SIMULTANEOUS COMPRESSIVE SENSING AND OPTICAL ENCRYPTION OF SIGNALS AND IMAGES
|
|
- Stewart Franklin
- 5 years ago
- Views:
Transcription
1 SIMULTANEOUS COMPRESSIVE SENSING AND OPTICAL ENCRYPTION OF SIGNALS AND IMAGES Dr. Ertan Atar Türk Telekom İstanbul-I Area Offices İstanbul, Turkey Prof. Dr. Okan K. Ersoy Scool of Electrical &Computer Engineering, Purdue University Indiana, USA and Bogazici University, Electrical and Electronic Engineering Department, İstanbul, Turkey Assist. Prof. Dr. Lale Özyılmaz Electronics&Com. Eng. Dept. Yıldız Technical University İstanbul, Turkey
2 CONTENTS Abstract I. Introduction II. Compressive Sensing Orthogonal Matching Pursuit III. Cryptography IV. Details of Implementation and Methods V. Experimental Results VI. Conclusions References
3 ABSTRACT Compressive Sensing (CS) makes it possible to reduce the amount of data and thereby to greatly simplify the sensor system. In this method, data is compressed before measurements whereas data is first measured and then compressed in the current technology. This approach leads to reducing the number of sensors. In this study, simultaneous compressive sensing and optical cryptography is developed as a new approach for encryption and decryption of signals and images.
4 ABSTRACT CS is carried out with the Orthogonal Matching Pursuit (OMP) algorithm. The CS-OMP algorithm is next combined with the Double Random Phase/Amplitude Encyrption (DRPAE) method to achieve both compression and encyrption of data. In order to achieve high security, the keys used in CS and DRPAE are transmitted to the receiver by the asymmetric RSA cryptography method.
5 ABSTRACT Thus, the overall cryptographic system is a hybrid optical system (both symmetric and asymmetric) since DRPAE is a symmetric optical encyrption method. In this approach, data size is decreased and use of detection matrix in CS also protects DRPAE optical keys against well-known attacks. Experimental results both with 1-D signals and images are presented.
6 The signal is transformed by a measurement matrix to another space and measured in compressed form, the measurement matrix must be such that the original signal can be recovered without loss. I. INTRODUCTION According to classical signal processing methods, when the signal is sampled, Nyquist criteria must be satisfied to avoid loss of information. After sampling, if the signal is compressible, the signal is further compressed typically by a transform method. In the CS method, the signal is supposed to be sparse in the sense that most signal values are assumed to be negligible (zero).
7 I. INTRODUCTION
8 I. INTRODUCTION Several advantages of compression detection are given below: Reducing the number of sensors, thereby transferring more information with fewer examples. Reducing the data loading process which is especially costly in image processing. Reduced power consumption and hardware complexity.
9 I. INTRODUCTION Cryptography involves encryption and decryption of information. The mathematical methods for security of information, data integrity and identity validation are significant topics of cryptography. In this study, we propose a method for simultaneous compressive sensing, encyrption and decryption of signals and images using orthogonal matching pursuit and optical cryptography.
10 II. COMPRESSIVE SENSING ORTHOGONAL MATCHING PURSUIT Orthogonal Matching Pursuit (OMP) is an iterative method to recover the nonzero elements of a sparse signal from the measured signal. If the length m of the measurement vector is larger than k, the number of nonzero elements of the sparse signal, the sparse signal can be recovered by OMP with a very large probability.
11 II. COMPRESSIVE SENSING ORTHOGONAL MATCHING PURSUIT
12 II. COMPRESSIVE SENSING ORTHOGONAL MATCHING PURSUIT In the OMP program, the detection matrix was generated by using one of a set of fast transforms, namely, Fast Fourier transform (FFT), Discrete Cosine Transform (DCT), Real Sinesoidal Transform (RST), Haar wavelet transform, Hadamard transform, Discrete Sine Transform (DST) and Discrete Cosine-III Transform (DC3T). In the experiments discussed in Section 5, the ranking of transforms in terms of accuracy of results were DC3T, DCT, FFT, RST, DST, Hadamard and Haar. In addition, DC3T has fewer number of multiplications than DCT.
13 III. CRYPTOGRAPHY Cryptography refers to the methods of encryption and decryption of information. Cryptoanalysis involves methods to investigate the strengths and weaknesses of cryptographic systems. A cryptosystem involves five elements: P=Plaintext K=Key E=Encryption C=Ciphertext D=Decryption
14 III. CRYPTOGRAPHY
15 III. CRYPTOGRAPHY Symmetric encryption algorithms use the same key for encryption and decryption operations. Symmetric encryption is very fast and easy to implement in electronic devices. In asymmetric encryption, one general key is used for encryption, and another special key is used for decryption. Asymmetric encryption algorithms are usually developed with very large prime numbers. In the proposed method, the RSA algorithm was used for asymmetric encryption of the keys.
16 III. CRYPTOGRAPHY
17 RSA; III. CRYPTOGRAPHY
18 III. CRYPTOGRAPHY Using asymmetric and symmetric encryptions together is named hybrid cryptography. Hybrid cryptography increases the advantages and decreases the disadvantages of the asymmetric and symmetric encryptions.
19 IV. DETAILS OF IMPLEMENTION AND METHODS Simultaneous Compressive Sensing and Hybrid Optical Cryptography (SCOSC) is proposed for effective and efficient compression and secure transmission of signals and images. In this work, CS is achieved with the orthogonal matching pursuit (OMP) algorithm. Then, the CS-OMP algorithm is combined with the double random phase plus amplitude encyrption (DRPAE) method to achieve both compression and encyrption of data.
20 IV. DETAILS OF IMPLEMENTION AND METHODS In order to achieve high security, the keys used in CS and DRPAE are transmitted to the receiver by an asymmetric cryptography method (currently the RSA method). Thus, the overall cryptographic system is a hybrid optical system (both symmetric and asymmetric) since DRPAE is a symmetric optical encryption method. In this approach, data size is decreased, and use of detection matrix in CS also improves DRPAE optical keys against attacks.
21 IV. DETAILS OF IMPLEMENTION AND METHODS
22 IV. DETAILS OF IMPLEMENTION AND METHODS
23 IV. DETAILS OF IMPLEMENTION AND METHODS Next the sparse signal per block is generated with length M satisfying M K* log(n) by keeping M largest elements in magnitude and zeroing the others. The detection matrix is generated by pre and post multiplying a fast transform matrix with random permutation matrices. The SCOSC method is applied per block of information.
24 IV. DETAILS OF IMPLEMENTION AND METHODS The optical phase/amplitude keys p1 and p2 are generated with random complex numbers. The phase covers 360 degrees. This is repeated once more for a 4-f optical encryption system for additional security. The resulting encrypted signal with the overall system is of smaller size than the original signal.
25 V. EXPERIMENTAL RESULTS
26 V. EXPERIMENTAL RESULTS
27 V. EXPERIMENTAL RESULTS
28 V. EXPERIMENTAL RESULTS
29 V. EXPERIMENTAL RESULTS Phase recovery and dirac delta function methods were studied for cryptoanalysis of the proposed method. Phase recovery methods are not effective when the keys of the 4f system are phase/amplitude keys. The dirac delta function method is effective in recovering the complete encryption matrix, but this is not usable for decryption since OMP requires the measurement matrix which is not available.
30 VI. CONCLUSIONS In this study, a method for simultaneous compressive sensing using OMP and optical cryptography using double random phase/amplitude keys was proposed. The RSA algorithm involving asymmetric cryptography was used to encrypt/decrypt the keys.
31 VI. CONSLUSIONS The phase/amplitude keys were used in a 4f optical cryptography system. The measurement matrix for the OMP algorithm was also constructed using Fourier related fast transforms such as Discrete Fourier Transform (DFT), Discrete Cosine Transform (DCT), Real Sinusoidal Transform (RST), Haar wavelet transform, Hadamard transform, Discrete Sine Transform (DST) and Discrete Cosine-III Transform (DC3T) together with random permutation matrices.
32 VI. CONCLUSIONS The experimental results with encryption/decryption of 1-D audio signals and 2-D images showed that the method is capable of high accuracy encryption and decryption with correct keys. It was not possible to achieve correct decryption with 1-D and 2-D input signals when the keys were wrong. Cryptoanalysis studies with phase recovery and dirac delta function methods showed that the proposed method is extremely difficult to attack.
33 [1] E. J. Candes, Compressive sampling, International Congress of Mathematicians (ICM), vol. 3, pp , Madrid, Spain. [2] Mathematical Introduction to Compressive Sensing,, 2013, Simon Foucart, Holger Rauhut, Springer New York Heidelberg Dordrecht London, ISBN [3] [4] A. Gilbert and P. Indyk, Sparse recovery using sparse matrices, Proceedings of the IEEE, Vol. 98, No. 6, pp , [5] Donoho D., Compressed Sensing, IEEE Tran. Information Theory, 52(4), pp , April [6] C. E. Shannon, Communication in the Presence of Noise, Proc. Institute of Radio Engineers, Vol. 37, pp , [7] REFERENCES [8] Baraniuk R., Compressive sensing, IEEE Signal Processing Magazine, 24(4), pp , July 2007.
34 REFERENCES [9] D. Baron, M. B. Wakin, M. F. Duarte, S. Sarvotham, and R. G. Baraniuk, Distributed Compressed Sensing, Tech. Rep. TREE-0612, Rice University, Department of Electrical and Computer Engineering, [10] Amir M. A. and Esther R., Compressive Sensing: From Compressing while Sampling to Compressing and Securing while Sampling", 32nd Annual International Conference of the IEEE EMBS, Buenos Aires, Argentina, August 31 - September 4, [11] Minal C. and Rajankar S., Study the Effects of Encryption on Compressive Sensed Data, International Journal of Engineering and Advanced Technology (IJEAT) ISSN: , Volume-2, Issue-5, June [12] Rachlin Y. and Baron D., The Secrecy of Compressed Sensing Measurements, Communication, Control, and Computing, th Annual Allerton Conference, , Urbana-Champaign, IL. [13] C. Dwork, F. McSherry, and K. Talwar, The Price of Privacy and the Limits of LP Decoding, Symp. on Theory of Computing (STOC), June 2007.
35 REFERENCES [14] Orsdemir A, Altun HO, Sharma G., et al., On the Security and Robustness of Encryption via Compressed Sensing, Proceedings of the IEEE military communications conference MILCOM, [15] Ramezani M. ; Seyfe, B. ; Bafghi, H.G., Perfect Secrecy via Compressed Sensing, Communication and Information Theory (IWCIT), Iran Workshop on, 8-9 May 2013, Tehran, 1-5, [16] Zhang Y., Wong K., Xiao D., Zhang L.Y., Li M., Embedding Cryptographic Features in Compressive Sensing, Cryptography and Security, Information Theory,arXiv: [17] Zhang X.; Ren Y. ; Feng G.; Qian Z., Compressing Encrypted Image Using Compressive Sensing, Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP), 2011 Seventh International Conference, , Dalian, Oct [18] Yan Mo, Aidi Zhang, Fen Zheng, Nanrun Zhou, An Image Compression-Encryption Algorithm Based on 2-D Compressive Sensing, Journal of Computational Information Systems 9: 24, , [19] Donoho, D., Chen, S. and Saunders, M., Atomic Decomposition by Basis Pursuit, SIAM Journal on Scientific Computing, Vol. 20 p.33-61, 1998.
