Skip to main content

Application for a Secure Fax System

  • Conference paper
Distributed Computing and Internet Technology (ICDCIT 2008)

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 5375))

Abstract

Fax is an important means to transfer official documents even today because of its features like instant acknowledgement and legal recognition; giving it an edge over Internet facilities like e-mail. Some problems still persist today. One is that sending text only data by fax is expensive.

This project document describes a system for compression and encryption of fax documents and error recovery over the channel. The document to be faxed, which may contain text, pictures, charts, and other graphic images, is first converted into a portable bitmap. Bitmap compression thus used reduces the size of the document. This portable bitmap is further compressed by applying JBIG compression technique which is highly suitable for fax documents. The compressed file is then encrypted using the fast Salsa20 routine using the private key. The encrypted file is then converted into portable grayscale format for printing. The file is now sent via the fax machine as any other normal document, but without disclosing its contents to anyone other than the intended recipient. The fax machine at the receiving end is able to recover the errors introduced during transmission, using an error correcting code (specifically LDPC), ensuring correct reception of file. The received data is decoded, producing the encrypted file which is unintelligible. This is then converted to portable grayscale format, printed and scanned and given to decryption device, which performs decryption using the private key. Finally, decompression is performed and the original document is recovered as a portable bitmap. This document is now displayed or converted to any suitable format for printing.

This project solves the problem of achieving secure, loss less, and efficient transmission of data by facsimile (where a direct computer network is not available).

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Tsunoo, Y., Saito, T., Kubo, H., Suzaki, T., Nakashima, H.: Differential Cryptanalysis of Salsa20/8 (2008)

    Google Scholar 

  2. Lin, S., Costello, D.J.: Error Control Coding (1983)

    Google Scholar 

  3. Sayood, K.: Introduction to Data Compression (1996)

    Google Scholar 

  4. Bernstein, D. J.: Response to On the Salsa20 core function Ecrypt report 2008/011 (2008)

    Google Scholar 

  5. Bernstein, D. J.: Comparison of 256-bit stream ciphers at the beginning of 2006 Ecrypt report (2006)

    Google Scholar 

  6. Bernstein, D. J.: Which eSTREAM ciphers have been broken? Ecrypt report 2008/010 (2008)

    Google Scholar 

  7. Joint Bi-level Image Expert Group, http://www.jpeg.org/jbig/index.html

  8. A highly effective compression algorithm-JBIG, http://www.cl.cam.ac.uk/~mgk25/jbigkit/

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2008 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Kale, S., Naphade, S., Valecha, V. (2008). Application for a Secure Fax System. In: Parashar, M., Aggarwal, S.K. (eds) Distributed Computing and Internet Technology. ICDCIT 2008. Lecture Notes in Computer Science, vol 5375. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-89737-8_8

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-89737-8_8

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-89736-1

  • Online ISBN: 978-3-540-89737-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics