SlideShare ist ein Scribd-Unternehmen logo
1 von 51
Data Representation, Data
Compression & Encryption
Group Member:
TAY LEONG PING B031110105
NG SING HAN B031110101
NGOH KYE LIAN B031110024
WONG LAM SHEN B031110044
TAN CHING TING B031110241
Data Representation
Data Representation
Data representation is generally how information is conceived,
manipulated, and recorded. The term can also be defined as
the form in which data and information is kept in a certain
environment. How data is stored varies from one environment
to another, with each environment having its own set of rules
and standards.
Data Representation
Data Representation refers to the methods used internally
to represent information stored in a computer. Computers
store lots of different types of information:
 numbers
 text
 graphics of many varieties (stills, video, animation)
 sound
Data Representation
 " The problem is that a file containing the bytes 108, 97,
110 would read as “lan” on an ASCII system, but
 “%/>” on an EBCDIC system
 In ASCII, the value 108 means the character 'l'
 " In EBCDIC, the value 108 means the character '%'
 ASCII - American Standard Code for Information
Interchange, representing English on all microcomputers
and most minicomputer.
 EBCDIC - Extended Binary Coded Decimal Interchange
Code, represents English on IBM mainframes.
 Shift-JIS - Japanese Characters.
Data Representation
Data representations include:
 ASN.1 (Abstract Syntax Notation One) - an ISO
standard
 XDR (External Data Representation)
- used with SunRPC
ASN.1
 Abstract Syntax Notation (ASN.1) is standard and notation
that describes rules and structures for
representing, encoding, transmitting, and decoding data. It
consists of two parts:
1. abstract syntax that describes data structures in an
unambiguous way. Use “ integers”, “character strings”,
and “structures” rather than bits and bytes.
2. A transfer syntax that describes the bit stream
encoding of ASN.1 data objects.
ASN.1
 The standard ASN.1 encoding rules include:
- Basic Encoding Rules (BER)
- Canonical Encoding Rules (CER)
- Distinguished Encoding Rules(DER)
- XML Encoding Rules (XER)
- Packed Encoding Rules (PER)
ASN.1
 Example of ASN.1’S abstract syntax:
Student ::= SEQUENCE {
name [0] IMPLICIT OCTET STRING OPTIONAL,
grad [1] IMPLICIT BOOLEAN OPTIONAL DEFAULT FALSE,
gpa [2] IMPLICIT REAL OPTIONAL,
id [3] IMPLICIT INTEGER,
bday [4] IMPLICIT OCTET STRING OPTIONAL
}
Current Uses of ANS1
 Audio & Video over the Internet
AT&T, Intel, IBM, Microsoft, 3COM
 Electronic Commerce
American Express, GTE, MasterCard, VISA
 Telephony
AT&T, MCI, Motorola, Nokia, Sprint
 Aviation
FAA, ICAO
 Manufacturing
Ford, Mercedes Benz, Mitsubishi
 Network Management
Bull, Compaq, Hewlett-Packard, Sun
 Routers
Bay Networks, Cisco, Racal, Xyplex
External Data Representation
(XDR)
 External Data Representation (XDR) is much simpler than
ASN.1, but less powerful. For instance:
1. XDR uses implicit typing. Communicating peers must
know the type of any exchanged data. In contrast,
ASN.1 uses explicit typing; it includes type information
as part of the transfer syntax.
2. In XDR, all data is transferred in units of 4 bytes.
Numbers are transferred in network order, most
significant byte first.
XDR
 4 bytes of XDR message:
XDR
3. Strings consist of a 4 byte length, followed by the data
(and perhaps padding in the last byte).
4. Defined types include: integer, enumeration, boolean,
floating point, fixed length array, structures, plus
others.
 One advantage that XDR has over ASN.1 is that current
implementations of ASN.1 execute significantly slower than
XDR.
Multipurpose Internet Mail Extensions
(MIME)
 " The message “£100 is about !150” could
become
Content-Transfer-Encoding: quoted-printable
Content-Type: text/plain; charset=ISO-8859-15
MIME-Version: 1.0
=A3100 is about =A4150
MIME
 or
Content-Transfer-Encoding: base64
Content-Type: text/plain; charset=ISO-8859-15
MIME-Version: 1.0
ozEwMCBpcyBhYm91dCCkMTUwCg=49
Data Compression
Data Compression
 Data compression is the art of reducing the
number of bits needed to store or transmit data.
 Compression can be either lossless or lossy.
Lossless Compression – involve no loss of information. If data
have been losslessly compressed, the original data can be recovered
exactly from compress data. It is generally used for application that
cannot tolerate any difference between original and reconstructed
data.
Lossy Compression – involve some loss of information and data
have been compressed using lossy techniques generally cannot be
recovered or reconstructed exactly. In return for accepting this
distortion in reconstruction, can generally obtain much higher
compression ratios than is possible with lossless compression.
Steps of Data Compression
 The compression of still images, audio and video data streams:
1. Picture preparation – generates an appropriate digital
representation of the information in the medium being
compressed.
2. Picture processing –is the first step that makes use of the
various compression algorithms.
3. Quantization – Values determined in the previous step cannot
and should not be processed with full exactness; instead they are
quantized according to a specific resolution and characteristic
curve.
4. Entropy encoding – with a sequential data stream of individual
bits and bytes, different techniques are used to perform a final,
lossless compression.
Steps of Data Compression
Major steps of image compression, can also be applied to audio and video data
Uncompressed
Picture
Picture
Preparation
Picture
Processing
Quantization
Entropy
Coding
Compressed
Picture
Image Compression
 to represent images with less data in order to save storage
costs or transmission time.
 possible to reduce file size to 10% from the original without
noticeable loss in quality.
 Image compression can be lossless or lossy.
Image Compression
 Lossless
- Image quality is not reduced.
Use in: artificial images that contain sharp-edged lines such as
technical drawings, textual graphics, comics, maps or logos.
Methods: run-length encoding (RLE), entropy coding (Huffman
coding) and dictionary coders (LZW).
Image Compression
 Lossy
- reduces image quality. Cannot get the original image back &
lose some information.
Use in: natural images such as photos of landscapes
Methods: discrete cosine transform (DCT, used in JPEG) or
wavelet transform (used in JPEG 2000), color quantization
FORMAT FILE EXTENTION TYPE OF
COMPRESSION
METHODS USAGE
BMP (bitmap) .bmp Cosiderably
compressed with
lossless
ZIP used to store bitmap
digital images
JPEG
(Joint Photographic
Experts Group)
.jpg , .jpeg , .jpe Lossy
Lossless
- Discrete Cosine
Transform (DCT) &
Chroma Subsampling
- Run-Length
Encoding (RLE)
For natural images
GIF (Graphics
Interchange Format
.gif , .giff , .gfa Lossless LZW (Lempel-Ziv-
Welch)
For artificial images
(sharp-edge lines
and few colors) &
support animation
PNG (Portable
Network Graphics)
.png Lossless DEFLATE Better compression &
features than GIF,
but don’t support
animation
TIFF (Tagged Image
File Format)
.tiff , .tif Lossless RLE / LZW /
DEFLATE / ZIP
Flexible file format,
can store multiple
images in a single file
JPEG2000 jp2, .j2c, jpc, j2k, jpx Lossy & Lossless Discrete Wavelet
Transform (DWT)
Better image quality
than JPEG (up to
20%), not widely
used because of
some patent issues.
Comparison of graphics file formats
Block Diagram of JPEG Compression
Transformation
coding performed
using the Discrete
Cosine Transform
(DCT)
Quantization of all
DCT coefficients
( a lossy process)
Huffman coding
and arithmetic
coding as entropy
encoding methods
Source
image
JPEG compression
DCT Quantization Encoding
Compressed
image
Audio Compression
 A form of data compression designed to reduce the size of
audio files
 Audio compression can be lossless or lossy
 Audio compression algorithms are typically referred to as
audio codecs.
Audio Compression
 Lossless - allows one to preserve an exact
copy of one's audio files
Usage: For archival purposes, editing, audio
quality.
Codecs:
 Free Lossless Audio Codec (FLAC)
 Apple Lossless
 MPEG-4 ALS
 Monkey's Audio
 Lossless Predictive Audio Compression (LPAC)
 Lossless Transform Audio Compression (LTAC)
Audio Compression
 Lossy - irreversible changes , achieves far greater
compression, use psychoacoustics to recognize that not all
data in an audio stream can be perceived by the human
auditory system.
Usage: distribution of streaming audio, or interactive
applications
Codecs:
 MP2- MPEG-1Layer 2 audio codec
 MP3 – MPEG-1 Layer 3 audio codec
 MPC Musepack
 Vorbis Ogg Vorbis
 AAC Advanced Audio Coding (MPEG-2 and MPEG-4)
 WMA Windows Media Audio
 AC3 AC-3 or Dolby Digital A/52
Moving Picture Expert Group
(MPEG)
 MPEG is an ISO/IEC working group, established in 1988 to
develop standards for digital audio and video formats.
 MPEG-1
Designed for up to 1.5 Mbit/sec
Standard for the compression of moving pictures and audio. Most
popular is level 3 of MPEG-1 (MP3). MPEG-1 is the standard of
compression for VideoCD.
 MPEG-2
Designed for between 1.5 and 15 Mbit/sec
Standard on which Digital Television set top boxes and DVD
compression is based. Designed for the compression and
transmission of digital broadcast television
MPEG (cont.)
• MPEG-4
Integrates several different audio components into one
standard: speech compression, perceptually based coders,
text-to-speech, and MIDI. MPEG-4 AAC (Advanced Audio
Coding), is similar to the MPEG-2 AAC standard, with some
minor changes
 MPEG-7 (under development) - also called the Multimedia
Content Description Interface. In terms of audio:facilitate
the representation and search for sound content. Example
application supported by MPEG-7: automatic speech
recognition (ASR).
MPEG Audio Encoding
Uncompressed
Audio Signal
Division in 32
Frequency
Bands
Psychoacoustic
Model
Quantization
(if
applicable)
Entropy
Encoding
Compressed
Audio Data
controls
Audio Compression
Audio Compression Format-MP3
 Played by almost every portable digital audio device and many
DVD players, MP3 is still hard to go past if looking for maximum
compatibility for your files.
 can get much better compression from other formats, hard disks
and blank CDs are cheap enough to justify the extra file size.
 Stereo imaging is not terrific and encoding quality differs from
one software package to another.
 Compression: 5.
 Quality: 7.
 Compatibility: 10.
 Overall: 7.5.
Audio Compression Format-WMA
 Window's Media Audio is Microsoft's contribution to high quality,
lossy audio compression. Like most other new formats, it
outperforms MP3 in terms of quality and compression, particularly
at lower bitrates.
 WMA is probably the format of choice for streaming at low
bandwidths. Like MP3, however, the stereo imaging is not very
accurate.
 WMA tends to overcompensate for its high compression with what
is often called 'overbrightness'.
 Compression: 8.
 Quality: 7.
 Compatibility: 9.
 Overall: 8.
Audio Compression Format- Ogg Vorbis
 project attempting to replace all proprietary audio formats with an
open standard freeware codec. Version one was released in this past
fortnight and has been demonstrated to be very high quality and
outperforms MP3 by a long shot.
 At low bitrates it doesn't compete with WMA, and at high bitrates it
falls short of MPC. Given that it is a work in progress, however, it has
strong potential to become a widely used audio codec.
 Some portable device manufacturers are promising to support Ogg
Vorbis in future software releases.
 Compression: 8.
 Quality: 7.
 Compatibility: 6.
