An efficient and secure compression technique for data protection using burrows-wheeler transform algorithm

[1]  Guandong Xu,et al.  A Confusion Method for the Protection of User Topic Privacy in Chinese Keyword-based Book Retrieval , 2023, ACM Trans. Asian Low Resour. Lang. Inf. Process..

[2]  Jiangping Hu,et al.  Safe consensus control of cooperative-competitive multi-agent systems via differential privacy , 2022, Kybernetika.

[3]  Xiaoxia Zhou,et al.  Dynamic event-triggered security control for networked control systems with cyber-attacks: A model predictive control approach , 2022, Inf. Sci..

[4]  Surya Nepal,et al.  ANS-based compression and encryption with 128-bit security , 2022, International Journal of Information Security.

[5]  Zongda Wu,et al.  How to ensure the confidentiality of electronic medical records on the cloud: A technical perspective , 2022, Comput. Biol. Medicine.

[6]  Huxiong Li,et al.  A Basic Framework for Privacy Protection in Personalized Information Retrieval: An Effective Framework for User Privacy Protection , 2021, J. Organ. End User Comput..

[7]  Schahram Dustdar,et al.  A Utility-Aware General Framework With Quantifiable Privacy Preservation for Destination Prediction in LBSs , 2021, IEEE/ACM Transactions on Networking.

[8]  Zongda Wu,et al.  An effective approach for the protection of user commodity viewing privacy in e-commerce website , 2021, Knowl. Based Syst..

[9]  Houbing Song,et al.  Industrial Security Solution for Virtual Reality , 2021, IEEE Internet of Things Journal.

[10]  M. Sardaraz,et al.  SCA-NGS: Secure compression algorithm for next generation sequencing data using genetic operators and block sorting , 2021, Science progress.

[11]  Bong Jun Choi,et al.  Analysis of Using Blockchain to Protect the Privacy of Drone Big Data , 2021, IEEE Network.

[12]  Imran Razzak,et al.  An efficient secure data compression technique based on chaos and adaptive Huffman coding , 2020, Peer-to-Peer Networking and Applications.

[13]  Alistair Moffat,et al.  Large-Alphabet Semi-Static Entropy Coding Via Asymmetric Numeral Systems , 2020, ACM Trans. Inf. Syst..

[14]  Zongda Wu,et al.  Constructing dummy query sequences to protect location privacy and query privacy in location-based services , 2020, World Wide Web.

[15]  Zongda Wu,et al.  A dummy-based user privacy protection approach for text information retrieval , 2020, Knowl. Based Syst..

[16]  Bruce F. Cockburn,et al.  High-Throughput FPGA-Based Hardware Accelerators for Deflate Compression and Decompression Using High-Level Synthesis , 2020, IEEE Access.

[17]  Xiaonan Luo,et al.  A Parameter-Selection-Based Chaotic System , 2019, IEEE Transactions on Circuits and Systems II: Express Briefs.

[18]  Sebastian Deorowicz,et al.  FQSqueezer: k-mer-based compression of sequencing data , 2019, Scientific Reports.

[19]  Jonggun Kim,et al.  A novel bit-level color image encryption using improved 1D chaotic map , 2018, Multimedia Tools and Applications.

[20]  Armando J. Pinho,et al.  Cryfa: a secure encryption tool for genomic data , 2018, Bioinform..

[21]  Yiran Chen,et al.  An image encryption algorithm based on chaotic system and compressive sensing , 2018, Signal Process..

[22]  Bruno Carpentieri,et al.  Efficient Compression and Encryption for Digital Data Transmission , 2018, Secur. Commun. Networks.

[23]  Yong Li,et al.  Complementary Contextual Models with FM-Index for DNA Compression , 2017, 2017 Data Compression Conference (DCC).

[24]  Ataul Aziz Ikram,et al.  SeqCompress: an algorithm for biological sequence compression. , 2014, Genomics.

[25]  J. K. Mandal,et al.  A General Session Based Bit Level Block Encoding Technique Using Symmetric Key Cryptography to Enhance the Security of Network Based Transmission , 2012 .

[26]  Lung-Jen Lee,et al.  $2^{n}$ Pattern Run-Length for Test Data Compression , 2012, IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems.

[27]  Mukesh Sharma,et al.  Compression and Encryption: An Integrated Approach , 2012 .

[28]  Oscar C. Au,et al.  Adaptive Chosen-Ciphertext Attack on Secure Arithmetic Coding , 2009, IEEE Transactions on Signal Processing.

[29]  Hyungjin Kim,et al.  Secure Arithmetic Coding , 2007, IEEE Transactions on Signal Processing.

[30]  Yansong Gao,et al.  APMSA: Adversarial Perturbation Against Model Stealing Attacks , 2023, IEEE Transactions on Information Forensics and Security.

[31]  Lu Lv,et al.  Improving Physical Layer Security of Uplink NOMA via Energy Harvesting Jammers , 2021, IEEE Transactions on Information Forensics and Security.

[32]  J. Pieprzyk,et al.  Compcrypt–Lightweight ANS-Based Compression and Encryption , 2021, IEEE Transactions on Information Forensics and Security.

[33]  Nipun Bansal,et al.  Peer to Peer Networking and Applications , 2013 .

[34]  D. J. Wheeler,et al.  A Block-sorting Lossless Data Compression Algorithm , 1994 .