A Review of Compressive Sensing in Information Security Field

The applications of compressive sensing (CS) in the field of information security have captured a great deal of researchers' attention in the past decade. To supply guidance for researchers from a comprehensive perspective, this paper, for the first time, reviews CS in information security fiel...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:IEEE access 2016, Vol.4, p.2507-2519
Hauptverfasser: Yushu Zhang, Zhang, Leo Yu, Jiantao Zhou, Licheng Liu, Fei Chen, Xing He
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 2519
container_issue
container_start_page 2507
container_title IEEE access
container_volume 4
creator Yushu Zhang
Zhang, Leo Yu
Jiantao Zhou
Licheng Liu
Fei Chen
Xing He
description The applications of compressive sensing (CS) in the field of information security have captured a great deal of researchers' attention in the past decade. To supply guidance for researchers from a comprehensive perspective, this paper, for the first time, reviews CS in information security field from two aspects: theoretical security and application security. Moreover, the CS applied in image cipher is one of the most widespread applications, as its characteristics of dimensional reduction and random projection can be utilized and integrated into image cryptosystems, which can achieve simultaneous compression and encryption of an image or multiple images. With respect to this application, the basic framework designs and the corresponding analyses are investigated. Specifically, the investigation proceeds from three aspects, namely, image ciphers based on chaos and CS, image ciphers based on optics and CS, and image ciphers based on chaos, optics, and CS. A total of six frameworks are put forward. Meanwhile, their analyses in terms of security, advantages, disadvantages, and so on are presented. At last, we attempt to indicate some other possible application research topics in future.
doi_str_mv 10.1109/ACCESS.2016.2569421
format Article
fullrecord <record><control><sourceid>proquest_ieee_</sourceid><recordid>TN_cdi_ieee_primary_7473818</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>7473818</ieee_id><doaj_id>oai_doaj_org_article_f5241b118bc449a3aaeb7fc5647f1e6c</doaj_id><sourcerecordid>2455948109</sourcerecordid><originalsourceid>FETCH-LOGICAL-c474t-e0c69f423ee1896dc9a3dd9fe06f231cca2778f2ae394fdc5839c9c1e14e06593</originalsourceid><addsrcrecordid>eNpNkM1qAjEUhUNpoWJ9AjcDXY-d_M5k0YUM2gpCobbrEDM3EtGJTUaLb9_YkdK7yeVwzrnhQ2iMiwnGhXya1vVstZqQAosJ4UIygm_QgGAhc8qpuP2336NRjNsiTZUkXg7Q8zR7h5OD78zbrPb7Q4AY3QmyFbTRtZvMtdmitT7sded8m2RzDK47Z3MHu-YB3Vm9izC6vkP0OZ991K_58u1lUU-XuWEl63IojJCWEQqAKykaIzVtGmmhEJZQbIwmZVlZooFKZhvDKyqNNBgwSxYu6RAt-t7G6606BLfX4ay8dupX8GGjdOic2YGynDC8xrhaG8bSHa1hXVrDBSstBmFS12PfdQj-6wixU1t_DG36viKMc8mqBDW5aO8ywccYwP5dxYW6YFc9dnXBrq7YU2rcpxwA_CVKVtIKV_QHQ599Vg</addsrcrecordid><sourcetype>Open Website</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2455948109</pqid></control><display><type>article</type><title>A Review of Compressive Sensing in Information Security Field</title><source>IEEE Open Access Journals</source><source>DOAJ Directory of Open Access Journals</source><source>Elektronische Zeitschriftenbibliothek - Frei zugängliche E-Journals</source><creator>Yushu Zhang ; Zhang, Leo Yu ; Jiantao Zhou ; Licheng Liu ; Fei Chen ; Xing He</creator><creatorcontrib>Yushu Zhang ; Zhang, Leo Yu ; Jiantao Zhou ; Licheng Liu ; Fei Chen ; Xing He</creatorcontrib><description>The applications of compressive sensing (CS) in the field of information security have captured a great deal of researchers' attention in the past decade. To supply guidance for researchers from a comprehensive perspective, this paper, for the first time, reviews CS in information security field from two aspects: theoretical security and application security. Moreover, the CS applied in image cipher is one of the most widespread applications, as its characteristics of dimensional reduction and random projection can be utilized and integrated into image cryptosystems, which can achieve simultaneous compression and encryption of an image or multiple images. With respect to this application, the basic framework designs and the corresponding analyses are investigated. Specifically, the investigation proceeds from three aspects, namely, image ciphers based on chaos and CS, image ciphers based on optics and CS, and image ciphers based on chaos, optics, and CS. A total of six frameworks are put forward. Meanwhile, their analyses in terms of security, advantages, disadvantages, and so on are presented. At last, we attempt to indicate some other possible application research topics in future.