Skip to main content

Part of the book series: SpringerBriefs in Electrical and Computer Engineering ((BRIEFSSIGNAL))

  • 501 Accesses

Abstract

This chapters introduces how CS becomes a cryptosystem and then overviews the designs and analyses of some CS cryptosystems.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

eBook
USD 16.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 16.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. E.J. Candès, T. Tao, Near-optimal signal recovery from random projections: Universal encoding strategies? IEEE Trans. Inf. Theory 52(12), 5406–5425 (2006)

    Google Scholar 

  2. M.F. Duarte, S. Sarvotham, M.B. Wakin, D. Baron, R.G. Baraniuk, Joint sparsity models for distributed compressed sensing, in Proceedings of Workshop Signal Processing with Adaptive Sparse Structural Representions (IEEE, 2005)

    Google Scholar 

  3. I. Drori, Compressed video sensing, in Proceedings of BMVA Symposium on 3D Video-Analysis Display Applications (2008)

    Google Scholar 

  4. Y. Rachlin, D. Baron, The secrecy of compressed sensing measurements, in Proceedings of 46th Annual Allerton Conference on Communication, Control, and Computing, Urbana-Champaign, IL (2008), pp. 813–817

    Google Scholar 

  5. A. Orsdemir, H.O. Altun, G. Sharma, M.F. Bocko, On the security and robustness of encryption via compressed sensing, in Proceedings of IEEE Military Communications Conference (MILCOM), San Diego, CA (2008), pp. 1–7

    Google Scholar 

  6. S.A. Hossein, A. Tabatabaei, N. Zivic, Security analysis of the joint encryption and compressed sensing, in Proceedings of 20th Telecommunications Forum (TELFOR), Belgrade (2012), pp. 799–802

    Google Scholar 

  7. T. Bianchi, V. Bioglio, E. Magli, On the security of random linear measurements, in Proceedings of IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP), Florence (2014), pp. 3992–3996

    Google Scholar 

  8. T. Bianchi, V. Bioglio, E. Magli, Analysis of one-time random projections for privacy preserving compressed sensing. IEEE Trans. Inf. Forensics Secur. 11(2), 313–327 (2016)

    Article  Google Scholar 

  9. T. Bianchi, E. Magli, Analysis of the security of compressed sensing with circulant matrices, in IEEE International Workshop on Information Forensics and Security, WIFS (IEEE, 2014), pp. 173–178

    Google Scholar 

  10. Z. Yang, W. Yan, Y. Xiang, On the security of compressed sensing-based signal cryptosystem. IEEE Trans. Emerg. Topics Comput. 3(3), 363–371 (2015)

    Article  Google Scholar 

  11. V. Cambareri, J. Haboba, F. Pareschi, R. Rovatti, G. Setti, K.-W. Wong, A two-class information concealing system based on compressed sensing, in Proceedings of IEEE International Symposium Circuits and System, ISCAS (2013), pp. 1356–1359

    Google Scholar 

  12. V. Cambareri, M. Mangia, F. Pareschi, R. Rovatti, G. Setti, Low-complexity multiclass encryption by compressed sensing. IEEE Trans. Signal Process. 63(9), 2183–2195 (2015)

    Google Scholar 

  13. M. Mangia, F. Pareschi, R. Rovatti, G. Setti, Security analysis of rakeness-based compressed sensing, in IEEE International Symposium on Circuits and Systems, ISCAS (IEEE, 2016), pp. 241–244

    Google Scholar 

  14. V. Cambareri, M. Mangia, F. Pareschi, R. Rovatti, G. Setti, On known-plaintext attacks to a compressed sensing-based encryption: a quantitative analysis. IEEE Trans. Inf. Forensics Sec. 10(10), 2182–2195 (2015)

    Google Scholar 

  15. M. Mangia, F. Pareschi, R. Rovatti, G. Setti, Low-cost security of IoT sensor nodes with rakeness-based compressed sensing: statistical and known-plaintext attacks. IEEE Trans. Inf. Forensics Security 13(2), 327–340 (2018)

    Article  Google Scholar 

  16. R. Fay, Introducing the counter mode of operation to compressed sensing based encryption. Inf. Process. Lett. 116(4), 279–283 (2016)

    Google Scholar 

  17. R. Fay, C. Ruland, Compressive sensing encryption modes and their security, in 11th International Conference for Internet Technology and Secured Transactions, ICITST (IEEE, 2016), pp. 119–126

    Google Scholar 

  18. R. Fay, C. Ruland, Compressed sampling and authenticated-encryption, in Proceedings of 11th International ITG Conference on Systems, Communications and Coding, SCC (VDE, 2017), pp. 1–6

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Yushu Zhang .

Rights and permissions

Reprints and permissions

Copyright information

© 2019 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Zhang, Y., Xiang, Y., Zhang, L.Y. (2019). Secure Compressive Sensing. In: Secure Compressive Sensing in Multimedia Data, Cloud Computing and IoT. SpringerBriefs in Electrical and Computer Engineering(). Springer, Singapore. https://doi.org/10.1007/978-981-13-2523-6_2

Download citation

  • DOI: https://doi.org/10.1007/978-981-13-2523-6_2

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-13-2522-9

  • Online ISBN: 978-981-13-2523-6

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics