{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,13]],"date-time":"2026-02-13T23:44:20Z","timestamp":1771026260367,"version":"3.50.1"},"reference-count":32,"publisher":"Springer Science and Business Media LLC","issue":"5","license":[{"start":{"date-parts":[[2020,10,19]],"date-time":"2020-10-19T00:00:00Z","timestamp":1603065600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2020,10,19]],"date-time":"2020-10-19T00:00:00Z","timestamp":1603065600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Peer-to-Peer Netw. Appl."],"published-print":{"date-parts":[[2021,9]]},"abstract":"<jats:title>Abstract<\/jats:title><jats:p>Data stored in physical storage or transferred over a communication channel includes substantial redundancy. Compression techniques cut down the data redundancy to reduce space and communication time. Nevertheless, compression techniques lack proper security measures, e.g., secret key control, leaving the data susceptible to attack. Data encryption is therefore needed to achieve data security in keeping the data unreadable and unaltered through a secret key. This work concentrates on the problems of data compression and encryption collectively without negatively affecting each other. Towards this end, an efficient, secure data compression technique is introduced, which provides cryptographic capabilities for use in combination with an adaptive Huffman coding, pseudorandom keystream generator, and S-Box to achieve confusion and diffusion properties of cryptography into the compression process and overcome the performance issues. Thus, compression is carried out according to a secret key such that the output will be both encrypted and compressed in a single step. The proposed work demonstrated a congruent fit for real-time implementation, providing robust encryption quality and acceptable compression capability. Experiment results are provided to show that the proposed technique is efficient and produces similar space-saving (%) to standard techniques. Security analysis discloses that the proposed technique is susceptible to the secret key and plaintext. Moreover, the ciphertexts produced by the proposed technique successfully passed all NIST tests, which confirm that the 99% confidence level on the randomness of the ciphertext.<\/jats:p>","DOI":"10.1007\/s12083-020-00981-8","type":"journal-article","created":{"date-parts":[[2020,10,19]],"date-time":"2020-10-19T10:19:59Z","timestamp":1603102799000},"page":"2651-2664","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":13,"title":["An efficient secure data compression technique based on chaos and adaptive Huffman coding"],"prefix":"10.1007","volume":"14","author":[{"given":"Muhammad","family":"Usama","sequence":"first","affiliation":[]},{"given":"Qutaibah M.","family":"Malluhi","sequence":"additional","affiliation":[]},{"given":"Nordin","family":"Zakaria","sequence":"additional","affiliation":[]},{"given":"Imran","family":"Razzak","sequence":"additional","affiliation":[]},{"given":"Waheed","family":"Iqbal","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,10,19]]},"reference":[{"issue":"3","key":"981_CR1","doi-asserted-by":"publisher","first-page":"752","DOI":"10.1109\/TKDE.2013.38","volume":"26","author":"S Bajaj","year":"2014","unstructured":"Bajaj S, Sion R (2014) . IEEE Trans Knowl Data Eng 26(3):752. https:\/\/doi.org\/10.1109\/TKDE.2013.38. http:\/\/ieeexplore.ieee.org\/document\/6468039\/","journal-title":"IEEE Trans Knowl Data Eng"},{"issue":"3","key":"981_CR2","doi-asserted-by":"publisher","first-page":"97","DOI":"10.1145\/1666420.1666444","volume":"53","author":"C Gentry","year":"2010","unstructured":"Gentry C (2010) . Commun ACM 53(3):97. https:\/\/doi.org\/10.1145\/1666420.1666444. http:\/\/portal.acm.org\/citation.cfm?doid=1666420.1666444","journal-title":"Commun ACM"},{"key":"981_CR3","doi-asserted-by":"publisher","unstructured":"Xiaolin Y, Nanzhong C, Zhigang J, Xiaobo. C. (2010) In: 2010 Second International Workshop on Education Technology and Computer Science. IEEE, pp 329\u2013332. https:\/\/doi.org\/10.1109\/ETCS.2010.460. http:\/\/ieeexplore.ieee.org\/document\/5458952\/","DOI":"10.1109\/ETCS.2010.460"},{"key":"981_CR4","doi-asserted-by":"publisher","unstructured":"Puangpronpitag S, Kasabai P, Pansa. D. (2012) In: 2012 9th International Conference on Electrical Engineering\/Electronics, Computer, Telecommunications and Information Technology. IEEE, pp 1\u20134. https:\/\/doi.org\/10.1109\/ECTICon.2012.6254320. http:\/\/ieeexplore.ieee.org\/document\/6254320\/","DOI":"10.1109\/ECTICon.2012.6254320"},{"issue":"1-2","key":"981_CR5","doi-asserted-by":"publisher","first-page":"50","DOI":"10.1016\/S0375-9601(98)00086-3","volume":"240","author":"MS Baptista","year":"1998","unstructured":"Baptista MS (1998) . Phys Lett A 240(1-2):50. https:\/\/doi.org\/10.1016\/S0375-9601(98)00086-3","journal-title":"Phys Lett A"},{"issue":"06","key":"981_CR6","doi-asserted-by":"publisher","first-page":"1259","DOI":"10.1142\/S021812749800098X","volume":"8","author":"J Fridrich","year":"1998","unstructured":"Fridrich J (1998) . Int J Bifurcat Chaos 8(06):1259. https:\/\/doi.org\/10.1142\/S021812749800098X","journal-title":"Int J Bifurcat Chaos"},{"issue":"5","key":"981_CR7","doi-asserted-by":"publisher","first-page":"1056","DOI":"10.1016\/j.jvcir.2014.03.003","volume":"25","author":"R Starosolski","year":"2014","unstructured":"Starosolski R (2014) . J Vis Commun Image Represent 25(5):1056. https:\/\/doi.org\/10.1016\/j.jvcir.2014.03.003. http:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S1047320314000595","journal-title":"J Vis Commun Image Represent"},{"issue":"4","key":"981_CR8","doi-asserted-by":"publisher","first-page":"367","DOI":"10.1016\/j.csi.2010.11.002","volume":"33","author":"SkK Chen","year":"2011","unstructured":"Chen S.k.K. (2011) . Comput Stand Interfaces 33(4):367. https:\/\/doi.org\/10.1016\/j.csi.2010.11.002. http:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S092054891100002X","journal-title":"Comput Stand Interfaces"},{"issue":"4","key":"981_CR9","doi-asserted-by":"publisher","first-page":"1013","DOI":"10.1016\/j.cnsns.2007.12.001","volume":"14","author":"N Nagaraj","year":"2009","unstructured":"Nagaraj N, Vaidya PG, Bhat KG (2009) . Commun Nonlinear Sci Numer Simul 14(4):1013. https:\/\/doi.org\/10.1016\/j.cnsns.2007.12.001","journal-title":"Commun Nonlinear Sci Numer Simul"},{"issue":"2","key":"981_CR10","doi-asserted-by":"publisher","first-page":"146","DOI":"10.1109\/TCSII.2010.2040315","volume":"57","author":"KW Wong","year":"2010","unstructured":"Wong KW, Lin Q, Chen J (2010) . IEEE Trans Circ Syst II: Express Briefs 57(2):146. https:\/\/doi.org\/10.1109\/TCSII.2010.2040315","journal-title":"IEEE Trans Circ Syst II: Express Briefs"},{"issue":"10","key":"981_CR11","doi-asserted-by":"publisher","first-page":"2987","DOI":"10.1016\/j.cnsns.2009.11.022","volume":"15","author":"H Hermassi","year":"2010","unstructured":"Hermassi H, Rhouma R, Belghith S (2010) . Commun Nonlinear Sci Numer Simul 15 (10):2987. https:\/\/doi.org\/10.1016\/j.cnsns.2009.11.022","journal-title":"Commun Nonlinear Sci Numer Simul"},{"key":"981_CR12","doi-asserted-by":"publisher","unstructured":"Zhu ZL, Tang Y, Liu Q, Zhang W, Yu H (2012) In: 2012 Fifth International Workshop on Chaos-fractals Theories and Applications. IEEE, pp 212\u2013216. https:\/\/doi.org\/10.1109\/IWCFTA.2012.52. http:\/\/ieeexplore.ieee.org\/lpdocs\/epic03\/wrapper.htm?arnumber=6383208","DOI":"10.1109\/IWCFTA.2012.52"},{"issue":"1","key":"981_CR13","first-page":"49","volume":"4","author":"SA El-said","year":"2011","unstructured":"El-said