SlideShare a Scribd company logo
1 of 6
Download to read offline
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 02 Special Issue: 02 | Dec-2013, Available @ http://www.ijret.org 14
BURROWS WHEELER BASED DATA COMPRESSION AND SECURE
TRANSMISSION
M.P.Bhuyan1
, V.Deka2
, S.Bordoloi3
1
Department of Information Technology, Gauhati University
2
Department of Information Technology, Gauhati University
3
Department of Computer Applications, Assam Engineering College
Abstract
Now days, computer technology mostly focusing on storage space and speed With the rapid growing of important data and increased
number of applications, devising new approach for efficient compression and encryption methods are playing a vital role in
performance. In this work, burrows wheeler transformation is introduced for pre processing of the input data and made several
performance analysis experiments over different compression techniques for various types of text files and improved compression
ratio has been found by applying burrows wheeler transform as pre-processing step.
Keywords: RLE, arithmetic, Huffman, LZW, lossless data compression.
----------------------------------------------------------------------***--------------------------------------------------------------------
1. INTRODUCTION
It is seen that day by day amount data increases, so it becomes
necessary to optimize the storage space for efficient utilization.
In lossy compression methods, during the decompression
process it is not possible to recover the original file. To
overcome this difficulty we need lossless data compression
technique. Use of lossless data compression technique
reconstructs the original file as it was before the compression.
Lossless data compression is an important compression
technique to compress text files, because removal of much
redundancy in text files causes the change in meaning of the
original data or text. Burrows Wheeler Transform is widely used
in all over the world for lossless data compression [1]. People
have devoted lots of time in innovating new techniques for the
enhancement of lossless data compression algorithm. We will
try to use Burrows Wheeler transform in lossless image
compression and if possible special care can be taken. Further if
possible, we will try to use the technique in the compression of
other kind of files like audio or video files. The rest of the paper
is organized as follows: Section 2 presents a brief explanation
about Burrows Wheeler Transformation; Section 3 discusses
about some existing lossless data compression algorithms,
Section 4 reflects the challenges of combining cryptography and
compression and the cryptographic algorithm, Section 5 has its
focus on comparing the performance of different lossless data
compression algorithms, finally, section 6 concludes the work
and section 7 proposes the future work.
2. BURROWS WHEELER TRANSFORM
Burrows Wheeler Transform is a transformation technique first
introduced in 1994[6], which is the unpublished work by
Wheeler in 1983. The fundamental concept behind this
technique is that when a text file or a character string is
transformed the size of the string does not change. The
transformation only permutes the string into n permutations,
where n is the total number of characters in the string. After
performing Burrows Wheeler Transform new transformed string
can be compressed easily with compression method like run
length encoding. In addition, if move to front encoding is
applied to the transformed data then it can be compressed quite
efficiently.
2.1 The Forward Transform
Consider a string p= dckdacm.
Step1: The original sequence p is copied to the first row, also
referred to as index 0. The sequence is then sorted with all left
cyclic permutations into each next index row. The step 1 of the
BWT is presented in Table 2.1.1
Step2: The rows are sorted lexicographically then from this
output sequences. The step 2 of the BWT is shown in Table
2.1.2. Step 3 is the final step of the BWT process consisting of
output of the BWT and the final index.
Step3: The original sequence p= dckdacm appears in the fifth
row of Table 2.1.2, and the output of the BWT transform is the
last column, indicated by L = ddakmcc which is shown in
table2.1.3.
With the index = 4, the result can be written as BWT = [index,
L], where L is the output of the Burrows-Wheeler transform and
index indicates the location of the original sequence in the
lexicographically ordered sequence. We also determine the first
column F = accddkm, which can be obtained from L by sorting
which is required reverse transform of the BWT.
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 02 Special Issue: 02 | Dec-2013, Available @ http://www.ijret.org 15
Table 2.1.1 step1 of BWT with all cyclic permutations
Index Step1 Output
0 dckdacm
1 ckdacmd
2 kdacmdc
3 dacmdck
4 acmdckd
5 cmdckda
6 mdckdac
Table 2.1.2 step2 of BWT rows of step1 are lexicographically
sorted
Index Step3 Output
0 d
1 d
2 a
3 k
4 m
5 c
6 c
Table 2.1.3 step3 of BWT contains last character of each row of
step1
Index Step2 Output
0 acmdckd
1 ckdacmd
2 cmdckda
3 dacmdck
4 dckdacm
5 kdacmdc
6 mdckdac
2.2 The Reverse Burrows-Wheeler Transform:
The BWT is a reversible transformation which can recover the
original sequence from the BWT output sequence. In reverse
transform only the BWT output sequence L and index are
needed for reconstructing the original sequence. To solve the
reverse BWT using output of the BWT, L and index, the reverse
BWT is presented in Table 2.2.1.
Input (ddakmcc, index=4).
Output=dckdacm
Table 2.2.1 Step1 of reverse BWT
Index Reverse
BWT
input
Previous
combine
Sort New combine
(BWT i/p+
Sort)
0 d Φ a da
1 d Φ c dc
2 a Φ c ac
3 k Φ d kd
4 m Φ d md
5 c Φ k ck
6 c Φ m cm
Table 2.2.2 Step2 of reverse BWT
Index Reverse
BWT
input
Previous
combine
Sort New combine
(BWT i/p+
Sort)
0 d da ac dac
1 d dc ck dck
2 a ac cm acm
3 k kd da kda
4 m md dc mdc
5 c ck kd ckd
6 c cm md cmd
Table 2.2.3 Step3 of reverse BWT
Index Reverse
BWT
input
Previous
combine
Sort New combine
(BWT i/p+
Sort)
0 d dac acm dacm
1 d dck ckd dckd
2 a acm cmd acmd
3 k kda dac kdac
4 m mdc dck mdck
5 c ckd kda ckda
6 c cmd mdc cmdc
Table 2.2.4 Step4 of reverse BWT
Index Reverse
BWT
input
Previous
combine
Sort New combine
(BWT i/p+
Sort)
0 d dac acm dacm
1 d dck ckd dckd
2 a acm cmd acmd
3 k kda dac kdac
4 m mdc dck mdck
5 c ckd kda ckda
6 c cmd mdc cmdc
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 02 Special Issue: 02 | Dec-2013, Available @ http://www.ijret.org 16
Table 2.2.5 Step5 of reverse BWT
Ind
ex
Reverse
BWT
input
Previous
combine
Sort New
combine
(BWT i/p+
Sort)
0 d dacmd acmdc dacmdc
1 d dckda ckdac dckdac
2 a acmdc cmdck acmdck
3 k kdacm dacmd kdacmd
4 m mdckd dckda mdckda
5 c ckdac kdacm ckdacm
6 c cmdck mdckd cmdckd
Table 2.2.6 Step6 of reverse BWT
Inde
x
Reverse
BWT
input
Previous
combine
Sort New combine
(BWT i/p+
Sort)
0 d dacmdc acmdck acmdckd
1 d dckdac ckdacm ckdacmd
2 a acmdck cmdckd cmdckda
3 k kdacmd dacmdc dacmdck
4 m mdckda dckdac dckdacm
5 c ckdacm kdacmd kdacmdc
6 c cmdckd mdckda mdckdac
Burrows Wheeler transformation is used in various field of
research from the beginning of its invention, it is seen that the
importance of Burrows Wheeler Transform is increased day by
day. It is widely used as a pre processing stage in lossless data
compression. BWT is used to compress DNA sequencing in the
field of bioinformatics. Research is going on to compress the
medical information or some astronomical images. Due to the
efficiency of BWT, researchers from various backgrounds are
attracted to this technique and use this technique to optimize
their resources. So many people try to improve the BWT
technique for better processing in their own fields. In the
coming days, this technique may overcome the deficiency of
storage space.
3. SOME LOSSLESS DATA COMPRESSION
ALGORITHMS
3.1 Run Length Encoding
Run Length Encoding (RLE) compression technique is used
when a given file contains too many redundant data or long run
of similar characters. The repeated string or characters present
in the input file or message is called a run which is encoded into
two bytes. The first byte represents the value of the character in
the run and the second byte contains the number of times given
character appears in the run. For example the following string
can be represented in RLE as
ZZZZZZkkkHHHHHttt
Z6k3H5t3
3.2 Huffman Coding
Huffman coding is a data compression technique in which each
input character is replaced with variable length binary digits
which are called codeword and the codeword has been derived
in a particular way based on the probability of occurrence of
each symbol or character. The most frequent symbols in the
source have the shortest length code and the least frequent
