CFP last date
20 January 2025
Call for Paper
February Edition
IJCA solicits high quality original research papers for the upcoming February edition of the journal. The last date of research paper submission is 20 January 2025

Submit your paper
Know more
Reseach Article

Article:An approach for Intranet Data Security

by Prof. Samir Kumar Bandyopadhyay, Suman chakraborty
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 9 - Number 4
Year of Publication: 2010
Authors: Prof. Samir Kumar Bandyopadhyay, Suman chakraborty
10.5120/1377-1856

Prof. Samir Kumar Bandyopadhyay, Suman chakraborty . Article:An approach for Intranet Data Security. International Journal of Computer Applications. 9, 4 ( November 2010), 1-7. DOI=10.5120/1377-1856

@article{ 10.5120/1377-1856,
author = { Prof. Samir Kumar Bandyopadhyay, Suman chakraborty },
title = { Article:An approach for Intranet Data Security },
journal = { International Journal of Computer Applications },
issue_date = { November 2010 },
volume = { 9 },
number = { 4 },
month = { November },
year = { 2010 },
issn = { 0975-8887 },
pages = { 1-7 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume9/number4/1377-1856/ },
doi = { 10.5120/1377-1856 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T19:57:44.106985+05:30
%A Prof. Samir Kumar Bandyopadhyay
%A Suman chakraborty
%T Article:An approach for Intranet Data Security
%J International Journal of Computer Applications
%@ 0975-8887
%V 9
%N 4
%P 1-7
%D 2010
%I Foundation of Computer Science (FCS), NY, USA
Abstract

In this paper, combined the encrypting and compressing processes to consider the choices of which types of bits are most effective in the selective encryption sense when they are changed. So, instead of encrypting the whole file bit by bit, changed only these highly sensitive bits. Moreover, by combining the compression and encryption tasks and reducing the total encryption work required, it will helps to achieve a savings in system complexity. Selective encryption is the technique of encrypting some parts of a compressed data file while leaving others unencrypted. Selective encryption is not a new idea. It has been proposed in several applications, especially in the commercial multimedia industry. Hover, selective encryption of lossless compressed text files has not been explored, and that is the focus of this paper.

References
Index Terms

Computer Science
Information Sciences

Keywords

Codeword encryption compression alphabet security frequency Huffman coding