Open Access

Secure Arithmetic Coding with Error Detection Capability

EURASIP Journal on Information Security20102010:621521

DOI: 10.1155/2010/621521

Received: 9 February 2010

Accepted: 7 September 2010

Published: 19 September 2010

Abstract

Recently, arithmetic coding has attracted the attention of many scholars because of its high compression capability. Accordingly, this paper proposed a Joint Source-Cryptographic-Channel Coding (JSCC) based on Arithmetic Coding (AC). For this purpose, embedded error detection arithmetic coding, which is known as continuous error detection (CED), is used. In our proposed method, a random length of forbidden symbol which is produced with a key is used in each recursion. The dummy symbol is divided into two dummy symbols with a key and then is placed in random positions in order to provide security. Finally, in addition to producing secure codes, the suggested method reduced the added redundancy to half of the total redundancy added by CED. It has less complexity than cascades source, channel coding, and encryption while its key space in comparison to other joint methods has enlarged. Moreover, the coder provides a flexible switch between a standard compression model and a joint model.

1. Introduction

The increasing demand for the use of computer networks, the wide availability of digital multimedia contents, and the accelerated growth of wired and wireless communications have resulted in new research areas in joint coders.

The design of modern multimedia communication systems is very challenging as the system must satisfy several contrasting requirements [1]. Data compression is needed because it provides a mechanism to increase the effective bandwidth in a network and serves the highest possible number of users. Data compression optimizes the required storage space and reduces transmission time in the network. In one hand, compression typically makes the transmission very sensitive to error or packet losses, thus it can decrease the quality of received data by the final users so channel coding is required for error detection and correction [2]. On the other hand, source coding decreases redundancy in the plaintext which makes the data more resistant to statistical methods of cryptanalysis [3], and additionally, the accessibility of data makes it possible for the unauthorized users to reach the data easily. Therefore, to be reliably and confidentially transmitted, the data must be encrypted [4].

Many data compression techniques are available for efficient source coding [5, 6]. Strong error control codes have been developed for channel coding. In addition, some encryption algorithms have been developed for secure data transmission. Recent source coding, channel coding, and encryption algorithms require computational power for encoding and decoding. This is particularly unfavorable in certain applications such as mobile communications, embedded systems and real-time communication, where devices (e.g., portable equipments) are resource constrained due to the size limitation and power consumption considerations [2].

In real-time or satellite communication, delay and complexity are not desirable. Therefore, low complexity JSCC is preferable for such situations. Techniques for joint source-channel coding, which have been proposed in this research, use the duality of source encoding and channel decoding and are aimed at decoding noisy compressed data as reliably as possible. The development of these joint algorithms has closely followed the development of source and channel coding algorithms.

Most of the early works on joint source-channel coding used different forms of Huffman codes. But nowadays, by increasing interest in arithmetic coding in the multimedia applications [7], for example, JPEG2000 and H.264, many researchers were attracted to it. In 1997 Boyd et al. [8] introduced a forbidden symbol in the source alphabet and used it at the decoder side as an error detection device. Sayir [9] considered the arithmetic coder as a channel coder and added redundancy in the transmitted bit stream by introducing gaps in the coding space and shrinking the probability of symbols by a factor [10]. In these joint coders, we have embedded error detection compressed data without providing essentially any security in the face of a chosen plaintext attack, in which an attacker has the ability to specify a sequence of input symbols, to observe the corresponding output, and to repeat this process for an arbitrary number of times.

Some schemes of joint AC and encryption have been also proposed up to now. Wen et al. [11] modified the traditional AC by removing the constraint that intervals corresponding to each symbol are continuous and the intervals associated with each symbol can be split according to a key which is known for the both encoder and decoder. Grangetto et al. [12] proposed a method in which the system modified the traditional arithmetic coder by randomly permuting the intervals in accordance with a key.

Magli et al. [1] developed a JSCC. It used arithmetic coding which was proposed by Sayir and for providing security; it randomly permuted the intervals in accordance with a key generating shuffling sequence which was introduced by Grangetto. Although this system is a JSCC but the attacker can break the system by comparing pairs of the output with the corresponding input which differ from each other in exactly one symbol. Teekaput and Chokchaitam [13] have introduced a scheme for JSCC. Security was provided by changing the location of the forbidden symbol. This system looks like the system which was introduced by Magli et al., so it suffered from the same limitations.

