Performance analysis of compression algorithms for information security: A Review
Data compression is a vital part of information security, since compressed data is much more secure and convenient tohandle. Effective data compression technique creates an effective, secure, easy communicable & redundant data. There aretwo types of compression algorithmic techniques: - loss...
Main Authors: | , |
---|---|
Format: | Article |
Language: | English |
Published: |
European Alliance for Innovation (EAI)
2020-10-01
|
Series: | EAI Endorsed Transactions on Scalable Information Systems |
Subjects: | |
Online Access: | https://eudl.eu/pdf/10.4108/eai.13-7-2018.163503 |
_version_ | 1819114585150455808 |
---|---|
author | Neha Sharma Usha Batra |
author_facet | Neha Sharma Usha Batra |
author_sort | Neha Sharma |
collection | DOAJ |
description | Data compression is a vital part of information security, since compressed data is much more secure and convenient tohandle. Effective data compression technique creates an effective, secure, easy communicable & redundant data. There aretwo types of compression algorithmic techniques: - lossy and lossless. These techniques can be applied to any data formatlike text, audio, video or image file. The primary objective of this study was to analyse data compression techniques usedfor information security techniques like steganography, cryptography etc. Four each, lossy and lossless techniques areimplemented and evaluated on parameters like- file size, saving percentage, time, compression ratio and speed. Detailedanalysis shows that the lossy techniques performs better quantitatively whereas lossless is better qualitatively. However,lossless techniques are more effective as there is no data loss during the process. Among all, Huffman encoding outperformsother algorithms. |
first_indexed | 2024-12-22T04:47:38Z |
format | Article |
id | doaj.art-1040193b618549d78877b8a3e9998565 |
institution | Directory Open Access Journal |
issn | 2032-9407 |
language | English |
last_indexed | 2024-12-22T04:47:38Z |
publishDate | 2020-10-01 |
publisher | European Alliance for Innovation (EAI) |
record_format | Article |
series | EAI Endorsed Transactions on Scalable Information Systems |
spelling | doaj.art-1040193b618549d78877b8a3e99985652022-12-21T18:38:33ZengEuropean Alliance for Innovation (EAI)EAI Endorsed Transactions on Scalable Information Systems2032-94072020-10-0172710.4108/eai.13-7-2018.163503Performance analysis of compression algorithms for information security: A ReviewNeha Sharma0Usha Batra1Research Scholar, G D Goenka University, 122103, Gurugram, Haryana, IndiaAssistant Dean, G D Goenka University, 122103, Gurugram, Haryana, IndiaData compression is a vital part of information security, since compressed data is much more secure and convenient tohandle. Effective data compression technique creates an effective, secure, easy communicable & redundant data. There aretwo types of compression algorithmic techniques: - lossy and lossless. These techniques can be applied to any data formatlike text, audio, video or image file. The primary objective of this study was to analyse data compression techniques usedfor information security techniques like steganography, cryptography etc. Four each, lossy and lossless techniques areimplemented and evaluated on parameters like- file size, saving percentage, time, compression ratio and speed. Detailedanalysis shows that the lossy techniques performs better quantitatively whereas lossless is better qualitatively. However,lossless techniques are more effective as there is no data loss during the process. Among all, Huffman encoding outperformsother algorithms.https://eudl.eu/pdf/10.4108/eai.13-7-2018.163503data compressionhuffman encodinginformation security techniqueslossy techniquesand lossless techniques |
spellingShingle | Neha Sharma Usha Batra Performance analysis of compression algorithms for information security: A Review EAI Endorsed Transactions on Scalable Information Systems data compression huffman encoding information security techniques lossy techniques and lossless techniques |
title | Performance analysis of compression algorithms for information security: A Review |
title_full | Performance analysis of compression algorithms for information security: A Review |
title_fullStr | Performance analysis of compression algorithms for information security: A Review |
title_full_unstemmed | Performance analysis of compression algorithms for information security: A Review |
title_short | Performance analysis of compression algorithms for information security: A Review |
title_sort | performance analysis of compression algorithms for information security a review |
topic | data compression huffman encoding information security techniques lossy techniques and lossless techniques |
url | https://eudl.eu/pdf/10.4108/eai.13-7-2018.163503 |
work_keys_str_mv | AT nehasharma performanceanalysisofcompressionalgorithmsforinformationsecurityareview AT ushabatra performanceanalysisofcompressionalgorithmsforinformationsecurityareview |