SIMULTANEOUS COMPRESSIVE SENSING AND OPTICAL ENCRYPTION OF SIGNALS AND IMAGES

Size: px
Start display at page:

Download "SIMULTANEOUS COMPRESSIVE SENSING AND OPTICAL ENCRYPTION OF SIGNALS AND IMAGES"

Transcription

1 SIMULTANEOUS COMPRESSIVE SENSING AND OPTICAL ENCRYPTION OF SIGNALS AND IMAGES Dr. Ertan Atar Türk Telekom İstanbul-I Area Offices İstanbul, Turkey Prof. Dr. Okan K. Ersoy Scool of Electrical &Computer Engineering, Purdue University Indiana, USA and Bogazici University, Electrical and Electronic Engineering Department, İstanbul, Turkey Assist. Prof. Dr. Lale Özyılmaz Electronics&Com. Eng. Dept. Yıldız Technical University İstanbul, Turkey

2 CONTENTS Abstract I. Introduction II. Compressive Sensing Orthogonal Matching Pursuit III. Cryptography IV. Details of Implementation and Methods V. Experimental Results VI. Conclusions References

3 ABSTRACT Compressive Sensing (CS) makes it possible to reduce the amount of data and thereby to greatly simplify the sensor system. In this method, data is compressed before measurements whereas data is first measured and then compressed in the current technology. This approach leads to reducing the number of sensors. In this study, simultaneous compressive sensing and optical cryptography is developed as a new approach for encryption and decryption of signals and images.

4 ABSTRACT CS is carried out with the Orthogonal Matching Pursuit (OMP) algorithm. The CS-OMP algorithm is next combined with the Double Random Phase/Amplitude Encyrption (DRPAE) method to achieve both compression and encyrption of data. In order to achieve high security, the keys used in CS and DRPAE are transmitted to the receiver by the asymmetric RSA cryptography method.

5 ABSTRACT Thus, the overall cryptographic system is a hybrid optical system (both symmetric and asymmetric) since DRPAE is a symmetric optical encyrption method. In this approach, data size is decreased and use of detection matrix in CS also protects DRPAE optical keys against well-known attacks. Experimental results both with 1-D signals and images are presented.

6 The signal is transformed by a measurement matrix to another space and measured in compressed form, the measurement matrix must be such that the original signal can be recovered without loss. I. INTRODUCTION According to classical signal processing methods, when the signal is sampled, Nyquist criteria must be satisfied to avoid loss of information. After sampling, if the signal is compressible, the signal is further compressed typically by a transform method. In the CS method, the signal is supposed to be sparse in the sense that most signal values are assumed to be negligible (zero).

7 I. INTRODUCTION

8 I. INTRODUCTION Several advantages of compression detection are given below: Reducing the number of sensors, thereby transferring more information with fewer examples. Reducing the data loading process which is especially costly in image processing. Reduced power consumption and hardware complexity.

9 I. INTRODUCTION Cryptography involves encryption and decryption of information. The mathematical methods for security of information, data integrity and identity validation are significant topics of cryptography. In this study, we propose a method for simultaneous compressive sensing, encyrption and decryption of signals and images using orthogonal matching pursuit and optical cryptography.

10 II. COMPRESSIVE SENSING ORTHOGONAL MATCHING PURSUIT Orthogonal Matching Pursuit (OMP) is an iterative method to recover the nonzero elements of a sparse signal from the measured signal. If the length m of the measurement vector is larger than k, the number of nonzero elements of the sparse signal, the sparse signal can be recovered by OMP with a very large probability.

11 II. COMPRESSIVE SENSING ORTHOGONAL MATCHING PURSUIT

12 II. COMPRESSIVE SENSING ORTHOGONAL MATCHING PURSUIT In the OMP program, the detection matrix was generated by using one of a set of fast transforms, namely, Fast Fourier transform (FFT), Discrete Cosine Transform (DCT), Real Sinesoidal Transform (RST), Haar wavelet transform, Hadamard transform, Discrete Sine Transform (DST) and Discrete Cosine-III Transform (DC3T). In the experiments discussed in Section 5, the ranking of transforms in terms of accuracy of results were DC3T, DCT, FFT, RST, DST, Hadamard and Haar. In addition, DC3T has fewer number of multiplications than DCT.

13 III. CRYPTOGRAPHY Cryptography refers to the methods of encryption and decryption of information. Cryptoanalysis involves methods to investigate the strengths and weaknesses of cryptographic systems. A cryptosystem involves five elements: P=Plaintext K=Key E=Encryption C=Ciphertext D=Decryption

14 III. CRYPTOGRAPHY

15 III. CRYPTOGRAPHY Symmetric encryption algorithms use the same key for encryption and decryption operations. Symmetric encryption is very fast and easy to implement in electronic devices. In asymmetric encryption, one general key is used for encryption, and another special key is used for decryption. Asymmetric encryption algorithms are usually developed with very large prime numbers. In the proposed method, the RSA algorithm was used for asymmetric encryption of the keys.

16 III. CRYPTOGRAPHY

17 RSA; III. CRYPTOGRAPHY

18 III. CRYPTOGRAPHY Using asymmetric and symmetric encryptions together is named hybrid cryptography. Hybrid cryptography increases the advantages and decreases the disadvantages of the asymmetric and symmetric encryptions.

19 IV. DETAILS OF IMPLEMENTION AND METHODS Simultaneous Compressive Sensing and Hybrid Optical Cryptography (SCOSC) is proposed for effective and efficient compression and secure transmission of signals and images. In this work, CS is achieved with the orthogonal matching pursuit (OMP) algorithm. Then, the CS-OMP algorithm is combined with the double random phase plus amplitude encyrption (DRPAE) method to achieve both compression and encyrption of data.

20 IV. DETAILS OF IMPLEMENTION AND METHODS In order to achieve high security, the keys used in CS and DRPAE are transmitted to the receiver by an asymmetric cryptography method (currently the RSA method). Thus, the overall cryptographic system is a hybrid optical system (both symmetric and asymmetric) since DRPAE is a symmetric optical encryption method. In this approach, data size is decreased, and use of detection matrix in CS also improves DRPAE optical keys against attacks.

21 IV. DETAILS OF IMPLEMENTION AND METHODS

22 IV. DETAILS OF IMPLEMENTION AND METHODS

23 IV. DETAILS OF IMPLEMENTION AND METHODS Next the sparse signal per block is generated with length M satisfying M K* log(n) by keeping M largest elements in magnitude and zeroing the others. The detection matrix is generated by pre and post multiplying a fast transform matrix with random permutation matrices. The SCOSC method is applied per block of information.

24 IV. DETAILS OF IMPLEMENTION AND METHODS The optical phase/amplitude keys p1 and p2 are generated with random complex numbers. The phase covers 360 degrees. This is repeated once more for a 4-f optical encryption system for additional security. The resulting encrypted signal with the overall system is of smaller size than the original signal.

25 V. EXPERIMENTAL RESULTS

26 V. EXPERIMENTAL RESULTS

27 V. EXPERIMENTAL RESULTS

28 V. EXPERIMENTAL RESULTS

29 V. EXPERIMENTAL RESULTS Phase recovery and dirac delta function methods were studied for cryptoanalysis of the proposed method. Phase recovery methods are not effective when the keys of the 4f system are phase/amplitude keys. The dirac delta function method is effective in recovering the complete encryption matrix, but this is not usable for decryption since OMP requires the measurement matrix which is not available.

30 VI. CONCLUSIONS In this study, a method for simultaneous compressive sensing using OMP and optical cryptography using double random phase/amplitude keys was proposed. The RSA algorithm involving asymmetric cryptography was used to encrypt/decrypt the keys.

31 VI. CONSLUSIONS The phase/amplitude keys were used in a 4f optical cryptography system. The measurement matrix for the OMP algorithm was also constructed using Fourier related fast transforms such as Discrete Fourier Transform (DFT), Discrete Cosine Transform (DCT), Real Sinusoidal Transform (RST), Haar wavelet transform, Hadamard transform, Discrete Sine Transform (DST) and Discrete Cosine-III Transform (DC3T) together with random permutation matrices.

32 VI. CONCLUSIONS The experimental results with encryption/decryption of 1-D audio signals and 2-D images showed that the method is capable of high accuracy encryption and decryption with correct keys. It was not possible to achieve correct decryption with 1-D and 2-D input signals when the keys were wrong. Cryptoanalysis studies with phase recovery and dirac delta function methods showed that the proposed method is extremely difficult to attack.

33 [1] E. J. Candes, Compressive sampling, International Congress of Mathematicians (ICM), vol. 3, pp , Madrid, Spain. [2] Mathematical Introduction to Compressive Sensing,, 2013, Simon Foucart, Holger Rauhut, Springer New York Heidelberg Dordrecht London, ISBN [3] [4] A. Gilbert and P. Indyk, Sparse recovery using sparse matrices, Proceedings of the IEEE, Vol. 98, No. 6, pp , [5] Donoho D., Compressed Sensing, IEEE Tran. Information Theory, 52(4), pp , April [6] C. E. Shannon, Communication in the Presence of Noise, Proc. Institute of Radio Engineers, Vol. 37, pp , [7] REFERENCES [8] Baraniuk R., Compressive sensing, IEEE Signal Processing Magazine, 24(4), pp , July 2007.

34 REFERENCES [9] D. Baron, M. B. Wakin, M. F. Duarte, S. Sarvotham, and R. G. Baraniuk, Distributed Compressed Sensing, Tech. Rep. TREE-0612, Rice University, Department of Electrical and Computer Engineering, [10] Amir M. A. and Esther R., Compressive Sensing: From Compressing while Sampling to Compressing and Securing while Sampling", 32nd Annual International Conference of the IEEE EMBS, Buenos Aires, Argentina, August 31 - September 4, [11] Minal C. and Rajankar S., Study the Effects of Encryption on Compressive Sensed Data, International Journal of Engineering and Advanced Technology (IJEAT) ISSN: , Volume-2, Issue-5, June [12] Rachlin Y. and Baron D., The Secrecy of Compressed Sensing Measurements, Communication, Control, and Computing, th Annual Allerton Conference, , Urbana-Champaign, IL. [13] C. Dwork, F. McSherry, and K. Talwar, The Price of Privacy and the Limits of LP Decoding, Symp. on Theory of Computing (STOC), June 2007.

35 REFERENCES [14] Orsdemir A, Altun HO, Sharma G., et al., On the Security and Robustness of Encryption via Compressed Sensing, Proceedings of the IEEE military communications conference MILCOM, [15] Ramezani M. ; Seyfe, B. ; Bafghi, H.G., Perfect Secrecy via Compressed Sensing, Communication and Information Theory (IWCIT), Iran Workshop on, 8-9 May 2013, Tehran, 1-5, [16] Zhang Y., Wong K., Xiao D., Zhang L.Y., Li M., Embedding Cryptographic Features in Compressive Sensing, Cryptography and Security, Information Theory,arXiv: [17] Zhang X.; Ren Y. ; Feng G.; Qian Z., Compressing Encrypted Image Using Compressive Sensing, Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP), 2011 Seventh International Conference, , Dalian, Oct [18] Yan Mo, Aidi Zhang, Fen Zheng, Nanrun Zhou, An Image Compression-Encryption Algorithm Based on 2-D Compressive Sensing, Journal of Computational Information Systems 9: 24, , [19] Donoho, D., Chen, S. and Saunders, M., Atomic Decomposition by Basis Pursuit, SIAM Journal on Scientific Computing, Vol. 20 p.33-61, 1998.

36 REFERENCES [20] Tropp, J. and Gilbert, A.C. Signal Recovery from Partial Information via Orthogonal Matching Pursuit, IEEE Trans. Inform. Theory, Vol. 53, No. 12, p , [21] K. Ersoy, O. and Nouira, A., Image Coding With The Discrete Cosine-III Transform, IEEE Journal On Selected Areas In Communıcations, Vol. 10. No. 5, June [22] B. Schneier, Applied Cryptography - Protocols, Algorithms, and Source code in C, John Wiley & Sons, Inc., 2nd edition, [23]Washington, L. C., 2003.Elliptic Curves, Number Theory and Cryptography, Chapman&Hall/Crc. [24] Menezes, A. J., Handbook of Applied Cryptography, Boca Raton: CRC Press, [25] Rivest, R., Shamir A. ve Adleman, L., A Method for Obtaining Digital Signatures and Public-Key Cryptosystems, Communications of the ACM, 21 (2), , 1978.

