CN103107859B - Based on combined signal source and the information security coding and decoding method of CCSDS IDC and SMS4 - Google Patents
Based on combined signal source and the information security coding and decoding method of CCSDS IDC and SMS4 Download PDFInfo
- Publication number
- CN103107859B CN103107859B CN201110360614.7A CN201110360614A CN103107859B CN 103107859 B CN103107859 B CN 103107859B CN 201110360614 A CN201110360614 A CN 201110360614A CN 103107859 B CN103107859 B CN 103107859B
- Authority
- CN
- China
- Prior art keywords
- coefficient
- coding
- source symbol
- probability distribution
- key
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Expired - Fee Related
Links
Landscapes
- Compression, Expansion, Code Conversion, And Decoders (AREA)
- Compression Of Band Width Or Redundancy In Fax (AREA)
Abstract
The present invention relates to a kind of combined signal source and the information security coding and decoding method in communication code field.In order to solve the problems such as the high and fail safe of the computation complexity existed in existing message sink coding and information security independent compilation code, the present invention proposes a kind of combined signal source based on CCSDS IDC and information security coding and decoding method.The original image of input is carried out three grades of two-dimensional discrete wavelet conversions by the method, image is divided into DC coefficient and ac coefficient, DC coefficient carries out the random arithmetic coding under the control of SMS4 packet key algorithm after quantizing, for upset symbol code area between, while completing data compression, achieve the encryption of data; Ac coefficient then carries out sequential encryption after carrying out Bit-Plane Encoding; Decoding is then the inverse process of coding.This method reduce computation complexity, good fail safe can be provided simultaneously, be applicable to the image in resource-constrained deep space network, video validity and security transmissions.
Description
Technical field
The present invention relates to a kind of combined signal source and the information security coding and decoding method in communication code field, particularly relate to a kind of combined signal source based on CCSDS IDC and SMS4 and information security coding and decoding method.
Background technology
In the Shannon information theory of classics, message sink coding and information security are the different research directions in information science field.The task of message sink coding is the redundancy of compressed information, its objective is the efficiency improving transmission; The task of information security is then under the control of the key, added " noise " in the data that will transmit by the method for diffusion (displacement) and upset (substituting) artificially, make its be encrypted as listener-in be difficult to understand cipher-text information, data then can be correctly decoded by key by recipient, the safe transmission of guarantee information.Traditional communication system is the separation theorem according to Shannon, by message sink coding and the cascade of information security encode serial, by by message sink coding and information security independent compilation code, data compression and safety optimization respectively, coding and decoding overall performance is made to reach best, as shown in Figure 1.But in the deep space communication of resource-constrained, have that propagation distance is far away, error rate is high, computational resource and a feature such as power limited, spatial cache and disposal ability be limited, precondition (the code word endless that Shannon separation theorem is set up, the characteristic of channel is known) cannot meet, so the performance of separate compilation code system receives certain restriction.In addition space communication network due to its heterogeneous structure have very strong opening, channel complicated, easily the factor such as to be disturbed, there is very big hidden danger in the data security of therefore space communication.Especially have the features such as data volume is large, redundancy is high, pixel interdependence is strong for spatial image, data volume will inevitably bring too greatly the speed of encryption device slowly stagnant, and then affects the normal work of whole system.
For the structure feature that performance is restricted in the deep space communication system of resource-constrained of message sink coding and information security independent compilation code, researchers propose multiple combined signal source and secure coding method.These methods are mainly improved on the basis of arithmetic coding and huffman coding.H.26L etc. arithmetic coding has good compression effectiveness, is widely used in JPEG and in compression standard.In arithmetic coding, the probability distribution table of source sequence is used for recording the probability that each source symbol occurs, the arrangement mode of source symbol in probability distribution table determines in advance according to probability from big to small tactic.But arithmetic coding can not guarantee data security, random arithmetic coding is then the improvement of arithmetic coding.Random arithmetic coding introduces a random sequence in arithmetic coding process, it is according to probability order from big to small in an encoding process that this sequence determines source symbol or order from small to large arranges, the interval of random arithmetic coding is controlled with this random sequence variable, by carrying out random organization to coding region, reaching and the upset of coding is controlled.Decoder only takes the probabilistic model identical with encoder and identical information source storage mode, could correct decoding.The fail safe of random sequence is depended in the fail safe of its method, opposing selectivity plaintext attack seems very fragile, can not ensure data security.
SMS4, first commercial block cipher that official of China announces, cryptographic algorithm and key schedule all adopt 32 step nonlinear iteration structures, there is high security and strong anti-attack ability, but block encryption algorithm amount of calculation is large, and complexity is high, and the image data amount of real-time Transmission is large, when carrying out block encryption, need the time that cost is longer.
Consultative committee for space data system (Consultative Committee for Space Data Systems, CCSDS) respectively standardization Standard of image compression (the Image Data Compression in 2005 and 1999, IDC) security protocol (Space Communication Protocol Specification-Security Protocol, SCPS-SP) and between spatial network end-to-end system.SCPS-SP is a kind of network layer protocol, employing be a kind of block cipher, calculation of complex, be not suitable for energy-constrained network view data encryption.The compression de-redundancy of image and the encryption of data are upset with block encryption algorithm etc. and are separated by the arithmetic coding therefore in CCSDS IDC standard, JPEG, H.26L standard, make that computation complexity is high, time delay is large, in the networks such as resource-constrained deep space communication, be difficult to realize Image Data Compression and encryption, ensure its validity and fail safe.
Summary of the invention
In order to solve the problems such as the high and fail safe of the computation complexity existed in existing message sink coding and information security independent compilation code, the present invention proposes a kind of combined signal source based on CCSDS IDC and SMS4 and information security coding and decoding method.The method devises the structure that a kind of combined signal source based on CCSDS IDC and SMS4 and information security are encoded, propose SMS-Based 4 block cipher sub-key control under combined signal source and safe coding and decoding method.
The technical solution adopted for the present invention to solve the technical problems is: the technical solution adopted for the present invention to solve the technical problems is: when CCSDS IDC encodes, first the image of input is carried out three grades of two-dimensional discrete wavelet conversions, image is divided into DC coefficient and ac coefficient, DC coefficient carries out quantizing, ac coefficient carries out Bit-Plane Encoding; By the sub-key in SMS4 block cipher, as the initialization seed of random sequence generator, and by this random sequence generator, producing a length is N, and equally distributed binary random sequence r
1, r
2..., r
nsub-key, this sequence is used for controlling the arrangement mode of source symbol in probability distribution table in random arithmetic coding, the DC coefficient after quantification is carried out to the random arithmetic coding under the control of SMS4 sub-key.Have the information probability distribution table of two DC coefficient during coding, they store identical source symbol, just the put in order difference of source symbol in table.Wherein the source symbol of a table arranges according to probability descending order, probability order arrangement from small to large then pressed by another table, be that " 0 " or " 1 " select a wherein probability distribution table randomly according to sub-key during coding, thus reach the object upset between code area corresponding to source symbol.If the value of random sequence variable is " 1 ", that probability distribution table selecting source symbol to arrange according to descending order, divides between reference region; If the value of random sequence variable is " 0 ", then select source symbol according to that probability distribution table tactic from small to large, divide between reference region, under sub-key controls, repeat said process, encode according to the source symbol of rule to input of random arithmetic coding, upgrade the information probability distribution table of source symbol, until by the end-of-encode of all source symbol DC coefficient simultaneously.Due to time initial, information source is for waiting general distribution, and the initial probability distribution table therefore under two kinds of different arrangement modes is all identical.DC coefficient decoding is then the inverse process of coding, only takes identical cipher controlled and identical probability Distribution Model, could correct decoding.Ac coefficient after bitplanes coding then carries out sequential encryption, and the binary bit stream of the binary random sequence that the random sequence generator in sequential encryption algorithm produces and ac coefficient is carried out by bit XOR, obtains exchanging cipher-text information; The decoding of sequential encryption is then the inverse process of coding, and the random sequence that only ciphertext and decruption key need be produced is carried out again by bit XOR, just decoding can draw ac coefficient.
