Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Encrypted Huffman encoding method and decoding method

An encoding method and an encoding technology, which are applied in the fields of information security and digital content protection, can solve problems such as the impact of encoding length, MHT insecurity, and inability to resist synchronization attacks, and achieve the effects of increasing key space, improving performance, and high efficiency

Inactive Publication Date: 2009-06-24
INST OF SOFTWARE - CHINESE ACAD OF SCI
View PDF3 Cites 15 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Benefits of technology

This patented technology describes an improvement over existing techniques for protecting digital data by adding certain features or combinations thereof into their processing steps. These improvements improve efficiency and reduce costs associated with current technologies like compression/decompression systems.

Problems solved by technology

This patented describes methods for improving the efficiency or performance of electronic imaging systems' encoders during media streaming applications like broadcasting. These techniques involve enhancing the quality of images captured through decompression algorithms and converting them into binary codes. Additionally, the patented proposes a solution involving performing static hash functions over both audio and visual fields when transmitting videos between servers. By doing this decomposition and mixing signals together, we aim to achieve better secureness against copyright issues and prevention of privacy concerns associated with storing and accessing recorded files.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Encrypted Huffman encoding method and decoding method
  • Encrypted Huffman encoding method and decoding method
  • Encrypted Huffman encoding method and decoding method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0062] The method of the present invention will be further described below in conjunction with the accompanying drawings and specific embodiments.

[0063] The following combination Figure 5-9 , by comparing with the general Huffman encoding process, describe a complete pseudo-random Huffman encoding encryption process.

[0064] Figure 5 Shown is a typical Huffman tree, for the convenience of explanation, it is assumed that the coding unit sequence to be encoded is M=[5, 10, 2, 6, 9], and the general Huffman encoding process is described in detail as follows:

[0065] Find the codeword corresponding to each coding unit according to the Huffman coding tree: the codeword corresponding to 5 is 000111, 10 corresponds to 00000001, 2 corresponds to 100, 6 corresponds to 000110, and 9 corresponds to 0000001, then the encoded bit stream is: 000111000000011000001100000001.

[0066] The scheme adopted in this embodiment performs pseudo-random encrypted perturbation on the Huffman co...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an encrypted Huffman coding method and decoding method thereof, which belong to information security and digital content protection technical field. The coding method includes that a) a coding unit sequence is obtained according to coded content; b) as for coding units, encrypted disturbance is performed on part of coding nodes in Huffman coding tree, and code words of the coding units are obtained according to the disturbed Huffman coding tree; c) code words are sequentially combined to acquire coding result. The decoding method includes that a) as for code words in coding result, encrypted disturbance which is the same with that in coding process is performed on the Huffman coding tree, and coding units of the code words are obtained according to the disturbed Huffman coding tree; b) the coding units are sequentially combined to acquire the content before the coding process. The encrypted Huffman coding method and decoding method can be applicable to digital content protection, in particular to text, image, audio and video protection; the encrypted Huffman coding method and decoding method can effectively resist chosen-plaintext attack and have low encryption cost, and can ensure the coding length to be constant and embed compression coding process in a seamless way.

Description

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Owner INST OF SOFTWARE - CHINESE ACAD OF SCI
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products