International Journal of Computer Networks and Applications (IJCNA)

Published By EverScience Publications

ISSN : 2395-0455

International Journal of Computer Networks and Applications (IJCNA)

International Journal of Computer Networks and Applications (IJCNA)

Published By EverScience Publications

ISSN : 2395-0455

Design and Develop an Approach for Integrating Compression and Encryption on Textual Data

Author NameAuthor Details

Amit Jain, Avinash Panwar, Divya Bhatnagar

Amit Jain[1]

Avinash Panwar[2]

Divya Bhatnagar[3]

[1]Sir Padampat Singhania University, Udaipur, India.

[2]Sir Padampat Singhania University, Udaipur, India.

[3]Sir Padampat Singhania University, Udaipur, India.

Abstract

The primary intention of this research is to design and develop an approach for integrating compression and encryption on textual data. This improved approach can provide the better security with the aid of encryption and also, can provide better compression with the help of encoding procedure. The advantage of combining the encoding procedure with the encryption technique is that the attacks relevant to storage can be easily avoided since the data is fully within encoded domain also; the storage space required will be less due to good compression ratio. With the advantages of this, we have planned to utilize the dictionary-based encoding procedure and proposed encryption method to comcryption protocol (Compression + encryption). For integrating the compression and encryption, dictionary-based compression and the encryption based on permutation, sorting and reordering will be used. Dictionary-based methods are capable of giving better compression rate as like huffman encoding also follows dictionary-based method. Also, permutation, sorting and reordering-based methods can provide better security if these operations are included in the encryption protocol.

Index Terms

Encoding

Encryption

CHE

CSE

Decoding

Decryption

Reference

  1. 1.
    Tamar Shoham, David Malah and Slava Shechtman, “Quality Preserving Compression of a Concatenative Text-To-Speech Acoustic Database”, IEEE TRANSACTIONS ON AUDIO, SPEECH, AND LANGUAGE PROCESSING, VOL. 20, NO. 3, PP. 1056-1068, 2012.
  2. 2.
    M. Mitra, J.N. Bera and R. Gupta, "Electrocardiogram compression technique for global system of mobile-based offline telecardiology application for rural clinics in India", IET Science, Measurement and Technology, Vol. 6, No. 6, PP. 412–419, 2012.
  3. 3.
    L. Robert and R. Nadarajan, "Simple lossless preprocessing algorithms for text compression", IET Software, Vol. 3, No. 1, PP. 37–45, 2009.
  4. 4.
    Sebastian Wandelt and Ulf Leser, "FRESCO: Referential Compression of Highly Similar Sequences", IEEE/ACM TRANSACTIONS ON COMPUTATIONAL BIOLOGY AND BIOINFORMATICS, VOL. 10, NO. 5, PP. 1275-1288, 2013.
  5. 5.
    Shuhui Wang and Tao Lin, "Compound image compression based on unified LZ and hybrid coding", IET Image Processing, Vol. 7, No. 5, PP. 484–499, 2013.
  6. 6.
    Miguel A. Martínez-Prieto, Joaquín Adiego and Pablo de la Fuente, "Natural Language Compression on Edge-Guided text preprocessing", Information Sciences, Vol. 181, PP. 5387-5411, 2011.
  7. 7.
    W. Oliveira Jr., E. Justino and L.S. Oliveira, "Comparing compression models for authorship attribution", Forensic Science International, Vol. 228, PP. 100-104, 2013.
  8. 8.
    Ashutosh Gupta and Suneeta Agarwal, "A fast dynamic compression scheme for natural language texts", Computers and Mathematics with Applications, Vol. 60, PP. 3139-3151, 2010.
  9. 9.
    Ana Granados, David Camacho and Francisco Borja Rodríguez, "Is the contextual information relevant in text clustering by compression?", Expert Systems with Applications, Vol. 39, PP. 8537-8546, 2012.
  10. 10.
    M.Baritha Begum and Y.Venkataramani, "LSB Based Audio Steganography Based On Text Compression", Procedia Engineering, Vol. 30, PP. 703-710, 2012.
  11. 11.
    Ranjan Bose and Saumitr Pathak, "A Novel Compression and Encryption Scheme Using Variable Model Arithmetic Coding and Coupled Chaotic System", IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS—I, VOL. 53, NO. 4, PP. 848-857, 2006.
  12. 12.
    Deep Vardhan Bhatt and Gerhard P. Hancke, "Secure Internet Access to Gateway Using Secure Socket Layer", IEEE TRANSACTIONS ON INSTRUMENTATION AND MEASUREMENT, VOL. 55, NO. 3, PP. 793-800, 2006.
  13. 13.
    Maruti Satti and Subhash Kak, "Multilevel Indexed Quasigroup Encryption for Data and Speech", IEEE TRANSACTIONS ON BROADCASTING, Vol. 55, No. 2, PP. 270-281, 2009.
  14. 14.
    Neri Merhav, "Perfectly Secure Encryption of Individual Sequences", IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 59, NO. 3, PP. 1302-1310, 2013.
  15. 15.
    Frédérique Oggier and Miodrag J. Mihaljevi´, "An Information-Theoretic Security Evaluation of a Class of Randomized Encryption Schemes", IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 9, NO. 2, PP. 158-168, 2014.
  16. 16.
    Francisco Salcedo-Campos, Jesús Díaz-Verdejo and Pedro García-Teodoro, "Segmental parameterisation and statistical modelling of e-mail headers for spam detection", Information Sciences, Vol. 195, PP. 45-61, 2012.
  17. 17.
    Sherif Sakr, "XML compression techniques: A survey and comparison", Journal of Computer and System Sciences, Vol. 75, PP. 303-322, 2009.
  18. 18.
    Nir Nissim, Robert Moskovitch, Lior Rokach and Yuval Elovici,
  19. 19.
    "Novel active learning methods for enhanced PC malware detection in windows OS", Expert Systems with Applications, 2014.
  20. 20.
    Simson L. Garfinkel, "Digital media triage with bulk data analysis and bulk_extractor", Computers & Security, Vol. 32, PP. 56-72, 2013.
  21. 21.
    Baiying Lei, Ee-Leng Tan, Siping Chen, Dong Ni, Tianfu Wang and Haijun Lei, "Reversible watermarking scheme for medical image based on differential evolution", Expert Systems with Applications, Vol. 41, PP. 3178-3188, 2014.
  22. 22.
    Osama Ahmed Khashan and Abdullah Mohd Zin, "An Efficient Adaptive of Transparent Spatial Digital Image Encryption", Procedia Technology, Vol. 11, PP. 288-297, 2013.
IJCNA NPC