A Graph Theoretical Preprocessing Step for Text Compression

KK Phukon, HK Baruah - International Journal of Multimedia and …, 2015 - earticle.net
This paper presents CSGM2, a text preprocessing technique for compression purposes. It
converts the original text into a word net (graph representation) and can retain the detailed …

Scalable and highly secured image steganography based on Hopfield chaotic neural network and wavelet transforms

BG Vani, EV Prasad - International Journal of Computer …, 2013 - search.proquest.com
Steganography is the science of communicating in the hidden manner. This paper presents
a robust and secured Image Steganography method capable of embedding high volume of …

Lossless Data Compression Techniques with Block Coding: An explanation

D Mathur, P Mathur - masters.donntu.ru
Data compression is the process of encoding information using fewer bits (or other
information bearing units) than an uuencoded representation would use, through use of …

A Model for Reducing Text Files To 20

SE Adewumi, H Abdu - Proceedings of the 9th International Conference …, 2017 - dl.acm.org
This scheme considers a text file made up of any form of character and then reduces it to
either 20 which is the equivalent of binary 1 or zero (0). Compression starts with the …

[PDF][PDF] Enhanced Security For Hybrid Encryption Strategies With Key Reausability

NR Dodda, KR Kumari - 2017 - academia.edu
Symmetric key cryptography is a common cryptographic technique using the same key at
both the transmitter and receiver side. The main advantage of symmetric key encryption is its …

[PDF][PDF] Efficient Big Data Transfer Technique for Static Routing Networks

I Alhadid, S Khwaldeh, K Kaabneh… - International Journal of …, 2017 - researchgate.net
The era of the networks technology encourages sharing scattered information and
computing capabilities, limited network bandwidth in communication and memory space …

Coalesce of Compression and Encoding in Short Messaging Service Using Lb64

K Valarmathi, V Sathiya, M Maheswari… - Australian Journal of …, 2016 - papers.ssrn.com
Today in the world of mobile communication SMS is one of the fastest growing medium
through which a sender can send message in a short period of time. During the transmission …

Kompresi Data dengan Algoritma LZW pada REST Web Service

AM Jadera - 2016 - repository.uksw.edu
REST Web Service semakin popular digunakan sebagai media pertukaran data antara
perangkat mobile dengan server. Perangkat mobile seperti ponsel berbasis Android sampai …

Lossless Text Compression Technique with LSB Technique to Hide Secret Message inside an Image (CLSB)

H Dagez, HA Al Zaloutee - … of Intelligent Systems and Applications in …, 2015 - dergipark.org.tr
This paper presents CLSB algorithm to improve and increase the security ofhiding message
inside an image by using Least Significant Bit (LSB) method. This research attempts to …

[PDF][PDF] High Capacity Image Steganography Method Using LZW, IWT and Modified Pixel Indicator

S Goel, P Kumar, R Saraswat - Citeseer
This paper presents a novel lossless data hiding approach for hiding the text in color image.
We use integer wavelet transform (IWT), LZW compression and Modified pixel indicator …