G. Alvarez, F. Montoya, M. Romera, and G. Pastor, Cryptanalysis of a discrete chaotic cryptosystem using external key, Physics Letters A, vol.319, issue.3-4, pp.319-334, 2003.
DOI : 10.1016/j.physleta.2003.10.044

G. A. Alvarez and L. B. Shujun, Cryptanalyzing a nonlinear chaotic algorithm (NCA) for image encryption, Communications in Nonlinear Science and Numerical Simulation, vol.14, issue.11, pp.3743-3749, 2009.
DOI : 10.1016/j.cnsns.2009.02.033

B. Carpentieri, M. J. Weinberger, and G. Seroussi, Lossless compression of continuous-tone images, Proceedings of the IEEE, vol.88, issue.11, pp.1797-1809, 2000.
DOI : 10.1109/5.892715

T. J. Chuang and J. C. Lin, A NEW ALGORITHM FOR LOSSLESS STILL IMAGE COMPRESSION, Pattern Recognition, vol.31, issue.9, pp.1343-1352, 1998.
DOI : 10.1016/S0031-3203(97)00155-6

J. Cleary, S. Irvine, and I. Rinsma-melchert, On the insecurity of arithmetic coding, Computers & Security, vol.14, issue.2, pp.167-180, 1995.
DOI : 10.1016/0167-4048(95)97050-K

M. Grangetto, E. Magli, and G. Olmo, Multimedia Selective Encryption by Means of Randomized Arithmetic Coding, IEEE Transactions on Multimedia, vol.8, issue.5, pp.905-917, 2006.
DOI : 10.1109/TMM.2006.879919

Y. Hartono, C. Kraaikamp, and F. Schweiger, Algebraic and ergodic properties of a new continued fraction algorithm with non-decreasing partial quotients, Journal de Th??orie des Nombres de Bordeaux, vol.14, issue.2, pp.497-516, 2002.
DOI : 10.5802/jtnb.371

A. B. Helen and M. H. James, A chosen plaintext attack on an adaptive arithmetic coding compression algorithm, Computers and Security, vol.12, pp.157-167, 1993.

P. G. Howard and J. S. Vitter, Arithmetic Coding for Data Compression [10] A. Kanso and N. Smaoui. Logistic Chaotic Maps for Binary Numbers Generations, Proceedings of the IEEE, pp.857-8652557, 1994.

H. Kim, J. Wen, and J. Villasenor, Secure Arithmetic Coding, IEEE Transactions on Signal Processing, vol.55, issue.5, pp.2263-2272, 2007.
DOI : 10.1109/TSP.2007.892710

G. G. Langdon, An Introduction to Arithmetic Coding, IBM Journal of Research and Development, vol.28, issue.2, 1984.
DOI : 10.1147/rd.282.0135

S. Li and X. Mou, Improving security of a chaotic encryption approach, Physics Letters A, vol.290, issue.3-4, pp.127-133, 2001.
DOI : 10.1016/S0375-9601(01)00612-0

L. Lorentzen and H. Waadeland, Continued Fractions with Applications, 1992.

G. Marsaglia, DIEHARD: A Battery of Tests of Randomness, 1997.

B. Mi, X. Liao, and Y. Chen, A novel chaotic encryption scheme based on arithmetic coding, Chaos, Solitons & Fractals, vol.38, issue.5, pp.1523-1531, 2008.
DOI : 10.1016/j.chaos.2007.01.133

A. Moffat, R. M. Neal, and I. H. Witten, Arithmetic coding revisited, ACM Transactions on Information Systems, vol.16, issue.3, pp.256-294, 1998.
DOI : 10.1145/290159.290162

URL : http://researchcommons.waikato.ac.nz/bitstream/10289/78/1/content.pdf

V. Patidar, N. K. Parekk, and K. K. Sud, A new substitution???diffusion based image cipher using chaotic standard and logistic maps, Communications in Nonlinear Science and Numerical Simulation, vol.14, issue.7, pp.3056-3075, 2009.
DOI : 10.1016/j.cnsns.2008.11.005

V. Patidar and K. K. Sud, A Novel Pseudo Random Bit Generator Based on Chaotic Standard Map and its Testing, Electronic Journal of Theoretical Physics, vol.6, issue.20, pp.327-344, 2009.

R. B. Seidensticker, Continued fractions for high-speed and high-accuracy computer arithmetic, 1983 IEEE 6th Symposium on Computer Arithmetic (ARITH), 1983.
DOI : 10.1109/ARITH.1983.6158099

S. Sudharsanan and P. Sriram, Block-based adaptive lossless image coder, Proceedings 2000 International Conference on Image Processing (Cat. No.00CH37101), pp.120-123, 2000.
DOI : 10.1109/ICIP.2000.900909

J. Vuillemin, Exact Real Computer Arithmetic with Continued Fractions, INRIA Report, vol.760, 1987.
DOI : 10.1145/62678.62681

URL : https://hal.archives-ouvertes.fr/inria-00075792

H. S. Wall, Analytic Theory of Continued Fractions, 1973.

J. Wei, X. F. Liao, K. W. Wong, and T. Zhout, Cryptanalysis of a cryptosystem using multiple one-dimensional chaotic maps, Communications in Nonlinear Science and Numerical Simulation, vol.12, issue.5, pp.814-836, 2007.
DOI : 10.1016/j.cnsns.2005.06.001

J. G. Wen, H. Kim, and J. D. Vilasenor, Binary Arithmetic Coding Using Key-Based Interval Splitting, IEEE Signal Process Lett, vol.13, issue.2, pp.69-72, 2006.

I. H. Witten, R. M. Neal, and J. G. Cleary, Arithmetic coding for data compression, Communications of the ACM, vol.30, issue.6, pp.520-540, 1987.
DOI : 10.1145/214762.214771

K. W. Wong, B. S. Kwoka, and C. H. Yuena, An efficient diffusion approach for chaos-based image encryption, Chaos, Solitons & Fractals, vol.41, issue.5, pp.2652-2663, 2008.
DOI : 10.1016/j.chaos.2008.09.047

X. G. Wu, H. P. Hu, B. L. , and Z. , Analyzing and improving a chaotic encryption method, Chaos, Solitons & Fractals, vol.22, issue.2, pp.367-373, 2004.
DOI : 10.1016/j.chaos.2004.02.009

W. Xiaolin, An algorithmic study on lossless image compression, Proceedings of Data Compression Conference, DCC '96, pp.150-159, 1996.
DOI : 10.1109/DCC.1996.488320

T. Yang, A Survey of Chaotic Secure Communication Systems, Journal of Computational Cognition, vol.2, issue.2, pp.81-130, 2004.

L. Zhang, X. Liao, and X. Wang, An image encryption approach based on chaotic maps, Chaos, Solitons & Fractals, vol.24, issue.3, pp.759-765, 2005.
DOI : 10.1016/j.chaos.2004.09.035

J. Zhou, O. C. Au, X. Fan, and P. H. Wong, Joint security and performance enhancement for secure arithmetic coding, 2008 15th IEEE International Conference on Image Processing, pp.3120-3123, 2008.
DOI : 10.1109/ICIP.2008.4712456

J. Zhou, O. C. Au, and P. H. Wong, Adaptive Chosen-Ciphertext Attack on Secure Arithmetic Coding, IEEE Trans Signal Processing, 2008.