Image encryption based on compressed sensing and blind source separation

Yang,Z, Xiang,Y and Lu,C 2014, Image encryption based on compressed sensing and blind source separation, in IJCNN 2014 : Proceedings of the 2014 International Joint Conference on Neural Networks, Institute of Electrical and Electronics Engineers Inc., Piscataway, N. J, pp. 1366-1369, doi: 10.1109/IJCNN.2014.6889635.

Attached Files
Name Description MIMEType Size Downloads

Title Image encryption based on compressed sensing and blind source separation
Author(s) Yang,Z
Xiang,YORCID iD for Xiang,Y orcid.org/0000-0003-3545-7863
Lu,C
Conference name International Joint Conference on Neural Networks (2014 : Beijing, China)
Conference location Beijing, China
Conference dates 6-11 July 2014
Title of proceedings IJCNN 2014 : Proceedings of the 2014 International Joint Conference on Neural Networks
Editor(s) [Unknown]
Publication date 2014
Conference series International Joint Conference on Neural Networks (IJCNN)
Start page 1366
End page 1369
Total pages 4
Publisher Institute of Electrical and Electronics Engineers Inc.
Place of publication Piscataway, N. J
Keyword(s) image encryption
compressed sensing
blind source separation
Summary A novel image encryption scheme based on compressed sensing and blind source separation is proposed in this work, where there is no statistical requirement to plaintexts. In the proposed method, for encryption, the plaintexts and keys are mixed with each other using a underdetermined matrix first, and then compressed under a project matrix. As a result, it forms a difficult underdetermined blind source separation (UBSS) problem without statistical features of sources. Regarding the decryption, given the keys, a new model will be constructed, which is solvable under compressed sensing (CS) frame. Due to the usage of CS technology, the plaintexts are compressed into the data with smaller size when they are encrypted. Meanwhile, they can be decrypted from parts of the received data packets and thus allows to lose some packets. This is beneficial for the proposed encryption method to suit practical communication systems. Simulations are given to illustrate the availability and the superiority of our method.
ISBN 9781479914845
Language eng
DOI 10.1109/IJCNN.2014.6889635
Field of Research 080106 Image Processing
Socio Economic Objective 861701 Network Infrastructure Equipment
HERDC Research category E1 Full written paper - refereed
ERA Research output type E Conference publication
Grant ID DP110102076
Copyright notice ©2014, Institute of Electrical and Electronics Engineers Inc.
Persistent URL http://hdl.handle.net/10536/DRO/DU:30068121

Document type: Conference Paper
Collection: School of Information Technology
Connect to link resolver
 
Unless expressly stated otherwise, the copyright for items in DRO is owned by the author, with all rights reserved.

Versions
Version Filter Type
Citation counts: TR Web of Science Citation Count  Cited 1 times in TR Web of Science
Scopus Citation Count Cited 1 times in Scopus
Google Scholar Search Google Scholar
Access Statistics: 218 Abstract Views, 5 File Downloads  -  Detailed Statistics
Created: Wed, 18 Mar 2015, 15:06:59 EST

Every reasonable effort has been made to ensure that permission has been obtained for items included in DRO. If you believe that your rights have been infringed by this repository, please contact drosupport@deakin.edu.au.