In this paper, we present a method for joint source-cryptographic-channel coding based on arithmetic coding. This is very important in light of simplifying the design of the system. We use binary arithmetic coding with the forbidden symbols which was introduced in [14] for error detection. Security is provided by using random length of the forbidden symbols and randomly placing these dummy symbols in the probability table. Compression ratio is improved in comparison with the systems in [1, 13]. Also, the actual key space has enlarged. This method can be used for arithmetic coding with multiple symbols. However, to simplify the method, we use binary AC.

The rest of this paper is organized as follows: in Section 2, we discuss more on arithmetic coding and arithmetic coding with forbidden symbol. In Section 3, our proposed method for JSCC is described. In Section 4, the results obtained from the simulation and the performance of the system are explained. In Section 5, we draw some conclusions.

2. Arithmetic Coding and CED

This section provides a brief introduction to arithmetic coding and AC with forbidden symbol which is named in [14] as CED. Until AC was developed in the 1970s, Huffman coding was considered to be almost optimal. Huffman coding uses a tree for encoding a sequence. AC uses a one-dimensional table of probabilities instead of a tree. It always encodes the whole massage at once and allows the allocation of fractional number of bits to each source symbol. It generates a code sequence which is uniquely decodable, such that the probability of distribution of code sequence approaches the uniform distribution over the code alphabet [6].

AC works by recursively subdivision of coding interval in portion to probabilistic estimates of symbols as generated by a given model and retains it to be used as the new interval for the next encoding step of the recursion [5]. This can be illustrated better with an example. Consider a source alphabet with three symbols [14] a, b, and c with , , and . For example, we want to encode the sequence abc. After encoding a, the new interval will be , and the transmitted sequence would lie in this interval. The next symbol is b, and according to the intervals associated to each symbol, the next interval will be . This recursion continues to the end of the sequence. At the end, a number in the last interval which is a fractional number between zero and one will be sent as the sequence code. This example is illustrated in Figure 1.
Figure 1

An example of arithmetic coding, the source symbols are a, b, c with p(a) = 0.011, p(b) = 0.011, p(c) = 0.010[10].

AC is a powerful source coding technique and has higher compression efficiency than other entropy coders. But arithmetic coding has two major drawbacks, the error sensitivity and error propagation property. Error propagation because of loss of synchronization can damage the whole data after an error has occurred in the compressed data. We can use this loss of synchronization to error detection. Anand et al. in [14] introduced a forbidden symbol which does not belong to the source alphabet and never occurs in the probability table. For inserting dummy symbol into the probability table, probability of the symbols should be shrunk by a factor. This forbidden symbol has a finite and small probability assigned to it. If its probability is , so the probability of the symbols must be shrunk by factor ( ). The introduction of the forbidden symbol produces an amount of artificial coding redundancy per encoded bit equal to , at the expense of the compression efficiency [14]. The decoder obtains an error detection capability and enhances its robustness against noise. If an error occurs, this forbidden symbol is very likely to be eventually decoded with a high probability. Figure 2 illustrates a sample of binary AC subinterval separation by inserting a forbidden symbol in the current interval.
Figure 2

Encoding with a forbidden symbol for probability ε.

This forbidden symbol can be placed anywhere in the probability table, and we can also have more than one forbidden symbol and place them in more than one location in the probability table. In conventional CED, the probability of the forbidden symbol is fixed, and also the forbidden symbol is fixed at the same location for the whole encoding process. Before transmission, the encoder and decoder should negotiate the location and size of the forbidden symbol [13]. If its probability is fixed for the whole encoding process, then the bit rate of the code is fixed, and the amount of the added redundancy is fixed to bit per symbol.

If we take the maximum bit rate needed into account and also consider that the bit rate in each recursion is not allowed to exceed the maximum bit rate, we can change the bit rate while encoding. This causes less redundancy to be added to the bit stream and higher security. We describe this in more details in Section 3.

