Introduction to data compression (2nd ed.)
Introduction to data compression (2nd ed.)
Data Compression: The Complete Reference
Data Compression: The Complete Reference
The Design of Rijndael
Compression Scheme for Faster and Secure Data Transmission over Networks
ICMB '05 Proceedings of the International Conference on Mobile Business
On the security of the WinRAR encryption feature
International Journal of Information Security - Special issue on ISC'05
ACM Computing Surveys (CSUR)
Geometric Burrows-Wheeler Transform: Linking Range Searching and Text Indexing
DCC '08 Proceedings of the Data Compression Conference
An Experiment Study on Text Transformation for Compression Using Stoplists and Frequent Words
ITNG '08 Proceedings of the Fifth International Conference on Information Technology: New Generations
On Compression of Data Encrypted with Block Ciphers
DCC '09 Proceedings of the 2009 Data Compression Conference
Adaptive chosen-ciphertext attack on secure arithmetic coding
IEEE Transactions on Signal Processing
Compression, indexing, and retrieval for massive string data
CPM'10 Proceedings of the 21st annual conference on Combinatorial pattern matching
Natural Language Compression on Edge-Guided text preprocessing
Information Sciences: an International Journal
Compressed text indexing with wildcards
SPIRE'11 Proceedings of the 18th international conference on String processing and information retrieval
A fast algorithm for Huffman decoding based on a recursion Huffman tree
Journal of Systems and Software
IEEE Transactions on Signal Processing
Move-to-front, distance coding, and inversion frequencies revisited
CPM'07 Proceedings of the 18th annual conference on Combinatorial Pattern Matching
Most burrows-wheeler based compressors are not optimal
CPM'07 Proceedings of the 18th annual conference on Combinatorial Pattern Matching
Hi-index | 0.00 |
Encryption techniques ensure security of data during transmission. However, in most cases, this increases the length of the data, thus it increases the cost. When it is desired to transmit data over an insecure and bandwidth-constrained channel, it is customary to compress the data first and then encrypt it. In this paper, a novel algorithm, the new compression with encryption and compression (CEC), is proposed to secure and compress the data. This algorithm compresses the data to reduce its length. The compressed data is encrypted and then further compressed using a new encryption algorithm without compromising the compression efficiency and the information security. This CEC algorithm provides a higher compression ratio and enhanced data security. The CEC provides more confidentiality and authentication between two communication systems.