CN103107859B - Based on combined signal source and the information security coding and decoding method of CCSDS IDC and SMS4 - Google Patents

Based on combined signal source and the information security coding and decoding method of CCSDS IDC and SMS4 Download PDF

Info

Publication number
CN103107859B
CN103107859B CN201110360614.7A CN201110360614A CN103107859B CN 103107859 B CN103107859 B CN 103107859B CN 201110360614 A CN201110360614 A CN 201110360614A CN 103107859 B CN103107859 B CN 103107859B
Authority
CN
China
Prior art keywords
coefficient
coding
source symbol
probability distribution
key
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CN201110360614.7A
Other languages
Chinese (zh)
Other versions
CN103107859A (en
Inventor
张灿
凃国防
李林森
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
University of Chinese Academy of Sciences
Original Assignee
University of Chinese Academy of Sciences
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by University of Chinese Academy of Sciences filed Critical University of Chinese Academy of Sciences
Priority to CN201110360614.7A priority Critical patent/CN103107859B/en
Publication of CN103107859A publication Critical patent/CN103107859A/en
Application granted granted Critical
Publication of CN103107859B publication Critical patent/CN103107859B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Landscapes

  • Compression, Expansion, Code Conversion, And Decoders (AREA)
  • Compression Of Band Width Or Redundancy In Fax (AREA)

Abstract

The present invention relates to a kind of combined signal source and the information security coding and decoding method in communication code field.In order to solve the problems such as the high and fail safe of the computation complexity existed in existing message sink coding and information security independent compilation code, the present invention proposes a kind of combined signal source based on CCSDS IDC and information security coding and decoding method.The original image of input is carried out three grades of two-dimensional discrete wavelet conversions by the method, image is divided into DC coefficient and ac coefficient, DC coefficient carries out the random arithmetic coding under the control of SMS4 packet key algorithm after quantizing, for upset symbol code area between, while completing data compression, achieve the encryption of data; Ac coefficient then carries out sequential encryption after carrying out Bit-Plane Encoding; Decoding is then the inverse process of coding.This method reduce computation complexity, good fail safe can be provided simultaneously, be applicable to the image in resource-constrained deep space network, video validity and security transmissions.

Description

Based on combined signal source and the information security coding and decoding method of CCSDS IDC and SMS4
Technical field
The present invention relates to a kind of combined signal source and the information security coding and decoding method in communication code field, particularly relate to a kind of combined signal source based on CCSDS IDC and SMS4 and information security coding and decoding method.
Background technology
In the Shannon information theory of classics, message sink coding and information security are the different research directions in information science field.The task of message sink coding is the redundancy of compressed information, its objective is the efficiency improving transmission; The task of information security is then under the control of the key, added " noise " in the data that will transmit by the method for diffusion (displacement) and upset (substituting) artificially, make its be encrypted as listener-in be difficult to understand cipher-text information, data then can be correctly decoded by key by recipient, the safe transmission of guarantee information.Traditional communication system is the separation theorem according to Shannon, by message sink coding and the cascade of information security encode serial, by by message sink coding and information security independent compilation code, data compression and safety optimization respectively, coding and decoding overall performance is made to reach best, as shown in Figure 1.But in the deep space communication of resource-constrained, have that propagation distance is far away, error rate is high, computational resource and a feature such as power limited, spatial cache and disposal ability be limited, precondition (the code word endless that Shannon separation theorem is set up, the characteristic of channel is known) cannot meet, so the performance of separate compilation code system receives certain restriction.In addition space communication network due to its heterogeneous structure have very strong opening, channel complicated, easily the factor such as to be disturbed, there is very big hidden danger in the data security of therefore space communication.Especially have the features such as data volume is large, redundancy is high, pixel interdependence is strong for spatial image, data volume will inevitably bring too greatly the speed of encryption device slowly stagnant, and then affects the normal work of whole system.
For the structure feature that performance is restricted in the deep space communication system of resource-constrained of message sink coding and information security independent compilation code, researchers propose multiple combined signal source and secure coding method.These methods are mainly improved on the basis of arithmetic coding and huffman coding.H.26L etc. arithmetic coding has good compression effectiveness, is widely used in JPEG and in compression standard.In arithmetic coding, the probability distribution table of source sequence is used for recording the probability that each source symbol occurs, the arrangement mode of source symbol in probability distribution table determines in advance according to probability from big to small tactic.But arithmetic coding can not guarantee data security, random arithmetic coding is then the improvement of arithmetic coding.Random arithmetic coding introduces a random sequence in arithmetic coding process, it is according to probability order from big to small in an encoding process that this sequence determines source symbol or order from small to large arranges, the interval of random arithmetic coding is controlled with this random sequence variable, by carrying out random organization to coding region, reaching and the upset of coding is controlled.Decoder only takes the probabilistic model identical with encoder and identical information source storage mode, could correct decoding.The fail safe of random sequence is depended in the fail safe of its method, opposing selectivity plaintext attack seems very fragile, can not ensure data security.
SMS4, first commercial block cipher that official of China announces, cryptographic algorithm and key schedule all adopt 32 step nonlinear iteration structures, there is high security and strong anti-attack ability, but block encryption algorithm amount of calculation is large, and complexity is high, and the image data amount of real-time Transmission is large, when carrying out block encryption, need the time that cost is longer.
Consultative committee for space data system (Consultative Committee for Space Data Systems, CCSDS) respectively standardization Standard of image compression (the Image Data Compression in 2005 and 1999, IDC) security protocol (Space Communication Protocol Specification-Security Protocol, SCPS-SP) and between spatial network end-to-end system.SCPS-SP is a kind of network layer protocol, employing be a kind of block cipher, calculation of complex, be not suitable for energy-constrained network view data encryption.The compression de-redundancy of image and the encryption of data are upset with block encryption algorithm etc. and are separated by the arithmetic coding therefore in CCSDS IDC standard, JPEG, H.26L standard, make that computation complexity is high, time delay is large, in the networks such as resource-constrained deep space communication, be difficult to realize Image Data Compression and encryption, ensure its validity and fail safe.
Summary of the invention