SA, Hussein KFA, Fouad MM (2011) . Int J Signal Process Image Process Pattern Recogn 4(1):49","journal-title":"Int J Signal Process Image Process Pattern Recogn"},{"key":"981_CR14","unstructured":"Usama M, Zakaria N (2017)"},{"issue":"5","key":"981_CR15","doi-asserted-by":"publisher","first-page":"828","DOI":"10.1109\/TMM.2005.854469","volume":"7","author":"CP Wu","year":"2005","unstructured":"Wu CP, Kuo CCJ (2005) . IEEE Trans Multimed 7(5):828. https:\/\/doi.org\/10.1109\/TMM.2005.854469","journal-title":"IEEE Trans Multimed"},{"issue":"5","key":"981_CR16","doi-asserted-by":"publisher","first-page":"1825","DOI":"10.1109\/TSP.2009.2013901","volume":"57","author":"J Zhou","year":"2009","unstructured":"Zhou J, Au OC, Wong PHW (2009) . IEEE Trans Signal Process 57(5):1825. https:\/\/doi.org\/10.1109\/TSP.2009.2013901","journal-title":"IEEE Trans Signal Process"},{"issue":"08","key":"981_CR17","doi-asserted-by":"publisher","first-page":"2129","DOI":"10.1142\/S0218127406015970","volume":"16","author":"G ALVAREZ","year":"2006","unstructured":"ALVAREZ G, LI S (2006) . Int J Bifurcat Chaos 16(08):2129. https:\/\/doi.org\/10.1142\/S0218127406015970","journal-title":"Int J Bifurcat Chaos"},{"issue":"2","key":"981_CR18","doi-asserted-by":"publisher","first-page":"326","DOI":"10.1016\/j.camwa.2009.12.033","volume":"60","author":"M Usama","year":"2010","unstructured":"Usama M, Khan MK, Alghathbar K, Lee C (2010) . Comput Math Appl 60(2):326. https:\/\/doi.org\/10.1016\/j.camwa.2009.12.033. http:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0898122110000064","journal-title":"Comput Math Appl"},{"key":"981_CR19","doi-asserted-by":"publisher","unstructured":"Luca A, Ilyas A, Vlad A (2011). In: ISSCS 2011 - International Symposium on Signals, Circuits and Systems. IEEE, pp 1\u20134. https:\/\/doi.org\/10.1109\/ISSCS.2011.5978664. http:\/\/ieeexplore.ieee.org\/lpdocs\/epic03\/wrapper.htm?arnumber=5978664","DOI":"10.1109\/ISSCS.2011.5978664"},{"key":"981_CR20","doi-asserted-by":"crossref","unstructured":"Schuster H G, Just W (2006) Deterministic chaos: an introduction, 4th edn. Wiley, New York","DOI":"10.1002\/3527604804"},{"issue":"6","key":"981_CR21","doi-asserted-by":"publisher","first-page":"670","DOI":"10.1016\/j.image.2013.02.004","volume":"28","author":"H Zhu","year":"2013","unstructured":"Zhu H, Zhao C, Zhang X (2013) . Signal Process Image Commun 28(6):670. https:\/\/doi.org\/10.1016\/j.image.2013.02.004","journal-title":"Signal Process Image Commun"},{"issue":"5","key":"981_CR22","doi-asserted-by":"publisher","first-page":"2557","DOI":"10.1016\/j.chaos.2007.10.049","volume":"40","author":"A Kanso","year":"2009","unstructured":"Kanso A, Smaoui N (2009) . Chaos Solitons Fract 40(5):2557. https:\/\/doi.org\/10.1016\/j.chaos.2007.10.049. http:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0960077907009320","journal-title":"Chaos Solitons Fract"},{"issue":"1","key":"981_CR23","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/BF00630563","volume":"4","author":"E Biham","year":"1991","unstructured":"Biham E, Shamir A (1991) J Cryptol 4(1):3. https:\/\/doi.org\/10.1.1.31.2000","journal-title":"J Cryptol"},{"key":"981_CR24","doi-asserted-by":"publisher","unstructured":"Belazi A, Rhouma R, Belghith S (2015) In: 2015 International Wireless Communications and Mobile Computing Conference (IWCMC). IEEE, pp 611\u2013615. https:\/\/doi.org\/10.1109\/IWCMC.2015.7289153. http:\/\/ieeexplore.ieee.org\/lpdocs\/epic03\/wrapper.htm?arnumber=7289153","DOI":"10.1109\/IWCMC.2015.7289153"},{"issue":"12","key":"981_CR25","doi-asserted-by":"publisher","first-page":"155014771989595","DOI":"10.1177\/1550147719895957","volume":"15","author":"M Usama","year":"2019","unstructured":"Usama M, Rehman O, Memon I, Rizvi S (2019) . Int J Distrib