메뉴 건너뛰기




Volumn 58, Issue 3, 2011, Pages 595-606

On the security of chaotic convolutional coder

Author keywords

Chaos; convolutional code; cryptography; error correction

Indexed keywords

CHAOS THEORY; CONVOLUTION; CONVOLUTIONAL CODES; ERROR CORRECTION;

EID: 79952006983     PISSN: 15498328     EISSN: None     Source Type: Journal    
DOI: 10.1109/TCSI.2010.2073852     Document Type: Article
Times cited : (13)

References (39)
  • 1
    • 77955995885 scopus 로고    scopus 로고
    • Cryptanalysis of chaotic convolutional coder
    • J. T. Zhou and O. C. Au, "Cryptanalysis of chaotic convolutional coder," inProc. IEEEISCAS, 2010, pp. 145-148.
    • (2010) Proc. IEEEISCAS , pp. 145-148
    • Zhou, J.T.1    Au, O.C.2
  • 2
    • 53849102204 scopus 로고    scopus 로고
    • A connection between chaotic and conventional cryptography
    • Jul.
    • G. Millerioux, J. M. Amigo, and J. Daafouz, "A connection between chaotic and conventional cryptography," IEEE Trans. Circuits Syst. I, Reg. Papers, vol. 55, no. 6, pp. 1695-1703, Jul. 2008.
    • (2008) IEEE Trans. Circuits Syst. I, Reg. Papers , vol.55 , Issue.6 , pp. 1695-1703
    • Millerioux, G.1    Amigo, J.M.2    Daafouz, J.3
  • 3
    • 0343689904 scopus 로고
    • Synchronization in chaotic systems
    • Feb.
    • L. M. Pecora and T. L. Carroll, "Synchronization in chaotic systems," Phys. Rev. Lett., vol. 64, no. 8, pp. 821-824, Feb. 1990.
    • (1990) Phys. Rev. Lett. , vol.64 , Issue.8 , pp. 821-824
    • Pecora, L.M.1    Carroll, T.L.2
  • 4
    • 0000072208 scopus 로고
    • Exper-imental demonstration of secure communications via chaotic synchro-nization
    • L. Kocarev, K. S. Halle, K. Eckert, L. O. Chua, and U. Parlitz, "Exper-imental demonstration of secure communications via chaotic synchro-nization,"Int. J. Bifurcation Chaos, vol. 2, no. 3, pp. 709-713, 1992.
    • (1992) Int. J. Bifurcation Chaos , vol.2 , Issue.3 , pp. 709-713
    • Kocarev, L.1    Halle, K.S.2    Eckert, K.3    Chua, L.O.4    Parlitz, U.5
  • 5
    • 0028369325 scopus 로고
    • A chaotic direct-sequence spread spectrum communication system
    • Feb.-Apr.
    • G. Heidari-Bateni and C. D. McGillem, "A chaotic direct-sequence spread spectrum communication system,"IEEE Trans. Commun., vol. 42, no. 2-4, pp. 1524-1527, Feb.-Apr. 1994.
    • (1994) IEEE Trans. Commun. , vol.42 , Issue.2-4 , pp. 1524-1527
    • Heidari-Bateni, G.1    McGillem, C.D.2
  • 7
    • 4444346865 scopus 로고    scopus 로고
    • Chaos-based cryptography: Abriefoverview
    • Third Quarter
    • L. Kocarev, "Chaos-based cryptography: Abriefoverview,"IEEECir- cuits Syst. Mag., vol. 1, no. 3, pp. 6-21, Third Quarter, 2001.
    • (2001) IEEECir-cuits Syst. Mag. , vol.1 , Issue.3 , pp. 6-21
    • Kocarev, L.1
  • 12
    • 58049197860 scopus 로고    scopus 로고
    • Error correction with chaotic switching between convolutional codecs
    • Dec.
    • T. Y. Ng, L. Y. Chew, and S. Puthusserypady, "Error correction with chaotic switching between convolutional codecs," IEEE Trans. Circuits Syst. I, Reg. Papers, vol. 55, no. 11, pp. 3655-3662, Dec. 2008.
    • (2008) IEEE Trans. Circuits Syst. I, Reg. Papers , vol.55 , Issue.11 , pp. 3655-3662
    • Ng, T.Y.1    Chew, L.Y.2    Puthusserypady, S.3
  • 13
    • 33748523842 scopus 로고    scopus 로고
    • Enhancing the security of delayed differential chaotic systems with programmable feedback
    • DOI 10.1109/TCSII.2006.876405
    • C. Robilliard, E. H. Huntington, and J. G. Webb, "Enhancing the secu-rity of delayed differential chaotic systems with programmable feed-back," IEEE Trans. Circuits Syst. II, Exp. Briefs, vol. 53, no. 8, pp. 722-726, Aug. 2006. (Pubitemid 44363886)
    • (2006) IEEE Transactions on Circuits and Systems II: Express Briefs , vol.53 , Issue.8 , pp. 722-726
    • Robilliard, C.1    Huntington, E.H.2    Webb, J.G.3
  • 16
    • 33645805455 scopus 로고    scopus 로고
