Hamming Distance Based Compression Techniques with Security
نویسندگان
چکیده
The proposed algorithm suggests a lossless data compression with security. Input Bit stream is divided into a group of 8-bits each .Encoder deviate the available Randomly generated key according to input bit stream which results into encrypted data. Encrypted key of 64-bits is treated as unit of 4-bits each. Each 4-bits of Key will be at the Hamming distance is of Two from Deviated key. There will be total Six numbers of 4-bits which are at the Hamming distance of Two from Key. These numbers can be indexed by using 3-bits. The index of Three bits of a number is available on the channel as a compressed bit stream. Proposed algorithm is to encrypt the file, compress it, decompress it, and finally decrypt it back to the original file. The algorithm not requires a prior knowledge of data to be compressed. Intelligent algorithm reverse the order of compression & encryption ( i.e. Encryption prior to compression) without compromising compression efficiency , information theoretic security & with lesser computational cost. Proposed algorithm suitable for images, audio as well as text.
منابع مشابه
Investigation and Analysis of Hough-DCT- Hamming Distance Based Method of Iris Recognition
As we know that iris recognition is widely used biometric identification system. This system is having growing future in the area of security. In the real time security systems we need to have reliable, efficient, faster iris recognition system. Iris recognition process is consisting of iris segmentation, normalization, localization as well as matching techniques. And hence the performance of t...
متن کاملAnalysis of Don’t Care Bit Filling Techniques for Optimization of Compression and Scan Power
Test power and test time have been the major issues for current scenario of VLSI testing. The test data compression is the well known method used to reduce the test time. The don’t care bit filling method can be used for effective test data compression as well as reduction in scan power. In this paper we describe the algorithm for don’t care assignment like MT(Minimum Transition)-fill technique...
متن کاملA post-compilation register re-assignment technique for improving hamming distance based code compression
Code compression is a field where compression ratios between compiler-generated code and subsequent compressed code are highly dependent on decisions made at compile time. Most optimizations employed by compilers tend to focus on parameters such as program performance, minimizing resource dependencies and sometimes the option of reducing code size. This paper describes a post-compilation techni...
متن کاملImage Security through DWT &SVD based Watermarking and masking with Encryption
The rapid growth in the digital technology, image processing tools and communication revolution through Internet has made the reproduction of digitally created artifacts simple and within reach very easily. This new trend has several advantages in terms of flexibility, cost effectiveness, convenience etc., but at the same time, also raised some serious concerns in actual real life situation. In...
متن کاملSecrecy Communication with Security Rate Measure
We introduce a new measure on secrecy, which is established based on rate-distortion theory. It is named security rate, which is the minimum (infimum) of the additional rate needed to reconstruct the source within target distortion level with any positive probability for wiretapper. It denotes the minimum distance in information metric (bits) from what wiretapper has received to any decrypted r...
متن کامل