期刊文献+

安全的LZW编码算法及其在GIF图像加密中的应用 被引量:2

Secure LZW coding algorithm and its application in GIF image encryption
下载PDF
导出
摘要 提出了一种安全的LZW编码算法——SLZW。该算法在改进的LZW编码过程中嵌入加密,从而能够同时完成压缩和加密。SLZW编码利用动态Huffman树作为LZW的字典,并且通过耦合映像格子(CML)产生的密钥流对字典的构建和更新进行控制,编码输出进一步和密钥流进行异或后产生密文。并且,该算法被应用于GIF图像加密中,实验结果和分析表明,该算法不仅具有较好的安全性,同时也将标准LZW算法的压缩效率提高了10%左右,具有广泛的实用性。 This paper proposed a Secure LZW (SLZW) coding algorithm, where encryption was embedded into the improved LZW coding process, and SLZW can fulfill compression and encryption in a single step. In SIZW algorithm, dynamic Huffman tree was utilized to code the dictionary of LZW, and the initialization and updating of Huffman tree were controlled by a sequence of keystream generated by Coupled Map Lattcie ( CML). The code words were further XORed with the keystream to generate the ciphertext. The SLZW was applied to GIF image encryption. The experimental results and their analyses indicate that the proposed SLZW algorithm not only has good security, but can also improves the compression ratio by about 10%. Therefore, SLZW can find its wide applications in practice.
作者 向涛 王安
出处 《计算机应用》 CSCD 北大核心 2012年第12期3462-3465,共4页 journal of Computer Applications
基金 国家自然科学基金资助项目(61103211) 中国博士后科学基金特别资助项目(201104319) 中央高校基本科研业务经费面上项目(CDJZR10180020)
关键词 数据压缩 图像加密 HUFFMAN编码 耦合映像格子 data compression image encryption Huffman coding Coupled Map Lattcie (CML)
  • 相关文献

参考文献12

  • 1CHENG H, LI X. Partial encryption of compressed images and vide- os[ J]. IEEE Transactions on Signal Processing, 2000, 48 (8) : 2439 - 2451.
  • 2WU C-P, KUO C-C. Design of integrated multimedia compression and encryption systems [ J]. IEEE Transactions on Multimedia, 2005, 7(5): 828-839.
  • 3WELCH T. A technique of high-performance data compression [ J]. IEEE Computer, 1984, 17(6): 8-19.
  • 4XIE D, KUO C-C. Secure Lempel-Ziv compression with embedded encryption[ C]//Proceedings of SPIE. Boston: SPIE, 2005, 5681: 318 - 327.
  • 5ZHOU JIANTAO, AU O C, FAN XIAOPENG, et al. Secure Lem- pel-Ziv-Welch (LZW) algorithm with random dictionary insertion and permutation [ C]// IEEE International Conference on Multime- dia and Expo. Piscataway: IEEE, 2008:25 -248.
  • 6LI 5HUJUN, LI CHENGQING, KUO J. On the security of a secure Lempel-Ziv-Welch (LZW) algorithm[ C]//IEEE International Con- ference on Multimedia and Expo. Piscataway: IEEE, 2011:1 -5.
  • 7HUt 1 MAI 1). A metlaod lor tiae construction ot minimum redundan- cy codes [J]. Proceedings of the IRE, 1952, 40(9) : 1098 - 1101.
  • 8KNUTH D. Dynamic Huffman coding [ J]. Journal of Algorithms, 1985, 6(2) : 163 - 180.
  • 9PERL Y, MEHTA A. Cascading LZW algorithm with Huffman cod- ing: a variable to variable length compression algorithm[ C]// Pro- ceedings of the First Great Lakes Computer Science Conference on Computing. London: Springer-Verlag, 1991: 170-178.
  • 10LI SHUJUN, MOU XUANQIN, CAI YUANLONG. Pseudo-random bit generator based on couple chaotic systems and its applications in stream-cipher cryptography[ C]//Proceedings of the Second Interna- tional Conference on Cryptology in India: Progress in Cryptology. London: Springer-Verlag, 2001, 2247:316-329.

同被引文献12

引证文献2

二级引证文献4

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部