</description><identifier>ISSN: 2169-3536</identifier><identifier>EISSN: 2169-3536</identifier><identifier>DOI: 10.1109/ACCESS.2016.2569421</identifier><identifier>CODEN: IAECCG</identifier><language>eng</language><publisher>Piscataway: IEEE</publisher><subject>Algorithms ; application security ; chaos ; Chaos theory ; Ciphers ; Compressed sensing ; Compressive sensing ; Computer security ; Computer systems ; Cryptography ; Encryption ; image cipher ; Image compression ; Image processing ; Information security ; Optical fiber communication ; optics ; Security ; theoretical security</subject><ispartof>IEEE access, 2016, Vol.4, p.2507-2519</ispartof><rights>Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2016</rights><lds50>peer_reviewed</lds50><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c474t-e0c69f423ee1896dc9a3dd9fe06f231cca2778f2ae394fdc5839c9c1e14e06593</citedby><cites>FETCH-LOGICAL-c474t-e0c69f423ee1896dc9a3dd9fe06f231cca2778f2ae394fdc5839c9c1e14e06593</cites><orcidid>0000-0001-8132-539X</orcidid></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/7473818$$EHTML$$P50$$Gieee$$Hfree_for_read</linktohtml><link.rule.ids>314,776,780,860,2096,4010,27610,27900,27901,27902,54908</link.rule.ids></links><search><creatorcontrib>Yushu Zhang</creatorcontrib><creatorcontrib>Zhang, Leo Yu</creatorcontrib><creatorcontrib>Jiantao Zhou</creatorcontrib><creatorcontrib>Licheng Liu</creatorcontrib><creatorcontrib>Fei Chen</creatorcontrib><creatorcontrib>Xing He</creatorcontrib><title>A Review of Compressive Sensing in Information Security Field</title><title>IEEE access</title><addtitle>Access</addtitle><description>The applications of compressive sensing (CS) in the field of information security have captured a great deal of researchers' attention in the past decade. To supply guidance for researchers from a comprehensive perspective, this paper, for the first time, reviews CS in information security field from two aspects: theoretical security and application security. Moreover, the CS applied in image cipher is one of the most widespread applications, as its characteristics of dimensional reduction and random projection can be utilized and integrated into image cryptosystems, which can achieve simultaneous compression and encryption of an image or multiple images. With respect to this application, the basic framework designs and the corresponding analyses are investigated. Specifically, the investigation proceeds from three aspects, namely, image ciphers based on chaos and CS, image ciphers based on optics and CS, and image ciphers based on chaos, optics, and CS. A total of six frameworks are put forward. Meanwhile, their analyses in terms of security, advantages, disadvantages, and so on are presented. At last, we attempt to indicate some other possible application research topics in future.</description><subject>Algorithms</subject><subject>application security</subject><subject>chaos</subject><subject>Chaos theory</subject><subject>Ciphers</subject><subject>Compressed sensing</subject><subject>Compressive sensing</subject><subject>Computer security</subject><subject>Computer systems</subject><subject>Cryptography</subject><subject>Encryption</subject><subject>image cipher</subject><subject>Image compression</subject><subject>Image processing</subject><subject>Information security</subject><subject>Optical fiber communication</subject><subject>optics</subject><subject>Security</subject><subject>theoretical security</subject><issn>2169-3536</issn><issn>2169-3536</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2016</creationdate><recordtype>article</recordtype><sourceid>ESBDL</sourceid><sourceid>RIE</sourceid><sourceid>DOA</sourceid><recordid>eNpNkM1qAjEUhUNpoWJ9AjcDXY-d_M5k0YUM2gpCobbrEDM3EtGJTUaLb9_YkdK7yeVwzrnhQ2iMiwnGhXya1vVstZqQAosJ4UIygm_QgGAhc8qpuP2336NRjNsiTZUkXg7Q8zR7h5OD78zbrPb7Q4AY3QmyFbTRtZvMtdmitT7sded8m2RzDK47Z3MHu-YB3Vm9izC6vkP0OZ991K_58u1lUU-XuWEl63IojJCWEQqAKykaIzVtGmmhEJZQbIwmZVlZooFKZhvDKyqNNBgwSxYu6RAt-t7G6606BLfX4ay8dupX8GGjdOic2YGynDC8xrhaG8bSHa1hXVrDBSstBmFS12PfdQj-6wixU1t_DG36viKMc8mqBDW5aO8ywccYwP5dxYW6YFc9dnXBrq7YU2rcpxwA_CVKVtIKV_QHQ599Vg</recordid><startdate>2016</startdate><enddate>2016</enddate><creator>Yushu Zhang</creator><creator>Zhang, Leo Yu</creator><creator>Jiantao Zhou</creator><creator>Licheng Liu</creator><creator>Fei Chen</creator><creator>Xing He</creator><general>IEEE</general><general>The Institute of Electrical and Electronics Engineers, Inc. (IEEE)</general><scope>97E</scope><scope>ESBDL</scope><scope>RIA</scope><scope>RIE</scope><scope>AAYXX</scope><scope>CITATION</scope><scope>7SC</scope><scope>7SP</scope><scope>7SR</scope><scope>8BQ</scope><scope>8FD</scope><scope>JG9</scope><scope>JQ2</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope><scope>DOA</scope><orcidid>https://orcid.org/0000-0001-8132-539X</orcidid></search><sort><creationdate>2016</creationdate><title>A Review of Compressive Sensing in Information Security Field</title><author>Yushu Zhang ; Zhang, Leo Yu ; Jiantao Zhou ; Licheng Liu ; Fei Chen ; Xing He</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c474t-e0c69f423ee1896dc9a3dd9fe06f231cca2778f2ae394fdc5839c9c1e14e06593</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2016</creationdate><topic>Algorithms</topic><topic>application