scispace - formally typeset
Open AccessJournal ArticleDOI

Bi-level Protected Compressive Sampling

Reads0
Chats0
TLDR
In this article, a bi-level protected compressive sampling (BLP-CS) model is proposed, which makes use of the advantage of the non-RIP measurement matrix construction.
Abstract
Some pioneering works have investigated embedding cryptographic properties in compressive sampling (CS) in a way similar to one-time pad symmetric cipher. This paper tackles the problem of constructing a CS-based symmetric cipher under the key reuse circumstance, i.e., the cipher is resistant to common attacks even a fixed measurement matrix is used multiple times. To this end, we suggest a bi-level protected CS (BLP-CS) model which makes use of the advantage of the non-RIP measurement matrix construction. Specifically, two kinds of artificial basis mismatch techniques are investigated to construct key-related sparsifying bases. It is demonstrated that the encoding process of BLP-CS is simply a random linear projection, which is the same as the basic CS model. However, decoding the linear measurements requires knowledge of both the key-dependent sensing matrix and its sparsifying basis. The proposed model is exemplified by sampling images as a joint data acquisition and protection layer for resource-limited wireless sensors. Simulation results and numerical analyses have justified that the new model can be applied in circumstances where the measurement matrix can be re-used.

read more

Citations
More filters
Journal ArticleDOI

A Review of Compressive Sensing in Information Security Field

TL;DR: This paper reviews CS in information security field from two aspects: theoretical security and application security, and indicates some other possible application research topics in future.
Journal ArticleDOI

An efficient pixel-level chaotic image encryption algorithm

TL;DR: A new and efficient pixel-level image encryption algorithm that enhances the connection between position shuffling for pixels and value changing for grayness and shows increased faster speed and satisfies the performance requirements of real-time communication.
Journal ArticleDOI

Exploiting chaos-based compressed sensing and cryptographic algorithm for image encryption and compression

TL;DR: A solution for simultaneous image encryption and compression using compressed sensing using structurally random matrix (SRM), and permutation-diffusion type image encryption using 3-D cat map is presented.
Journal ArticleDOI

Energy-Efficient Scheduling for Real-Time Systems Based on Deep Q-Learning Model

TL;DR: An energy-efficient scheduling scheme based on deep Q-learning model is proposed for periodic tasks in real-time systems (DQL-EES) and demonstrated that the proposed algorithm can save average more energy than QL-HDS.
Journal ArticleDOI

An image coding scheme using parallel compressive sensing for simultaneous compression-encryption applications

TL;DR: Experimental and analysis results show the scheme achieves effectiveness, efficiency and high security simultaneously, and the efficiency can be guaranteed.
References
More filters
Book

Convex Optimization

TL;DR: In this article, the focus is on recognizing convex optimization problems and then finding the most appropriate technique for solving them, and a comprehensive introduction to the subject is given. But the focus of this book is not on the optimization problem itself, but on the problem of finding the appropriate technique to solve it.
Book

Compressed sensing

TL;DR: It is possible to design n=O(Nlog(m)) nonadaptive measurements allowing reconstruction with accuracy comparable to that attainable with direct knowledge of the N most important coefficients, and a good approximation to those N important coefficients is extracted from the n measurements by solving a linear program-Basis Pursuit in signal processing.
Journal ArticleDOI

An Introduction To Compressive Sampling

TL;DR: The theory of compressive sampling, also known as compressed sensing or CS, is surveyed, a novel sensing/sampling paradigm that goes against the common wisdom in data acquisition.
Journal ArticleDOI

Communication theory of secrecy systems

TL;DR: A theory of secrecy systems is developed on a theoretical level and is intended to complement the treatment found in standard works on cryptography.
Journal ArticleDOI

Signal Recovery From Random Measurements Via Orthogonal Matching Pursuit

TL;DR: It is demonstrated theoretically and empirically that a greedy algorithm called orthogonal matching pursuit (OMP) can reliably recover a signal with m nonzero entries in dimension d given O(m ln d) random linear measurements of that signal.
Related Papers (5)