36 REFERENCES [20] Tropp, J. and Gilbert, A.C. Signal Recovery from Partial Information via Orthogonal Matching Pursuit, IEEE Trans. Inform. Theory, Vol. 53, No. 12, p , [21] K. Ersoy, O. and Nouira, A., Image Coding With The Discrete Cosine-III Transform, IEEE Journal On Selected Areas In Communıcations, Vol. 10. No. 5, June [22] B. Schneier, Applied Cryptography - Protocols, Algorithms, and Source code in C, John Wiley & Sons, Inc., 2nd edition, [23]Washington, L. C., 2003.Elliptic Curves, Number Theory and Cryptography, Chapman&Hall/Crc. [24] Menezes, A. J., Handbook of Applied Cryptography, Boca Raton: CRC Press, [25] Rivest, R., Shamir A. ve Adleman, L., A Method for Obtaining Digital Signatures and Public-Key Cryptosystems, Communications of the ACM, 21 (2), , 1978.
37 Dr. Ertan Atar Türk Telekom İstanbul-I Area Offices İstanbul, Turkey Prof. Dr. Okan K. Ersoy Electric&Computer Eng. Dept. Purdue University Indiana, USA Assist. Prof. Dr. Lale Özyılmaz Electronics&Com. Eng. Dept. Yıldız Technical University İstanbul, Turkey
Effects of Basis-mismatch in Compressive Sampling of Continuous Sinusoidal Signals
Effects of Basis-mismatch in Compressive Sampling of Continuous Sinusoidal Signals Daniel H. Chae, Parastoo Sadeghi, and Rodney A. Kennedy Research School of Information Sciences and Engineering The Australian
More informationAn Introduction to Compressive Sensing and its Applications
International Journal of Scientific and Research Publications, Volume 4, Issue 6, June 2014 1 An Introduction to Compressive Sensing and its Applications Pooja C. Nahar *, Dr. Mahesh T. Kolte ** * Department
More informationOn-Mote Compressive Sampling in Wireless Seismic Sensor Networks
On-Mote Compressive Sampling in Wireless Seismic Sensor Networks Marc J. Rubin Computer Science Ph.D. Candidate Department of Electrical Engineering and Computer Science Colorado School of Mines mrubin@mines.edu
More informationSPARSE CHANNEL ESTIMATION BY PILOT ALLOCATION IN MIMO-OFDM SYSTEMS
SPARSE CHANNEL ESTIMATION BY PILOT ALLOCATION IN MIMO-OFDM SYSTEMS Puneetha R 1, Dr.S.Akhila 2 1 M. Tech in Digital Communication B M S College Of Engineering Karnataka, India 2 Professor Department of
More informationChaotically Modulated RSA/SHIFT Secured IFFT/FFT Based OFDM Wireless System
Chaotically Modulated RSA/SHIFT Secured IFFT/FFT Based OFDM Wireless System Sumathra T 1, Nagaraja N S 2, Shreeganesh Kedilaya B 3 Department of E&C, Srinivas School of Engineering, Mukka, Mangalore Abstract-
More informationSecurity Enhancement and Speed Monitoring of RSA Algorithm
Security Enhancement and Speed Monitoring of RSA Algorithm Sarthak R Patel 1, Prof. Khushbu Shah 2 1 PG Scholar, 2 Assistant Professor Computer Engineering Department, LJIET, Gujarat Technological University,
More informationDistributed Compressed Sensing of Jointly Sparse Signals
Distributed Compressed Sensing of Jointly Sparse Signals Marco F. Duarte, Shriram Sarvotham, Dror Baron, Michael B. Wakin and Richard G. Baraniuk Department of Electrical and Computer Engineering, Rice
More informationCompressive Imaging: Theory and Practice
Compressive Imaging: Theory and Practice Mark Davenport Richard Baraniuk, Kevin Kelly Rice University ECE Department Digital Revolution Digital Acquisition Foundation: Shannon sampling theorem Must sample
More informationA Comparative Study of Audio Compression Based on Compressed Sensing and Sparse Fast Fourier Transform (SFFT): Performance and Challenges
A Comparative Study of Audio Compression Based on Compressed Sensing and Sparse Fast Fourier Transform (): Performance and Challenges Hossam M.Kasem, Maha El-Sabrouty Electronic and Communication Engineering,
More informationDigital Audio Watermarking With Discrete Wavelet Transform Using Fibonacci Numbers
Digital Audio Watermarking With Discrete Wavelet Transform Using Fibonacci Numbers P. Mohan Kumar 1, Dr. M. Sailaja 2 M. Tech scholar, Dept. of E.C.E, Jawaharlal Nehru Technological University Kakinada,
More informationEXACT SIGNAL RECOVERY FROM SPARSELY CORRUPTED MEASUREMENTS
EXACT SIGNAL RECOVERY FROM SPARSELY CORRUPTED MEASUREMENTS THROUGH THE PURSUIT OF JUSTICE Jason Laska, Mark Davenport, Richard Baraniuk SSC 2009 Collaborators Mark Davenport Richard Baraniuk Compressive
More informationThe number theory behind cryptography
The University of Vermont May 16, 2017 What is cryptography? Cryptography is the practice and study of techniques for secure communication in the presence of adverse third parties. What is cryptography?