 Overall: 7.
Video Compression
 Storing and transmitting uncompressed raw video is not an
efficient technique because it needs large amounts of
storage and bandwidth.
 DVD, DSS, and internet video, all use digital data → take a
lot of space to store and large bandwidth to transmit.
 Video compression technique is used to compress the data
for these applications
→ less storage space and less bandwidth to transmit data.
Video Compression
 Videos are sequences of images displayed at a high rate. Each of
these images is called a frame.
 Human eye can not notice small changes in the frames such as a
slight difference in color.
 Therefore, video compression standards do not require the
encoding of all the details and some of the less important video
details are lost. This is because lossy compression is used due to
its ability to get very high compression ratios.
 Typically 30 frames are displayed on the screen every second.
Video Compression Process
1. Start by encoding the first frame using a still image
compression method.
2. It should then encode each successive frame by identifying the
differences between the frame and its predecessor, and
encoding these differences. If the frame is very different from
its predecessor it should be coded independently of any other
frame.
3. In the video compression literature, a frame that is coded using
its predecessor is called inter frame (or just inter), while a
frame that is coded independently is called intra frame (or
just intra).
Video Compression Techniques
 Flow Control and Buffering
 Temporal Compression
 Spatial Compression
 Discrete Cosine Transform (DCT)
 Vector Quantization (VQ)
 Fractal Compression
 Discrete Wavelet Transform (DWT).
Video Compression Formats
 The ISO/IEC, or International Organization for Standardization
and the International Electrotechnical Commission, have a group
called the Moving Pictures Experts Group or MPEG. MPEG is
responsible, for the familiar compression formats MPEG-1, MPEG-
2 and MPEG-4
 The ITU-T standardizes formats for the International
Telecommunications Union, a United Nations Organization. Some
popular ITU-T compression formats include the H.261 and H.264
formats.
 There are other compression formats, such as Intel Indeo and
RealVideo (based on the ITU-T H.263 codec), AVI, DivX,
Quicktime, Windows Media Video (WMV).
Encryption
Encryption
• To carry sensitive information, a system must be able to
assure privacy.
• As the number of attacks increase and as the public
Internet is used to transmit private data, it is
increasingly difficult to protect information.
• One way to safeguard data from attacks is encrypting
the data.
• Practically, encryption is suitably done in presentation
layer besides transport and physical layer.
Encryption
 Encryption – the conversion of data into a form,
called a ciphertext, that cannot be easily
understood by unauthorized people.
 Decryption – the process of converting encrypted
data back into its original form, so it can be
understood.
Example of Encryption / Decryption Process
Basic Terms and Concepts
 Cryptography – The science of encrypting or hiding secrets
 Cryptosystem – a disguises message that allows only selected
people to see through the disguise.
 Cryptanalysis – The science of decrypting messages or breaking
codes and ciphers
 Key – a value that is used by an algorithm to encrypt and decrypt
a message.
 Cipher – an encryption/decryption algorithm tool that is used to
create encrypted/decrypted text
Encrytption/Decryption Keys
 Symmetric Keys – Also called secret key encryption. It uses a
single key to encrypt and decrypt the message. This means the
person encrypting the message must give that key to the recipient
before they can decrypt it.
Eg.: Data Encryption Standard (DES), Triple DES (3DES),
Advanced Encryption Standard (AES)
 Asymmetric Keys -Also called public key encryption. It uses two
different keys which is public key to encrypt the message, and a
private key to decrypt it. The public key can only be used to
encrypt the message and the private key can only be used to
decrypt it.
How Encryption Protects
Confidentiality - Allow only authorized users to access information.
Authentication - Verify who the sender was and trust the sender is
who they claim to be.
Integrity - Trust the information has not been altered
Nonrepudiation - Ensure that the sender or receiver cannot deny
that a message was sent or received.
Access Control - Restrict availability to information.
Advantages of Encryption
 file is encrypted then the device that uses it doesn’t
need to be secure which means that because the data
is encrypted and secure that the means of storage or
transportation of it doesn’t need to be securing which
saves you money on extra protection software.
 having the data encrypted it takes away the pain and
worry that is associated with data breaches and the
protection of intellectual property.
 the advantage of Encryption is that it keeps data from
snoopers without compromising systems or storage
devices.
Disadvantages of Encryption
 complexity of computer encryption, the usually, expensive cost,
the ability for it to be easily changed and its inability to organize
the data has been encoded. Even though the data doesn’t need to
be protected anymore because of the encryption, but instead it
puts a lot of pressure on IT employees.
 If you forget your passphrase and/or keyfile then there is almost
no chance of recovering your data
 takes a lot of processing, energy and computer power as
well. This means that even though data is protect the overall
performance of the computer could drop.
 encryption won’t prevent hackers or viruses and it also may make
it hard to use the encrypted file as some restrictions may have
been placed on it.

