Lossless Data Compression Techniques with Block Coding: An explanation

  IJETT-book-cover  International Journal of Engineering Trends and Technology (IJETT)          
  
© 2016 by IJETT Journal
Volume-36 Number-2
Year of Publication : 2016
Authors : Deepak Mathur, Dr. Prabhat Mathur
  10.14445/22315381/IJETT-V36P216

MLA 

Deepak Mathur, Dr. Prabhat Mathur"Lossless Data Compression Techniques with Block Coding: An explanation", International Journal of Engineering Trends and Technology (IJETT), V36(2),88-90 June 2016. ISSN:2231-5381. www.ijettjournal.org. published by seventh sense research group

Abstract
Data compression is the process of encoding information using fewer bits (or other information bearing units) than an uuencoded representation would use, through use of specific encoding schemes. Using this we can achieve reduced resource consumption and security of data as well. Data Compression may be categorized in following two categories. (A)Lossless Compression algorithms usually exploit statistical redundancy in such a way as to represent the sender’s data more concisely without error. (B)Lossy Compression is possible if some loss of some fidelity is acceptable .Lossy schemes accept some losss of data in order to achieve higher compression .Lossy data compression is better known as rate-distortion theory. Shannon formulated the theory of data compression .Lossless data compression theory and rate-distortion theories are known collectively as Source Coding theory.

 References

[1] Mrs. Durga Devi and Shobharani D A , A Novel Third Party Cryptosystem for Secure and Scalable data sharing in Cloud”, International Journal of Engineering Trends and Technology (IJETT) ,Vol. 35, pp. 402-404, May 2016
[2] Priyanka Chouksey1 and Dr. Prabhat Patel , “Secret Key Steganography technique based on three-layered DWT and SVD algorithm”, International Journal of Engineering Trends and Technology (IJETT) , Vol. 35 ,pp. 440-445, May 2016
[3] A.Nagurammal1 and Dr.T.Meyyappan ,” Lossless Image Watermarking For Hdr Images Using Tone Mapping”, International Journal of Engineering Trends and Technology(IJETT), Vol. 3, pp. 294-300 , 2012.
[4] C. H. Kuo , C.F.Chen , and W.Hsia ,”A compression algorithm bassed on classified interpolative block truncation coding and vector quantization”,Journal of Information Science and Engineering ,15:pp 1-9 ,1999.
[5] T.SubhamastanRao, M.Soujanya, T.Hemalath and T.Revathi, “Simultaneous data compression and encryption” (IJCSIT) International Journal of Computer Science and Information Technologies, ISSN 0975-9646, Volume- 2(5), 2011.
[6] http://www.data-compression.com/theory.html [7] Haroon Altarawneh, Mohammad Altarawneh “Data Compression Techniques on Text Files: A Comparison Study” International Journal of Computer Applications, (0975 – 8887), Volume 26– No.5, July 2011.
[8] AL.Jeeva, Dr.V.Palanisamy and K.Kanagaram “Comparative Analysis of Performance Efficiency and Security Measures of Some Encryption Algorithms” International Journal of Engineering Research and Applications (IJERA), Volume 3, Issue 6, June 2013.
[9] Mr. Vinod Saroha, Suman Mor and Anurag Dagar “Enhancing Security of Caesar Cipher by Double Columnar Transposition Method” International Journal of Advanced Research in Computer Science and Software Engineering, Volume 2, Issue 10, 2012.
[10] Sombir Singh, Sunil K. Maakar, Dr.Sudesh Kumar “Enhancing the Security of DES Algorithm Using Transposition Cryptography Techniques” International Journal of Advanced Research in Computer Science and Software Engineering, ISSN 2249-6343, Volume 2, Issue 1, Jan 19 2012.
[11] Nutan Shep1 and Mrs. P.H. Bhagat ,” Implementation of Hamming code using VLSI “,International Journal of Engineering Trends and Technology(IJETT), Vol.4,. pp. 186- 190, 2013

Keywords
Lossy Compression, Lossless Compression, encoding, block coding.