2009
DOI: 10.1016/j.cnsns.2009.03.003
|View full text |Cite
|
Sign up to set email alerts
|

A secure and efficient entropy coding based on arithmetic coding

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
9
0

Year Published

2011
2011
2015
2015

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 25 publications
(9 citation statements)
references
References 28 publications
0
9
0
Order By: Relevance
“…For the sake of comparison with respect to randomness and complexity, four existing methods [31][32][33][34] are employed, which are similar to ours because they have one point in common: chaos is used to improve the security of AC. Table 2 gives the corresponding results, which demonstrates that the proposed scheme simultaneously meets two requirements, both low-cost computation and high randomness quality.…”
Section: Complexitymentioning
confidence: 99%
See 3 more Smart Citations
“…For the sake of comparison with respect to randomness and complexity, four existing methods [31][32][33][34] are employed, which are similar to ours because they have one point in common: chaos is used to improve the security of AC. Table 2 gives the corresponding results, which demonstrates that the proposed scheme simultaneously meets two requirements, both low-cost computation and high randomness quality.…”
Section: Complexitymentioning
confidence: 99%
“…Mi et al [32] presented a chaotic encryption scheme under the combination of AC and logistic map. Li and Zhang [33] proposed a security arithmetic coding algorithm based on nonlinear dynamic filter which is employed to generate the pseudorandom number generator (PRNG). Masmoudi et al [34] designed a joint lossless compression and encryption scheme combing a binary AC with a pseudo random bit generator (PRBG) based on a stand chaotic map and an Engel Continued Fraction map.…”
Section: Introductionmentioning
confidence: 99%
See 2 more Smart Citations
“…This scheme can be extended to any adaptive model because of the elimination of the input symbol permutation step, and its implementation is lower in complexity than the original secure AC. A secure BAC scheme based on non-linear dynamic filter with changeable coefficients was presented and discussed in [25]. In a previous work, Masmoudi et al [26] proposed a joint lossless compression and encryption scheme combining BAC with a PRBG.…”
Section: Introductionmentioning
confidence: 99%