A Review of Compressive Sensing in Information Security Field
The applications of compressive sensing (CS) in the field of information security have captured a great deal of researchers' attention in the past decade. To supply guidance for researchers from a comprehensive perspective, this paper, for the first time, reviews CS in information security fiel...
Gespeichert in:
Veröffentlicht in: | IEEE access 2016, Vol.4, p.2507-2519 |
---|---|
Hauptverfasser: | , , , , , |
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 2519 |
---|---|
container_issue | |
container_start_page | 2507 |
container_title | IEEE access |
container_volume | 4 |
creator | Yushu Zhang Zhang, Leo Yu Jiantao Zhou Licheng Liu Fei Chen Xing He |
description | The applications of compressive sensing (CS) in the field of information security have captured a great deal of researchers' attention in the past decade. To supply guidance for researchers from a comprehensive perspective, this paper, for the first time, reviews CS in information security field from two aspects: theoretical security and application security. Moreover, the CS applied in image cipher is one of the most widespread applications, as its characteristics of dimensional reduction and random projection can be utilized and integrated into image cryptosystems, which can achieve simultaneous compression and encryption of an image or multiple images. With respect to this application, the basic framework designs and the corresponding analyses are investigated. Specifically, the investigation proceeds from three aspects, namely, image ciphers based on chaos and CS, image ciphers based on optics and CS, and image ciphers based on chaos, optics, and CS. A total of six frameworks are put forward. Meanwhile, their analyses in terms of security, advantages, disadvantages, and so on are presented. At last, we attempt to indicate some other possible application research topics in future. |
doi_str_mv | 10.1109/ACCESS.2016.2569421 |
format | Article |
fullrecord | <record><control><sourceid>proquest_ieee_</sourceid><recordid>TN_cdi_ieee_primary_7473818</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>7473818</ieee_id><doaj_id>oai_doaj_org_article_f5241b118bc449a3aaeb7fc5647f1e6c</doaj_id><sourcerecordid>2455948109</sourcerecordid><originalsourceid>FETCH-LOGICAL-c474t-e0c69f423ee1896dc9a3dd9fe06f231cca2778f2ae394fdc5839c9c1e14e06593</originalsourceid><addsrcrecordid>eNpNkM1qAjEUhUNpoWJ9AjcDXY-d_M5k0YUM2gpCobbrEDM3EtGJTUaLb9_YkdK7yeVwzrnhQ2iMiwnGhXya1vVstZqQAosJ4UIygm_QgGAhc8qpuP2336NRjNsiTZUkXg7Q8zR7h5OD78zbrPb7Q4AY3QmyFbTRtZvMtdmitT7sded8m2RzDK47Z3MHu-YB3Vm9izC6vkP0OZ991K_58u1lUU-XuWEl63IojJCWEQqAKykaIzVtGmmhEJZQbIwmZVlZooFKZhvDKyqNNBgwSxYu6RAt-t7G6606BLfX4ay8dupX8GGjdOic2YGynDC8xrhaG8bSHa1hXVrDBSstBmFS12PfdQj-6wixU1t_DG36viKMc8mqBDW5aO8ywccYwP5dxYW6YFc9dnXBrq7YU2rcpxwA_CVKVtIKV_QHQ599Vg</addsrcrecordid><sourcetype>Open Website</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2455948109</pqid></control><display><type>article</type><title>A Review of Compressive Sensing in Information Security Field</title><source>IEEE Open Access Journals</source><source>DOAJ Directory of Open Access Journals</source><source>Elektronische Zeitschriftenbibliothek - Frei zugängliche E-Journals</source><creator>Yushu Zhang ; Zhang, Leo Yu ; Jiantao Zhou ; Licheng Liu ; Fei Chen ; Xing He</creator><creatorcontrib>Yushu Zhang ; Zhang, Leo Yu ; Jiantao Zhou ; Licheng Liu ; Fei Chen ; Xing He</creatorcontrib><description>The applications of compressive sensing (CS) in the field of information security have captured a great deal of researchers' attention in the past decade. To supply guidance for researchers from a comprehensive perspective, this paper, for the first time, reviews CS in information security field from two aspects: theoretical security and application security. Moreover, the CS applied in image cipher is one of the most widespread applications, as its characteristics of dimensional reduction and random projection can be utilized and integrated into image cryptosystems, which can achieve simultaneous compression and encryption of an image or multiple images. With respect to this application, the basic framework designs and the corresponding analyses are investigated. Specifically, the investigation proceeds from three aspects, namely, image ciphers based on chaos and CS, image ciphers based on optics and CS, and image ciphers based on chaos, optics, and CS. A total of six frameworks are put forward. Meanwhile, their analyses in terms of security, advantages, disadvantages, and so on are presented. At last, we attempt to indicate some other possible application research topics in future.