Weitere ähnliche Inhalte

Was ist angesagt?

MPEG-1 Part 2 Video Encoding
MPEG-1 Part 2 Video EncodingMPEG-1 Part 2 Video Encoding
MPEG-1 Part 2 Video EncodingChristian Kehl
 
Kieran dixon sound recording glossary improved
Kieran dixon sound recording glossary  improvedKieran dixon sound recording glossary  improved
Kieran dixon sound recording glossary improvedrwbybomb21
 
Ig2 task 1 work sheet
Ig2 task 1 work sheetIg2 task 1 work sheet
Ig2 task 1 work sheetthomasmcd6
 
simple video compression
simple video compression simple video compression
simple video compression LaLit DuBey
 
Adam Crittenden Sound Glossary Original
Adam Crittenden Sound Glossary OriginalAdam Crittenden Sound Glossary Original
Adam Crittenden Sound Glossary OriginalAdam Crittenden
 
Compression: Video Compression (MPEG and others)
Compression: Video Compression (MPEG and others)Compression: Video Compression (MPEG and others)
Compression: Video Compression (MPEG and others)danishrafiq
 
Hw3 0972552
Hw3 0972552Hw3 0972552
Hw3 0972552s0972552
 
Chapter 5 - Data Compression
Chapter 5 - Data CompressionChapter 5 - Data Compression
Chapter 5 - Data CompressionPratik Pradhan
 
Multimedia presentation video compression
Multimedia presentation video compressionMultimedia presentation video compression
Multimedia presentation video compressionLaLit DuBey
 
Video Compression Basics by sahil jain
Video Compression Basics by sahil jainVideo Compression Basics by sahil jain
Video Compression Basics by sahil jainSahil Jain
 
comparision of lossy and lossless image compression using various algorithm
comparision of lossy and lossless image compression using various algorithmcomparision of lossy and lossless image compression using various algorithm
comparision of lossy and lossless image compression using various algorithmchezhiyan chezhiyan
 
video_compression_2004
video_compression_2004video_compression_2004
video_compression_2004aniruddh Tyagi
 
Audio compression
Audio compressionAudio compression
Audio compressionSahil Garg
 
Compression presentation 415 (1)
Compression presentation 415 (1)Compression presentation 415 (1)
Compression presentation 415 (1)Godo Dodo
 

Was ist angesagt? (20)

MPEG-1 Part 2 Video Encoding
MPEG-1 Part 2 Video EncodingMPEG-1 Part 2 Video Encoding
MPEG-1 Part 2 Video Encoding
 
video compression
video compressionvideo compression
video compression
 
Kieran dixon sound recording glossary improved
Kieran dixon sound recording glossary  improvedKieran dixon sound recording glossary  improved
Kieran dixon sound recording glossary improved
 
MPEG 4
MPEG 4MPEG 4
MPEG 4
 
Compression
CompressionCompression
Compression
 
Ig2 task 1 work sheet
Ig2 task 1 work sheetIg2 task 1 work sheet
Ig2 task 1 work sheet
 
simple video compression
simple video compression simple video compression
simple video compression
 
Compression
CompressionCompression
Compression
 
H261
H261H261
H261
 
Video Compression
Video CompressionVideo Compression
Video Compression
 
Adam Crittenden Sound Glossary Original
Adam Crittenden Sound Glossary OriginalAdam Crittenden Sound Glossary Original
Adam Crittenden Sound Glossary Original
 
Compression: Video Compression (MPEG and others)
Compression: Video Compression (MPEG and others)Compression: Video Compression (MPEG and others)
Compression: Video Compression (MPEG and others)
 
Hw3 0972552
Hw3 0972552Hw3 0972552
Hw3 0972552
 
Chapter 5 - Data Compression
Chapter 5 - Data CompressionChapter 5 - Data Compression
Chapter 5 - Data Compression
 
Multimedia presentation video compression
Multimedia presentation video compressionMultimedia presentation video compression
Multimedia presentation video compression
 
Video Compression Basics by sahil jain
Video Compression Basics by sahil jainVideo Compression Basics by sahil jain
Video Compression Basics by sahil jain
 
comparision of lossy and lossless image compression using various algorithm
comparision of lossy and lossless image compression using various algorithmcomparision of lossy and lossless image compression using various algorithm
comparision of lossy and lossless image compression using various algorithm
 
video_compression_2004
video_compression_2004video_compression_2004
video_compression_2004
 
Audio compression
Audio compressionAudio compression
Audio compression
 
Compression presentation 415 (1)
Compression presentation 415 (1)Compression presentation 415 (1)
Compression presentation 415 (1)
 

