HAMMING DISTANCE BASED COMPRESSION TECHNIQUES WITH SECURITY

The proposed algorithm suggests a lossless data compression with security. Input Bit stream is divided into a group of 8-bits each .Encoder deviate the available Randomly generated key according to input bit stream which results into encrypted data. Encrypted key of 64-bits is treated as unit of 4-b...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:International journal of advances in engineering and technology 2012-11, Vol.5 (1), p.349-349
Hauptverfasser: Joshi, Atul S, Deshmukh, Prashant R
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 349
container_issue 1
container_start_page 349
container_title International journal of advances in engineering and technology
container_volume 5
creator Joshi, Atul S
Deshmukh, Prashant R
description The proposed algorithm suggests a lossless data compression with security. Input Bit stream is divided into a group of 8-bits each .Encoder deviate the available Randomly generated key according to input bit stream which results into encrypted data. Encrypted key of 64-bits is treated as unit of 4-bits each. Each 4-bits of Key will be at the Hamming distance is of Two from Deviated key. There will be total Six numbers of 4-bits which are at the Hamming distance of Two from Key. These numbers can be indexed by using 3-bits. The index of Three bits of a number is available on the channel as a compressed bit stream. Proposed algorithm is to encrypt the file, compress it, decompress it, and finally decrypt it back to the original file. The algorithm not requires a prior knowledge of data to be compressed. Intelligent algorithm reverse the order of compression & encryption ( i.e. Encryption prior to compression) without compromising compression efficiency , information theoretic security & with lesser computational cost. Proposed algorithm suitable for images, audio as well as text.
format Article
fullrecord <record><control><sourceid>proquest</sourceid><recordid>TN_cdi_proquest_miscellaneous_1671521947</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>2833658561</sourcerecordid><originalsourceid>FETCH-LOGICAL-p617-d52594a3928e265ba584ad7d2854ec50149085d14b0621ba33799d172c4f83953</originalsourceid><addsrcrecordid>eNpdUF1LwzAADKLgmPsPAV98KTTfDT7VLK6BtdUlQ3wqaZuBo25zsf9_BX0Q7-Xu4Tju7grMMCYoQZKT6z_6Fixi3KcTeIoxkjPwWORlaaoVXBrr8kpp-JRbvYSqLl822lpTV9BpVVTmdastfDOugFar7ca49ztws_NDDItfngP3rJ0qknW9MipfJyeORNIzzCT1ROIsYM5azzLqe9HjjNHQsRRRmWasR7RNOUatJ0RI2SOBO7rLiGRkDh5-Yk_n49cY4nfz-RG7MAz-EI5jbBAXiE1jqJis9_-s--N4PkzlGjSdQCjjlJEL1HRLGw</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>1223345645</pqid></control><display><type>article</type><title>HAMMING DISTANCE BASED COMPRESSION TECHNIQUES WITH SECURITY</title><source>EZB-FREE-00999 freely available EZB journals</source><creator>Joshi, Atul S ; Deshmukh, Prashant R</creator><creatorcontrib>Joshi, Atul S ; Deshmukh, Prashant R</creatorcontrib><description>The proposed algorithm suggests a lossless data compression with security. Input Bit stream is divided into a group of 8-bits each .Encoder deviate the available Randomly generated key according to input bit stream which results into encrypted data. Encrypted key of 64-bits is treated as unit of 4-bits each. Each 4-bits of Key will be at the Hamming distance is of Two from Deviated key. There will be total Six numbers of 4-bits which are at the Hamming distance of Two from Key. These numbers can be indexed by using 3-bits. The index of Three bits of a number is available on the channel as a compressed bit stream. Proposed algorithm is to encrypt the file, compress it, decompress it, and finally decrypt it back to the original file. The algorithm not requires a prior knowledge of data to be compressed. Intelligent algorithm reverse the order of compression &amp; encryption ( i.e. Encryption prior to compression) without compromising compression efficiency , information theoretic security &amp; with lesser computational cost. Proposed algorithm suitable for images, audio as well as text.</description><identifier>ISSN: 2231-1963</identifier><identifier>EISSN: 2231-1963</identifier><language>eng</language><publisher>Bareilly: I A E T Publishing Company</publisher><subject>Algorithms ; Compressed ; Compressing ; Computational efficiency ; Computer information security ; Encryption ; Streams</subject><ispartof>International journal of advances in engineering and technology, 2012-11, Vol.5 (1), p.349-349</ispartof><rights>Copyright I A E T Publishing Company Nov 2012</rights><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>314,780,784</link.rule.ids></links><search><creatorcontrib>Joshi, Atul S</creatorcontrib><creatorcontrib>Deshmukh, Prashant R</creatorcontrib><title>HAMMING DISTANCE BASED COMPRESSION TECHNIQUES WITH SECURITY</title><title>International journal of advances in engineering and technology</title><description>The proposed algorithm suggests a lossless data compression with security. Input Bit stream is divided into a group of 8-bits each .Encoder deviate the available Randomly generated key according to input bit stream which results into encrypted data. Encrypted key of 64-bits is treated as unit of 4-bits each. Each 4-bits of Key will be at the Hamming distance is of Two from Deviated key. There will be total Six numbers of 4-bits which are at the Hamming distance of Two from Key. These numbers can be indexed by using 3-bits. The index of Three bits of a number is available on the channel as a compressed bit stream. Proposed algorithm is to encrypt the file, compress it, decompress it, and finally decrypt it back to the original file. The algorithm not requires a prior knowledge of data to be compressed. Intelligent algorithm reverse the order of compression &amp; encryption ( i.e. Encryption prior to compression) without compromising compression efficiency , information theoretic security &amp; with lesser computational cost. Proposed algorithm suitable for images, audio as well as text.</description><subject>Algorithms</subject><subject>Compressed</subject><subject>Compressing</subject><subject>Computational efficiency</subject><subject>Computer information security</subject><subject>Encryption</subject><subject>Streams</subject><issn>2231-1963</issn><issn>2231-1963</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2012</creationdate><recordtype>article</recordtype><sourceid>ABUWG</sourceid><sourceid>AFKRA</sourceid><sourceid>BENPR</sourceid><sourceid>CCPQU</sourceid><sourceid>DWQXO</sourceid><recordid>eNpdUF1LwzAADKLgmPsPAV98KTTfDT7VLK6BtdUlQ3wqaZuBo25zsf9_BX0Q7-Xu4Tju7grMMCYoQZKT6z_6Fixi3KcTeIoxkjPwWORlaaoVXBrr8kpp-JRbvYSqLl822lpTV9BpVVTmdastfDOugFar7ca49ztws_NDDItfngP3rJ0qknW9MipfJyeORNIzzCT1ROIsYM5azzLqe9HjjNHQsRRRmWasR7RNOUatJ0RI2SOBO7rLiGRkDh5-Yk_n49cY4nfz-RG7MAz-EI5jbBAXiE1jqJis9_-s--N4PkzlGjSdQCjjlJEL1HRLGw</recordid><startdate>20121101</startdate><enddate>20121101</enddate><creator>Joshi, Atul S</creator><creator>Deshmukh, Prashant R</creator><general>I A E T Publishing Company</general><scope>7SC</scope><scope>7SP</scope><scope>7SR</scope><scope>7TB</scope><scope>7U5</scope><scope>8BQ</scope><scope>8FD</scope><scope>8FE</scope><scope>8FG</scope><scope>ABJCF</scope><scope>ABUWG</scope><scope>AFKRA</scope><scope>BENPR</scope><scope>BGLVJ</scope><scope>CCPQU</scope><scope>CWDGH</scope><scope>DWQXO</scope><scope>FR3</scope><scope>HCIFZ</scope><scope>JG9</scope><scope>JQ2</scope><scope>KR7</scope><scope>L6V</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope><scope>M7S</scope><scope>PQEST</scope><scope>PQQKQ</scope><scope>PQUKI</scope><scope>PTHSS</scope></search><sort><creationdate>20121101</creationdate><title>HAMMING DISTANCE BASED COMPRESSION TECHNIQUES WITH SECURITY</title><author>Joshi, Atul S ; Deshmukh, Prashant R</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-p617-d52594a3928e265ba584ad7d2854ec50149085d14b0621ba33799d172c4f83953</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2012</creationdate><topic>Algorithms</topic><topic>Compressed</topic><topic>Compressing</topic><topic>Computational efficiency</topic><topic>Computer information security</topic><topic>Encryption</topic><topic>Streams</topic><toplevel>online_resources</toplevel><creatorcontrib>Joshi, Atul S</creatorcontrib><creatorcontrib>Deshmukh, Prashant R</creatorcontrib><collection>Computer and Information Systems Abstracts</collection><collection>Electronics &amp; Communications Abstracts</collection><collection>Engineered Materials Abstracts</collection><collection>Mechanical &amp; Transportation Engineering Abstracts</collection><collection>Solid State and Superconductivity Abstracts</collection><collection>METADEX</collection><collection>Technology Research Database</collection><collection>ProQuest SciTech Collection</collection><collection>ProQuest Technology Collection</collection><collection>Materials Science &amp; Engineering Collection</collection><collection>ProQuest Central (Alumni Edition)</collection><collection>ProQuest Central UK/Ireland</collection><collection>ProQuest Central</collection><collection>Technology Collection (ProQuest)</collection><collection>ProQuest One Community College</collection><collection>Middle East &amp; Africa Database</collection><collection>ProQuest Central Korea</collection><collection>Engineering Research Database</collection><collection>SciTech Premium Collection</collection><collection>Materials Research Database</collection><collection>ProQuest Computer Science Collection</collection><collection>Civil Engineering Abstracts</collection><collection>ProQuest Engineering Collection</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts – Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><collection>Engineering Database</collection><collection>ProQuest One Academic Eastern Edition (DO NOT USE)</collection><collection>ProQuest One Academic</collection><collection>ProQuest One Academic UKI Edition</collection><collection>Engineering Collection</collection><jtitle>International journal of advances in engineering and technology</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Joshi, Atul S</au><au>Deshmukh, Prashant R</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>HAMMING DISTANCE BASED COMPRESSION TECHNIQUES WITH SECURITY</atitle><jtitle>International journal of advances in engineering and technology</jtitle><date>2012-11-01</date><risdate>2012</risdate><volume>5</volume><issue>1</issue><spage>349</spage><epage>349</epage><pages>349-349</pages><issn>2231-1963</issn><eissn>2231-1963</eissn><abstract>The proposed algorithm suggests a lossless data compression with security. Input Bit stream is divided into a group of 8-bits each .Encoder deviate the available Randomly generated key according to input bit stream which results into encrypted data. Encrypted key of 64-bits is treated as unit of 4-bits each. Each 4-bits of Key will be at the Hamming distance is of Two from Deviated key. There will be total Six numbers of 4-bits which are at the Hamming distance of Two from Key. These numbers can be indexed by using 3-bits. The index of Three bits of a number is available on the channel as a compressed bit stream. Proposed algorithm is to encrypt the file, compress it, decompress it, and finally decrypt it back to the original file. The algorithm not requires a prior knowledge of data to be compressed. Intelligent algorithm reverse the order of compression &amp; encryption ( i.e. Encryption prior to compression) without compromising compression efficiency , information theoretic security &amp; with lesser computational cost. Proposed algorithm suitable for images, audio as well as text.</abstract><cop>Bareilly</cop><pub>I A E T Publishing Company</pub><tpages>1</tpages></addata></record>
fulltext fulltext
identifier ISSN: 2231-1963
ispartof International journal of advances in engineering and technology, 2012-11, Vol.5 (1), p.349-349
issn 2231-1963
2231-1963
language eng
recordid cdi_proquest_miscellaneous_1671521947
source EZB-FREE-00999 freely available EZB journals
subjects Algorithms
Compressed
Compressing
Computational efficiency
Computer information security
Encryption
Streams
title HAMMING DISTANCE BASED COMPRESSION TECHNIQUES WITH SECURITY
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-09T11%3A25%3A46IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=HAMMING%20DISTANCE%20BASED%20COMPRESSION%20TECHNIQUES%20WITH%20SECURITY&rft.jtitle=International%20journal%20of%20advances%20in%20engineering%20and%20technology&rft.au=Joshi,%20Atul%20S&rft.date=2012-11-01&rft.volume=5&rft.issue=1&rft.spage=349&rft.epage=349&rft.pages=349-349&rft.issn=2231-1963&rft.eissn=2231-1963&rft_id=info:doi/&rft_dat=%3Cproquest%3E2833658561%3C/proquest%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=1223345645&rft_id=info:pmid/&rfr_iscdi=true