    • A novel compression and encryption scheme using variable model arithmetic coding and coupled chaotic system
    • Apr.
    • R. Bose and S. Pathak, "A novel compression and encryption scheme using variable model arithmetic coding and coupled chaotic system," IEEE Trans. Circuits Syst. I, Reg. Papers, vol. 53, no. 4, pp. 848-857, Apr. 2006.
    • (2006) IEEE Trans. Circuits Syst. I, Reg. Papers , vol.53 , Issue.4 , pp. 848-857
    • Bose, R.1    Pathak, S.2
  • 17
    • 57149122871 scopus 로고    scopus 로고
    • Comments on A novel compression and encryption scheme using variable model arithmetic coding and coupled chaotic system
    • Nov.
    • J. T. Zhou and O. C. Au, "Comments on "A novel compression and encryption scheme using variable model arithmetic coding and coupled chaotic system"," IEEE Trans. Circuits Syst. I, Reg. Papers, vol. 55, no. 10, pp. 3368-3369, Nov. 2008.
    • (2008) IEEETrans. CircuitsSyst. I, Reg. Papers , vol.55 , Issue.10 , pp. 3368-3369
    • Zhou, J.T.1    Au, O.C.2
  • 18
    • 77649342378 scopus 로고    scopus 로고
    • Simultaneous arithmetic coding and encryption using chaotic maps
    • Feb.
    • K. W. Wong, Q. Z. Lin, and J. Y. Chen, "Simultaneous arithmetic coding and encryption using chaotic maps," IEEE Trans. Circuits Syst. 11, Exp. Briefs, vol. 57, no. 2, pp. 146-150, Feb. 2010.
    • (2010) IEEE Trans. Circuits Syst. 11, Exp. Briefs , vol.57 , Issue.2 , pp. 146-150
    • Wong, K.W.1    Lin, Q.Z.2    Chen, J.Y.3
  • 19
    • 57949091424 scopus 로고    scopus 로고
    • Embedding compression in chaos-based cryptography
    • Nov.
    • K. W. Wong and C. H. Yuen, "Embedding compression in chaos-based cryptography," IEEE Trans. Circuits Syst. II, Exp. Briefs, vol. 55, no. 11, pp. 1193-1197, Nov. 2008.
    • (2008) IEEE Trans. Circuits Syst. II, Exp. Briefs , vol.55 , Issue.11 , pp. 1193-1197
    • Wong, K.W.1    Yuen, C.H.2
  • 20
    • 55549110074 scopus 로고    scopus 로고
    • Arithmetic coding as anon-linear dynamical system
    • Apr.
    • N. Nagaraj, P. G. Vaidya, and K. G. Bhat, "Arithmetic coding as anon-linear dynamical system," Commun. Nonlinear Sci. Numer. Simul., vol. 14, no. 4, pp. 1013-1020, Apr. 2009.
    • (2009) Commun. Nonlinear Sci. Numer. Simul. , vol.14 , Issue.4 , pp. 1013-1020
    • Nagaraj, N.1    Vaidya, P.G.2    Bhat, K.G.3
  • 21
    • 33749506982 scopus 로고    scopus 로고
    • Multimedia selective encryption by means of randomized arithmetic coding
    • DOI 10.1109/TMM.2006.879919, 1703505
    • M. Grangetto, E. Magli, and G. Olmo, "Multimedia selective encryp-tion by means of randomized arithmetic coding," IEEE Trans. Multi-media, vol. 8, no. 5, pp. 905-917, Oct. 2006. (Pubitemid 44523105)
    • (2006) IEEE Transactions on Multimedia , vol.8 , Issue.5 , pp. 905-917
    • Grangetto, M.1    Magli, E.2    Olmo, G.3
  • 22
    • 26844567623 scopus 로고    scopus 로고
    • Design of integrated multimedia compression and encryption systems
    • DOI 10.1109/TMM.2005.854469
    • C. Wu and C.-C. J. Kuo, "Design ofintegrated multimedia compression and encryption systems," IEEE Trans. Multimedia, vol. 7, no. 5, pp. 828-839, Oct. 2005. (Pubitemid 41452511)
    • (2005) IEEE Transactions on Multimedia , vol.7 , Issue.5 , pp. 828-839
    • Wu, C.-P.1    Kuo, C.-C.J.2
  • 23
    • 31344478024 scopus 로고    scopus 로고
    • Binary arithmetic coding with key-based interval splitting
    • DOI 10.1109/LSP.2005.861589
    • J. T. Wen, H. Kim, and J. D. Villasenor, "Binary arithmetic coding with key-based interval splitting," IEEE Signal Process. Lett., vol. 13, no. 2, pp. 69-72, Feb. 2006. (Pubitemid 43137974)
    • (2006) IEEE Signal Processing Letters , vol.13 , Issue.2 , pp. 69-72
    • Wen, J.G.1    Kim, H.2    Villasenor, J.D.3
  • 25
    • 33947609586 scopus 로고    scopus 로고
    • Security analysis of multimedia encryption schemes based on multiple Huffman table
