Skip to main content

Extension of Joint Complexity and Compressive Sensing

  • Chapter
  • First Online:
  • 536 Accesses

Abstract

In this chapter, the theory of Joint Complexity and Compressive Sensing has been extended to three research subjects, (a) classification encryption via compressed permuted measurement matrices, (b) dynamic classification completeness based on Matrix Completion and (c) encryption based on the Eulerian circuits of original texts. In the first additional research subject we study the encryption property of Compressive Sensing in order to secure the classification process in Twitter without an extra cryptographic layer. The measurements obtained are considered to be weakly encrypted due to their acquisition process, which was verified by the experimental results. In the second additional research subject we study the application of Matrix Completion (MC) in topic detection and classification. Based on the spatial correlation of tweets and the spatial characteristics of the score matrices, we apply a novel framework which extends the Matrix Completion to build dynamically complete matrices from a small number of random sample Joint Complexity scores. In the third additional research subject, we present an encryption system based on Eulerian circuits , that destructs the semantics of a text while retaining it in correct syntax. We study the performance on Markov models , and perform experiments on real text.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD   109.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Notes

  1. 1.

    For the implementation of methods (1)–(5) the MATLAB codes can be found in:http://sparselab.stanford.edu/,http://www.acm.caltech.edu/l1magic,http://people.ee.duke.edu/~lcarin/BCS.html

  2. 2.

    For the implementation of methods (1)–(5) the MATLAB codes can be found in:http://sparselab.stanford.edu/,http://www.acm.caltech.edu/l1magic,http://people.ee.duke.edu/~lcarin/BCS.html

References

  1. Aardenne-Ehrenfest TV, de Bruijn NG (1951) Circuits and trees in oriented linear graphs. Simon Stevin 28:203–217

    MathSciNet  MATH  Google Scholar 

  2. Aiello LM, Petkos G, Martin C, Corney D, Papadopoulos S, Skraba R, Goker A, Kompatsiaris Y, Jaimes A (2013) Sensing trending topics in twitter. IEEE Trans Multimedia 15(6):1268–1282

    Article  Google Scholar 

  3. Becker H, Naaman M, Gravano L (2011) Beyond trending topics: real-world event identification on twitter. In: 5th international AAAI conference on web and social media

    Google Scholar 

  4. Cai J, Candès E, Shen Z (2010) A singular value thresholding algorithm for matrix completion. SIAM J Optim 20:1956–1982

    Article  MathSciNet  MATH  Google Scholar 

  5. Candès E, Recht B (2009) Exact matrix completion via convex optimization. Found Comput Math 9:717–772

    Article  MathSciNet  MATH  Google Scholar 

  6. Candés E, Romberg J, Tao T (2006) Robust uncertainty principles: exact signal reconstruction from highly incomplete frequency information. IEEE Trans Inform Theory 52:489–509

    Article  MathSciNet  MATH  Google Scholar 

  7. Daemen J, Rijmen V (2002) The design of Rijndael: AES - the advanced encryption standard. Springer, Berlin

    Book  MATH  Google Scholar 

  8. Donoho D (2006) Compressive sensing. IEEE Trans Inform Theory 52(4):1289–1306

    Article  MathSciNet  MATH  Google Scholar 

  9. Grant M, Boyd S (2011) Cvx: Matlab software for disciplined convex programming. Technical report

    Google Scholar 

  10. Isaev MI (2009) Asymptotic number of Eulerian circuits in complete bipartite graphs. In: 52nd MFTI conference, Moscow

    Google Scholar 

  11. Jacquet P, Milioris D (2014) Honeypot design via random Eulerian paths. European Patent No. 14306779.1

    Google Scholar 

  12. Jacquet P, Milioris D (2014) Information in strings: enumeration of Eulerian paths and Eulerian components in Markov sequences. In: International conference on probabilistic, combinatorial and asymptotic methods for the analysis of algorithms (AofA’14), Paris

