We apologize for a recent technical issue with our email system, which temporarily affected account activations. Accounts have now been activated. Authors may proceed with paper submissions. PhDFocusTM
CFP last date
20 November 2024
Call for Paper
December Edition
IJCA solicits high quality original research papers for the upcoming December edition of the journal. The last date of research paper submission is 20 November 2024

Submit your paper
Know more
Reseach Article

A Novel Approach of Speedy-Highly Secured Data Transmission using Cascading of PDLZW and Arithmetic Coding with Cryptography

by Sankalp Prakash, Mridula Purohit, Abhishek Raizada
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 57 - Number 19
Year of Publication: 2012
Authors: Sankalp Prakash, Mridula Purohit, Abhishek Raizada
10.5120/9219-3776

Sankalp Prakash, Mridula Purohit, Abhishek Raizada . A Novel Approach of Speedy-Highly Secured Data Transmission using Cascading of PDLZW and Arithmetic Coding with Cryptography. International Journal of Computer Applications. 57, 19 ( November 2012), 1-7. DOI=10.5120/9219-3776

@article{ 10.5120/9219-3776,
author = { Sankalp Prakash, Mridula Purohit, Abhishek Raizada },
title = { A Novel Approach of Speedy-Highly Secured Data Transmission using Cascading of PDLZW and Arithmetic Coding with Cryptography },
journal = { International Journal of Computer Applications },
issue_date = { November 2012 },
volume = { 57 },
number = { 19 },
month = { November },
year = { 2012 },
issn = { 0975-8887 },
pages = { 1-7 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume57/number19/9219-3776/ },
doi = { 10.5120/9219-3776 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T21:00:52.017220+05:30
%A Sankalp Prakash
%A Mridula Purohit
%A Abhishek Raizada
%T A Novel Approach of Speedy-Highly Secured Data Transmission using Cascading of PDLZW and Arithmetic Coding with Cryptography
%J International Journal of Computer Applications
%@ 0975-8887
%V 57
%N 19
%P 1-7
%D 2012
%I Foundation of Computer Science (FCS), NY, USA
Abstract

The spread of computing has led to an outburst in the volume of data in the communication world. The paper proposes the cascading of two algorithms PDLZW and Arithmetic Coding with cryptography. With the hierarchical parallel dictionary set, the search time can be reduced significantly and all these dictionaries are operated independently. While the results generated by Arithmetic Coding are close to the optimal value. Since cascaded compression may achieve the higher compression ratio for the file but does not provide required security aspects. Therefore, the advantage of cryptography has been taken by XORing the compressed data with the one-time key, providing compression and security simultaneously. This paper proposes a new system JDCE, where compression is provided to the data twice before encrypted it for getting it ready for transmission.

References
  1. Ian H. Witten, Radford M. Neal, and John G. Cleary. Arithmetic coding for data compression. Commun. ACM, 30(6):520–540, June 1987.
  2. Ming-Bo Lin, Jang-Feng Lee, and Gene Eu Jan. A lossless data compression and decompression algorithm and its hardware architecture. IEEE Trans. Very Large Scale Integr. Syst. , 14(9):925–936, September 2006.
  3. Ming-Bo Lin. A hardware architecture for the lzw compression and decom¬pression algorithms based on parallel dictionaries. J. VLSI Signal Process. Syst. , 26(3):369–381, November 2000.
  4. Mark Nelson and Jean-Loup Gailly. The Data Compression Book. M&T Books, 2nd edition, 1996.
  5. Yehoshua Perl, V. Maram, and N. Kadakuntla. The cascading of the LZW compression algorithm with arithmetic coding. In James A. Storer and John H. Reif, editors, Data Compression Conference, pages 277–286. IEEE Computer Society, 1991.
  6. Archana V. Nair. S, G. Kharmega Sundararaj and T. Sudarson Rama Pe¬rumal. Simultaneous compression and encryption using arithmetic coding with randomized bits. International Journal of Computer Technology and Electronics Engineering, 2:38–42, April 2012.
  7. P. Vichitkraivin and Orachat Chitsobhuk. An Improvement of PDLZW implementation with a Modi?ed WSC Updating Technique on FPGA. World Academy of Science, Engineering and Technology, 2009.
  8. David Salomon. Data compression-The Complete Reference, 4th Edition. Springer, 2007.
  9. Nirali Thakkar and Malay Bhatt. Cascading of the PDLZW compres¬sion algorithm with arithmetic coding. International Journal of Computer Applications, 46(16):21–24, May 2012. Published by Foundation of Com¬puter Science, New York, USA.
  10. Ajit Singh and Rimple Gilhotra. Data security using private key encryption system based on arithmetic coding, May 2011.
  11. Haroon Altarawneh and Mohammad Altarawneh. Data compression tech¬niques on text ?les: A comparison study. International Journal of Com¬puter Applications, 26(5):42–54, July 2011. Published by Foundation of Computer Science, New York, USA.
  12. Debra A. Lelewer and Daniel S. Hirschberg. Data compression. ACM Com¬put. Surv. , 19(3):261–296, September 1987.
  13. Jiantao Zhou, Oscar C. Au, Xiaopeng Fan, and Peter H. W. Wong. Joint security and performance enhancement for secure arithmetic coding. In ICIP, pages 3120–3123, 2008.
  14. Raj S. Katti, Sudarshan K. Srinivasan, and Aida Vosoughi. On the secu¬rity of randomized arithmetic codes against ciphertext-only attacks. IEEE Transactions on Information Forensics and Security, 6(1):19–27, 2011.
  15. Helen A. Bergen and James M. Hogan. A chosen plaintext attack on an adaptive arithmetic coding compression algorithm. Computers & Security, pages 157–167, 1993.
  16. Mark R. Nelson. Arithmetic coding and statistical modeling: achieving higher compression ratios. Dr. Dobb's J. , 16(2):16–ff. , December 1990.
  17. Whit?eld Diffie & Martin E. Hellman. Privacy and authentication: An introduction to cryptography, 1979.
  18. Tarek M Mahmoud, Bahgat A. Abdel-latef, Awny A. Ahmed, Ahmed M Mahfouz, Tarek M. Mahmoud, Bahgat A. Abdel-latef, Awny A. Ahmed, and Ahmed M. Mahfouz. Hybrid compression encryption technique for se¬curing sms. International Journal of Computer Science and Security, 2009.
  19. Gary C. Kessle. An overview of cryptography. [Online]. http://www. garykessler. net/library/crypto. html.
  20. William Stallings. Cryptography and Network Security: Principles and Practice. Prentice Hall Press, Upper Saddle River, NJ, USA, 5th edition, 2010.
  21. Christof Paar and Jan Pelzl. Understanding Cryptography - A Textbook for Students and Practitioners. Springer, 2010.
Index Terms

Computer Science
Information Sciences

Keywords

Arithmetic Coding Cascaded Compression Cryptography Parallel Dictionary LZW (PDLZW) One-Time Pad