SlideShare une entreprise Scribd logo
1  sur  17
Reduces the number of bits contained in
the information.
Sometimes programs need to send more
data in a timely fashion than the bandwidth
of the network supports.
Need to compress the data at the sender
and decompress it at the receiver.
In terms of storage, the capacity of a
storage device can be effectively increased
with methods that compresses a body of
data.
The bandwidth of a digital communication
link can be effectively increased by
compressing data at the sending end and
decompressing data at the receiving end.
Lossless Compression – data is
compressed and can be uncompressed
without loss of information. These are
referred to as bit-preserving or reversible
compression systems.
Lossy Compression – aim to obtain the
best possible fidelity for a given bit-rate or
minimizing the bit-rate to achieve a given
fidelity measure. Most suited to video and
audio compression techniques
Lossless
- Image quality is not reduced.
Use in: artificial images that contain sharp-
edged lines such as technical drawings,
textual graphics, comics, maps or logos.
 Lossy
- reduces image quality. Cannot get the
original image back & lose some
information.
Use in: natural images such as photos of
landscapes
 Lossless - allows one to preserve an exact
copy of one's audio files
Usage: For archival purposes, editing,
audio quality.
 Lossy - irreversible changes , achieves far
greater compression, use psychoacoustics
to recognize that not all data in an audio
stream can be perceived by the human
auditory system.
Usage: distribution of streaming audio, or
interactive applications
• Start by encoding the first frame using a
still image compression method.
• It should then encode each successive
frame by identifying the differences
between the frame and its predecessor,
and encoding these differences. If the
frame is very different from its
predecessor it should be coded
independently of any other frame.
In the video compression literature, a
frame that is coded using its predecessor
is called inter frame (or just inter), while a
frame that is coded independently is called
intra frame (or just intra).
• To carry sensitive information, a system
must be able to assure privacy.
• One way to safeguard data from attacks
is encrypting the data.
• Encryption – sender transform original
information (plaintext) to another form
(ciphertext) by a function that is
parameterized by a key.
• Decryption – reverses the original
process to transform the message
(ciphertext) back to its original form
(plaintext).
Plaintext Plaintext
Ciphertext
Symmetric Keys – use same key to
encrypt and decrypt a message.
Asymmetric Keys -2 keys are needed
(public key and private key); 1 key to
encrypt, another key to decrypt and vice
versa.
Protection Description
Confidentiality Allow only authorized users to access
information.
Authentication Verify who the sender was and trust
the sender is who they claim to be.
Integrity Trust the information has not been
altered
No repudiation Ensure that the sender or receiver
cannot deny that a message was sent
or received.
Access Control Restrict availability to information.

Contenu connexe

En vedette

20 march 2015 maharashtra crime
20 march 2015 maharashtra crime20 march 2015 maharashtra crime
20 march 2015 maharashtra crime
siraj chaudhary
 
Мерки од областа на економијата
Мерки од областа на економијатаМерки од областа на економијата
Мерки од областа на економијата
SDSMshare
 

En vedette (10)

Maharashtra crimes
Maharashtra crimesMaharashtra crimes
Maharashtra crimes
 
Rohit yadav
Rohit yadavRohit yadav
Rohit yadav
 
STARLIFE Katalógus HU 2014
STARLIFE Katalógus HU 2014STARLIFE Katalógus HU 2014
STARLIFE Katalógus HU 2014
 
อเมริกาเหนือ
อเมริกาเหนืออเมริกาเหนือ
อเมริกาเหนือ
 
20 march 2015 maharashtra crime
20 march 2015 maharashtra crime20 march 2015 maharashtra crime
20 march 2015 maharashtra crime
 
Ms sillk island - little halong in Mekong delta
Ms sillk island - little halong in Mekong deltaMs sillk island - little halong in Mekong delta
Ms sillk island - little halong in Mekong delta
 
Мерки од областа на економијата
Мерки од областа на економијатаМерки од областа на економијата
Мерки од областа на економијата
 