More informationUnlinkability and Redundancy in Anonymous Publication Systems
Unlinkability and Redundancy in Anonymous Publication Systems Christian Boesgaard pink@diku.dk Department of Computer Science University of Copenhagen Denmark January 22, 2004 1 Introduction An anonymous
More informationSensing via Dimensionality Reduction Structured Sparsity Models
Sensing via Dimensionality Reduction Structured Sparsity Models Volkan Cevher volkan@rice.edu Sensors 1975-0.08MP 1957-30fps 1877 -? 1977 5hours 160MP 200,000fps 192,000Hz 30mins Digital Data Acquisition
More informationBeyond Nyquist. Joel A. Tropp. Applied and Computational Mathematics California Institute of Technology
Beyond Nyquist Joel A. Tropp Applied and Computational Mathematics California Institute of Technology jtropp@acm.caltech.edu With M. Duarte, J. Laska, R. Baraniuk (Rice DSP), D. Needell (UC-Davis), and
More informationCompressed Sensing for Multiple Access
Compressed Sensing for Multiple Access Xiaodai Dong Wireless Signal Processing & Networking Workshop: Emerging Wireless Technologies, Tohoku University, Sendai, Japan Oct. 28, 2013 Outline Background Existing
More informationEnhanced Efficient Halftoning Technique used in Embedded Extended Visual Cryptography Strategy for Effective Processing
Enhanced Efficient Halftoning Technique used in Embedded Extended Visual Cryptography Strategy for Effective Processing M.Desiha Department of Computer Science and Engineering, Jansons Institute of Technology
More informationProceedings of Meetings on Acoustics
Proceedings of Meetings on Acoustics Volume 19, 213 http://acousticalsociety.org/ ICA 213 Montreal Montreal, Canada 2-7 June 213 Signal Processing in Acoustics Session 2pSP: Acoustic Signal Processing
More informationWAVELET-BASED COMPRESSED SPECTRUM SENSING FOR COGNITIVE RADIO WIRELESS NETWORKS. Hilmi E. Egilmez and Antonio Ortega
WAVELET-BASED COPRESSED SPECTRU SENSING FOR COGNITIVE RADIO WIRELESS NETWORKS Hilmi E. Egilmez and Antonio Ortega Signal & Image Processing Institute, University of Southern California, Los Angeles, CA,
More informationCompressed Spectrum Sensing in Cognitive Radio Network Based on Measurement Matrix 1
Compressed Spectrum Sensing in Cognitive Radio Network Based on Measurement Matrix 1 Gh.Reza Armand, 2 Ali Shahzadi, 3 Hadi Soltanizadeh 1 Senior Student, Department of Electrical and Computer Engineering
More informationAnalysis of LMS Algorithm in Wavelet Domain
Conference on Advances in Communication and Control Systems 2013 (CAC2S 2013) Analysis of LMS Algorithm in Wavelet Domain Pankaj Goel l, ECE Department, Birla Institute of Technology Ranchi, Jharkhand,
More informationHOW TO USE REAL-VALUED SPARSE RECOVERY ALGORITHMS FOR COMPLEX-VALUED SPARSE RECOVERY?
20th European Signal Processing Conference (EUSIPCO 202) Bucharest, Romania, August 27-3, 202 HOW TO USE REAL-VALUED SPARSE RECOVERY ALGORITHMS FOR COMPLEX-VALUED SPARSE RECOVERY? Arsalan Sharif-Nassab,
More informationA Cost-Effective Private-Key Cryptosystem for Color Image Encryption
A Cost-Effective Private-Key Cryptosystem for Color Image Encryption Rastislav Lukac and Konstantinos N. Plataniotis The Edward S. Rogers Sr. Dept. of Electrical and Computer Engineering, University of
More informationCompressive Sensing based Asynchronous Random Access for Wireless Networks
Compressive Sensing based Asynchronous Random Access for Wireless Networks Vahid Shah-Mansouri, Suyang Duan, Ling-Hua Chang, Vincent W.S. Wong, and Jwo-Yuh Wu Department of Electrical and Computer Engineering,
More informationDiscrete Mathematics & Mathematical Reasoning Multiplicative Inverses and Some Cryptography
Discrete Mathematics & Mathematical Reasoning Multiplicative Inverses and Some Cryptography Colin Stirling Informatics Some slides based on ones by Myrto Arapinis Colin Stirling (Informatics) Discrete
More informationCryptanalysis of an Improved One-Way Hash Chain Self-Healing Group Key Distribution Scheme
Cryptanalysis of an Improved One-Way Hash Chain Self-Healing Group Key Distribution Scheme Yandong Zheng 1, Hua Guo 1 1 State Key Laboratory of Software Development Environment, Beihang University Beiing
More informationA STENO HIDING USING CAMOUFLAGE BASED VISUAL CRYPTOGRAPHY SCHEME
International Journal of Power Control Signal and Computation (IJPCSC) Vol. 2 No. 1 ISSN : 0976-268X A STENO HIDING USING CAMOUFLAGE BASED VISUAL CRYPTOGRAPHY SCHEME 1 P. Arunagiri, 2 B.Rajeswary, 3 S.Arunmozhi
More informationThe Design of Compressive Sensing Filter
The Design of Compressive Sensing Filter Lianlin Li, Wenji Zhang, Yin Xiang and Fang Li Institute of Electronics, Chinese Academy of Sciences, Beijing, 100190 Lianlinli1980@gmail.com Abstract: In this
More informationInternational Journal of Advance Engineering and Research Development IMAGE BASED STEGANOGRAPHY REVIEW OF LSB AND HASH-LSB TECHNIQUES