The invention has the beneficial effects as follows: adopt CCSDS IDC to carry out three grades of two-dimensional wavelet transformations to image, play an important role to comprising in image major part energy and image reconstruction process, DC coefficient that data volume is little, the random arithmetic coding that under employing SMS4 block cipher neutron cipher controlled, fail safe is higher, on the ac coefficient employing processing speed sequential encryption method faster containing the texture of image and detailed information is little on visual characteristic impact, data volume is large, information source compression is designed with information security combined optimization, achieves combined signal source and safe coding.Significantly reduce the computation complexity of coding and decoding compared with the tandem type coding under Shannon separation theorem, provide good fail safe, be applicable to the image in resource-constrained deep space network, video, validity and security transmissions.
Accompanying drawing explanation
Fig. 1. legacy communications system coding structure.
In Fig. 1,1. source symbol, 2. message sink coding, 3. scrambled, 4. output code flow.
Fig. 2. to encode block diagram based on the combined signal source of CCSDS IDC and SMS4 and information security.
In Fig. 2,5. original image, 6. wavelet transform, 7. DC coefficient, 8. ac coefficient, 9. quantize, 10. Bit-Plane Encoding, 11.SMS4 algorithm, 12. random sequence generators, 13. random arithmetic coding, 14. DC coefficient ciphertexts, 15. sequential encryptions, 16. ac coefficient ciphertexts, 17. output code flows;
5. original images, 6. wavelet transform, 7. DC coefficient, 8. ac coefficient in fig. 2,9. quantizes, 10. Bit-Plane Encoding, forms CCSDS IDC algorithm;
11.SMS4 algorithm in fig. 2,12. random sequence generators, 13. random arithmetic coding, 14. DC coefficient ciphertexts, to the DC coefficient after quantification under the control of SMS4 key, carry out random arithmetic coding;
11.SMS4 algorithm in fig. 2,15. sequential encryptions, 16. ac coefficient ciphertexts, carry out sequential encryption coding.
In fig. 2 17, the ciphertext of DC coefficient and the ciphertext of ac coefficient are carried out multiplexing, output code flow.
Embodiment
1.CCSDS IDC principle
5. original images, 6. wavelet transform, 7. DC coefficient, 8. ac coefficient in Fig. 2,9. quantize, 10. Bit-Plane Encoding, forms CCSDS IDC algorithm;
In Fig. 2, first CCSDS IDC utilizes CDF9/7 small echo to carry out three grades of wavelet transforms (Discrete Wavelet Transform, DWT) to original image, and after wavelet transformation, image coefficient is divided into DC coefficient and ac coefficient.
DC coefficient contains the most energy of image and important information, and first CCSDS IDC quantizes according to formula (1) and (2) DC coefficient DC.
q=max(q′,Bitshift(LL
3)) (1)
Wherein q represents quantizing factor, c
nrepresent input coefficient, c '
1, c '
2..., c '
nrepresent coefficient after quantizing, LL
3represent the low frequency coefficient after three grades of wavelet transformations, quantizing factor q is determined by DC coefficient DC position dark (BitDepthDC) and ac coefficient AC position dark (BitDepthAC).DC coefficient carries out random arithmetic coding after quantizing.
Ac coefficient mainly contains texture and the detailed information of image.CCSDS IDC standard advises that these ac coefficients and DC quantize to carry out Bit-Plane Encoding together with residual error coefficient.CCSDS IDC bit-plane coding comprises two aspects, i.e. AC coefficient bit depth coding and AC coefficient bit plane coding.Bit-Plane Encoding needs from most important bit-planes (MSB:Most Significant Bitplane), in layer carries out in order, is encoded to the bit-planes that severity level is minimum always.In each bit-planes, IDC is coding organizational unit with " tree ", wavelet coefficient " tree " has following character: when paternal number is when current bit plane is invalid, its son's coefficient, grandson's coefficient are also probably in disarmed state in current bit plane, forms one " zero tree ".Utilize the concept of wavelet coefficient " zero tree ", to try one's best, few code word goes to represent whole " tree " structure, reaches compression object.
2. the combined signal source of SMS-Based 4 algorithm and safe coding and decoding method.
The combined signal source random arithmetic coding of 2.1 SMS-Based 4 algorithms
1) probabilistic model of random arithmetic coding
In Fig. 2, random arithmetic coding 13 in arithmetic coding, introduces one by the random sequence generator 12 under the control of SMS4 algorithm sub-key, it is according to probability order from big to small in an encoding process that the output of this random sequence generator determines source symbol or order from small to large arranges, an often coding symbol, once out of order, control with the upset between reaching code area, coded data is encrypted.Decoding is then the inverse process of coding.
Assuming that the coefficient c ' in Fig. 2 after 9CCSDS IDC quantification
nsize meet 1≤c '
n≤ M (M≤N), i.e. c '
1, c '
2..., c '
n∈ [1, M].M is the symbolic number that DC coefficient quantizes.Time initial, by 1,2 ... this M of M symbol carries out grade and generally divides, and the probability obtaining each symbol is like this
in this algorithm, have the information probability distribution table of two DC coefficient, they store identical source symbol, just the put in order difference of source symbol in table.Wherein the source symbol of a table is according to the arrangement of probability descending order, and probability order arrangement from small to large then pressed by another table.Be that " 0 " or " 1 " select a wherein probability distribution table randomly according to key during coding, thus reach the object upset between code area corresponding to source symbol.Due to time initial, information source is for waiting general distribution, and the initial probability distribution table therefore under two kinds of different arrangement modes is all identical, as shown in table 1.
Table 1 source symbol initialization probability distribution table
Symbol | 1 | 2 | … | x i | … | M-1 | M |
Probability | 1/M | 1/M | … | 1/M | … | 1/M | 1/M |
2) combined signal source of SMS-Based 4 algorithm and safe coding process
A) production method of random sequence
32 the sub-key rk will obtained in SMS4 algorithm 11 in Fig. 2
iin one, as the initialization seed of random sequence generator 12.By this random sequence generator 12, can produce a length is N, and equally distributed binary random sequence r
1, r
2..., r
nsub-key.This sequence is used for controlling the arrangement mode of source symbol in probability distribution table in random arithmetic coding, and SMS4 algorithm controls the sub-key r produced
1, r
2..., r
ndetermine the fail safe of random arithmetic coding.Generally, the length N of random sequence gets 1024, if be greater than 1024 by the source sequence length of encoding, needs to be equaled by the sub-key of information source length of encoding by circulation generation the random sequence of 1024 bit long.Meanwhile, different sub-keys is chosen to different frame image, ensured the fail safe of random arithmetic coding further.
B) cataloged procedure of DC coefficient
According to the probabilistic model of random arithmetic coding, time initial, the DC coefficient in information source such as to be encoded at the general distribution, and the initial probability distribution table therefore under two kinds of different arrangement modes is all identical, as shown in table 1.
If the value r of random sequence variable
ifor " 1 ", then that probability distribution table selecting source symbol to arrange according to descending order, divides between reference region; If the value r of random sequence variable
ifor " 0 ", then select source symbol according to that probability distribution table tactic from small to large, divide between reference region.Based on this feature, by selecting a wherein probability distribution table between code area randomly with key, a symbol of often encoding, once out of order, thus reach the object upset between code area corresponding to source symbol.