Phu quoc island 4 days
Phu quoc island 4 daysPhu quoc island 4 days
Phu quoc island 4 days
 
Defending My Design
Defending My DesignDefending My Design
Defending My Design
 
ใบงาน Economic
ใบงาน Economicใบงาน Economic
ใบงาน Economic
 

Similaire à Chapter 5

Data representation
Data representationData representation
Data representation
ChingTing
 
Digital graphics for computer games
Digital graphics for computer gamesDigital graphics for computer games
Digital graphics for computer games
Jason
 
Multimedia presentation video compression
Multimedia presentation video compressionMultimedia presentation video compression
Multimedia presentation video compression
LaLit DuBey
 
A research paper_on_lossless_data_compre
A research paper_on_lossless_data_compreA research paper_on_lossless_data_compre
A research paper_on_lossless_data_compre
Luisa Francisco
 

Similaire à Chapter 5 (20)

Lecture 6 -_presentation_layer
Lecture 6 -_presentation_layerLecture 6 -_presentation_layer
Lecture 6 -_presentation_layer
 
Image compression
Image compressionImage compression
Image compression
 
Pbl1
Pbl1Pbl1
Pbl1
 
Data representation
Data representationData representation
Data representation
 
JAVA 2013 IEEE NETWORKSECURITY PROJECT Extracting Spread-Spectrum Hidden Data...
JAVA 2013 IEEE NETWORKSECURITY PROJECT Extracting Spread-Spectrum Hidden Data...JAVA 2013 IEEE NETWORKSECURITY PROJECT Extracting Spread-Spectrum Hidden Data...
JAVA 2013 IEEE NETWORKSECURITY PROJECT Extracting Spread-Spectrum Hidden Data...
 
Extracting spread spectrum hidden
Extracting spread spectrum hiddenExtracting spread spectrum hidden
Extracting spread spectrum hidden
 
Sub1584
Sub1584Sub1584
Sub1584
 
Data compression
Data compressionData compression
Data compression
 
Video compression
Video compressionVideo compression
Video compression
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
 
Dr.U.Priya, Head & Assistant Professor of Commerce, Bon Secours for Women, Th...
Dr.U.Priya, Head & Assistant Professor of Commerce, Bon Secours for Women, Th...Dr.U.Priya, Head & Assistant Professor of Commerce, Bon Secours for Women, Th...
Dr.U.Priya, Head & Assistant Professor of Commerce, Bon Secours for Women, Th...
 
Image Encryption-Then-Compression System via Prediction Error Clustering and ...
Image Encryption-Then-Compression System via Prediction Error Clustering and ...Image Encryption-Then-Compression System via Prediction Error Clustering and ...
Image Encryption-Then-Compression System via Prediction Error Clustering and ...
 
Data Storage By ZAK
Data Storage By ZAKData Storage By ZAK
Data Storage By ZAK
 
Digital graphics for computer games
Digital graphics for computer gamesDigital graphics for computer games
Digital graphics for computer games
 
Multimedia presentation video compression
Multimedia presentation video compressionMultimedia presentation video compression
Multimedia presentation video compression
 
A research paper_on_lossless_data_compre
A research paper_on_lossless_data_compreA research paper_on_lossless_data_compre
A research paper_on_lossless_data_compre
 
Audio video steganography using forensic techniquefor data security
Audio video steganography using forensic techniquefor data securityAudio video steganography using forensic techniquefor data security
Audio video steganography using forensic techniquefor data security
 
Secure communication
Secure communicationSecure communication
Secure communication
 
IJREAMV03I022640.pdf
IJREAMV03I022640.pdfIJREAMV03I022640.pdf
IJREAMV03I022640.pdf
 

Dernier

call Now 9811711561 Cash Payment乂 Call Girls in Dwarka Mor
call Now 9811711561 Cash Payment乂 Call Girls in Dwarka Morcall Now 9811711561 Cash Payment乂 Call Girls in Dwarka Mor
call Now 9811711561 Cash Payment乂 Call Girls in Dwarka Mor
vikas rana
 

Dernier (15)

LC_YouSaidYes_NewBelieverBookletDone.pdf
LC_YouSaidYes_NewBelieverBookletDone.pdfLC_YouSaidYes_NewBelieverBookletDone.pdf
LC_YouSaidYes_NewBelieverBookletDone.pdf
 
The Selfspace Journal Preview by Mindbrush
The Selfspace Journal Preview by MindbrushThe Selfspace Journal Preview by Mindbrush
The Selfspace Journal Preview by Mindbrush
 
9892124323, Call Girls in mumbai, Vashi Call Girls , Kurla Call girls
9892124323, Call Girls in mumbai, Vashi Call Girls , Kurla Call girls9892124323, Call Girls in mumbai, Vashi Call Girls , Kurla Call girls
9892124323, Call Girls in mumbai, Vashi Call Girls , Kurla Call girls
 
Top Rated Pune Call Girls Tingre Nagar ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated  Pune Call Girls Tingre Nagar ⟟ 6297143586 ⟟ Call Me For Genuine Se...Top Rated  Pune Call Girls Tingre Nagar ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Tingre Nagar ⟟ 6297143586 ⟟ Call Me For Genuine Se...
 
2k Shots ≽ 9205541914 ≼ Call Girls In Palam (Delhi)
2k Shots ≽ 9205541914 ≼ Call Girls In Palam (Delhi)2k Shots ≽ 9205541914 ≼ Call Girls In Palam (Delhi)
2k Shots ≽ 9205541914 ≼ Call Girls In Palam (Delhi)
 
(Anamika) VIP Call Girls Navi Mumbai Call Now 8250077686 Navi Mumbai Escorts ...
(Anamika) VIP Call Girls Navi Mumbai Call Now 8250077686 Navi Mumbai Escorts ...(Anamika) VIP Call Girls Navi Mumbai Call Now 8250077686 Navi Mumbai Escorts ...
(Anamika) VIP Call Girls Navi Mumbai Call Now 8250077686 Navi Mumbai Escorts ...
 
Pokemon Go... Unraveling the Conspiracy Theory
Pokemon Go... Unraveling the Conspiracy TheoryPokemon Go... Unraveling the Conspiracy Theory
Pokemon Go... Unraveling the Conspiracy Theory
 
2k Shots ≽ 9205541914 ≼ Call Girls In Jasola (Delhi)
2k Shots ≽ 9205541914 ≼ Call Girls In Jasola (Delhi)2k Shots ≽ 9205541914 ≼ Call Girls In Jasola (Delhi)
2k Shots ≽ 9205541914 ≼ Call Girls In Jasola (Delhi)
 
2k Shots ≽ 9205541914 ≼ Call Girls In Dashrath Puri (Delhi)
2k Shots ≽ 9205541914 ≼ Call Girls In Dashrath Puri (Delhi)2k Shots ≽ 9205541914 ≼ Call Girls In Dashrath Puri (Delhi)
2k Shots ≽ 9205541914 ≼ Call Girls In Dashrath Puri (Delhi)
 
call Now 9811711561 Cash Payment乂 Call Girls in Dwarka Mor
call Now 9811711561 Cash Payment乂 Call Girls in Dwarka Morcall Now 9811711561 Cash Payment乂 Call Girls in Dwarka Mor
call Now 9811711561 Cash Payment乂 Call Girls in Dwarka Mor
 
(Aarini) Russian Call Girls Surat Call Now 8250077686 Surat Escorts 24x7
(Aarini) Russian Call Girls Surat Call Now 8250077686 Surat Escorts 24x7(Aarini) Russian Call Girls Surat Call Now 8250077686 Surat Escorts 24x7
(Aarini) Russian Call Girls Surat Call Now 8250077686 Surat Escorts 24x7
 
