[PDF][PDF] Data security using compression and cryptography techniques

R Sharma, S Bollavarapu - International Journal of Computer Applications, 2015 - Citeseer
Data is any type of stored digital information. Security is about the protection of assets. Data
security refers to protective digital privacy measures that are applied to prevent unauthorized …

[PDF][PDF] Encryption based LSB steganography technique for digital images and text data

M Kaur, VK Sharma - International Journal of Advanced Engineering …, 2016 - academia.edu
Digital steganography is the art and science of hiding communications; a steganographic
system thus embeds secret data in public cover media so as not to arouse an …

[PDF][PDF] Data compression considering text files

K Sailunaz, MRA Kotwal, MN Huda - International Journal of …, 2014 - academia.edu
Lossless text data compression is an important field as it significantly reduces storage
requirement and communication cost. In this work, the focus is directed mainly to different file …

[PDF][PDF] Survey of lossless data compression algorithms

H Patel, U Itwala, R Rana… - International Journal of …, 2015 - academia.edu
The main goal of data compression is to decrease redundancy in warehouse or
communicated data, so growing effective data density. It is a common necessary for most of …

[PDF][PDF] Hybrid technique for Arabic text compression

A Awajan, EA Jrai - Glob. J. Comput. Sci. Technol, 2015 - researchgate.net
Princess Sumaya Unversity for Technology, Jordan Abstract-Arabic content on the Internet
and other digital media is increasing exponentially, and the number of Arab users of these …

Design and implementation of lossless compression encoding for high-speed data acquisition and storage

Z Ce, X Hui - 2015 12th IEEE International Conference on …, 2015 - ieeexplore.ieee.org
On the basis of the existing compression coding algorithm, improving LZW algorithm
according to the characteristics of high-speed data acquisition and storage system, making it …

A real-time audit mechanism based on the compression technique

SH Li, DC Yen, YP Chuang - ACM Transactions on Management …, 2016 - dl.acm.org
Log management and log auditing have become increasingly crucial for enterprises in this
era of information and technology explosion. The log analysis technique is useful for …

[PDF][PDF] Performance Analysis of Data Compression Using Lossless Run Length Encoding

R CHETAN, P Hasamukh - Oriental journal of computer …, 2017 - pdfs.semanticscholar.org
In a recent era of modern technology, there are many problems for storage, retrieval and
transmission of data. Data compression is necessary due to rapid growth of digital media …

Image steganography approach based on straight line detection

YMA Abdalnour, AS Huwedi… - 2016 17th International …, 2016 - ieeexplore.ieee.org
Nowadays, organizations in both public and private sectors have become increasingly
dependent on digital communication and electronic data processing; when data is sent over …

Implementing continuous auditing and compression technique in log auditing

J Raja, M Ramakrishnan - 2016 Eighth International …, 2017 - ieeexplore.ieee.org
In recent year, Cloud Computing can act as a next generation architecture for computing
resource over the internet. Traditionally the business organization and enterprise uses cloud …