Bi-level Protected Compressive Sampling

被引:75
作者
Zhang, Leo Yu [1 ]
Wong, Kwok-Wo [1 ]
Zhang, Yushu [2 ]
Zhou, Jiantao [3 ]
机构
[1] City Univ Hong Kong, Dept Elect Engn, Hong Kong, Hong Kong, Peoples R China
[2] Southwest Univ, Sch Elect & Informat Engn, Chongqing 400715, Peoples R China
[3] Univ Macau, Dept Comp & Informat Sci, Fac Sci & Technol, Macau 999078, Peoples R China
基金
中国国家自然科学基金;
关键词
Compressive sampling (CS); encryption; known/chosen-plaintext attack; random projection; restricted isometry property (RIP); RESTRICTED ISOMETRY PROPERTY; IMAGE ENCRYPTION; PRIVACY PROTECTION; OPTICAL ENCRYPTION; SIGNAL RECOVERY; SECURITY; SECRECY; ATTACKS;
D O I
10.1109/TMM.2016.2581593
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Some pioneering works have investigated embedding cryptographic properties in compressive sampling (CS) in a way similar to one-time pad symmetric cipher. This paper tackles the problem of constructing a CS-based symmetric cipher under the key reuse circumstance, i.e., the cipher is resistant to common attacks even when a fixed measurement matrix is used multiple times. To this end, we suggest a bi-level protected CS (BLPCS) model which makes use of the advantage of measurement matrix construction without restricted isometry property (RIP). Specifically, two kinds of artificial basis mismatch techniques are investigated to construct key-related sparsifying bases. It is demonstrated that the encoding process of BLP-CS is simply a random linear projection, which is the same as the basic CS model. However, decoding the linear measurements requires knowledge of both the key-dependent sensing matrix and its sparsifying basis. The proposed model is exemplified by sampling images as a joint data acquisition and protection layer for resource-limited wireless sensors. Simulation results and numerical analyses have justified that the new model can be applied in circumstances where the measurement matrix can be reused.
引用
收藏
页码:1720 / 1732
页数:13
相关论文
共 58 条
  • [1] [Anonymous], 2011, VISUAL COMMUN-US, DOI DOI 10.1109/VCIP.2011.6115917
  • [2] [Anonymous], 2005, SIGNALS SYSTEMS COMP, DOI DOI 10.1109/ACSSC.2005.1600024
  • [3] [Anonymous], P IEEE INT C AC SPEE
  • [4] A Simple Proof of the Restricted Isometry Property for Random Matrices
    Baraniuk, Richard
    Davenport, Mark
    DeVore, Ronald
    Wakin, Michael
    [J]. CONSTRUCTIVE APPROXIMATION, 2008, 28 (03) : 253 - 263
  • [5] IEEE-SPS and connexions - An open access education collaboration
    Baraniuk, Richard G.
    Burrus, C. Sidney
    Thierstein, E. Joel
    [J]. IEEE SIGNAL PROCESSING MAGAZINE, 2007, 24 (06) : 6 - +
  • [6] Privacy, confidentiality, and electronic medical records
    Barrows, RC
    Clayton, PD
    [J]. JOURNAL OF THE AMERICAN MEDICAL INFORMATICS ASSOCIATION, 1996, 3 (02) : 139 - 148
  • [7] Boyd S, 2004, CONVEX OPTIMIZATION
  • [8] On Known-Plaintext Attacks to a Compressed Sensing-Based Encryption: A Quantitative Analysis
    Cambareri, Valerio
    Mangia, Mauro
    Pareschi, Fabio
    Rovatti, Riccardo
    Setti, Gianluca
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2015, 10 (10) : 2182 - 2195
  • [9] Low-Complexity Multiclass Encryption by Compressed Sensing
    Cambareri, Valerio
    Mangia, Mauro
    Pareschi, Fabio
    Rovatti, Riccardo
    Setti, Gianluca
    [J]. IEEE TRANSACTIONS ON SIGNAL PROCESSING, 2015, 63 (09) : 2183 - 2195
  • [10] Cambareri V, 2013, IEEE INT SYMP CIRC S, P1356, DOI 10.1109/ISCAS.2013.6572106