A DETAILED SURVEY ON TEXT DATA SECURITY
AND COMPRESSION TECHNIQUES USING
HUFFMAN CODING COMPRESSION
AUTHOR
ANU MATTATHOLI
MPhil COMPUTER SCIENCE(FT)
NASC
CO-AUTHOR
DR.N. KAVITHA(HOD)
DEPT. OF CS
NASC
COIMBATORE
OBJECTIVE
 Data Security and Compression is much
helpful for effective data management.
 Compression process saves storage space and
makes easy transmission.
 For text data compression, the best technique
ever used is Huffman Coding.
 It is an optimal technique used in both lossy
and lossless data.
WHAT THIS PAPER IS ABOUT??
 This paper gives you a comprehensive analysis
on existing data compression techniques.
 The analysis focus mainly on Huffman coding,
and also provides direction to solve problems
of such systems.
Index Terms
 Data Compression
 Data Security
 Huffman Coding
 Lossless data Compression
Introduction
 Due to internet applications, digital data flow
became very huge and occupied more storage
space.
 So its difficult to handle data because of this
huge size.
 How this should be overcome???
Continuation…
 Using Data Compression.
 This will be the best way to achieve high
security and can reduce storage space with
less transaction time.
Continuation…
 On which file format data level security can be
performed??
 In text , image, audio, video etc….
 In this paper ,text data security and
compression techniques are analyzed.
Process flow involved……
Block Diagram
Source Data
Multilevel Security
Compression Decompression
Compressed Data
Continuation…
Data Compression
Lossy
Compression
(Most effective)
Lossless
Compression
(Used in this
paper)
Techniques Used for Data Compression
 Both takes stream of symbols and transform into codes.
 The stream code size will determine the effectiveness of
compression.
 If code size is less than original the compression is effective.
Two step process
Modeling
Coding
Continuation…
Lossless data compression
Statistical
Reads single symbol using
probability of character
appearance
Dictionary
based
Uses a single code to replace
string of symbols. Coding
problem is reduced.
Huffman Coding
 Really popular method for effective data
compression.
 Types of Huffman Coding : Adaptive Huffman
Coding, Shannon entropy, Run-length
encoding and so on….
 Uses prefix code generation process.
 Creates a binary tree and generates different
symbols with probability.
Continuation….
 An unique prefix code is assigned to each
symbol.
 Static Huffman Coding reads data twice. One
for initially calculating frequency and next for
reading the content again.
 In Dynamic Huffman coding, it starts with
empty tree and modifies.
 Compression and Decompression change the
tree in a same way that used for compression.
Boon while Using Huffman Coding
 Paper[5],Distributed Data Aggregation Service
have been implemented using Adaptive
Huffman Coding using the authentication
protocol Kerberos.
 It increases the security and ensures that
authorized client is able to access distributed
database.
Continuation…
• Paper[6],Huffman coding improves data
security and reduces the size of high
dimensional data array.
• Paper[7], Lossless methods of Huffman Coding
technique has achieved fast data compression
and converts into confidential data array.
• Paper[8],Bit-stuffing and Huffman coding can
provide high level security and performance
on compression processes.
• It reduces transmission time and bandwidth
utilization.
Curse while using Huffman Coding
 Difficult to execute at some while…
 Sometimes the binary tree implementation
shouldn’t give accurate result.
Conclusion
• The analysis of encoding techniques and tools for
compression is discussed.
• This paper specifically concentrated on Huffman
Coding related works and its drawbacks.
• Survey gives technique for text data.
• Huffman Coding is popular, but execution issues
arises.
• This paper gives idea about such issues in brief.
• From this analysis, an optimal solution can be found.
References
[1] Sayood, Khalid. Introduction to data compression. Morgan Kaufmann, 2017.
[2]Chang, Weiling, Binxing Fang, Xiaochun Yun, and Shupeng Wang. "The block lossless data
compression algorithm." International Journal of Computer Science and Network Security
(IJCSNS) 9, no. 10 (2009): 116.
[3]Sharma, Neha, Jasmeet Kaur, and Navmeet Kaur. "A review on various Lossless text data
compression techniques." International Journal of Engineering Sciences, Issue 2 (2014).
[4]Chau, Savio N., and Ridwan Rashid. "Data compression with Huffman code on multicore
processors." U.S. Patent 9,258,013, issued February 9, 2016.
[5]Gulhane, Suraj, and Sonali Bodkhe. "DDAS using Kerberos with Adaptive Huffman Coding to
enhance data retrieval speed and security." In Pervasive Computing (ICPC), 2015 International
Conference on, pp. 1-6. IEEE, 2015.
[6]Sarkar, Subhra J., Nabendu Kr Sarkar, and Antra Banerjee. "A novel Huffman coding based
approach to reduce the size of large data array." In Circuit, Power and Computing
Technologies (ICCPCT), 2016 International Conference on, pp. 1-5. IEEE, 2016.
[7]Hameed, Maan, Asem Khmag, Fakhrul Zaman, and Abd Rahman Ramli. "A New Lossless
Method of Huffman Coding for Text Data Compression and Decompression Process with
FPGA Implementation." Journal of Engineering and Applied Sciences 100, no. 3 (2016): 402-
407.
[8]Kodabagi, M. M., M. V. Jerabandi, and Nagaraj Gadagin. "Multilevel security and compression
of text data using bit stuffing and huffman coding." In Applied and Theoretical Computing and
Communication Technology (iCATccT), 2015 International Conference on, pp. 800-804. IEEE,
2015.

