Analysis of One-Time Random Projections for Privacy Preserving Compressed Sensing

被引:113
作者
Bianchi, Tiziano [1 ]
Bioglio, Valerio [1 ]
Magli, Enrico [1 ]
机构
[1] Politecn Torino, Dept Elect & Telecommun, I-10129 Turin, Italy
基金
欧洲研究理事会;
关键词
Compressed sensing; confidentiality; encryption; privacy preservation; random matrices; security; INEQUALITIES; CONVERGENCE; INFORMATION; SECRECY; SECURE;
D O I
10.1109/TIFS.2015.2493982
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
In this paper, the security of the compressed sensing (CS) framework as a form of data confidentiality is analyzed. Two important properties of one-time random linear measurements acquired using a Gaussian independent identically distributed matrix are outlined: 1) the measurements reveal only the energy of the sensed signal and 2) only the energy of the measurements leaks information about the signal. An important consequence of the above facts is that CS provides information theoretic secrecy in a particular setting. Namely, a simple strategy based on the normalization of the Gaussian measurements achieves, at least in theory, perfect secrecy, enabling the use of CS as an additional security layer in privacy preserving applications. In the generic setting in which CS does not provide information theoretic secrecy, two alternative security notions linked to the difficulty of estimating the energy of the signal and distinguishing equal-energy signals are introduced. Useful bounds on the mean square error of any possible estimator and the probability of error of any possible detector are provided and compared with the simulations. The results indicate that CS is in general not secure according to cryptographic standards, but may provide a useful built-in data obfuscation layer.
引用
收藏
页码:313 / 327
页数:15
相关论文
共 53 条
[41]   Dynamic Anomalography: Tracking Network Anomalies Via Sparsity and Low Rank [J].
Mardani, Morteza ;
Mateos, Gonzalo ;
Giannakis, Georgios B. .
IEEE JOURNAL OF SELECTED TOPICS IN SIGNAL PROCESSING, 2013, 7 (01) :50-66
[42]   CHOOSING A POINT FROM SURFACE OF A SPHERE [J].
MARSAGLIA, G .
ANNALS OF MATHEMATICAL STATISTICS, 1972, 43 (02) :645-+
[43]  
Orsdemir A., 2008, PROC IEEE MILITARY C, P1
[44]  
Pinsker M. S., 1964, HOLDENDAY SERIES TIM
[45]   The Secrecy of Compressed Sensing Measurements [J].
Rachlin, Yaron ;
Baron, Dror .
2008 46TH ANNUAL ALLERTON CONFERENCE ON COMMUNICATION, CONTROL, AND COMPUTING, VOLS 1-3, 2008, :813-+
[46]  
Reeves G., 2011, IEEE Information Theory Workshop (ITW 2011), P548, DOI 10.1109/ITW.2011.6089562
[47]   COMMUNICATION THEORY OF SECRECY SYSTEMS [J].
SHANNON, CE .
BELL SYSTEM TECHNICAL JOURNAL, 1949, 28 (04) :656-715
[48]   A Survey of H.264 AVC/SVC Encryption [J].
Stuetz, Thomas ;
Uhl, Andreas .
IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, 2012, 22 (03) :325-339
[49]   Secure and robust image hashing via compressive sensing [J].
Sun, Rui ;
Zeng, Wenjun .
MULTIMEDIA TOOLS AND APPLICATIONS, 2014, 70 (03) :1651-1665
[50]  
Thomas M., 2006, Elements of Information Theory