Secure binary arithmetic coding based on digitalized modified logistic map and linear feedback shift register
•The proposed arithmetic coding is based on digitalized modified logistic map.•The security is improved due to the architecture of shift–perturbance.•The scheme possesses high sensitivity and strong randomness.•The appended computational complexity is very small. In this paper, we propose a novel se...
Saved in:
| Published in: | Communications in nonlinear science & numerical simulation Vol. 27; no. 1-3; pp. 22 - 29 |
|---|---|
| Main Authors: | , , , , |
| Format: | Journal Article |
| Language: | English |
| Published: |
Elsevier B.V
01.10.2015
|
| Subjects: | |
| ISSN: | 1007-5704, 1878-7274 |
| Online Access: | Get full text |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
| Abstract | •The proposed arithmetic coding is based on digitalized modified logistic map.•The security is improved due to the architecture of shift–perturbance.•The scheme possesses high sensitivity and strong randomness.•The appended computational complexity is very small.
In this paper, we propose a novel secure arithmetic coding based on digitalized modified logistic map (DMLM) and linear feedback shift register (LFSR). An input binary sequence is first mapped into a table, which is then scrambled by two cyclic shift steps driven by the keys resulting from DMLM–LFSR. Next, each column is encoded using traditional arithmetic coding (TAC) and randomized arithmetic coding (RAC). During the RAC process, the exchange of two intervals is controlled by the keystream generated from the DMLM. At the same time, a few bits of the present column sequence are extracted to interfere the generation of new keystream used for the next column. The final ciphertext sequence is obtained by XORing the compressed sequence and the keystream generated by the LFSR. Results show the compression ratio of our scheme is slightly higher than that of TAC, but the security is improved due to the architecture of shift–perturbance. DMLM and LFSR theories also ensure high sensitivity and strong randomness. The appended complexity is only O(N), where N is the number of the input symbols. |
|---|---|
| AbstractList | In this paper, we propose a novel secure arithmetic coding based on digitalized modified logistic map (DMLM) and linear feedback shift register (LFSR). An input binary sequence is first mapped into a table, which is then scrambled by two cyclic shift steps driven by the keys resulting from DMLM-LFSR. Next, each column is encoded using traditional arithmetic coding (TAC) and randomized arithmetic coding (RAC). During the RAC process, the exchange of two intervals is controlled by the keystream generated from the DMLM. At the same time, a few bits of the present column sequence are extracted to interfere the generation of new keystream used for the next column. The final ciphertext sequence is obtained by XORing the compressed sequence and the keystream generated by the LFSR. Results show the compression ratio of our scheme is slightly higher than that of TAC, but the security is improved due to the architecture of shift-perturbance. DMLM and LFSR theories also ensure high sensitivity and strong randomness. The appended complexity is only O(N), where N is the number of the input symbols. •The proposed arithmetic coding is based on digitalized modified logistic map.•The security is improved due to the architecture of shift–perturbance.•The scheme possesses high sensitivity and strong randomness.•The appended computational complexity is very small. In this paper, we propose a novel secure arithmetic coding based on digitalized modified logistic map (DMLM) and linear feedback shift register (LFSR). An input binary sequence is first mapped into a table, which is then scrambled by two cyclic shift steps driven by the keys resulting from DMLM–LFSR. Next, each column is encoded using traditional arithmetic coding (TAC) and randomized arithmetic coding (RAC). During the RAC process, the exchange of two intervals is controlled by the keystream generated from the DMLM. At the same time, a few bits of the present column sequence are extracted to interfere the generation of new keystream used for the next column. The final ciphertext sequence is obtained by XORing the compressed sequence and the keystream generated by the LFSR. Results show the compression ratio of our scheme is slightly higher than that of TAC, but the security is improved due to the architecture of shift–perturbance. DMLM and LFSR theories also ensure high sensitivity and strong randomness. The appended complexity is only O(N), where N is the number of the input symbols. |