Encode first direct current quantization parameter c '
1, make c '
1=x
i(x
i∈ [1, M]), at above-mentioned random sequence r
1, r
2..., r
nin get r
1.Because the information probability distribution table of twice initial is identical, therefore no matter r
1equal " 0 " or " 1 ", first symbol c '
1all identical between corresponding code area.Such c '
1the interval of rear correspondence of having encoded is
and between the reference region that it can be used as next step to divide, upgrade the probability that source symbol occurs simultaneously.Because the direct current quantization parameter of input is c '
1, so source symbol " x
i" probability that occurs by
become
the probability of other symbol then all becomes
probability distribution table after renewal is then by shown in table 2 and table 3.In table 2, source symbol presses probability order arrangement from big to small, then by order arrangement from small to large in table 3.
Table 2 has been encoded after first source symbol, the probability distribution table (descending arrangement) of next source symbol
Symbol | x i | 1 | … | x i-1 | x i+1 | … | M |
Probability | 2/(M+1) | 1/(M+1) | … | 1/(M+1) | 1/(M+1) | … | 1/(M+1) |
Table 3 has been encoded after first source symbol, the probability distribution table (ascending arrangement) of next source symbol
Symbol | 1 | … | x i-1 | x i+1 | … | M | x i |
Probability | 1/(M+1) | … | 1/(M+1) | 1/(M+1) | … | 1/(M+1) | 2/(M+1) |
Encode next source symbol symbol c '
2.C '
2=x
j(x
j∈ [1, M]) and supposition x
j> x
i, at random sequence r
1, r
2..., r
nin get r
2.If r
2=1, by new reference area
divide according to putting in order of each symbol in table 2, obtain new reference area i.e. c '
2code area between
otherwise, if r
2=0 by new reference area
divide according to putting in order of each symbol in table 3, and obtain c ' in such cases
2code area between
encoded c '
1, c '
2after, source symbol " x
i" and symbol " x
j" probability is
and the probability of all the other symbols is
source symbol probability distribution after again upgrading is as shown in table 4 and table 5.
Table 4 has been encoded after second source symbol, the probability distribution table (descending arrangement) of the 3rd source symbol
Symbol | x i | x j | 1 | … | x i-1 | … | x j-1 | x j+1 | … | M |
Probability | 2/(M+2) | 2/(M+2) | 1/(M+2) | … | 1/(M+2) | … | 1/(M+2) | 1/(M+2) | … | 1/(M+2) |
Table 5 has been encoded after second symbol, the information probability distribution table (ascending arrangement) of the 3rd source symbol
Symbol | 1 | … | x i-1 | … | x j-1 | x j+1 | … | M | 13 | 8 |
Probability | 1/(M+2) | … | 1/(M+2) | … | 1/(M+2) | 1/(M+2) | … | 1/(M+2) | 2/(M+2) | 2/(M+2) |
Under sub-key controls, repeat said process, encode according to the source symbol of rule to input of random arithmetic coding, upgrade the information probability distribution table of source symbol simultaneously.Until by complete for all source symbol DC coefficient codings.
The cataloged procedure of 2.2 ac coefficients
The binary system ac coefficient code stream that in Fig. 2, ac coefficient 8 exports after Bit-Plane Encoding 10 and the random sequence that random sequence generator 12 exports carry out XOR in sequential encryption 15, just obtain the ciphertext of ac coefficient scrambled.
The combined signal source arithmetic of 2.3 SMS-Based 4 algorithms and safe decoding
1) DC coefficient decoding
DC coefficient decoding is then the inverse process of coding, and only take and encode identical cipher controlled and identical probability Distribution Model, have decruption key, could obtain the random sequence identical with encoder, could correct decoding.
During decoding, first by the numerical result that the random arithmetic coding of DC coefficient under the control of SMS4 sub-key obtains, be denoted as Q, and equiprobability initialization is carried out to all coefficients.Then, first random number r is got
1determine the information probability distribution table corresponded, according to probability distribution table between reference region [0,1] split, then the endpoint value in Q and decoding interval is compared, judge which subinterval Q drops on, translate the value of the DC coefficient representated by this interval, and using this interval as between new reference region; Then, second random number r is got
2, and carry out symbol division according to corresponding information probability distribution table between new reference region, continue the size comparing Q and new decoding interval endpoint value, translate second DC coefficient; This process is sustained, and last decoding obtains all DC coefficient.