37 Dr. Ertan Atar Türk Telekom İstanbul-I Area Offices İstanbul, Turkey Prof. Dr. Okan K. Ersoy Electric&Computer Eng. Dept. Purdue University Indiana, USA Assist. Prof. Dr. Lale Özyılmaz Electronics&Com. Eng. Dept. Yıldız Technical University İstanbul, Turkey

Effects of Basis-mismatch in Compressive Sampling of Continuous Sinusoidal Signals

Effects of Basis-mismatch in Compressive Sampling of Continuous Sinusoidal Signals Effects of Basis-mismatch in Compressive Sampling of Continuous Sinusoidal Signals Daniel H. Chae, Parastoo Sadeghi, and Rodney A. Kennedy Research School of Information Sciences and Engineering The Australian

More information

An Introduction to Compressive Sensing and its Applications

An Introduction to Compressive Sensing and its Applications International Journal of Scientific and Research Publications, Volume 4, Issue 6, June 2014 1 An Introduction to Compressive Sensing and its Applications Pooja C. Nahar *, Dr. Mahesh T. Kolte ** * Department

More information

On-Mote Compressive Sampling in Wireless Seismic Sensor Networks

On-Mote Compressive Sampling in Wireless Seismic Sensor Networks On-Mote Compressive Sampling in Wireless Seismic Sensor Networks Marc J. Rubin Computer Science Ph.D. Candidate Department of Electrical Engineering and Computer Science Colorado School of Mines mrubin@mines.edu

More information

SPARSE CHANNEL ESTIMATION BY PILOT ALLOCATION IN MIMO-OFDM SYSTEMS

SPARSE CHANNEL ESTIMATION BY PILOT ALLOCATION IN MIMO-OFDM SYSTEMS SPARSE CHANNEL ESTIMATION BY PILOT ALLOCATION IN MIMO-OFDM SYSTEMS Puneetha R 1, Dr.S.Akhila 2 1 M. Tech in Digital Communication B M S College Of Engineering Karnataka, India 2 Professor Department of

More information

Chaotically Modulated RSA/SHIFT Secured IFFT/FFT Based OFDM Wireless System

Chaotically Modulated RSA/SHIFT Secured IFFT/FFT Based OFDM Wireless System Chaotically Modulated RSA/SHIFT Secured IFFT/FFT Based OFDM Wireless System Sumathra T 1, Nagaraja N S 2, Shreeganesh Kedilaya B 3 Department of E&C, Srinivas School of Engineering, Mukka, Mangalore Abstract-

More information

Security Enhancement and Speed Monitoring of RSA Algorithm

Security Enhancement and Speed Monitoring of RSA Algorithm Security Enhancement and Speed Monitoring of RSA Algorithm Sarthak R Patel 1, Prof. Khushbu Shah 2 1 PG Scholar, 2 Assistant Professor Computer Engineering Department, LJIET, Gujarat Technological University,

More information

Distributed Compressed Sensing of Jointly Sparse Signals

Distributed Compressed Sensing of Jointly Sparse Signals Distributed Compressed Sensing of Jointly Sparse Signals Marco F. Duarte, Shriram Sarvotham, Dror Baron, Michael B. Wakin and Richard G. Baraniuk Department of Electrical and Computer Engineering, Rice

More information

Compressive Imaging: Theory and Practice

Compressive Imaging: Theory and Practice Compressive Imaging: Theory and Practice Mark Davenport Richard Baraniuk, Kevin Kelly Rice University ECE Department Digital Revolution Digital Acquisition Foundation: Shannon sampling theorem Must sample

More information

A Comparative Study of Audio Compression Based on Compressed Sensing and Sparse Fast Fourier Transform (SFFT): Performance and Challenges

A Comparative Study of Audio Compression Based on Compressed Sensing and Sparse Fast Fourier Transform (SFFT): Performance and Challenges A Comparative Study of Audio Compression Based on Compressed Sensing and Sparse Fast Fourier Transform (): Performance and Challenges Hossam M.Kasem, Maha El-Sabrouty Electronic and Communication Engineering,

More information

Digital Audio Watermarking With Discrete Wavelet Transform Using Fibonacci Numbers

Digital Audio Watermarking With Discrete Wavelet Transform Using Fibonacci Numbers Digital Audio Watermarking With Discrete Wavelet Transform Using Fibonacci Numbers P. Mohan Kumar 1, Dr. M. Sailaja 2 M. Tech scholar, Dept. of E.C.E, Jawaharlal Nehru Technological University Kakinada,

More information

EXACT SIGNAL RECOVERY FROM SPARSELY CORRUPTED MEASUREMENTS

EXACT SIGNAL RECOVERY FROM SPARSELY CORRUPTED MEASUREMENTS EXACT SIGNAL RECOVERY FROM SPARSELY CORRUPTED MEASUREMENTS THROUGH THE PURSUIT OF JUSTICE Jason Laska, Mark Davenport, Richard Baraniuk SSC 2009 Collaborators Mark Davenport Richard Baraniuk Compressive

More information

The number theory behind cryptography

The number theory behind cryptography The University of Vermont May 16, 2017 What is cryptography? Cryptography is the practice and study of techniques for secure communication in the presence of adverse third parties. What is cryptography?

More information

Unlinkability and Redundancy in Anonymous Publication Systems

Unlinkability and Redundancy in Anonymous Publication Systems Unlinkability and Redundancy in Anonymous Publication Systems Christian Boesgaard pink@diku.dk Department of Computer Science University of Copenhagen Denmark January 22, 2004 1 Introduction An anonymous

More information

Sensing via Dimensionality Reduction Structured Sparsity Models

Sensing via Dimensionality Reduction Structured Sparsity Models Sensing via Dimensionality Reduction Structured Sparsity Models Volkan Cevher volkan@rice.edu Sensors 1975-0.08MP 1957-30fps 1877 -? 1977 5hours 160MP 200,000fps 192,000Hz 30mins Digital Data Acquisition

More information

Beyond Nyquist. Joel A. Tropp. Applied and Computational Mathematics California Institute of Technology

Beyond Nyquist. Joel A. Tropp. Applied and Computational Mathematics California Institute of Technology Beyond Nyquist Joel A. Tropp Applied and Computational Mathematics California Institute of Technology jtropp@acm.caltech.edu With M. Duarte, J. Laska, R. Baraniuk (Rice DSP), D. Needell (UC-Davis), and

More information

Compressed Sensing for Multiple Access

Compressed Sensing for Multiple Access Compressed Sensing for Multiple Access Xiaodai Dong Wireless Signal Processing & Networking Workshop: Emerging Wireless Technologies, Tohoku University, Sendai, Japan Oct. 28, 2013 Outline Background Existing

More information

Enhanced Efficient Halftoning Technique used in Embedded Extended Visual Cryptography Strategy for Effective Processing

Enhanced Efficient Halftoning Technique used in Embedded Extended Visual Cryptography Strategy for Effective Processing Enhanced Efficient Halftoning Technique used in Embedded Extended Visual Cryptography Strategy for Effective Processing M.Desiha Department of Computer Science and Engineering, Jansons Institute of Technology