| Author | Nan, Hai Wen, Wenying Xiao, Di Zhang, Yushu Su, Moting |
| Author_xml | – sequence: 1 givenname: Yushu surname: Zhang fullname: Zhang, Yushu organization: School of Electronics and Information Engineering, Southwest University, Chongqing 400715, China – sequence: 2 givenname: Di surname: Xiao fullname: Xiao, Di email: xiaodi_cqu@hotmail.com organization: College of Computer Science, Chongqing University, Chongqing 400044, China – sequence: 3 givenname: Wenying surname: Wen fullname: Wen, Wenying organization: School of Information Technology, Jiangxi University of Finance and Economics, Nanchang 330013, China – sequence: 4 givenname: Hai surname: Nan fullname: Nan, Hai organization: College of Computer Science, Chongqing University, Chongqing 400044, China – sequence: 5 givenname: Moting surname: Su fullname: Su, Moting organization: School of Economics and Business Administration, Chongqing University, Chongqing 400044, China |
| BookMark | eNqFkE2PFCEQholZE3dXf4EXjl56BBr64-DBbPxKNvGgnglUF7M1dsMIjIn-ehnHkwdNKqmCep86PDfsKqaIjD2XYieFHF4edhBLLDslpNkJ1co8YtdyGqduVKO-arMQY2dGoZ-wm1IOolGz0dds-4Rwysg9RZd_cJepPmxYCTikheKee1dw4SnyhfZU3Uo_23Nru0BtWNOeyjm9uSN3sX1QRJd5QFy8g6-8PFCoPOM5hvkpexzcWvDZn37Lvrx98_nufXf_8d2Hu9f3HfT9UDsJQSivdIBe9MNiwuxBz3qeEFQQgwzSBOn1gNOkET2AF84pr9H4flBS9LfsxeXuMadvJyzVblQA19VFTKdi5TgoMZp-li3aX6KQUykZgz1m2poLK4U9y7UH-1uuPcu1QrUyjZr_oqDJqZRizY7W_7CvLiw2A98Jsy1AGAEXygjVLon-yf8C0f-bOA |
| CitedBy_id | crossref_primary_10_1016_j_optlaseng_2016_10_025 crossref_primary_10_1080_01611194_2018_1548390 crossref_primary_10_3390_e23060671 crossref_primary_10_1109_ACCESS_2018_2815567 crossref_primary_10_1002_sec_1378 crossref_primary_10_1186_s42400_024_00352_3 crossref_primary_10_1007_s11071_018_4689_9 crossref_primary_10_1080_09500340_2021_1968054 crossref_primary_10_3390_e23081096 crossref_primary_10_1109_ACCESS_2018_2844184 crossref_primary_10_1007_s11071_018_4076_6 crossref_primary_10_1016_j_sigpro_2020_107525 |
| Cites_doi | 10.1016/j.physleta.2005.09.060 10.1016/j.chaos.2007.01.133 10.1142/S0218127412502562 10.1109/TSP.2007.892710 10.1016/j.physleta.2007.12.026 10.1109/TCSI.2005.859617 10.1109/TIFS.2009.2031944 10.1016/j.sigpro.2010.03.022 10.1016/j.cnsns.2013.06.031 10.1016/j.asoc.2011.05.050 10.1049/el:19980680 10.1016/j.cnsns.2012.08.010 10.1109/TCSI.2008.924117 10.1016/j.cnsns.2009.03.003 10.1016/0167-4048(92)90011-F 10.1109/TSP.2009.2013901 10.1109/TMM.2006.879919 10.1109/TMM.2008.917355 10.1109/TIFS.2010.2096809 10.1109/TCSVT.2003.815165 10.1109/79.952804 10.1109/LSP.2005.861589 10.1109/TIFS.2012.2187514 10.1016/0167-4048(88)90580-9 10.1109/TCOM.1981.1095052 10.1016/j.jss.2011.08.032 10.1016/0167-4048(95)97050-K 10.1016/j.asoc.2009.12.011 10.1109/TCSII.2010.2083170 10.1109/TCSII.2010.2040315 10.1016/0167-4048(93)90099-Q 10.1145/214762.214771 10.1016/j.asoc.2011.09.003 |
| ContentType | Journal Article |
| Copyright | 2015 Elsevier B.V. |
| Copyright_xml | – notice: 2015 Elsevier B.V. |
| DBID | AAYXX CITATION 7SC 7TB 8FD FR3 JQ2 KR7 L7M L~C L~D |
| DOI | 10.1016/j.cnsns.2015.02.025 |
| DatabaseName | CrossRef Computer and Information Systems Abstracts Mechanical & Transportation Engineering Abstracts Technology Research Database Engineering Research Database ProQuest Computer Science Collection Civil Engineering Abstracts Advanced Technologies Database with Aerospace Computer and Information Systems Abstracts Academic Computer and Information Systems Abstracts Professional |
| DatabaseTitle | CrossRef Civil Engineering Abstracts Technology Research Database Computer and Information Systems Abstracts – Academic Mechanical & Transportation Engineering Abstracts ProQuest Computer Science Collection Computer and Information Systems Abstracts Engineering Research Database Advanced Technologies Database with Aerospace Computer and Information Systems Abstracts Professional |
| DatabaseTitleList | Civil Engineering Abstracts |
