Call for Paper - August 2022 Edition
IJCA solicits original research papers for the August 2022 Edition. Last date of manuscript submission is July 20, 2022. Read More

Crypto-Compression System: An Integrated Approach using Stream Cipher Cryptography and Entropy Encoding

International Journal of Computer Applications
© 2015 by IJCA Journal
Volume 116 - Number 21
Year of Publication: 2015
Bobby Jasuja
Abhishek Pandya

Bobby Jasuja and Abhishek Pandya. Article: Crypto-Compression System: An Integrated Approach using Stream Cipher Cryptography and Entropy Encoding. International Journal of Computer Applications 116(21):34-41, April 2015. Full text available. BibTeX

	author = {Bobby Jasuja and Abhishek Pandya},
	title = {Article: Crypto-Compression System: An Integrated Approach using Stream Cipher Cryptography and Entropy Encoding},
	journal = {International Journal of Computer Applications},
	year = {2015},
	volume = {116},
	number = {21},
	pages = {34-41},
	month = {April},
	note = {Full text available}


Problems faced in modern communications are not only just related to security but also concerned with the communication speed and content size. Now day's networks demand exchange of information with more security and reduction in both -data storage and the time for data transmission. This can be realized by adopting an integrated approach usingcompression and encryption techniques, such a system is termed as crypto-compression system. Encryption is a coding technique that provides security whereas data compression is also a coding technique, whose purpose is to reduce both the data storage size and ultimately the time for data transmission. In this paper, an algorithm has been proposed which uses the compression and data encryption techniques. Firstly, data size is reduced through various compression techniques in order to increase the data transfer rate. Then the compressed data is encrypted to raise its security. Thus, technique proposed in this paper is useful in reducing data size, raising data transfer rate and providing security during communication. In this proposed system, encoded string is created from an input string of symbols and characters based on entropy encoding technique like arithmetic coding that can be used to achieve high level of compression in the present network topologies for exchange of data with more security and compression.


  • http://en. wikipedia. org/wiki/Cryptography
  • Shannon C. E. "A Mathematical Theory of Communication". The Bell System Technical Journal, Vol. 27
  • Dr. V. K. Govindan and B. S. Shajeemohan -"An intelligent text data encryption and compression for high speed and secure data transmission over internet"
  • Null, Linda, and Julia Lobur. Essentials of Computer Organization and Architecture. Sudbury, MA: Jones & Bartlett Learning, 2012
  • Dr. Mukesh Sharma and Smiley Gandhi- "Compression and Encryption: An Integrated Approach" International Journal of Engineering Research & Technology (IJERT) Vol. 1 Issue 5, July – 2012
  • Tarek M Mahmoud, Bahgat A. Abdel-latef, Awny A. Ahmed and Ahmed M Mahfouz -"Hybrid Compression Encryption Technique for Securing SMS", International Journal of Computer Science and Security (IJCSS), Volume (3): Issue(6)
  • I. H. Willen, RandfordM. Neala and John G. Cleary - "Arithmetic Coding for Data Compression", Communications of the ACM Volume 30 Issue 6.
  • V. Kavitha and K. S Easwarakumar,"Enhancing Privacy in Arithmetic Coding" ICGSTAIML journal, Volume 8, Issue I,2008
  • J. A Storer-"Data Compression: Methods and Theory" Computer Science Press.
  • Trappe, Wade, and Lawrence C. Washington. Introduction to Cryptography: with Coding Theory. Upper Saddle River, NJ: Prentice Hall, 2002. Print
  • Schneier, Bruce. Applied Cryptography: Protocols, Algorithms, and Source Code in C. New York: Wiley, 1996. Print
  • H. Kruse and A. Mukherjee. - "Data Compression Using Text Encryption", Proc. Data Compression Conference, IEEE Computer Society Press, 1997