symbol has the longest code. This technique is implemented by
creating a binary tree of nodes. These can be stored in data
structures like array or link list, the size of which depends on the
number of symbols, n.
3.2 Arithmetic Coding
The arithmetic coding concept is to have a probability value 0 to
1, and assign to every symbol a range in between 0 and 1 based
on its probability, higher the probability, higher is the range.
Once we have defined the ranges and the probability, encoding
of symbols can be started, every symbol in encoding process
gives us a new floating point range to encode the next symbol.
3.4 LZW Coding
This is a dictionary based compression algorithm which is
implemented by depending on a dictionary. A dictionary is a
collection of some possible words of a particular language and
is stored in tabular fashion, some indexes are used to represent
repeating symbols. In Lempel-Ziv Welch algorithm or LZW,
one kind dictionary is used to store the symbols. In the
compression process, the index values are used in place of the
similar repeated strings or symbols. Creation of dictionary is a
dynamic process, so it is not transferred with the encoded data,
during decompression the dictionary is created automatically.
4. CHALLENGES OF COMBINING COMPRE-
SSION AND CRYPTOGRAPHY AND THE
CRYPTOGRAPHIC ALOGORITHM USED IN THIS
ANALYSIS
Most of the powerful cryptographic algorithms increase size
after encryption and if we modify the algorithm then strength of
the algorithm decreases. So we need algorithms of the type
stream cipher, substitution cipher etc. One substitution type
algorithm is given below.
Encryption Algorithm:
Step 1: Input Text (T)
Step 2: Check ASCII value of each character
Step 3: If (Character (ASCII value)>127)
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 02 Special Issue: 02 | Dec-2013, Available @ http://www.ijret.org 17
ASCII value=255-ASCII value of the character
Else
ASCII value=127+ASCII value of the character
Step 4: Now print the corresponding character of the ASCII
value in ENCRYPT.txt file.
Decryption Algorithm:
Step1: Check each character of the file ENCRYPT.txt
Step 2: If (Character (ASCII value)>127)
ASCII value= ASCII value-127
Else
ASCII value=255-ASCII value of the character
Step 3: Now print the corresponding character of the ASCII
value in DECRYPT.txt.
5. PERFORMANCE ANALYSIS
The performance analysis of the compression algorithms are
done for different text files of different size. Comparison is done
in terms of compression ratio which is the ratio of the size of
file after compression to the size of file before compression. The
comparison is also shown graphically. Text files of different
size with different characters have been taken and then
compression is done in MATLAB for the different compression
algorithms. The results are shown in the table 5.1 and 5.2. The
following charts showing the comparison graphically for
different algorithms with respect to different text files.
Fig 5.1 Comparison of compressed files in Arithmetic Coding
Fig 5.2 Comparison of compressed files in Huffman Coding
Fig 5.3 Comparison of compressed files in Run Length
Encoding
Fig 5.4 Comparison of compressed files in LZW Coding
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 02 Special Issue: 02 | Dec-2013, Available @ http://www.ijret.org 18
Fig 5.5 Comparison of Average Compression ratio of different
algorithms
From the analysis it is seen that RLE compression has shown
drastic improvement and LZW has shown a little improvement
in the compression ratio after preprocessing with Burrows
Wheeler Transform and encryption. Though the other
compression algorithms have not shown much improvement in
compression ratio after preprocessing with Burrows Wheeler
Transform For the time being RLE has performed much better
with pre-processing with Burrows Wheeler Transform and
encryption.
6. CONCLUSIONS
After doing a detail study on different compression algorithms it
is seen that RLE shows a great improvement on compression
ratio after preprocessing with Burrows Wheeler Transformation.
With these results we can conclude that the combination of
Burrows Wheeler Transform and RLE gives us a best
compression method for lossless data compression.
FUTURE WORK
In future it is possible to apply the same technique to compress
image, audio and video files etc. It is possible to make the
encryption process powerful by using some powerful algorithms
like Blowfish, RC5 etc.
REFERENCES
[1]. B. Balkenhol and S Kurtz. Universal Data Compression
Based on the Burrows-Wheeler Transformation: Theory and
Practice. IEEE transactions on Computers,49(10):1043-1053,
October 2000.
[2]. J. Abel. Improvements to the Burrows-Wheeler
Compression Algorithm: After Bwt Stages. In ACM Trans.
Computer Systems, May 2003
[3]. M. Burrows and D. J. Wheeler. A Block-Sorting Lossless
Data Compression Algorithm Tech. Rep. 124, Digital Systems
Re-search Centre, 1994.
[4]. M. Nelson. Data Compression With the Burrows-Wheeler
Transform. In Dr. Dobbs Journal,, pages 746-751, September
1996.
[5]. Bitla Srinivas and V K Govindan. A Modified Approach to
the New Lossless Data Compression Method International
Journal of Computer Communication Technology (IJCCT),
2(7):44-48, 2011.
[6]. C. Sidney Bums Haitao Guo. Waveform and Image
Compression Using the Burrows Wheeler Transform and the
Wavelet Transform Proceedings, International Conference on
Image Processing, 1:65-68, 1997.
[7]. J. Ziv and A. Lempel. A Universal Algorithm for Sequential
Data Compression IEEE Transactions on Information Theory
IT-23(3):337-343, May 1977.
[8]. K. Holtz and E. Holtz. Lossless Data Compression
Techniques WESCON/94 Conference, Session W23, Advanced
Information Management, Anaheim Convention Centre,
Anaheim, California,, pages 1043-1053, September 1994.
[9]. J. Gilchrist and A. Cuhadar. Parallel Lossless Data
Compression Based on Burrows-Wheeler Transform. 1st
International Conference on Advanced Networking and
Applications (AINA'07), pages 1043-1053, May 2007
[10]. J. Ziv and A. Lempel. Compression of Individual
Sequences Via Variable Rate Coding. IEEE Transactions on
Information Theory, IT- 24(5):530-535, September 1978.
[11]. R.E. Tarjan J.L. Bentley, D.D. Sleator and V.K. Wei. A
Locally Adaptive Data Compression Algorithm
Communications of the ACM, 29(4):320-330, April 1986.
[12]. DI Michael Schindler. A Fast BlockSorting Algorithm for
Lossless Data Compression
[13]. Jer Min Jou and Pei-Yin Chen. A Fast and Efficient
Lossless Data Compression Method IEEE TRANSACTIONS
ON COMMUNICATIONS, 47(9), September 1999.
[14]. M. Effros. Universal Lossless Source Coding With the
Burrows Wheeler Transform. Data Compression Conf.,
Snowbird, UT, pages 178-187, March 1999
[15]. Guy E. Blelloch. Introduction to Data Compression.
Computer Science Department, Carnegie Mellon University,
September 2010.
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 02 Special Issue: 02 | Dec-2013, Available @ http://www.ijret.org 19
Table 5.1 Size of different files before and after compression and their compression ratio
File Original
Size(bytes)
Compressed Size(bytes) Compression ratio
Arithmetic Huffman RLE LZW Arithmetic Huffman RLE LZW
File1 134 70 71 127 105 52.52 53.00 94.78 78.36
File2 298 90 92 293 120 30.45 30.87 98.32 40.27
File3 452 251 250 435 296 55.37 55.30 96.24 65.48
File4 892 530 534 810 489 59.47 59.86 90.81 54.82
File5 1092 468 469 611 396 42.86 42.95 55.95 36.26
File6 1937 1300 1308 1856 1059 67.12 67.53 95.82 54.67
File7 2861 1859 1868 2539 1242 64.99 65.29 88.75 43.41
File8 25210 14419 14496 24752 11518 57.40 57.71 98.53 45.69
File9 42080 19360 19688 40232 13099 46.00 46.79 95.61 31.13
File10 50464 22439 22864 49544 15321 44.47 45.31 98.18 30.36
File11 60456 38006 38272 55912 24031 62.87 63.31 92.48 39.75
Avg. 16897.82 8981.09 9082.91 16101.00 6152.36 53.05 53.45 91.41 47.29
Table 5.2 Size of different files before and after compression and their compression ratio after preprocessing with BWT and
encryption
File Original
Size(bytes)
Compressed Size(bytes) Compression ratio
Arithmetic Huffman RLE LZW Arithmetic Huffman RLE LZW
File1 134 70 71 46 108 52.61 52.98 34.32 80.60
File2 298 91 92 88 112 30.49 30.87 29.53 37.58
File3 452 251 250 128 299 55.34 55.30 28.31 66.15
File4 892 530 534 240 468 59.49 59.86 26.90 52.47
File5 1092 469 471 324 369 42.88 43.05 29.67 33.79
File6 1937 1301 1309 689 970 67.13 67.51 35.57 50.08
File7 2861 1859 1868 1120 1145 64.99 65.29 39.15 40.02
File8 25210 14412 14488 6626 9865 57.37 57.68 26.28 39.13
File9 42080 19359 19688 10256 11698 46.01 46.79 24.37 27.80
File10 50464 22430 22864 17440 14493 44.44 45.31 34.56 28.72
File11 60456 38003 38264 19769 19847 62.86 63.29 32.70 32.83
Avg. 16897.82 8979.55 9081.73 5156.91 5397.64 53.06 53.45 31.03 44.47