In order to solve the problems such as the high and fail safe of the computation complexity existed in existing message sink coding and information security independent compilation code, the present invention proposes a kind of combined signal source based on CCSDS IDC and SMS4 and information security coding and decoding method.The method devises the structure that a kind of combined signal source based on CCSDS IDC and SMS4 and information security are encoded, propose SMS-Based 4 block cipher sub-key control under combined signal source and safe coding and decoding method.
The technical solution adopted for the present invention to solve the technical problems is: the technical solution adopted for the present invention to solve the technical problems is: when CCSDS IDC encodes, first the image of input is carried out three grades of two-dimensional discrete wavelet conversions, image is divided into DC coefficient and ac coefficient, DC coefficient carries out quantizing, ac coefficient carries out Bit-Plane Encoding; By the sub-key in SMS4 block cipher, as the initialization seed of random sequence generator, and by this random sequence generator, producing a length is N, and equally distributed binary random sequence r 1, r 2..., r nsub-key, this sequence is used for controlling the arrangement mode of source symbol in probability distribution table in random arithmetic coding, the DC coefficient after quantification is carried out to the random arithmetic coding under the control of SMS4 sub-key.Have the information probability distribution table of two DC coefficient during coding, they store identical source symbol, just the put in order difference of source symbol in table.Wherein the source symbol of a table arranges according to probability descending order, probability order arrangement from small to large then pressed by another table, be that " 0 " or " 1 " select a wherein probability distribution table randomly according to sub-key during coding, thus reach the object upset between code area corresponding to source symbol.If the value of random sequence variable is " 1 ", that probability distribution table selecting source symbol to arrange according to descending order, divides between reference region; If the value of random sequence variable is " 0 ", then select source symbol according to that probability distribution table tactic from small to large, divide between reference region, under sub-key controls, repeat said process, encode according to the source symbol of rule to input of random arithmetic coding, upgrade the information probability distribution table of source symbol, until by the end-of-encode of all source symbol DC coefficient simultaneously.Due to time initial, information source is for waiting general distribution, and the initial probability distribution table therefore under two kinds of different arrangement modes is all identical.DC coefficient decoding is then the inverse process of coding, only takes identical cipher controlled and identical probability Distribution Model, could correct decoding.Ac coefficient after bitplanes coding then carries out sequential encryption, and the binary bit stream of the binary random sequence that the random sequence generator in sequential encryption algorithm produces and ac coefficient is carried out by bit XOR, obtains exchanging cipher-text information; The decoding of sequential encryption is then the inverse process of coding, and the random sequence that only ciphertext and decruption key need be produced is carried out again by bit XOR, just decoding can draw ac coefficient.
The invention has the beneficial effects as follows: adopt CCSDS IDC to carry out three grades of two-dimensional wavelet transformations to image, play an important role to comprising in image major part energy and image reconstruction process, DC coefficient that data volume is little, the random arithmetic coding that under employing SMS4 block cipher neutron cipher controlled, fail safe is higher, on the ac coefficient employing processing speed sequential encryption method faster containing the texture of image and detailed information is little on visual characteristic impact, data volume is large, information source compression is designed with information security combined optimization, achieves combined signal source and safe coding.Significantly reduce the computation complexity of coding and decoding compared with the tandem type coding under Shannon separation theorem, provide good fail safe, be applicable to the image in resource-constrained deep space network, video, validity and security transmissions.
Accompanying drawing explanation
Fig. 1. legacy communications system coding structure.
In Fig. 1,1. source symbol, 2. message sink coding, 3. scrambled, 4. output code flow.
Fig. 2. to encode block diagram based on the combined signal source of CCSDS IDC and SMS4 and information security.
In Fig. 2,5. original image, 6. wavelet transform, 7. DC coefficient, 8. ac coefficient, 9. quantize, 10. Bit-Plane Encoding, 11.SMS4 algorithm, 12. random sequence generators, 13. random arithmetic coding, 14. DC coefficient ciphertexts, 15. sequential encryptions, 16. ac coefficient ciphertexts, 17. output code flows;
5. original images, 6. wavelet transform, 7. DC coefficient, 8. ac coefficient in fig. 2,9. quantizes, 10. Bit-Plane Encoding, forms CCSDS IDC algorithm;
11.SMS4 algorithm in fig. 2,12. random sequence generators, 13. random arithmetic coding, 14. DC coefficient ciphertexts, to the DC coefficient after quantification under the control of SMS4 key, carry out random arithmetic coding;
