Secure FSM-based arithmetic codes
نویسندگان
چکیده
Recently, arithmetic coding has attracted the attention of many scholars because of its high compression capability. Accordingly, in this paper, a method that adds secrecy to this well-known source code is proposed. Finite state arithmetic code is used as source code to add security. Its finite state machine characteristic is exploited to insert some random jumps during source coding process. In addition, a Huffman code is designed for each state to make decoding possible even in jumps. Being prefix-free, Huffman codes are useful in tracking correct states for an authorized user when he/she decodes with correct symmetric pseudo-random key. The robustness of our proposed scheme is further reinforced by adding another extra uncertainty by swapping outputs of Huffman codes in each state. Several test images are used for inspecting the validity of the proposed Huffman finite state arithmetic coding (HFSAC). The results of several experimental key space analyses, statistical analyses, key and plaintext sensitivity tests show that HFSAC with a little effect on compression efficiency provides an efficient and secure method for real-time image encryption and transmission. H. Moradmand Ziyabar (B) Sazgan Ertebat Co., Tehran, Iran e-mail: [email protected] M. Sinaie Communication Systems Lab, Department of Electrical and Computer Engineering, Tarbiat Modares University, Tehran, Iran e-mail: [email protected] A. Payandeh Department of Electrical Engineering, Malekashtar University of Technology, Tehran, Iran e-mail: [email protected] V. T. Vakili Department of Electrical Engineering, Iran University of Science and Technology, Tehran, Iran e-mail: [email protected]
منابع مشابه
An efficient secure channel coding scheme based on polar codes
In this paper, we propose a new framework for joint encryption encoding scheme based on polar codes, namely efficient and secure joint secret key encryption channel coding scheme. The issue of using new coding structure, i.e. polar codes in Rao-Nam (RN) like schemes is addressed. Cryptanalysis methods show that the proposed scheme has an acceptable level of security with a relatively smaller ke...
متن کاملDesign of Reliable and Secure Multipliers by Multilinear Arithmetic Codes
We propose an efficient technique for the detection of errors in cryptographic circuits introduced by strong adversaries. Previously a number of linear and nonlinear error detection schemes were proposed. Linear codes provide protection only against primitive adversaries which no longer represents practice. On the other hand nonlinear codes provide protection against strong adversaries, but at ...
متن کاملFault-Secure Parity Prediction Arithmetic Operators
units (adders, ALUs, multipliers, dividers) are essential to fault-tolerant computer designs. Some researchers based early design schemes for such units on arithmetic residue codes.1 Others proposed parity prediction schemes for the same purpose.2 These schemes compute the output operand’s parity as a function of the operator’s internal carries and of the input operands’ parities. The basic dra...
متن کاملRobust Residue Codes for Fault-Tolerant Public-Key Arithmetic
We present a scheme for robust multi-precision arithmetic over the positive integers, protected by a novel family of non-linear arithmetic residue codes. These codes have a very high probability of detecting arbitrary errors of any weight. Our scheme lends itself well for straightforward implementation of standard modular multiplication techniques, i.e. Montgomery or Barrett Multiplication, sec...
متن کاملAn Innovative Approach towards Arithmetic & Control in DNA Paradigm
This paper aims to conceptually evolve a DNA processor modeling its computational ability and control aspects. DNA Encoding transforms the Radix 2 numbers to strings defined over the language set S {A,T,C,G}. A-Adenine, T-Thymine, C-Cytosine, GGuanine are the nucleotides forming the DNA language set. Arithmetic and logical operations are the basis for any implementation of a computing machine. ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- Signal, Image and Video Processing
دوره 8 شماره
صفحات -
تاریخ انتشار 2014