More Related Content

What's hot

Implementation of cyclic convolution based on fnt
Implementation of cyclic convolution based on fntImplementation of cyclic convolution based on fnt
Implementation of cyclic convolution based on fnteSAT Publishing House
 
30387 30113-1-pb
30387 30113-1-pb30387 30113-1-pb
30387 30113-1-pbRam Babu
 
FPGA Implementation of Mix and Inverse Mix Column for AES Algorithm
FPGA Implementation of Mix and Inverse Mix Column for AES AlgorithmFPGA Implementation of Mix and Inverse Mix Column for AES Algorithm
FPGA Implementation of Mix and Inverse Mix Column for AES Algorithmijsrd.com
 
A Block Cipher Based Cryptosystem through Modified Forward Backward Overlappe...
A Block Cipher Based Cryptosystem through Modified Forward Backward Overlappe...A Block Cipher Based Cryptosystem through Modified Forward Backward Overlappe...
A Block Cipher Based Cryptosystem through Modified Forward Backward Overlappe...IOSR Journals
 
Design and Implementation A different Architectures of mixcolumn in FPGA
Design and Implementation A different Architectures of mixcolumn in FPGADesign and Implementation A different Architectures of mixcolumn in FPGA
Design and Implementation A different Architectures of mixcolumn in FPGAVLSICS Design
 
Multiplier and Accumulator Using Csla
Multiplier and Accumulator Using CslaMultiplier and Accumulator Using Csla
Multiplier and Accumulator Using CslaIOSR Journals
 
Design and Implementation of High Speed Area Efficient Double Precision Float...
Design and Implementation of High Speed Area Efficient Double Precision Float...Design and Implementation of High Speed Area Efficient Double Precision Float...
Design and Implementation of High Speed Area Efficient Double Precision Float...IOSR Journals
 
FPGA Based Implementation of AES Encryption and Decryption with Low Power Mul...
FPGA Based Implementation of AES Encryption and Decryption with Low Power Mul...FPGA Based Implementation of AES Encryption and Decryption with Low Power Mul...
FPGA Based Implementation of AES Encryption and Decryption with Low Power Mul...IOSRJECE
 
A high speed tree-based 64-bit cmos binary comparator
A high speed tree-based 64-bit cmos binary comparatorA high speed tree-based 64-bit cmos binary comparator
A high speed tree-based 64-bit cmos binary comparatoreSAT Publishing House
 
Ijarcet vol-2-issue-7-2357-2362
Ijarcet vol-2-issue-7-2357-2362Ijarcet vol-2-issue-7-2357-2362
Ijarcet vol-2-issue-7-2357-2362Editor IJARCET
 
Fpga implementation of (15,7) bch encoder and decoder
Fpga implementation of (15,7) bch encoder and decoderFpga implementation of (15,7) bch encoder and decoder
Fpga implementation of (15,7) bch encoder and decodereSAT Publishing House
 
Modified Golomb Code For Integer Representation
Modified Golomb Code For Integer RepresentationModified Golomb Code For Integer Representation
Modified Golomb Code For Integer RepresentationIJSRD
 
Enhancement of DES Algorithm with Multi State Logic
Enhancement of DES Algorithm with Multi State LogicEnhancement of DES Algorithm with Multi State Logic
Enhancement of DES Algorithm with Multi State LogicIJORCS
 

What's hot (14)

Implementation of cyclic convolution based on fnt
Implementation of cyclic convolution based on fntImplementation of cyclic convolution based on fnt
Implementation of cyclic convolution based on fnt
 
30387 30113-1-pb
30387 30113-1-pb30387 30113-1-pb
30387 30113-1-pb
 
FPGA Implementation of Mix and Inverse Mix Column for AES Algorithm
FPGA Implementation of Mix and Inverse Mix Column for AES AlgorithmFPGA Implementation of Mix and Inverse Mix Column for AES Algorithm
FPGA Implementation of Mix and Inverse Mix Column for AES Algorithm
 
A Block Cipher Based Cryptosystem through Modified Forward Backward Overlappe...
A Block Cipher Based Cryptosystem through Modified Forward Backward Overlappe...A Block Cipher Based Cryptosystem through Modified Forward Backward Overlappe...
A Block Cipher Based Cryptosystem through Modified Forward Backward Overlappe...
 
Design and Implementation A different Architectures of mixcolumn in FPGA
Design and Implementation A different Architectures of mixcolumn in FPGADesign and Implementation A different Architectures of mixcolumn in FPGA
Design and Implementation A different Architectures of mixcolumn in FPGA
 
Multiplier and Accumulator Using Csla
Multiplier and Accumulator Using CslaMultiplier and Accumulator Using Csla
Multiplier and Accumulator Using Csla
 
Design and Implementation of High Speed Area Efficient Double Precision Float...
Design and Implementation of High Speed Area Efficient Double Precision Float...Design and Implementation of High Speed Area Efficient Double Precision Float...
Design and Implementation of High Speed Area Efficient Double Precision Float...
 
40120130406011 2-3
40120130406011 2-340120130406011 2-3
40120130406011 2-3
 
FPGA Based Implementation of AES Encryption and Decryption with Low Power Mul...
FPGA Based Implementation of AES Encryption and Decryption with Low Power Mul...FPGA Based Implementation of AES Encryption and Decryption with Low Power Mul...
FPGA Based Implementation of AES Encryption and Decryption with Low Power Mul...
 
A high speed tree-based 64-bit cmos binary comparator
A high speed tree-based 64-bit cmos binary comparatorA high speed tree-based 64-bit cmos binary comparator
A high speed tree-based 64-bit cmos binary comparator
 
Ijarcet vol-2-issue-7-2357-2362
Ijarcet vol-2-issue-7-2357-2362Ijarcet vol-2-issue-7-2357-2362
Ijarcet vol-2-issue-7-2357-2362
 
Fpga implementation of (15,7) bch encoder and decoder
Fpga implementation of (15,7) bch encoder and decoderFpga implementation of (15,7) bch encoder and decoder
Fpga implementation of (15,7) bch encoder and decoder
 
Modified Golomb Code For Integer Representation
Modified Golomb Code For Integer RepresentationModified Golomb Code For Integer Representation
Modified Golomb Code For Integer Representation
 
Enhancement of DES Algorithm with Multi State Logic
Enhancement of DES Algorithm with Multi State LogicEnhancement of DES Algorithm with Multi State Logic
Enhancement of DES Algorithm with Multi State Logic
 

Viewers also liked

Comparison of various noise mitigation technique used
Comparison of various noise mitigation technique usedComparison of various noise mitigation technique used
Comparison of various noise mitigation technique usedeSAT Publishing House
 
Experimental behavior of circular hsscfrc filled steel
Experimental behavior of circular hsscfrc filled steelExperimental behavior of circular hsscfrc filled steel
Experimental behavior of circular hsscfrc filled steeleSAT Publishing House
 
Software security risk mitigation using object
Software security risk mitigation using objectSoftware security risk mitigation using object
Software security risk mitigation using objecteSAT Publishing House
 
Finite element analysis of a floating rectangular plate
Finite element analysis of a floating rectangular plateFinite element analysis of a floating rectangular plate
Finite element analysis of a floating rectangular plateeSAT Publishing House
 
Importance of post processing for improved binarization of text documents
Importance of post processing for improved binarization of text documentsImportance of post processing for improved binarization of text documents
Importance of post processing for improved binarization of text documentseSAT Publishing House
 
Nanoparticle based charge trapping memory device applying mos technology a co...
Nanoparticle based charge trapping memory device applying mos technology a co...Nanoparticle based charge trapping memory device applying mos technology a co...
Nanoparticle based charge trapping memory device applying mos technology a co...eSAT Publishing House
 
