic codes against ciphertext-only attacks
  publication-title: IEEE Trans Inf Forensics Secur
– volume: 19
  start-page: 74
  year: 2014
  end-page: 82
  ident: b0105
  article-title: An image encryption scheme based on rotation matrix bit-level permutation and block diffusion
  publication-title: Commun Nonlinear Sci Numer Simul
– volume: 349
  start-page: 467
  issue: 6
  year: 2006
  ident: 10.1016/j.cnsns.2015.02.025_b0115
  article-title: A multiple pseudorandom-bit generator based on a spatiotemporal chaotic map
  publication-title: Phys Lett A
  doi: 10.1016/j.physleta.2005.09.060
– volume: 38
  start-page: 1523
  issue: 5
  year: 2008
  ident: 10.1016/j.cnsns.2015.02.025_b0160
  article-title: A novel chaotic encryption scheme based on arithmetic coding
  publication-title: Chaos Solitons Fractals
  doi: 10.1016/j.chaos.2007.01.133
– volume: 22
  start-page: 1250256
  issue: 10
  year: 2012
  ident: 10.1016/j.cnsns.2015.02.025_b0150
  article-title: Generalized arithmetic coding using discrete chaotic maps
  publication-title: Int J Bifur Chaos
  doi: 10.1142/S0218127412502562
– volume: 55
  start-page: 2263
  issue: 5
  year: 2007
  ident: 10.1016/j.cnsns.2015.02.025_b0075
  article-title: Secure arithmetic coding
  publication-title: IEEE Trans Signal Processing
  doi: 10.1109/TSP.2007.892710
– volume: 372
  start-page: 2645
  issue: 15
  year: 2008
  ident: 10.1016/j.cnsns.2015.02.025_b0135
  article-title: A fast image encryption scheme based on chaotic standard map
  publication-title: Phys Lett A
  doi: 10.1016/j.physleta.2007.12.026
– volume: 53
  start-page: 848
  issue: 4
  year: 2006
  ident: 10.1016/j.cnsns.2015.02.025_b0155
  article-title: A novel compression and encryption scheme using variable model arithmetic coding and coupled chaotic system
  publication-title: IEEE Trans Circuits Syst I Regular Pap
  doi: 10.1109/TCSI.2005.859617
– start-page: 266
  year: 1997
  ident: 10.1016/j.cnsns.2015.02.025_b0045
  article-title: A methodology for performing secure data compression
– volume: 4
  start-page: 781
  issue: 4
  year: 2009
  ident: 10.1016/j.cnsns.2015.02.025_b0095
  article-title: On the security of the secure arithmetic code
  publication-title: IEEE Trans Inf Forensics Secur
  doi: 10.1109/TIFS.2009.2031944
– volume: 90
  start-page: 2714
  issue: 9
  year: 2010
  ident: 10.1016/j.cnsns.2015.02.025_b0130
  article-title: A novel image encryption algorithm based on self-adaptive wave transmission
  publication-title: Signal Processing
  doi: 10.1016/j.sigpro.2010.03.022
– volume: 19
  start-page: 74
  issue: 1
  year: 2014
  ident: 10.1016/j.cnsns.2015.02.025_b0105
  article-title: An image encryption scheme based on rotation matrix bit-level permutation and block diffusion
  publication-title: Commun Nonlinear Sci Numer Simul
  doi: 10.1016/j.cnsns.2013.06.031
– volume: 11
  start-page: 5092
  issue: 8
  year: 2011
  ident: 10.1016/j.cnsns.2015.02.025_b0120
  article-title: A chaos-based joint image compression and encryption scheme using DCT and SHA-1
  publication-title: Appl Soft Comput
  doi: 10.1016/j.asoc.2011.05.050
– volume: 34
  start-page: 873
  issue: 9
  year: 1998
  ident: 10.1016/j.cnsns.2015.02.025_b0185
  article-title: Perturbance-based algorithm to expand cycle length of chaotic key stream
  publication-title: Electron Lett
  doi: 10.1049/el:19980680
– volume: 18
  start-page: 584
  issue: 3