| DeliveryMethod | fulltext_linktorsrc |
| Discipline | Applied Sciences |
| EISSN | 1878-7274 |
| EndPage | 29 |
| ExternalDocumentID | 10_1016_j_cnsns_2015_02_025 S1007570415000726 |
| GroupedDBID | --K --M -01 -0A -0I -0Y -SA -S~ .~1 0R~ 1B1 1RT 1~. 1~5 29F 4.4 457 4G. 5GY 5VR 5VS 7-5 71M 8P~ 92M 9D9 9DA AACTN AAEDT AAEDW AAIAV AAIKJ AAKOC AALRI AAOAW AAQFI AAQXK AAXUO ABAOU ABFNM ABJNI ABMAC ABNEU ABXDB ABYKQ ACAZW ACDAQ ACFVG ACGFS ACNNM ACRLP ADBBV ADEZE ADGUI ADMUD ADTZH AEBSH AECPX AEKER AENEX AFKWA AFTJW AFUIB AGHFR AGUBO AGYEJ AHJVU AIEXJ AIGVJ AIKHN AITUG AIVDX AJBFU AJOXV ALMA_UNASSIGNED_HOLDINGS AMFUW AMRAJ ARUGR ASPBG AVWKF AXJTR AZFZN BJAXD BKOJK BLXMC CAJEA CAJUS CCEZO CCVFK CHBEP CS3 CUBFJ DU5 EBS EFJIC EFLBG EJD EO8 EO9 EP2 EP3 FA0 FDB FEDTE FGOYB FIRID FNPLU FYGXN G-Q GBLVA HVGLF HZ~ IHE J1W JJJVA JUIAU KOM M41 MHUIS MO0 N9A O-L O9- OAUVE OGIMB OZT P-8 P-9 P2P PC. Q-- Q-0 Q38 R-A R-I R2- RIG ROL RPZ RT1 RT9 S.. SDF SDG SES SEW SPC SPCBC SPD SSQ SST SSW SSZ T5K T8Q T8Y U1F U1G U5A U5I U5K UHS ~G- ~LA 9DU AATTM AAXKI AAYWO AAYXX ABWVN ACLOT ACRPL ACVFH ADCNI ADNMO AEIPS AEUPX AFJKZ AFPUW AGQPQ AIGII AIIUN AKBMS AKRWK AKYEP ANKPU APXCP CITATION EFKBS ~HD 7SC 7TB 8FD FR3 JQ2 KR7 L7M L~C L~D |
| ID | FETCH-LOGICAL-c336t-1cf02b24fc3036d5f9bc49498ec2f061f15f1b46e884eebccb0aa2b4e5b362103 |
| ISICitedReferencesCount | 14 |
| ISICitedReferencesURI | http://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=Summon&SrcAuth=ProQuest&DestLinkType=CitingArticles&DestApp=WOS_CPL&KeyUT=000353774500003&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D |
| ISSN | 1007-5704 |
| IngestDate | Sat Sep 27 18:39:34 EDT 2025 Tue Nov 18 22:35:27 EST 2025 Sat Nov 29 02:22:49 EST 2025 Fri Feb 23 02:25:45 EST 2024 |
| IsPeerReviewed | true |
| IsScholarly | true |
| Issue | 1-3 |
| Keywords | Shift Randomized arithmetic coding Perturbance Linear feedback shift register Digitalized modified logistic map |
| Language | English |
| LinkModel | OpenURL |
| MergedId | FETCHMERGED-LOGICAL-c336t-1cf02b24fc3036d5f9bc49498ec2f061f15f1b46e884eebccb0aa2b4e5b362103 |
| Notes | ObjectType-Article-1 SourceType-Scholarly Journals-1 ObjectType-Feature-2 content type line 23 |
| PQID | 1762075391 |
| PQPubID | 23500 |
| PageCount | 8 |
| ParticipantIDs | proquest_miscellaneous_1762075391 crossref_primary_10_1016_j_cnsns_2015_02_025 crossref_citationtrail_10_1016_j_cnsns_2015_02_025 elsevier_sciencedirect_doi_10_1016_j_cnsns_2015_02_025 |
| PublicationCentury | 2000 |
| PublicationDate | 2015-10-01 |
| PublicationDateYYYYMMDD | 2015-10-01 |
| PublicationDate_xml | – month: 10 year: 2015 text: 2015-10-01 day: 01 |
| PublicationDecade | 2010 |
| PublicationTitle | Communications in nonlinear science & numerical simulation |
| PublicationYear | 2015 |
| Publisher | Elsevier B.V |
| Publisher_xml | – name: Elsevier B.V |
| References | Lin, Wong, Chen (b0150) 2012; 22 Zhou, Liao (b0190) 2012; 85 Witten, Neal, Cleary (b0010) 1987; 30 Moo, Wu (b0050) 1999; vol. 2 Yuen, Wong (b0120) 2011; 11 Wen, Kim, Villasenor (b0070) 2006; 13 Jakimoski, Subbalakshmi (b0080) 2008; 10 Wang, Wong, Liao, Chen (b0140) 2011; 11 Zhou, Au (b0175) 2008; 10 Liao, Lai, Zhou (b0130) 2010; 90 Sun, Wang, Ting (b0095) 2009; 4 Wong, Kwok, Law (b0135) 2008; 372 Chen, Hwang, Lin (b0180) 2010; 57 Zhang, Wong, Yu, Zhu (b0110) 2013; 18 Bergen, Hogan (b0040) 1993; 12 Sang, Wang, Yan (b0185) 1998; 34 Langdon, Rissanen (b0005) 1981; 29 Katti, Srinivasan, Vosoughi (b0085) 2011; 6 Lui, Wong, Chen, Zhou (b0125) 2012; 12 Masmoudi, Puech, Bouhlel (b0170) 2010; 8 Witten, Cleary (b0025) 1988; 7 Katti, Vosoughi (b0100) 2012; 7 Li, Li, Halang, Chen (b0115) 2006; 349 Li, Zhang (b0165) 2009; 14 Zhang, Xiao (b0105) 2014; 19 Cleary, Irvine, Rinsma-Melchert (b0030) 1995; 14 Wong, Lin, Chen (b0145) 2010; 57 Barbir (b0045) 1997 Grangetto, Magli, Olmo (b0065) 2006; 8 Wiegand, Sullivan, Bjontegaard, Luthra (b0020) 2003; 13 Bergen, Hogan (b0035) 1992; 11 Wu, Moo (b0055) 1999; vol. 2 Skodras, Christopoulos, Ebrahimi (b0015) 2001; 18 Liu, Farrell, Boyd (b0060) 1999 Zhou, Au, Wong (b0090) 2009; 57 Mi, Liao, Chen (b0160) 2008; 38 Kim, Wen, Villasenor (b0075) 2007; 55 Bose, Pathak (b0155) 2006; 53 Liu (10.1016/j.cnsns.2015.02.025_b0060) 1999 Wiegand (10.1016/j.cnsns.2015.02.025_b0020) 2003; 13 Bergen (10.1016/j.cnsns.2015.02.025_b0035) 1992; 11 Lin (10.1016/j.cnsns.2015.02.025_b0150) 2012; 22 Zhou (10.1016/j.cnsns.2015.02.025_b0175) 2008; 10 Zhou (10.1016/j.cnsns.2015.02.025_b0090) 2009; 57 Grangetto (10.1016/j.cnsns.2015.02.025_b0065) 2006; 8 Katti (10.1016/j.cnsns.2015.02.025_b0085) 2011; 6 Cleary (10.1016/j.cnsns.2015.02.025_b0030) 1995; 14 Moo (10.1016/j.cnsns.2015.02.025_b0050) 1999; vol. 2 Wong (10.1016/j.cnsns.2015.02.025_b0135) 2008; 372 Wong (10.1016/j.cnsns.2015.02.025_b0145) 2010; 57 Katti (10.1016/j.cnsns.2015.02.025_b0100) 2012; 7 Li (10.1016/j.cnsns.2015.02.025_b0165) 2009; 14 Lui (10.1016/j.cnsns.2015.02.025_b0125) 2012; 12 Langdon (10.1016/j.cnsns.2015.02.025_b0005) 1981; 29 Skodras (10.1016/j.cnsns.2015.02.025_b0015) 2001; 18 Zhang (10.1016/j.cnsns.2015.02.025_b0105) 2014; 19 Sun (10.1016/j.cnsns.2015.02.025_b0095) 2009; 4 Liao (10.1016/j.cnsns.2015.02.025_b0130) 2010; 90 Witten (10.1016/j.cnsns.2015.02.025_b0025) 1988; 7 Bose (10.1016/j.cnsns.2015.02.025_b0155) 2006; 53 Barbir (10.1016/j.cnsns.2015.02.025_b0045) 1997 Mi (10.1016/j.cnsns.2015.02.025_b0160) 2008; 38 Jakimoski (10.1016/j.cnsns.2015.02.025_b0080) 2008; 10 Kim (10.1016/j.cnsns.2015.02.025_b0075) 2007; 55 Chen (10.1016/j.cnsns.2015.02.025_b0180) 2010; 57 Zhou (10.1016/j.cnsns.2015.02.025_b0190) 2012; 85 Witten (10.1016/j.cnsns.2015.02.025_b0010) 1987; 30 Zhang (10.1016/j.cnsns.2015.02.025_b0110) 2013; 18 Sang (10.1016/j.cnsns.2015.02.025_b0185) 1998; 34 Li (10.1016/j.cnsns.2015.02.025_b0115) 2006; 349 Masmoudi (10.1016/j.cnsns.2015.02.025_b0170) 2010; 8 Wen (10.1016/j.cnsns.2015.02.025_b0070) 2006; 13 Bergen (10.1016/j.cnsns.2015.02.025_b0040) 1993; 12 Wu (10.1016/j.cnsns.2015.02.025_b0055) 1999; vol. 2 Yuen (10.1016/j.cnsns.2015.02.025_b0120) 2011; 11 Wang (10.1016/j.cnsns.2015.02.025_b0140) 2011; 11 |
| References_xml | – volume: 85 start-page: 400 year: 2012 end-page: 407 ident: b0190 article-title: Collision-based flexible image encryption algorithm publication-title: J Syst Softw – volume: 22 start-page: 1250256 year: 2012 ident: b0150 article-title: Generalized arithmetic coding using discrete chaotic maps publication-title: Int J Bifur Chaos – volume: vol. 2 start-page: 545 year: 1999 end-page: 549 ident: b0050 article-title: Resynchronization properties of arithmetic coding publication-title: International conference on image processing, ICIP 99. Proceedings – volume: 8 start-page: 170 year: 2010 end-page: 175 ident: b0170 article-title: A new joint lossless compression and encryption scheme combining a binary arithmetic coding with a pseudo random bit generator publication-title: Int J Comput Sci Inf Secur – volume: 13 start-page: 560 year: 2003 end-page: 576 ident: b0020 article-title: Overview of the H.264/AVC video coding standard publication-title: IEEE Trans Circuits Syst Video Tech – volume: 11 start-page: 5092 year: 2011 end-page: 5098 ident: b0120 article-title: A chaos-based joint image compression and encryption scheme using DCT and SHA-1 publication-title: Appl Soft Comput – volume: 57 start-page: 146 year: 2010 end-page: 150 ident: b0145 article-title: Simultaneous arithmetic coding and encryption using chaotic maps publication-title: IEEE Trans Circuits Syst II Express Briefs – volume: 14 start-page: 167 year: 1995 end-page: 180 ident: b0030 article-title: On the insecurity of arithmetic coding publication-title: Comput Secur – volume: 7 start-page: 895 year: 2012 end-page: 903 ident: b0100 article-title: On the security of key-based interval splitting arithmetic coding with respect to message indistinguishability publication-title: IEEE Trans Inf Forensics Secur – volume: 349 start-page: 467 year: 2006 end-page: 473 ident: b0115 article-title: A multiple pseudorandom-bit generator based on a spatiotemporal chaotic map publication-title: Phys Lett A – volume: 372 start-page: 2645 year: 2008 end-page: 2652 ident: b0135 article-title: A fast image encryption scheme based on chaotic standard map publication-title: Phys Lett A – volume: 29 start-page: 858 year: 1981 end-page: 867 ident: b0005 article-title: Compression of black–white images with arithmetic coding publication-title: IEEE Trans Commun – volume: 18 start-page: 36 year: 2001 end-page: 58 ident: b0015 article-title: The jpeg 2000 still image compression standard publication-title: IEEE