{"title":"使用元胞自动机变换的数据压缩和加密","authors":"O. Lafe","doi":"10.1109/IJSIS.1996.565074","DOIUrl":null,"url":null,"abstract":"A family of basis functions, generated from the evolving states of cellular automata (CA), is used to compress and encrypt data. The operations required in encoding and decoding the data are described under the umbrella cellular automata transforms (CAT). There is a huge number of these transform bases. CAT which can be used in the way other mathematical transforms (e.g. Fourier, Discrete Cosine, Laplace, Wavelet, etc.) are utilized. In data compression applications, the rules and pertinent keys used to generate the CA are selected in favour of those which yield basis functions with the best information packing characteristics. On the other hand, for encryption the selection is biased towards those with the tendency to yield an avalanche effect. In the latter case the transform process must be error free.","PeriodicalId":437491,"journal":{"name":"Proceedings IEEE International Joint Symposia on Intelligence and Systems","volume":"11 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"1996-11-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"106","resultStr":"{\"title\":\"Data compression and encryption using cellular automata transforms\",\"authors\":\"O. Lafe\",\"doi\":\"10.1109/IJSIS.1996.565074\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"A family of basis functions, generated from the evolving states of cellular automata (CA), is used to compress and encrypt data. The operations required in encoding and decoding the data are described under the umbrella cellular automata transforms (CAT). There is a huge number of these transform bases. CAT which can be used in the way other mathematical transforms (e.g. Fourier, Discrete Cosine, Laplace, Wavelet, etc.) are utilized. In data compression applications, the rules and pertinent keys used to generate the CA are selected in favour of those which yield basis functions with the best information packing characteristics. On the other hand, for encryption the selection is biased towards those with the tendency to yield an avalanche effect. In the latter case the transform process must be error free.\",\"PeriodicalId\":437491,\"journal\":{\"name\":\"Proceedings IEEE International Joint Symposia on Intelligence and Systems\",\"volume\":\"11 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"1996-11-04\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"106\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Proceedings IEEE International Joint Symposia on Intelligence and Systems\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/IJSIS.1996.565074\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings IEEE International Joint Symposia on Intelligence and Systems","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/IJSIS.1996.565074","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Data compression and encryption using cellular automata transforms
A family of basis functions, generated from the evolving states of cellular automata (CA), is used to compress and encrypt data. The operations required in encoding and decoding the data are described under the umbrella cellular automata transforms (CAT). There is a huge number of these transform bases. CAT which can be used in the way other mathematical transforms (e.g. Fourier, Discrete Cosine, Laplace, Wavelet, etc.) are utilized. In data compression applications, the rules and pertinent keys used to generate the CA are selected in favour of those which yield basis functions with the best information packing characteristics. On the other hand, for encryption the selection is biased towards those with the tendency to yield an avalanche effect. In the latter case the transform process must be error free.