Ähnlich wie Data representation

Lecture 6 -_presentation_layer
Lecture 6 -_presentation_layerLecture 6 -_presentation_layer
Lecture 6 -_presentation_layerSerious_SamSoul
 
Seminar Report on image compression
Seminar Report on image compressionSeminar Report on image compression
Seminar Report on image compressionPradip Kumar
 
Introduction to Video Compression Techniques - Anurag Jain
Introduction to Video Compression Techniques - Anurag JainIntroduction to Video Compression Techniques - Anurag Jain
Introduction to Video Compression Techniques - Anurag JainVideoguy
 
Dr.U.Priya, Head & Assistant Professor of Commerce, Bon Secours for Women, Th...
Dr.U.Priya, Head & Assistant Professor of Commerce, Bon Secours for Women, Th...Dr.U.Priya, Head & Assistant Professor of Commerce, Bon Secours for Women, Th...
Dr.U.Priya, Head & Assistant Professor of Commerce, Bon Secours for Women, Th...PriyaU5
 
Digital Image Processing - Image Compression
Digital Image Processing - Image CompressionDigital Image Processing - Image Compression
Digital Image Processing - Image CompressionMathankumar S
 
Compression of digital voice and video
Compression of digital voice and videoCompression of digital voice and video
Compression of digital voice and videosangusajjan
 
Video Compression Technology
Video Compression TechnologyVideo Compression Technology
Video Compression TechnologyTong Teerayuth
 
An overview Survey on Various Video compressions and its importance
An overview Survey on Various Video compressions and its importanceAn overview Survey on Various Video compressions and its importance
An overview Survey on Various Video compressions and its importanceINFOGAIN PUBLICATION
 
data compression technique
data compression techniquedata compression technique
data compression techniqueCHINMOY PAUL
 
Image compression 14_04_2020 (1)
Image compression 14_04_2020 (1)Image compression 14_04_2020 (1)
Image compression 14_04_2020 (1)Joel P
 

Ähnlich wie Data representation (20)

Lecture 6 -_presentation_layer
Lecture 6 -_presentation_layerLecture 6 -_presentation_layer
Lecture 6 -_presentation_layer
 
Data representation
Data representationData representation
Data representation
 
Seminar Report on image compression
Seminar Report on image compressionSeminar Report on image compression
Seminar Report on image compression
 
Pbl1
Pbl1Pbl1
Pbl1
 
Introduction to Video Compression Techniques - Anurag Jain
Introduction to Video Compression Techniques - Anurag JainIntroduction to Video Compression Techniques - Anurag Jain
Introduction to Video Compression Techniques - Anurag Jain
 
Dr.U.Priya, Head & Assistant Professor of Commerce, Bon Secours for Women, Th...
Dr.U.Priya, Head & Assistant Professor of Commerce, Bon Secours for Women, Th...Dr.U.Priya, Head & Assistant Professor of Commerce, Bon Secours for Women, Th...
Dr.U.Priya, Head & Assistant Professor of Commerce, Bon Secours for Women, Th...
 
Multimedia System
Multimedia SystemMultimedia System
Multimedia System
 
DIP.pptx
DIP.pptxDIP.pptx
DIP.pptx
 
Data Storage By ZAK
Data Storage By ZAKData Storage By ZAK
Data Storage By ZAK
 
Chapter 5
Chapter 5Chapter 5
Chapter 5
 
Presentation on Image Compression
Presentation on Image Compression Presentation on Image Compression
Presentation on Image Compression
 
Digital Image Processing - Image Compression
Digital Image Processing - Image CompressionDigital Image Processing - Image Compression
Digital Image Processing - Image Compression
 
Image compression and jpeg
Image compression and jpegImage compression and jpeg
Image compression and jpeg
 
Compression of digital voice and video
Compression of digital voice and videoCompression of digital voice and video
Compression of digital voice and video
 
Video Compression Technology
Video Compression TechnologyVideo Compression Technology
Video Compression Technology
 
Data compression
Data  compressionData  compression
Data compression
 
File Formats
File FormatsFile Formats
File Formats
 
An overview Survey on Various Video compressions and its importance
An overview Survey on Various Video compressions and its importanceAn overview Survey on Various Video compressions and its importance
An overview Survey on Various Video compressions and its importance
 
data compression technique
data compression techniquedata compression technique
data compression technique
 
Image compression 14_04_2020 (1)
Image compression 14_04_2020 (1)Image compression 14_04_2020 (1)
Image compression 14_04_2020 (1)
 

Kürzlich hochgeladen

New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...AliaaTarek5
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxBkGupta21
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
Ryan Mahoney - Will Artificial Intelligence Replace Real Estate Agents
Ryan Mahoney - Will Artificial Intelligence Replace Real Estate AgentsRyan Mahoney - Will Artificial Intelligence Replace Real Estate Agents
Ryan Mahoney - Will Artificial Intelligence Replace Real Estate AgentsRyan Mahoney
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 

Kürzlich hochgeladen (20)

New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptx
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
Ryan Mahoney - Will Artificial Intelligence Replace Real Estate Agents
Ryan Mahoney - Will Artificial Intelligence Replace Real Estate AgentsRyan Mahoney - Will Artificial Intelligence Replace Real Estate Agents
Ryan Mahoney - Will Artificial Intelligence Replace Real Estate Agents
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 