11.SMS4 algorithm in fig. 2,15. sequential encryptions, 16. ac coefficient ciphertexts, carry out sequential encryption coding.
In fig. 2 17, the ciphertext of DC coefficient and the ciphertext of ac coefficient are carried out multiplexing, output code flow.
Embodiment
1.CCSDS IDC principle
5. original images, 6. wavelet transform, 7. DC coefficient, 8. ac coefficient in Fig. 2,9. quantize, 10. Bit-Plane Encoding, forms CCSDS IDC algorithm;
In Fig. 2, first CCSDS IDC utilizes CDF9/7 small echo to carry out three grades of wavelet transforms (Discrete Wavelet Transform, DWT) to original image, and after wavelet transformation, image coefficient is divided into DC coefficient and ac coefficient.
DC coefficient contains the most energy of image and important information, and first CCSDS IDC quantizes according to formula (1) and (2) DC coefficient DC.
q=max(q′,Bitshift(LL 3)) (1)
Wherein q represents quantizing factor, c nrepresent input coefficient, c ' 1, c ' 2..., c ' nrepresent coefficient after quantizing, LL 3represent the low frequency coefficient after three grades of wavelet transformations, quantizing factor q is determined by DC coefficient DC position dark (BitDepthDC) and ac coefficient AC position dark (BitDepthAC).DC coefficient carries out random arithmetic coding after quantizing.
Ac coefficient mainly contains texture and the detailed information of image.CCSDS IDC standard advises that these ac coefficients and DC quantize to carry out Bit-Plane Encoding together with residual error coefficient.CCSDS IDC bit-plane coding comprises two aspects, i.e. AC coefficient bit depth coding and AC coefficient bit plane coding.Bit-Plane Encoding needs from most important bit-planes (MSB:Most Significant Bitplane), in layer carries out in order, is encoded to the bit-planes that severity level is minimum always.In each bit-planes, IDC is coding organizational unit with " tree ", wavelet coefficient " tree " has following character: when paternal number is when current bit plane is invalid, its son's coefficient, grandson's coefficient are also probably in disarmed state in current bit plane, forms one " zero tree ".Utilize the concept of wavelet coefficient " zero tree ", to try one's best, few code word goes to represent whole " tree " structure, reaches compression object.
2. the combined signal source of SMS-Based 4 algorithm and safe coding and decoding method.
The combined signal source random arithmetic coding of 2.1 SMS-Based 4 algorithms
1) probabilistic model of random arithmetic coding
In Fig. 2, random arithmetic coding 13 in arithmetic coding, introduces one by the random sequence generator 12 under the control of SMS4 algorithm sub-key, it is according to probability order from big to small in an encoding process that the output of this random sequence generator determines source symbol or order from small to large arranges, an often coding symbol, once out of order, control with the upset between reaching code area, coded data is encrypted.Decoding is then the inverse process of coding.
Assuming that the coefficient c ' in Fig. 2 after 9CCSDS IDC quantification nsize meet 1≤c ' n≤ M (M≤N), i.e. c ' 1, c ' 2..., c ' n∈ [1, M].M is the symbolic number that DC coefficient quantizes.Time initial, by 1,2 ... this M of M symbol carries out grade and generally divides, and the probability obtaining each symbol is like this in this algorithm, have the information probability distribution table of two DC coefficient, they store identical source symbol, just the put in order difference of source symbol in table.Wherein the source symbol of a table is according to the arrangement of probability descending order, and probability order arrangement from small to large then pressed by another table.Be that " 0 " or " 1 " select a wherein probability distribution table randomly according to key during coding, thus reach the object upset between code area corresponding to source symbol.Due to time initial, information source is for waiting general distribution, and the initial probability distribution table therefore under two kinds of different arrangement modes is all identical, as shown in table 1.
Table 1 source symbol initialization probability distribution table
Symbol 1 2 x i M-1 M
Probability 1/M 1/M 1/M 1/M 1/M
2) combined signal source of SMS-Based 4 algorithm and safe coding process
A) production method of random sequence
32 the sub-key rk will obtained in SMS4 algorithm 11 in Fig. 2 iin one, as the initialization seed of random sequence generator 12.By this random sequence generator 12, can produce a length is N, and equally distributed binary random sequence r 1, r 2..., r nsub-key.This sequence is used for controlling the arrangement mode of source symbol in probability distribution table in random arithmetic coding, and SMS4 algorithm controls the sub-key r produced 1, r 2..., r ndetermine the fail safe of random arithmetic coding.Generally, the length N of random sequence gets 1024, if be greater than 1024 by the source sequence length of encoding, needs to be equaled by the sub-key of information source length of encoding by circulation generation the random sequence of 1024 bit long.Meanwhile, different sub-keys is chosen to different frame image, ensured the fail safe of random arithmetic coding further.
B) cataloged procedure of DC coefficient
