Author:
Merlin K ,Pradiksha S ,Deepa Lakshimi B ,Ramya G
Abstract
Data compression and encryption are essential components of information security, facilitating efficient data handling, reduced storage requirements, and secure data transmission. The system presents a novel hybrid data compression algorithm that combines lossy and lossless compression techniques, along with Twofish cryptography. The hybrid approach leverages the strengths of different compression techniques. First, the Huffman coding algorithm is employed to compress textual data efficiently. Subsequently, the cover image undergoes lossy compression using the Discrete Wavelet Transform (DWT) technique. To fortify data security, the Twofish algorithm offers robust and high-level encryption. The encrypted data is then embedded into the compacted cover image using the least significant bit (LSB) technique in a steganographic manner. In the evaluation phase, the system's performance is assessed using key metrics, bits per pixel, mean squared error (MSE), peak signal-to-noise ratio (PSNR), and structural similarity index (SSIM). Comparative analysis with existing methodologies demonstrates the superior performance and methodological efficiency of the system. The results indicate that the hybrid approach strikes a balance between compression efficiency and data security, enabling faster data transmission over limited bandwidth connections and effectively utilizing storage media.
Publisher
Inventive Research Organization
Subject
General Agricultural and Biological Sciences
Reference15 articles.
1. [1] Wahab, Osama Fouad Abdel, Ashraf AM Khalaf, Aziza I. Hussein, and Hesham FA Hamed. "Hiding data using efficient combination of RSA cryptography, and compression steganography techniques." IEEE access 9 (2021): 31805-31815.
2. [2] Y. Boarrios, A. Rodríguez, A. Sáchez, A. Pérez, S. López, A. Otero, E. De La Torre, And R. Sarmiento, ‘‘Lossy hyper spectral image compression on a reconfigurable and fault-tolerant FPGA-based adaptive computing platform’’ Electronics, vol. 9, no. 10, p. 1576, 2020
3. [3] C. Chen, L. Zhang, and R. L. K. Tiong, ‘‘A new lossy compression algorithm for wireless sensor networks using Bayesian predictive coding,’’ Wireless Netw., vol. 26, no.8, pp. 5981–5995, Nov. 2020
4. [4] A. K. Pal, K. Naik and R. Agrawal ‘‘A steganography scheme on JPEG compressed cover image with high embedding capacity,’’ Int. Arab J. Inf. Technol., vol. 16, no. 1, pp. 116–124,2019.
5. [5] Kim, Juyoung, Sooyong Jeong, Dowon Hong, and Namsu Jho. "Improvement of the Efficiency of Neural Cryptography-based Secret Key Exchange Algorithm." IEEE Access (2023).