2019
DOI: 10.3390/e21010040
|View full text |Cite
|
Sign up to set email alerts
|

Three Techniques for Enhancing Chaos-Based Joint Compression and Encryption Schemes

Abstract: In this work, three techniques for enhancing various chaos-based joint compression and encryption (JCAE) schemes are proposed. They respectively improved the execution time, compression ratio, and estimation accuracy of three different chaos-based JCAE schemes. The first uses auxiliary data structures to significantly accelerate an existing chaos-based JCAE scheme. The second solves the problem of huge multidimensional lookup table overheads by sieving out a small number of important sub-tables. The third incr… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
8
0

Year Published

2019
2019
2021
2021

Publication Types

Select...
5

Relationship

1
4

Authors

Journals

citations
Cited by 7 publications
(8 citation statements)
references
References 23 publications
0
8
0
Order By: Relevance
“…Employing the new combined simultaneous compression-encryption approach highly reduces the required resources for encryption (computational and power resources), according to [ 15 ] and [ 18 ]. Owing to such an attractive property, lots of works are devoted to this topic [ 19 , 20 , 21 , 22 , 23 ], some of them are also chaotic map based. In [ 22 ], we proposed three techniques for enhancing various chaos-based joint compression and encryption (JCAE) schemes.…”
Section: Discussionmentioning
confidence: 99%
See 1 more Smart Citation
“…Employing the new combined simultaneous compression-encryption approach highly reduces the required resources for encryption (computational and power resources), according to [ 15 ] and [ 18 ]. Owing to such an attractive property, lots of works are devoted to this topic [ 19 , 20 , 21 , 22 , 23 ], some of them are also chaotic map based. In [ 22 ], we proposed three techniques for enhancing various chaos-based joint compression and encryption (JCAE) schemes.…”
Section: Discussionmentioning
confidence: 99%
“…Owing to such an attractive property, lots of works are devoted to this topic [ 19 , 20 , 21 , 22 , 23 ], some of them are also chaotic map based. In [ 22 ], we proposed three techniques for enhancing various chaos-based joint compression and encryption (JCAE) schemes. They respectively improved the execution time, compression ratio, and estimation accuracy of three different chaos-based JCAE schemes.…”
Section: Discussionmentioning
confidence: 99%
“…Obtained models can be used as testbench systems in various statistical studies [25] or for simulation of nonstationary processes with multifractal properties. Though an accurate simulation with nonlinear integration techniques meets significant difficulties, these methods can improve the algorithms of pseudo-random number generators [26,27], making them able to avoid quasi-chaotic regimes during long-term runs. They also can provide improved topological mixing and diffusion properties required in chaos-based cryptosystems [28].…”
Section: Conclusion and Discussionmentioning
confidence: 99%
“…Chaos theory is widely used in the encryption of information because of its particular properties [ 1 , 2 , 3 ], such as the high sensitivity to initial conditions, ergodicity, randomness, and topology complexity, among others [ 4 , 5 , 6 , 7 ]. For instance, numerous works related to the encryption of information using methods with chaotic and hyperchaotic models have been reported in [ 8 , 9 , 10 , 11 , 12 , 13 , 14 , 15 , 16 , 17 , 18 , 19 ].…”
Section: Introductionmentioning
confidence: 99%
“…Additionally, the method reported by [ 73 ] is used for the encryption of information using multiple-precision arithmetic [ 83 ]. The Python programming language [ 84 ] is used to process several significant decimals higher than that reported in the works [ 1 , 2 , 3 , 4 , 5 , 6 , 7 , 8 , 9 , 10 , 11 , 12 , 13 , 14 , 16 , 17 , 18 , 20 , 21 , 22 , 23 , 24 , 25 , 26 , 29 , 30 , 31 , 32 , 33 , 34 , 35 , 36 , 37 , 38 , 39 , 40 , 41 , 42 , 43 , 44 , 45 , 46 , 47 , 48 , 49 , 50 , 51 ] and which are based on the IEEE 754 standard [ 54 ], typically used in computers and FPGAs. It is important to emphasize that Python is a scientific programming language [ 84 ] with the following advantages: open-source, free license, an...…”
Section: Introductionmentioning
confidence: 99%