Shadan Ghaffaripour, F. Younis, Hoi Ting Poon, A. Miri
{"title":"An Analysis of the Security of Compressed Sensing Using an Artificial Neural Network","authors":"Shadan Ghaffaripour, F. Younis, Hoi Ting Poon, A. Miri","doi":"10.1109/PST.2017.00052","DOIUrl":null,"url":null,"abstract":"Compressed sensing (CS) schemes have been used in a wide number of applications in practice. Recently, they have been proposed for use in encryption algorithms because of their properties. In this paper, we present an empirical security analysis of compressed sensing-based encryption. Using a neural network model, we will show that the security of this type of encryption can be compromised. We consider at least three different scenarios in which an attack could occur causing partial information about the plaintext to be revealed without knowledge of the CS secret key.","PeriodicalId":405887,"journal":{"name":"2017 15th Annual Conference on Privacy, Security and Trust (PST)","volume":"84 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2017-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2017 15th Annual Conference on Privacy, Security and Trust (PST)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/PST.2017.00052","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
Compressed sensing (CS) schemes have been used in a wide number of applications in practice. Recently, they have been proposed for use in encryption algorithms because of their properties. In this paper, we present an empirical security analysis of compressed sensing-based encryption. Using a neural network model, we will show that the security of this type of encryption can be compromised. We consider at least three different scenarios in which an attack could occur causing partial information about the plaintext to be revealed without knowledge of the CS secret key.