基于混沌密鑰控制的聯(lián)合信源信道與安全算術(shù)碼編譯碼算法
doi: 10.11999/JEIT151429
-
1.
(中國科學(xué)院大學(xué)電子電氣與通信工程學(xué)院 北京 101408) ②(中國科學(xué)院電子學(xué)研究所 北京 100190)
國家自然科學(xué)基金(61571416, 61271282, 61032006)
Joint Source Channel and Security Arithmetic Coding Controlled by Chaotic Keys
-
1.
(School of Electronic, Electrical and Communication Engineering, University of Chinese Academy of Sciences, Beijing 101408, China)
The National Natural Science Foundation of China (61571416, 61271282, 61032006)
-
摘要: 該文針對深空通信、移動(dòng)通信等資源受限網(wǎng)絡(luò)中的信息有效性、可靠性和安全性傳輸,提出一種基于混沌密鑰控制的聯(lián)合信源信道與安全算術(shù)碼編譯碼算法。該算法在編碼端通過混沌映射1控制在算術(shù)碼內(nèi)嵌入多個(gè)禁用符號,將信道編碼檢錯(cuò)與密碼流的擾亂相結(jié)合;同時(shí),通過混沌映射2控制信源符號的算術(shù)編碼,將信源編碼與信息安全相結(jié)合,實(shí)現(xiàn)了聯(lián)合信源信道與信息安全編譯碼。實(shí)驗(yàn)結(jié)果表明,該算法與現(xiàn)有的同類算法相比,當(dāng)誤包率為10-3時(shí),改善編譯碼性能0.4 dB,同時(shí)增強(qiáng)了可靠性和安全性。
-
關(guān)鍵詞:
- 聯(lián)合信源信道與安全編譯碼 /
- 算術(shù)碼 /
- 禁用符號 /
- 混沌映射
Abstract: In order to transfer effective, reliable and secure information in resource-constrained networks such as deep space communications and mobile communications, a joint source channel security arithmetic coding method controlled by chaotic keys is proposed. At encoding, the first chaotic map allocates the probability of multiple forbidden symbols in arithmetic code, combining error detection by channel coding and disorder of key streams; meanwhile, the second chaotic map controls the source symbols in arithmetic code, combining source coding and information security. Simulation results show that the proposed method can not only achieve 0.4 dB signal-to-noise ratio gains compared with the existing similar arithmetic codes under the condition of same error rate, but also be of high reliability and security. -
MAGLI E, GRANGETTO M, and OLMO G. Joint source, channel coding, and secrecy[J]. EURASIP Journal on Information Security, 2007, 2007(1): 1-7. doi: 10.1155/2007/ 79048. BOYD C, CLEARY J, IRVINE S, et al. Integrating error detection into arithmetic coding[J]. IEEE Transactions on Communications, 1997, 45(1): 1-3. doi: 10.1109/26.554275. GRANGETTO M and COSMAN P. MAP decoding of arithmetic codes with a forbidden symbol[C]. Proceedings of Advanced Concepts for Intelligent Vision Systems, Ghent, Belgium, 2002: 82-89. GRANGETTO M, MAGLI E, and OLMO G. Joint source/channel coding and MAP decoding of arithmetic codes[J]. IEEE Transactions on Communications, 2005, 53(6): 1007-1016. doi: 10.1109/TCOMM.2005.849690. JAMAA S B, KIEFFER M, and DUHAMEL P. Improved sequential MAP estimation of CABAC encoded data with objective adjustment of the complexity/efficiency tradeoff [J]. IEEE Transactions on Communications, 2009, 57(7): 2014-2023. doi: 10.1109/TCOMM.2009.07.070566. SPITERI T and BUTTIGIEG V. Maximum a posteriori decoding of arithmetic codes in joint source-channel coding[C]. International Joint Conference on e-Business and Telecommunications, Athens, 2012: 363-377. doi: 10.1007/ 978-3-642-25206-8_24. 夏志進(jìn), 楊銘, 崔慧娟, 等. 多禁止符號算術(shù)編碼高效錯(cuò)誤檢測算法[J]. 清華大學(xué)學(xué)報(bào)(自然科學(xué)版), 2005, 45(7): 935-938. doi: 10.3321/j.issn:1000-0054.2005.07.019. XIA Zhijin, YANG Ming, CUI Huijuan, et al. Efficient arithmetic code error detection algorithm with multiple forbidden symbols[J]. Journal of Tsinghua University(Science and Technology), 2005, 45(7): 935-938. doi: 10.3321/j.issn: 1000-0054.2005.07.019. GRANGETTO M, MAGLI E, and OLMO G. Multimedia selective encryption by means of randomized arithmetic coding[J]. IEEE Transactions on Multimedia, 2006, 8(5): 905-917. doi: 10.1109/TMM.2006.879919. MI B, LIAO X F, and CHEN Y. A novel chaotic encryption scheme based on arithmetic coding[J]. Chaos Solitons Fractals, 2008, 38(5): 1523-1531. doi: 10.1016/j.chaos. 2007.01.133. 李林森, 張燦, 陳德元. 基于CCSDS IDC的聯(lián)合信源與安全編譯碼[J]. 中國科學(xué)院學(xué)報(bào), 2012, 29(3): 384-391. LI Linsen, ZHANG Can, and CHEN Deyuan. Joint source encryption coding based on CCSDS image data compression standard[J]. Journal of University of Chinese Academy of Sciences, 2012, 29(3): 384-391. LIN Q Z and WONG K W. An improved iterative decoding scheme based on error-resistant arithmetic code[C]. 2014 IEEE International Symposium on Circuits and Systems, Melbourne, 2014: 1704-1707. doi: 10.1109/ISCAS.2014. 6865482. ZEZZA S, MASERA G, and NOOSHABADI S. A novel decoder architecture for error resilient JPEG2000 applications based on MQ arithmetic[C]. 2014 IEEE International Symposium on Circuits and Systems, Melbourne, 2014: 902-905. doi: 10.1109/ISCAS.2014. 6865282. ZHANG C Y, XIANG F, and ZHANG L W. Study on cryptographical properties of several chaotic pseudorandom sequences[C]. 2009 International Symposium on Computer Network and Multimedia Technology, Wuhan, 2009: 1-4. doi: 10.1109/CNMT.2009.5374713. JAMAA S B, WEIDMANN C, and KIEFFER M. Analytical tools for optimizing the error correction performance of arithmetic codes[J]. IEEE Transactions on Communications, 2008, 56(9): 1458-1468. doi: 10.1109/TCOMM.2008.060401. STALLINGS W, 王張宜, 楊敏, 等. 密碼編碼學(xué)與網(wǎng)絡(luò)安全原理與實(shí)踐(第5版)[M]. 北京: 電子工業(yè)出版社, 2012: 106-137. STALLINGS W, WANG Zhangyi, YANG Min, et al. Cryptography and Network Security: Principles and Practice (Fifth Edition)[M]. Beijing: Publishing House of Electronics Industry, 2012: 106-137. HAGENAUER J. Rate-compatible punctured convolutional codes (RCPC codes) and their applications[J]. IEEE Transactions on Communications, 1988, 36(4): 389-400. doi: 10.1109/26.2763. 劉泉, 李佩玥, 章明朝, 等. 基于可Markov分割混沌系統(tǒng)的圖像加密算法[J]. 電子與信息學(xué)報(bào), 2014, 36(6): 1271-1277. doi: 10.3724/SP.J.1146.2013.01246. LIU Quan, LI Peiyue, ZHANG Mingchao, et al. Image encryption algorithm based on chaos system having Markov portion[J]. Journal of Electronics Information Technology, 2014, 36(6): 1271-1277. doi: 10.3724/SP.J.1146.2013.01246. 鄧曉衡, 廖春龍, 朱從旭, 等. 像素位置與比特雙重置亂的圖像混沌加密算法[J]. 通信學(xué)報(bào), 2014, 35(3): 216-223. doi: 10.3969/j.issn.1000-436x.2014.03.025. DENG Xiaoheng, LIAO Chunlong, ZHU Congxu, et al. Image encryption algorithms based on chaos through dual scrambling of pixel position and bit[J]. Journal on Communications, 2014, 35(3): 216-223. doi: 10.3969/j.issn. 1000-436x.2014.03.025. RUKHIN A, SOTO J, NECHVATAL J, et al. A statistical test suite for random and pseudorandom number generators for cryptographic applications, SP-800-22[R]. Washington: National Institute of Standards and Technology, 2001. 張順, 高鐵杠. 基于類DNA編碼分組與替換的加密方案 [J]. 電子與信息學(xué)報(bào), 2015, 37(1): 150-157. doi: 10.11999/ JEIT140091. ZHANG Shun and GAO Tiegang. Encryption based on DNA coding, codon grouping and substitution[J]. Journal of Electronics Information Technology, 2015, 37(1): 150-157. doi: 10.11999/JEIT140091. -
計(jì)量
- 文章訪問數(shù): 1233
- HTML全文瀏覽量: 142
- PDF下載量: 361
- 被引次數(shù): 0