According to the probabilistic model of random arithmetic coding, time initial, the DC coefficient in information source such as to be encoded at the general distribution, and the initial probability distribution table therefore under two kinds of different arrangement modes is all identical, as shown in table 1.
If the value r of random sequence variable ifor " 1 ", then that probability distribution table selecting source symbol to arrange according to descending order, divides between reference region; If the value r of random sequence variable ifor " 0 ", then select source symbol according to that probability distribution table tactic from small to large, divide between reference region.Based on this feature, by selecting a wherein probability distribution table between code area randomly with key, a symbol of often encoding, once out of order, thus reach the object upset between code area corresponding to source symbol.
Encode first direct current quantization parameter c ' 1, make c ' 1=x i(x i∈ [1, M]), at above-mentioned random sequence r 1, r 2..., r nin get r 1.Because the information probability distribution table of twice initial is identical, therefore no matter r 1equal " 0 " or " 1 ", first symbol c ' 1all identical between corresponding code area.Such c ' 1the interval of rear correspondence of having encoded is and between the reference region that it can be used as next step to divide, upgrade the probability that source symbol occurs simultaneously.Because the direct current quantization parameter of input is c ' 1, so source symbol " x i" probability that occurs by become the probability of other symbol then all becomes probability distribution table after renewal is then by shown in table 2 and table 3.In table 2, source symbol presses probability order arrangement from big to small, then by order arrangement from small to large in table 3.
Table 2 has been encoded after first source symbol, the probability distribution table (descending arrangement) of next source symbol
Symbol x i 1 x i-1 x i+1 M
Probability 2/(M+1) 1/(M+1) 1/(M+1) 1/(M+1) 1/(M+1)
Table 3 has been encoded after first source symbol, the probability distribution table (ascending arrangement) of next source symbol
Symbol 1 x i-1 x i+1 M x i
Probability 1/(M+1) 1/(M+1) 1/(M+1) 1/(M+1) 2/(M+1)
Encode next source symbol symbol c ' 2.C ' 2=x j(x j∈ [1, M]) and supposition x j> x i, at random sequence r 1, r 2..., r nin get r 2.If r 2=1, by new reference area divide according to putting in order of each symbol in table 2, obtain new reference area i.e. c ' 2code area between otherwise, if r 2=0 by new reference area divide according to putting in order of each symbol in table 3, and obtain c ' in such cases 2code area between encoded c ' 1, c ' 2after, source symbol " x i" and symbol " x j" probability is and the probability of all the other symbols is source symbol probability distribution after again upgrading is as shown in table 4 and table 5.
Table 4 has been encoded after second source symbol, the probability distribution table (descending arrangement) of the 3rd source symbol
Symbol x i x j 1 x i-1 x j-1 x j+1 M
Probability 2/(M+2) 2/(M+2) 1/(M+2) 1/(M+2) 1/(M+2) 1/(M+2) 1/(M+2)
Table 5 has been encoded after second symbol, the information probability distribution table (ascending arrangement) of the 3rd source symbol
Symbol 1 x i-1 x j-1 x j+1 M 13 8
Probability 1/(M+2) 1/(M+2) 1/(M+2) 1/(M+2) 1/(M+2) 2/(M+2) 2/(M+2)
Under sub-key controls, repeat said process, encode according to the source symbol of rule to input of random arithmetic coding, upgrade the information probability distribution table of source symbol simultaneously.Until by complete for all source symbol DC coefficient codings.
The cataloged procedure of 2.2 ac coefficients
The binary system ac coefficient code stream that in Fig. 2, ac coefficient 8 exports after Bit-Plane Encoding 10 and the random sequence that random sequence generator 12 exports carry out XOR in sequential encryption 15, just obtain the ciphertext of ac coefficient scrambled.
The combined signal source arithmetic of 2.3 SMS-Based 4 algorithms and safe decoding
1) DC coefficient decoding
DC coefficient decoding is then the inverse process of coding, and only take and encode identical cipher controlled and identical probability Distribution Model, have decruption key, could obtain the random sequence identical with encoder, could correct decoding.
During decoding, first by the numerical result that the random arithmetic coding of DC coefficient under the control of SMS4 sub-key obtains, be denoted as Q, and equiprobability initialization is carried out to all coefficients.Then, first random number r is got 1determine the information probability distribution table corresponded, according to probability distribution table between reference region [0,1] split, then the endpoint value in Q and decoding interval is compared, judge which subinterval Q drops on, translate the value of the DC coefficient representated by this interval, and using this interval as between new reference region; Then, second random number r is got 2, and carry out symbol division according to corresponding information probability distribution table between new reference region, continue the size comparing Q and new decoding interval endpoint value, translate second DC coefficient; This process is sustained, and last decoding obtains all DC coefficient.
2) ac coefficient decoding.
Again carry out the XOR by bit by the ac coefficient ciphertext obtained and with the random sequence that random sequence generator 12 exports, just can recover former ac coefficient.

Claims (1)

1. based on the combined signal source of CCSDS IDC and the coding and decoding method of information security, it is characterized in that: original image is first through three grades of two-dimensional discrete wavelet conversions, be divided into DC coefficient and ac coefficient, by the sub-key in SMS4 block cipher, as the initialization seed of random sequence generator, generating a length by random sequence generator is N, and equally distributed binary random sequence r 1, r 2..., r nsub-key, be used for controlling the arrangement mode of source symbol in probability distribution table in random arithmetic coding, DC coefficient after quantification is carried out to the random arithmetic coding under the control of SMS4 sub-key, the information probability distribution table of two DC coefficient is had during coding, they store identical source symbol, just the put in order difference of source symbol in table, wherein the source symbol of a table arranges according to probability descending order, probability order arrangement from small to large then pressed by another table, the sub-key generated according to random sequence generator during coding is that " 0 " or " 1 " select a wherein probability distribution table randomly, thus reach the object upset between code area corresponding to source symbol, if the value of the sub-key that random sequence generator generates is " 1 ", select that probability distribution table that source symbol arranges according to descending order, divide between reference region, if the value of the sub-key that random sequence generator generates is " 0 ", then select source symbol according to that probability distribution table tactic from small to large, divide between reference region, under the sub-key control that random sequence generator generates, encode according to the source symbol of rule to input of random arithmetic coding, upgrade the information probability distribution table of source symbol simultaneously, until by the end-of-encode of all source symbol DC coefficient, due to time initial, information source is for waiting general distribution, therefore the initial probability distribution table under two kinds of different arrangement modes is all identical, ac coefficient adopts sequential encryption after then carrying out Bit-Plane Encoding, generate ac coefficient ciphertext, decoding is then the inverse process of coding.
CN201110360614.7A 2011-11-15 2011-11-15 Based on combined signal source and the information security coding and decoding method of CCSDS IDC and SMS4 Expired - Fee Related CN103107859B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201110360614.7A CN103107859B (en) 2011-11-15 2011-11-15 Based on combined signal source and the information security coding and decoding method of CCSDS IDC and SMS4