    Google Scholar 

  13. Jacquet P, Milioris D (2014) Undetectable encryption based on m-grams permutations. European Patent No. 14305064.9

    Google Scholar 

  14. Jacquet P, Szpankowski W (2004) Markov types and minimax redundancy for Markov sources. IEEE Trans Inform Theory 50(7):1393–1402

    Google Scholar 

  15. Jacquet P, Milioris D, Burnside G (2014) Textual steganography - undetectable encryption based on n-gram rotations. European Patent No. 14306482.2

    Google Scholar 

  16. Ji S, Xue Y, Carin L (2008) Bayesian compressive sensing. IEEE Trans Signal Process 56(6):2346–2356

    Google Scholar 

  17. Kondor D, Milioris D (2016) Unsupervised classification in twitter based on joint complexity. In: International conference on computational social science (ICCSS’16), Chicago, IL

    Google Scholar 

  18. McKay B, Robinson RW (1995) Asymptotic enumeration of Eulerian circuits in the complete graph. Combinatorica 4(10):367–377

    Google Scholar 

  19. Milioris D (2016) Classification encryption via compressed permuted measurement matrices. In: IEEE international workshop on security and privacy in big data (BigSecurity’16), INFOCOM’16, San Francisco, CA

    Google Scholar 

  20. Milioris D (2016) Towards dynamic classification completeness in twitter. In: IEEE European signal processing conference (EUSIPCO’16), Budapest

    Google Scholar 

  21. Milioris D, Jacquet P (2014) Secloc: encryption system based on compressive sensing measurements for location estimation. In: IEEE international conference on computer communications (INFOCOM’14), Toronto

    Google Scholar 

  22. Milioris D, Jacquet P (2015) Topic detection and compressed classification in twitter. In: IEEE European signal processing conference (EUSIPCO’15), Nice

    Google Scholar 

  23. Milioris D, Kondor D (2016) Topic detection completeness in twitter: Is it possible? In: International conference on computational social science (ICCSS’16), Chicago

    Google Scholar 

  24. Milioris D, Tzagkarakis G, Papakonstantinou A, Papadopouli M, Tsakalides P (2014) Low-dimensional signal-strength fingerprint-based positioning in wireless lans. Ad Hoc Netw J Elsevier 12:100–114

    Article  Google Scholar 

  25. National Bureau of Standards, U. D. o. C., editor. Data encryption standard. Washington DC, Jan 1977

    Google Scholar 

  26. Nikitaki S, Tsagkatakis G, Tsakalides P (2012) Efficient training for fingerprint based positioning using matrix completion. In: 20th European signal processing conference (EUSIPCO), Boucharest, Romania, pp 27–310

    Google Scholar 

  27. Paar C, Pelzl J (2009) Understanding cryptography, a textbook for students and practitioners. Springer, Berlin

    MATH  Google Scholar 

  28. Tutte WT, Smith CAB (1941) On unicursal paths in a network of degree 4. Am Math Mon 48:233–237

    Article  MathSciNet  MATH  Google Scholar 

  29. Tzagkarakis G, Tsakalides P (2010) Bayesian compressed sensing imaging using a gaussian scale mixture. In: 35th international conference on acoustics, speech, and signal processing (ICASSP’10), Dallas, TX

    Google Scholar 

  30. Tzagkarakis G, Milioris, D, Tsakalides P (2010) Multiple-measurement Bayesian compressive sensing using GSM priors for doa estimation. In: 35th IEEE international conference on acoustics, speech and signal processing (ICASSP), Dallas, TX

    Google Scholar 

  31. Wheeler DJ, Needham RM (1994) Tea, a tiny encryption algorithm. In: International workshop on fast software encryption. Lecture notes in computer science, Leuven, Belgium, pp 363–366

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer International Publishing AG

About this chapter

Cite this chapter

Milioris, D. (2018). Extension of Joint Complexity and Compressive Sensing. In: Topic Detection and Classification in Social Networks. Springer, Cham. https://doi.org/10.1007/978-3-319-66414-9_5

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-66414-9_5

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-66413-2

  • Online ISBN: 978-3-319-66414-9

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics