The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Two of the design criteria in wireless sensor networks (WSNs) are the security and reliability of information flow, especially in critical applications. In this research, we propose combining a Crypto-System with Embedded Error Control (CSEEC) with multi-path routing for secure and reliable communication in WSNs. CSEEC is a joint encryption and error correction scheme based on erasure coding. When...
In this paper, a new joint compression and encryption scheme based on adaptive Huffman tree using chaotic maps is proposed. Due to the intrinsic feature of adaptive Huffman coding, it permits building the code as the symbols are being transmitted and can be applied in real time applications. In proposed scheme, the adaptive Huffman tree is mutated by a key-stream generated by two chaotic maps, and...
In general, JPEG2000 code streams have marker codes in the header, which define particular meanings such as start of packet and end of code stream. Marker codes do not exist in the data part of code streams. The selective encryption of the data part has been considered to avoid generating marker codes. Such encryption is effective in business content exchange. To handle this issue, some schemes have...
We consider a secure verification problem in which Alice wants to verify whether her signal Xn is compatible with Bob's signal Yn, where Xn and Yn are drawn i.i.d. according to a joint distribution p(x, y). The notion of compatibility is defined as the requirement that p(x, y) belongs to a certain set A of allowable joint distributions. For privacy, Alice jointly encrypts and encodes Xn and transmits...
This paper studies the joint security and performance enhancement of secure arithmetic coding (AC) for digital rights management applications. The proposed cryptosystem incorporates the interval splitting AC with a simple bit-wise XOR operation step. Security analysis results show that the proposed scheme provides satisfactory level of security against the cipher-only attack, the chosen-plaintext...
This paper considers the problem of joint encryption and error-correction coding and proposes a solution using D-sequences, which are œdecimal' expansions of fractions. The encryption operation considered is equivalent to exponentiation which forms the basis of several public-key schemes. Several new results on D-sequences are also presented which make the applications to encryption and error coding...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.