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201110360614.7A CN103107859B (en) 2011-11-15 2011-11-15 Based on combined signal source and the information security coding and decoding method of CCSDS IDC and SMS4

Publications (2)

Publication Number Publication Date
CN103107859A CN103107859A (en) 2013-05-15
CN103107859B true CN103107859B (en) 2015-08-19

Family

ID=48315451

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201110360614.7A Expired - Fee Related CN103107859B (en) 2011-11-15 2011-11-15 Based on combined signal source and the information security coding and decoding method of CCSDS IDC and SMS4

Country Status (1)

Country Link
CN (1) CN103107859B (en)

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103442232B (en) * 2013-08-28 2014-09-03 李秋华 Dependency maintaining lossless video encryption compression transmission method based on ranking permutation
CN107222309B (en) * 2017-06-29 2019-10-08 常州机电职业技术学院 A kind of hidden channel build method of time type network based on wavelet transform
CN115348017B (en) * 2022-10-18 2023-02-07 阿里巴巴(中国)有限公司 Ciphertext processing method and device

Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101848930A (en) * 2007-06-29 2010-09-29 威斯康星校友研究基金会 Plasmid-encoded neurotoxin genes in clostridium botulinum serotype a subtypes

Patent Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101848930A (en) * 2007-06-29 2010-09-29 威斯康星校友研究基金会 Plasmid-encoded neurotoxin genes in clostridium botulinum serotype a subtypes

Non-Patent Citations (4)

* Cited by examiner, † Cited by third party
Title
On the Security of Randomized Arithmetic Codes Against Ciphertext-Only Attacks;Raj S.Katti,et al;《IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY》;20110331;第6卷(第1期);第19~25页 *
吴成茂,等.基于SMS4分组密码的彩色图像加密方法.《西安邮电学院学报》.2011,第16卷(第5期),第1~6页. *
孔娟,等.一种基于EZW编码的数字图像加密算法.《微计算机信息》.2008,第24卷(第33期),第68~69页. *
闫锋刚,等.一种面向空间通信的图像复合加密算法.《电子测量技术》.2008,第31卷(第7期),第18~21,43页. *

Also Published As

Publication number Publication date
CN103107859A (en) 2013-05-15

Similar Documents

Publication Publication Date Title
CN101677399B (en) Method and system for encoding multimedia content based on secure coding schemes using stream cipher
Johnson et al. On compressing encrypted data
JP5615273B2 (en) Method and apparatus for selective data encryption
CN101442676B (en) Method for enciphering H.264 video based on CAVLC encode
CN100364336C (en) Method and appts. for encrypting and compressing multimedia data
CN103414686B (en) A kind of view data secure transmission system supporting transparent transcoding
EP1487148A1 (en) Data processing apparatus and method thereof
Zhou et al. Scalable compression of stream cipher encrypted images through context-adaptive sampling
CN107292184B (en) Image encryption method, device and key stream generating method and key stream generator
CN103107859B (en) Based on combined signal source and the information security coding and decoding method of CCSDS IDC and SMS4
CN103002281A (en) Image compression and encryption method based on wavelet transform and SHA-1 (secure has algorithm-1)
CN112886970B (en) Negotiation method for continuous variable quantum key distribution
CN109168033B (en) Video privacy data protection system and method
EP3084968A1 (en) Process efficient preprocessing for an encryption standard
CN101132530A (en) Method for implementing built-in image compression based on run-length coding
Xiang et al. Secure MQ coder: An efficient way to protect JPEG 2000 images in wireless multimedia sensor networks
Rengarajaswamy et al. SPIRT compression on encrypted images
Norcen et al. Encryption of wavelet-coded imagery using random permutations
Xiang et al. Degradative encryption: An efficient way to protect SPIHT compressed images
Wang et al. Energy-constrained quality optimization for secure image transmission in wireless sensor networks
CN103812615A (en) Coding method for Luby transform code in distributed communication system, and relay communication method
CN115567219A (en) Secure communication method, device and storage medium based on 5G virtual private network slice
CN105704499B (en) A kind of selective satellite image compression encryption method based on ChaCha20 and CCSDS
Engel et al. Secret wavelet packet decompositions for JPEG 2000 lightweight encryption
CN114710264A (en) Physical layer encryption and decryption method and system based on Spinal code

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C53 Correction of patent of invention or patent application
CB02 Change of applicant information

Address after: 100049, Yuquanlu Road, Beijing No. 19 (a)

Applicant after: University OF CHINESE ACADEMY OF SCIENCES

Address before: 100049, Yuquanlu Road, Beijing No. 19 (a)

Applicant before: GRADUATE University OF CHINESE ACADEMY OF SCIENCES

COR Change of bibliographic data

Free format text: CORRECT: APPLICANT; FROM: POSTGRADUATE SCHOOL, CHINESE ACADEMY OF SCIENCES TO: UNIVERSITY OF CHINESE ACADEMY OF SCIENCES

C14 Grant of patent or utility model
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20150819

Termination date: 20211115

CF01 Termination of patent right due to non-payment of annual fee