1.
Tamar Shoham, David Malah and Slava Shechtman, “Quality Preserving Compression of a Concatenative Text-To-Speech Acoustic Databaseâ€, IEEE TRANSACTIONS ON AUDIO, SPEECH, AND LANGUAGE PROCESSING, VOL. 20, NO. 3, PP. 1056-1068, 2012.
2.
M. Mitra, J.N. Bera and R. Gupta, "Electrocardiogram compression technique for global system of mobile-based offline telecardiology application for rural clinics in India", IET Science, Measurement and Technology, Vol. 6, No. 6, PP. 412–419, 2012.
3.
L. Robert and R. Nadarajan, "Simple lossless preprocessing algorithms for text compression", IET Software, Vol. 3, No. 1, PP. 37–45, 2009.
4.
Sebastian Wandelt and Ulf Leser, "FRESCO: Referential Compression of Highly Similar Sequences", IEEE/ACM TRANSACTIONS ON COMPUTATIONAL BIOLOGY AND BIOINFORMATICS, VOL. 10, NO. 5, PP. 1275-1288, 2013.
5.
Shuhui Wang and Tao Lin, "Compound image compression based on unified LZ and hybrid coding", IET Image Processing, Vol. 7, No. 5, PP. 484–499, 2013.
6.
Miguel A. MartÃnez-Prieto, JoaquÃn Adiego and Pablo de la Fuente, "Natural Language Compression on Edge-Guided text preprocessing", Information Sciences, Vol. 181, PP. 5387-5411, 2011.
7.
W. Oliveira Jr., E. Justino and L.S. Oliveira, "Comparing compression models for authorship attribution", Forensic Science International, Vol. 228, PP. 100-104, 2013.
8.
Ashutosh Gupta and Suneeta Agarwal, "A fast dynamic compression scheme for natural language texts", Computers and Mathematics with Applications, Vol. 60, PP. 3139-3151, 2010.
9.
Ana Granados, David Camacho and Francisco Borja RodrÃguez, "Is the contextual information relevant in text clustering by compression?", Expert Systems with Applications, Vol. 39, PP. 8537-8546, 2012.
10.
M.Baritha Begum and Y.Venkataramani, "LSB Based Audio Steganography Based On Text Compression", Procedia Engineering, Vol. 30, PP. 703-710, 2012.
11.
Ranjan Bose and Saumitr Pathak, "A Novel Compression and Encryption Scheme Using Variable Model Arithmetic Coding and Coupled Chaotic System", IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS—I, VOL. 53, NO. 4, PP. 848-857, 2006.
12.
Deep Vardhan Bhatt and Gerhard P. Hancke, "Secure Internet Access to Gateway Using Secure Socket Layer", IEEE TRANSACTIONS ON INSTRUMENTATION AND MEASUREMENT, VOL. 55, NO. 3, PP. 793-800, 2006.
13.
Maruti Satti and Subhash Kak, "Multilevel Indexed Quasigroup Encryption for Data and Speech", IEEE TRANSACTIONS ON BROADCASTING, Vol. 55, No. 2, PP. 270-281, 2009.
14.
Neri Merhav, "Perfectly Secure Encryption of Individual Sequences", IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 59, NO. 3, PP. 1302-1310, 2013.
15.
Frédérique Oggier and Miodrag J. Mihaljevi´, "An Information-Theoretic Security Evaluation of a Class of Randomized Encryption Schemes", IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 9, NO. 2, PP. 158-168, 2014.
16.
Francisco Salcedo-Campos, Jesús DÃaz-Verdejo and Pedro GarcÃa-Teodoro, "Segmental parameterisation and statistical modelling of e-mail headers for spam detection", Information Sciences, Vol. 195, PP. 45-61, 2012.
17.
Sherif Sakr, "XML compression techniques: A survey and comparison", Journal of Computer and System Sciences, Vol. 75, PP. 303-322, 2009.
18.
Nir Nissim, Robert Moskovitch, Lior Rokach and Yuval Elovici,
19.
"Novel active learning methods for enhanced PC malware detection in windows OS", Expert Systems with Applications, 2014.
20.
Simson L. Garfinkel, "Digital media triage with bulk data analysis and bulk_extractor", Computers & Security, Vol. 32, PP. 56-72, 2013.
21.
Baiying Lei, Ee-Leng Tan, Siping Chen, Dong Ni, Tianfu Wang and Haijun Lei, "Reversible watermarking scheme for medical image based on differential evolution", Expert Systems with Applications, Vol. 41, PP. 3178-3188, 2014.
22.
Osama Ahmed Khashan and Abdullah Mohd Zin, "An Efficient Adaptive of Transparent Spatial Digital Image Encryption", Procedia Technology, Vol. 11, PP. 288-297, 2013.