Evaluation of Huffman and arithmetic algorithms for multimedia compression standards

A Shahbahrami, R Bahrampour, MS Rostami… - arXiv preprint arXiv …, 2011 - arxiv.org
Compression is a technique to reduce the quantity of data without excessively reducing the
quality of the multimedia data. The transition and storing of compressed multimedia data is …

[PDF][PDF] Data security using private key encryption system based on arithmetic coding

A Singh, R Gilhotra - … Journal of Network Security & Its …, 2011 - anthony-claretonwutalobi.com
Problem faced by today's communicators is not only security but also the speed of
communication and size of content. In the present paper, a scheme has been proposed …

A review of contemporary image compression techniques and standards

TJ Shah, MT Banday - Examining Fractal Image Processing and …, 2020 - igi-global.com
Uncompressed multimedia data such as images require huge storage space, processing
power, transmission time, and bandwidth. In order to reduce the storage space, transmission …

Improved JPEG coding by filtering 8× 8 DCT blocks

Y Iqbal, OJ Kwon - Journal of Imaging, 2021 - mdpi.com
The JPEG format, consisting of a set of image compression techniques, is one of the most
commonly used image coding standards for both lossy and lossless image encoding. In this …

[PDF][PDF] Cryptographic techniques in information security

RK Choubey, A Hashmi - Int. J. Sci. Res. Comput. Sci. Eng. Inf …, 2018 - researchgate.net
This paper focuses on the role of cryptography in the information security system and
discussed some of the techniques which are used in cryptography. Earlier, Cryptography …

Hybrid data compression using fuzzy logic and Huffman coding in secure IOT

S Nosratian, M Moradkhani, MB Tavakoli - Iranian Journal of Fuzzy …, 2021 - ijfs.usb.ac.ir
Research in the area of Internet of things (IoT) and cloud computing has gained a
considerable attention in today's world of information technology (IT). Data compression and …

Fuzzy-based reliability prediction model for secure routing protocol using GA and TLBO for implementation of black hole attacks in WSN

S Nosratian, M Moradkhani… - Journal of Circuits …, 2021 - World Scientific
This study manifests a fuzzy-based trust prediction model for detecting malicious nodes in
wireless sensor networks (WSN) by preventing black hole attack. Besides, a new routing …

[PDF][PDF] Performance analysis of image compression using fuzzy logic algorithm

RK Gangwar, M Kumar, AK Jaiswal… - Signal & Image …, 2014 - academia.edu
With the increase in demand, product of multimedia is increasing fast and thus contributes to
insufficient network bandwidth and memory storage. Therefore image compression is more …

[PDF][PDF] Crypto-compression system: an integrated approach using stream cipher cryptography and entropy encoding

B Jasuja, A Pandya - International Journal of Computer …, 2015 - researchgate.net
Problems faced in modern communications are not only just related to security but also
concerned with the communication speed and content size. Now day's networks demand …

A new approach for image compression using efficient coding technique and BPN for medical images

M Rajasekhar Reddy, M Akkshya Deepika… - Proceedings of the …, 2019 - Springer
Medical images produce a digital form of human body pictures. Most of the medical images
contain large volumes of image data that is not used for further analysis. There exists a need …