2018
DOI: 10.4108/eai.13-7-2018.163503
|View full text |Cite
|
Sign up to set email alerts
|

Performance analysis of compression algorithms for information security: A Review

Abstract: Data compression is a vital part of information security, since compressed data is much more secure and convenient to handle. Effective data compression technique creates an effective, secure, easy communicable & redundant data. There are two types of compression algorithmic techniques:-lossy and lossless. These techniques can be applied to any data format like text, audio, video or image file. The primary objective of this study was to analyse data compression techniques used for information security techniqu… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
7
1

Relationship

0
8

Authors

Journals

citations
Cited by 28 publications
(5 citation statements)
references
References 35 publications
0
5
0
Order By: Relevance
“…Compressing the transmission information can effectively reduce the amount of exchanged data per round given the total rounds unchanged. However, compression algorithms are computation resource-consuming [172]. When applying compression algorithms in FL, we have to balance computational resource and bandwidth usage.…”
Section: Improving the Scalability Of Fl Over Sdnmentioning
confidence: 99%
“…Compressing the transmission information can effectively reduce the amount of exchanged data per round given the total rounds unchanged. However, compression algorithms are computation resource-consuming [172]. When applying compression algorithms in FL, we have to balance computational resource and bandwidth usage.…”
Section: Improving the Scalability Of Fl Over Sdnmentioning
confidence: 99%
“…At this point, we have no answers, and reading this book describing the current state of the art in the field of bio-mineralization will not provide many answers. We will approach the subject by discussing aspects of the bio-mineralization process in relation to the potential key effect mechanisms for different proxies [25]. Molecules can also operate on the morphology of the minerals This situation is especially evident in the silica-based case, which leads to the creation of synthetic materials with well-defined structures, sizes and shapes.…”
Section: Bio Mineralizationmentioning
confidence: 99%
“…Their newly designed healthcare model will assist medical professionals in accurately diagnosing the condition at an earlier stage. The primary goal of [33] is to ensure that their proposed work provides personal care for the patient in the real-time realm while spending as little time as possible doing so. In order to accomplish this, RF classifiers are educated and mapped using the information obtained from IoT sensors.…”
Section: Literature Reviewmentioning
confidence: 99%