2) ac coefficient decoding.
Again carry out the XOR by bit by the ac coefficient ciphertext obtained and with the random sequence that random sequence generator 12 exports, just can recover former ac coefficient.
Claims (1)
1. based on the combined signal source of CCSDS IDC and the coding and decoding method of information security, it is characterized in that: original image is first through three grades of two-dimensional discrete wavelet conversions, be divided into DC coefficient and ac coefficient, by the sub-key in SMS4 block cipher, as the initialization seed of random sequence generator, generating a length by random sequence generator is N, and equally distributed binary random sequence r
1, r
2..., r
nsub-key, be used for controlling the arrangement mode of source symbol in probability distribution table in random arithmetic coding, DC coefficient after quantification is carried out to the random arithmetic coding under the control of SMS4 sub-key, the information probability distribution table of two DC coefficient is had during coding, they store identical source symbol, just the put in order difference of source symbol in table, wherein the source symbol of a table arranges according to probability descending order, probability order arrangement from small to large then pressed by another table, the sub-key generated according to random sequence generator during coding is that " 0 " or " 1 " select a wherein probability distribution table randomly, thus reach the object upset between code area corresponding to source symbol, if the value of the sub-key that random sequence generator generates is " 1 ", select that probability distribution table that source symbol arranges according to descending order, divide between reference region, if the value of the sub-key that random sequence generator generates is " 0 ", then select source symbol according to that probability distribution table tactic from small to large, divide between reference region, under the sub-key control that random sequence generator generates, encode according to the source symbol of rule to input of random arithmetic coding, upgrade the information probability distribution table of source symbol simultaneously, until by the end-of-encode of all source symbol DC coefficient, due to time initial, information source is for waiting general distribution, therefore the initial probability distribution table under two kinds of different arrangement modes is all identical, ac coefficient adopts sequential encryption after then carrying out Bit-Plane Encoding, generate ac coefficient ciphertext, decoding is then the inverse process of coding.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201110360614.7A CN103107859B (en) | 2011-11-15 | 2011-11-15 | Based on combined signal source and the information security coding and decoding method of CCSDS IDC and SMS4 |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201110360614.7A CN103107859B (en) | 2011-11-15 | 2011-11-15 | Based on combined signal source and the information security coding and decoding method of CCSDS IDC and SMS4 |
Publications (2)
Publication Number | Publication Date |
---|---|
CN103107859A CN103107859A (en) | 2013-05-15 |
CN103107859B true CN103107859B (en) | 2015-08-19 |
Family
ID=48315451
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201110360614.7A Expired - Fee Related CN103107859B (en) | 2011-11-15 | 2011-11-15 | Based on combined signal source and the information security coding and decoding method of CCSDS IDC and SMS4 |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN103107859B (en) |
Families Citing this family (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103442232B (en) * | 2013-08-28 | 2014-09-03 | 李秋华 | Dependency maintaining lossless video encryption compression transmission method based on ranking permutation |
CN107222309B (en) * | 2017-06-29 | 2019-10-08 | 常州机电职业技术学院 | A kind of hidden channel build method of time type network based on wavelet transform |
CN115348017B (en) * | 2022-10-18 | 2023-02-07 | 阿里巴巴(中国)有限公司 | Ciphertext processing method and device |
Citations (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101848930A (en) * | 2007-06-29 | 2010-09-29 | 威斯康星校友研究基金会 | Plasmid-encoded neurotoxin genes in clostridium botulinum serotype a subtypes |
