Loading

Hamming Distance Polygram Substitution Algorithm for Coding Optimization & Security
Atul S. Joshi1, P. R. Deshmukh2

1Prof. Atul S. Joshi, Department of Electronics & Telecommunication, Sipna College of Engineering & Technology, Amravati (M.S), India.
2Dr. P.R. Deshmukh, Department of Computer Science & Engineering, Sipna College of Engineering & Technology, Amravati (M.S), India.

Manuscript received on 07 February 2013 | Revised Manuscript received on 21 February 2013 | Manuscript Published on 28 February 2013 | PP: 211-214 | Volume-2 Issue-3, February 2013 | Retrieval Number: C0468022313/2013©BEIESP
Open Access | Editorial and Publishing Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: The joint approach of integrating selective encryption & coding optimization is presented in this paper. Binary bit stream of the input is divided into the plaintext chunk of 64 bits. Random Key of 128 bits is generated. Key bits are then selected randomly. These randomly selected bits are change again randomly according to plaintext bits. Hamming distance is calculated in between the plaintext & changed key bits. Based on this Hamming distance codebook is form. Index of the codeword is treated as a cipher text which is itself a compressed code. Two levels of encryption is achieved in this work which makes the algorithm more secured than other encryption algorithm. The proposed algorithm is compared for standard test image on the basis compression performance & computational complexity. The result taken shows better performance of the proposed method over other standard methods.
Keywords: Hamming Distance, Polygram Substitution, Key, Encryption, Compression.

Scope of the Article: Discrete Optimization