一级黄色片免费播放|中国黄色视频播放片|日本三级a|可以直接考播黄片影视免费一级毛片

高級搜索

留言板

尊敬的讀者、作者、審稿人, 關(guān)于本刊的投稿、審稿、編輯和出版的任何問題, 您可以本頁添加留言。我們將盡快給您答復(fù)。謝謝您的支持!

姓名
郵箱
手機(jī)號碼
標(biāo)題
留言內(nèi)容
驗(yàn)證碼

基于混沌密鑰控制的聯(lián)合信源信道與安全算術(shù)碼編譯碼算法

鄢懿 張燦 郭振永 高紹帥 陳德元

鄢懿, 張燦, 郭振永, 高紹帥, 陳德元. 基于混沌密鑰控制的聯(lián)合信源信道與安全算術(shù)碼編譯碼算法[J]. 電子與信息學(xué)報(bào), 2016, 38(10): 2553-2559. doi: 10.11999/JEIT151429
引用本文: 鄢懿, 張燦, 郭振永, 高紹帥, 陳德元. 基于混沌密鑰控制的聯(lián)合信源信道與安全算術(shù)碼編譯碼算法[J]. 電子與信息學(xué)報(bào), 2016, 38(10): 2553-2559. doi: 10.11999/JEIT151429
YAN Yi, ZHANG Can, GUO Zhenyong, GAO Shaoshuai, CHEN Deyuan. Joint Source Channel and Security Arithmetic Coding Controlled by Chaotic Keys[J]. Journal of Electronics & Information Technology, 2016, 38(10): 2553-2559. doi: 10.11999/JEIT151429
Citation: YAN Yi, ZHANG Can, GUO Zhenyong, GAO Shaoshuai, CHEN Deyuan. Joint Source Channel and Security Arithmetic Coding Controlled by Chaotic Keys[J]. Journal of Electronics & Information Technology, 2016, 38(10): 2553-2559. doi: 10.11999/JEIT151429

基于混沌密鑰控制的聯(lián)合信源信道與安全算術(shù)碼編譯碼算法

doi: 10.11999/JEIT151429
基金項(xiàng)目: 

國家自然科學(xué)基金(61571416, 61271282, 61032006)

Joint Source Channel and Security Arithmetic Coding Controlled by Chaotic Keys

Funds: 

The National Natural Science Foundation of China (61571416, 61271282, 61032006)