</description><identifier>ISSN: 2169-3536</identifier><identifier>EISSN: 2169-3536</identifier><identifier>DOI: 10.1109/ACCESS.2016.2569421</identifier><identifier>CODEN: IAECCG</identifier><language>eng</language><publisher>Piscataway: IEEE</publisher><subject>Algorithms ; application security ; chaos ; Chaos theory ; Ciphers ; Compressed sensing ; Compressive sensing ; Computer security ; Computer systems ; Cryptography ; Encryption ; image cipher ; Image compression ; Image processing ; Information security ; Optical fiber communication ; optics ; Security ; theoretical security</subject><ispartof>IEEE access, 2016, Vol.4, p.2507-2519</ispartof><rights>Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2016</rights><lds50>peer_reviewed</lds50><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c474t-e0c69f423ee1896dc9a3dd9fe06f231cca2778f2ae394fdc5839c9c1e14e06593</citedby><cites>FETCH-LOGICAL-c474t-e0c69f423ee1896dc9a3dd9fe06f231cca2778f2ae394fdc5839c9c1e14e06593</cites><orcidid>0000-0001-8132-539X</orcidid></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/7473818$$EHTML$$P50$$Gieee$$Hfree_for_read</linktohtml><link.rule.ids>314,776,780,860,2096,4010,27610,27900,27901,27902,54908</link.rule.ids></links><search><creatorcontrib>Yushu Zhang</creatorcontrib><creatorcontrib>Zhang, Leo Yu</creatorcontrib><creatorcontrib>Jiantao Zhou</creatorcontrib><creatorcontrib>Licheng Liu</creatorcontrib><creatorcontrib>Fei Chen</creatorcontrib><creatorcontrib>Xing He</creatorcontrib><title>A Review of Compressive Sensing in Information Security Field</title><title>IEEE access</title><addtitle>Access</addtitle><description>The applications of compressive sensing (CS) in the field of information security have captured a great deal of researchers' attention in the past decade. To supply guidance for researchers from a comprehensive perspective, this paper, for the first time, reviews CS in information security field from two aspects: theoretical security and application security. Moreover, the CS applied in image cipher is one of the most widespread applications, as its characteristics of dimensional reduction and random projection can be utilized and integrated into image cryptosystems, which can achieve simultaneous compression and encryption of an image or multiple images. With respect to this application, the basic framework designs and the corresponding analyses are investigated. Specifically, the investigation proceeds from three aspects, namely, image ciphers based on chaos and CS, image ciphers based on optics and CS, and image ciphers based on chaos, optics, and CS. A total of six frameworks are put forward. Meanwhile, their analyses in terms of security, advantages, disadvantages, and so on are presented. At last, we attempt to indicate some other possible application research topics in future.</description><subject>Algorithms</subject><subject>application security</subject><subject>chaos</subject><subject>Chaos theory</subject><subject>Ciphers</subject><subject>Compressed sensing</subject><subject>Compressive sensing</subject><subject>Computer security</subject><subject>Computer systems</subject><subject>Cryptography</subject><subject>Encryption</subject><subject>image cipher</subject><subject>Image compression</subject><subject>Image processing</subject><subject>Information security</subject><subject>Optical fiber communication</subject><subject>optics</subject><subject>Security</subject><subject>theoretical security</subject><issn>2169-3536</issn><issn>2169-3536</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2016</creationdate><recordtype>article</recordtype><sourceid>ESBDL</sourceid><sourceid>RIE</sourceid><sourceid>DOA</sourceid><recordid>eNpNkM1qAjEUhUNpoWJ9AjcDXY-d_M5k0YUM2gpCobbrEDM3EtGJTUaLb9_YkdK7yeVwzrnhQ2iMiwnGhXya1vVstZqQAosJ4UIygm_QgGAhc8qpuP2336NRjNsiTZUkXg7Q8zR7h5OD78zbrPb7Q4AY3QmyFbTRtZvMtdmitT7sded8m2RzDK47Z3MHu-YB3Vm9izC6vkP0OZ991K_58u1lUU-XuWEl63IojJCWEQqAKykaIzVtGmmhEJZQbIwmZVlZooFKZhvDKyqNNBgwSxYu6RAt-t7G6606BLfX4ay8dupX8GGjdOic2YGynDC8xrhaG8bSHa1hXVrDBSstBmFS12PfdQj-6wixU1t_DG36viKMc8mqBDW5aO8ywccYwP5dxYW6YFc9dnXBrq7YU2rcpxwA_CVKVtIKV_QHQ599Vg</recordid><startdate>2016</startdate><enddate>2016</enddate><creator>Yushu Zhang</creator><creator>Zhang, Leo Yu</creator><creator>Jiantao Zhou</creator><creator>Licheng Liu</creator><creator>Fei Chen</creator><creator>Xing He</creator><general>IEEE</general><general>The Institute of Electrical and Electronics Engineers, Inc. (IEEE)</general><scope>97E</scope><scope>ESBDL</scope><scope>RIA</scope><scope>RIE</scope><scope>AAYXX</scope><scope>CITATION</scope><scope>7SC</scope><scope>7SP</scope><scope>7SR</scope><scope>8BQ</scope><scope>8FD</scope><scope>JG9</scope><scope>JQ2</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope><scope>DOA</scope><orcidid>https://orcid.org/0000-0001-8132-539X</orcidid></search><sort><creationdate>2016</creationdate><title>A Review of Compressive Sensing in Information Security Field</title><author>Yushu Zhang ; Zhang, Leo Yu ; Jiantao Zhou ; Licheng Liu ; Fei Chen ; Xing He</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c474t-e0c69f423ee1896dc9a3dd9fe06f231cca2778f2ae394fdc5839c9c1e14e06593</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2016</creationdate><topic>Algorithms</topic><topic>application