Energy obfuscation for compressive encryption and processing
暂无分享,去创建一个
[1] Daibashish Gangopadhyay,et al. Compressed Sensing Analog Front-End for Bio-Sensor Applications , 2014, IEEE Journal of Solid-State Circuits.
[2] Robin Fay,et al. Introducing the counter mode of operation to Compressed Sensing based encryption , 2016, Inf. Process. Lett..
[3] Mauro Barni,et al. Analysis of the security of linear blinding techniques from an information theoretical point of view , 2011, 2011 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).
[4] Enrico Magli,et al. Compressive Estimation and Imaging Based on Autoregressive Models , 2016, IEEE Transactions on Image Processing.
[5] Richard G. Baraniuk,et al. Signal Processing With Compressive Measurements , 2010, IEEE Journal of Selected Topics in Signal Processing.
[6] Wade Trappe,et al. Low-Energy Security: Limits and Opportunities in the Internet of Things , 2015, IEEE Security & Privacy.
[7] Y. Rachlin,et al. The secrecy of compressed sensing measurements , 2008, 2008 46th Annual Allerton Conference on Communication, Control, and Computing.
[8] Ting Sun,et al. Single-pixel imaging via compressive sampling , 2008, IEEE Signal Process. Mag..
[9] Christoph Ruland,et al. Compressive Sensing encryption modes and their security , 2016, 2016 11th International Conference for Internet Technology and Secured Transactions (ICITST).
[10] Thomas Strohmer,et al. High-Resolution Radar via Compressed Sensing , 2008, IEEE Transactions on Signal Processing.
[11] Riccardo Rovatti,et al. Submitted to Ieee Transactions on Signal Processing Low-complexity Multiclass Encryption by Compressed Sensing Part I: Definition and Main Properties , 2022 .
[12] David W. Scott,et al. Box–Muller transformation , 2011 .
[13] Adrian Basarab,et al. Compressed sensing of ultrasound images: Sampling of spatial and frequency domains , 2010, 2010 IEEE Workshop On Signal Processing Systems.
[14] Thomas M. Cover,et al. Elements of Information Theory , 2005 .
[15] Enrico Magli,et al. Analysis of One-Time Random Projections for Privacy Preserving Compressed Sensing , 2016, IEEE Transactions on Information Forensics and Security.
[16] Stefan Lucks,et al. The Skein Hash Function Family , 2009 .
[17] Enrico Magli,et al. Analysis of the security of compressed sensing with circulant matrices , 2014, 2014 IEEE International Workshop on Information Forensics and Security (WIFS).
[18] G. Marsaglia,et al. The Ziggurat Method for Generating Random Variables , 2000 .