Have a personal or library account? Click to login

New Compression–Encryption Algorithm Using Chaos-Based Dynamic Session Key

Open Access
|Mar 2018

References

  1. Abd El-Latif, A.A. and Niu, X. 2013. A hybrid chaotic system and cyclic elliptic curve for image encryption. AEU—International Journal of Electronics and Communications 67(2).
  2. Ahmad, J., Khan, M.A., Hwang, S.O. and Khan, J.S. 2017. A compression sensing and noise-tolerant image encryption scheme based on chaotic maps and orthogonal matrices. Neural Computing and Applications 28(S1): 953–967.
  3. Alleaume, R., Branciard, C., Bouda, J., Debuisschert, T., Dianati, M., Gisin, N., Godfrey, M., Grangier, P., Langer, T., Lutkenhaus, N., Monyk, C., Painchault, P., Peev, M., Poppe, A., Pornin, T., Rarity, J., Renner, R., Ribordy, G., Riguidel, M., Salvail, L., Shields, A., Weinfurter, H. and Zeilinger, A. 2014. Using quantum key distribution for cryptographic purposes: a survey. Theoretical Computer Science 560: 62–81.
  4. Al-Maadeed, S., Al-Ali, A. and Abdalla, T. 2012. A new chaos-based image-encryption and compression algorithm. Journal of Electrical and Computer Engineering 2012: 1–11.
  5. Ayele, A.A. and Screenivasarao, V. 2013. A modified RSA encryption technique based on multiple public keys. International Journal of Innovative Research in Computer and Communication Engineering 1(4): 859–864.
  6. Belazi, A., Abd El-Latif, A.A., Diaconu, A.-V., Rhouma, R. and Belghith, S. 2017. Chaos-based partial image encryption scheme based on linear fractional and lifting wavelet transforms. Optics and Lasers in Engineering 88: 37–50.
  7. Boriga, R., Dascalescu, A.C. and Priescu, I. 2014. A new hyperchaotic map and its application in an image encryption scheme. Signal Processing: Image Communication 29(8): 887–901.
  8. Bull, D.R. 2014. Communicating pictures: a course in image and video coding. Academic Press, New York.
  9. Chen, J., Zhou, J. and Wong, K.-W. 2011. A modified chaos-based joint compression and encryption scheme. IEEE Transactions on Circuits and Systems II Express Briefs 58(2): 110–114.
  10. Chen, T., Zhang, M., Wu, J., Yuen, C. and Tong, Y. 2016. Image encryption and compression based on kronecker compressed sensing and elementary cellular automata scrambling. Optics & Laser Technology 84: 118–133.
  11. Chen, W., Wang, T. and Wang, B. 2014. Design of digital image encryption algorithm based on mixed chaotic sequences. International Journal on Smart Sensing and Intelligent Systems 7(4): pp. 1453–1469.
  12. Deng, J., Zhao, S., Wang, Y., Wang, L., Wang, H. and Sha, H. 2017. Image compression–encryption scheme combining 2D compressive sensing with discrete fractional random transform. Multimedia Tools and Applications 76(7): 10097–10117.
  13. Dhenakaran, S.S. and Ilayaraja, M. 2012. Extension of playfair cipher using 16X16 matrix. International Journal of Computer Application 48(7): 37–41.
  14. Fira, M. 2015. Applications of compressed sensing: compression and encryption. 2015 E-Health andBioengineering Conference (EHB), pp. 1–4.
  15. Goel, N., Raman, B. and Gupta, I. 2014. Chaos based joint compression and encryption framework for end-to-end communication systems. Advances in Multimedia 2014: 1–10.
  16. Gupta, K. and Silakari, S. 2012. Novel approach for fast compressed hybrid color image cryptosystem. Advances in Engineering Software 49(1): 29–42.
  17. Hamdi, M., Rhouma, R. and Belghith, S. 2017. A selective compression–encryption of images based on SPIHT coding and Chirikov Standard Map. Signal Processing 131: 514–526.