More information

Proceedings of Meetings on Acoustics

Proceedings of Meetings on Acoustics Proceedings of Meetings on Acoustics Volume 19, 213 http://acousticalsociety.org/ ICA 213 Montreal Montreal, Canada 2-7 June 213 Signal Processing in Acoustics Session 2pSP: Acoustic Signal Processing

More information

WAVELET-BASED COMPRESSED SPECTRUM SENSING FOR COGNITIVE RADIO WIRELESS NETWORKS. Hilmi E. Egilmez and Antonio Ortega

WAVELET-BASED COMPRESSED SPECTRUM SENSING FOR COGNITIVE RADIO WIRELESS NETWORKS. Hilmi E. Egilmez and Antonio Ortega WAVELET-BASED COPRESSED SPECTRU SENSING FOR COGNITIVE RADIO WIRELESS NETWORKS Hilmi E. Egilmez and Antonio Ortega Signal & Image Processing Institute, University of Southern California, Los Angeles, CA,

More information

Compressed Spectrum Sensing in Cognitive Radio Network Based on Measurement Matrix 1

Compressed Spectrum Sensing in Cognitive Radio Network Based on Measurement Matrix 1 Compressed Spectrum Sensing in Cognitive Radio Network Based on Measurement Matrix 1 Gh.Reza Armand, 2 Ali Shahzadi, 3 Hadi Soltanizadeh 1 Senior Student, Department of Electrical and Computer Engineering

More information

Analysis of LMS Algorithm in Wavelet Domain

Analysis of LMS Algorithm in Wavelet Domain Conference on Advances in Communication and Control Systems 2013 (CAC2S 2013) Analysis of LMS Algorithm in Wavelet Domain Pankaj Goel l, ECE Department, Birla Institute of Technology Ranchi, Jharkhand,

More information

HOW TO USE REAL-VALUED SPARSE RECOVERY ALGORITHMS FOR COMPLEX-VALUED SPARSE RECOVERY?

HOW TO USE REAL-VALUED SPARSE RECOVERY ALGORITHMS FOR COMPLEX-VALUED SPARSE RECOVERY? 20th European Signal Processing Conference (EUSIPCO 202) Bucharest, Romania, August 27-3, 202 HOW TO USE REAL-VALUED SPARSE RECOVERY ALGORITHMS FOR COMPLEX-VALUED SPARSE RECOVERY? Arsalan Sharif-Nassab,

More information

A Cost-Effective Private-Key Cryptosystem for Color Image Encryption

A Cost-Effective Private-Key Cryptosystem for Color Image Encryption A Cost-Effective Private-Key Cryptosystem for Color Image Encryption Rastislav Lukac and Konstantinos N. Plataniotis The Edward S. Rogers Sr. Dept. of Electrical and Computer Engineering, University of

More information

Compressive Sensing based Asynchronous Random Access for Wireless Networks

Compressive Sensing based Asynchronous Random Access for Wireless Networks Compressive Sensing based Asynchronous Random Access for Wireless Networks Vahid Shah-Mansouri, Suyang Duan, Ling-Hua Chang, Vincent W.S. Wong, and Jwo-Yuh Wu Department of Electrical and Computer Engineering,

More information

Discrete Mathematics & Mathematical Reasoning Multiplicative Inverses and Some Cryptography

Discrete Mathematics & Mathematical Reasoning Multiplicative Inverses and Some Cryptography Discrete Mathematics & Mathematical Reasoning Multiplicative Inverses and Some Cryptography Colin Stirling Informatics Some slides based on ones by Myrto Arapinis Colin Stirling (Informatics) Discrete

More information

Cryptanalysis of an Improved One-Way Hash Chain Self-Healing Group Key Distribution Scheme

Cryptanalysis of an Improved One-Way Hash Chain Self-Healing Group Key Distribution Scheme Cryptanalysis of an Improved One-Way Hash Chain Self-Healing Group Key Distribution Scheme Yandong Zheng 1, Hua Guo 1 1 State Key Laboratory of Software Development Environment, Beihang University Beiing

More information

A STENO HIDING USING CAMOUFLAGE BASED VISUAL CRYPTOGRAPHY SCHEME

A STENO HIDING USING CAMOUFLAGE BASED VISUAL CRYPTOGRAPHY SCHEME International Journal of Power Control Signal and Computation (IJPCSC) Vol. 2 No. 1 ISSN : 0976-268X A STENO HIDING USING CAMOUFLAGE BASED VISUAL CRYPTOGRAPHY SCHEME 1 P. Arunagiri, 2 B.Rajeswary, 3 S.Arunmozhi

More information

The Design of Compressive Sensing Filter

The Design of Compressive Sensing Filter The Design of Compressive Sensing Filter Lianlin Li, Wenji Zhang, Yin Xiang and Fang Li Institute of Electronics, Chinese Academy of Sciences, Beijing, 100190 Lianlinli1980@gmail.com Abstract: In this

More information

International Journal of Advance Engineering and Research Development IMAGE BASED STEGANOGRAPHY REVIEW OF LSB AND HASH-LSB TECHNIQUES

International Journal of Advance Engineering and Research Development IMAGE BASED STEGANOGRAPHY REVIEW OF LSB AND HASH-LSB TECHNIQUES Scientific Journal of Impact Factor (SJIF) : 3.134 ISSN (Print) : 2348-6406 ISSN (Online): 2348-4470 ed International Journal of Advance Engineering and Research Development IMAGE BASED STEGANOGRAPHY REVIEW

More information

Improved Random Demodulator for Compressed Sensing Applications

Improved Random Demodulator for Compressed Sensing Applications Purdue University Purdue e-pubs Open Access Theses Theses and Dissertations Summer 2014 Improved Random Demodulator for Compressed Sensing Applications Sathya Narayanan Hariharan Purdue University Follow

More information

Collaborative Compressive Sensing based Dynamic Spectrum Sensing and Mobile Primary User Localization in Cognitive Radio Networks

Collaborative Compressive Sensing based Dynamic Spectrum Sensing and Mobile Primary User Localization in Cognitive Radio Networks Collaborative Compressive Sensing based Dynamic Spectrum Sensing and Mobile Primary User Localization in Cognitive Radio Networks Lanchao Liu and Zhu Han ECE Department University of Houston Houston, Texas

More information

Improved Performance for Color to Gray and Back using DCT-Haar, DST-Haar, Walsh-Haar, Hartley-Haar, Slant-Haar, Kekre-Haar Hybrid Wavelet Transforms

Improved Performance for Color to Gray and Back using DCT-Haar, DST-Haar, Walsh-Haar, Hartley-Haar, Slant-Haar, Kekre-Haar Hybrid Wavelet Transforms Improved Performance for Color to Gray and Back using DCT-, DST-, Walsh-, Hartley-, Slant-, Kekre- Hybrid Wavelet Transforms H. B. Kekre 1, Sudeep D. Thepade 2, Ratnesh N. Chaturvedi 3 Abstract The paper

More information

Analysis of Secure Text Embedding using Steganography

Analysis of Secure Text Embedding using Steganography Analysis of Secure Text Embedding using Steganography Rupinder Kaur Department of Computer Science and Engineering BBSBEC, Fatehgarh Sahib, Punjab, India Deepak Aggarwal Department of Computer Science

More information

Commutative reversible data hiding and encryption

Commutative reversible data hiding and encryption SECURITY AND COMMUNICATION NETWORKS Security Comm. Networks 3; 6:396 43 Published online March 3 in Wiley Online Library (wileyonlinelibrary.com)..74 RESEARCH ARTICLE Xinpeng Zhang* School of Communication

More information

An Implementation of LSB Steganography Using DWT Technique

An Implementation of LSB Steganography Using DWT Technique An Implementation of LSB Steganography Using DWT Technique G. Raj Kumar, M. Maruthi Prasada Reddy, T. Lalith Kumar Electronics & Communication Engineering #,JNTU A University Electronics & Communication

More information

CARRY SAVE COMMON MULTIPLICAND MONTGOMERY FOR RSA CRYPTOSYSTEM

CARRY SAVE COMMON MULTIPLICAND MONTGOMERY FOR RSA CRYPTOSYSTEM American Journal of Applied Sciences 11 (5): 851-856, 2014 ISSN: 1546-9239 2014 Science Publication doi:10.3844/ajassp.2014.851.856 Published Online 11 (5) 2014 (http://www.thescipub.com/ajas.toc) CARRY

More information

A Low Power 900MHz Superheterodyne Compressive Sensing Receiver for Sparse Frequency Signal Detection

A Low Power 900MHz Superheterodyne Compressive Sensing Receiver for Sparse Frequency Signal Detection A Low Power 900MHz Superheterodyne Compressive Sensing Receiver for Sparse Frequency Signal Detection Hamid Nejati and Mahmood Barangi 4/14/2010 Outline Introduction System level block diagram Compressive

More information

Detection Performance of Compressively Sampled Radar Signals

Detection Performance of Compressively Sampled Radar Signals Detection Performance of Compressively Sampled Radar Signals Bruce Pollock and Nathan A. Goodman Department of Electrical and Computer Engineering The University of Arizona Tucson, Arizona brpolloc@email.arizona.edu;

More information

COMPRESSIVE SENSING FOR THROUGH WALL RADAR IMAGING OF STATIONARY SCENES USING ARBITRARY DATA MEASUREMENTS

COMPRESSIVE SENSING FOR THROUGH WALL RADAR IMAGING OF STATIONARY SCENES USING ARBITRARY DATA MEASUREMENTS COMPRESSIVE SENSING FOR THROUGH WALL RADAR IMAGING OF STATIONARY SCENES USING ARBITRARY DATA MEASUREMENTS Eva Lagunas 1, Moeness G. Amin, Fauzia Ahmad, and Montse Nájar 1 1 Universitat Politècnica de Catalunya

More information

Secure Localization Using Elliptic Curve Cryptography in Wireless Sensor Networks

Secure Localization Using Elliptic Curve Cryptography in Wireless Sensor Networks IJCSNS International Journal of Computer Science and Network Security, VOL. No.6, June 55 Secure Localization Using Elliptic Curve Cryptography in Wireless Sensor Networks Summary The crucial problem in

More information

Video, Image and Data Compression by using Discrete Anamorphic Stretch Transform

Video, Image and Data Compression by using Discrete Anamorphic Stretch Transform ISSN: 49 8958, Volume-5 Issue-3, February 06 Video, Image and Data Compression by using Discrete Anamorphic Stretch Transform Hari Hara P Kumar M Abstract we have a compression technology which is used

More information

INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY

INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY A PATH FOR HORIZING YOUR INNOVATIVE WORK VISUAL CRYPTOGRAPHY FOR IMAGES MS. SHRADDHA SUBHASH GUPTA 1, DR. H. R. DESHMUKH

More information

FPGA implementation of DWT for Audio Watermarking Application

FPGA implementation of DWT for Audio Watermarking Application FPGA implementation of DWT for Audio Watermarking Application Naveen.S.Hampannavar 1, Sajeevan Joseph 2, C.B.Bidhul 3, Arunachalam V 4 1, 2, 3 M.Tech VLSI Students, 4 Assistant Professor Selection Grade

More information

A Novel Image Steganography Based on Contourlet Transform and Hill Cipher

A Novel Image Steganography Based on Contourlet Transform and Hill Cipher Journal of Information Hiding and Multimedia Signal Processing c 2015 ISSN 2073-4212 Ubiquitous International Volume 6, Number 5, September 2015 A Novel Image Steganography Based on Contourlet Transform

More information

FIR Filter Design by Frequency Sampling or Interpolation *

FIR Filter Design by Frequency Sampling or Interpolation * OpenStax-CX module: m689 FIR Filter Design by Frequency Sampling or Interpolation * C. Sidney Burrus This work is produced by OpenStax-CX and licensed under the Creative Commons Attribution License 2.

More information

A New Chaotic Secure Communication System

A New Chaotic Secure Communication System 1306 IEEE TRANSACTIONS ON COMMUNICATIONS, VOL 51, NO 8, AUGUST 2003 A New Chaotic Secure Communication System Zhengguo Li, Kun Li, Changyun Wen, and Yeng Chai Soh Abstract This paper proposes a digital

More information

Meta-data based secret image sharing application for different sized biomedical

Meta-data based secret image sharing application for different sized biomedical Biomedical Research 2018; Special Issue: S394-S398 ISSN 0970-938X www.biomedres.info Meta-data based secret image sharing application for different sized biomedical images. Arunkumar S 1*, Subramaniyaswamy

More information

Performance Enhancement of the RSA Algorithm by Optimize Partial Product of Booth Multiplier

Performance Enhancement of the RSA Algorithm by Optimize Partial Product of Booth Multiplier International Journal of Electronics Engineering Research. ISSN 0975-6450 Volume 9, Number 8 (2017) pp. 1329-1338 Research India Publications http://www.ripublication.com Performance Enhancement of the

More information

Course Developer: Ranjan Bose, IIT Delhi

Course Developer: Ranjan Bose, IIT Delhi Course Title: Coding Theory Course Developer: Ranjan Bose, IIT Delhi Part I Information Theory and Source Coding 1. Source Coding 1.1. Introduction to Information Theory 1.2. Uncertainty and Information