Comparison of data security in grid and cloud
Comparison of data security in grid and cloudComparison of data security in grid and cloud
Comparison of data security in grid and cloudeSAT Publishing House
 
Photocatalytic decomposition of isolan black by tio2,
Photocatalytic decomposition of isolan black by tio2,Photocatalytic decomposition of isolan black by tio2,
Photocatalytic decomposition of isolan black by tio2,eSAT Publishing House
 
An extended database reverse engineering – a key for database forensic invest...
An extended database reverse engineering – a key for database forensic invest...An extended database reverse engineering – a key for database forensic invest...
An extended database reverse engineering – a key for database forensic invest...eSAT Publishing House
 
Design of c slotted microstrip antenna using
Design of c slotted microstrip antenna usingDesign of c slotted microstrip antenna using
Design of c slotted microstrip antenna usingeSAT Publishing House
 
Building extraction from remote sensing imageries by data fusion techniques
Building extraction from remote sensing imageries by data fusion techniquesBuilding extraction from remote sensing imageries by data fusion techniques
Building extraction from remote sensing imageries by data fusion techniqueseSAT Publishing House
 
Design and operation of synchronized robotic arm
Design and operation of synchronized robotic armDesign and operation of synchronized robotic arm
Design and operation of synchronized robotic armeSAT Publishing House
 
An analytical study on test standards for assessment
An analytical study on test standards for assessmentAn analytical study on test standards for assessment
An analytical study on test standards for assessmenteSAT Publishing House
 
Mapping of genes using cloud technologies
Mapping of genes using cloud technologiesMapping of genes using cloud technologies
Mapping of genes using cloud technologieseSAT Publishing House
 
Enhancing security of caesar cipher using different
Enhancing security of caesar cipher using differentEnhancing security of caesar cipher using different
Enhancing security of caesar cipher using differenteSAT Publishing House
 
Analysis of problems of biomass grinder integrated
Analysis of problems of biomass grinder integratedAnalysis of problems of biomass grinder integrated
Analysis of problems of biomass grinder integratedeSAT Publishing House
 
Sdci scalable distributed cache indexing for cache consistency for mobile env...
Sdci scalable distributed cache indexing for cache consistency for mobile env...Sdci scalable distributed cache indexing for cache consistency for mobile env...
Sdci scalable distributed cache indexing for cache consistency for mobile env...eSAT Publishing House
 
Experimenal investigation of performance and
Experimenal investigation of performance andExperimenal investigation of performance and
Experimenal investigation of performance andeSAT Publishing House
 
Comparison of symmetrical and asymmetrical cascaded
Comparison of symmetrical and asymmetrical cascadedComparison of symmetrical and asymmetrical cascaded
Comparison of symmetrical and asymmetrical cascadedeSAT Publishing House
 
Degradation of mono azo dye in aqueous solution using
Degradation of mono azo dye in aqueous solution usingDegradation of mono azo dye in aqueous solution using
Degradation of mono azo dye in aqueous solution usingeSAT Publishing House
 

Viewers also liked (20)

Comparison of various noise mitigation technique used
Comparison of various noise mitigation technique usedComparison of various noise mitigation technique used
Comparison of various noise mitigation technique used
 
Experimental behavior of circular hsscfrc filled steel
Experimental behavior of circular hsscfrc filled steelExperimental behavior of circular hsscfrc filled steel
Experimental behavior of circular hsscfrc filled steel
 
Software security risk mitigation using object
Software security risk mitigation using objectSoftware security risk mitigation using object
Software security risk mitigation using object
 
Finite element analysis of a floating rectangular plate
Finite element analysis of a floating rectangular plateFinite element analysis of a floating rectangular plate
Finite element analysis of a floating rectangular plate
 
Importance of post processing for improved binarization of text documents
Importance of post processing for improved binarization of text documentsImportance of post processing for improved binarization of text documents
Importance of post processing for improved binarization of text documents
 
Nanoparticle based charge trapping memory device applying mos technology a co...
Nanoparticle based charge trapping memory device applying mos technology a co...Nanoparticle based charge trapping memory device applying mos technology a co...
Nanoparticle based charge trapping memory device applying mos technology a co...
 
Comparison of data security in grid and cloud
Comparison of data security in grid and cloudComparison of data security in grid and cloud
Comparison of data security in grid and cloud
 
Photocatalytic decomposition of isolan black by tio2,
Photocatalytic decomposition of isolan black by tio2,Photocatalytic decomposition of isolan black by tio2,
Photocatalytic decomposition of isolan black by tio2,
 
An extended database reverse engineering – a key for database forensic invest...
An extended database reverse engineering – a key for database forensic invest...An extended database reverse engineering – a key for database forensic invest...
An extended database reverse engineering – a key for database forensic invest...
 
Design of c slotted microstrip antenna using
Design of c slotted microstrip antenna usingDesign of c slotted microstrip antenna using
Design of c slotted microstrip antenna using
 
Building extraction from remote sensing imageries by data fusion techniques
Building extraction from remote sensing imageries by data fusion techniquesBuilding extraction from remote sensing imageries by data fusion techniques
Building extraction from remote sensing imageries by data fusion techniques
 
Design and operation of synchronized robotic arm
Design and operation of synchronized robotic armDesign and operation of synchronized robotic arm
Design and operation of synchronized robotic arm
 
An analytical study on test standards for assessment
An analytical study on test standards for assessmentAn analytical study on test standards for assessment
An analytical study on test standards for assessment
 
Mapping of genes using cloud technologies
Mapping of genes using cloud technologiesMapping of genes using cloud technologies
Mapping of genes using cloud technologies
 
Enhancing security of caesar cipher using different
Enhancing security of caesar cipher using differentEnhancing security of caesar cipher using different
Enhancing security of caesar cipher using different
 
Analysis of problems of biomass grinder integrated
Analysis of problems of biomass grinder integratedAnalysis of problems of biomass grinder integrated
Analysis of problems of biomass grinder integrated
 
Sdci scalable distributed cache indexing for cache consistency for mobile env...
Sdci scalable distributed cache indexing for cache consistency for mobile env...Sdci scalable distributed cache indexing for cache consistency for mobile env...
Sdci scalable distributed cache indexing for cache consistency for mobile env...
 
Experimenal investigation of performance and
Experimenal investigation of performance andExperimenal investigation of performance and
Experimenal investigation of performance and
 
Comparison of symmetrical and asymmetrical cascaded
Comparison of symmetrical and asymmetrical cascadedComparison of symmetrical and asymmetrical cascaded
Comparison of symmetrical and asymmetrical cascaded
 
Degradation of mono azo dye in aqueous solution using
Degradation of mono azo dye in aqueous solution usingDegradation of mono azo dye in aqueous solution using
Degradation of mono azo dye in aqueous solution using
 

Similar to Burrows wheeler based data compression and secure transmission

Design of all digital phase locked loop (d pll) with fast acquisition time
Design of all digital phase locked loop (d pll) with fast acquisition timeDesign of all digital phase locked loop (d pll) with fast acquisition time
Design of all digital phase locked loop (d pll) with fast acquisition timeeSAT Journals
 
Codec Scheme for Power Optimization in VLSI Interconnects
Codec Scheme for Power Optimization in VLSI InterconnectsCodec Scheme for Power Optimization in VLSI Interconnects
Codec Scheme for Power Optimization in VLSI InterconnectsIJEEE
 
Design of High Speed and Low Power Veterbi Decoder for Trellis Coded Modulati...
Design of High Speed and Low Power Veterbi Decoder for Trellis Coded Modulati...Design of High Speed and Low Power Veterbi Decoder for Trellis Coded Modulati...
Design of High Speed and Low Power Veterbi Decoder for Trellis Coded Modulati...ijsrd.com
 
High Speed Low Power Veterbi Decoder Design for TCM Decoders
High Speed Low Power Veterbi Decoder Design for TCM DecodersHigh Speed Low Power Veterbi Decoder Design for TCM Decoders
High Speed Low Power Veterbi Decoder Design for TCM Decodersijsrd.com
 
Viterbi Decoder Plain Sailing Design for TCM Decoders
Viterbi Decoder Plain Sailing Design for TCM DecodersViterbi Decoder Plain Sailing Design for TCM Decoders
Viterbi Decoder Plain Sailing Design for TCM Decodersijtsrd
 
