Cargando…
An efficient and secure compression technique for data protection using burrows-wheeler transform algorithm
Data stored on physical storage devices and transmitted over communication channels often have a lot of redundant information, which can be reduced through compression techniques to conserve space and reduce the time it takes to transmit the data. The need for adequate security measures, such as sec...
Autores principales: | , , , , , |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
Elsevier
2023
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC10347677/ https://www.ncbi.nlm.nih.gov/pubmed/37457815 http://dx.doi.org/10.1016/j.heliyon.2023.e17602 |
_version_ | 1785073576036007936 |
---|---|
author | Begum, M Baritha Deepa, N. Uddin, Mueen Kaluri, Rajesh Abdelhaq, Maha Alsaqour, Raed |
author_facet | Begum, M Baritha Deepa, N. Uddin, Mueen Kaluri, Rajesh Abdelhaq, Maha Alsaqour, Raed |
author_sort | Begum, M Baritha |
collection | PubMed |
description | Data stored on physical storage devices and transmitted over communication channels often have a lot of redundant information, which can be reduced through compression techniques to conserve space and reduce the time it takes to transmit the data. The need for adequate security measures, such as secret key control in specific techniques, raises concerns about data exposure to potential attacks. Encryption plays a vital role in safeguarding information and maintaining its confidentiality by utilizing a secret key to make the data unreadable and unalterable. The focus of this paper is to tackle the challenge of simultaneously compressing and encrypting data without affecting the efficacy of either process. The authors propose an efficient and secure compression method incorporating a secret key to accomplish this goal. Encoding input data involves scrambling it with a generated key and then transforming it through the Burrows-Wheeler Transform (BWT). Subsequently, the output from the BWT is compressed through both Move-To-Front Transform and Run-Length Encoding. This method blends the cryptographic principles of confusion and diffusion into the compression process, enhancing its performance. The proposed technique is geared towards providing robust encryption and sufficient compression. Experimentation results show that it outperforms other techniques in terms of compression ratio. A security analysis of the technique has determined that it is susceptible to the secret key and plaintext, as measured by the unicity distance. Additionally, the results of the proposed technique showed a significant improvement with a compression ratio close to 90% after passing all the test text files. |
format | Online Article Text |
id | pubmed-10347677 |
institution | National Center for Biotechnology Information |
language | English |
publishDate | 2023 |
publisher | Elsevier |
record_format | MEDLINE/PubMed |
spelling | pubmed-103476772023-07-15 An efficient and secure compression technique for data protection using burrows-wheeler transform algorithm Begum, M Baritha Deepa, N. Uddin, Mueen Kaluri, Rajesh Abdelhaq, Maha Alsaqour, Raed Heliyon Research Article Data stored on physical storage devices and transmitted over communication channels often have a lot of redundant information, which can be reduced through compression techniques to conserve space and reduce the time it takes to transmit the data. The need for adequate security measures, such as secret key control in specific techniques, raises concerns about data exposure to potential attacks. Encryption plays a vital role in safeguarding information and maintaining its confidentiality by utilizing a secret key to make the data unreadable and unalterable. The focus of this paper is to tackle the challenge of simultaneously compressing and encrypting data without affecting the efficacy of either process. The authors propose an efficient and secure compression method incorporating a secret key to accomplish this goal. Encoding input data involves scrambling it with a generated key and then transforming it through the Burrows-Wheeler Transform (BWT). Subsequently, the output from the BWT is compressed through both Move-To-Front Transform and Run-Length Encoding. This method blends the cryptographic principles of confusion and diffusion into the compression process, enhancing its performance. The proposed technique is geared towards providing robust encryption and sufficient compression. Experimentation results show that it outperforms other techniques in terms of compression ratio. A security analysis of the technique has determined that it is susceptible to the secret key and plaintext, as measured by the unicity distance. Additionally, the results of the proposed technique showed a significant improvement with a compression ratio close to 90% after passing all the test text files. Elsevier 2023-06-23 /pmc/articles/PMC10347677/ /pubmed/37457815 http://dx.doi.org/10.1016/j.heliyon.2023.e17602 Text en © 2023 The Authors. Published by Elsevier Ltd. https://creativecommons.org/licenses/by/4.0/This is an open access article under the CC BY license (http://creativecommons.org/licenses/by/4.0/). |
spellingShingle | Research Article Begum, M Baritha Deepa, N. Uddin, Mueen Kaluri, Rajesh Abdelhaq, Maha Alsaqour, Raed An efficient and secure compression technique for data protection using burrows-wheeler transform algorithm |
title | An efficient and secure compression technique for data protection using burrows-wheeler transform algorithm |
title_full | An efficient and secure compression technique for data protection using burrows-wheeler transform algorithm |
title_fullStr | An efficient and secure compression technique for data protection using burrows-wheeler transform algorithm |
title_full_unstemmed | An efficient and secure compression technique for data protection using burrows-wheeler transform algorithm |
title_short | An efficient and secure compression technique for data protection using burrows-wheeler transform algorithm |
title_sort | efficient and secure compression technique for data protection using burrows-wheeler transform algorithm |
topic | Research Article |
url | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC10347677/ https://www.ncbi.nlm.nih.gov/pubmed/37457815 http://dx.doi.org/10.1016/j.heliyon.2023.e17602 |
work_keys_str_mv | AT begummbaritha anefficientandsecurecompressiontechniquefordataprotectionusingburrowswheelertransformalgorithm AT deepan anefficientandsecurecompressiontechniquefordataprotectionusingburrowswheelertransformalgorithm AT uddinmueen anefficientandsecurecompressiontechniquefordataprotectionusingburrowswheelertransformalgorithm AT kalurirajesh anefficientandsecurecompressiontechniquefordataprotectionusingburrowswheelertransformalgorithm AT abdelhaqmaha anefficientandsecurecompressiontechniquefordataprotectionusingburrowswheelertransformalgorithm AT alsaqourraed anefficientandsecurecompressiontechniquefordataprotectionusingburrowswheelertransformalgorithm AT begummbaritha efficientandsecurecompressiontechniquefordataprotectionusingburrowswheelertransformalgorithm AT deepan efficientandsecurecompressiontechniquefordataprotectionusingburrowswheelertransformalgorithm AT uddinmueen efficientandsecurecompressiontechniquefordataprotectionusingburrowswheelertransformalgorithm AT kalurirajesh efficientandsecurecompressiontechniquefordataprotectionusingburrowswheelertransformalgorithm AT abdelhaqmaha efficientandsecurecompressiontechniquefordataprotectionusingburrowswheelertransformalgorithm AT alsaqourraed efficientandsecurecompressiontechniquefordataprotectionusingburrowswheelertransformalgorithm |