3. Scheme of the Proposed Model

The present paper aims to provide an arithmetic coding system which is secure and has an error detection capability. Our scheme is based on CED, in which there is a forbidden region with a probability , added to the probability table to provide some redundancy while a synchronized decoder can detect the error occurring and conceal wrong decision bits. The combined data encryption and AC use the error propagation property of AC to provide security. Our proposed technique uses forbidden symbols with random lengths and places them in random locations. The flowchart of this proposed technique is shown in Figure 3. While the concept of this scheme can be applied to a source alphabet with any size, for simplicity, the remainder of the discussion focuses on the binary case.
Figure 3

Flowchart of the proposed scheme.

3.1. Inserting Forbidden Symbols

In conventional CED, the probability of the forbidden symbol is fixed and at the beginning of the encoding process; this probability which is named is determined by (1). This depends on the maximum bit rate, and the entropy of source, [9]:
(1)

Adding the forbidden symbol leads to the addition of redundancy to the output extension which can be used as a means of error detection. This method does not have enough security against attacks; therefore, we use a random-length forbidden symbol in each recursion in our scheme instead of a fixed-length one. In each recursion with a random generator, we generate a forbidden symbol in the range , in which is determined by maximum bit rate, , by using (1). The generated probability of the forbidden symbol in each recursion is named . By using this random forbidden symbol in every recursion, we shrink the probability of symbols by the factor ( ). This causes adding random redundancy while encoding each input symbol. In addition, we can claim that we have a semiadaptive arithmetic coder because in each recursion, a different length of the forbidden symbol is produced. It leads to a different shrinking factor in each recursion. Therefore, the probability of the source symbols with various factors would be shrunk.

In the previous section we said that we can have more than one forbidden symbol, therefore we use two forbidden symbols in this method. Since the sum of the probabilities of two forbidden symbols must be equal to , we can divide the generated forbidden symbol, , in each recursion equally, or generate another forbidden symbol in the range and then uniformly divide the forbidden symbol to two forbidden symbols with probabilities of and .

The and represent the encryption key which is also referred to as K in the following sections and adjusted with a proper precision in an acceptable range depending on the requirements of different applications. At the decoder side, if a synchronized decoder is applied, that is, adding the and at each coding step, data will be reconstructed accurately. Otherwise, whether using a standard AC decoder or a decoder of proposed scheme with a different and , the encoded code stream cannot be correctly decoded.

3.2. Establishing and Selecting the Probability Table

In Section 2 we demonstrated that the forbidden symbol can be placed anywhere in the probability table. In binary AC, it can be placed at the beginning, in the middle and at the end of the probability table. We use Pseudorandom Number Generator (PRNG) to control the place of the forbidden symbols. A seed value, S, which also represents another encryption key, is used to initialize the PRNG. The bits of the generated random sequence are used as an encryption key in each recursion. In practice, the random sequence is taken on the values 0 and 1 with probability of  .5 which is also the controlling bits sequence.

If we divide forbidden symbol unequally, and are in different ranges so a binary memoryless source, X, with probabilities and is encoded by means of a quadruplet AC with the alphabets , , , . For allocating these, we have different possibilities which are demonstrated in Table 1. In this situation, for encoding each input symbol, we use 3 bits of the generated random sequence of PRNG as a key to control the locations of the forbidden symbols. But, if we divide equally, we will have ternary AC, and Table 2 is its look up table. This look up table uses 2 bits for determining the locations of the forbidden symbols.
Table 1

Mapping function of binary arithmetic codes with two different lengths of forbidden symbols (look up table).

 

Situations

Situations

 

 

 

 

Table 2

Mapping function of binary arithmetic codes with two equal lengths of forbidden symbol (look up table).

 

Situations

 
 

 
 

 
 

 
 

 

To conclude, we do not encrypt the code string which causes a totally different value but only secretly add subintervals and secretly place them. The proposed encoder works with a keyK= ( ), which represents the final encryption key. Given the same K, both the encoder and the decoder generate the same pseudorandom number sequence for decision bits and exactly add the same to the corresponding code string in order to synchronize them with each other. On the other hand, no matter which parameter ofK is unknown or incorrectly given, the decoder cannot decode the compressed data properly, and the decompressed data is almost meaningless. Furthermore, as long as and are set to 0, our scheme achieves a simple switch from the joint compression, error detection, and encryption model to a standard compression model. Also by setting the sum of and equal to , this JSCC is transformed to joint compression and error detection. Thus, this scheme can be used for selective encryption and apply to portions of data which needs more security. Nevertheless, an efficient and secure key distribution protocol is one of the challenging issues and is beyond the scope of this paper.