Data representation

  • 1. Data Representation, Data Compression & Encryption Group Member: TAY LEONG PING B031110105 NG SING HAN B031110101 NGOH KYE LIAN B031110024 WONG LAM SHEN B031110044 TAN CHING TING B031110241
  • 3. Data Representation Data representation is generally how information is conceived, manipulated, and recorded. The term can also be defined as the form in which data and information is kept in a certain environment. How data is stored varies from one environment to another, with each environment having its own set of rules and standards.
  • 4. Data Representation Data Representation refers to the methods used internally to represent information stored in a computer. Computers store lots of different types of information:  numbers  text  graphics of many varieties (stills, video, animation)  sound
  • 5. Data Representation  " The problem is that a file containing the bytes 108, 97, 110 would read as “lan” on an ASCII system, but  “%/>” on an EBCDIC system  In ASCII, the value 108 means the character 'l'  " In EBCDIC, the value 108 means the character '%'
  • 6.  ASCII - American Standard Code for Information Interchange, representing English on all microcomputers and most minicomputer.  EBCDIC - Extended Binary Coded Decimal Interchange Code, represents English on IBM mainframes.  Shift-JIS - Japanese Characters.
  • 7. Data Representation Data representations include:  ASN.1 (Abstract Syntax Notation One) - an ISO standard  XDR (External Data Representation) - used with SunRPC
  • 8. ASN.1  Abstract Syntax Notation (ASN.1) is standard and notation that describes rules and structures for representing, encoding, transmitting, and decoding data. It consists of two parts: 1. abstract syntax that describes data structures in an unambiguous way. Use “ integers”, “character strings”, and “structures” rather than bits and bytes. 2. A transfer syntax that describes the bit stream encoding of ASN.1 data objects.
  • 9. ASN.1  The standard ASN.1 encoding rules include: - Basic Encoding Rules (BER) - Canonical Encoding Rules (CER) - Distinguished Encoding Rules(DER) - XML Encoding Rules (XER) - Packed Encoding Rules (PER)
  • 10. ASN.1  Example of ASN.1’S abstract syntax: Student ::= SEQUENCE { name [0] IMPLICIT OCTET STRING OPTIONAL, grad [1] IMPLICIT BOOLEAN OPTIONAL DEFAULT FALSE, gpa [2] IMPLICIT REAL OPTIONAL, id [3] IMPLICIT INTEGER, bday [4] IMPLICIT OCTET STRING OPTIONAL }
  • 11. Current Uses of ANS1  Audio & Video over the Internet AT&T, Intel, IBM, Microsoft, 3COM  Electronic Commerce American Express, GTE, MasterCard, VISA  Telephony AT&T, MCI, Motorola, Nokia, Sprint  Aviation FAA, ICAO  Manufacturing Ford, Mercedes Benz, Mitsubishi  Network Management Bull, Compaq, Hewlett-Packard, Sun  Routers Bay Networks, Cisco, Racal, Xyplex
  • 12. External Data Representation (XDR)  External Data Representation (XDR) is much simpler than ASN.1, but less powerful. For instance: 1. XDR uses implicit typing. Communicating peers must know the type of any exchanged data. In contrast, ASN.1 uses explicit typing; it includes type information as part of the transfer syntax. 2. In XDR, all data is transferred in units of 4 bytes. Numbers are transferred in network order, most significant byte first.
  • 13. XDR  4 bytes of XDR message:
  • 14. XDR 3. Strings consist of a 4 byte length, followed by the data (and perhaps padding in the last byte). 4. Defined types include: integer, enumeration, boolean, floating point, fixed length array, structures, plus others.  One advantage that XDR has over ASN.1 is that current implementations of ASN.1 execute significantly slower than XDR.
  • 15. Multipurpose Internet Mail Extensions (MIME)  " The message “£100 is about !150” could become Content-Transfer-Encoding: quoted-printable Content-Type: text/plain; charset=ISO-8859-15 MIME-Version: 1.0 =A3100 is about =A4150
  • 16. MIME  or Content-Transfer-Encoding: base64 Content-Type: text/plain; charset=ISO-8859-15 MIME-Version: 1.0 ozEwMCBpcyBhYm91dCCkMTUwCg=49
  • 18. Data Compression  Data compression is the art of reducing the number of bits needed to store or transmit data.  Compression can be either lossless or lossy.
  • 19. Lossless Compression – involve no loss of information. If data have been losslessly compressed, the original data can be recovered exactly from compress data. It is generally used for application that cannot tolerate any difference between original and reconstructed data. Lossy Compression – involve some loss of information and data have been compressed using lossy techniques generally cannot be recovered or reconstructed exactly. In return for accepting this distortion in reconstruction, can generally obtain much higher compression ratios than is possible with lossless compression.
  • 20. Steps of Data Compression  The compression of still images, audio and video data streams: 1. Picture preparation – generates an appropriate digital representation of the information in the medium being compressed. 2. Picture processing –is the first step that makes use of the various compression algorithms. 3. Quantization – Values determined in the previous step cannot and should not be processed with full exactness; instead they are quantized according to a specific resolution and characteristic curve. 4. Entropy encoding – with a sequential data stream of individual bits and bytes, different techniques are used to perform a final, lossless compression.
  • 21. Steps of Data Compression Major steps of image compression, can also be applied to audio and video data Uncompressed Picture Picture Preparation Picture Processing Quantization Entropy Coding Compressed Picture
  • 22. Image Compression  to represent images with less data in order to save storage costs or transmission time.  possible to reduce file size to 10% from the original without noticeable loss in quality.  Image compression can be lossless or lossy.
