# Welcome back

## Find a book, put up your feet, stay awhile

Sign in with Facebook

Sorry, we are unable to log you in via Facebook at this time. Please try again later.

or

Welcome to Scribd, the world's digital library. Read, publish, and share books and documents. See more

Download

Standard view

Full view

of .

Look up keyword

Like this

Share on social networks

2Activity

×

0 of .

Results for: No results containing your search query

P. 1

A New Joint Lossless Compression And Encryption Scheme Combining A Binary Arithmetic Coding With A Pseudo Random Bit GeneratorRatings: (0)|Views: 78|Likes: 2

Published by ijcsis

In this paper, we propose a new scheme which performs both lossless compression and encryption of data. The lossless compression is based on the arithmetic coding (AC) and the encryption is based on a pseudo random bit generator (PRBG). Thus, the plaintext is compressed with a binary arithmetic coding (BAC) whose two mapping intervals are swapped randomly by using a PRBG. In this paper, we propose a PRBG based on the standard chaotic map and the Engel Continued Fraction (ECF) map to generate a keystream with both good chaotic and statistical properties. To be used in cryptography, a PRBG may need to meet stronger requirements than for other applications. In particular, various statistical tests can be applied to the outputs of such generators to conclude whether the generator produces a truly random sequence or not. The numerical simulation analysis indicates that the proposed compression and encryption scheme satisfies highly security with no loss of the BAC compression efficiency.

In this paper, we propose a new scheme which performs both lossless compression and encryption of data. The lossless compression is based on the arithmetic coding (AC) and the encryption is based on a pseudo random bit generator (PRBG). Thus, the plaintext is compressed with a binary arithmetic coding (BAC) whose two mapping intervals are swapped randomly by using a PRBG. In this paper, we propose a PRBG based on the standard chaotic map and the Engel Continued Fraction (ECF) map to generate a keystream with both good chaotic and statistical properties. To be used in cryptography, a PRBG may need to meet stronger requirements than for other applications. In particular, various statistical tests can be applied to the outputs of such generators to conclude whether the generator produces a truly random sequence or not. The numerical simulation analysis indicates that the proposed compression and encryption scheme satisfies highly security with no loss of the BAC compression efficiency.

See more

See less

https://www.scribd.com/doc/33728837/A-New-Joint-Lossless-Compression-And-Encryption-Scheme-Combining-A-Binary-Arithmetic-Coding-With-A-Pseudo-Random-Bit-Generator

07/15/2010

text

original

A new joint lossless compression and encryptionscheme combining a binary arithmetic codingwith a pseudo random bit generator

A. MASMOUDI

#1

, W. PUECH

∗

2

, M.S. BOUHLEL

#3

#

Research Unit: Sciences and Technologies of Image and Telecommunications, Higher Institute of BiotechnologySfax TUNISIA

1

atef.masmoudi@lirmm.fr

3

medsalim.bouhlel@enis.rnu.tn

∗

Laboratory LIRMM, UMR 5506 CNRS University of Montpellier II 161, rue Ada, 34392 MONTPELLIER CEDEX 05, FRANCE

2

william.puech@lirmm.fr

Abstract

—In this paper, we propose a new scheme whichperforms both lossless compression and encryption of data.The lossless compression is based on the arithmetic coding(AC) and the encryption is based on a pseudo randombit generator (PRBG). Thus, the plaintext is compressedwith a binary arithmetic coding (BAC) whose two mappingintervals are swapped randomly by using a PRBG. In thispaper, we propose a PRBG based on the standard chaoticmap and the Engel Continued Fraction (ECF) map togenerate a keystream with both good chaotic and statisticalproperties. To be used in cryptography, a PRBG may needto meet stronger requirements than for other applications.In particular, various statistical tests can be applied to theoutputs of such generators to conclude whether the generatorproduces a truly random sequence or not. The numericalsimulation analysis indicates that the proposed compressionand encryption scheme satisﬁes highly security with no lossof the BAC compression efﬁciency.

I. I

NTRODUCTION

In recent years, a variety of lossless data compressionmethods have been proposed [4], [3], [23], [31]. All of these methods can not perform both lossless compressionand encryption of data. This paper presents a new schemewhich combines arithmetic coding (AC) with a pseudo ran-dom bit generator (PRBG) to perform both compressionand encryption of data.AC has been widely used as an efﬁcient compressionalgorithm in the new standards such JBIG2, JPEG2000and H.264/AVC. For some speciﬁc applications, AC isalso considered as an encryption algorithm. In [5], Cleary

et al.

considered the AC as an encryption scheme andthey demonstrated that it is vulnerable against chosenplaintext attack and known plaintext attack. In [8], Bergen

et al.

studied the data security provided by an adaptivearithmetic coding (AAC). The improved algorithm basedon regular re-initialisation and adjustment of one of themodel parameters provides signiﬁcant data security, butis vulnerable to a chosen plaintext attack. In [27], Wen

et al.

designed the binary arithmetic coding (BAC) withkey-based interval splitting. They proposed to use a keyfor splitting the interval associated with the symbol to beencoded. Thus, the traditional assumption in AC that a sin-gle contignous interval is used for each symbol is not pre-served. The repeated splitting at each encoding/decodingstep allowing both encryption and compression. In [12],Kim

et al.

demonstrated the insecurity of the intervalsplitting AC against a known plain-text attack and a chosenplain-text attack. They also provided an improved versioncalled the secure AC by applying a series of permutationsat the input symbol sequence and output codeword. Itshould be noticed that due to the permutations process, thescheme has a high complexity and it is difﬁcult to extendthe secure AC to the context-based AC that exploits theinput symbol redundancy to encode messages. In [34],Zhou

et al.

demonstrated that the secure AC is vulnerableagainst a chosen cipher-text attack. The basic idea is toprogressively design codewords input to the decoder, andestablish the correspondance of the bit location before andafter the codeword permutation step. In [35], Zhou

et al.

presented a new scheme for joint security and performanceenhancement of secure AC. They proposed to incorporatethe interval splitting AC scheme with the bit-wise XORoperation. This scheme can be extended to any adaptiveand context-based AC due to the elimination of the inputsymbol permutation step. In addition, the implementationis lower complexity than the original secure AC. Zhou

et al.

also presented a selective encryption scheme witheven lower complexity. In [6], Grangetto

et al.

proposeda novel multimedia security framework by means of AC.The scheme is based on a random organization of theencoding intervals using a secret key. This techniquecan be applied to any multimedia coder employing ACas entropy coding stage, including static, adaptive andcontext-based AC. They proposed an implementation fortheir scheme tailored to the JPEG2000 standard. Mi

et al.

[17] proposed a new chaotic encryption scheme basedon randomized AC using the logistic map for pseudorandom bit generator. However, the logistic map is weak in security because it does not satisfy uniform distributionproperty and it has a small key space with only one controlparameter [1], [2].In addition, chaotic systems have been used for severalapplications [14], [32], [29], [30], [33] and some of thesenovel chaotic systems have designed pseudo random bitgenerators (PRBG) for stream cipher applications [10],[20]. The chaotic systems used in cryptography generate

(IJCSIS) International Journal of Computer Science and Information Security,Vol. 8, No. 1, April 2010170http://sites.google.com/site/ijcsis/ISSN 1947-5500

