We elaborate on the possibility of exploiting the (pseudo)random projection operator, which is at the heart of the most common architecture for compressed sensing, to prevent access to the acquired information by unauthorized receivers. In low-resource applications, this approach may make dedicated cryptographic layers unnecessary when the security requirement is not particularly high. Beyond proving that the proposed system is at least asymptotically immune to straightforward statistical attacks, we also exploit the sensitivity of compressed sensing recovery algorithms to the complete knowledge of the projection matrix to introduce two-class protection. The encoding is such that first-class decoders can retrieve the signal to its full resolution while second-class decoders are able to retrieve only a degraded version of the same signal. Examples are given with reference to ECG signal acquisition.

A two-class information concealing system based on compressed sensing

PARESCHI, Fabio;SETTI, Gianluca;
2013

Abstract

We elaborate on the possibility of exploiting the (pseudo)random projection operator, which is at the heart of the most common architecture for compressed sensing, to prevent access to the acquired information by unauthorized receivers. In low-resource applications, this approach may make dedicated cryptographic layers unnecessary when the security requirement is not particularly high. Beyond proving that the proposed system is at least asymptotically immune to straightforward statistical attacks, we also exploit the sensitivity of compressed sensing recovery algorithms to the complete knowledge of the projection matrix to introduce two-class protection. The encoding is such that first-class decoders can retrieve the signal to its full resolution while second-class decoders are able to retrieve only a degraded version of the same signal. Examples are given with reference to ECG signal acquisition.
2013
9781467357609
9781467357609
9781467357616
File in questo prodotto:
Non ci sono file associati a questo prodotto.

I documenti in SFERA sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.

Utilizza questo identificativo per citare o creare un link a questo documento: https://hdl.handle.net/11392/1948212
 Attenzione

Attenzione! I dati visualizzati non sono stati sottoposti a validazione da parte dell'ateneo

Citazioni
  • ???jsp.display-item.citation.pmc??? ND
  • Scopus 28
  • ???jsp.display-item.citation.isi??? 25
social impact