4. Simulation Results

Our proposed scheme has been implemented with Matlab software and a personal computer with 2 G of RAM and Intel Centrino Core 2 Duo 2.2 G as its CPU. Due to unstable possesses in computer systems, we take 20 trials and select the most frequently occurred results as the final values. Input symbols, upper and lower bounds, and also produced forbidden symbols in each recursion are set with precisions of being equal to 16-bit implementation. It is worth noting that this precision is not fixed and can be flexibly adjusted depending on the requirement of the target applications.

4.1. Compression Ratio

The Joint Source-Cryptographic-Channel Model should be used with the precondition that there is no large redundancy generation after modifying the standard coding engine. Table 3 shows the results of applying the proposed method for input sequences with lengths of 100, 1000, and 10000 symbols and allows for comparison with traditional arithmetic coding in absolute as well as relative terms. The upper half of the table considers the case where , and the lower half of the table considers the case where . The exact length of the output depends not only on the input data but also on the specific sequence of forbidden symbols, as well as their locations and lengths in each recursion. Therefore, the code lengths shown in the table are averages based on simulations using 1000 random sequence realizations. The column labeled "proposed method" gives the mean of the code lengths based on a large number of simulations using random seeds for location and lengths. These results show that in order to limit coding redundancy, should be defined in a limited range, which can be flexibly controlled according to the requirement of various application systems. Table 3 shows that the redundancy added to the bit stream by our model is half of the redundancy which conventional method adds to the bit stream. For redundancy is 0.0439 bit per symbol. If the length of is fixed, for example, , the redundancy which is added is 4.39 bit per symbol, but our proposed method adds 2.1 bit per symbol.
Table 3

Comparison of code lengths as a function of sequence length .

Symbol probability

AC

AC with fixed length

Proposed method with maximum

P(a) = 1/3 H =

10

9.183

9.1890

9.7390

9.4470

 

100

91.83

91.9100

96.3610

94.0330

 

1000

918.3

918.6810

962.7090

941.2350

 

10000

9183

9183.700

9622.410

9404.46

H =

10

5.917

6.0410

6.4450

6.0100

 

100

59.17

65.7390

69.6020

67.3620

 

1000

591.7

650.3070

694.9340

672.7320

 

10000

5917

6500.250

6940.01

6717.720

Using the forbidden symbol in the source alphabet actually aims at simply detecting errors and not correcting them. By randomizing the forbidden symbol, although the amount of the added redundancy is reduced to half, this does not interfere with the capability of error detection. However, Anand et al. [14] gave an empirical model to estimate the number of the bits necessary to detect an error after it has occurred. This is shown in the following:
(2)
The probability of not detecting an error after bits is
(3)

Based on the extensive performed simulations, it is concluded that in the CED method, if bits are needed for detecting an error after it has occurred, bits are needed for error detection in our proposed method. Hence, to solve this problem, we can compensate for this shortcoming by assuming greater lengths for the input blocks in the proposed encoder. However, we know that adding security and error detection capability to a compression encoder often leads to a compromise between the amounts of compression achieved and the amount of security and the robustness against channel errors incorporated.

The encoded stream can be reconstructed perfectly by providing the sameK and by reversing the encoding operations. By having the sameK, both encoder and decoder generate the same pseudorandom number sequence for decision bits and exactly add the same and to the corresponding code string in order to synchronize with each other. As soon as the forbidden symbol is decoded, the occurrence of error in the received sequence is detected. However, this method of decoding is not capable of correcting the errors. But, the redundancy of the encoder's output can be used for correcting errors.

Arithmetic codes can be viewed as tree codes. Sequential decoding is a general decoding algorithm for tree codes. It was introduced by Wozencraft and Reiffen to decode convolutional codes in [15]. Fano [16] presented an improved sequential algorithm in 1963, which is now known as the Fano algorithm. Pettijohn et al. [17, 18] proposed two sequential decoding algorithms, depth first and breadth first, for decoding arithmetic codes in the presence of channel errors. We can use these decoding algorithms with the same key for decoding the output of our proposed scheme.