Sens Netw 15 (12):155014771989595. https:\/\/doi.org\/10.1177\/1550147719895957","journal-title":"Int J Distrib Sens Netw"},{"issue":"4","key":"981_CR26","doi-asserted-by":"publisher","first-page":"825","DOI":"10.1145\/31846.42227","volume":"34","author":"JS Vitter","year":"1987","unstructured":"Vitter JS (1987) . J ACM 34(4):825. https:\/\/doi.org\/10.1145\/31846.42227. http:\/\/portal.acm.org\/citation.cfm?doid=31846.42227","journal-title":"J ACM"},{"key":"981_CR27","unstructured":"Witten J, Bell I, Cleary T Calgary Corpus (1990). http:\/\/www.data-compression.info\/Corpora\/CalgaryCorpus\/"},{"issue":"1","key":"981_CR28","doi-asserted-by":"publisher","first-page":"91","DOI":"10.1016\/j.vlsi.2011.05.001","volume":"45","author":"W Zhan","year":"2012","unstructured":"Zhan W, El-Maleh A (2012) . Integr VLSI J 45(1):91. https:\/\/doi.org\/10.1016\/j.vlsi.2011.05.001. http:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0167926011000514","journal-title":"Integr VLSI J"},{"key":"981_CR29","doi-asserted-by":"publisher","first-page":"326","DOI":"10.1016\/j.dam.2013.08.022","volume":"163","author":"ST Klein","year":"2014","unstructured":"Klein ST, Shapira D (2014) . Discret Appl Math 163:326. https:\/\/doi.org\/10.1016\/j.dam.2013.08.022. http:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0166218X13003636","journal-title":"Discret Appl Math"},{"key":"981_CR30","doi-asserted-by":"publisher","first-page":"601","DOI":"10.1109\/ICNC.2008.227","volume":"4","author":"JPJ Peng","year":"2008","unstructured":"Peng JPJ, Jin SJS, Chen GCG, Yang ZYZ, Liao XLX (2008) . Fourth Int Conf Natur Comput 4:601. https:\/\/doi.org\/10.1109\/ICNC.2008.227","journal-title":"Fourth Int Conf Natur Comput"},{"key":"981_CR31","doi-asserted-by":"publisher","unstructured":"Mishra M, Mankar VH (2012) pp 169\u2013179. https:\/\/doi.org\/10.1007\/978-3-642-30111-7_17","DOI":"10.1007\/978-3-642-30111-7_17"},{"key":"981_CR32","first-page":"131","volume":"800","author":"A Rukhin","year":"2010","unstructured":"Rukhin A, Soto J, Nechvatal J, Miles S, Barker E, Leigh S, Levenson M, Vangel M, Banks D, Heckert A, Dray J, Vo S (2010) . Natl Inst Stand Technol 800:131","journal-title":"Natl Inst Stand Technol"}],"container-title":["Peer-to-Peer Networking and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-020-00981-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s12083-020-00981-8\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-020-00981-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,10,19]],"date-time":"2021-10-19T07:03:53Z","timestamp":1634627033000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s12083-020-00981-8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,10,19]]},"references-count":32,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2021,9]]}},"alternative-id":["981"],"URL":"https:\/\/doi.org\/10.1007\/s12083-020-00981-8","relation":{},"ISSN":["1936-6442","1936-6450"],"issn-type":[{"value":"1936-6442","type":"print"},{"value":"1936-6450","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,10,19]]},"assertion":[{"value":"7 April 2020","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"4 August 2020","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"19 October 2020","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"30 November 2020","order":4,"name":"change_date","label":"Change Date","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"Update","order":5,"name":"change_type","label":"Change Type","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"Springer Nature\u2019s version of this paper was updated to add the funding note: Open access funding provided by the Qatar National Library.","order":6,"name":"change_details","label":"Change Details","group":{"name":"ArticleHistory","label":"Article History"}}]}}