File Compression Application Design Using Half Byte Algorithm
DOI:
https://doi.org/10.54209/infosains.v11i2.43Keywords:
Compression, Half Byte AlgorithmAbstract
The need for large data storage capacity seems increasingly important. This need is caused by the data that must be stored more and more. The storage is not allocated in one place only. But they will also store data or files elsewhere as data backups. How much storage capacity must be provided to hold all the data. Half Byte algorithm is one of the data compression algorithms. The Half Byte algorithm utilizes four left bits that are often the same sequentially especially text files. When the first four bits of the character are received in a row seven or more times, the algorithm compresses the data with marker bits, then the first character of the same four-bit series is followed by the last four-bit pair of the next series
Downloads
References
H. T. Sihotang, “Perancangan Dan Implementasi Algoritma Arithmetic Coding Untuk Aplikasi Kompresi Data Video Dan Audio,” J. Mantik Penusa, vol. 2, no. 1, 2018.
T. I. Saputra, F. Fauziah, and N. Hayati, “Implementasi Discrete Wavelet Transform Pada Aplikasi Kompresi Citra Medis,” J. InfomediaTeknik Inform. Multimed. Jar., vol. 4, no. 2, 2020.
S. K. Fatima, S. G. Fatima, S. A. Sattar, and A. Sheela, “An advanced data security method in WSN,” Int. J. Adv. Res. Eng. Technol., vol. 10, no. 2, 2019, doi: 10.34218/IJARET.10.2.2019.026.
S. Pirbhulal, O. W. Samuel, W. Wu, A. K. Sangaiah, and G. Li, “A joint resource-aware and medical data security framework for wearable healthcare systems,” Futur. Gener. Comput. Syst., vol. 95, 2019, doi: 10.1016/j.future.2019.01.008.
Y. Bulo, P. Sharma, and C. T. Bhunia, “Improving Error Correction Capability of Aggressive Packet Combining Scheme by using Half-Byte Packet Reverse Technique and Even - Odd Selection Method,” Int. J. Comput. Appl., vol. 137, no. 2, 2016, doi: 10.5120/ijca2016908701.
P. S. Anderson, “The PASCO Half-Byte Hard Drive,” Phys. Teach., vol. 43, no. 3, 2005, doi: 10.1119/1.1869431.
X. Hu and Y. Zhao, “Research on Plaintext Restoration of AES Based on Neural Network,” Secur. Commun. Networks, vol. 2018, 2018, doi: 10.1155/2018/6868506.
N. Nazar, R. S. Kumar, M. Rajeswari, and G. R. Gnanaking, “A secure model for hiding multimedia files within two cover images,” Int. J. Recent Technol. Eng., vol. 7, no. 5, 2019.
A. Sinambela and I. Ramli, “Kompresi Medulla Spinalis akibat Metastasis,” Radioter. Onkol. Indones., vol. 9, no. 1, 2018, doi: 10.32532/jori.v9i1.65.
M. A. Latif, S. D. Nasution, and P. Pristiwanto, “Analisa Perbandingan Algoritma Rice Codes Dengan Algoritma Goldbach Codes Pada Kompresi File Text Menggunakan Metode Exponential,” Maj. Ilm. INTI (Informasi dan Teknol. Ilmiah), vol. 13, no. 1, 2018.