security</topic><topic>chaos</topic><topic>Chaos theory</topic><topic>Ciphers</topic><topic>Compressed sensing</topic><topic>Compressive sensing</topic><topic>Computer security</topic><topic>Computer systems</topic><topic>Cryptography</topic><topic>Encryption</topic><topic>image cipher</topic><topic>Image compression</topic><topic>Image processing</topic><topic>Information security</topic><topic>Optical fiber communication</topic><topic>optics</topic><topic>Security</topic><topic>theoretical security</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Yushu Zhang</creatorcontrib><creatorcontrib>Zhang, Leo Yu</creatorcontrib><creatorcontrib>Jiantao Zhou</creatorcontrib><creatorcontrib>Licheng Liu</creatorcontrib><creatorcontrib>Fei Chen</creatorcontrib><creatorcontrib>Xing He</creatorcontrib><collection>IEEE All-Society Periodicals Package (ASPP) 2005-present</collection><collection>IEEE Open Access Journals</collection><collection>IEEE All-Society Periodicals Package (ASPP) 1998-Present</collection><collection>IEEE Electronic Library (IEL)</collection><collection>CrossRef</collection><collection>Computer and Information Systems Abstracts</collection><collection>Electronics &amp; Communications Abstracts</collection><collection>Engineered Materials Abstracts</collection><collection>METADEX</collection><collection>Technology Research Database</collection><collection>Materials Research Database</collection><collection>ProQuest Computer Science Collection</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts – Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><collection>DOAJ Directory of Open Access Journals</collection><jtitle>IEEE access</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Yushu Zhang</au><au>Zhang, Leo Yu</au><au>Jiantao Zhou</au><au>Licheng Liu</au><au>Fei Chen</au><au>Xing He</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>A Review of Compressive Sensing in Information Security Field</atitle><jtitle>IEEE access</jtitle><stitle>Access</stitle><date>2016</date><risdate>2016</risdate><volume>4</volume><spage>2507</spage><epage>2519</epage><pages>2507-2519</pages><issn>2169-3536</issn><eissn>2169-3536</eissn><coden>IAECCG</coden><abstract>The applications of compressive sensing (CS) in the field of information security have captured a great deal of researchers' attention in the past decade. To supply guidance for researchers from a comprehensive perspective, this paper, for the first time, reviews CS in information security field from two aspects: theoretical security and application security. Moreover, the CS applied in image cipher is one of the most widespread applications, as its characteristics of dimensional reduction and random projection can be utilized and integrated into image cryptosystems, which can achieve simultaneous compression and encryption of an image or multiple images. With respect to this application, the basic framework designs and the corresponding analyses are investigated. Specifically, the investigation proceeds from three aspects, namely, image ciphers based on chaos and CS, image ciphers based on optics and CS, and image ciphers based on chaos, optics, and CS. A total of six frameworks are put forward. Meanwhile, their analyses in terms of security, advantages, disadvantages, and so on are presented. At last, we attempt to indicate some other possible application research topics in future.</abstract><cop>Piscataway</cop><pub>IEEE</pub><doi>10.1109/ACCESS.2016.2569421</doi><tpages>13</tpages><orcidid>https://orcid.org/0000-0001-8132-539X</orcidid><oa>free_for_read</oa></addata></record>
fulltext fulltext
identifier ISSN: 2169-3536
ispartof IEEE access, 2016, Vol.4, p.2507-2519
issn 2169-3536
2169-3536
language eng
recordid cdi_ieee_primary_7473818
source IEEE Open Access Journals; DOAJ Directory of Open Access Journals; Elektronische Zeitschriftenbibliothek - Frei zugängliche E-Journals
subjects Algorithms
application security
chaos
Chaos theory
Ciphers
Compressed sensing
Compressive sensing
Computer security
Computer systems
Cryptography
Encryption
image cipher
Image compression
Image processing
Information security
Optical fiber communication
optics
Security
theoretical security
title A Review of Compressive Sensing in Information Security Field
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-02-12T23%3A59%3A04IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_ieee_&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=A%20Review%20of%20Compressive%20Sensing%20in%20Information%20Security%20Field&rft.jtitle=IEEE%20access&rft.au=Yushu%20Zhang&rft.date=2016&rft.volume=4&rft.spage=2507&rft.epage=2519&rft.pages=2507-2519&rft.issn=2169-3536&rft.eissn=2169-3536&rft.coden=IAECCG&rft_id=info:doi/10.1109/ACCESS.2016.2569421&rft_dat=%3Cproquest_ieee_%3E2455948109%3C/proquest_ieee_%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=2455948109&rft_id=info:pmid/&rft_ieee_id=7473818&rft_doaj_id=oai_doaj_org_article_f5241b118bc449a3aaeb7fc5647f1e6c&rfr_iscdi=true