security</topic><topic>chaos</topic><topic>Chaos theory</topic><topic>Ciphers</topic><topic>Compressed sensing</topic><topic>Compressive sensing</topic><topic>Computer security</topic><topic>Computer systems</topic><topic>Cryptography</topic><topic>Encryption</topic><topic>image cipher</topic><topic>Image compression</topic><topic>Image processing</topic><topic>Information security</topic><topic>Optical fiber communication</topic><topic>optics</topic><topic>Security</topic><topic>theoretical security</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Yushu Zhang</creatorcontrib><creatorcontrib>Zhang, Leo Yu</creatorcontrib><creatorcontrib>Jiantao Zhou</creatorcontrib><creatorcontrib>Licheng Liu</creatorcontrib><creatorcontrib>Fei Chen</creatorcontrib><creatorcontrib>Xing He</creatorcontrib><collection>IEEE All-Society Periodicals Package (ASPP) 2005-present</collection><collection>IEEE Open Access Journals</collection><collection>IEEE All-Society Periodicals Package (ASPP) 1998-Present</collection><collection>IEEE Electronic Library (IEL)</collection><collection>CrossRef</collection><collection>Computer and Information Systems Abstracts</collection><collection>Electronics & Communications Abstracts</collection><collection>Engineered Materials Abstracts</collection><collection>METADEX</collection><collection>Technology Research Database</collection><collection>Materials Research Database</collection><collection>ProQuest Computer Science Collection</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><collection>DOAJ Directory of Open Access Journals</collection><jtitle>IEEE access</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Yushu Zhang</au><au>Zhang, Leo Yu</au><au>Jiantao Zhou</au><au>Licheng Liu</au><au>Fei Chen</au><au>Xing He</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>A Review of Compressive Sensing in Information Security Field</atitle><jtitle>IEEE access</jtitle><stitle>Access</stitle><date>2016</date><risdate>2016</risdate><volume>4</volume><spage>2507</spage><epage>2519</epage><pages>2507-2519</pages><issn>2169-3536</issn><eissn>2169-3536</eissn><coden>IAECCG</coden><abstract>The applications of compressive sensing (CS) in the field of information security have captured a great deal of researchers' attention in the past decade. To supply guidance for researchers from a comprehensive perspective, this paper, for the first time, reviews CS in information security field from two aspects: theoretical security and application security. Moreover, the CS applied in image cipher is one of the most widespread applications, as its characteristics of dimensional reduction and random projection can be utilized and integrated into image cryptosystems, which can achieve simultaneous compression and encryption of an image or multiple images. With respect to this application, the basic framework designs and the corresponding analyses are investigated. Specifically, the investigation proceeds from three aspects, namely, image ciphers based on chaos and CS, image ciphers based on optics and CS, and image ciphers based on chaos, optics, and CS. A total of six frameworks are put forward. Meanwhile, their analyses in terms of security, advantages, disadvantages, and so on are presented. At last, we attempt to indicate some other possible application research topics in future.</abstract><cop>Piscataway</cop><pub>IEEE</pub><doi>10.1109/ACCESS.2016.2569421</doi><tpages>13</tpages><orcidid>https://orcid.org/0000-0001-8132-539X</orcidid><oa>free_for_read</oa></addata></record> |
fulltext | fulltext |
identifier | ISSN: 2169-3536 |
ispartof | IEEE access, 2016, Vol.4, p.2507-2519 |
issn | 2169-3536 2169-3536 |
language | eng |
recordid | cdi_ieee_primary_7473818 |
source | IEEE Open Access Journals; DOAJ Directory of Open Access Journals; Elektronische Zeitschriftenbibliothek - Frei zugängliche E-Journals |
subjects | Algorithms application security chaos Chaos theory Ciphers Compressed sensing Compressive sensing Computer security Computer systems Cryptography Encryption image cipher Image compression Image processing Information security Optical fiber communication optics Security theoretical security |
title | A Review of Compressive Sensing in Information Security Field |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-02-12T23%3A59%3A04IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_ieee_&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=A%20Review%20of%20Compressive%20Sensing%20in%20Information%20Security%20Field&rft.jtitle=IEEE%20access&rft.au=Yushu%20Zhang&rft.date=2016&rft.volume=4&rft.spage=2507&rft.epage=2519&rft.pages=2507-2519&rft.issn=2169-3536&rft.eissn=2169-3536&rft.coden=IAECCG&rft_id=info:doi/10.1109/ACCESS.2016.2569421&rft_dat=%3Cproquest_ieee_%3E2455948109%3C/proquest_ieee_%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=2455948109&rft_id=info:pmid/&rft_ieee_id=7473818&rft_doaj_id=oai_doaj_org_article_f5241b118bc449a3aaeb7fc5647f1e6c&rfr_iscdi=true |