Journal Title : International Journal of Modern Trends in Engineering and Science

Author’s Name : Sruthi Thampi P S | Poornima Indusekhar

Volume 02 Issue 12  Year 2015 

ISSN no: 2348-3121

Page no: 18-23

Abstract With the fast change in technologies today, more and more multimedia data are generated and transmitted, leaving our data vulnerable to be edited, modified and duplicated. The classical way of transmitting redundant data over a bandwidth constrained insecure channel is to first compress it and then encrypt. The novelty in this paper is reversing the order of compression and encryption, without compromising either the encryption efficiency or the information secrecy. Here, a combined encryption and compression scheme is used, in which triple data encryption standard (3DES) with block ciphering will be used to achieve an enhanced security while making it suitable for compression using Run Length Encoding (RLE). By compressing the encrypted data, we can send more data through the channel, whereby we can achieve efficient channel utilization without compromising on the security of the encryption scheme. For combating bit errors, an improved Hamming code with selective bit placement algorithm will be used, which can efficiently detect and correct errors. The overall system can achieve improved detection accuracy, better channel utilization and provide extremely secure and authentic communication. The entire system is functionally simulated and verified using Xilinx ISE Design Suite 14.5 and Modelsim SE 6.5b.

Keywords— Triple data encryption standard (3DES);Encrypted Data,;Run LengthEncoding (RLE); Hamming code


[1] Poornima.P.V, Amrutha.V ´ Security Enhanced Communication Scheme with Error Correction Capability and Efficient Channel Utilization´ , (IJCSIT) International Journal of Computer Science and Information Technologies, Vol. 5 (2) , 2014, pp 2177-2185.
[2] Chethan Kumar K V, S Sujatha,´ VLSI Implementation of DES-TDES Algorithm with Cipher Block Concept´ , International Journal of Emerging Science and Engineering (IJESE) ISSN: 2319-6378, Volume-2, Issue-7, May (2014).
[3] S.PoongodiM.E,Dr.B.Kalavath, M.Shanmugapriya, ´SecureTransformation of Data in Encrypted Image Using ReversibleData hiding Technique ´ , International Journal of EngineeringScience and Innovative Technology (IJESIT) Volume 2, Issue4, July (2013).
[4] Abel-Gha_er, K.A.S., and Weber G.H. , ‘Analysis ofcoding scheme for modulation and error control’ , IEEETransactions on Information Theory, Vol 41.,No.6, pp1955-1968,Nov (1995).
[5] Ephraim Zehavi and Jack K. Wolf, ‘On Runlength Codes’, IEEE Transactions On InformationTheory, Vol. 34, No. 1, January 1988, pp 45-54.
[6] D. Slepian and J. Wolf, _ Noiseless coding of correlated information sources, IEEE Trans. Inf. Theory, vol. IT-19, no. 4, pp. 471-480, Jul.(1973).
[7] R. G. Gallager, ‘ Information Theory and ReliableCommunication. ‘ New York: Wiley, (1968).

Full Paper: Click Here


Scroll Up