More Related Content

PDF
Efficient Similarity Search over Encrypted Data
PDF
Duplicate File Analyzer using N-layer Hash and Hash Table
PDF
A Survey: Enhanced Block Level Message Locked Encryption for data Deduplication
PDF
A Survey on Efficient Privacy-Preserving Ranked Keyword Search Method
PDF
A Review on Text Mining in Data Mining
PDF
Using Cisco Network Components to Improve NIDPS Performance
PDF
An efficeient privacy preserving ranked keyword search
PDF
Comparison of Compression Algorithms in text data for Data Mining
Efficient Similarity Search over Encrypted Data
Duplicate File Analyzer using N-layer Hash and Hash Table
A Survey: Enhanced Block Level Message Locked Encryption for data Deduplication
A Survey on Efficient Privacy-Preserving Ranked Keyword Search Method
A Review on Text Mining in Data Mining
Using Cisco Network Components to Improve NIDPS Performance
An efficeient privacy preserving ranked keyword search
Comparison of Compression Algorithms in text data for Data Mining

What's hot (20)

PDF
Implementation of New Modified MD5-512 bit Algorithm for Cryptography
PDF
Boosting the Capacity of Web based Steganography by Utilizing Html Space Code...
PDF
A comparative review on symmetric and asymmetric DNA-based cryptography
PDF
2016 BE Final year Projects in chennai - 1 Crore Projects
PDF
Privacy preserving and delegated access control for cloud applications
PDF
Efficient Association Rule Mining in Heterogeneous Data Base
ODT
Data Deduplication: Venti and its improvements
PDF
Frequency and similarity aware partitioning for cloud storage based on space ...
PDF
Classifying confidential data using SVM for efficient cloud query processing
PDF
B03302007012
PDF
The Royal Split Paradigm: Real-Time Data Fragmentation and Distributed Networ...
PDF
3 ijece 1 ed iqbal qc
PDF
A Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud ...
PPTX
handle data with DHT and load balnce over P2P network
DOCX
Data deduplication and chunking
DOCX
Secure distributed deduplication systems with improved reliability
PDF
IRJET- Cross User Bigdata Deduplication
PDF
Enabling efficient multi keyword ranked
PDF
Ijariie1196
Implementation of New Modified MD5-512 bit Algorithm for Cryptography
Boosting the Capacity of Web based Steganography by Utilizing Html Space Code...
A comparative review on symmetric and asymmetric DNA-based cryptography
2016 BE Final year Projects in chennai - 1 Crore Projects
Privacy preserving and delegated access control for cloud applications
Efficient Association Rule Mining in Heterogeneous Data Base
Data Deduplication: Venti and its improvements
Frequency and similarity aware partitioning for cloud storage based on space ...
Classifying confidential data using SVM for efficient cloud query processing
B03302007012
The Royal Split Paradigm: Real-Time Data Fragmentation and Distributed Networ...
3 ijece 1 ed iqbal qc
A Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud ...
handle data with DHT and load balnce over P2P network
Data deduplication and chunking
Secure distributed deduplication systems with improved reliability
IRJET- Cross User Bigdata Deduplication
Enabling efficient multi keyword ranked
Ijariie1196
Ad

Similar to Presented by Anu Mattatholi (20)

