Information Security through Compression and Cryptography Techniques (original) (raw)

Data Security using Compression and Cryptography Techniques

International Journal of Computer Applications, 2015

Data is any type of stored digital information. Security is about the protection of assets. Data security refers to protective digital privacy measures that are applied to prevent unauthorized access to computers, databases and websites. Cryptography is evergreen and developments. Cryptography protects users by providing functionality for the encryption of data and authentication of other users. Compression is the process of reducing the number of bits or bytes needed to represent a given set of data. It allows saving more data. The project aims to implement various cryptography algorithm for data security. The data will be first compressed using compression techniques and then encryption techniques will applied and then comparative analysis will be carried out for different combinations of compression and encryption techniques. If encryption and compression are done at the same time then it takes less processing time and more speed.

Different Methods of Encryption and Decryption

IJRASET , 2021

Data is any type of stored digital information. Security is about the protection of assets. Data security refers to protective digital privacy measures that are applied to prevent unauthorized access to computers, personal databases and websites. Cryptography is evergreen and developments. Cryptography protects users by providing functionality for the encryption of data and authentication of other users. Compression is the process of reducing the number of bits or bytes needed to represent a given set of data. It allows saving more data. Cryptography is a popular ways of sending vital information in a secret way. There are many cryptographic techniques available and among them AES is one of the most powerful techniques. The scenario of present day of information security system includes confidentiality, authenticity, integrity, nonrepudiation. The security of communication is a crucial issue on World Wide Web. It is about confidentiality, integrity, authentication during access or editing of confidential internal documents.

Data Compression Techniques

Data compression has important application in the field of file storage and distributed systems. It helps in reducing redundancy in stored or communicated data. This paper studies various compression techniques and analyzes the approaches used in data compression. Furthermore, information theory concepts that relates to aims and evaluation of data compression methods are briefly discussed. A framework for the evaluation and comparison of various compression algorithms is constructed and applied to the algorithms presented here. This paper reports the theoretical and practical nature of compression algorithms. Moreover, it also discusses the future possibilities of research work in the field of data compression.

A Novel Approach for Secure Communication of Text Using Compression Mechanism

2015

The general encryption mechanism involves conversion of plain text into cipher text and decryption as vice versa, as well as multimedia(such as images, video, etc.,) the momentous aspect over here is that the converted cipher text always produces greater size than the original plain text. As there are innumerable number of internet users these days, more memory is accumulated in this process unnecessarily. To avoid such unnecessary accumulation of data we implement some data compression techniques over this encrypted data and also provide security mechanisms for the same and then send over the internet. But as we have many compression tools available in the open market, they fail to provide the security for the data at the same time. The same process can be implemented for the image encryption process. By encoding an image and compressing this encoded image along with security operations. Thus decryption provides the at most security for the data over the network. All the above disc...

Various Approaches to Achieve Data Compression

With the ever increasing growth seen in the field of computing, processing large sized files has become possible. The network technologies which are bound by the constraints involving the physical transfer medium have difficulties transferring such large sized files. This research is aimed at exploring various methods of data compression and implementing those methods. These techniques also provide a certain level of security to the compressed file. There are five image-based approaches and one statistical approach. These approaches usually convert any file into binary string, perform the compression operation on the binary string and then convert the binary string back to a file (compressed file). The reverse procedure is followed at the decompression side.

Performance analysis of compression algorithms for information security: A Review

ICST Transactions on Scalable Information Systems, 2018

Data compression is a vital part of information security, since compressed data is much more secure and convenient to handle. Effective data compression technique creates an effective, secure, easy communicable & redundant data. There are two types of compression algorithmic techniques: -lossy and lossless. These techniques can be applied to any data format like text, audio, video or image file. The primary objective of this study was to analyse data compression techniques used for information security techniques like steganography, cryptography etc. Four each, lossy and lossless techniques are implemented and evaluated on parameters like-file size, saving percentage, time, compression ratio and speed. Detailed analysis shows that the lossy techniques performs better quantitatively whereas lossless is better qualitatively. However, lossless techniques are more effective as there is no data loss during the process. Among all, Huffman encoding outperforms other algorithms.

Compression and Encryption: An Integrated Approach

This paper considers different aspects related to two different but not opposite direction-Data Compression and Cryptography. In this paper a brief review of both of these branches-compression and encryption, need of data compression and data encryption has been discussed. Also, the need of integrating these two branches has been addressed. There occurs a problem of the order of applying these two processes i.e.; Compression should be applied first before Encryption or Encryption should be applied first before compression. This paper discusses this issue of order also of these two processes. Public key cryptography, also called asymmetric encryption, uses a pair of keys for encryption and

Comparative Study of Data Compression Techniques

International Journal of Computer Applications, 2019

This document discusses data compression and some of the data compression techniques. Data Compression is a technique of reducing the amount of space data occupies, to ease the process of storage and communication. This involves but is not limited to interpretation and elimination of redundancy in data. The fundamental process of compression involves using a well drafted technique to convert the actual data into the compressed data (smaller size). Depending upon how well a compression technique works and how much data can be regenerated from the compressed data given by a certain technique, the technique is classified as either as a lossy data compression technique or lossless data compression technique.

“Study of Enhancement of Security and Performance during Information Sharing by Data Compression, Encryption and Steganography”

2016

Today, information is the major thing. Sharing of information is the major activity that is being carried out in every business operation. We carry out such tasks securely by using steganography, cryptography, compression or combination of these approaches. During such tasks, it is necessary to look after the security and confidentiality of the information without affecting the performance factor. Cryptography and Steganography are the commonly used approach for information sharing. These approaches provide a better way to achieve information sharing. This paper provides a modified solution that combines Compression, Cryptography and Steganography approach together forming a "triple layer approach" in order to provide better way for sharing of highly vital and too large information using audio and text file without compromising the performance of the application.

Compression Techniques: Key to Effective Data Transmission

International Journal of Recent Technology and Engineering (IJRTE), 2019

In the digital world today, data is growing tremendously. The onus lies on the network to compute, process, transfer and store this data. There is a direct proportional relationship between the size of data to the efficiency of a given system. The major challenge that systems face today is the size of data thereby the vision of these systems is to compress the data to its maximum so that the storage space, processing time is reduced thereby making the system effective. As DC ideas result to viable usage of accessible storage space and effective transfer speed, various methodologies were created in a few angles. An itemized overview on many existing DC strategies is expressed to address the present necessities in lieu of the information quality, coding plans and applications in request to break down how DC strategies and its applications have advanced a similar investigation is performed to recognize the commitment of inspected procedures as far as their qualities, fundamental ideas,...