More information

MC CDMA PAPR Reduction Using Discrete Logarithmic Method

MC CDMA PAPR Reduction Using Discrete Logarithmic Method International Journal of Engineering Research and Development ISSN: 2278-067X, Volume 1, Issue 4 (June 2012), PP.38-43 www.ijerd.com MC CDMA PAPR Reduction Using Discrete Logarithmic Method B.Sarala 1,

More information

Low order anti-aliasing filters for sparse signals in embedded applications

Low order anti-aliasing filters for sparse signals in embedded applications Sādhanā Vol. 38, Part 3, June 2013, pp. 397 405. c Indian Academy of Sciences Low order anti-aliasing filters for sparse signals in embedded applications J V SATYANARAYANA and A G RAMAKRISHNAN Department

More information

Performance Analysis of Threshold Based Compressive Sensing Algorithm in Wireless Sensor Network

Performance Analysis of Threshold Based Compressive Sensing Algorithm in Wireless Sensor Network American Journal of Applied Sciences Original Research Paper Performance Analysis of Threshold Based Compressive Sensing Algorithm in Wireless Sensor Network Parnasree Chakraborty and C. Tharini Department

More information

Keywords: dynamic P-Box and S-box, modular calculations, prime numbers, key encryption, code breaking.

Keywords: dynamic P-Box and S-box, modular calculations, prime numbers, key encryption, code breaking. INTRODUCING DYNAMIC P-BOX AND S-BOX BASED ON MODULAR CALCULATION AND KEY ENCRYPTION FOR ADDING TO CURRENT CRYPTOGRAPHIC SYSTEMS AGAINST THE LINEAR AND DIFFERENTIAL CRYPTANALYSIS M. Zobeiri and B. Mazloom-Nezhad

More information

FPGA implementation of LSB Steganography method

FPGA implementation of LSB Steganography method FPGA implementation of LSB Steganography method Pangavhane S.M. 1 &Punde S.S. 2 1,2 (E&TC Engg. Dept.,S.I.E.RAgaskhind, SPP Univ., Pune(MS), India) Abstract : "Steganography is a Greek origin word which

More information

Number Theory and Security in the Digital Age

Number Theory and Security in the Digital Age Number Theory and Security in the Digital Age Lola Thompson Ross Program July 21, 2010 Lola Thompson (Ross Program) Number Theory and Security in the Digital Age July 21, 2010 1 / 37 Introduction I have

More information

Super-Resolution and Reconstruction of Sparse Sub-Wavelength Images

Super-Resolution and Reconstruction of Sparse Sub-Wavelength Images Super-Resolution and Reconstruction of Sparse Sub-Wavelength Images Snir Gazit, 1 Alexander Szameit, 1 Yonina C. Eldar, 2 and Mordechai Segev 1 1. Department of Physics and Solid State Institute, Technion,

More information

Signal Recovery from Random Measurements

Signal Recovery from Random Measurements Signal Recovery from Random Measurements Joel A. Tropp Anna C. Gilbert {jtropp annacg}@umich.edu Department of Mathematics The University of Michigan 1 The Signal Recovery Problem Let s be an m-sparse

More information

New Modeling of Metal Oxide Surge Arresters

New Modeling of Metal Oxide Surge Arresters Signal Processing and Renewable Energy September 2017, (pp.27-37) ISSN: 2588-7327 New Modeling of Metal Oxide Surge Arresters Seyed Mohammad Hassan Hosseini 1 *, Younes Gharadaghi 1 1 Electrical Engineering

More information

International Journal of Advance Research in Computer Science and Management Studies

International Journal of Advance Research in Computer Science and Management Studies Volume 3, Issue 2, February 2015 ISSN: 2321 7782 (Online) International Journal of Advance Research in Computer Science and Management Studies Research Article / Survey Paper / Case Study Available online

More information

Design of FIR Filter Using Modified Montgomery Multiplier with Pipelining Technique

Design of FIR Filter Using Modified Montgomery Multiplier with Pipelining Technique International Journal of Engineering Research and Development e-issn: 2278-067X, p-issn: 2278-800X, www.ijerd.com Volume 10, Issue 3 (March 2014), PP.55-63 Design of FIR Filter Using Modified Montgomery

More information

Summary of the PhD Thesis

Summary of the PhD Thesis Summary of the PhD Thesis Contributions to LTE Implementation Author: Jamal MOUNTASSIR 1. Introduction The evolution of wireless networks process is an ongoing phenomenon. There is always a need for high

More information

THE STATISTICAL ANALYSIS OF AUDIO WATERMARKING USING THE DISCRETE WAVELETS TRANSFORM AND SINGULAR VALUE DECOMPOSITION

THE STATISTICAL ANALYSIS OF AUDIO WATERMARKING USING THE DISCRETE WAVELETS TRANSFORM AND SINGULAR VALUE DECOMPOSITION THE STATISTICAL ANALYSIS OF AUDIO WATERMARKING USING THE DISCRETE WAVELETS TRANSFORM AND SINGULAR VALUE DECOMPOSITION Mr. Jaykumar. S. Dhage Assistant Professor, Department of Computer Science & Engineering

More information

Journal of mathematics and computer science 11 (2014),

Journal of mathematics and computer science 11 (2014), Journal of mathematics and computer science 11 (2014), 137-146 Application of Unsharp Mask in Augmenting the Quality of Extracted Watermark in Spatial Domain Watermarking Saeed Amirgholipour 1 *,Ahmad

More information

High capacity robust audio watermarking scheme based on DWT transform

High capacity robust audio watermarking scheme based on DWT transform High capacity robust audio watermarking scheme based on DWT transform Davod Zangene * (Sama technical and vocational training college, Islamic Azad University, Mahshahr Branch, Mahshahr, Iran) davodzangene@mail.com

More information

Compressed RF Tomography for Wireless Sensor Networks: Centralized and Decentralized Approaches

Compressed RF Tomography for Wireless Sensor Networks: Centralized and Decentralized Approaches Compressed RF Tomography for Wireless Sensor Networks: Centralized and Decentralized Approaches Mohammad A. Kanso and Michael G. Rabbat Department of Electrical and Computer Engineering McGill University

More information

Modular Multiplication Algorithm in Cryptographic Processor: A Review and Future Directions

Modular Multiplication Algorithm in Cryptographic Processor: A Review and Future Directions Modular Multiplication Algorithm in Cryptographic Processor: A Review and Future Directions Poomagal C. T Research Scholar, Department of Electronics and Communication Engineering, Sri Venkateswara College

More information

Audio Compression using the MLT and SPIHT

Audio Compression using the MLT and SPIHT Audio Compression using the MLT and SPIHT Mohammed Raad, Alfred Mertins and Ian Burnett School of Electrical, Computer and Telecommunications Engineering University Of Wollongong Northfields Ave Wollongong

More information

A Low Power 900MHz Superheterodyne Compressive Sensing Receiver for Sparse Frequency Signal Detection

A Low Power 900MHz Superheterodyne Compressive Sensing Receiver for Sparse Frequency Signal Detection A Low Power 900MHz Superheterodyne Compressive Sensing Receiver for Sparse Frequency Signal etection Hamid Nejati and Mahmood Barangi EECS department, University of Michigan, Ann Arbor {hnejati,barangi}@umich.edu

More information

Available online at ScienceDirect. Procedia Computer Science 34 (2014 )

Available online at  ScienceDirect. Procedia Computer Science 34 (2014 ) Available online at www.sciencedirect.com ScienceDirect Procedia Computer Science 34 (2014 ) 639 646 International Symposium on Emerging Inter-networks, Communication and Mobility (EICM 2014) A Tiny RSA

More information

Power Allocation and Measurement Matrix Design for Block CS-Based Distributed MIMO Radars

Power Allocation and Measurement Matrix Design for Block CS-Based Distributed MIMO Radars Power Allocation and Measurement Matrix Design for Block CS-Based Distributed MIMO Radars Azra Abtahi, M. Modarres-Hashemi, Farokh Marvasti, and Foroogh S. Tabataba Abstract Multiple-input multiple-output

More information

Open Access Research of Dielectric Loss Measurement with Sparse Representation

Open Access Research of Dielectric Loss Measurement with Sparse Representation Send Orders for Reprints to reprints@benthamscience.ae 698 The Open Automation and Control Systems Journal, 2, 7, 698-73 Open Access Research of Dielectric Loss Measurement with Sparse Representation Zheng

More information

New binary image encryption algorithm based on combination of confusion and diffusion

New binary image encryption algorithm based on combination of confusion and diffusion Available online www.jocpr.com Journal of Chemical and Pharmaceutical Research, 2014, 6(7):621-629 Research Article ISSN : 0975-7384 CODEN(USA) : JCPRC5 New binary image encryption algorithm based on combination

More information

Study of Perfect Shuffle for Image Scrambling

Study of Perfect Shuffle for Image Scrambling International Journal of Scientific and Research Publications, Volume 4, Issue 2, February 2014 1 Study of Perfect Shuffle for Image Scrambling H.B.Kekre*, Tanuja Sarode**, Pallavi N.Halarnkar** *Computer

More information

Keywords Arnold transforms; chaotic logistic mapping; discrete wavelet transform; encryption; mean error.

Keywords Arnold transforms; chaotic logistic mapping; discrete wavelet transform; encryption; mean error. Volume 5, Issue 2, February 2015 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com An Entropy

More information

Applications of sparse approximation in communications

Applications of sparse approximation in communications Applications of sparse approximation in communications A. C. Gilbert Department of Mathematics University of Michigan Ann Arbor, MI 48109 Email: annacg@umich.edu J. A. Tropp Department of Mathematics University

More information

Mathematics Explorers Club Fall 2012 Number Theory and Cryptography

Mathematics Explorers Club Fall 2012 Number Theory and Cryptography Mathematics Explorers Club Fall 2012 Number Theory and Cryptography Chapter 0: Introduction Number Theory enjoys a very long history in short, number theory is a study of integers. Mathematicians over

More information

An Enhanced Least Significant Bit Steganography Technique

An Enhanced Least Significant Bit Steganography Technique An Enhanced Least Significant Bit Steganography Technique Mohit Abstract - Message transmission through internet as medium, is becoming increasingly popular. Hence issues like information security are

More information

Energy-Effective Communication Based on Compressed Sensing

Energy-Effective Communication Based on Compressed Sensing American Journal of etworks and Communications 2016; 5(6): 121-127 http://www.sciencepublishinggroup.com//anc doi: 10.11648/.anc.20160506.11 ISS: 2326-893X (Print); ISS: 2326-8964 (Online) Energy-Effective

More information

Triple-DES Block of 96 Bits: An Application to. Colour Image Encryption

Triple-DES Block of 96 Bits: An Application to. Colour Image Encryption Applied Mathematical Sciences, Vol. 7, 2013, no. 23, 1143-1155 HIKARI Ltd, www.m-hikari.com Triple-DES Block of 96 Bits: An Application to Colour Image Encryption V. M. Silva-García Instituto politécnico

More information

Introduction to Wavelets. For sensor data processing

Introduction to Wavelets. For sensor data processing Introduction to Wavelets For sensor data processing List of topics Why transform? Why wavelets? Wavelets like basis components. Wavelets examples. Fast wavelet transform. Wavelets like filter. Wavelets

More information

LENSLESS IMAGING BY COMPRESSIVE SENSING

LENSLESS IMAGING BY COMPRESSIVE SENSING LENSLESS IMAGING BY COMPRESSIVE SENSING Gang Huang, Hong Jiang, Kim Matthews and Paul Wilford Bell Labs, Alcatel-Lucent, Murray Hill, NJ 07974 ABSTRACT In this paper, we propose a lensless compressive

More information

The Discrete Fourier Transform. Claudia Feregrino-Uribe, Alicia Morales-Reyes Original material: Dr. René Cumplido

The Discrete Fourier Transform. Claudia Feregrino-Uribe, Alicia Morales-Reyes Original material: Dr. René Cumplido The Discrete Fourier Transform Claudia Feregrino-Uribe, Alicia Morales-Reyes Original material: Dr. René Cumplido CCC-INAOE Autumn 2015 The Discrete Fourier Transform Fourier analysis is a family of mathematical

More information

Power Allocation and Measurement Matrix Design for Block CS-Based Distributed MIMO Radars

Power Allocation and Measurement Matrix Design for Block CS-Based Distributed MIMO Radars Power Allocation and Measurement Matrix Design for Block CS-Based Distributed MIMO Radars Azra Abtahi, Mahmoud Modarres-Hashemi, Farokh Marvasti, and Foroogh S. Tabataba Abstract Multiple-input multiple-output

More information

A Fast Image Encryption Scheme based on Chaotic Standard Map

A Fast Image Encryption Scheme based on Chaotic Standard Map A Fast Image Encryption Scheme based on Chaotic Standard Map Kwok-Wo Wong, Bernie Sin-Hung Kwok, and Wing-Shing Law Department of Electronic Engineering, City University of Hong Kong, 83 Tat Chee Avenue,

