An Approach to Achieve Compression Along with Security via a User Assigned Security Key with Possible Lossless Compression
Crossref DOI link: https://doi.org/10.1007/978-981-15-1624-5_12
Published Online: 2020-01-03
Published Print: 2020
Update policy: https://doi.org/10.1007/springer_crossmark_policy
Datta, Ashis
Saikia, Mousam
Text and Data Mining valid from 2020-01-01
Chapter History
First Online: 3 January 2020