Open Access   Article Go Back

Analysis on Encryption and Compression Techniques for Information Security

Gowtham Mamidisetti1 , Ramesh Makala2 , Ravi Teja K3

Section:Research Paper, Product Type: Journal Paper
Volume-07 , Issue-16 , Page no. 105-112, May-2019

CrossRef-DOI:   https://doi.org/10.26438/ijcse/v7si16.105112

Online published on May 18, 2019

Copyright © Gowtham Mamidisetti, Ramesh Makala, Ravi Teja K . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Gowtham Mamidisetti, Ramesh Makala, Ravi Teja K, “Analysis on Encryption and Compression Techniques for Information Security,” International Journal of Computer Sciences and Engineering, Vol.07, Issue.16, pp.105-112, 2019.

MLA Style Citation: Gowtham Mamidisetti, Ramesh Makala, Ravi Teja K "Analysis on Encryption and Compression Techniques for Information Security." International Journal of Computer Sciences and Engineering 07.16 (2019): 105-112.

APA Style Citation: Gowtham Mamidisetti, Ramesh Makala, Ravi Teja K, (2019). Analysis on Encryption and Compression Techniques for Information Security. International Journal of Computer Sciences and Engineering, 07(16), 105-112.

BibTex Style Citation:
@article{Mamidisetti_2019,
author = {Gowtham Mamidisetti, Ramesh Makala, Ravi Teja K},
title = {Analysis on Encryption and Compression Techniques for Information Security},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {5 2019},
volume = {07},
Issue = {16},
month = {5},
year = {2019},
issn = {2347-2693},
pages = {105-112},
url = {https://www.ijcseonline.org/full_spl_paper_view.php?paper_id=1288},
doi = {https://doi.org/10.26438/ijcse/v7i16.105112}
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v7i16.105112}
UR - https://www.ijcseonline.org/full_spl_paper_view.php?paper_id=1288
TI - Analysis on Encryption and Compression Techniques for Information Security
T2 - International Journal of Computer Sciences and Engineering
AU - Gowtham Mamidisetti, Ramesh Makala, Ravi Teja K
PY - 2019
DA - 2019/05/18
PB - IJCSE, Indore, INDIA
SP - 105-112
IS - 16
VL - 07
SN - 2347-2693
ER -

           

Abstract

This paper has investigated some of the encryption and compression techniques. The paper has also examined the implication of these techniques for the future of information security. Indeed, the threat environment has combined with corporate networks and made data security more complex. Therefore, an increasing number of data network users, who have turned to the cloud, have strived to secure their information systems beyond conventional virus scanners and firewalls. With an increasing demand for responsive information security systems, various techniques of data encryption and compression have evolved. Some of the devices, platforms, or information systems that have been targeted by these trends include websites, personal databases, and computers. Some of the specific algorithms that have been employed in data encryption include River-Shamir-Adleman (RSA) algorithm (in asymmetric encryption) and include Rivest Cipher (RC6) and Data Encryption Algorithm (DES) (in symmetric encryption). On the other hand, selected algorithms that have been used towards successful lossless data compression include lossless predictive coding, Arithmetic coding, Lempel-Ziv-Welch (LZW) compression, Huffman coding, and Run Length Encoding. These algorithms have gained application to situations involving platforms such as word processing files, tabular numbers, and executable codes. For lossy data compression, some of the algorithms that have gained increasing application include lossy predictive coding, wavelet coding, and transform coding. The implication for the future is that data encryption and compression techniques that will be responsive to the dynamic nature of the threat environment might prove successful in achieving the intended goals of data encryption and compression processes, hence assuring information system security.