Signal Processing Mag – volume: 10 start-page: 330 year: 2008 end-page: 338 ident: b0080 article-title: Cryptanalysis of some multimedia encryption schemes publication-title: IEEE Trans Multimedia – volume: 38 start-page: 1523 year: 2008 end-page: 1531 ident: b0160 article-title: A novel chaotic encryption scheme based on arithmetic coding publication-title: Chaos Solitons Fractals – volume: 4 start-page: 781 year: 2009 end-page: 789 ident: b0095 article-title: On the security of the secure arithmetic code publication-title: IEEE Trans Inf Forensics Secur – volume: 30 start-page: 520 year: 1987 end-page: 540 ident: b0010 article-title: Arithmetic coding for data compression publication-title: Commun ACM – start-page: 266 year: 1997 end-page: 270 ident: b0045 article-title: A methodology for performing secure data compression publication-title: Proceedings of the twenty-ninth southeastern symposium on system theory – volume: 90 start-page: 2714 year: 2010 end-page: 2722 ident: b0130 article-title: A novel image encryption algorithm based on self-adaptive wave transmission publication-title: Signal Processing – volume: 53 start-page: 848 year: 2006 end-page: 857 ident: b0155 article-title: A novel compression and encryption scheme using variable model arithmetic coding and coupled chaotic system publication-title: IEEE Trans Circuits Syst I Regular Pap – volume: 14 start-page: 4304 year: 2009 end-page: 4318 ident: b0165 article-title: A secure and efficient entropy coding based on arithmetic coding publication-title: Commun Nonlinear Sci Numer Simul – volume: 55 start-page: 2263 year: 2007 end-page: 2272 ident: b0075 article-title: Secure arithmetic coding publication-title: IEEE Trans Signal Processing – volume: 11 start-page: 514 year: 2011 end-page: 522 ident: b0140 article-title: A new chaos-based fast image encryption algorithm publication-title: Appl Soft Comput – volume: 7 start-page: 397 year: 1988 end-page: 408 ident: b0025 article-title: On the privacy afforded by adaptive text compression publication-title: Comput Secur – volume: 12 start-page: 125 year: 2012 end-page: 132 ident: b0125 article-title: Chaos-based joint compression and encryption algorithm for generating variable length ciphertext publication-title: Appl Soft Comput – volume: vol. 2 start-page: 908 year: 1999 end-page: 912 ident: b0055 article-title: Joint image/video compression and encryption via high-order conditional entropy coding of wavelet coefficients publication-title: IEEE international conference on multimedia computing and systems – volume: 8 start-page: 905 year: 2006 end-page: 917 ident: b0065 article-title: Multimedia selective encryption by means of randomized arithmetic coding publication-title: IEEE Trans Multimedia – volume: 11 start-page: 445 year: 1992 end-page: 461 ident: b0035 article-title: Data security in a fixed-model arithmetic coding compression algorithm publication-title: Comput Secur – volume: 18 start-page: 584 year: 2013 end-page: 600 ident: b0110 article-title: A symmetric color image encryption algorithm using the intrinsic features of bit distributions publication-title: Commun Nonlinear Sci Numer Simul – volume: 57 start-page: 1825 year: 2009 end-page: 1838 ident: b0090 article-title: Adaptive chosen-ciphertext attack on secure arithmetic coding publication-title: IEEE Trans Signal Processing – volume: 57 start-page: 996 year: 2010 end-page: 1000 ident: b0180 article-title: Randomness enhancement using digitalized modified logistic map publication-title: IEEE Trans Circuits Syst II Express Briefs – volume: 34 start-page: 873 year: 1998 end-page: 874 ident: b0185 article-title: Perturbance-based algorithm to expand cycle length of chaotic key stream publication-title: Electron Lett – volume: 10 start-page: 3368 year: 2008 end-page: 3369 ident: b0175 article-title: Comments on a novel compression and encryption scheme using variable model arithmetic coding and coupled chaotic system publication-title: IEEE Trans. on Circuits Syst – volume: 12 start-page: 157 year: 1993 end-page: 167 ident: b0040 article-title: A chosen plaintext attack on an adaptive arithmetic coding compression algorithm publication-title: Comput Secur – start-page: 84 year: 1999 end-page: 93 ident: b0060 article-title: A unified code publication-title: Cryptography and coding – volume: 13 start-page: 69 year: 2006 end-page: 72 ident: b0070 article-title: Binary arithmetic coding with key-based interval splitting publication-title: IEEE Signal Processing Lett – volume: 6 start-page: 19 year: 2011 end-page: 27 ident: b0085 article-title: On the security of randomized arithmetic codes against ciphertext-only attacks publication-title: IEEE Trans Inf Forensics Secur – volume: 19 start-page: 74 year: 2014 end-page: 82 ident: b0105 article-title: An image encryption scheme based on rotation matrix bit-level permutation and block diffusion publication-title: Commun Nonlinear Sci Numer Simul – volume: 349 start-page: 467 issue: 6 year: 2006 ident: 10.1016/j.cnsns.2015.02.025_b0115 article-title: A multiple pseudorandom-bit generator based on a spatiotemporal chaotic map publication-title: Phys Lett A doi: 10.1016/j.physleta.2005.09.060 – volume: 38 start-page: 1523 issue: 5 year: 2008 ident: 10.1016/j.cnsns.2015.02.025_b0160 article-title: A novel chaotic encryption scheme based on arithmetic coding publication-title: Chaos Solitons Fractals doi: 10.1016/j.chaos.2007.01.133 – volume: 22 start-page: 1250256 issue: 10 year: 2012 ident: 10.1016/j.cnsns.2015.02.025_b0150 article-title: Generalized arithmetic coding using discrete chaotic maps publication-title: Int J Bifur Chaos doi: 10.1142/S0218127412502562 – volume: 55 start-page: 2263 issue: 5 year: 2007 ident: 10.1016/j.cnsns.2015.02.025_b0075 article-title: Secure arithmetic coding publication-title: IEEE Trans Signal Processing doi: 10.1109/TSP.2007.892710 – volume: 372 start-page: 2645 issue: 15 year: 2008 ident: 10.1016/j.cnsns.2015.02.025_b0135 article-title: A fast image encryption scheme based on chaotic standard map publication-title: Phys Lett A doi: 10.1016/j.physleta.2007.12.026 – volume: 53 start-page: 848 issue: 4 year: 2006 ident: 10.1016/j.cnsns.2015.02.025_b0155 article-title: A novel compression and encryption scheme using variable model arithmetic coding and coupled chaotic system publication-title: IEEE Trans Circuits Syst I Regular Pap doi: 10.1109/TCSI.2005.859617 – start-page: 266 year: 1997 ident: 10.1016/j.cnsns.2015.02.025_b0045 article-title: A methodology for performing secure data compression – volume: 4 start-page: 781 issue: 4 year: 2009 ident: 10.1016/j.cnsns.2015.02.025_b0095 article-title: On the security of the secure arithmetic code publication-title: IEEE Trans Inf Forensics Secur doi: 10.1109/TIFS.2009.2031944 – volume: 90 start-page: 2714 issue: 9 year: 2010 ident: 10.1016/j.cnsns.2015.02.025_b0130 article-title: A novel image encryption algorithm based on self-adaptive wave transmission publication-title: Signal Processing doi: 10.1016/j.sigpro.2010.03.022 – volume: 19 start-page: 74 issue: 1 year: 2014 ident: 10.1016/j.cnsns.2015.02.025_b0105 article-title: An image encryption scheme based on rotation matrix bit-level permutation and block diffusion publication-title: Commun Nonlinear Sci Numer Simul doi: 10.1016/j.cnsns.2013.06.031 – volume: 11 start-page: 5092 issue: 8 year: 2011 ident: 10.1016/j.cnsns.2015.02.025_b0120 article-title: A chaos-based joint image compression and encryption scheme using DCT and SHA-1 publication-title: Appl Soft Comput doi: 10.1016/j.asoc.2011.05.050 – volume: 34 start-page: 873 issue: 9 year: 1998 ident: 10.1016/j.cnsns.2015.02.025_b0185 article-title: Perturbance-based algorithm to expand cycle length of chaotic key stream publication-title: Electron Lett doi: 10.1049/el:19980680 – volume: 18 start-page: 584 issue: 3 year: 2013 ident: 10.1016/j.cnsns.2015.02.025_b0110 article-title: A symmetric color image encryption algorithm using the intrinsic features of bit distributions publication-title: Commun Nonlinear Sci Numer Simul doi: 10.1016/j.cnsns.2012.08.010 – volume: 10 start-page: 3368 issue: 55 year: 2008 ident: 10.1016/j.cnsns.2015.02.025_b0175 article-title: Comments on a novel compression and encryption scheme using variable model arithmetic coding and coupled chaotic system publication-title: IEEE Trans. on Circuits Syst doi: 10.1109/TCSI.2008.924117 – volume: 14 start-page: 4304 issue: 12 year: 2009 ident: 10.1016/j.cnsns.2015.02.025_b0165 article-title: A secure and efficient entropy coding based on arithmetic coding publication-title: Commun