Scientific Journal of Impact Factor (SJIF) : 3.134 ISSN (Print) : 2348-6406 ISSN (Online): 2348-4470 ed International Journal of Advance Engineering and Research Development IMAGE BASED STEGANOGRAPHY REVIEW
More informationImproved Random Demodulator for Compressed Sensing Applications
Purdue University Purdue e-pubs Open Access Theses Theses and Dissertations Summer 2014 Improved Random Demodulator for Compressed Sensing Applications Sathya Narayanan Hariharan Purdue University Follow
More informationCollaborative Compressive Sensing based Dynamic Spectrum Sensing and Mobile Primary User Localization in Cognitive Radio Networks
Collaborative Compressive Sensing based Dynamic Spectrum Sensing and Mobile Primary User Localization in Cognitive Radio Networks Lanchao Liu and Zhu Han ECE Department University of Houston Houston, Texas
More informationImproved Performance for Color to Gray and Back using DCT-Haar, DST-Haar, Walsh-Haar, Hartley-Haar, Slant-Haar, Kekre-Haar Hybrid Wavelet Transforms
Improved Performance for Color to Gray and Back using DCT-, DST-, Walsh-, Hartley-, Slant-, Kekre- Hybrid Wavelet Transforms H. B. Kekre 1, Sudeep D. Thepade 2, Ratnesh N. Chaturvedi 3 Abstract The paper
More informationAnalysis of Secure Text Embedding using Steganography
Analysis of Secure Text Embedding using Steganography Rupinder Kaur Department of Computer Science and Engineering BBSBEC, Fatehgarh Sahib, Punjab, India Deepak Aggarwal Department of Computer Science
More informationCommutative reversible data hiding and encryption
SECURITY AND COMMUNICATION NETWORKS Security Comm. Networks 3; 6:396 43 Published online March 3 in Wiley Online Library (wileyonlinelibrary.com)..74 RESEARCH ARTICLE Xinpeng Zhang* School of Communication
More informationAn Implementation of LSB Steganography Using DWT Technique
An Implementation of LSB Steganography Using DWT Technique G. Raj Kumar, M. Maruthi Prasada Reddy, T. Lalith Kumar Electronics & Communication Engineering #,JNTU A University Electronics & Communication
More informationCARRY SAVE COMMON MULTIPLICAND MONTGOMERY FOR RSA CRYPTOSYSTEM
American Journal of Applied Sciences 11 (5): 851-856, 2014 ISSN: 1546-9239 2014 Science Publication doi:10.3844/ajassp.2014.851.856 Published Online 11 (5) 2014 (http://www.thescipub.com/ajas.toc) CARRY
More informationA Low Power 900MHz Superheterodyne Compressive Sensing Receiver for Sparse Frequency Signal Detection
A Low Power 900MHz Superheterodyne Compressive Sensing Receiver for Sparse Frequency Signal Detection Hamid Nejati and Mahmood Barangi 4/14/2010 Outline Introduction System level block diagram Compressive
More informationDetection Performance of Compressively Sampled Radar Signals
Detection Performance of Compressively Sampled Radar Signals Bruce Pollock and Nathan A. Goodman Department of Electrical and Computer Engineering The University of Arizona Tucson, Arizona brpolloc@email.arizona.edu;
More informationCOMPRESSIVE SENSING FOR THROUGH WALL RADAR IMAGING OF STATIONARY SCENES USING ARBITRARY DATA MEASUREMENTS
COMPRESSIVE SENSING FOR THROUGH WALL RADAR IMAGING OF STATIONARY SCENES USING ARBITRARY DATA MEASUREMENTS Eva Lagunas 1, Moeness G. Amin, Fauzia Ahmad, and Montse Nájar 1 1 Universitat Politècnica de Catalunya
More informationSecure Localization Using Elliptic Curve Cryptography in Wireless Sensor Networks
IJCSNS International Journal of Computer Science and Network Security, VOL. No.6, June 55 Secure Localization Using Elliptic Curve Cryptography in Wireless Sensor Networks Summary The crucial problem in
More informationVideo, Image and Data Compression by using Discrete Anamorphic Stretch Transform
ISSN: 49 8958, Volume-5 Issue-3, February 06 Video, Image and Data Compression by using Discrete Anamorphic Stretch Transform Hari Hara P Kumar M Abstract we have a compression technology which is used
More informationINTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY
INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY A PATH FOR HORIZING YOUR INNOVATIVE WORK VISUAL CRYPTOGRAPHY FOR IMAGES MS. SHRADDHA SUBHASH GUPTA 1, DR. H. R. DESHMUKH
More informationFPGA implementation of DWT for Audio Watermarking Application
FPGA implementation of DWT for Audio Watermarking Application Naveen.S.Hampannavar 1, Sajeevan Joseph 2, C.B.Bidhul 3, Arunachalam V 4 1, 2, 3 M.Tech VLSI Students, 4 Assistant Professor Selection Grade
More informationA Novel Image Steganography Based on Contourlet Transform and Hill Cipher
Journal of Information Hiding and Multimedia Signal Processing c 2015 ISSN 2073-4212 Ubiquitous International Volume 6, Number 5, September 2015 A Novel Image Steganography Based on Contourlet Transform
More informationFIR Filter Design by Frequency Sampling or Interpolation *
OpenStax-CX module: m689 FIR Filter Design by Frequency Sampling or Interpolation * C. Sidney Burrus This work is produced by OpenStax-CX and licensed under the Creative Commons Attribution License 2.