  18. Hassan, N.S. and Younis, H.A. 2013. Approach for partial encryption of compressed images. Journal of Babylon University Application Science 21(3): 1–10.
  19. Hua, Z. and Zhou, Y. 2017. Design of image cipher using block-based scrambling and image filtering. Information Sciences (NY). 396: 97–113.
  20. Huang, R., Rhee, K.H.H. and Uchida, S. 2014. A parallel image encryption method based on compressive sensing. Multimedia Tools and Applications 72(1): 71–93.
  21. Jolfaei, A. and Mirghadri, A. 2011. Image encryption using chaos and block cipher. Computer and Information Science 4(1): 172–185.
  22. Karthikeyan, T., Praburaj, B. and Kesavapandian, K. 2014. Embedded zero tree wavelet and orthogonal polynomial based transformation coding. Journal of Theoretical and Applied Information Technology 68(1): 215–223.
  23. Koops, B. 1999. The crypto controversy a key conflict in the information society. Kluwer Law International, The Netherlands.
  24. Kumar, M. and Vaish, A. 2016. Prediction error based compression of color images using WDR coding. AEU—International Journal of Electronics and Communications 70(9): 1164–1171.
  25. Kumar, M. and Vaish, A. 2017. An efficient encryption-then-compression technique for encrypted images using SVD. Digital Signal Processing 60: 81–89.
  26. Li, P. and Lo, K. 2015. Joint image compression and encryption based on alternating transforms with quality control. in 2015 Visual Communications and Image Processing (VCIP), pp. 1-4.
  27. Mahaveerakannan, R. and Dhas, C.S.G. 2016. Customized RSA public key cryptosystem using digital signature of secure data transfer natural number algorithm. International Journal of Circuit Theory and Applications 9(5): 2627–2632.
  28. Morales-Sandoval, M. and Feregrino-Uribe, C. 2005. A hardware architecture for elliptic curve cryptography and lossless data compression. 15th International Conference on Electronics, Communications and Computers (CONIELECOMP'05), pp. 113–118.
  29. Munir, R. 2012. Security analysis of selective image encryption algorithm based on chaos and CBC-like mode. 2012 7th International Conference on Telecommunication Systems, Services, and Applications (TSSA), no. 2, pp. 142–146.
  30. Murillo-Escobar, M.A., Cruz-Hernandez, C., Abundiz-Perez, F., Lopez-Gutierrez, R.M. and Acosta Del Campo, O.R. 2015. A RGB image encryption algorithm based on total plain image characteristics and chaos. Signal Processing 109: 119–131.
  31. Patrick, T.K. 2011. One way functions and public key cryptography. African Journal of Mathematics and Computer Science Research 4(6): 213–216.
  32. Rahmawati, W.M., Saikhu, A. and Kompresi, A.E. 2013. Implementasi Algoritma Penggabungan Kompresi dan Enkripsi Citra dengan DCT dan SHA-1. J. Tek. POMITS 2(1): 1–4.
  33. Santhosh, M., Charles, B.S. and Giriprasad, M.N. 2013. Lossless image compression using new biorthogonal wavelets. Signal and Image Processing: An International Journal 4(6): 4553.
  34. Santoso, A.J., Nugroho, L.E., Suparta, G.B. and Hidayat, R. 2011. Color image compression using orthogonal wavelet viewed from decomposition level and peak signal to noise ratio. International Journal of Advanced Science and Technology 31: 81–92.
  35. Setyaningsih, E. and Harjoko, A. 2017. Survey of hybrid image compression techniques. International Journal of Electrical and Computer Engineering 7(4): 2206–2214.
  36. Setyaningsih, E. and Wardoyo, R. 2017. Review of image compression and encryption techniques. International Journal of Advanced Computer Science and Applications 8(2): 83–94.
  37. Sharadha, R. and Bhanuprakash, C. 2013. Image compression technique for color images using wavelets. International Journal of Advanced. Research in Computer Science and Software Engineering 3(11): 322327.
  38. Sharma, S. 2012. Modified RSA public key cryptosystem using short range natural number algorithm. International Journal of Advanced. Research in Computer Science and Software Engineering 2(8): 134138.
  39. Somani, N. and Mangal, D. 2014. An improved RSA cryptographic system. International Journal of Computer Application 105(16): 18–22.
  40. Teng, L., Wang, X. and Meng, J. 2017. A Chaotic color image encryption using integrated bit-level permutation. Multimedia Tools and Applications, pp. 1–14.
  41. Tong, X.-J., Chen, P. and Zhang, M. 2017. A joint image lossless compression and encryption method based on chaotic map. Multimedia Tools and Applications 76(12): 13995–14020.
  42. Tong, X.-J., Wang, Z., Zhang, M. and Liu, Y. 2013. A new algorithm of the combination of image compression and encryption technology based on cross chaotic map. Nonlinear Dynamics 72(1-2): 229–241.
  43. Vaish, A., Gautam, S. and Kumar, M. 2017. A wavelet based approach for simultaneous compression and encryption of fused images. Journal of King Saud Univ.—Computer and Information Science, pp. 1–10.
  44. Wang, B. and Gao, Y. 2015. An image compression scheme based on fuzzy neural network. TELKOMMNIKA (Telecommunication Computing Electronics and Control) 13(1): 137.
  45. Wang, C., Ni, J. and Huang, Q. 2015. A new encryption then compression algorithm using the rate distortion optimization. Signal Processing: Image Communication 39: 141–150.
  46. Wang, X. and Zhao, J. 2010. An improved key agreement protocol based on chaos. Communications in Nonlinear Science and Numerical Simulation 15(12): 4052–4057.
  47. Wang, X., Liu, L. and Zhang, Y. 2015. A novel chaotic block image encryption algorithm based on dynamic random growth technique. Optics and Lasers in Engineering 66: 10–18.
  48. Xiang, T., Qu, J. and Xiao, D. 2014. Joint SPIHT compression and selective encryption. Applied Soft Computing 21: 159–170.
  49. Xiaoyong, J., Sen, B., Guibin, Z. and Bing, Y. 2017. Image encryption and compression based on the generalized knight’s tour, discrete cosine transform and chaotic maps. Multimedia Tools and Applications 76(10): 12965–12979.
  50. Younes, M.A.B. and Jantan, A. 2008. Image encryption using block-based transformation algorithm. International Journal of Computer Science 35(1): 1–9.
  51. Zhang, M. and Tong, X. 2017. Joint image encryption and compression scheme based on IWT and SPIHT. Optics and Lasers in Engineering. 90: 254–274.
  52. Zhang, Y., Xu, B. and Zhou, N. 2017. A novel image compression–encryption hybrid algorithm based on the analysis sparse representation. Optics Communications 392: 223–233.
  53. Zhou, N., Zhang, A., Zheng, F. and Gong, L. 2014. Novel image compression–encryption hybrid algorithm based on key-controlled measurement matrix in compressive sensing. Optics and Laser Technology 62: 152–160.
  54. Zhu, Z., Zhang, W., Wong, K. and Yu, H. 2011. A chaos-based symmetric image encryption scheme using a bit-level permutation. Information Sciences (NY). 181(6): 1171–1186.
Language: English
Page range: 1 - 19
Published on: Mar 28, 2018
Published by: Professor Subhas Chandra Mukhopadhyay
In partnership with: Paradigm Publishing Services
Publication frequency: 1 times per year

© 2018 Emy Setyaningsih, Retantyo Wardoyo, Anny Kartika Sari, published by Professor Subhas Chandra Mukhopadhyay
This work is licensed under the Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 License.