Data Compression Using Encrypted Text

نویسندگان

  • Robert Franceschini
  • Amar Mukherjee
چکیده

In this paper, we present a new algorithm for text compression. The basic idea of our algorithm is to define a unique encryption or signature of each word in the dict.ionary by replacing certain characters in the words by a special character ‘*’ and retaining a few characters so that the word is still retrievable. For any encrypted text the most frequently used character is ‘*’ and the standard compression algorithms can exploit this redundancy in an effective way. We advocate the following compression paradigm in this paper: Given a compression algorithm il and a text T. we apply the same algorithm A on an encrypted text *T and retrieve the original text via a dictionary which maps the decompressed text *T to the original text T. We report better results for most widely used compression algorithms such as Huffman, LZW, arithmetic, unix compress, gnu-zip with respect to a text corpus. The compression rates using these algorithms are much better than t.he dictionary based methods reported in the literature. One basic assumption of our algorithm is that the system has access to a dictionary of words used in all the texts along with a corresponding “cryptic” dictionary. The cost of this dictionary is amortized over the compression savings for all the text files handled by the organization. If two organizations wish to exchange information using our compression algorithm, they must share a common dictionary. We compare our methods with other dictionary based methods and present future research problems.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A new horizon in data security by Cryptography & Steganography

Steganography and Cryptography are two popular ways of sending vital information in a secret way. One hides the existence of the message and the other distorts the message itself. There are many cryptographic techniques available and among them AES is one of the most powerful techniques. In Steganography, various techniques in different domains like spatial domain, frequency domain etc are avai...

متن کامل

Hamming Distance Based Compression Techniques with Security

The proposed algorithm suggests a lossless data compression with security. Input Bit stream is divided into a group of 8-bits each .Encoder deviate the available Randomly generated key according to input bit stream which results into encrypted data. Encrypted key of 64-bits is treated as unit of 4-bits each. Each 4-bits of Key will be at the Hamming distance is of Two from Deviated key. There w...

متن کامل

A Novel DNA based Encrypted Text Compression

Lack of trust and secrecy for communications laid foundation to a new area of security. Information security concerns with the protecting information and information systems from unauthorized access, use, disclosure, disruption, modification or destruction. Hence encapsulation of the original message with some kind of encryption techniques provides security. Most of the previous encryption tech...

متن کامل

A Survey on Reversible Data Hiding in Encrypted Image

Recently more attention is paid to reversible data hiding (RDH) in encrypted images, since it maintains the excellent property that the original image cover can be losslessly recovered after data embedded is extracted while protecting the image content’s as confidential. In this survey paper different reversible data hiding methods are analyzed. All previous methods embed data by reversibly vac...

متن کامل

A reversible data hiding method for encrypted images

Since several years, the protection of multimedia data is becoming very important. The protection of this multimedia data can be done with encryption or data hiding algorithms. To decrease the transmission time, the data compression is necessary. Since few years, a new problem is trying to combine in a single step, compression, encryption and data hiding. So far, few solutions have been propose...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 1996