[PDF][PDF] A New Approach to Encryption using Huffman Coding

S Gupta, NS Mathur, P Chauhan - International Journal of …, 2016 - academia.edu
In today's world, where Digital Communication is becoming an integral part of everyone's
life, cyber security has become a challenge. There are various threats to the data being sent …

[PDF][PDF] Text encryption with huffman compression

N Sangwan - International Journal of Computer Applications, 2012 - Citeseer
Communication between a sender and receiver needs security. It can be done in any form,
like plain text or binary data. Changing the information to some unidentifiable form, can save …

Text encryption based on Huffman coding and ElGamal cryptosystem

KM Singh, LD Singh, T Tuithung - Recent Patents on …, 2021 - ingentaconnect.com
Background: Data that are in the form of text, audio, image, and video are used everywhere
in our modern scientific world. These data are stored in physical storage, cloud storage and …

Combining Huffman text compression with new double encryption algorithm

N Sangwan - … International Conference on Emerging Trends in …, 2013 - ieeexplore.ieee.org
Information is all over the place. Laptops, computers, mobiles, everything is flooded with it.
As the days pass by, data is tremendously increasing. Hence transferring, saving and …

[PDF][PDF] Implementation in java of a cryptosystem using a dynamic huffman coding and encryption methods

EC Ezin - International Journal of Computer Science and …, 2011 - academia.edu
Data transmission through a secure channel is important in our daily experience with the
objective to ensure that the receiver is the only one authorized and able to discover the …

Hybrid Encryption Scheme (HES): An approach for transmitting secure data over internet

R Singh, I Panchbhaiya, A Pandey… - Procedia Computer …, 2015 - Elsevier
Internet and network application are growing at very fast rate, so the need to protect such
application are increased. This paper solves this problem by proposing two different …

[PDF][PDF] A Review Paper on Data Encryption and Decryption

B Kaushik, V Malik, V Saroha - … for Research in Applied Science & …, 2023 - academia.edu
Cryptography is the technique for hiding data and information from unauthorized users. It is
the art of achieving security by encoding messages to make them non-readable. When we …

[PDF][PDF] Simultaneous data compression and encryption

T SubhamastanRao, M Soujanya, T Hemalatha… - International Journal of …, 2011 - Citeseer
Data compression is known for reducing storage and communication costs. It involves
transforming data of a given format, called source message to data of a smaller sized format …

[PDF][PDF] Proposal to Generate a Various Key from Image for Various Encryption Methods

S Habeeb, E Shakeer - Eng & Tech. Journal, 2013 - iasj.net
There are three basic encryption methods: hashing, symmetric cryptography, and
asymmetric cryptography. Each of these encryption methods have their own uses …

[PDF][PDF] A survey on data compression and cryptographic algorithms

KE Prasetyo, TW Purboyo, RE Saputra - Int. J. Appl. Eng. Res, 2017 - academia.edu
Data security and confidentiality issues are of paramount importance both within an
organization in the form of a commercial (enterprise), a college, a government agency, as …