Bounded probability based textual data compression for fiber-optic communication

 
 
 
  • Abstract
  • Keywords
  • References
  • PDF
  • Abstract


    Fiber optic communication becomes very popular due to its nature of high data rate. Though fiber optic communication offers faster data transmission, it suffers from the drawback of massive amount of data being generated, stored or transmitted. Data compression techniques are introduced to minimize the size of data which eventually reduces the bandwidth utilization, storage space and data transmission at a faster rate. This paper presents a new dictionary based encoding technique called Bounded probability based textual data compression algorithm called BPT algorithm. The BPT algorithm generates a codeword based on the dictionary, which contains the binary code based on the probability of occurrence of characters in the input data. For decompression, there is a need to transmit the coding table along with the compressed data. The proposed BPT algorithm is tested using a set of benchmark textual dataset from The Calgary Corpus and The Canterbury Corpus. The experimental results verified the superiority of the BPT algorithm over the state of art methods in terms of different measures namely compression ratio (CR), compression factor (CF), bits per character (bpc) and space savings.

     

     


  • Keywords


    Fiber Optic Communication; Dictionary Based Coding; Data Compression; Textual Dataset.

  • References


      [1] Medard, Muriel, Douglas Marquis, A. Richard Barry, and G. Steven Finn. "Security issues in all-optical networks." IEEE network 11, no. 3(1997): 42-48. https://doi.org/10.1109/65.587049.

      [2] Skorin-Kapov, Nina, MarijaFurdek, Szilard Zsigmond, and Lena Wosinska. "Physical-layer security in evolving optical networks." IEEE Communications Magazine, Vol. 54, No. 8, (2016) :110-117. https://doi.org/10.1109/MCOM.2016.7537185.

      [3] Shaneman, Keith, and Stuart Gray. "Optical network security: technical analysis of fiber tapping mechanisms and methods for detection & prevention." In Military Communications Conference, MILCOM 2004. 2004 IEEE, Vol. 2, pp. 711-716, 2004.

      [4] Alfalou, Ayman, C. Brosseau, Nadine Abdallah, and Maher Jridi, "Simultaneous fusion, compression, and encryption of multiple images." Optics express, Vol. 19, No. 24, pp. 24023-24029, 2011. https://doi.org/10.1364/OE.19.024023.

      [5] Alfalou, Ayman, Christian Brosseau, N. Abdallah, and M. Jridi. "Assessing the performance of a method of simultaneous compression and encryption of multiple images and its resistance against various attacks." Optics express, Vol. 21, No. 7, (2013) pp. 8025-8043. https://doi.org/10.1364/OE.21.008025.

      [6] J. Capon, “A probabilistic model for run-length coding of pictures”. IRE Transactions on Information Theory, Vol. 100, 157–163. https://doi.org/10.1109/TIT.1959.1057512.

      [7] D. A. Huffman, A Method for the Construction of Minimum-Redundancu Codes, (1952): 1098–1102. https://doi.org/10.1109/JRPROC.1952.273898.

      [8] G. G. Langdon, “An Introduction to Arithmetic Coding. IBM Journal of Research and Development”, Vol. 2, No.2, pp. 135–149, 1984. https://doi.org/10.1147/rd.282.0135.

      [9] J.Ziv, and A.Lempel, 1978. lz78.pdf. IEEE.

      [10] J.Ziv and A.Lempel. “A Universal Algorithm for Data Compression” IEEE Transactions on Information Theory, Vol. 23, No.3, (1977): 337–343. https://doi.org/10.1109/TIT.1977.1055714.

      [11] T. A. Welch, “A technique for high-Performance Data Compression”, IEEE, (1984): 8–19. https://doi.org/10.1109/MC.1984.1659158.

      [12] M. Burrows and D. Wheeler, “A block-sorting lossless data compression algorithm”. Algorithm, Data Compression, No. 124, (1994)18. https://doi.org/10.1.1.37.6774

      [13] J. Schmidhuber and S. Heil, “Sequentail Neural Text Compression. IEEE Transactions on Neural Networks”, Vol.7, No.1, (1996):142–146. https://doi.org/10.1109/72.478398.

      [14] A. Moffat, J. Zobel and N.Sharman, “Text compression for dynamic document databases”. IEEE Transactions on Knowledge and Data Engineering, Vol. 9, No.2, (1997) 302–313. https://doi.org/10.1109/69.591454.

      [15] M. Crochemore, F. Mignosi, A.Restivo and S. Salemi, “Data compression using antidictionaries.” In Proceedings of the IEEE, pp. 1756–1768, 2000. https://doi.org/10.1109/5.892711.

      [16] J. Abel and W. Teahan, “Universal text preprocessing for data compression”. IEEE Transactions on Computers, Vol. 54, No.5, (2005):497–507. https://doi.org/10.1109/TC.2005.85.

      [17] J. NoPlatoš, V. Snášel and E. El-Qawasmeh, “Compression of small text files”. Advanced Engineering Informatics, Vol. 22, No. 3, (2008), pp. 410–417. https://doi.org/10.1016/j.aei.2008.05.001.

