Embedding cryptographic features in compressive sensing

被引:86
作者
Zhang, Yushu [1 ,2 ,3 ]
Zhou, Jiantao [2 ]
Chen, Fei [3 ]
Zhang, Leo Yu [2 ,3 ]
Wong, Kwok-Wo [4 ]
He, Xing [1 ]
Xiao, Di [5 ]
机构
[1] Southwest Univ, Chongqing Key Lab Nonlinear Circuits & Intelligen, Coll Elect & Informat Engn, Chongqing 400715, Peoples R China
[2] Univ Macau, Fac Sci & Technol, Dept Comp & Informat Sci, Macau, Peoples R China
[3] Shenzhen Univ, Coll Comp Sci & Engn, Shenzhen 518060, Peoples R China
[4] City Univ Hong Kong, Dept Elect Engn, Kowloon, Hong Kong, Peoples R China
[5] Chongqing Univ, Coll Comp Sci, Chongqing 400044, Peoples R China
基金
中国国家自然科学基金;
关键词
Secure compressive sensing; Symmetric-key cipher; Parallel compressive sensing; Random permutation; ENCRYPTION ALGORITHM; RANDOM PROJECTIONS; PERMUTATION; SECRECY; MATRIX;
D O I
10.1016/j.neucom.2016.04.053
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Compressive sensing (CS) has been widely studied and applied in many fields. Recently, the way to perform secure compressive sensing (SCS) has become a topic of growing interest. The existing works on SCS usually take the sensing matrix as a key and can only be considered as preliminary explorations on SCS. In this paper, we firstly propose some possible encryption models for CS. It is believed that these models will provide a new point of view and stimulate further research in both CS and cryptography. Then, we demonstrate that random permutation is an acceptable permutation with overwhelming probability, which can effectively relax the Restricted Isometry Constant for parallel compressive sensing. Moreover, random permutation is utilized to design a secure parallel compressive sensing scheme. Security analysis indicates that the proposed scheme can achieve the asymptotic spherical secrecy. Meanwhile, the realization of chaos is used to validate the feasibility of one of the proposed encryption models for CS. Lastly, results verify that the embedding random permutation based encryption enhances the compression performance and the scheme possesses high transmission robustness against additive white Gaussian noise and cropping attack. (C) 2016 Elsevier B.V. All rights reserved.
引用
收藏
页码:472 / 480
页数:9
相关论文
共 40 条
[1]  
Agrawal S., 2011, IEEE Information Theory Workshop (ITW 2011), P563, DOI 10.1109/ITW.2011.6089519
[2]  
[Anonymous], 2011, SIGNAL PROCESSING AL
[3]  
[Anonymous], P 20 TEL FOR TELFOR
[4]  
Bianchi Tiziano, 2014, 2014 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), P3992, DOI 10.1109/ICASSP.2014.6854351
[5]   Analysis of One-Time Random Projections for Privacy Preserving Compressed Sensing [J].
Bianchi, Tiziano ;
Bioglio, Valerio ;
Magli, Enrico .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2016, 11 (02) :313-327
[6]   Low-Complexity Multiclass Encryption by Compressed Sensing [J].
Cambareri, Valerio ;
Mangia, Mauro ;
Pareschi, Fabio ;
Rovatti, Riccardo ;
Setti, Gianluca .
IEEE TRANSACTIONS ON SIGNAL PROCESSING, 2015, 63 (09) :2183-2195
[7]  
Cambareri V, 2013, IEEE INT SYMP CIRC S, P1356, DOI 10.1109/ISCAS.2013.6572106
[8]   Robust uncertainty principles:: Exact signal reconstruction from highly incomplete frequency information [J].
Candès, EJ ;
Romberg, J ;
Tao, T .
IEEE TRANSACTIONS ON INFORMATION THEORY, 2006, 52 (02) :489-509
[9]   Decoding by linear programming [J].
Candes, EJ ;
Tao, T .
IEEE TRANSACTIONS ON INFORMATION THEORY, 2005, 51 (12) :4203-4215
[10]   An introduction to compressive sampling: A sensing/sampling paradigm that goes against the common knowledge in data acquisition [J].
Candes, Emmanuel J. ;
Wakin, Michael B. .
IEEE Signal Processing Magazine, 2008, 25 (02) :21-30