4.2. Complexity

Sayir [10] showed that an arithmetic coder can be an entropy source encoder when the model is matched with the source and can be a channel encoder when the probability space is properly reserved for error protection and can act as a convolutional code. After inserting the forbidden symbol to a source with M alphabet, we will have an arithmetic coding with M + 1 alphabet in which one of the symbols never appears. Therefore, adding parity is performed while compression without adding more additional operations to the conventional arithmetic coding. If the source has M alphabet, so this method just adds M multiplication and 1 additional operation to the complexity of conventional arithmetic encoder. But if we want to place a convolutional encoder after arithmetic encoder, according to the amount of redundancy, it needs some shift and XOR operations and increasing memory usage. For example, if the bit rate is 1/2 and the code generator polynomial is , it would need at least three shift register and XOR operations for each input symbol.

Also because a traditional arithmetic coder needs to work sequentially, arithmetic coding and convolutional coding cannot be parallelized. A comparison of time duration for arithmetic coding and arithmetic coding followed by a 1/2 feedforward convolutional encoder is shown in Figure 4.
Figure 4

Comparison of AC with forbidden symbol and cascaded arithmetic coding with convolutional coder.

Placing the forbidden symbol in different locations and assigning random lengths of the forbidden symbols increase computational complexity. This extracomputational complexity of joint AC and channel coding in comparison with the complexity of three disjoint coders is very small.

It is relevant to consider a system consisting of a traditional arithmetic encoder followed by AES, which, of course, would also deliver security and compression. Since AES was designed for efficient hardware implementation, it is extremely fast when it is fully pipelined in hardware [19]. However, because a traditional arithmetic coder needs to work sequentially, the AC cannot easily be parallelized and becomes a bottleneck in a combined AC/AES system [7]. AES consists of 40 sequential transformation steps composed of simple and basic operations such as table lookups, shifts, and XORs. For a block size of 128, these steps require a total number of 19 shifts, use of 336 bytes of memory, and the XORing of approximately (the exact requirement is data dependent) 608 bytes of data. But, our proposed technique adds a maximum of 20 bytes of memory, no XOR, and no shift operations to conventional AC. For a block size of 128 and a source with binary alphabets, our proposed method adds as much as operations to conventional arithmetic coding operations. This number is much smaller than the number of operations added to the AC with disjoint coders. Figure 5 compares time duration required by binary arithmetic coding for followed by AES with a block size of and 1/2 feedforward convolutional encoder with our proposed method. We can see that our system takes much shorter time than a cascaded system.
Figure 5

Comparison of proposed system and cascaded arithmetic coding with AES and convolutional coder.

Our proposed technique can be implemented utilizing techniques similar to those used in traditional arithmetic coding and can benefit from the same optimizations for speed, finite precision, and so forth. Inserting the forbidden symbol to the probability table adds no complexity to arithmetic coder; only establishing the probability table and searching the look up table increase the amount of memory needed to store the look up table and the probability of forbidden symbols. In addition, division of the forbidden symbol and updating the probability of symbols by factor ( ) in each recursion introduce an additional multiplication though, as with traditional arithmetic coding, faster algorithms that replace the multiplications with simpler operations can be introduced [20].

4.3. Security Analysis

A good encryption procedure should be robust against all kinds of cryptanalytic, statistical, and brute-force attacks. In this section, we discuss the security analyses of the proposed encryption scheme. This includes statistical analysis, key space analysis, and sensitivity analysis of the proposed encryption scheme with respect to the key and plaintext, and so forth. to prove that the proposed cryptosystem is secure against the most common attacks.

4.3.1. Key Space

For a secure encryption algorithm, the key space should be large enough to make the brute force attack infeasible. The main private information in our proposed scheme is the key used in the PRNGs; each of them is as long as 128 bits. These PRNGs generate random sequences which are used by the proposed technique as a secret key in each recursion.

The proposed cipher has different combinations of the secret key, and key space of our proposed method is larger than that of the methods introduced in [1, 12]. A cipher with such a long key space is sufficient for reliable practical use in multimedia communications.

As mentioned above, the proposed encoder uses generated random sequences as its secret key in each recursion. In [13] there are only two possible choices in one recursion: at the beginning of the probability table or at the end. Even though the swapping probability is also used as a key parameter in this method, but there are other keys, and , and attacker must decode received sequence using all possible seeds, , or and for accessing correct data.

If precision of is set to 16 bits, one should try trails for estimating each forbidden symbol in one recursion and trails for finding the situation of the probability table in each recursion; therefore, the actual key space in each recursion can be times larger than the key space in [13]. In this proposed method, if we suppose that the key is known by the attacker, he cannot find out what random value at which positions is added, and as long as the attacker is not aware of the value of the forbidden symbols he cannot access the status of the probability table in each recursion.

4.3.2. NIST SP 800-22 Test for Cipher

In this study, NIST SP 800-22 [21] tests are used for testing the randomness of the cipher. The NIST Test Suite is a statistical package consisting of 16 tests that were developed to test the randomness of binary sequences, with arbitrary lengths, produced by either hardware or software-based cryptographic random or Pseudorandom Number Generators. These tests focus on a variety of different types of nonrandomness that could exist in a sequence. Hence, in this test the cipher sequence, whose length is , is examined. The results of testing the randomness of the cipher are shown in Table 4. We can conclude from Table 4 that the cipher which was encrypted from this encoder is stochastic and it has robustness against known cipher-text attack.
Table 4

Sp 800-22 tests results of cipher.

Statistical test

 

-value

results

Monobit

 

1.1

success

Block frequency ( )

 

.2251

success

runs

 

.8513

success

Rank

 

.2335

success

Spectral DFT

 

.8513

success

Nonoverlapping templates ( , )

 

.1799

success

Overlapping templates ( , , )

 

1

success

Serial

-value 1

.9640

Success

 

-value 2

.8729

success

Cumulative sums

Forward

.7573

Success

 

reverse

.6686

success

Random excursions (state )

.9343

Success

 

.8757

Success

 

.9008

Success

 

.8787

Success

 

.2435

Success

 

.8922

Success

 

.6260

Success

 

.8816

success

Random excursions variant (state )

.8319

Success

 

.9067

Success

 

.8503

Success

 

.9922

Success

 

.6578

Success

 

.6592

Success

 

.9653

Success

 

.7504

Success

 

.6973

Success

 

.6269

success

 

.7790

success

 

.4957

success

 

.4850

success

 

.8543

success

 

.2173

success

 

.6084

success

 

.5193

success

 

.5294

success

4.3.3. Sensitivity Analysis

An ideal procedure of data encryption should be sensitive to both the secret key and the plaintext. The change of a single bit in either the secret key or the plaintext should produce a completely different encrypted data. To prove the robustness of the proposed scheme, we performed sensitivity analysis with respect to both the secret key and the plaintext.
  1. (A)

    Sensitivity Analysis of the Cipher to Key

     
For testing the key sensitivity of the proposed coder, we performed the following steps:
  1. (a)

    changing one bit of S1 which determined the forbidden symbol length in each recursion,

     
  2. (b)

    changing one bit of S2 which divided the forbidden symbol into two different forbidden symbols in each recursion,

     
  3. (c)

    changing one bit of S3 which determined the probability table in each recursion,

     
  4. (d)

    changing just one bit of the three main keys.

     
It is not easy to compare the encrypted outputs by simply observing them. Thus, for the comparison, we calculated the correlation between the corresponding bits of the four encrypted data by (4) [22]:
(4)

where, and are the values of corresponding bits in the two encrypted outputs to be compared and is the total number of output bits.

We performed the above mentioned steps for several different keys. Then, we calculated the correlation coefficient for the encoded sequences by using (4). In all the cases, very small correlation coefficients of the corresponding outputs were obtained. For instance, Table 5 shows the correlation coefficients between encoded sequences with S1, S2, and S3 keys for the outputs from the steps (a) to (d) based on changing the first bits of the keys.

As the Table 5 shows, no correlation exists among the three encrypted outputs even though these have been produced by using only slightly different secret keys. Also, based on the comparison of outputs of the proposed scheme for a large number of inputs, it was found that changing one symbol in the plaintext will result in a completely different output by more than 99%. This shows that different inputs even in one symbol will result in different outputs.

It can be also concluded from this table that all the ambiguities of the proposed coder are independent from each other. Therefore, even if the attacker finds access to one of the keys, no information about the other keys is released by that one.
Table 5

Correlation coefficients of different outputs.

Output

Correlation coefficient

Changing first bit of S1

0.0228

Changing first bit of S2

0.0170

Changing first bit of S3

Changing first bit of S1, S2, S3

  1. (B)

    Sensitivity Analysis of Cipher to Plaintext

     

Generally, attacker may make a slight change in the plaintext. In order to test the influence of changing a single bit in the original data, the correlation coefficients between the corresponding output sequences were calculated for the changes in the input sequence. As expected, the correlation coefficients were very small.

Since the proposed coder is simulated for binary inputs and the output is also binary, we can calculate the changing bit rates of the cipher instead of correlation coefficients. Change of one bit in the plaintext should make theoretically a 50% difference [22] in the bits of the cipher. We also developed a test for the changing rate of the cipher bits. The changing rate was 49.41%. For all these reasons, the proposed scheme of this study proves to be sensitive to the changes in the input, hence, an ideal coder.

4.3.4. Different Attacks

According to both the above analyses and the following reasons, the proposed algorithm is resistant to the chosen plaintext attacks.
  1. (i)

    The model dynamically reorders the frequency of the input symbols according to the length of random forbidden symbols in each recursion.

     
  2. (ii)

    The output from the engine is in the form of words with variable sizes so the individual bits of the output corresponding to the inserted symbols could not be determined.

     
The entropy, , of a message source, , can be calculated by  (5)
(5)

where represents the probability of symbol . The entropy is expressed in bits. If the source emits 2 symbols with equal probability, that is, , then the entropy is = 1, corresponding to a true random sequence. The system test real entropy value is 0.9974. So the system can resist the entropy attacks.

Another large class of attacks is based on the analysis of statistical properties of the output bit stream B= , where is the output length. It is thus important to investigate the statistics of B. Various simulations showed that the output of the proposed coder had ( ) = ( = 1) = 1/ 2, for any i. Therefore, from the first-order statistics, the attacker cannot find any information regarding the secret key.

Alternatively, the attacker may wish to recover the key stream which is used in the proposed method. Suppose that the input symbol sequence length is N. The length of the key stream used in the method is then . Assume that the generated bit stream is of length . Then, the total complexity of breaking the key stream is . In the case that the input symbol sequence length is sufficiently large which makes , the attacker would rather use the brute-force attack to break the secret key utilized in the PRNGs.

A pseudorandom sequence is vulnerable to the known plaintext attacks; since there is a given known input sequence, the attacker can compare the joint source-channel coder and the proposed coded sequences and attempt to find the added subintervals and their locations. To increase the security, an efficient key distribution protocol could be also explored in our algorithm to provide a sufficient encryption.

5. Conclusion

In this paper, a scheme has been presented which combines compression, error detection, and data encryption. The proposed technique by adding a little complexity to CED provides security. It adds two random subinterval and to the probability interval in each iterative coding step and controls the locations of the forbidden symbol by a PRNG with a seed, , while the key is in each recursion. Moreover, it easily switches to standard arithmetic coding by setting and equal to zero when the data do not need to be protected. This coder causes the added redundancy to be almost halved without any special effect on error detection capability. The proposed technique is less complicated and faster than cascaded systems; therefore, they are more suitable for real-time applications. The technique can be also extended to selectively encrypting data and images. This proposed method can be used in ARQ systems for error detection and error correction.

Declarations

Acknowledgment

The authors would like to thank ITRC (Iran Telecommunication Research Center) for the invaluable assistance and funding for this paper.

Authors’ Affiliations

(1)
Department of Electrical Engineering, Iran University of Science and Technology

References

  1. Magli E, Grangetto M, Olmo G: Joint source, channel coding, and secrecy. EURASIP Journal on Information Security 2007, 2007:-7.Google Scholar
  2. Kaneko H, Fujiwara E: Joint source-cryptographic-channel coding based on linear block codes. Applicable Algebra in Engineering, Communication and Computing, 2007, Lecture Notes in Computer Science 4851: 158-167.MathSciNetMATHGoogle Scholar
  3. Bose R, Pathak S: A novel compression and encryption scheme using variable model arithmetic coding and coupled chaotic system. IEEE Transactions on Circuits and Systems 2006, 53(4):848-857. 10.1109/TCSI.2005.859617MathSciNetView ArticleGoogle Scholar
  4. Xie D, Kuo C-CJ: Multimedia encryption with joint randomized entropy coding and rotation in partitioned bitstream. EURASIP Journal on Information Security 2007, 2007:-12.Google Scholar
  5. Moffat A, Neal RM, Witten IH: Arithmetic coding revisited. ACM Transactions on Information Systems 1998, 16(3):256-294. 10.1145/290159.290162View ArticleGoogle Scholar
  6. Cover T, Thomas J: Elements of Information Theory. John Wiley & Sons, New York, NY, USA; 1991.View ArticleMATHGoogle Scholar
  7. Kim H, Wen J, Villasenor JD: Secure arithmetic coding. IEEE Transactions on Signal Processing 2007, 55(5):2263-2272. 10.1109/TSP.2007.892710MathSciNetView ArticleGoogle Scholar
  8. Boyd C, Cleary JG, Irvine SA, Rinsma-Melchert I, Witten IH: Integrating error detection into arithmetic coding. IEEE Transactions on Communications 1997, 45(1):1-3. 10.1109/26.554275View ArticleGoogle Scholar
  9. Sayir J: On Coding By Probability Transformation. Hartung-Gorre, Konstanz, Germany; 1999.Google Scholar
  10. Sayir J: Arithmetic coding for noisy channels. In Proceedings of the Information Theory and Communication Workshop, 1999. IEEE; 69-71.Google Scholar
  11. Wen JG, Kim H, Villasenor JD: Binary arithmetic coding with key-based interval splitting. IEEE Signal Processing Letters 2006, 13(2):69-72. 10.1109/LSP.2005.861589View ArticleGoogle Scholar
  12. Grangetto M, Magli E, Olmo G: Multimedia selective encryption by means of randomized arithmetic coding. IEEE Transactions on Multimedia 2006, 8(5):905-917. 10.1109/TMM.2006.879919View ArticleGoogle Scholar
  13. Teekaput P, Chokchaitam S: Secure embedded error detection arithmetic coding. In Proceedings of the 3rd International Conference on Information Technology and Applications (ICITA '05), July 2005. IEEE; 568-571.View ArticleGoogle Scholar
  14. Anand R, Ramchandran K, Kozintsev IV: Continuous error detection (CED) for reliable communication. IEEE Transactions on Communications 2001, 49(9):1540-1549. 10.1109/26.950341View ArticleMATHGoogle Scholar
  15. Wozencraft, JM, Reiffen B: Sequential Decoding. MIT Press, Cambridge, Mass, USA; 1961.MATHGoogle Scholar
  16. Fano RM: A heuristic discussion of probabilistic decoding. IEEE Transactions Information Theory 1963, 64-74. 10.1109/TIT.1963.1057827Google Scholar
  17. Pettijohn BD, Sayood K, Hoffman MW: Joint source/channel coding using arithmetic codes. Proceedings of the Data Compression Conference (DDC '00), March 2000, Snowbird, Utah, USA 73-82.View ArticleGoogle Scholar
  18. Pettijohn BD, Hoffman MW, Sayood K: Joint source/channel coding using arithmetic codes. IEEE Transactions on Communications 2001, 49(5):826-835. 10.1109/26.923806View ArticleMATHGoogle Scholar
  19. Hodjat A, Verbauwhede I: Area-throughput trade-offs for fully pipelined 30 to 70 Gbits/s AES processors. IEEE Transactions on Computers 2006, 55(4):366-372. 10.1109/TC.2006.49View ArticleGoogle Scholar
  20. Grangetto M, Magli E, Olmo G: Multimedia selective encryption by means of randomized arithmetic coding. IEEE Transactions on Multimedia 2006, 8(5):905-917. 10.1109/TMM.2006.879919View ArticleGoogle Scholar
  21. Rukhin A, Soto J, Nechvatal J, et al.: A statistical test suite for random and pseudorandom number generators for cryptographic applications. NIST Special Publication 800-22, May 2001
  22. Tong X, Cui M, Wang Z: A new feedback image encryption scheme based on perturbation with dynamical compound chaotic sequence cipher generator. Optics Communications 2009, 282(14):2722-2728. 10.1016/j.optcom.2009.03.075View ArticleGoogle Scholar

Copyright

© M. Sinaie and V. T. Vakili. 2010

This article is published under license to BioMed Central Ltd. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.