Abstract
Compressed sensing has been proposed to both yield low-cost compression and low-cost encryption. This can be very useful in the design of sensor nodes with a limited resource budget whose acquisition must be kept as private as possible. We here analyze the susceptibility of compressed sensing stages that are optimized to maximize compression performance by rakeness-based design to ciphertext-only and known-plaintext attacks. A tradeoff between compression and security is highlighted. Notwithstanding such a tradeoff, rakeness-based compressed sensing exhibits a noteworthy robustness to classical attacks.
Original language | English (US) |
---|---|
Pages (from-to) | 327-340 |
Number of pages | 14 |
Journal | IEEE Transactions on Information Forensics and Security |
Volume | 13 |
Issue number | 2 |
DOIs | |
State | Published - Feb 1 2018 |
Externally published | Yes |
ASJC Scopus subject areas
- Computer Networks and Communications
- Safety, Risk, Reliability and Quality