a keystream with good properties such as ergodicity,sensitivity to initial values and sensitivity to controlparameters. However, some of them are not very suitableto be used in cryptography due to their density functionwhich is not uniform distributed or due to their small keyspace. To be used in cryptography, a PRBG may need tomeet stronger requirements than for other applications.In particular, various statistical tests [21], [16] can beapplied to the outputs of such generators to concludewhether the generator produces a truly random sequenceor not. The use of ECF-map increases the complexity of acryptosystem based on only one chaotic system and thusmakes difﬁcult to extract information about it [20]. Inaddition, ECF-map conserves the cryptography propertiesof the chaotic system; like sensitivity to initial conditionsand control parameters; non periodicity and randomness;and add interesting statistical properties such uniformdistribution density function and zero co-correlation.In this paper, we propose a new joint compressionand encryption scheme based on AC and PRBG. Theproposed PRBG is based on the use of the standardchaotic map coupled with the Engle Continued Fractions(ECF) map. The outputs of the standard map are usedas the inputs of ECF-map. The standard map with goodchaotic properties and the ECF-map which possesses goodstatistical properties motivate us to design a new PRBGfor secure AC.The rest of this paper is organized as follows. In Section2, we brieﬂy discuss the AC. Section 3 details the proposedPRBG which is based on the standard chaotic map and theengel continued fraction map. In Section 4, we describethe proposed algorithm for secure AC. In Section 5, weanalyze the security of the proposed scheme and wediscuss experiment results. Finally, conclusions of thispaper will be discussed in Section 6.II. O

VERVIEW OF ARITHMETIC CODING

AC [13], [28], [9], [18] is a statistical coder and isvery efﬁcient for data compression. In addition, AC hasbeen widely used in many standards including JPEG2000,JBIG2 and H.264/AVC. The principe of AC is that itassigns one codeword to the entire input data symbols andthis codeword is a real number in the interval

[0

,

1)

. Tocalculate the appropriate codeword for input data symbols,the AC works with a modeler that estimates the probabilityof each symbol at the encoding/decoding process. Themodel used by AC can be either static or adaptive.Let

S

=

{

s

1

,...,s

n

}

be an independent and identicallydistributed binary sequence of

n

random symbols. Duringthe encoding process, we ﬁrstly estimate the probabilityof each symbol and we calculate the cumulative distri-bution vector (CDV) by assigning, for each symbol

s

i

, asubinterval with a size proportional to its probability in theinterval

[0

,

1)

. Next, for any new symbol

s

i

from the inputsequence, we select the subinterval for

s

i

and we deﬁneit as the new current interval. We iterate this step until allinput sequence has been processed and we ﬁnally generatethe codeword that uniquely identiﬁes the ﬁnal interval.There are many types of AC. Thus, the binary arithmeticcoding (BAC) is an important type of encoder due to itsability to reduce the complexity created with the dynamicupdate of the CDV when we use an adaptive models.In addition, BAC has universal applications because datasymbols which are putted out from any alphabet can becoded as a sequence of binary symbols. When we work with a binary source alphabet, the CDV is

[0

,p

0

,

1]

, with

p

0

the probability of the symbol ”0”. The interval

[0

,

1)

is partitionned in two parts. In this case, the symbol ”0”is represented by the range

[0

,p

0

)

and the symbol ”1” isrepresented by the range

[

p

0

,

1)

. The Algorithms 1 and 2illustrate the encoding and decoding procedures for theBAC.

Algorithm 1

Binary encoderInitialize

base

←

0

,

length

←

2

N

−

1

for

i

←

1

to

n

do

x

←

length

×

p

(0)

if

b

i

= 0

then

length

←

x

else

init base

←

basebase

←

base

+

xlength

←

length

−

x

if

init base

>

base

then

propagate carry()

end if end if if

length

<

length min

then

renorm enc interval()

end if end forAlgorithm 2

Binary DecoderInitialize

base

←

0

,

length

←

2

N

−

1

, code = input

4

bytes from compressed ﬁle

while

Not end of compressed ﬁle

do

x

←

length

×

p

(0)

if

code

≥

x

then

b

i

←

1

else

b

i

←

0

end if if

b

i

= 0

then

length

←

x

else

code

←

code

−

xlength

←

length

−

x

end if if

length

<

length min

then

renorm dec interval()

end if

output

b

i

end while

III. P

SEUDO RANDOM BITS GENERATED FROM THESTANDARD CHAOTIC MAP AND THE

ECF-

MAP

In this section, we describe the process of the proposedPRBG. In this PRBG, we suggest to use the standardchaotic map which is deﬁned by:

(IJCSIS) International Journal of Computer Science and Information Security,Vol. 8, No. 1, April 2010171http://sites.google.com/site/ijcsis/ISSN 1947-5500

x

j

=

x

j

−

1

+

p

0

×

sin

(

y

j

−

1

)

y

j

=

y

j

−

1

+

x

j

,

(1)where

x

j

and

y

j

are taken modulo

2

π

. The secret key inthe proposed PRBG is a set of three ﬂoating point numbersand one integer

(

x

0

,y

0

,p

0

,N

0

)

, where

{

x

0

,y

0

}∈

[0

,

2

π

)

is the initial values set,

p

0

is the control parameter whichcan have any real value greater than

18

.

0

and

N

0

isthe number of initial iterations of the standard chaoticmap [19]. The standard map has good chaotic propertiesand a large key space of the order

157

bits [19] with anaccuracy of

10

−

14

. This key space is sufﬁcient enoughto resist the brute-force attack. However, the standardchaotic map generates a sequence with non uniformdensity function. The experimental results presented inTable I, show that sequences generated from standardchaotic map failed some tests of the NIST statistical testsuite [21] and these sequences are not good enough tobe used in cryptographic applications. It seems a goodidea to transform the chaotic sequence generated from thestandard chaotic map to a new sequence which satisﬁesuniform distribution property and have many importantcharacteristics of cryptography such as zero co-correlation,randomness and ideal nonlinearity. In [7], a new nonlineardynamical system has been proposed which called EngelContinued Fraction map.The Engel continued fraction (ECF) map

T

E

: [0

,

1]

→

[0

,

1)

is given by:

T

E

(

x

) =

1

1

x

(

1

x

−

1

x

)

if x

= 00

if x

= 0

.

(2)For any

x

∈

[0

,

1)

, the ECF-map generates a new andunique continued fraction expansion [15], [22], [25], [24],[11] of

x

of the form:

x

=1

b

1

+

b

1

b

2

+

b

2

b

3+

...

+

bn

−

1

bn

+

...

, b

n

∈

N

, b

n

≤

b

n

+1

(3)Let

x

∈

[0

,

1)

, and deﬁne:

b

1

=

b

1

(

x

) =

1

x

b

n

=

b

n

(

x

) =

b

1

(

T

n

−

1

E

(

x

))

, n

≥

2

, T

n

−

1

E

(

x

)

= 0

,

(4)where

T

0

E

(

x

) =

x

and

T

nE

(

x

) =

T

E

(

T

n

−

1

E

(

x

))

for

n

≥

1

.From deﬁnition of

T

E

it follows that:

x

=

1

b

1

+

b

1

T

E

(

x

)

=

1

b

1

+

b

1

b

2+

b

2

b

3+

...

+

bn

−

1

bn

+

bnT nE

(

x

)

.

(5)The method used for generating the ECF-continuedfraction expansion of

x

is described in Algorithm 3.From the theorem presented in [7], if we let

x

∈

[0

,

1)

,then

x

has a ﬁnite ECF-expansion (i.e.,

T

nE

(

x

) = 0

forsome

n

≥

1

) if and only if

x

∈

Q

. Thus, all ﬂoatingnumber has a unique and ﬁnite ECF-expansion. Note that,we paid most attention to the following sequence:

Algorithm 3

ECF expansionInitialize

x

0

←

x,i

←

0

while

x

i

= 0

do

i

←

i

+ 1

b

i

←

1

x

i

−

1

x

i

←

1

1

xi

−

1

(

1

x

i

−

1

−

1

x

i

−

1

)

end while

Z

n

(

x

) =

b

n

(

x

)

T

nE

(

x

)

, n

≥

1

.