  year: 2013
  ident: 10.1016/j.cnsns.2015.02.025_b0110
  article-title: A symmetric color image encryption algorithm using the intrinsic features of bit distributions
  publication-title: Commun Nonlinear Sci Numer Simul
  doi: 10.1016/j.cnsns.2012.08.010
– volume: 10
  start-page: 3368
  issue: 55
  year: 2008
  ident: 10.1016/j.cnsns.2015.02.025_b0175
  article-title: Comments on a novel compression and encryption scheme using variable model arithmetic coding and coupled chaotic system
  publication-title: IEEE Trans. on Circuits Syst
  doi: 10.1109/TCSI.2008.924117
– volume: 14
  start-page: 4304
  issue: 12
  year: 2009
  ident: 10.1016/j.cnsns.2015.02.025_b0165
  article-title: A secure and efficient entropy coding based on arithmetic coding
  publication-title: Commun Nonlinear Sci Numer Simul
  doi: 10.1016/j.cnsns.2009.03.003
– volume: 11
  start-page: 445
  issue: 5
  year: 1992
  ident: 10.1016/j.cnsns.2015.02.025_b0035
  article-title: Data security in a fixed-model arithmetic coding compression algorithm
  publication-title: Comput Secur
  doi: 10.1016/0167-4048(92)90011-F
– volume: 57
  start-page: 1825
  issue: 5
  year: 2009
  ident: 10.1016/j.cnsns.2015.02.025_b0090
  article-title: Adaptive chosen-ciphertext attack on secure arithmetic coding
  publication-title: IEEE Trans Signal Processing
  doi: 10.1109/TSP.2009.2013901
– volume: 8
  start-page: 905
  issue: 5
  year: 2006
  ident: 10.1016/j.cnsns.2015.02.025_b0065
  article-title: Multimedia selective encryption by means of randomized arithmetic coding
  publication-title: IEEE Trans Multimedia
  doi: 10.1109/TMM.2006.879919
– volume: 8
  start-page: 170
  issue: 1
  year: 2010
  ident: 10.1016/j.cnsns.2015.02.025_b0170
  article-title: A new joint lossless compression and encryption scheme combining a binary arithmetic coding with a pseudo random bit generator
  publication-title: Int J Comput Sci Inf Secur
– volume: 10
  start-page: 330
  issue: 3
  year: 2008
  ident: 10.1016/j.cnsns.2015.02.025_b0080
  article-title: Cryptanalysis of some multimedia encryption schemes
  publication-title: IEEE Trans Multimedia
  doi: 10.1109/TMM.2008.917355
– volume: 6
  start-page: 19
  issue: 1
  year: 2011
  ident: 10.1016/j.cnsns.2015.02.025_b0085
  article-title: On the security of randomized arithmetic codes against ciphertext-only attacks
  publication-title: IEEE Trans Inf Forensics Secur
  doi: 10.1109/TIFS.2010.2096809
– volume: 13
  start-page: 560
  issue: 7
  year: 2003
  ident: 10.1016/j.cnsns.2015.02.025_b0020
  article-title: Overview of the H.264/AVC video coding standard
  publication-title: IEEE Trans Circuits Syst Video Tech
  doi: 10.1109/TCSVT.2003.815165
– volume: 18
  start-page: 36
  issue: 5
  year: 2001
  ident: 10.1016/j.cnsns.2015.02.025_b0015
  article-title: The jpeg 2000 still image compression standard
  publication-title: IEEE Signal Processing Mag
  doi: 10.1109/79.952804
– volume: vol. 2
  start-page: 545
  year: 1999
  ident: 10.1016/j.cnsns.2015.02.025_b0050
  article-title: Resynchronization properties of arithmetic coding
– start-page: 84
  year: 1999
  ident: 10.1016/j.cnsns.2015.02.025_b0060
  article-title: A unified code
– volume: 13
  start-page: 69
  issue: 2
  year: 2006
  ident: 10.1016/j.cnsns.2015.02.025_b0070
  article-title: Binary arithmetic coding with key-based interval splitting
  publication-title: IEEE Signal Processing Lett