    • DOI 10.1109/LSP.2006.884012
    • J. T. Zhou, Z. Q. Liang, Y. Chen, and O. C. Au, "Security analysis of multimedia encryption schemes based on multiple Huffman table," IEEESignalProcess. Lett., vol. 14, no. 3, pp. 201-204, Mar. 2007. (Pubitemid 46477702)
    • (2007) IEEE Signal Processing Letters , vol.14 , Issue.3 , pp. 201-204
    • Zhou, J.1    Liang, Z.2    Chen, Y.3    Au, O.C.4
  • 26
    • 65649146097 scopus 로고    scopus 로고
    • Adaptive chosen-ciphertext attack on secure arithmetic coding
    • May
    • J. T. Zhou, O. C. Au, and P. W. Wong, "Adaptive chosen-ciphertext attack on secure arithmetic coding,"IEEE Trans. SignalProcess., vol. 57, no. 5, pp. 1825-1838, May 2009.
    • (2009) IEEE Trans. SignalProcess. , vol.57 , Issue.5 , pp. 1825-1838
    • Zhou, J.T.1    Au, O.C.2    Wong, P.W.3
  • 27
    • 41549134129 scopus 로고    scopus 로고
    • Cryptanalysis of some multimedia encryption schemes
    • DOI 10.1109/TMM.2008.917355, 4459284
    • G. Jakimoski and K. P. Subbalakshmi, "Cryptanalysis of some multi-media encryption schemes," IEEE Trans. Multimedia, vol. 10, no. 3, pp. 330-338, Apr. 2008. (Pubitemid 351459497)
    • (2008) IEEE Transactions on Multimedia , vol.10 , Issue.3 , pp. 330-338
    • Jakimoski, G.1    Subbalakshmi, K.P.2
  • 28
    • 70450285600 scopus 로고    scopus 로고
    • Onthe security ofthe secure arithmetic code
    • Dec.
    • H. M. Sun, K. H. Wang, and W. C. Ting, "Onthe security ofthe secure arithmetic code," IEEE Trans. Inf. Forensics Security, vol. 4, no. 4, pp. 781-789, Dec. 2009.
    • (2009) IEEE Trans. Inf. Forensics Security , vol.4 , Issue.4 , pp. 781-789
    • Sun, H.M.1    Wang, K.H.2    Ting, W.C.3
  • 29
    • 60149105970 scopus 로고    scopus 로고
    • On the security of an MPEG-video encryption scheme based on secret Huffman tables
    • Lecture Notes in Computer Science
    • S. J. Li, G. R. Chen, A. Cheung, K. T. Lo, and M. Kankanhalli, "On the security of an MPEG-video encryption scheme based on secret Huffman tables," in Proc. 3rd Pacific Rim Symp. Adv. Image Video Technol., 2009, vol. 5414, Lecture Notes in Computer Science, pp. 898-909.
    • (2009) Proc. 3rd Pacific Rim Symp. Adv. Image Video Technol. , vol.5414 , pp. 898-909
    • Li, S.J.1    Chen, G.R.2    Cheung, A.3    Lo, K.T.4    Kankanhalli, M.5
  • 31
    • 33749838738 scopus 로고    scopus 로고
    • Construction of an elliptic curve over finite fields to combine with convolutional code for cryptography
    • DOI 10.1049/ip-cds:20050117
    • B. Ontiveros, I. Soto, and R. Carrasco, "Construction of an elliptic curve over finite fields to combine with convolutional code for cryp-tography,"Proc. Inst. Elect. Eng.\CircuitsDevices Syst., vol. 153, no. 4, pp. 299-306, Aug. 2006. (Pubitemid 44561793)
    • (2006) IEE Proceedings: Circuits, Devices and Systems , vol.153 , Issue.4 , pp. 299-306
    • Ontiveros, B.1    Soto, I.2    Carrasco, R.3
  • 38
    • 79952007846 scopus 로고    scopus 로고
    • Application of Gray code to the cryptanalysis of chaotic cryptosystems
    • [Online]. Available:
    • G. Alvarez, D. Arroyo, and J. Nunez, "Application of Gray code to the cryptanalysis of chaotic cryptosystems," in Proc. 3rd Int. IEEE Sci. Conf. Phys. Control, 2007 [Online]. Available: http://lib.physcon.ru/item=1358
    • (2007) Proc. 3rd Int. IEEE Sci. Conf. Phys. Control
    • Alvarez, G.1    Arroyo, D.2    Nunez, J.3
  • 39
    • 0032091839 scopus 로고    scopus 로고
    • Gray codes and 1D quadratic maps
    • G. Alvarez, M. Romera, G. Pastor, and F. Montoya, "Gray codes and 1D quadratic maps," Electron. Lett., vol. 34, no. 13, pp. 1304-1306, Jun. 1998. (Pubitemid 128624586)
    • (1998) Electronics Letters , vol.34 , Issue.13 , pp. 1304-1306
    • Alvarez, G.1    Romera, M.2    Pastor, G.3    Montoya, F.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.