{"title":"Authenticated compressive sensing imaging","authors":"Wu Tao, C. Ruland","doi":"10.1109/ISNCC.2017.8072009","DOIUrl":null,"url":null,"abstract":"The CS (Compressive Sensing) theory has been widely implemented in many areas, the CSI (Compressive Sensing Imaging) method is one of them. In this paper, in order to design the authenticated CSI system, we have introduced the CSI method and the image authentication mechanisms. The design strategies would be also discussed. Then, the CS based MAC (CSMAC) has been implemented in the CSI system, which makes the authentication and the sensing processes in one step. Furthermore, in order to adapt the CSI system's property, the CSMAC is designed to tolerate the content-preserving manipulations but oppose the harmful ones, so that the information integrity is protected with the content robustness.","PeriodicalId":176998,"journal":{"name":"2017 International Symposium on Networks, Computers and Communications (ISNCC)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"7","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2017 International Symposium on Networks, Computers and Communications (ISNCC)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ISNCC.2017.8072009","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 7
Abstract
The CS (Compressive Sensing) theory has been widely implemented in many areas, the CSI (Compressive Sensing Imaging) method is one of them. In this paper, in order to design the authenticated CSI system, we have introduced the CSI method and the image authentication mechanisms. The design strategies would be also discussed. Then, the CS based MAC (CSMAC) has been implemented in the CSI system, which makes the authentication and the sensing processes in one step. Furthermore, in order to adapt the CSI system's property, the CSMAC is designed to tolerate the content-preserving manipulations but oppose the harmful ones, so that the information integrity is protected with the content robustness.