A New Compression Scheme for Secure Transmission

Encryption techniques ensure security of data during transmission. However, in most cases, this increases the length of the data, thus it increases the cost. When it is desired to transmit data over an insecure and bandwidth-constrained channel, it is customary to compress the data first and then encrypt it. In this paper, a novel algorithm, the new compression with encryption and compression (CEC), is proposed to secure and compress the data. This algorithm compresses the data to reduce its length. The compressed data is encrypted and then further compressed using a new encryption algorithm without compromising the compression efficiency and the information security. This CEC algorithm provides a higher compression ratio and enhanced data security. The CEC provides more confidentiality and authentication between two communication systems.

[1]  Vincent Rijmen,et al.  The Design of Rijndael: AES - The Advanced Encryption Standard , 2002 .

[2]  Wing-Kai Hon,et al.  Geometric Burrows-Wheeler Transform: Linking Range Searching and Text Indexing , 2008, Data Compression Conference (dcc 2008).

[3]  Cheng-Hsing Yang,et al.  A fast algorithm for Huffman decoding based on a recursion Huffman tree , 2012, J. Syst. Softw..

[4]  Travis Gagie,et al.  Move-to-Front, Distance Coding, and Inversion Frequencies revisited , 2010, Theor. Comput. Sci..

[5]  S. Bhadade Umesh,et al.  Lossless Text Compression using Dictionaries , 2011 .

[6]  Wing-Kai Hon,et al.  Compressed text indexing with wildcards , 2013, J. Discrete Algorithms.

[7]  Oscar C. Au,et al.  Adaptive Chosen-Ciphertext Attack on Secure Arithmetic Coding , 2009, IEEE Transactions on Signal Processing.

[8]  M. Oguzhan Külekci On scrambling the Burrows-Wheeler transform to provide privacy in lossless compression , 2012, Comput. Secur..

[9]  Oscar C. Au,et al.  Secure Lempel-Ziv-Welch (LZW) algorithm with random dictionary insertion and permutation , 2008, 2008 IEEE International Conference on Multimedia and Expo.

[10]  Joaquín Adiego,et al.  Natural Language Compression on Edge-Guided text preprocessing , 2011, Inf. Sci..

[11]  Vincent Rijmen,et al.  The Design of Rijndael , 2002, Information Security and Cryptography.

[12]  Sushil Kumar,et al.  A Temporal Database Compression with Differential Method , 2012 .

[13]  Wing-Kai Hon,et al.  Compression, Indexing, and Retrieval for Massive String Data , 2010, CPM.

[14]  V. K. Govindan,et al.  Compression scheme for faster and secure data transmission over networks , 2005, International Conference on Mobile Business (ICMB'05).

[15]  Khalid Sayood,et al.  Introduction to data compression (2nd ed.) , 2000 .

[16]  Gonzalo Navarro,et al.  Compressed full-text indexes , 2007, CSUR.

[17]  Atsa Etoundi Roger,et al.  A Formal Framework for Business Process Modeling , 2011 .

[18]  Y. Venkataramani,et al.  LSB Based Audio Steganography Based On Text Compression , 2012 .

[19]  Hugo Krawczyk,et al.  On Compression of Data Encrypted With Block Ciphers , 2012, IEEE Transactions on Information Theory.

[20]  Hussein Al-Bahadili,et al.  A bit-level text compression scheme based on the ACW algorithm , 2010, Int. J. Autom. Comput..

[21]  M. Bellare,et al.  Searchable Encryption Revisited: Consistency Properties, Relation to Anonymous IBE, and Extensions , 2008, Journal of Cryptology.

[22]  Raphael C.-W. Phan,et al.  On the security of the WinRAR encryption feature , 2006, International Journal of Information Security.

[23]  Sos S. Agaian,et al.  Cipherstream covering for secure data compression , 2011, 2011 IEEE International Conference on Systems, Man, and Cybernetics.

[24]  Hyungjin Kim,et al.  Secure Arithmetic Coding , 2007, IEEE Transactions on Signal Processing.

[25]  Khalid Sayood,et al.  Introduction to Data Compression , 1996 .

[26]  Jirapond Tadrat,et al.  An Experiment Study on Text Transformation for Compression Using Stoplists and Frequent Words , 2008, Fifth International Conference on Information Technology: New Generations (itng 2008).

[27]  Haim Kaplan,et al.  Most Burrows-Wheeler Based Compressors Are Not Optimal , 2007, CPM.

[28]  David Salomon,et al.  Data Compression: The Complete Reference , 2006 .

[29]  A. Carus,et al.  Fast Text Compression Using Multiple Static Dictionaries , 2010 .