      [18] K. Kalajdzic, S. H. Ali and A. Patel, “Rapid lossless compression of short text messages”. Computer Standards & Interfaces, Vol. 37, (2015):53–59. https://doi.org/10.1016/j.csi.2014.05.005.

      [19] L. Robert and R. Nadarajan, “Simple lossless preprocessing algorithms for text compression”. IET Software, Vol. 3, No.1, 2009, pp. 37–45. https://doi.org/10.1049/iet-sen:20070106.

      [20] S. De Agostino, “The greedy approach to dictionary-based static text compression on a distributed system”, Journal of Discrete Algorithms, Vol. 34, (2015): 54–61. https://doi.org/10.1016/j.jda.2015.05.001.

      [21] W. Che, Y. Zhao, H. Guo, Z. Su and T. Liu, “Sentence compression for aspect-based sentiment analysis”. IEEE/ACM Transactions on Audio, Speech, and Language Processing, Vol. 23, No.12, (2015), 2111–2124. https://doi.org/10.1109/TASLP.2015.2443982.

      [22] C. Oswald, A. I. Ghosh and B. Sivaselvan, “Knowledge engineering perspective of text compression”. In India Conference (INDICON), pp. 1–6, 2015. https://doi.org/10.1109/INDICON.2015.7443683.

      [23] C. Oswald, I. A. K., J. Avinash and B. Sivaselvan, “A Graph-Based Frequent Sequence Mining Approach to Text Compression”. In International Conference on Mining Intelligence and Knowledge Exploration, pp. 371–380. https://doi.org/10.1007/978-3-319-71928-3_35.

      [24] C. Oswald and B. Sivaselvan, “An optimal text compression algorithm based on frequent pattern mining”. J Ambient Intell Human Comput, 1–20.

      [25] Mohamed Elhoseny, K. Shankar, S. K. Lakshmanaprabu, Andino Maseleno, N. Arunkumar. Hybrid optimization with cryptography encryption for medical image security in Internet of Things. Neural Computing and Applications. 2018. https://doi.org/10.1007/s00521-018-3801-x.

      [26] K. Shankar, Mohamed Elhoseny, E. Dhiravida chelvi, SK. Lakshmanaprabu, Wanqing Wu. An Efficient Optimal Key Based Chaos Function for Medical Image Security. IEEE Access. 2018. https://doi.org/10.1109/ACCESS.2018.2874026.

      [27] T. Avudaiappan, R. Balasubramanian, S. Sundara Pandiyan, M. Saravanan, S. K. Lakshmanaprabu, K. Shankar, “Medical Image Security Using Dual Encryption with Oppositional Based Optimization Algorithm”, Journal of Medical Systems, 42.11 (2018) 1-11. https://doi.org/10.1007/s10916-018-1053-z.

      [28] K.Shankar and P.Eswaran. “RGB Based Multiple Share Creation in Visual Cryptography with Aid of Elliptic Curve Cryptography”, China Communications, 14. 2 (2017): 118-130. https://doi.org/10.1109/CC.2017.7868160.

      [29] K.Shankar and P.Eswaran. “RGB Based Secure Share Creation in Visual Cryptography Using Optimal Elliptic Curve Cryptography Technique”, Journal of Circuits, Systems, and Computers, 25.11 (2016) : 1650138-1 to 23. https://doi.org/10.1142/S0218126616501383.

      [30] Nur Aminudin, Andino Maseleno, K. Shankar, S. Hemalatha, K. Sathesh kumar, Fauzi, Rita Irviani, Muhamad Muslihudin, “Nur Algorithm on Data Encryption and Decryption”, International Journal of Engineering & Technology, 7. 2.26 (2018): 109-118. https://doi.org/10.14419/ijet.v7i2.27.11574.

      [31] K. Shankar, Lakshmanaprabu S. K, “Optimal key based homomorphic encryption for color image security aid of ant lion optimization algorithm”, International Journal of Engineering & Technology, 7. 9 (2018) : 22-27. https://doi.org/10.14419/ijet.v7i1.9.9729.

      [32] K. Sathesh Kumar, K. Shankar, M. Ilayaraja, M. Rajesh, “Sensitive Data Security in Cloud Computing Aid of Different Encryption Techniques”, Journal of Advanced Research in Dynamical and Control Systems, 9. 18 (2017): 2888-2899.

      [33] K. Shankar and P.Eswaran. “An Efficient Image Encryption Technique Based on Optimized Key Generation in ECC Using Genetic Algorithm”, Advances in Intelligent Systems and Computing, Springer, 394 (2016): 705-714. https://doi.org/10.1007/978-81-322-2656-7_64.

      [34] K. Shankar and P.Eswaran. “A Secure Visual Secret Share (VSS) Creation Scheme in Visual Cryptography using Elliptic Curve Cryptography with Optimization Technique”. Australian Journal of Basic and Applied Sciences. 9. 36 (2015): 150-163.

      [35] K. Shankar and P.Eswaran. “ECC Based Image Encryption Scheme with aid of Optimization Technique using Differential Evolution Algorithm”, International Journal of Applied Engineering Research, 10. 5 (2015): 1841–184.


 

View

Download

Article ID: 14873
 
DOI: 10.14419/ijet.v7i4.14873




Copyright © 2012-2015 Science Publishing Corporation Inc. All rights reserved.