  • 23. Image Compression  Lossless - Image quality is not reduced. Use in: artificial images that contain sharp-edged lines such as technical drawings, textual graphics, comics, maps or logos. Methods: run-length encoding (RLE), entropy coding (Huffman coding) and dictionary coders (LZW).
  • 24. Image Compression  Lossy - reduces image quality. Cannot get the original image back & lose some information. Use in: natural images such as photos of landscapes Methods: discrete cosine transform (DCT, used in JPEG) or wavelet transform (used in JPEG 2000), color quantization
  • 25. FORMAT FILE EXTENTION TYPE OF COMPRESSION METHODS USAGE BMP (bitmap) .bmp Cosiderably compressed with lossless ZIP used to store bitmap digital images JPEG (Joint Photographic Experts Group) .jpg , .jpeg , .jpe Lossy Lossless - Discrete Cosine Transform (DCT) & Chroma Subsampling - Run-Length Encoding (RLE) For natural images GIF (Graphics Interchange Format .gif , .giff , .gfa Lossless LZW (Lempel-Ziv- Welch) For artificial images (sharp-edge lines and few colors) & support animation PNG (Portable Network Graphics) .png Lossless DEFLATE Better compression & features than GIF, but don’t support animation TIFF (Tagged Image File Format) .tiff , .tif Lossless RLE / LZW / DEFLATE / ZIP Flexible file format, can store multiple images in a single file JPEG2000 jp2, .j2c, jpc, j2k, jpx Lossy & Lossless Discrete Wavelet Transform (DWT) Better image quality than JPEG (up to 20%), not widely used because of some patent issues. Comparison of graphics file formats
  • 26. Block Diagram of JPEG Compression Transformation coding performed using the Discrete Cosine Transform (DCT) Quantization of all DCT coefficients ( a lossy process) Huffman coding and arithmetic coding as entropy encoding methods Source image JPEG compression DCT Quantization Encoding Compressed image
  • 27. Audio Compression  A form of data compression designed to reduce the size of audio files  Audio compression can be lossless or lossy  Audio compression algorithms are typically referred to as audio codecs.
  • 28. Audio Compression  Lossless - allows one to preserve an exact copy of one's audio files Usage: For archival purposes, editing, audio quality. Codecs:  Free Lossless Audio Codec (FLAC)  Apple Lossless  MPEG-4 ALS  Monkey's Audio  Lossless Predictive Audio Compression (LPAC)  Lossless Transform Audio Compression (LTAC)
  • 29. Audio Compression  Lossy - irreversible changes , achieves far greater compression, use psychoacoustics to recognize that not all data in an audio stream can be perceived by the human auditory system. Usage: distribution of streaming audio, or interactive applications Codecs:  MP2- MPEG-1Layer 2 audio codec  MP3 – MPEG-1 Layer 3 audio codec  MPC Musepack  Vorbis Ogg Vorbis  AAC Advanced Audio Coding (MPEG-2 and MPEG-4)  WMA Windows Media Audio  AC3 AC-3 or Dolby Digital A/52
  • 30. Moving Picture Expert Group (MPEG)  MPEG is an ISO/IEC working group, established in 1988 to develop standards for digital audio and video formats.  MPEG-1 Designed for up to 1.5 Mbit/sec Standard for the compression of moving pictures and audio. Most popular is level 3 of MPEG-1 (MP3). MPEG-1 is the standard of compression for VideoCD.  MPEG-2 Designed for between 1.5 and 15 Mbit/sec Standard on which Digital Television set top boxes and DVD compression is based. Designed for the compression and transmission of digital broadcast television
  • 31. MPEG (cont.) • MPEG-4 Integrates several different audio components into one standard: speech compression, perceptually based coders, text-to-speech, and MIDI. MPEG-4 AAC (Advanced Audio Coding), is similar to the MPEG-2 AAC standard, with some minor changes  MPEG-7 (under development) - also called the Multimedia Content Description Interface. In terms of audio:facilitate the representation and search for sound content. Example application supported by MPEG-7: automatic speech recognition (ASR).
  • 32. MPEG Audio Encoding Uncompressed Audio Signal Division in 32 Frequency Bands Psychoacoustic Model Quantization (if applicable) Entropy Encoding Compressed Audio Data controls
  • 34. Audio Compression Format-MP3  Played by almost every portable digital audio device and many DVD players, MP3 is still hard to go past if looking for maximum compatibility for your files.  can get much better compression from other formats, hard disks and blank CDs are cheap enough to justify the extra file size.  Stereo imaging is not terrific and encoding quality differs from one software package to another.  Compression: 5.  Quality: 7.  Compatibility: 10.  Overall: 7.5.
  • 35. Audio Compression Format-WMA  Window's Media Audio is Microsoft's contribution to high quality, lossy audio compression. Like most other new formats, it outperforms MP3 in terms of quality and compression, particularly at lower bitrates.  WMA is probably the format of choice for streaming at low bandwidths. Like MP3, however, the stereo imaging is not very accurate.  WMA tends to overcompensate for its high compression with what is often called 'overbrightness'.  Compression: 8.  Quality: 7.  Compatibility: 9.  Overall: 8.
  • 36. Audio Compression Format- Ogg Vorbis  project attempting to replace all proprietary audio formats with an open standard freeware codec. Version one was released in this past fortnight and has been demonstrated to be very high quality and outperforms MP3 by a long shot.  At low bitrates it doesn't compete with WMA, and at high bitrates it falls short of MPC. Given that it is a work in progress, however, it has strong potential to become a widely used audio codec.  Some portable device manufacturers are promising to support Ogg Vorbis in future software releases.  Compression: 8.  Quality: 7.  Compatibility: 6.  Overall: 7.