Investigative Compression Of Lossy Images By Enactment Of Lattice Vector Quan...
Investigative Compression Of Lossy Images By Enactment Of Lattice Vector Quan...Investigative Compression Of Lossy Images By Enactment Of Lattice Vector Quan...
Investigative Compression Of Lossy Images By Enactment Of Lattice Vector Quan...IJERA Editor
 
A review on glitch reduction techniques
A review on glitch reduction techniquesA review on glitch reduction techniques
A review on glitch reduction techniqueseSAT Publishing House
 
A review on glitch reduction techniques
A review on glitch reduction techniquesA review on glitch reduction techniques
A review on glitch reduction techniqueseSAT Journals
 
Protocol converter (uart, i2 c, manchester protocols to usb)
Protocol converter (uart, i2 c, manchester protocols to usb)Protocol converter (uart, i2 c, manchester protocols to usb)
Protocol converter (uart, i2 c, manchester protocols to usb)eSAT Journals
 
Fpga implementation of various lines coding technique for efficient transmiss...
Fpga implementation of various lines coding technique for efficient transmiss...Fpga implementation of various lines coding technique for efficient transmiss...
Fpga implementation of various lines coding technique for efficient transmiss...eSAT Publishing House
 
An Energy-Efficient Lut-Log-Bcjr Architecture Using Constant Log Bcjr Algorithm
An Energy-Efficient Lut-Log-Bcjr Architecture Using Constant Log Bcjr AlgorithmAn Energy-Efficient Lut-Log-Bcjr Architecture Using Constant Log Bcjr Algorithm
An Energy-Efficient Lut-Log-Bcjr Architecture Using Constant Log Bcjr AlgorithmIJERA Editor
 
Design of all digital phase locked loop
Design of all digital phase locked loopDesign of all digital phase locked loop
Design of all digital phase locked loopeSAT Publishing House
 
Low complexity turbo decoder with modified acs
Low complexity turbo decoder with modified acsLow complexity turbo decoder with modified acs
Low complexity turbo decoder with modified acsIAEME Publication
 
Implementation of an arithmetic logic using area efficient carry lookahead adder
Implementation of an arithmetic logic using area efficient carry lookahead adderImplementation of an arithmetic logic using area efficient carry lookahead adder
Implementation of an arithmetic logic using area efficient carry lookahead adderVLSICS Design
 
Fpga based low power and high performance address
Fpga based low power and high performance addressFpga based low power and high performance address
Fpga based low power and high performance addresseSAT Publishing House
 

Similar to Burrows wheeler based data compression and secure transmission (20)

Au33270273
Au33270273Au33270273
Au33270273
 
Design of all digital phase locked loop (d pll) with fast acquisition time
Design of all digital phase locked loop (d pll) with fast acquisition timeDesign of all digital phase locked loop (d pll) with fast acquisition time
Design of all digital phase locked loop (d pll) with fast acquisition time
 
Codec Scheme for Power Optimization in VLSI Interconnects
Codec Scheme for Power Optimization in VLSI InterconnectsCodec Scheme for Power Optimization in VLSI Interconnects
Codec Scheme for Power Optimization in VLSI Interconnects
 
Design of High Speed and Low Power Veterbi Decoder for Trellis Coded Modulati...
Design of High Speed and Low Power Veterbi Decoder for Trellis Coded Modulati...Design of High Speed and Low Power Veterbi Decoder for Trellis Coded Modulati...
Design of High Speed and Low Power Veterbi Decoder for Trellis Coded Modulati...
 
G364246
G364246G364246
G364246
 
High Speed Low Power Veterbi Decoder Design for TCM Decoders
High Speed Low Power Veterbi Decoder Design for TCM DecodersHigh Speed Low Power Veterbi Decoder Design for TCM Decoders
High Speed Low Power Veterbi Decoder Design for TCM Decoders
 
Viterbi Decoder Plain Sailing Design for TCM Decoders
Viterbi Decoder Plain Sailing Design for TCM DecodersViterbi Decoder Plain Sailing Design for TCM Decoders
Viterbi Decoder Plain Sailing Design for TCM Decoders
 
Investigative Compression Of Lossy Images By Enactment Of Lattice Vector Quan...
Investigative Compression Of Lossy Images By Enactment Of Lattice Vector Quan...Investigative Compression Of Lossy Images By Enactment Of Lattice Vector Quan...
Investigative Compression Of Lossy Images By Enactment Of Lattice Vector Quan...
 
A review on glitch reduction techniques
A review on glitch reduction techniquesA review on glitch reduction techniques
A review on glitch reduction techniques
 
A review on glitch reduction techniques
A review on glitch reduction techniquesA review on glitch reduction techniques
A review on glitch reduction techniques
 
Protocol converter (uart, i2 c, manchester protocols to usb)
Protocol converter (uart, i2 c, manchester protocols to usb)Protocol converter (uart, i2 c, manchester protocols to usb)
Protocol converter (uart, i2 c, manchester protocols to usb)
 
Lb35189919904
Lb35189919904Lb35189919904
Lb35189919904
 
Fpga implementation of various lines coding technique for efficient transmiss...
Fpga implementation of various lines coding technique for efficient transmiss...Fpga implementation of various lines coding technique for efficient transmiss...
Fpga implementation of various lines coding technique for efficient transmiss...
 
Gt3612201224
Gt3612201224Gt3612201224
Gt3612201224
 
An Energy-Efficient Lut-Log-Bcjr Architecture Using Constant Log Bcjr Algorithm
An Energy-Efficient Lut-Log-Bcjr Architecture Using Constant Log Bcjr AlgorithmAn Energy-Efficient Lut-Log-Bcjr Architecture Using Constant Log Bcjr Algorithm
An Energy-Efficient Lut-Log-Bcjr Architecture Using Constant Log Bcjr Algorithm
 
Design of all digital phase locked loop
Design of all digital phase locked loopDesign of all digital phase locked loop
Design of all digital phase locked loop
 
Low complexity turbo decoder with modified acs
Low complexity turbo decoder with modified acsLow complexity turbo decoder with modified acs
Low complexity turbo decoder with modified acs
 
Implementation of an arithmetic logic using area efficient carry lookahead adder
Implementation of an arithmetic logic using area efficient carry lookahead adderImplementation of an arithmetic logic using area efficient carry lookahead adder
Implementation of an arithmetic logic using area efficient carry lookahead adder
 
SFQ MULTIPLIER
SFQ MULTIPLIERSFQ MULTIPLIER
SFQ MULTIPLIER
 
Fpga based low power and high performance address
Fpga based low power and high performance addressFpga based low power and high performance address
Fpga based low power and high performance address
 

More from eSAT Publishing House

Likely impacts of hudhud on the environment of visakhapatnam
Likely impacts of hudhud on the environment of visakhapatnamLikely impacts of hudhud on the environment of visakhapatnam
Likely impacts of hudhud on the environment of visakhapatnameSAT Publishing House
 
Impact of flood disaster in a drought prone area – case study of alampur vill...
Impact of flood disaster in a drought prone area – case study of alampur vill...Impact of flood disaster in a drought prone area – case study of alampur vill...
Impact of flood disaster in a drought prone area – case study of alampur vill...eSAT Publishing House
 
Hudhud cyclone – a severe disaster in visakhapatnam
Hudhud cyclone – a severe disaster in visakhapatnamHudhud cyclone – a severe disaster in visakhapatnam
Hudhud cyclone – a severe disaster in visakhapatnameSAT Publishing House
 
Groundwater investigation using geophysical methods a case study of pydibhim...
Groundwater investigation using geophysical methods  a case study of pydibhim...Groundwater investigation using geophysical methods  a case study of pydibhim...
Groundwater investigation using geophysical methods a case study of pydibhim...eSAT Publishing House
 
Flood related disasters concerned to urban flooding in bangalore, india
Flood related disasters concerned to urban flooding in bangalore, indiaFlood related disasters concerned to urban flooding in bangalore, india
Flood related disasters concerned to urban flooding in bangalore, indiaeSAT Publishing House
 
Enhancing post disaster recovery by optimal infrastructure capacity building
Enhancing post disaster recovery by optimal infrastructure capacity buildingEnhancing post disaster recovery by optimal infrastructure capacity building
Enhancing post disaster recovery by optimal infrastructure capacity buildingeSAT Publishing House
 
Effect of lintel and lintel band on the global performance of reinforced conc...
Effect of lintel and lintel band on the global performance of reinforced conc...Effect of lintel and lintel band on the global performance of reinforced conc...
Effect of lintel and lintel band on the global performance of reinforced conc...eSAT Publishing House
 