(6)The sequence

{

Z

i

(

x

)

}

ni

=1

is in

[0

,

1)

and uniformlydistributed for almost all points

x

(for a proof see [7]).So, the ECF-map generates a random and unpredictablesequence

{

Z

i

(

x

)

}

ni

=1

with a uniform distribution. Theseproperties, which are very useful in cryptography, motivateus to use ECF-map in our PRBG.The use of the standard chaotic map make the outputvery sensitive to the input and in our PRGB, the outputs of this chaotic map are used as the input to the ECF-map forgenerating sequences with desirable chaotic and statisticalproperties.In the following paragraph, we give the detailed proce-dure to generate pseudo random binary sequences usingthe standard and ECF maps.We deﬁne a function

G

: [0

,

1)

→

[0

,

1)

such that:

G

(

x

i

) =

j

Z

j

(

x

i

)

−

j

Z

j

(

x

i

)

,

(7)where

{

Z

j

}

is the set calculated according to (6) usingECF-map. In addition, assume that we have deﬁned afunction

F

: [0

,

1]

→{

0

,

1

}

that converts the real number

x

i

to a discrete bit symbol as follows:

F

(

x

i

) =

0

if x

i

<

0

.

51

otherwise.

(8)We propose to use the 2-D standard map, with

{

x

0

,y

0

}

the initial values and

p

0

the control parameterof the chaotic map. The majority of cryptosystems withkeystreams independent of plaintexts are vulnerable underknown plaintext attacks [26]. Thus, to enhance the securityof our encryption method, we propose to use the plaintextwhen producing keystreams. In our scheme, we ﬁrstly iter-ate the chaotic map

N

0

times and the operation proceduresof the proposed PRBG are described as follows:

•

Step 1:

The standard map is iterated continuously.For the

jth

iteration, the output of the standard mapis a new set

{

x

j

,y

j

}

.

•

Step 2:

Assuming that the plaintext is a binarysequence

B

=

b

1

...b

n

. For the

jth

bit of theplaintext we calculate

S

j

the decimal representationof

b

j

−

8

...b

j

−

1

. Note that for the ﬁrst

8

bits of theplaintext,

S

j

equals to a secret value

S

0

. In addition,the standard map generates a set

{

x

j

,y

j

} ∈

[0

,

2

π

)

.So we propose to calculate the set

{

a

j

}

nj

=1

using therelation:

a

j

= (

x

j

+

y

j

+

S

j

256)

−

(

x

j

+

y

j

+

S

j

256)

.

(9)

(IJCSIS) International Journal of Computer Science and Information Security,Vol. 8, No. 1, April 2010172http://sites.google.com/site/ijcsis/ISSN 1947-5500

You've already reviewed this. Edit your review.

1 hundred reads

Lakshmi Raghunathan liked this

- Read and print without ads
- Download to keep your version
- Edit, email or read offline

© Copyright 2015 Scribd Inc.

Language:

Choose the language in which you want to experience Scribd:

Sign in with Facebook

Sorry, we are unable to log you in via Facebook at this time. Please try again later.

or

Password Reset Email Sent

Join with Facebook

Sorry, we are unable to log you in via Facebook at this time. Please try again later.

or

By joining, you agree to our

read free for one month

Personalized recommendationsbased on books you love

Syncing across all your devices

Join with Facebook

or Join with EmailSorry, we are unable to log you in via Facebook at this time. Please try again later.

Already a member? Sign in.

By joining, you agree to our

to download

Personalized recommendationsbased on books you love

Syncing across all your devices

Continue with Facebook

Sign inJoin with emailSorry, we are unable to log you in via Facebook at this time. Please try again later.

By joining, you agree to our

Are you sure?

This action might not be possible to undo. Are you sure you want to continue?

CANCEL

OK

You've been reading!

NO, THANKS

OK

scribd