The problem definition is to suggest a system capable of performing lossless data compression of binary data using encryption and decryption. It also works as a solution to user data protection needs, playing an important role in environments where data privacy is paramount and thus contributing to information security. Coding and compression schemes must be computationally and functionally efficient and must aim to provide an optimal solution to the above-mentioned problems. Say no to plagiarism. Get a tailor-made essay on "Why Violent Video Games Shouldn't Be Banned"? Get an original essay The system is capable of receiving input in the form of a text file whose binary representation is processed and then encrypted into a color image. One of the suitable compression methods for data compression, known as Huffman coding, is used on the encrypted data to ensure a correct fit between the tasks performed and the space complexity issues involved. The project should achieve the most promising compression ratio, with the limited resources of current computers. As a result, there are strict constraints on the memory usage and compression speed of the project. The system currently aims to work with text files in standard ASCII-based format. The system works on two aspects: on the sender side this technique compresses the file using Huffman encoding and then encodes the binary file data into a color-coded encrypted JPEG image file. While on the Receiver side it does the opposite, i.e. it decrypts the image and then decompresses it, returning the binary text file.Fig. 1 shows the block diagram of the sender-side encryption process. Given a stored text file that needs to be encrypted and compressed, the system first converts the file to its binary representation, then forwards the binary file to the Huffman compressor which performs compression on the binary data turning it into a vector. The vector is then provided as input to the Color Coded Encoder, which converts the numeric vector data into a colored JPEG image. Please note: this is just an example. Get a custom paper from our expert writers now. Get a custom essay The encrypted colored image has a set of colored blocks. The color assignment process is predefined and is done by grouping together three bits of the binary data stream at a time, so it gives a possibility of 8 colors in all.Fig. 2 shows the block diagram of the decryption process at the receiver side. At the end of reception, the system takes the encrypted image as input. The system checks the color of different blocks iteratively and then takes an average of the values to get a practical view of the color of the particular block. Using this decryption process, recreate the vector data. The vectorized data is then forwarded to the Huffman Decompressor, which converts the data back to the original binary representation as it was provided in the input. The binary file is traced back to the original ASCII text file, thus restoring the text file and completing lossless decompression on the receiver side.
tags