More informationA New Chaotic Secure Communication System
1306 IEEE TRANSACTIONS ON COMMUNICATIONS, VOL 51, NO 8, AUGUST 2003 A New Chaotic Secure Communication System Zhengguo Li, Kun Li, Changyun Wen, and Yeng Chai Soh Abstract This paper proposes a digital
More informationMeta-data based secret image sharing application for different sized biomedical
Biomedical Research 2018; Special Issue: S394-S398 ISSN 0970-938X www.biomedres.info Meta-data based secret image sharing application for different sized biomedical images. Arunkumar S 1*, Subramaniyaswamy
More informationPerformance Enhancement of the RSA Algorithm by Optimize Partial Product of Booth Multiplier
International Journal of Electronics Engineering Research. ISSN 0975-6450 Volume 9, Number 8 (2017) pp. 1329-1338 Research India Publications http://www.ripublication.com Performance Enhancement of the
More informationCourse Developer: Ranjan Bose, IIT Delhi
Course Title: Coding Theory Course Developer: Ranjan Bose, IIT Delhi Part I Information Theory and Source Coding 1. Source Coding 1.1. Introduction to Information Theory 1.2. Uncertainty and Information
More informationMC CDMA PAPR Reduction Using Discrete Logarithmic Method
International Journal of Engineering Research and Development ISSN: 2278-067X, Volume 1, Issue 4 (June 2012), PP.38-43 www.ijerd.com MC CDMA PAPR Reduction Using Discrete Logarithmic Method B.Sarala 1,
More informationLow order anti-aliasing filters for sparse signals in embedded applications
Sādhanā Vol. 38, Part 3, June 2013, pp. 397 405. c Indian Academy of Sciences Low order anti-aliasing filters for sparse signals in embedded applications J V SATYANARAYANA and A G RAMAKRISHNAN Department
More informationPerformance Analysis of Threshold Based Compressive Sensing Algorithm in Wireless Sensor Network
American Journal of Applied Sciences Original Research Paper Performance Analysis of Threshold Based Compressive Sensing Algorithm in Wireless Sensor Network Parnasree Chakraborty and C. Tharini Department
More informationKeywords: dynamic P-Box and S-box, modular calculations, prime numbers, key encryption, code breaking.
INTRODUCING DYNAMIC P-BOX AND S-BOX BASED ON MODULAR CALCULATION AND KEY ENCRYPTION FOR ADDING TO CURRENT CRYPTOGRAPHIC SYSTEMS AGAINST THE LINEAR AND DIFFERENTIAL CRYPTANALYSIS M. Zobeiri and B. Mazloom-Nezhad
More informationFPGA implementation of LSB Steganography method
FPGA implementation of LSB Steganography method Pangavhane S.M. 1 &Punde S.S. 2 1,2 (E&TC Engg. Dept.,S.I.E.RAgaskhind, SPP Univ., Pune(MS), India) Abstract : "Steganography is a Greek origin word which
More informationNumber Theory and Security in the Digital Age
Number Theory and Security in the Digital Age Lola Thompson Ross Program July 21, 2010 Lola Thompson (Ross Program) Number Theory and Security in the Digital Age July 21, 2010 1 / 37 Introduction I have
More informationSuper-Resolution and Reconstruction of Sparse Sub-Wavelength Images
Super-Resolution and Reconstruction of Sparse Sub-Wavelength Images Snir Gazit, 1 Alexander Szameit, 1 Yonina C. Eldar, 2 and Mordechai Segev 1 1. Department of Physics and Solid State Institute, Technion,
More informationSignal Recovery from Random Measurements
Signal Recovery from Random Measurements Joel A. Tropp Anna C. Gilbert {jtropp annacg}@umich.edu Department of Mathematics The University of Michigan 1 The Signal Recovery Problem Let s be an m-sparse
More informationNew Modeling of Metal Oxide Surge Arresters
Signal Processing and Renewable Energy September 2017, (pp.27-37) ISSN: 2588-7327 New Modeling of Metal Oxide Surge Arresters Seyed Mohammad Hassan Hosseini 1 *, Younes Gharadaghi 1 1 Electrical Engineering
More informationInternational Journal of Advance Research in Computer Science and Management Studies
Volume 3, Issue 2, February 2015 ISSN: 2321 7782 (Online) International Journal of Advance Research in Computer Science and Management Studies Research Article / Survey Paper / Case Study Available online
More informationDesign of FIR Filter Using Modified Montgomery Multiplier with Pipelining Technique
International Journal of Engineering Research and Development e-issn: 2278-067X, p-issn: 2278-800X, www.ijerd.com Volume 10, Issue 3 (March 2014), PP.55-63 Design of FIR Filter Using Modified Montgomery
More informationSummary of the PhD Thesis
Summary of the PhD Thesis Contributions to LTE Implementation Author: Jamal MOUNTASSIR 1. Introduction The evolution of wireless networks process is an ongoing phenomenon. There is always a need for high
More informationTHE STATISTICAL ANALYSIS OF AUDIO WATERMARKING USING THE DISCRETE WAVELETS TRANSFORM AND SINGULAR VALUE DECOMPOSITION
THE STATISTICAL ANALYSIS OF AUDIO WATERMARKING USING THE DISCRETE WAVELETS TRANSFORM AND SINGULAR VALUE DECOMPOSITION Mr. Jaykumar. S. Dhage Assistant Professor, Department of Computer Science & Engineering
More informationJournal of mathematics and computer science 11 (2014),
Journal of mathematics and computer science 11 (2014), 137-146 Application of Unsharp Mask in Augmenting the Quality of Extracted Watermark in Spatial Domain Watermarking Saeed Amirgholipour 1 *,Ahmad
More informationHigh capacity robust audio watermarking scheme based on DWT transform