  • 摘要: 該文針對深空通信、移動(dòng)通信等資源受限網(wǎng)絡(luò)中的信息有效性、可靠性和安全性傳輸,提出一種基于混沌密鑰控制的聯(lián)合信源信道與安全算術(shù)碼編譯碼算法。該算法在編碼端通過混沌映射1控制在算術(shù)碼內(nèi)嵌入多個(gè)禁用符號,將信道編碼檢錯(cuò)與密碼流的擾亂相結(jié)合;同時(shí),通過混沌映射2控制信源符號的算術(shù)編碼,將信源編碼與信息安全相結(jié)合,實(shí)現(xiàn)了聯(lián)合信源信道與信息安全編譯碼。實(shí)驗(yàn)結(jié)果表明,該算法與現(xiàn)有的同類算法相比,當(dāng)誤包率為10-3時(shí),改善編譯碼性能0.4 dB,同時(shí)增強(qiáng)了可靠性和安全性。
  • MAGLI E, GRANGETTO M, and OLMO G. Joint source, channel coding, and secrecy[J]. EURASIP Journal on Information Security, 2007, 2007(1): 1-7. doi: 10.1155/2007/ 79048.
    BOYD C, CLEARY J, IRVINE S, et al. Integrating error detection into arithmetic coding[J]. IEEE Transactions on Communications, 1997, 45(1): 1-3. doi: 10.1109/26.554275.
    GRANGETTO M and COSMAN P. MAP decoding of arithmetic codes with a forbidden symbol[C]. Proceedings of Advanced Concepts for Intelligent Vision Systems, Ghent, Belgium, 2002: 82-89.
    GRANGETTO M, MAGLI E, and OLMO G. Joint source/channel coding and MAP decoding of arithmetic codes[J]. IEEE Transactions on Communications, 2005, 53(6): 1007-1016. doi: 10.1109/TCOMM.2005.849690.
    JAMAA S B, KIEFFER M, and DUHAMEL P. Improved sequential MAP estimation of CABAC encoded data with objective adjustment of the complexity/efficiency tradeoff [J]. IEEE Transactions on Communications, 2009, 57(7): 2014-2023. doi: 10.1109/TCOMM.2009.07.070566.
    SPITERI T and BUTTIGIEG V. Maximum a posteriori decoding of arithmetic codes in joint source-channel coding[C]. International Joint Conference on e-Business and Telecommunications, Athens, 2012: 363-377. doi: 10.1007/ 978-3-642-25206-8_24.
    夏志進(jìn), 楊銘, 崔慧娟, 等. 多禁止符號算術(shù)編碼高效錯(cuò)誤檢測算法[J]. 清華大學(xué)學(xué)報(bào)(自然科學(xué)版), 2005, 45(7): 935-938. doi: 10.3321/j.issn:1000-0054.2005.07.019.
    XIA Zhijin, YANG Ming, CUI Huijuan, et al. Efficient arithmetic code error detection algorithm with multiple forbidden symbols[J]. Journal of Tsinghua University(Science and Technology), 2005, 45(7): 935-938. doi: 10.3321/j.issn: 1000-0054.2005.07.019.
    GRANGETTO M, MAGLI E, and OLMO G. Multimedia selective encryption by means of randomized arithmetic coding[J]. IEEE Transactions on Multimedia, 2006, 8(5): 905-917. doi: 10.1109/TMM.2006.879919.
    MI B, LIAO X F, and CHEN Y. A novel chaotic encryption scheme based on arithmetic coding[J]. Chaos Solitons Fractals, 2008, 38(5): 1523-1531. doi: 10.1016/j.chaos. 2007.01.133.
    李林森, 張燦, 陳德元. 基于CCSDS IDC的聯(lián)合信源與安全編譯碼[J]. 中國科學(xué)院學(xué)報(bào), 2012, 29(3): 384-391.
    LI Linsen, ZHANG Can, and CHEN Deyuan. Joint source encryption coding based on CCSDS image data compression standard[J]. Journal of University of Chinese Academy of Sciences, 2012, 29(3): 384-391.
    LIN Q Z and WONG K W. An improved iterative decoding scheme based on error-resistant arithmetic code[C]. 2014 IEEE International Symposium on Circuits and Systems, Melbourne, 2014: 1704-1707. doi: 10.1109/ISCAS.2014. 6865482.
    ZEZZA S, MASERA G, and NOOSHABADI S. A novel decoder architecture for error resilient JPEG2000 applications based on MQ arithmetic[C]. 2014 IEEE International Symposium on Circuits and Systems, Melbourne, 2014: 902-905. doi: 10.1109/ISCAS.2014. 6865282.
    ZHANG C Y, XIANG F, and ZHANG L W. Study on cryptographical properties of several chaotic pseudorandom sequences[C]. 2009 International Symposium on Computer Network and Multimedia Technology, Wuhan, 2009: 1-4. doi: 10.1109/CNMT.2009.5374713.
    JAMAA S B, WEIDMANN C, and KIEFFER M. Analytical tools for optimizing the error correction performance of arithmetic codes[J]. IEEE Transactions on Communications, 2008, 56(9): 1458-1468. doi: 10.1109/TCOMM.2008.060401.
    STALLINGS W, 王張宜, 楊敏, 等. 密碼編碼學(xué)與網(wǎng)絡(luò)安全原理與實(shí)踐(第5版)[M]. 北京: 電子工業(yè)出版社, 2012: 106-137.
    STALLINGS W, WANG Zhangyi, YANG Min, et al. Cryptography and Network Security: Principles and Practice (Fifth Edition)[M]. Beijing: Publishing House of Electronics Industry, 2012: 106-137.
    HAGENAUER J. Rate-compatible punctured convolutional codes (RCPC codes) and their applications[J]. IEEE Transactions on Communications, 1988, 36(4): 389-400. doi: 10.1109/26.2763.
    劉泉, 李佩玥, 章明朝, 等. 基于可Markov分割混沌系統(tǒng)的圖像加密算法[J]. 電子與信息學(xué)報(bào), 2014, 36(6): 1271-1277. doi: 10.3724/SP.J.1146.2013.01246.
    LIU Quan, LI Peiyue, ZHANG Mingchao, et al. Image encryption algorithm based on chaos system having Markov portion[J]. Journal of Electronics Information Technology, 2014, 36(6): 1271-1277. doi: 10.3724/SP.J.1146.2013.01246.
    鄧曉衡, 廖春龍, 朱從旭, 等. 像素位置與比特雙重置亂的圖像混沌加密算法[J]. 通信學(xué)報(bào), 2014, 35(3): 216-223. doi: 10.3969/j.issn.1000-436x.2014.03.025.
    DENG Xiaoheng, LIAO Chunlong, ZHU Congxu, et al. Image encryption algorithms based on chaos through dual scrambling of pixel position and bit[J]. Journal on Communications, 2014, 35(3): 216-223. doi: 10.3969/j.issn. 1000-436x.2014.03.025.
    RUKHIN A, SOTO J, NECHVATAL J, et al. A statistical test suite for random and pseudorandom number generators for cryptographic applications, SP-800-22[R]. Washington: National Institute of Standards and Technology, 2001.
    張順, 高鐵杠. 基于類DNA編碼分組與替換的加密方案 [J]. 電子與信息學(xué)報(bào), 2015, 37(1): 150-157. doi: 10.11999/ JEIT140091.
    ZHANG Shun and GAO Tiegang. Encryption based on DNA coding, codon grouping and substitution[J]. Journal of Electronics Information Technology, 2015, 37(1): 150-157. doi: 10.11999/JEIT140091.
  • 加載中
計(jì)量
  • 文章訪問數(shù):  1233
  • HTML全文瀏覽量:  142
  • PDF下載量:  361
  • 被引次數(shù): 0
出版歷程
  • 收稿日期:  2015-12-17
  • 修回日期:  2016-05-05
  • 刊出日期:  2016-10-19

目錄

    /

    返回文章
    返回