2019 IEEE 4th International Conference on Computer and Communication Systems (ICCCS) 2019
DOI: 10.1109/ccoms.2019.8821637
|View full text |Cite
|
Sign up to set email alerts
|

Analysis of Encryption and Lossless Compression Techniques for Secure Data Transmission

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
4
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 7 publications
(4 citation statements)
references
References 12 publications
0
4
0
Order By: Relevance
“…Ultimately, this taxonomy improves the clarity and accessibility of data reduction techniques, facilitating their evaluation and selection for specific data management and analysis purposes. In the proposed taxonomy, data reduction approaches are divided into two main categories:  Lossless data reduction techniques [14,21,22]: these focus on identifying redundancies, patterns, and other inherent characteristics within the data to eliminate or minimize unnecessary and repetitive information. Reducing the data size without any loss is remarkable.…”
Section: Proposed Taxonomymentioning
confidence: 99%
See 1 more Smart Citation
“…Ultimately, this taxonomy improves the clarity and accessibility of data reduction techniques, facilitating their evaluation and selection for specific data management and analysis purposes. In the proposed taxonomy, data reduction approaches are divided into two main categories:  Lossless data reduction techniques [14,21,22]: these focus on identifying redundancies, patterns, and other inherent characteristics within the data to eliminate or minimize unnecessary and repetitive information. Reducing the data size without any loss is remarkable.…”
Section: Proposed Taxonomymentioning
confidence: 99%
“…Lossless data reduction techniques [14,21,22]: these focus on identifying redundancies, patterns, and other inherent characteristics within the data to eliminate or minimize unnecessary and repetitive information. Reducing the data size without any loss is remarkable.…”
mentioning
confidence: 99%
“…Figure 2: Run-length encoding for two symbols (Souley et. al, 2014) In this algorithm, repeated pixel can be substituted by a number that indicate which pixel value is repeated and how many times it is repeated (Singh and Devgon, 2019). The occurrence of 0 and 1 in sequence counts.…”
Section: Run Length Encoding (Rle)mentioning
confidence: 99%
“…Compression ratio (CR) [32] is the ratio of the size of the file post compression, compared to the original file and is mathematically expressed in eq (21). CR is used to determine the efficiency of the compression, higher the CR better the compression [18].…”
Section: Compression Ratiomentioning
confidence: 99%