  doi: 10.1109/LSP.2005.861589
– volume: 7
  start-page: 895
  issue: 3
  year: 2012
  ident: 10.1016/j.cnsns.2015.02.025_b0100
  article-title: On the security of key-based interval splitting arithmetic coding with respect to message indistinguishability
  publication-title: IEEE Trans Inf Forensics Secur
  doi: 10.1109/TIFS.2012.2187514
– volume: 7
  start-page: 397
  issue: 4
  year: 1988
  ident: 10.1016/j.cnsns.2015.02.025_b0025
  article-title: On the privacy afforded by adaptive text compression
  publication-title: Comput Secur
  doi: 10.1016/0167-4048(88)90580-9
– volume: 29
  start-page: 858
  issue: 6
  year: 1981
  ident: 10.1016/j.cnsns.2015.02.025_b0005
  article-title: Compression of black–white images with arithmetic coding
  publication-title: IEEE Trans Commun
  doi: 10.1109/TCOM.1981.1095052
– volume: 85
  start-page: 400
  issue: 2
  year: 2012
  ident: 10.1016/j.cnsns.2015.02.025_b0190
  article-title: Collision-based flexible image encryption algorithm
  publication-title: J Syst Softw
  doi: 10.1016/j.jss.2011.08.032
– volume: 14
  start-page: 167
  issue: 2
  year: 1995
  ident: 10.1016/j.cnsns.2015.02.025_b0030
  article-title: On the insecurity of arithmetic coding
  publication-title: Comput Secur
  doi: 10.1016/0167-4048(95)97050-K
– volume: 11
  start-page: 514
  issue: 1
  year: 2011
  ident: 10.1016/j.cnsns.2015.02.025_b0140
  article-title: A new chaos-based fast image encryption algorithm
  publication-title: Appl Soft Comput
  doi: 10.1016/j.asoc.2009.12.011
– volume: 57
  start-page: 996
  issue: 12
  year: 2010
  ident: 10.1016/j.cnsns.2015.02.025_b0180
  article-title: Randomness enhancement using digitalized modified logistic map
  publication-title: IEEE Trans Circuits Syst II Express Briefs
  doi: 10.1109/TCSII.2010.2083170
– volume: 57
  start-page: 146
  issue: 2
  year: 2010
  ident: 10.1016/j.cnsns.2015.02.025_b0145
  article-title: Simultaneous arithmetic coding and encryption using chaotic maps
  publication-title: IEEE Trans Circuits Syst II Express Briefs
  doi: 10.1109/TCSII.2010.2040315
– volume: 12
  start-page: 157
  issue: 2
  year: 1993
  ident: 10.1016/j.cnsns.2015.02.025_b0040
  article-title: A chosen plaintext attack on an adaptive arithmetic coding compression algorithm
  publication-title: Comput Secur
  doi: 10.1016/0167-4048(93)90099-Q
– volume: 30
  start-page: 520
  issue: 6
  year: 1987
  ident: 10.1016/j.cnsns.2015.02.025_b0010
  article-title: Arithmetic coding for data compression
  publication-title: Commun ACM
  doi: 10.1145/214762.214771
– volume: 12
  start-page: 125
  issue: 1
  year: 2012
  ident: 10.1016/j.cnsns.2015.02.025_b0125
  article-title: Chaos-based joint compression and encryption algorithm for generating variable length ciphertext
  publication-title: Appl Soft Comput
  doi: 10.1016/j.asoc.2011.09.003
– volume: vol. 2
  start-page: 908
  year: 1999
  ident: 10.1016/j.cnsns.2015.02.025_b0055
  article-title: Joint image/video compression and encryption via high-order conditional entropy coding of wavelet coefficients
SSID ssj0016954
Score 2.1852756
Snippet •The proposed arithmetic coding is based on digitalized modified logistic map.•The security is improved due to the architecture of shift–perturbance.•The...
In this paper, we propose a novel secure arithmetic coding based on digitalized modified logistic map (DMLM) and linear feedback shift register (LFSR). An...
SourceID proquest
crossref
elsevier
SourceType Aggregation Database
Enrichment Source
Index Database
Publisher
StartPage 22
SubjectTerms Arithmetic coding
Columns (process)
Computer simulation
Digitalized modified logistic map
Exchange
Linear feedback shift register
Linear feedback shift registers
Logistics
Perturbance
Randomized arithmetic coding
Security
Shift
Symbols
Title Secure binary arithmetic coding based on digitalized modified logistic map and linear feedback shift register
URI https://dx.doi.org/10.1016/j.cnsns.2015.02.025
https://www.proquest.com/docview/1762075391
Volume 27
WOSCitedRecordID wos000353774500003&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
journalDatabaseRights – providerCode: PRVESC
  databaseName: Elsevier SD Freedom Collection Journals 2021
  customDbUrl:
  eissn: 1878-7274
  dateEnd: 99991231
  omitProxy: false
  ssIdentifier: ssj0016954
  issn: 1007-5704
  databaseCode: AIEXJ
  dateStart: 19960101
  isFulltext: true
  titleUrlDefault: https://www.sciencedirect.com
  providerName: Elsevier
link http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwtV1bb9MwFLbKxgMv3BHjJiPxFoKaixPncYKhgdDEw0DlKbIdm2Zr0qpJpsE_499xbMdpWEXFHpCqtHVjN-35cs7xuSL0qihARtNpAdvUjPqxKDKfBQkFZlgUikrKEuM9__opPTmhs1n2eTL55XJhLhZpXdPLy2z1X0kNY0BsnTp7DXIPi8IAvAaiwxHIDsd_IryxoEuP20Rb2Aq380pnKnpiaRJYtNwqtI-gKL_rjiHlT3hbwWdKa6M2IwjOrtjKOBa0GsrWngIpx5k495p5qVpP93NoXGSvK3QwzjUxYba1rcMB0132kAZa3Vkv0cJryqrvHrZlv_7WNfPOjc5KZiy678qNI8lwS3j64WSvtmhba-4xK8fGjIAMYXGO_2rLKUltR2LHoG3xAAdEPxrz23Akua3pZEsmWPPE2RtRN7Uu0B4QU6XV5lv_WYH7imQc4hVdKNxZbhbJ9SL5NIQHuYH2w5RkIBP2Dz8czT4OLqwkMy34hl_kSl6Z4MKta_mbWnRFQTBaz-lddLvfruBDC7N7aCLr--hOv3XBvWBoHqDKog5b1OEN6rBFHTaow8saj1CHHeqwQx0G1GFAHbawwQ512KAOO9Q9RF_eH52-Pfb7Th6-iKKk9QOhpiEPYyW0xlQQlXGhyyJRKUIFGqUKiAp4nEhKYym5EHzKWMhjSTgoWME0eoT2ALLyMcIxlZxQBl_OVMxlzClJMxDpiaBhTAN1gEL3R-aiL3Ovu60s8h1EPECvh0krW-Vl9-mJo1De3z9WAc0Bc7snvnT0zIGNa98cq-Wya_IAlBLQ3qMseHK9a3mKbm1upGdor1138jm6KS7aslm_6EH5G-e2x3w
linkProvider Elsevier
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Secure+binary+arithmetic+coding+based+on+digitalized+modified+logistic+map+and+linear+feedback+shift+register&rft.jtitle=Communications+in+nonlinear+science+%26+numerical+simulation&rft.au=Zhang%2C+Yushu&rft.au=Xiao%2C+Di&rft.au=Wen%2C+Wenying&rft.au=Nan%2C+Hai&rft.date=2015-10-01&rft.issn=1007-5704&rft.volume=27&rft.issue=1-3&rft.spage=22&rft.epage=29&rft_id=info:doi/10.1016%2Fj.cnsns.2015.02.025&rft.externalDBID=n%2Fa&rft.externalDocID=10_1016_j_cnsns_2015_02_025
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1007-5704&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1007-5704&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1007-5704&client=summon