Performance analysis of compression algorithms for information security: A Review

Data compression is a vital part of information security, since compressed data is much more secure and convenient tohandle. Effective data compression technique creates an effective, secure, easy communicable & redundant data. There aretwo types of compression algorithmic techniques: - loss...

Full description

Bibliographic Details
Main Authors: Neha Sharma, Usha Batra
Format: Article
Language:English
Published: European Alliance for Innovation (EAI) 2020-10-01
Series:EAI Endorsed Transactions on Scalable Information Systems
Subjects:
Online Access:https://eudl.eu/pdf/10.4108/eai.13-7-2018.163503
_version_ 1819114585150455808
author Neha Sharma
Usha Batra
author_facet Neha Sharma
Usha Batra
author_sort Neha Sharma
collection DOAJ
description Data compression is a vital part of information security, since compressed data is much more secure and convenient tohandle. Effective data compression technique creates an effective, secure, easy communicable & redundant data. There aretwo types of compression algorithmic techniques: - lossy and lossless. These techniques can be applied to any data formatlike text, audio, video or image file. The primary objective of this study was to analyse data compression techniques usedfor information security techniques like steganography, cryptography etc. Four each, lossy and lossless techniques areimplemented and evaluated on parameters like- file size, saving percentage, time, compression ratio and speed. Detailedanalysis shows that the lossy techniques performs better quantitatively whereas lossless is better qualitatively. However,lossless techniques are more effective as there is no data loss during the process. Among all, Huffman encoding outperformsother algorithms.
first_indexed 2024-12-22T04:47:38Z
format Article
id doaj.art-1040193b618549d78877b8a3e9998565
institution Directory Open Access Journal
issn 2032-9407
language English
last_indexed 2024-12-22T04:47:38Z
publishDate 2020-10-01
publisher European Alliance for Innovation (EAI)
record_format Article
series EAI Endorsed Transactions on Scalable Information Systems
spelling doaj.art-1040193b618549d78877b8a3e99985652022-12-21T18:38:33ZengEuropean Alliance for Innovation (EAI)EAI Endorsed Transactions on Scalable Information Systems2032-94072020-10-0172710.4108/eai.13-7-2018.163503Performance analysis of compression algorithms for information security: A ReviewNeha Sharma0Usha Batra1Research Scholar, G D Goenka University, 122103, Gurugram, Haryana, IndiaAssistant Dean, G D Goenka University, 122103, Gurugram, Haryana, IndiaData compression is a vital part of information security, since compressed data is much more secure and convenient tohandle. Effective data compression technique creates an effective, secure, easy communicable & redundant data. There aretwo types of compression algorithmic techniques: - lossy and lossless. These techniques can be applied to any data formatlike text, audio, video or image file. The primary objective of this study was to analyse data compression techniques usedfor information security techniques like steganography, cryptography etc. Four each, lossy and lossless techniques areimplemented and evaluated on parameters like- file size, saving percentage, time, compression ratio and speed. Detailedanalysis shows that the lossy techniques performs better quantitatively whereas lossless is better qualitatively. However,lossless techniques are more effective as there is no data loss during the process. Among all, Huffman encoding outperformsother algorithms.https://eudl.eu/pdf/10.4108/eai.13-7-2018.163503data compressionhuffman encodinginformation security techniqueslossy techniquesand lossless techniques
spellingShingle Neha Sharma
Usha Batra
Performance analysis of compression algorithms for information security: A Review
EAI Endorsed Transactions on Scalable Information Systems
data compression
huffman encoding
information security techniques
lossy techniques
and lossless techniques
title Performance analysis of compression algorithms for information security: A Review
title_full Performance analysis of compression algorithms for information security: A Review
title_fullStr Performance analysis of compression algorithms for information security: A Review
title_full_unstemmed Performance analysis of compression algorithms for information security: A Review
title_short Performance analysis of compression algorithms for information security: A Review
title_sort performance analysis of compression algorithms for information security a review
topic data compression
huffman encoding
information security techniques
lossy techniques
and lossless techniques
url https://eudl.eu/pdf/10.4108/eai.13-7-2018.163503
work_keys_str_mv AT nehasharma performanceanalysisofcompressionalgorithmsforinformationsecurityareview
AT ushabatra performanceanalysisofcompressionalgorithmsforinformationsecurityareview