Combined data encryption and compression using chaos functions

Ranjan Bose, Saumitr Pathak

Research output: Contribution to journalConference articlepeer-review

8 Scopus citations

Abstract

Past research in the field of cryptography has not given much consideration to arithmetic coding as a feasible encryption technique, with studies proving compression-specific arithmetic coding to be largely unsuitable for encryption. Nevertheless, adaptive modelling, which offers a huge model, variable in structure, and as completely as possible a function of the entire text that has been transmitted since the time the model was initialised, is a suitable candidate for a possible encryption-compression combine. The focus of the work presented in this paper has been to incorporate recent results of chaos theory, proven to be cryptographically secure, into arithmetic coding, to devise a convenient method to make the structure of the model unpredictable and variable in nature, and yet to retain, as far as is possible, statistical harmony, so that compression is possible. A chaos-based adaptive arithmetic coding-encryption technique has been designed, developed and tested and its implementation has been discussed. For typical text files, the proposed encoder gives compression between 67.5% and 70.5%, the zero-order compression suffering by about 6% due to encryption, and is not susceptible to previously carried out attacks on arithmetic coding algorithms.

Original languageEnglish
Article number17
Pages (from-to)164-175
Number of pages12
JournalProceedings of SPIE - The International Society for Optical Engineering
Volume5561
DOIs
StatePublished - 2004
Externally publishedYes
EventMathematics of Data/Image Coding, Compression, and Encryption VII, with Applications - Denver, CO, United States
Duration: Aug 4 2004Aug 5 2004

Keywords

  • Arithmetic coding
  • Chaos
  • Compression
  • Encryption
  • Symmetric key cryptography
  • Variable model

Fingerprint

Dive into the research topics of 'Combined data encryption and compression using chaos functions'. Together they form a unique fingerprint.

Cite this