High capacity robust audio watermarking scheme based on DWT transform Davod Zangene * (Sama technical and vocational training college, Islamic Azad University, Mahshahr Branch, Mahshahr, Iran) davodzangene@mail.com
More informationCompressed RF Tomography for Wireless Sensor Networks: Centralized and Decentralized Approaches
Compressed RF Tomography for Wireless Sensor Networks: Centralized and Decentralized Approaches Mohammad A. Kanso and Michael G. Rabbat Department of Electrical and Computer Engineering McGill University
More informationModular Multiplication Algorithm in Cryptographic Processor: A Review and Future Directions
Modular Multiplication Algorithm in Cryptographic Processor: A Review and Future Directions Poomagal C. T Research Scholar, Department of Electronics and Communication Engineering, Sri Venkateswara College
More informationAudio Compression using the MLT and SPIHT
Audio Compression using the MLT and SPIHT Mohammed Raad, Alfred Mertins and Ian Burnett School of Electrical, Computer and Telecommunications Engineering University Of Wollongong Northfields Ave Wollongong
More informationA Low Power 900MHz Superheterodyne Compressive Sensing Receiver for Sparse Frequency Signal Detection
A Low Power 900MHz Superheterodyne Compressive Sensing Receiver for Sparse Frequency Signal etection Hamid Nejati and Mahmood Barangi EECS department, University of Michigan, Ann Arbor {hnejati,barangi}@umich.edu
More informationAvailable online at ScienceDirect. Procedia Computer Science 34 (2014 )
Available online at www.sciencedirect.com ScienceDirect Procedia Computer Science 34 (2014 ) 639 646 International Symposium on Emerging Inter-networks, Communication and Mobility (EICM 2014) A Tiny RSA
More informationPower Allocation and Measurement Matrix Design for Block CS-Based Distributed MIMO Radars
Power Allocation and Measurement Matrix Design for Block CS-Based Distributed MIMO Radars Azra Abtahi, M. Modarres-Hashemi, Farokh Marvasti, and Foroogh S. Tabataba Abstract Multiple-input multiple-output
More informationOpen Access Research of Dielectric Loss Measurement with Sparse Representation
Send Orders for Reprints to reprints@benthamscience.ae 698 The Open Automation and Control Systems Journal, 2, 7, 698-73 Open Access Research of Dielectric Loss Measurement with Sparse Representation Zheng
More informationNew binary image encryption algorithm based on combination of confusion and diffusion
Available online www.jocpr.com Journal of Chemical and Pharmaceutical Research, 2014, 6(7):621-629 Research Article ISSN : 0975-7384 CODEN(USA) : JCPRC5 New binary image encryption algorithm based on combination
More informationStudy of Perfect Shuffle for Image Scrambling
International Journal of Scientific and Research Publications, Volume 4, Issue 2, February 2014 1 Study of Perfect Shuffle for Image Scrambling H.B.Kekre*, Tanuja Sarode**, Pallavi N.Halarnkar** *Computer
More informationKeywords Arnold transforms; chaotic logistic mapping; discrete wavelet transform; encryption; mean error.
Volume 5, Issue 2, February 2015 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com An Entropy
More informationApplications of sparse approximation in communications
Applications of sparse approximation in communications A. C. Gilbert Department of Mathematics University of Michigan Ann Arbor, MI 48109 Email: annacg@umich.edu J. A. Tropp Department of Mathematics University
More informationMathematics Explorers Club Fall 2012 Number Theory and Cryptography
Mathematics Explorers Club Fall 2012 Number Theory and Cryptography Chapter 0: Introduction Number Theory enjoys a very long history in short, number theory is a study of integers. Mathematicians over
More informationAn Enhanced Least Significant Bit Steganography Technique
An Enhanced Least Significant Bit Steganography Technique Mohit Abstract - Message transmission through internet as medium, is becoming increasingly popular. Hence issues like information security are
More informationEnergy-Effective Communication Based on Compressed Sensing
American Journal of etworks and Communications 2016; 5(6): 121-127 http://www.sciencepublishinggroup.com//anc doi: 10.11648/.anc.20160506.11 ISS: 2326-893X (Print); ISS: 2326-8964 (Online) Energy-Effective
More informationTriple-DES Block of 96 Bits: An Application to. Colour Image Encryption
Applied Mathematical Sciences, Vol. 7, 2013, no. 23, 1143-1155 HIKARI Ltd, www.m-hikari.com Triple-DES Block of 96 Bits: An Application to Colour Image Encryption V. M. Silva-García Instituto politécnico
More informationIntroduction to Wavelets. For sensor data processing
Introduction to Wavelets For sensor data processing List of topics Why transform? Why wavelets? Wavelets like basis components. Wavelets examples. Fast wavelet transform. Wavelets like filter. Wavelets
More informationLENSLESS IMAGING BY COMPRESSIVE SENSING
LENSLESS IMAGING BY COMPRESSIVE SENSING Gang Huang, Hong Jiang, Kim Matthews and Paul Wilford Bell Labs, Alcatel-Lucent, Murray Hill, NJ 07974 ABSTRACT In this paper, we propose a lensless compressive
More informationThe Discrete Fourier Transform. Claudia Feregrino-Uribe, Alicia Morales-Reyes Original material: Dr. René Cumplido
The Discrete Fourier Transform Claudia Feregrino-Uribe, Alicia Morales-Reyes Original material: Dr. René Cumplido CCC-INAOE Autumn 2015 The Discrete Fourier Transform Fourier analysis is a family of mathematical
