Openly accessible

A review of compressive sensing in information security field

Zhang, Yushu, Zhang, Leo Yu, Zhou, Jiantao, Liu, Licheng, Chen, Fei and He, Xing 2016, A review of compressive sensing in information security field, IEEE access, vol. 4, pp. 2507-2519, doi: 10.1109/ACCESS.2016.2569421.

Attached Files
Name Description MIMEType Size Downloads
zhang-reviewofcompressive-2016.pdf Published version application/pdf 4.19MB 24

Title A review of compressive sensing in information security field
Author(s) Zhang, Yushu
Zhang, Leo Yu
Zhou, Jiantao
Liu, Licheng
Chen, Fei
He, Xing
Journal name IEEE access
Volume number 4
Start page 2507
End page 2519
Total pages 13
Publisher Institute of Electrical and Electronics Engineers
Place of publication Piscataway, N.J.
Publication date 2016
ISSN 2169-3536
Keyword(s) science & technology
technology
computer science, information systems
engineering, electrical & electronic
telecommunications
computer science
engineering
compressive sensing
theoretical security
application security
image cipher
chaos
optics
Summary The applications of compressive sensing (CS) in the fi eld of information security have captured a great deal of researchers' attention in the past decade. To supply guidance for researchers from a comprehensive perspective, this paper, for the fi rst time, reviews CS in information security field from two aspects: theoretical security and application security. Moreover, the CS applied in image cipher is one of the most widespread applications, as its characteristics of dimensional reduction and random projection can be utilized and integrated into image cryptosystems, which can achieve simultaneous compression and encryption of an image or multiple images. With respect to this application, the basic framework designs and the corresponding analyses are investigated. Speci fically, the investigation proceeds from three aspects, namely, image ciphers based on chaos and CS, image ciphers based on optics and CS, and image ciphers based on chaos, optics, and CS. A total of six frameworks are put forward. Meanwhile, their analyses in terms of security, advantages, disadvantages, and so on are presented. At last, we attempt to indicate some other possible application research topics in future.
Language eng
DOI 10.1109/ACCESS.2016.2569421
HERDC Research category C1.1 Refereed article in a scholarly journal
ERA Research output type C Journal article
Copyright notice ©2016, IEEE
Free to Read? Yes
Persistent URL http://hdl.handle.net/10536/DRO/DU:30106242

Document type: Journal Article
Collections: School of Information Technology
Open Access Collection
Connect to link resolver
 
Unless expressly stated otherwise, the copyright for items in DRO is owned by the author, with all rights reserved.

Every reasonable effort has been made to ensure that permission has been obtained for items included in DRO. If you believe that your rights have been infringed by this repository, please contact drosupport@deakin.edu.au.

Versions
Version Filter Type
Citation counts: TR Web of Science Citation Count  Cited 26 times in TR Web of Science
Scopus Citation Count Cited 31 times in Scopus
Google Scholar Search Google Scholar
Access Statistics: 30 Abstract Views, 26 File Downloads  -  Detailed Statistics
Created: Mon, 12 Feb 2018, 14:58:50 EST

Every reasonable effort has been made to ensure that permission has been obtained for items included in DRO. If you believe that your rights have been infringed by this repository, please contact drosupport@deakin.edu.au.