More information

Compressed Meter Reading for Delay-sensitive and Secure Load Report in Smart Grid

Compressed Meter Reading for Delay-sensitive and Secure Load Report in Smart Grid Compressed Meter Reading for Delay-sensitive Secure Load Report in Smart Grid Husheng Li, Rukun Mao, Lifeng Lai Robert. C. Qiu Abstract It is a key task in smart grid to send the readings of smart meters

More information

A New Representation of Image Through Numbering Pixel Combinations

A New Representation of Image Through Numbering Pixel Combinations A New Representation of Image Through Numbering Pixel Combinations J. Said 1, R. Souissi, H. Hamam 1 1 Faculty of Engineering Moncton, NB Canada ISET-Sfax Tunisia Habib.Hamam@umoncton.ca ABSTRACT: A new

More information

Volume 2, Issue 9, September 2014 International Journal of Advance Research in Computer Science and Management Studies

Volume 2, Issue 9, September 2014 International Journal of Advance Research in Computer Science and Management Studies Volume 2, Issue 9, September 2014 International Journal of Advance Research in Computer Science and Management Studies Research Article / Survey Paper / Case Study Available online at: www.ijarcsms.com

More information

Image Denoising Using Complex Framelets

Image Denoising Using Complex Framelets Image Denoising Using Complex Framelets 1 N. Gayathri, 2 A. Hazarathaiah. 1 PG Student, Dept. of ECE, S V Engineering College for Women, AP, India. 2 Professor & Head, Dept. of ECE, S V Engineering College

More information

Simultaneous Encryption/Compression of Images Using Alpha Rooting

Simultaneous Encryption/Compression of Images Using Alpha Rooting Simultaneous Encryption/Compression of Images Using Alpha Rooting Eric Wharton 1, Karen Panetta 1, and Sos Agaian 2 1 Tufts University, Dept. of Electrical and Computer Eng., Medford, MA 02155 2 The University

More information

Clipping Noise Cancellation Based on Compressed Sensing for Visible Light Communication

Clipping Noise Cancellation Based on Compressed Sensing for Visible Light Communication Clipping Noise Cancellation Based on Compressed Sensing for Visible Light Communication Presented by Jian Song jsong@tsinghua.edu.cn Tsinghua University, China 1 Contents 1 Technical Background 2 System

More information

A BIST Circuit for Fault Detection Using Recursive Pseudo- Exhaustive Two Pattern Generator

A BIST Circuit for Fault Detection Using Recursive Pseudo- Exhaustive Two Pattern Generator Vol.2, Issue.3, May-June 22 pp-676-681 ISSN 2249-6645 A BIST Circuit for Fault Detection Using Recursive Pseudo- Exhaustive Two Pattern Generator K. Nivitha 1, Anita Titus 2 1 ME-VLSI Design 2 Dept of

More information

TRANSFORMS / WAVELETS

TRANSFORMS / WAVELETS RANSFORMS / WAVELES ransform Analysis Signal processing using a transform analysis for calculations is a technique used to simplify or accelerate problem solution. For example, instead of dividing two

More information

Wideband Speech Encryption Based Arnold Cat Map for AMR-WB G Codec

Wideband Speech Encryption Based Arnold Cat Map for AMR-WB G Codec Wideband Speech Encryption Based Arnold Cat Map for AMR-WB G.722.2 Codec Fatiha Merazka Telecommunications Department USTHB, University of science & technology Houari Boumediene P.O.Box 32 El Alia 6 Bab

More information

A New Compression Method for Encrypted Images

A New Compression Method for Encrypted Images Technology, Volume-2, Issue-2, March-April, 2014, pp. 15-19 IASTER 2014, www.iaster.com Online: 2347-5099, Print: 2348-0009 ABSTRACT A New Compression Method for Encrypted Images S. Manimurugan, Naveen

More information

INDOOR POSITIONING IN WIRELESS LANS USING COMPRESSIVE SENSING SIGNAL-STRENGTH FINGERPRINTS

INDOOR POSITIONING IN WIRELESS LANS USING COMPRESSIVE SENSING SIGNAL-STRENGTH FINGERPRINTS INDOOR POSITIONING IN WIRELESS LANS USING COMPRESSIVE SENSING SIGNAL-STRENGTH FINGERPRINTS Dimitris Milioris,3,4, George Tzagkarakis 5, Philippe Jacquet 4 and Panagiotis Tsakalides, Department of Computer

More information

Democracy in Action. Quantization, Saturation, and Compressive Sensing!"#$%&'"#("

Democracy in Action. Quantization, Saturation, and Compressive Sensing!#$%&'#( Democracy in Action Quantization, Saturation, and Compressive Sensing!"#$%&'"#(" Collaborators Petros Boufounos )"*(&+",-%.$*/ 0123"*4&5"*"%16( Background If we could first know where we are, and whither

More information

Performance analysis of Compressive Modulation scheme in Digital Communication

Performance analysis of Compressive Modulation scheme in Digital Communication IOSR Journal of Electronics and Communication Engineering (IOSR-JECE) e-issn: 78-834,p- ISSN: 78-8735.Volume 9, Issue 5, Ver. 1 (Sep - Oct. 014), PP 58-64 Performance analysis of Compressive Modulation

More information

Compressive Sensing Based Detection Strategy For Multiple Access Spatial Modulation Channel

Compressive Sensing Based Detection Strategy For Multiple Access Spatial Modulation Channel Compressive Sensing Based Detection Strategy For Multiple Access Spatial Modulation Channel Pooja Chandankhede, Dr. Manish Sharma ME Student, Dept. of E&TC, DYPCOE, Savitribai Phule Pune University, Akurdi,

More information

International Journal of Digital Application & Contemporary research Website: (Volume 1, Issue 7, February 2013)

International Journal of Digital Application & Contemporary research Website:   (Volume 1, Issue 7, February 2013) Performance Analysis of OFDM under DWT, DCT based Image Processing Anshul Soni soni.anshulec14@gmail.com Ashok Chandra Tiwari Abstract In this paper, the performance of conventional discrete cosine transform

More information

Chaos Encryption Method Based on Large Signal Modulation in Additive Nonlinear Discrete-Time Systems

Chaos Encryption Method Based on Large Signal Modulation in Additive Nonlinear Discrete-Time Systems Proc. of the 5th WSEAS Int. Conf. on on-linear Analysis, on-linear Systems and Chaos, Bucharest, Romania, October 6-8, 26 98 Chaos Encryption Method Based on Large Signal Modulation in Additive onlinear

More information