Key-Words / Index Term

Compression,Encryption,RSAalgorithm,RC6,Huffmancoding

References

[1] Jay ram P, Ranganatha HR, Anupama HS. Information Hiding Using Audiostegnography: A Survey. The International Journal of Multimedia & Its Applications (IJMA) Vol.3, No.3, August 2011
[2] M. Baritha Begum and Y. Venkataramani. A New Compression Scheme for Secure Transmission, International Journal of Automation and Computing, 10(6), December 2013, 578-586, DOI: 10.1007/s11633-013-0756-3
[3] Ajit Singh and Rimple Gilhotra -Data Security Using Private Key Encryption System Based On Arithmetic Coding. The International Journal of Network Security & Its Applications (IJNSA), Vol.3, No.3, May 2011
[4] Bobby Jasujaand and AbhishekPandya –Crypto. Compression System: An Integrated Approach using Stream Cipher Cryptography and Entropy Encoding. International Journal of Computer Applications (0975 –8887) Volume 116, No. 21, April 2015
[5] Kumari S. "A Research Paper on Cryptography Encryption and Compression Techniques," International Journal of Engineering and Computer Science 2017; 6(4), pp. 20915-20919
[6] Emami SS. "Security Analysis of Cryptographic Algorithms," Ph.D. thesis, Macquarie University, Sydney, New South Wales; 2013
[7] Kandola S. "A Survey of Cryptographic Algorithms," Master thesis. St. Lawrence University, Saint Lawrence County, NY. 2013
[8] Mathur H and Alam Z. "Analysis in Symmetric And Asymmetric Cryptology Algorithm." International Journal of Emerging Trends & Technology in Computer Science (IJETTCS) 2015; 4(1), pp. 44-46
[9] Chandra S and Bhattacharyya S. A Study and Analysis on Symmetric Cryptography," International Conference on Science Engineering and Management Research (ICSEMR), Chennai, India, 2014
[10] Hercigonja Z. "Comparative Analysis of Cryptographic Algorithms." International Journal of Digital Technology & Economy 2016; 1(2), pp. 127-134.
[11] Soni S, Agrawal H and Sharma M. "Analysis and Comparison between AES and DES Cryptographic Algorithm." International Journal of Engineering and Innovative Technology (IJEIT) 2012; 2(6), pp. 362-365
[12] Mahajan P and Sachdeva A. "A Study of Encryption Algorithms AES, DES and RSA for Security." Global Journal of Computer Science and Technology Network, Web & Security 2013; 13(15)
[13] Borda M. "Fundamentals In Information Theory and Coding." Springer-Verlag Berlin Heidelberg, Romania, 2013; pp. 95
[14] Shanmugasundaram S and Lourdusamy R. "A Comparative Study of Text Compression Algorithms." International Journal of Wisdom Based Computing 2011; 1(3), pp. 68-76
[15] Altarawneh H and Altarawneh M. "Data Compression Techniques on Text Files: A Comparison Study." International Journal of Computer Applications 2011; 26(5)
[16] Antil R and Gupta S. "Analysis and Comparison of Various Lossless Compression Techniques." International Journal for Research in Applied Science and Engineering Technology (IJRASET) 2014; 2(3), pp. 251-262
[17] Bodden E, Clasen M and Kneis J. "Arithmetic Coding Revealed." RWTH Aachen University, Aachen, Germany. 2004
[18] R. Pizzolante and B. Carpentieri, “Lossless, low-complexity, compression of three-dimensional volumetric medical images via linear prediction.” In Proceedings of the 18th International Conference on Digital Signal Processing, DSP `13, 2013
[19] Fenwick P. "Variable-Length Integer Codes Based on the Goldbach Conjecture, and Other Additive Codes." IEEE Transactions on Information Theory 2002; 48(8), pp. 2412-2417
[20] Waghulde R, Gurjar H, Dholakia V and Bhole GP. "New Data Compression Algorithm and its Comparative Study with Existing Techniques." International Journal of Computer Applications 2014; 102(7), pp. 35-38
[21] Klinc D. et al. "On Compression of Data Encrypted With Block Ciphers." IEEE Transactions on Information Theory 2012; 58(11), pp. 6989-7001
[22] Schonberg D, Draper SC and Ramchandran K. "On Blind Compression of Encrypted Correlated Data Approaching The Source Entropy Rate." Proceedings of 43rd Annual Allerton Conference on Communication, Control and Computing, Allerton, IL 2005; pp. 1538-1547
[23] C. P. Wu and C. C. J. Kuo, “Design of integrated multimedia compression and encryption systems.” IEEE Transactions on Multimedia 2005; vol. 7, no. 5, pp. 828–839
[24] Y. Zhang, B. Xu, and N. Zhou, “A novel image compression–encryption hybrid algorithm based on the analysis sparse representation.” Optics Communications 2017; vol. 392, pp. 223-233
[25] E. Setyaningsih and R. Wardoyo, “Review of image compression and encryption techniques.” International Journal of Advanced Computer Science and Applications 2017; vol. 8, No. 2
[26] T. Sharma and S. Bollavarapu, “Data Security using Compression and Cryptography Techniques.” International Journal of Computer Applications 2015; vol. 117, no. 14, pp. 15-18
[27] P. Albano, A. Bruno, B. Carpentieri et al., “Secure and distributed video surveillance via portable devices.” Journal of Ambient Intelligence and Humanized Computing 2014; vol. 5, no. 2, pp. 205-213
[28] R. Pizzolante, B. Carpentieri, A. Castiglione, and G. De Maio, “The AVQ algorithm: Watermarking and compression performances.” In Proceedings of the 3rd IEEE International Conference on Intelligent Networking and Collaborative Systems, INCoS `11; pp. 698-702. 2011
[29] U. Fiore, “Selective redundancy removal: a framework for data hiding.” Future Internet 2010; vol. 2, no. 1, pp. 30–40, 2010
[30] M. R. Ogiela and L. Ogiela, “On using cognitive models in cryptography.” In Proceedings of the 30th IEEE International Conference on Advanced Information Networking and Applications, AINA `16, pp. 1055–1058, IEEE, Crans-Montana, Switzerland, March 2016
[31] Singh KJ & Manimegalai R. A Survey of Joint Compression and Encryption Techniques for Video Data. Journal of Computer Science 2012; 8(5), 731-736