Nonlinear Sci Numer Simul doi: 10.1016/j.cnsns.2009.03.003 – volume: 11 start-page: 445 issue: 5 year: 1992 ident: 10.1016/j.cnsns.2015.02.025_b0035 article-title: Data security in a fixed-model arithmetic coding compression algorithm publication-title: Comput Secur doi: 10.1016/0167-4048(92)90011-F – volume: 57 start-page: 1825 issue: 5 year: 2009 ident: 10.1016/j.cnsns.2015.02.025_b0090 article-title: Adaptive chosen-ciphertext attack on secure arithmetic coding publication-title: IEEE Trans Signal Processing doi: 10.1109/TSP.2009.2013901 – volume: 8 start-page: 905 issue: 5 year: 2006 ident: 10.1016/j.cnsns.2015.02.025_b0065 article-title: Multimedia selective encryption by means of randomized arithmetic coding publication-title: IEEE Trans Multimedia doi: 10.1109/TMM.2006.879919 – volume: 8 start-page: 170 issue: 1 year: 2010 ident: 10.1016/j.cnsns.2015.02.025_b0170 article-title: A new joint lossless compression and encryption scheme combining a binary arithmetic coding with a pseudo random bit generator publication-title: Int J Comput Sci Inf Secur – volume: 10 start-page: 330 issue: 3 year: 2008 ident: 10.1016/j.cnsns.2015.02.025_b0080 article-title: Cryptanalysis of some multimedia encryption schemes publication-title: IEEE Trans Multimedia doi: 10.1109/TMM.2008.917355 – volume: 6 start-page: 19 issue: 1 year: 2011 ident: 10.1016/j.cnsns.2015.02.025_b0085 article-title: On the security of randomized arithmetic codes against ciphertext-only attacks publication-title: IEEE Trans Inf Forensics Secur doi: 10.1109/TIFS.2010.2096809 – volume: 13 start-page: 560 issue: 7 year: 2003 ident: 10.1016/j.cnsns.2015.02.025_b0020 article-title: Overview of the H.264/AVC video coding standard publication-title: IEEE Trans Circuits Syst Video Tech doi: 10.1109/TCSVT.2003.815165 – volume: 18 start-page: 36 issue: 5 year: 2001 ident: 10.1016/j.cnsns.2015.02.025_b0015 article-title: The jpeg 2000 still image compression standard publication-title: IEEE Signal Processing Mag doi: 10.1109/79.952804 – volume: vol. 2 start-page: 545 year: 1999 ident: 10.1016/j.cnsns.2015.02.025_b0050 article-title: Resynchronization properties of arithmetic coding – start-page: 84 year: 1999 ident: 10.1016/j.cnsns.2015.02.025_b0060 article-title: A unified code – volume: 13 start-page: 69 issue: 2 year: 2006 ident: 10.1016/j.cnsns.2015.02.025_b0070 article-title: Binary arithmetic coding with key-based interval splitting publication-title: IEEE Signal Processing Lett doi: 10.1109/LSP.2005.861589 – volume: 7 start-page: 895 issue: 3 year: 2012 ident: 10.1016/j.cnsns.2015.02.025_b0100 article-title: On the security of key-based interval splitting arithmetic coding with respect to message indistinguishability publication-title: IEEE Trans Inf Forensics Secur doi: 10.1109/TIFS.2012.2187514 – volume: 7 start-page: 397 issue: 4 year: 1988 ident: 10.1016/j.cnsns.2015.02.025_b0025 article-title: On the privacy afforded by adaptive text compression publication-title: Comput Secur doi: 10.1016/0167-4048(88)90580-9 – volume: 29 start-page: 858 issue: 6 year: 1981 ident: 10.1016/j.cnsns.2015.02.025_b0005 article-title: Compression of black–white images with arithmetic coding publication-title: IEEE Trans Commun doi: 10.1109/TCOM.1981.1095052 – volume: 85 start-page: 400 issue: 2 year: 2012 ident: 10.1016/j.cnsns.2015.02.025_b0190 article-title: Collision-based flexible image encryption algorithm publication-title: J Syst Softw doi: 10.1016/j.jss.2011.08.032 – volume: 14 start-page: 167 issue: 2 year: 1995 ident: 10.1016/j.cnsns.2015.02.025_b0030 article-title: On the insecurity of arithmetic coding publication-title: Comput Secur doi: 10.1016/0167-4048(95)97050-K – volume: 11 start-page: 514 issue: 1 year: 2011 ident: 10.1016/j.cnsns.2015.02.025_b0140 article-title: A new chaos-based fast image encryption algorithm publication-title: Appl Soft Comput doi: 10.1016/j.asoc.2009.12.011 – volume: 57 start-page: 996 issue: 12 year: 2010 ident: 10.1016/j.cnsns.2015.02.025_b0180 article-title: Randomness enhancement using digitalized modified logistic map publication-title: IEEE Trans Circuits Syst II Express Briefs doi: 10.1109/TCSII.2010.2083170 – volume: 57 start-page: 146 issue: 2 year: 2010 ident: 10.1016/j.cnsns.2015.02.025_b0145 article-title: Simultaneous arithmetic coding