  • 37. Video Compression  Storing and transmitting uncompressed raw video is not an efficient technique because it needs large amounts of storage and bandwidth.  DVD, DSS, and internet video, all use digital data → take a lot of space to store and large bandwidth to transmit.  Video compression technique is used to compress the data for these applications → less storage space and less bandwidth to transmit data.
  • 38. Video Compression  Videos are sequences of images displayed at a high rate. Each of these images is called a frame.  Human eye can not notice small changes in the frames such as a slight difference in color.  Therefore, video compression standards do not require the encoding of all the details and some of the less important video details are lost. This is because lossy compression is used due to its ability to get very high compression ratios.  Typically 30 frames are displayed on the screen every second.
  • 39. Video Compression Process 1. Start by encoding the first frame using a still image compression method. 2. It should then encode each successive frame by identifying the differences between the frame and its predecessor, and encoding these differences. If the frame is very different from its predecessor it should be coded independently of any other frame. 3. In the video compression literature, a frame that is coded using its predecessor is called inter frame (or just inter), while a frame that is coded independently is called intra frame (or just intra).
  • 40. Video Compression Techniques  Flow Control and Buffering  Temporal Compression  Spatial Compression  Discrete Cosine Transform (DCT)  Vector Quantization (VQ)  Fractal Compression  Discrete Wavelet Transform (DWT).
  • 41. Video Compression Formats  The ISO/IEC, or International Organization for Standardization and the International Electrotechnical Commission, have a group called the Moving Pictures Experts Group or MPEG. MPEG is responsible, for the familiar compression formats MPEG-1, MPEG- 2 and MPEG-4  The ITU-T standardizes formats for the International Telecommunications Union, a United Nations Organization. Some popular ITU-T compression formats include the H.261 and H.264 formats.  There are other compression formats, such as Intel Indeo and RealVideo (based on the ITU-T H.263 codec), AVI, DivX, Quicktime, Windows Media Video (WMV).
  • 43. Encryption • To carry sensitive information, a system must be able to assure privacy. • As the number of attacks increase and as the public Internet is used to transmit private data, it is increasingly difficult to protect information. • One way to safeguard data from attacks is encrypting the data. • Practically, encryption is suitably done in presentation layer besides transport and physical layer.
  • 44. Encryption  Encryption – the conversion of data into a form, called a ciphertext, that cannot be easily understood by unauthorized people.  Decryption – the process of converting encrypted data back into its original form, so it can be understood.
  • 45. Example of Encryption / Decryption Process
  • 46. Basic Terms and Concepts  Cryptography – The science of encrypting or hiding secrets  Cryptosystem – a disguises message that allows only selected people to see through the disguise.  Cryptanalysis – The science of decrypting messages or breaking codes and ciphers  Key – a value that is used by an algorithm to encrypt and decrypt a message.  Cipher – an encryption/decryption algorithm tool that is used to create encrypted/decrypted text
  • 47. Encrytption/Decryption Keys  Symmetric Keys – Also called secret key encryption. It uses a single key to encrypt and decrypt the message. This means the person encrypting the message must give that key to the recipient before they can decrypt it. Eg.: Data Encryption Standard (DES), Triple DES (3DES), Advanced Encryption Standard (AES)
  • 48.  Asymmetric Keys -Also called public key encryption. It uses two different keys which is public key to encrypt the message, and a private key to decrypt it. The public key can only be used to encrypt the message and the private key can only be used to decrypt it.
  • 49. How Encryption Protects Confidentiality - Allow only authorized users to access information. Authentication - Verify who the sender was and trust the sender is who they claim to be. Integrity - Trust the information has not been altered Nonrepudiation - Ensure that the sender or receiver cannot deny that a message was sent or received. Access Control - Restrict availability to information.
  • 50. Advantages of Encryption  file is encrypted then the device that uses it doesn’t need to be secure which means that because the data is encrypted and secure that the means of storage or transportation of it doesn’t need to be securing which saves you money on extra protection software.  having the data encrypted it takes away the pain and worry that is associated with data breaches and the protection of intellectual property.  the advantage of Encryption is that it keeps data from snoopers without compromising systems or storage devices.
  • 51. Disadvantages of Encryption  complexity of computer encryption, the usually, expensive cost, the ability for it to be easily changed and its inability to organize the data has been encoded. Even though the data doesn’t need to be protected anymore because of the encryption, but instead it puts a lot of pressure on IT employees.  If you forget your passphrase and/or keyfile then there is almost no chance of recovering your data  takes a lot of processing, energy and computer power as well. This means that even though data is protect the overall performance of the computer could drop.  encryption won’t prevent hackers or viruses and it also may make it hard to use the encrypted file as some restrictions may have been placed on it.