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...eSAT Publishing House
 
Wind damage to buildings, infrastrucuture and landscape elements along the be...
Wind damage to buildings, infrastrucuture and landscape elements along the be...Wind damage to buildings, infrastrucuture and landscape elements along the be...
Wind damage to buildings, infrastrucuture and landscape elements along the be...eSAT Publishing House
 
Shear strength of rc deep beam panels – a review
Shear strength of rc deep beam panels – a reviewShear strength of rc deep beam panels – a review
Shear strength of rc deep beam panels – a revieweSAT Publishing House
 
Role of voluntary teams of professional engineers in dissater management – ex...
Role of voluntary teams of professional engineers in dissater management – ex...Role of voluntary teams of professional engineers in dissater management – ex...
Role of voluntary teams of professional engineers in dissater management – ex...eSAT Publishing House
 
Risk analysis and environmental hazard management
Risk analysis and environmental hazard managementRisk analysis and environmental hazard management
Risk analysis and environmental hazard managementeSAT Publishing House
 
Review study on performance of seismically tested repaired shear walls
Review study on performance of seismically tested repaired shear wallsReview study on performance of seismically tested repaired shear walls
Review study on performance of seismically tested repaired shear wallseSAT Publishing House
 
Monitoring and assessment of air quality with reference to dust particles (pm...
Monitoring and assessment of air quality with reference to dust particles (pm...Monitoring and assessment of air quality with reference to dust particles (pm...
Monitoring and assessment of air quality with reference to dust particles (pm...eSAT Publishing House
 
Low cost wireless sensor networks and smartphone applications for disaster ma...
Low cost wireless sensor networks and smartphone applications for disaster ma...Low cost wireless sensor networks and smartphone applications for disaster ma...
Low cost wireless sensor networks and smartphone applications for disaster ma...eSAT Publishing House
 
Coastal zones – seismic vulnerability an analysis from east coast of india
Coastal zones – seismic vulnerability an analysis from east coast of indiaCoastal zones – seismic vulnerability an analysis from east coast of india
Coastal zones – seismic vulnerability an analysis from east coast of indiaeSAT Publishing House
 
Can fracture mechanics predict damage due disaster of structures
Can fracture mechanics predict damage due disaster of structuresCan fracture mechanics predict damage due disaster of structures
Can fracture mechanics predict damage due disaster of structureseSAT Publishing House
 
Assessment of seismic susceptibility of rc buildings
Assessment of seismic susceptibility of rc buildingsAssessment of seismic susceptibility of rc buildings
Assessment of seismic susceptibility of rc buildingseSAT Publishing House
 
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...eSAT Publishing House
 
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...eSAT Publishing House
 

More from eSAT Publishing House (20)

Likely impacts of hudhud on the environment of visakhapatnam
Likely impacts of hudhud on the environment of visakhapatnamLikely impacts of hudhud on the environment of visakhapatnam
Likely impacts of hudhud on the environment of visakhapatnam
 
Impact of flood disaster in a drought prone area – case study of alampur vill...
Impact of flood disaster in a drought prone area – case study of alampur vill...Impact of flood disaster in a drought prone area – case study of alampur vill...
Impact of flood disaster in a drought prone area – case study of alampur vill...
 
Hudhud cyclone – a severe disaster in visakhapatnam
Hudhud cyclone – a severe disaster in visakhapatnamHudhud cyclone – a severe disaster in visakhapatnam
Hudhud cyclone – a severe disaster in visakhapatnam
 
Groundwater investigation using geophysical methods a case study of pydibhim...
Groundwater investigation using geophysical methods  a case study of pydibhim...Groundwater investigation using geophysical methods  a case study of pydibhim...
Groundwater investigation using geophysical methods a case study of pydibhim...
 
Flood related disasters concerned to urban flooding in bangalore, india
Flood related disasters concerned to urban flooding in bangalore, indiaFlood related disasters concerned to urban flooding in bangalore, india
Flood related disasters concerned to urban flooding in bangalore, india
 
Enhancing post disaster recovery by optimal infrastructure capacity building
Enhancing post disaster recovery by optimal infrastructure capacity buildingEnhancing post disaster recovery by optimal infrastructure capacity building
Enhancing post disaster recovery by optimal infrastructure capacity building
 
Effect of lintel and lintel band on the global performance of reinforced conc...
Effect of lintel and lintel band on the global performance of reinforced conc...Effect of lintel and lintel band on the global performance of reinforced conc...
Effect of lintel and lintel band on the global performance of reinforced conc...
 
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
 
Wind damage to buildings, infrastrucuture and landscape elements along the be...
Wind damage to buildings, infrastrucuture and landscape elements along the be...Wind damage to buildings, infrastrucuture and landscape elements along the be...
Wind damage to buildings, infrastrucuture and landscape elements along the be...
 
Shear strength of rc deep beam panels – a review
Shear strength of rc deep beam panels – a reviewShear strength of rc deep beam panels – a review
Shear strength of rc deep beam panels – a review
 
Role of voluntary teams of professional engineers in dissater management – ex...
Role of voluntary teams of professional engineers in dissater management – ex...Role of voluntary teams of professional engineers in dissater management – ex...
Role of voluntary teams of professional engineers in dissater management – ex...
 
Risk analysis and environmental hazard management
Risk analysis and environmental hazard managementRisk analysis and environmental hazard management
Risk analysis and environmental hazard management
 
Review study on performance of seismically tested repaired shear walls
Review study on performance of seismically tested repaired shear wallsReview study on performance of seismically tested repaired shear walls
Review study on performance of seismically tested repaired shear walls
 
Monitoring and assessment of air quality with reference to dust particles (pm...
Monitoring and assessment of air quality with reference to dust particles (pm...Monitoring and assessment of air quality with reference to dust particles (pm...
Monitoring and assessment of air quality with reference to dust particles (pm...
 
Low cost wireless sensor networks and smartphone applications for disaster ma...
Low cost wireless sensor networks and smartphone applications for disaster ma...Low cost wireless sensor networks and smartphone applications for disaster ma...
Low cost wireless sensor networks and smartphone applications for disaster ma...
 
Coastal zones – seismic vulnerability an analysis from east coast of india
Coastal zones – seismic vulnerability an analysis from east coast of indiaCoastal zones – seismic vulnerability an analysis from east coast of india
Coastal zones – seismic vulnerability an analysis from east coast of india
 
Can fracture mechanics predict damage due disaster of structures
Can fracture mechanics predict damage due disaster of structuresCan fracture mechanics predict damage due disaster of structures
Can fracture mechanics predict damage due disaster of structures
 
Assessment of seismic susceptibility of rc buildings
Assessment of seismic susceptibility of rc buildingsAssessment of seismic susceptibility of rc buildings
Assessment of seismic susceptibility of rc buildings
 
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
 
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
 

Recently uploaded

main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidNikhilNagaraju
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxwendy cai
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AIabhishek36461
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024hassan khalil
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girlsssuser7cb4ff
 
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)Dr SOUNDIRARAJ N
 
Introduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxIntroduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxk795866
 
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ
 
Introduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECHIntroduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECHC Sai Kiran
 
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerAnamika Sarkar
 
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx959SahilShah
 
Electronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdfElectronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdfme23b1001
 
pipeline in computer architecture design
pipeline in computer architecture  designpipeline in computer architecture  design
pipeline in computer architecture designssuser87fa0c1
 
Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.eptoze12
 
Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxHeart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxPoojaBan
 
complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...asadnawaz62
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024Mark Billinghurst
 

Recently uploaded (20)

main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfid
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptx
 
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptxExploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AI
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girls
 
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
 
Introduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxIntroduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptx
 
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
 
Introduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECHIntroduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECH
 
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
 
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
 
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx
 
Electronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdfElectronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdf
 
pipeline in computer architecture design
pipeline in computer architecture  designpipeline in computer architecture  design
pipeline in computer architecture design
 
Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.
 
Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxHeart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptx
 
complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...
 
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Serviceyoung call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024
 

Burrows wheeler based data compression and secure transmission

  • 1. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 __________________________________________________________________________________________ Volume: 02 Special Issue: 02 | Dec-2013, Available @ http://www.ijret.org 14 BURROWS WHEELER BASED DATA COMPRESSION AND SECURE TRANSMISSION M.P.Bhuyan1 , V.Deka2 , S.Bordoloi3 1 Department of Information Technology, Gauhati University 2 Department of Information Technology, Gauhati University 3 Department of Computer Applications, Assam Engineering College Abstract Now days, computer technology mostly focusing on storage space and speed With the rapid growing of important data and increased number of applications, devising new approach for efficient compression and encryption methods are playing a vital role in performance. In this work, burrows wheeler transformation is introduced for pre processing of the input data and made several performance analysis experiments over different compression techniques for various types of text files and improved compression ratio has been found by applying burrows wheeler transform as pre-processing step. Keywords: RLE, arithmetic, Huffman, LZW, lossless data compression. ----------------------------------------------------------------------***-------------------------------------------------------------------- 1. INTRODUCTION It is seen that day by day amount data increases, so it becomes necessary to optimize the storage space for efficient utilization. In lossy compression methods, during the decompression process it is not possible to recover the original file. To overcome this difficulty we need lossless data compression technique. Use of lossless data compression technique reconstructs the original file as it was before the compression. Lossless data compression is an important compression technique to compress text files, because removal of much redundancy in text files causes the change in meaning of the original data or text. Burrows Wheeler Transform is widely used in all over the world for lossless data compression [1]. People have devoted lots of time in innovating new techniques for the enhancement of lossless data compression algorithm. We will try to use Burrows Wheeler transform in lossless image compression and if possible special care can be taken. Further if possible, we will try to use the technique in the compression of other kind of files like audio or video files. The rest of the paper is organized as follows: Section 2 presents a brief explanation about Burrows Wheeler Transformation; Section 3 discusses about some existing lossless data compression algorithms, Section 4 reflects the challenges of combining cryptography and compression and the cryptographic algorithm, Section 5 has its focus on comparing the performance of different lossless data compression algorithms, finally, section 6 concludes the work and section 7 proposes the future work. 2. BURROWS WHEELER TRANSFORM Burrows Wheeler Transform is a transformation technique first introduced in 1994[6], which is the unpublished work by Wheeler in 1983. The fundamental concept behind this technique is that when a text file or a character string is transformed the size of the string does not change. The transformation only permutes the string into n permutations, where n is the total number of characters in the string. After performing Burrows Wheeler Transform new transformed string can be compressed easily with compression method like run length encoding. In addition, if move to front encoding is applied to the transformed data then it can be compressed quite efficiently. 2.1 The Forward Transform Consider a string p= dckdacm. Step1: The original sequence p is copied to the first row, also referred to as index 0. The sequence is then sorted with all left cyclic permutations into each next index row. The step 1 of the BWT is presented in Table 2.1.1 Step2: The rows are sorted lexicographically then from this output sequences. The step 2 of the BWT is shown in Table 2.1.2. Step 3 is the final step of the BWT process consisting of output of the BWT and the final index. Step3: The original sequence p= dckdacm appears in the fifth row of Table 2.1.2, and the output of the BWT transform is the last column, indicated by L = ddakmcc which is shown in table2.1.3. With the index = 4, the result can be written as BWT = [index, L], where L is the output of the Burrows-Wheeler transform and index indicates the location of the original sequence in the lexicographically ordered sequence. We also determine the first column F = accddkm, which can be obtained from L by sorting which is required reverse transform of the BWT.
  • 2. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 __________________________________________________________________________________________ Volume: 02 Special Issue: 02 | Dec-2013, Available @ http://www.ijret.org 15 Table 2.1.1 step1 of BWT with all cyclic permutations Index Step1 Output 0 dckdacm 1 ckdacmd 2 kdacmdc 3 dacmdck 4 acmdckd 5 cmdckda 6 mdckdac Table 2.1.2 step2 of BWT rows of step1 are lexicographically sorted Index Step3 Output 0 d 1 d 2 a 3 k 4 m 5 c 6 c Table 2.1.3 step3 of BWT contains last character of each row of step1 Index Step2 Output 0 acmdckd 1 ckdacmd 2 cmdckda 3 dacmdck 4 dckdacm 5 kdacmdc 6 mdckdac 2.2 The Reverse Burrows-Wheeler Transform: The BWT is a reversible transformation which can recover the original sequence from the BWT output sequence. In reverse transform only the BWT output sequence L and index are needed for reconstructing the original sequence. To solve the reverse BWT using output of the BWT, L and index, the reverse BWT is presented in Table 2.2.1. Input (ddakmcc, index=4). Output=dckdacm Table 2.2.1 Step1 of reverse BWT Index Reverse BWT input Previous combine Sort New combine (BWT i/p+ Sort) 0 d Φ a da 1 d Φ c dc 2 a Φ c ac 3 k Φ d kd 4 m Φ d md 5 c Φ k ck 6 c Φ m cm Table 2.2.2 Step2 of reverse BWT Index Reverse BWT input Previous combine Sort New combine (BWT i/p+ Sort) 0 d da ac dac 1 d dc ck dck 2 a ac cm acm 3 k kd da kda 4 m md dc mdc 5 c ck kd ckd 6 c cm md cmd Table 2.2.3 Step3 of reverse BWT Index Reverse BWT input Previous combine Sort New combine (BWT i/p+ Sort) 0 d dac acm dacm 1 d dck ckd dckd 2 a acm cmd acmd 3 k kda dac kdac 4 m mdc dck mdck 5 c ckd kda ckda 6 c cmd mdc cmdc Table 2.2.4 Step4 of reverse BWT Index Reverse BWT input Previous combine Sort New combine (BWT i/p+ Sort) 0 d dac acm dacm 1 d dck ckd dckd 2 a acm cmd acmd 3 k kda dac kdac 4 m mdc dck mdck 5 c ckd kda ckda 6 c cmd mdc cmdc
  • 3. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 __________________________________________________________________________________________ Volume: 02 Special Issue: 02 | Dec-2013, Available @ http://www.ijret.org 16 Table 2.2.5 Step5 of reverse BWT Ind ex Reverse BWT input Previous combine Sort New combine (BWT i/p+ Sort) 0 d dacmd acmdc dacmdc 1 d dckda ckdac dckdac 2 a acmdc cmdck acmdck 3 k kdacm dacmd kdacmd 4 m mdckd dckda mdckda 5 c ckdac kdacm ckdacm 6 c cmdck mdckd cmdckd Table 2.2.6 Step6 of reverse BWT Inde x Reverse BWT input Previous combine Sort New combine (BWT i/p+ Sort) 0 d dacmdc acmdck acmdckd 1 d dckdac ckdacm ckdacmd 2 a acmdck cmdckd cmdckda 3 k kdacmd dacmdc dacmdck 4 m mdckda dckdac dckdacm 5 c ckdacm kdacmd kdacmdc 6 c cmdckd mdckda mdckdac Burrows Wheeler transformation is used in various field of research from the beginning of its invention, it is seen that the importance of Burrows Wheeler Transform is increased day by day. It is widely used as a pre processing stage in lossless data compression. BWT is used to compress DNA sequencing in the field of bioinformatics. Research is going on to compress the medical information or some astronomical images. Due to the efficiency of BWT, researchers from various backgrounds are attracted to this technique and use this technique to optimize their resources. So many people try to improve the BWT technique for better processing in their own fields. In the coming days, this technique may overcome the deficiency of storage space. 3. SOME LOSSLESS DATA COMPRESSION ALGORITHMS 3.1 Run Length Encoding Run Length Encoding (RLE) compression technique is used when a given file contains too many redundant data or long run of similar characters. The repeated string or characters present in the input file or message is called a run which is encoded into two bytes. The first byte represents the value of the character in the run and the second byte contains the number of times given character appears in the run. For example the following string can be represented in RLE as ZZZZZZkkkHHHHHttt Z6k3H5t3 3.2 Huffman Coding Huffman coding is a data compression technique in which each input character is replaced with variable length binary digits which are called codeword and the codeword has been derived in a particular way based on the probability of occurrence of each symbol or character. The most frequent symbols in the source have the shortest length code and the least frequent symbol has the longest code. This technique is implemented by creating a binary tree of nodes. These can be stored in data structures like array or link list, the size of which depends on the number of symbols, n. 3.2 Arithmetic Coding The arithmetic coding concept is to have a probability value 0 to 1, and assign to every symbol a range in between 0 and 1 based on its probability, higher the probability, higher is the range. Once we have defined the ranges and the probability, encoding of symbols can be started, every symbol in encoding process gives us a new floating point range to encode the next symbol. 3.4 LZW Coding This is a dictionary based compression algorithm which is implemented by depending on a dictionary. A dictionary is a collection of some possible words of a particular language and is stored in tabular fashion, some indexes are used to represent repeating symbols. In Lempel-Ziv Welch algorithm or LZW, one kind dictionary is used to store the symbols. In the compression process, the index values are used in place of the similar repeated strings or symbols. Creation of dictionary is a dynamic process, so it is not transferred with the encoded data, during decompression the dictionary is created automatically. 4. CHALLENGES OF COMBINING COMPRE- SSION AND CRYPTOGRAPHY AND THE CRYPTOGRAPHIC ALOGORITHM USED IN THIS ANALYSIS Most of the powerful cryptographic algorithms increase size after encryption and if we modify the algorithm then strength of the algorithm decreases. So we need algorithms of the type stream cipher, substitution cipher etc. One substitution type algorithm is given below. Encryption Algorithm: Step 1: Input Text (T) Step 2: Check ASCII value of each character Step 3: If (Character (ASCII value)>127)
  • 4. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 __________________________________________________________________________________________ Volume: 02 Special Issue: 02 | Dec-2013, Available @ http://www.ijret.org 17 ASCII value=255-ASCII value of the character Else ASCII value=127+ASCII value of the character Step 4: Now print the corresponding character of the ASCII value in ENCRYPT.txt file. Decryption Algorithm: Step1: Check each character of the file ENCRYPT.txt Step 2: If (Character (ASCII value)>127) ASCII value= ASCII value-127 Else ASCII value=255-ASCII value of the character Step 3: Now print the corresponding character of the ASCII value in DECRYPT.txt. 5. PERFORMANCE ANALYSIS The performance analysis of the compression algorithms are done for different text files of different size. Comparison is done in terms of compression ratio which is the ratio of the size of file after compression to the size of file before compression. The comparison is also shown graphically. Text files of different size with different characters have been taken and then compression is done in MATLAB for the different compression algorithms. The results are shown in the table 5.1 and 5.2. The following charts showing the comparison graphically for different algorithms with respect to different text files. Fig 5.1 Comparison of compressed files in Arithmetic Coding Fig 5.2 Comparison of compressed files in Huffman Coding Fig 5.3 Comparison of compressed files in Run Length Encoding Fig 5.4 Comparison of compressed files in LZW Coding
  • 5. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 __________________________________________________________________________________________ Volume: 02 Special Issue: 02 | Dec-2013, Available @ http://www.ijret.org 18 Fig 5.5 Comparison of Average Compression ratio of different algorithms From the analysis it is seen that RLE compression has shown drastic improvement and LZW has shown a little improvement in the compression ratio after preprocessing with Burrows Wheeler Transform and encryption. Though the other compression algorithms have not shown much improvement in compression ratio after preprocessing with Burrows Wheeler Transform For the time being RLE has performed much better with pre-processing with Burrows Wheeler Transform and encryption. 6. CONCLUSIONS After doing a detail study on different compression algorithms it is seen that RLE shows a great improvement on compression ratio after preprocessing with Burrows Wheeler Transformation. With these results we can conclude that the combination of Burrows Wheeler Transform and RLE gives us a best compression method for lossless data compression. FUTURE WORK In future it is possible to apply the same technique to compress image, audio and video files etc. It is possible to make the encryption process powerful by using some powerful algorithms like Blowfish, RC5 etc. REFERENCES [1]. B. Balkenhol and S Kurtz. Universal Data Compression Based on the Burrows-Wheeler Transformation: Theory and Practice. IEEE transactions on Computers,49(10):1043-1053, October 2000. [2]. J. Abel. Improvements to the Burrows-Wheeler Compression Algorithm: After Bwt Stages. In ACM Trans. Computer Systems, May 2003 [3]. M. Burrows and D. J. Wheeler. A Block-Sorting Lossless Data Compression Algorithm Tech. Rep. 124, Digital Systems Re-search Centre, 1994. [4]. M. Nelson. Data Compression With the Burrows-Wheeler Transform. In Dr. Dobbs Journal,, pages 746-751, September 1996. [5]. Bitla Srinivas and V K Govindan. A Modified Approach to the New Lossless Data Compression Method International Journal of Computer Communication Technology (IJCCT), 2(7):44-48, 2011. [6]. C. Sidney Bums Haitao Guo. Waveform and Image Compression Using the Burrows Wheeler Transform and the Wavelet Transform Proceedings, International Conference on Image Processing, 1:65-68, 1997. [7]. J. Ziv and A. Lempel. A Universal Algorithm for Sequential Data Compression IEEE Transactions on Information Theory IT-23(3):337-343, May 1977. [8]. K. Holtz and E. Holtz. Lossless Data Compression Techniques WESCON/94 Conference, Session W23, Advanced Information Management, Anaheim Convention Centre, Anaheim, California,, pages 1043-1053, September 1994. [9]. J. Gilchrist and A. Cuhadar. Parallel Lossless Data Compression Based on Burrows-Wheeler Transform. 1st International Conference on Advanced Networking and Applications (AINA'07), pages 1043-1053, May 2007 [10]. J. Ziv and A. Lempel. Compression of Individual Sequences Via Variable Rate Coding. IEEE Transactions on Information Theory, IT- 24(5):530-535, September 1978. [11]. R.E. Tarjan J.L. Bentley, D.D. Sleator and V.K. Wei. A Locally Adaptive Data Compression Algorithm Communications of the ACM, 29(4):320-330, April 1986. [12]. DI Michael Schindler. A Fast BlockSorting Algorithm for Lossless Data Compression [13]. Jer Min Jou and Pei-Yin Chen. A Fast and Efficient Lossless Data Compression Method IEEE TRANSACTIONS ON COMMUNICATIONS, 47(9), September 1999. [14]. M. Effros. Universal Lossless Source Coding With the Burrows Wheeler Transform. Data Compression Conf., Snowbird, UT, pages 178-187, March 1999 [15]. Guy E. Blelloch. Introduction to Data Compression. Computer Science Department, Carnegie Mellon University, September 2010.
  • 6. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 __________________________________________________________________________________________ Volume: 02 Special Issue: 02 | Dec-2013, Available @ http://www.ijret.org 19 Table 5.1 Size of different files before and after compression and their compression ratio File Original Size(bytes) Compressed Size(bytes) Compression ratio Arithmetic Huffman RLE LZW Arithmetic Huffman RLE LZW File1 134 70 71 127 105 52.52 53.00 94.78 78.36 File2 298 90 92 293 120 30.45 30.87 98.32 40.27 File3 452 251 250 435 296 55.37 55.30 96.24 65.48 File4 892 530 534 810 489 59.47 59.86 90.81 54.82 File5 1092 468 469 611 396 42.86 42.95 55.95 36.26 File6 1937 1300 1308 1856 1059 67.12 67.53 95.82 54.67 File7 2861 1859 1868 2539 1242 64.99 65.29 88.75 43.41 File8 25210 14419 14496 24752 11518 57.40 57.71 98.53 45.69 File9 42080 19360 19688 40232 13099 46.00 46.79 95.61 31.13 File10 50464 22439 22864 49544 15321 44.47 45.31 98.18 30.36 File11 60456 38006 38272 55912 24031 62.87 63.31 92.48 39.75 Avg. 16897.82 8981.09 9082.91 16101.00 6152.36 53.05 53.45 91.41 47.29 Table 5.2 Size of different files before and after compression and their compression ratio after preprocessing with BWT and encryption File Original Size(bytes) Compressed Size(bytes) Compression ratio Arithmetic Huffman RLE LZW Arithmetic Huffman RLE LZW File1 134 70 71 46 108 52.61 52.98 34.32 80.60 File2 298 91 92 88 112 30.49 30.87 29.53 37.58 File3 452 251 250 128 299 55.34 55.30 28.31 66.15 File4 892 530 534 240 468 59.49 59.86 26.90 52.47 File5 1092 469 471 324 369 42.88 43.05 29.67 33.79 File6 1937 1301 1309 689 970 67.13 67.51 35.57 50.08 File7 2861 1859 1868 1120 1145 64.99 65.29 39.15 40.02 File8 25210 14412 14488 6626 9865 57.37 57.68 26.28 39.13 File9 42080 19359 19688 10256 11698 46.01 46.79 24.37 27.80 File10 50464 22430 22864 17440 14493 44.44 45.31 34.56 28.72 File11 60456 38003 38264 19769 19847 62.86 63.29 32.70 32.83 Avg. 16897.82 8979.55 9081.73 5156.91 5397.64 53.06 53.45 31.03 44.47