-
2011
- 2011-11-15 CN CN201110360614.7A patent/CN103107859B/en not_active Expired - Fee Related
Patent Citations (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101848930A (en) * | 2007-06-29 | 2010-09-29 | 威斯康星校友研究基金会 | Plasmid-encoded neurotoxin genes in clostridium botulinum serotype a subtypes |
Non-Patent Citations (4)
Title |
---|
On the Security of Randomized Arithmetic Codes Against Ciphertext-Only Attacks;Raj S.Katti,et al;《IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY》;20110331;第6卷(第1期);第19~25页 * |
吴成茂,等.基于SMS4分组密码的彩色图像加密方法.《西安邮电学院学报》.2011,第16卷(第5期),第1~6页. * |
孔娟,等.一种基于EZW编码的数字图像加密算法.《微计算机信息》.2008,第24卷(第33期),第68~69页. * |
闫锋刚,等.一种面向空间通信的图像复合加密算法.《电子测量技术》.2008,第31卷(第7期),第18~21,43页. * |
Also Published As
Publication number | Publication date |
---|---|
CN103107859A (en) | 2013-05-15 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN101677399B (en) | Method and system for encoding multimedia content based on secure coding schemes using stream cipher | |
Johnson et al. | On compressing encrypted data | |
JP5615273B2 (en) | Method and apparatus for selective data encryption | |
CN101442676B (en) | Method for enciphering H.264 video based on CAVLC encode | |
CN100364336C (en) | Method and appts. for encrypting and compressing multimedia data | |
CN103414686B (en) | A kind of view data secure transmission system supporting transparent transcoding | |
EP1487148A1 (en) | Data processing apparatus and method thereof | |
Zhou et al. | Scalable compression of stream cipher encrypted images through context-adaptive sampling | |
CN107292184B (en) | Image encryption method, device and key stream generating method and key stream generator | |
CN103107859B (en) | Based on combined signal source and the information security coding and decoding method of CCSDS IDC and SMS4 | |
CN103002281A (en) | Image compression and encryption method based on wavelet transform and SHA-1 (secure has algorithm-1) | |
CN112886970B (en) | Negotiation method for continuous variable quantum key distribution | |
CN109168033B (en) | Video privacy data protection system and method | |
EP3084968A1 (en) | Process efficient preprocessing for an encryption standard | |
CN101132530A (en) | Method for implementing built-in image compression based on run-length coding | |
Xiang et al. | Secure MQ coder: An efficient way to protect JPEG 2000 images in wireless multimedia sensor networks | |
Rengarajaswamy et al. | SPIRT compression on encrypted images | |
Norcen et al. | Encryption of wavelet-coded imagery using random permutations | |
Xiang et al. | Degradative encryption: An efficient way to protect SPIHT compressed images | |
Wang et al. | Energy-constrained quality optimization for secure image transmission in wireless sensor networks | |
CN103812615A (en) | Coding method for Luby transform code in distributed communication system, and relay communication method | |
CN115567219A (en) | Secure communication method, device and storage medium based on 5G virtual private network slice | |
CN105704499B (en) | A kind of selective satellite image compression encryption method based on ChaCha20 and CCSDS | |
Engel et al. | Secret wavelet packet decompositions for JPEG 2000 lightweight encryption | |
CN114710264A (en) | Physical layer encryption and decryption method and system based on Spinal code |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C53 | Correction of patent of invention or patent application | ||
CB02 | Change of applicant information |
Address after: 100049, Yuquanlu Road, Beijing No. 19 (a) Applicant after: University OF CHINESE ACADEMY OF SCIENCES Address before: 100049, Yuquanlu Road, Beijing No. 19 (a) Applicant before: GRADUATE University OF CHINESE ACADEMY OF SCIENCES |
|
COR | Change of bibliographic data |
Free format text: CORRECT: APPLICANT; FROM: POSTGRADUATE SCHOOL, CHINESE ACADEMY OF SCIENCES TO: UNIVERSITY OF CHINESE ACADEMY OF SCIENCES |
|
C14 | Grant of patent or utility model | ||
GR01 | Patent grant | ||
CF01 | Termination of patent right due to non-payment of annual fee |
Granted publication date: 20150819 Termination date: 20211115 |
|
CF01 | Termination of patent right due to non-payment of annual fee |