An efficient secure data compression technique based on chaos and adaptive Huffman coding
- PDF / 1,223,063 Bytes
- 14 Pages / 595.224 x 790.955 pts Page_size
- 105 Downloads / 211 Views
An efficient secure data compression technique based on chaos and adaptive Huffman coding Muhammad Usama1 · Qutaibah M. Malluhi1 · Nordin Zakaria2 · Imran Razzak3 · Waheed Iqbal4 Received: 7 April 2020 / Accepted: 4 August 2020 © The Author(s) 2020
Abstract Data stored in physical storage or transferred over a communication channel includes substantial redundancy. Compression techniques cut down the data redundancy to reduce space and communication time. Nevertheless, compression techniques lack proper security measures, e.g., secret key control, leaving the data susceptible to attack. Data encryption is therefore needed to achieve data security in keeping the data unreadable and unaltered through a secret key. This work concentrates on the problems of data compression and encryption collectively without negatively affecting each other. Towards this end, an efficient, secure data compression technique is introduced, which provides cryptographic capabilities for use in combination with an adaptive Huffman coding, pseudorandom keystream generator, and S-Box to achieve confusion and diffusion properties of cryptography into the compression process and overcome the performance issues. Thus, compression is carried out according to a secret key such that the output will be both encrypted and compressed in a single step. The proposed work demonstrated a congruent fit for real-time implementation, providing robust encryption quality and acceptable compression capability. Experiment results are provided to show that the proposed technique is efficient and produces similar spacesaving (%) to standard techniques. Security analysis discloses that the proposed technique is susceptible to the secret key and plaintext. Moreover, the ciphertexts produced by the proposed technique successfully passed all NIST tests, which confirm that the 99% confidence level on the randomness of the ciphertext. Keywords Security · Secure compression · Encryption · Chaotic map
1 Introduction The aim of securing data during storage or transmission is to increase the resistance level against various security attacks and protect the data from accidental modifications, illegal or unauthorized access [1]. Plenty of efforts were made in data security to overcome security challenges. The work in
This article is part of the Topical Collection: Special Issue on Security of Mobile, Peer-to-peer and Pervasive Services in the Cloud Guest Editors: B. B. Gupta, Dharma P. Agrawal, Nadia Nedjah, Gregorio Martinez Perez, and Deepak Gupta Muhammad Usama
[email protected] 1
Qatar University, Doha, Qatar
2
Universiti Teknologi PETRONAS, Perak, Malaysia
3
Deakin University, Melbourne, Australia
4
University of the Punjab, Lahore, Pakistan
[2] highlights the importance of cryptography to protect data storage and transmission. However, cryptographic systems require high time and space complexity. Moreover, they have various performance and security limitations [3]. Since conventional cryptographic techniques may not fit well into the requirements of m
Data Loading...