PDF
Huffman and Arithmetic coding - Performance analysis
PDF
12_HuffmanhsjsjsjjsiejjssjjejsjCoding_pdf.pdf
PPTX
Data compression algorithms
PPT
Hufman coding basic
PPTX
Data compression
PDF
Ijrdtvlis11 140006
PPTX
Text compression
PDF
A research paper_on_lossless_data_compre
PDF
Implementation of Lossless Compression Algorithms for Text Data
PDF
F0365046054
PPTX
Huffman Algorithm for File Compression.pptx
PDF
Sunzip user tool for data reduction using huffman algorithm
PPTX
An Efficient encryption using Data compression towards Steganography,introduc...
PPTX
Huffman ppt
PPTX
t.pptx hd gsd unduf jdsnfijnfi bndsfuu ubfuh
PPT
Huffman coding
PPTX
Unit 3 Image Compression and Segmentation.pptx
PPTX
Compression technologies
PPT
Huffman Coding
Huffman and Arithmetic coding - Performance analysis
12_HuffmanhsjsjsjjsiejjssjjejsjCoding_pdf.pdf
Data compression algorithms
Hufman coding basic
Data compression
Ijrdtvlis11 140006
Text compression
A research paper_on_lossless_data_compre
Implementation of Lossless Compression Algorithms for Text Data
F0365046054
Huffman Algorithm for File Compression.pptx
Sunzip user tool for data reduction using huffman algorithm
An Efficient encryption using Data compression towards Steganography,introduc...
Huffman ppt
t.pptx hd gsd unduf jdsnfijnfi bndsfuu ubfuh
Huffman coding
Unit 3 Image Compression and Segmentation.pptx
Compression technologies
Huffman Coding
Ad

Recently uploaded (20)

PPTX
MBA JAPAN: 2025 the University of Waseda
PPT
Image processing and pattern recognition 2.ppt
PPTX
Business_Capability_Map_Collection__pptx
PPTX
New ISO 27001_2022 standard and the changes
PPTX
eGramSWARAJ-PPT Training Module for beginners
PPTX
chuitkarjhanbijunsdivndsijvndiucbhsaxnmzsicvjsd
PDF
Microsoft Core Cloud Services powerpoint
PDF
©️ 02_SKU Automatic SW Robotics for Microsoft PC.pdf
PDF
REAL ILLUMINATI AGENT IN KAMPALA UGANDA CALL ON+256765750853/0705037305
PDF
Tetra Pak Index 2023 - The future of health and nutrition - Full report.pdf
PPTX
chrmotography.pptx food anaylysis techni
PPTX
Machine Learning and working of machine Learning
PPT
PROJECT CYCLE MANAGEMENT FRAMEWORK (PCM).ppt
PPTX
Caseware_IDEA_Detailed_Presentation.pptx
PPT
statistic analysis for study - data collection
PDF
Microsoft 365 products and services descrption
PPTX
FMIS 108 and AISlaudon_mis17_ppt_ch11.pptx
PPTX
IMPACT OF LANDSLIDE.....................
PPT
DU, AIS, Big Data and Data Analytics.ppt
PDF
Session 11 - Data Visualization Storytelling (2).pdf
MBA JAPAN: 2025 the University of Waseda
Image processing and pattern recognition 2.ppt
Business_Capability_Map_Collection__pptx
New ISO 27001_2022 standard and the changes
eGramSWARAJ-PPT Training Module for beginners
chuitkarjhanbijunsdivndsijvndiucbhsaxnmzsicvjsd
Microsoft Core Cloud Services powerpoint
©️ 02_SKU Automatic SW Robotics for Microsoft PC.pdf
REAL ILLUMINATI AGENT IN KAMPALA UGANDA CALL ON+256765750853/0705037305
Tetra Pak Index 2023 - The future of health and nutrition - Full report.pdf
chrmotography.pptx food anaylysis techni
Machine Learning and working of machine Learning
PROJECT CYCLE MANAGEMENT FRAMEWORK (PCM).ppt
Caseware_IDEA_Detailed_Presentation.pptx
statistic analysis for study - data collection
Microsoft 365 products and services descrption
FMIS 108 and AISlaudon_mis17_ppt_ch11.pptx
IMPACT OF LANDSLIDE.....................
DU, AIS, Big Data and Data Analytics.ppt
Session 11 - Data Visualization Storytelling (2).pdf

