Energy obfuscation for compressive encryption and processing

Compressed Sensing enables both computationally secure encryption and signal processing in the compressed domain. Even though these characteristics have always been considered in separate fashion, in this paper we propose a novel method that takes into account these features jointly. As a result we obtain provable secrecy guarantees and enable fast signal processing. In more detail, we show that it is possible to perform anomaly detection relying on the measurements information leakage. At the same time, we can prevent attackers trying to obtain confidential data by obfuscating the information leakage. We show the effectiveness of such method through theoretical bounds and numerical experiments.

[1]  Daibashish Gangopadhyay,et al.  Compressed Sensing Analog Front-End for Bio-Sensor Applications , 2014, IEEE Journal of Solid-State Circuits.

[2]  Robin Fay,et al.  Introducing the counter mode of operation to Compressed Sensing based encryption , 2016, Inf. Process. Lett..

[3]  Mauro Barni,et al.  Analysis of the security of linear blinding techniques from an information theoretical point of view , 2011, 2011 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).

[4]  Enrico Magli,et al.  Compressive Estimation and Imaging Based on Autoregressive Models , 2016, IEEE Transactions on Image Processing.

[5]  Richard G. Baraniuk,et al.  Signal Processing With Compressive Measurements , 2010, IEEE Journal of Selected Topics in Signal Processing.

[6]  Wade Trappe,et al.  Low-Energy Security: Limits and Opportunities in the Internet of Things , 2015, IEEE Security & Privacy.

[7]  Y. Rachlin,et al.  The secrecy of compressed sensing measurements , 2008, 2008 46th Annual Allerton Conference on Communication, Control, and Computing.

[8]  Ting Sun,et al.  Single-pixel imaging via compressive sampling , 2008, IEEE Signal Process. Mag..

[9]  Christoph Ruland,et al.  Compressive Sensing encryption modes and their security , 2016, 2016 11th International Conference for Internet Technology and Secured Transactions (ICITST).

[10]  Thomas Strohmer,et al.  High-Resolution Radar via Compressed Sensing , 2008, IEEE Transactions on Signal Processing.

[11]  Riccardo Rovatti,et al.  Submitted to Ieee Transactions on Signal Processing Low-complexity Multiclass Encryption by Compressed Sensing Part I: Definition and Main Properties , 2022 .

[12]  David W. Scott,et al.  Box–Muller transformation , 2011 .

[13]  Adrian Basarab,et al.  Compressed sensing of ultrasound images: Sampling of spatial and frequency domains , 2010, 2010 IEEE Workshop On Signal Processing Systems.

[14]  Thomas M. Cover,et al.  Elements of Information Theory , 2005 .

[15]  Enrico Magli,et al.  Analysis of One-Time Random Projections for Privacy Preserving Compressed Sensing , 2016, IEEE Transactions on Information Forensics and Security.

[16]  Stefan Lucks,et al.  The Skein Hash Function Family , 2009 .

[17]  Enrico Magli,et al.  Analysis of the security of compressed sensing with circulant matrices , 2014, 2014 IEEE International Workshop on Information Forensics and Security (WIFS).

[18]  G. Marsaglia,et al.  The Ziggurat Method for Generating Random Variables , 2000 .