More informationPower Allocation and Measurement Matrix Design for Block CS-Based Distributed MIMO Radars
Power Allocation and Measurement Matrix Design for Block CS-Based Distributed MIMO Radars Azra Abtahi, Mahmoud Modarres-Hashemi, Farokh Marvasti, and Foroogh S. Tabataba Abstract Multiple-input multiple-output
More informationA Fast Image Encryption Scheme based on Chaotic Standard Map
A Fast Image Encryption Scheme based on Chaotic Standard Map Kwok-Wo Wong, Bernie Sin-Hung Kwok, and Wing-Shing Law Department of Electronic Engineering, City University of Hong Kong, 83 Tat Chee Avenue,
More informationCompressed Meter Reading for Delay-sensitive and Secure Load Report in Smart Grid
Compressed Meter Reading for Delay-sensitive Secure Load Report in Smart Grid Husheng Li, Rukun Mao, Lifeng Lai Robert. C. Qiu Abstract It is a key task in smart grid to send the readings of smart meters
More informationA New Representation of Image Through Numbering Pixel Combinations
A New Representation of Image Through Numbering Pixel Combinations J. Said 1, R. Souissi, H. Hamam 1 1 Faculty of Engineering Moncton, NB Canada ISET-Sfax Tunisia Habib.Hamam@umoncton.ca ABSTRACT: A new
More informationVolume 2, Issue 9, September 2014 International Journal of Advance Research in Computer Science and Management Studies
Volume 2, Issue 9, September 2014 International Journal of Advance Research in Computer Science and Management Studies Research Article / Survey Paper / Case Study Available online at: www.ijarcsms.com
More informationImage Denoising Using Complex Framelets
Image Denoising Using Complex Framelets 1 N. Gayathri, 2 A. Hazarathaiah. 1 PG Student, Dept. of ECE, S V Engineering College for Women, AP, India. 2 Professor & Head, Dept. of ECE, S V Engineering College
More informationSimultaneous Encryption/Compression of Images Using Alpha Rooting
Simultaneous Encryption/Compression of Images Using Alpha Rooting Eric Wharton 1, Karen Panetta 1, and Sos Agaian 2 1 Tufts University, Dept. of Electrical and Computer Eng., Medford, MA 02155 2 The University
More informationClipping Noise Cancellation Based on Compressed Sensing for Visible Light Communication
Clipping Noise Cancellation Based on Compressed Sensing for Visible Light Communication Presented by Jian Song jsong@tsinghua.edu.cn Tsinghua University, China 1 Contents 1 Technical Background 2 System
More informationA BIST Circuit for Fault Detection Using Recursive Pseudo- Exhaustive Two Pattern Generator
Vol.2, Issue.3, May-June 22 pp-676-681 ISSN 2249-6645 A BIST Circuit for Fault Detection Using Recursive Pseudo- Exhaustive Two Pattern Generator K. Nivitha 1, Anita Titus 2 1 ME-VLSI Design 2 Dept of
More informationTRANSFORMS / WAVELETS
RANSFORMS / WAVELES ransform Analysis Signal processing using a transform analysis for calculations is a technique used to simplify or accelerate problem solution. For example, instead of dividing two
More informationWideband Speech Encryption Based Arnold Cat Map for AMR-WB G Codec
Wideband Speech Encryption Based Arnold Cat Map for AMR-WB G.722.2 Codec Fatiha Merazka Telecommunications Department USTHB, University of science & technology Houari Boumediene P.O.Box 32 El Alia 6 Bab
More informationA New Compression Method for Encrypted Images
Technology, Volume-2, Issue-2, March-April, 2014, pp. 15-19 IASTER 2014, www.iaster.com Online: 2347-5099, Print: 2348-0009 ABSTRACT A New Compression Method for Encrypted Images S. Manimurugan, Naveen
More informationINDOOR POSITIONING IN WIRELESS LANS USING COMPRESSIVE SENSING SIGNAL-STRENGTH FINGERPRINTS
INDOOR POSITIONING IN WIRELESS LANS USING COMPRESSIVE SENSING SIGNAL-STRENGTH FINGERPRINTS Dimitris Milioris,3,4, George Tzagkarakis 5, Philippe Jacquet 4 and Panagiotis Tsakalides, Department of Computer
More informationDemocracy in Action. Quantization, Saturation, and Compressive Sensing!"#$%&'"#("
Democracy in Action Quantization, Saturation, and Compressive Sensing!"#$%&'"#(" Collaborators Petros Boufounos )"*(&+",-%.$*/ 0123"*4&5"*"%16( Background If we could first know where we are, and whither
More informationPerformance analysis of Compressive Modulation scheme in Digital Communication
IOSR Journal of Electronics and Communication Engineering (IOSR-JECE) e-issn: 78-834,p- ISSN: 78-8735.Volume 9, Issue 5, Ver. 1 (Sep - Oct. 014), PP 58-64 Performance analysis of Compressive Modulation
More informationCompressive Sensing Based Detection Strategy For Multiple Access Spatial Modulation Channel
Compressive Sensing Based Detection Strategy For Multiple Access Spatial Modulation Channel Pooja Chandankhede, Dr. Manish Sharma ME Student, Dept. of E&TC, DYPCOE, Savitribai Phule Pune University, Akurdi,
More informationInternational Journal of Digital Application & Contemporary research Website: (Volume 1, Issue 7, February 2013)
Performance Analysis of OFDM under DWT, DCT based Image Processing Anshul Soni soni.anshulec14@gmail.com Ashok Chandra Tiwari Abstract In this paper, the performance of conventional discrete cosine transform
More informationChaos Encryption Method Based on Large Signal Modulation in Additive Nonlinear Discrete-Time Systems
Proc. of the 5th WSEAS Int. Conf. on on-linear Analysis, on-linear Systems and Chaos, Bucharest, Romania, October 6-8, 26 98 Chaos Encryption Method Based on Large Signal Modulation in Additive onlinear
More information