8377087607 Full Enjoy @24/7-CLEAN-Call Girls In Chhatarpur,
8377087607 Full Enjoy @24/7-CLEAN-Call Girls In Chhatarpur,8377087607 Full Enjoy @24/7-CLEAN-Call Girls In Chhatarpur,
8377087607 Full Enjoy @24/7-CLEAN-Call Girls In Chhatarpur,
 
WOMEN EMPOWERMENT women empowerment.pptx
WOMEN EMPOWERMENT women empowerment.pptxWOMEN EMPOWERMENT women empowerment.pptx
WOMEN EMPOWERMENT women empowerment.pptx
 
$ Love Spells^ 💎 (310) 882-6330 in West Virginia, WV | Psychic Reading Best B...
$ Love Spells^ 💎 (310) 882-6330 in West Virginia, WV | Psychic Reading Best B...$ Love Spells^ 💎 (310) 882-6330 in West Virginia, WV | Psychic Reading Best B...
$ Love Spells^ 💎 (310) 882-6330 in West Virginia, WV | Psychic Reading Best B...
 
2k Shots ≽ 9205541914 ≼ Call Girls In Mukherjee Nagar (Delhi)
2k Shots ≽ 9205541914 ≼ Call Girls In Mukherjee Nagar (Delhi)2k Shots ≽ 9205541914 ≼ Call Girls In Mukherjee Nagar (Delhi)
2k Shots ≽ 9205541914 ≼ Call Girls In Mukherjee Nagar (Delhi)
 

Chapter 5

  • 1.
  • 2. Reduces the number of bits contained in the information. Sometimes programs need to send more data in a timely fashion than the bandwidth of the network supports. Need to compress the data at the sender and decompress it at the receiver.
  • 3. In terms of storage, the capacity of a storage device can be effectively increased with methods that compresses a body of data. The bandwidth of a digital communication link can be effectively increased by compressing data at the sending end and decompressing data at the receiving end.
  • 4. Lossless Compression – data is compressed and can be uncompressed without loss of information. These are referred to as bit-preserving or reversible compression systems. Lossy Compression – aim to obtain the best possible fidelity for a given bit-rate or minimizing the bit-rate to achieve a given fidelity measure. Most suited to video and audio compression techniques
  • 5. Lossless - Image quality is not reduced. Use in: artificial images that contain sharp- edged lines such as technical drawings, textual graphics, comics, maps or logos.
  • 6.  Lossy - reduces image quality. Cannot get the original image back & lose some information. Use in: natural images such as photos of landscapes
  • 7.  Lossless - allows one to preserve an exact copy of one's audio files Usage: For archival purposes, editing, audio quality.
  • 8.  Lossy - irreversible changes , achieves far greater compression, use psychoacoustics to recognize that not all data in an audio stream can be perceived by the human auditory system. Usage: distribution of streaming audio, or interactive applications
  • 9. • Start by encoding the first frame using a still image compression method. • It should then encode each successive frame by identifying the differences between the frame and its predecessor, and encoding these differences. If the frame is very different from its predecessor it should be coded independently of any other frame.
  • 10. In the video compression literature, a frame that is coded using its predecessor is called inter frame (or just inter), while a frame that is coded independently is called intra frame (or just intra).
  • 11.
  • 12. • To carry sensitive information, a system must be able to assure privacy. • One way to safeguard data from attacks is encrypting the data.
  • 13. • Encryption – sender transform original information (plaintext) to another form (ciphertext) by a function that is parameterized by a key. • Decryption – reverses the original process to transform the message (ciphertext) back to its original form (plaintext).
  • 15. Symmetric Keys – use same key to encrypt and decrypt a message.
  • 16. Asymmetric Keys -2 keys are needed (public key and private key); 1 key to encrypt, another key to decrypt and vice versa.
  • 17. Protection Description Confidentiality Allow only authorized users to access information. Authentication Verify who the sender was and trust the sender is who they claim to be. Integrity Trust the information has not been altered No repudiation Ensure that the sender or receiver cannot deny that a message was sent or received. Access Control Restrict availability to information.