Professional Documents
Culture Documents
Syllabus
1
20-02-2023
2
20-02-2023
• Data compression is science used to reduce the size of data being stored
or transmitted.
WHAT IS CYPTOGRAPHY?
• cryptography is the study of
secret (crypto-) writing (-graphy)
Bank Bank
Katie’s
order Online
CD Store
Web Server
ISP
CD
Order printed at Warehouse
CD warehouse
Katie sends
CD arrives 2-3 days
Order Form after order is received 6
3
20-02-2023
Internet Backbone
E
Breaking into
D store database
Online CD Store
Web Server
B
ISP Sniffer at ISP
C
Sniffer on CD
Warehouse
Internet backbone
A
Tapping line
Katie 7
Security Goals
Confiden
tiality
Integri Authen
ty tication
DCE//SEM VI//EXTC//Dr. Vishakha Kelkar 8
4
20-02-2023
Terminology
cryptography
the art or science encompassing the principles and methods of
transforming an intelligible message into one that is
unintelligible, and then retransforming that message back to
its original form
plaintext
the original intelligible message
ciphertext
the transformed message
cipher
an algorithm for transforming an intelligible message into one
that is unintelligible by transposition and/or substitution
methods
key
some critical information used by the cipher, known only to the
sender & receiver
DCE//SEM VI//EXTC//Dr. Vishakha Kelkar 9
5
20-02-2023
Introduction to Data
Compression
6
20-02-2023
7
20-02-2023
Compression and
Reconstruction
Source X
Reconstructed Y
Compressed Xc
Compression Reconstruction
Lossless compression
techniques
Huffman coding Text compression
Image compression
8
20-02-2023
Lossy Compression
Storing transmitting speech
Video
human perception
----Telephony,wideband audio,CD
9
20-02-2023
Lossy compression
If we accept some distortion, we can achieve much
higher compression ratio.
10
20-02-2023
Measures Of Performance
Relative complexity of the algo.
How fast the algo. performs
How much loss in reconstruction
Compression ration
Bit Rate
MSE/PSNR
Fidelity
DCE//SEM VI//EXTC//Dr. Vishakha Kelkar 22
11
20-02-2023
Model Model
Probability Probability
Probability Probability
Distribution Distribution
Estimates Estimates
Transmission System Original Source
Source Encoder Decoder Messages
Messages Compressed
Bit Stream
Example 1
9 11 11 11 14 13 15 17 16 17 20 21
We could represent each number using 5 bits (could use 4 bits).
Need 12*5 = 60 bits (or 12*4 = 48 bits) for entire message.
20 y = 1.0175x + 7.9697
15
10
0
0 2 4 6 8 10 12
DCE//SEM VI//EXTC//Dr. Vishakha Kelkar 24
12
20-02-2023
Example 1, cont.
Model: xn = n + 8
Source: 9 11 11 11 14 13 15 17 16 17 20 21
Model: 9 10 11 12 13 14 15 16 17 18 19 20
Residual: 0 1 0 -1 1 -1 0 1 -1 -1 1 1
Example 2
27 28 29 28 26 27 29 28 30 32 34 36 38
We could represent each number using 6 bits (could use 4 bits).
Need 13*6 = 78 bits (or 13*4 = 52 bits) for entire message.
40
30
20
10
0
0 5 10 15
DCE//SEM VI//EXTC//Dr. Vishakha Kelkar 26
13
20-02-2023
Example 2, cont.
Transmit first value, then successive differences.
Source: 27 28 29 28 26 27 29 28 30 32 34 36 38
Transmit: 27 1 1 -1 -2 1 2 -1 2 2 2 2 2
6 bits for first number, then 3 bits for each difference value.
6 + 12*3 = 6+36 = 42 bits (as compared to 78 bits) .
Encoder and decoder must also know the model being used!
Run-length Encoding
Example: two character alphabet {a,b}
aaaaaaaaaaaaabbbbbbbbaaaaaaaaaaabbbbbbbbbbbbbbbaaa
14
20-02-2023
“If Youth, throughout all history, had had a champion to stand up for
it; to show a doubting world that a child can think; and, possibly, do it
practically; you wouldn’t constantly run across folks today who claim
that ‘a child don’t know anything’…
Entropy of English
Aoccdrnig to a rscheearch at an Elingsh uinervtisy, it
deosn't mttaer in waht oredr the ltteers in a wrod are, the
olny iprmoetnt tihng is that frist and lsat ltteer is at the
rghit pclae. The rset can be a toatl mses and you can
sitll raed it wouthit a porbelm. Tihs is bcuseae we do not
raed ervey lteter by itslef but the wrod as a wlohe.
30
15
20-02-2023
REFERENCES
Introduction To Data Compression
By Khalid Sayood
Data Compression Complete Reference
By David Salomon
Network Security
By William Stallings
Cryptography and Network Security
By Forouzan
16