and encryption using chaotic maps publication-title: IEEE Trans Circuits Syst II Express Briefs doi: 10.1109/TCSII.2010.2040315 – volume: 12 start-page: 157 issue: 2 year: 1993 ident: 10.1016/j.cnsns.2015.02.025_b0040 article-title: A chosen plaintext attack on an adaptive arithmetic coding compression algorithm publication-title: Comput Secur doi: 10.1016/0167-4048(93)90099-Q – volume: 30 start-page: 520 issue: 6 year: 1987 ident: 10.1016/j.cnsns.2015.02.025_b0010 article-title: Arithmetic coding for data compression publication-title: Commun ACM doi: 10.1145/214762.214771 – volume: 12 start-page: 125 issue: 1 year: 2012 ident: 10.1016/j.cnsns.2015.02.025_b0125 article-title: Chaos-based joint compression and encryption algorithm for generating variable length ciphertext publication-title: Appl Soft Comput doi: 10.1016/j.asoc.2011.09.003 – volume: vol. 2 start-page: 908 year: 1999 ident: 10.1016/j.cnsns.2015.02.025_b0055 article-title: Joint image/video compression and encryption via high-order conditional entropy coding of wavelet coefficients |
| SSID | ssj0016954 |
| Score | 2.1852756 |
| Snippet | •The proposed arithmetic coding is based on digitalized modified logistic map.•The security is improved due to the architecture of shift–perturbance.•The... In this paper, we propose a novel secure arithmetic coding based on digitalized modified logistic map (DMLM) and linear feedback shift register (LFSR). An... |
| SourceID | proquest crossref elsevier |
| SourceType | Aggregation Database Enrichment Source Index Database Publisher |
| StartPage | 22 |
| SubjectTerms | Arithmetic coding Columns (process) Computer simulation Digitalized modified logistic map Exchange Linear feedback shift register Linear feedback shift registers Logistics Perturbance Randomized arithmetic coding Security Shift Symbols |
| Title | Secure binary arithmetic coding based on digitalized modified logistic map and linear feedback shift register |
| URI | https://dx.doi.org/10.1016/j.cnsns.2015.02.025 https://www.proquest.com/docview/1762075391 |
| Volume | 27 |
| WOSCitedRecordID | wos000353774500003&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D |
| hasFullText | 1 |
| inHoldings | 1 |
| isFullTextHit | |
| isPrint | |
| journalDatabaseRights | – providerCode: PRVESC databaseName: Elsevier SD Freedom Collection Journals 2021 customDbUrl: eissn: 1878-7274 dateEnd: 99991231 omitProxy: false ssIdentifier: ssj0016954 issn: 1007-5704 databaseCode: AIEXJ dateStart: 19960101 isFulltext: true titleUrlDefault: https://www.sciencedirect.com providerName: Elsevier |
| link | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwtV1bb9MwFLbKxgMv3BHjJiPxFoKaixPncYKhgdDEw0DlKbIdm2Zr0qpJpsE_499xbMdpWEXFHpCqtHVjN-35cs7xuSL0qihARtNpAdvUjPqxKDKfBQkFZlgUikrKEuM9__opPTmhs1n2eTL55XJhLhZpXdPLy2z1X0kNY0BsnTp7DXIPi8IAvAaiwxHIDsd_IryxoEuP20Rb2Aq380pnKnpiaRJYtNwqtI-gKL_rjiHlT3hbwWdKa6M2IwjOrtjKOBa0GsrWngIpx5k495p5qVpP93NoXGSvK3QwzjUxYba1rcMB0132kAZa3Vkv0cJryqrvHrZlv_7WNfPOjc5KZiy678qNI8lwS3j64WSvtmhba-4xK8fGjIAMYXGO_2rLKUltR2LHoG3xAAdEPxrz23Akua3pZEsmWPPE2RtRN7Uu0B4QU6XV5lv_WYH7imQc4hVdKNxZbhbJ9SL5NIQHuYH2w5RkIBP2Dz8czT4OLqwkMy34hl_kSl6Z4MKta_mbWnRFQTBaz-lddLvfruBDC7N7aCLr--hOv3XBvWBoHqDKog5b1OEN6rBFHTaow8saj1CHHeqwQx0G1GFAHbawwQ512KAOO9Q9RF_eH52-Pfb7Th6-iKKk9QOhpiEPYyW0xlQQlXGhyyJRKUIFGqUKiAp4nEhKYym5EHzKWMhjSTgoWME0eoT2ALLyMcIxlZxQBl_OVMxlzClJMxDpiaBhTAN1gEL3R-aiL3Ovu60s8h1EPECvh0krW-Vl9-mJo1De3z9WAc0Bc7snvnT0zIGNa98cq-Wya_IAlBLQ3qMseHK9a3mKbm1upGdor1138jm6KS7aslm_6EH5G-e2x3w |
| linkProvider | Elsevier |
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Secure+binary+arithmetic+coding+based+on+digitalized+modified+logistic+map+and+linear+feedback+shift+register&rft.jtitle=Communications+in+nonlinear+science+%26+numerical+simulation&rft.au=Zhang%2C+Yushu&rft.au=Xiao%2C+Di&rft.au=Wen%2C+Wenying&rft.au=Nan%2C+Hai&rft.date=2015-10-01&rft.issn=1007-5704&rft.volume=27&rft.issue=1-3&rft.spage=22&rft.epage=29&rft_id=info:doi/10.1016%2Fj.cnsns.2015.02.025&rft.externalDBID=n%2Fa&rft.externalDocID=10_1016_j_cnsns_2015_02_025 |
| thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1007-5704&client=summon |
| thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1007-5704&client=summon |
| thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1007-5704&client=summon |