Presented by Anu Mattatholi

  • 1. A DETAILED SURVEY ON TEXT DATA SECURITY AND COMPRESSION TECHNIQUES USING HUFFMAN CODING COMPRESSION AUTHOR ANU MATTATHOLI MPhil COMPUTER SCIENCE(FT) NASC CO-AUTHOR DR.N. KAVITHA(HOD) DEPT. OF CS NASC COIMBATORE
  • 2. OBJECTIVE  Data Security and Compression is much helpful for effective data management.  Compression process saves storage space and makes easy transmission.  For text data compression, the best technique ever used is Huffman Coding.  It is an optimal technique used in both lossy and lossless data.
  • 3. WHAT THIS PAPER IS ABOUT??  This paper gives you a comprehensive analysis on existing data compression techniques.  The analysis focus mainly on Huffman coding, and also provides direction to solve problems of such systems.
  • 4. Index Terms  Data Compression  Data Security  Huffman Coding  Lossless data Compression
  • 5. Introduction  Due to internet applications, digital data flow became very huge and occupied more storage space.  So its difficult to handle data because of this huge size.  How this should be overcome???
  • 6. Continuation…  Using Data Compression.  This will be the best way to achieve high security and can reduce storage space with less transaction time.
  • 7. Continuation…  On which file format data level security can be performed??  In text , image, audio, video etc….  In this paper ,text data security and compression techniques are analyzed.
  • 8. Process flow involved…… Block Diagram Source Data Multilevel Security Compression Decompression Compressed Data
  • 10. Techniques Used for Data Compression  Both takes stream of symbols and transform into codes.  The stream code size will determine the effectiveness of compression.  If code size is less than original the compression is effective. Two step process Modeling Coding
  • 11. Continuation… Lossless data compression Statistical Reads single symbol using probability of character appearance Dictionary based Uses a single code to replace string of symbols. Coding problem is reduced.
  • 12. Huffman Coding  Really popular method for effective data compression.  Types of Huffman Coding : Adaptive Huffman Coding, Shannon entropy, Run-length encoding and so on….  Uses prefix code generation process.  Creates a binary tree and generates different symbols with probability.
  • 13. Continuation….  An unique prefix code is assigned to each symbol.  Static Huffman Coding reads data twice. One for initially calculating frequency and next for reading the content again.  In Dynamic Huffman coding, it starts with empty tree and modifies.  Compression and Decompression change the tree in a same way that used for compression.
  • 14. Boon while Using Huffman Coding  Paper[5],Distributed Data Aggregation Service have been implemented using Adaptive Huffman Coding using the authentication protocol Kerberos.  It increases the security and ensures that authorized client is able to access distributed database.
  • 15. Continuation… • Paper[6],Huffman coding improves data security and reduces the size of high dimensional data array. • Paper[7], Lossless methods of Huffman Coding technique has achieved fast data compression and converts into confidential data array. • Paper[8],Bit-stuffing and Huffman coding can provide high level security and performance on compression processes. • It reduces transmission time and bandwidth utilization.
  • 16. Curse while using Huffman Coding  Difficult to execute at some while…  Sometimes the binary tree implementation shouldn’t give accurate result.
  • 17. Conclusion • The analysis of encoding techniques and tools for compression is discussed. • This paper specifically concentrated on Huffman Coding related works and its drawbacks. • Survey gives technique for text data. • Huffman Coding is popular, but execution issues arises. • This paper gives idea about such issues in brief. • From this analysis, an optimal solution can be found.
  • 18. References [1] Sayood, Khalid. Introduction to data compression. Morgan Kaufmann, 2017. [2]Chang, Weiling, Binxing Fang, Xiaochun Yun, and Shupeng Wang. "The block lossless data compression algorithm." International Journal of Computer Science and Network Security (IJCSNS) 9, no. 10 (2009): 116. [3]Sharma, Neha, Jasmeet Kaur, and Navmeet Kaur. "A review on various Lossless text data compression techniques." International Journal of Engineering Sciences, Issue 2 (2014). [4]Chau, Savio N., and Ridwan Rashid. "Data compression with Huffman code on multicore processors." U.S. Patent 9,258,013, issued February 9, 2016. [5]Gulhane, Suraj, and Sonali Bodkhe. "DDAS using Kerberos with Adaptive Huffman Coding to enhance data retrieval speed and security." In Pervasive Computing (ICPC), 2015 International Conference on, pp. 1-6. IEEE, 2015. [6]Sarkar, Subhra J., Nabendu Kr Sarkar, and Antra Banerjee. "A novel Huffman coding based approach to reduce the size of large data array." In Circuit, Power and Computing Technologies (ICCPCT), 2016 International Conference on, pp. 1-5. IEEE, 2016. [7]Hameed, Maan, Asem Khmag, Fakhrul Zaman, and Abd Rahman Ramli. "A New Lossless Method of Huffman Coding for Text Data Compression and Decompression Process with FPGA Implementation." Journal of Engineering and Applied Sciences 100, no. 3 (2016): 402- 407. [8]Kodabagi, M. M., M. V. Jerabandi, and Nagaraj Gadagin. "Multilevel security and compression of text data using bit stuffing and huffman coding." In Applied and Theoretical Computing and Communication Technology (iCATccT), 2015 International Conference on, pp. 800-804. IEEE, 2015.