Solved

LZW decompress. how to?

Posted on 1998-07-01
5
2,296 Views
Last Modified: 2013-11-19
I have a chunk of bytes LZW compressed. It's a part of a acrobat pdf file. I need to decompress that data to parse that postscript program.
Do you know any way to do that by MFC, or a dll/ocx lybrary (no matter price)?(All libs that I found, work with Tiff/lzw, and I have a plain chunk of bytes)
Help please.
0
Comment
Question by:wau
5 Comments
 
LVL 3

Expert Comment

by:danny_pav
ID: 1318600
Will the functions in LZEXPAND.DLL help you?

0
 

Author Comment

by:wau
ID: 1318601
Like VC++5.0 documentation sais, the Lzexpand.dll functions can only decompress Huffman, Run-Length and Lempel-Ziv methods. Anyway, I tried with LZOpenFile/LZRead/LZClose secuence, and nothing, I read garbage.
I think I need a dll that works with LZW buffer to buffer decompression.
Thanks.
0
 
LVL 2

Expert Comment

by:tdubroff
ID: 1318602
I think any 'LZ' type uncompression is relatively simplistic (at least compared to the compression algorithm).  It might be easy enough for you to do a search on the web for 'LZW' compression and decompression algorithms, and then design your own decompressor.
0
 
LVL 2

Expert Comment

by:duneram
ID: 1318603
here is something you could try.   Write the company (who makes acrobat) and offer to sign an NDA because you are writing something that would be both to their and your benefit.  If you do that, they would then be able to provide you with the layouts and probably decompression alg.

I know this will work if you approach it right, as I used this technique to develop a (internal to a company) ODBC driver for Lotus.   I just went straight to the company, signed an NDA and received several books describing all the information I needed to know.

0
 
LVL 2

Accepted Solution

by:
AlFa earned 20 total points
ID: 1318604
Try zlib (it's gzip from unix) you can find it at codeguru or something like that. it's also included in cimage.lib (source code is available).

0

Featured Post

Is Your Active Directory as Secure as You Think?

More than 75% of all records are compromised because of the loss or theft of a privileged credential. Experts have been exploring Active Directory infrastructure to identify key threats and establish best practices for keeping data safe. Attend this month’s webinar to learn more.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
if loop in java 3 130
lucky13 challenge 11 125
SQUD PROXY SERVER, UNIX, SLL/HTTPS 5 77
Problem to open Excel file 15 99
Introduction: Dynamic window placements and drawing on a form, simple usage of windows registry as a storage place for information. Continuing from the first article about sudoku.  There we have designed the application and put a lot of user int…
Exception Handling is in the core of any application that is able to dignify its name. In this article, I'll guide you through the process of writing a DRY (Don't Repeat Yourself) Exception Handling mechanism, using Aspect Oriented Programming.
This video will show you how to get GIT to work in Eclipse.   It will walk you through how to install the EGit plugin in eclipse and how to checkout an existing repository.
This is used to tweak the memory usage for your computer, it is used for servers more so than workstations but just be careful editing registry settings as it may cause irreversible results. I hold no responsibility for anything you do to the regist…

863 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

21 Experts available now in Live!

Get 1:1 Help Now