北京邮电大学学报

  • EI核心期刊

北京邮电大学学报 ›› 2020, Vol. 43 ›› Issue (3): 125-130.doi: 10.13190/j.jbupt.2019-129

• 研究报告 • 上一篇    下一篇

压缩感知安全理论研究

汤永利1, 赵明洁1, 李丽香2   

  1. 1. 河南理工大学 计算机科学与技术学院, 焦作 454003;
    2. 北京邮电大学 灾备技术国家工程实验室, 北京 100876
  • 收稿日期:2019-07-02 出版日期:2020-06-28 发布日期:2020-06-24
  • 通讯作者: 李丽香(1978-),女,教授,博士生导师,E-mail:lixiang@bupt.edu.cn. E-mail:lixiang@bupt.edu.cn
  • 作者简介:汤永利(1972-),男,教授,研究生导师.
  • 基金资助:
    国家自然科学基金项目(61771071);"十三五"国家密码发展基金项目(MMJJ20170122);河南省高校科技创新团队支持计划项目(20IRTSTHN013);河南理工大学创新型科研基金项目(T2018-1)

Research on Compressed Sensing Security Theory

TANG Yong-li1, ZHAO Ming-jie1, LI Li-xiang2   

  1. 1. School of Computer Science and Technology, Henan Polytechnic University, Jiaozuo 454003, China;
    2. National Engineering Laboratory for Disaster Backup and Recovery, Beijing University of Posts and Telecommunications, Beijing 100876, China
  • Received:2019-07-02 Online:2020-06-28 Published:2020-06-24
  • Supported by:
     

摘要: 互联网的发展导致各种信息传输量的激增,对于大数据的处理,奈奎斯特采样定律已经不能满足许多实际工程应用的需要,而压缩感知的出现解决了这个问题.压缩感知理论指出稀疏信号可以用远小于奈奎斯特采样定律的采样数进行采样,并将原始数据恢复出来.压缩感知不仅可以将数据进行压缩,而且还具有加密功能,被广泛应用到信息和网络的安全理论中.为了实现更好的加密效果,对压缩感知与其他多种技术相结合(如混沌系统、置乱和扩散等)的安全方案进行汇总,并对现有的多种方案的对比结果进行了对比分析.结果表明,现有的这些压缩感知安全方案都可以达到良好的加密效果,可以抵抗暴力攻击、统计攻击、已知明文攻击等多种攻击,具有良好的安全性.

关键词: 压缩感知, 混沌系统, 置乱和扩散, 加密方案

Abstract: The rapid development of Internet induces huge requirement on transmission, which calls for much more efficient techniques to compress information. Compressive sensing method can sample sparse signals with much less samples than Nyquist's sampling law with payload of recovery quality and computation complexity. Compressive sensing can not only compress data, but also encrypt them, and thus can be applied to encrypt the information and network. The article reviews the compressive sensing-based encryption methods, which combines other technologies (such as chaotic system, scrambling and diffusion). After analyzing the performance comparison of existing methods, the compressive sensing-based schemes is verified to achieve a great security capability to resist brute-force attack, statistical attack, known plaintext attack and other attacks.

Key words: compressive sensing, chaotic system, scrambling and diffusion, encryption schem

中图分类号: