Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Security data transmission method based on compressive sensing theory

A technology of secure data and compressed sensing, applied in the field of secure data transmission, can solve problems that have not been applied to ensure the security of data transmission, reduce the number of data transmission, etc., and achieve the effect of perfecting confidentiality

Inactive Publication Date: 2013-02-20
东北大学秦皇岛分校
View PDF2 Cites 9 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] At present, the compressed sensing theory is only used to solve the efficiency problem of data collection and transmission, that is, to compress the sensing data and reduce the number of data transmissions, but it has not been applied to ensure the security of data transmission between the source and destination in the process of data communication.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Security data transmission method based on compressive sensing theory
  • Security data transmission method based on compressive sensing theory
  • Security data transmission method based on compressive sensing theory

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0027] The present invention includes two stages of data encryption at the source end and data decryption at the destination end during specific implementation. The data in this example are superimposed by the following four signals: 0.3cos100πt, 0.6cos200πt, 0.1cos400πt and 0.9cos800πt, where t is the sampling time. Let m=128, n=32, s=7, k=41 in this example.

[0028] First, the source performs data encryption, which is implemented according to the following specific steps:

[0029] 1) The source judges whether there is a projection matrix A 128×32 , if it does not exist, go to step 2), otherwise go to step 3);

[0030] 2) The source uses the shared key K as a seed to generate the projection matrix A 128×32 , in this example

[0031] A 128 × 32 = - 0.0503 0.1644 ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a method for achieving security data transmission by utilizing a compressive sensing theory. Currently, the compressive sensing theory has not been applied to guaranteeing security of data transmission between a source end and a destination end in a data communication process. The source end is encrypted by a random projection matrix and a random vector, and the destination end is decrypted by the sub-matrix of the left zero matrix of the random projection matrix to re-construct data to be transmitted. Mutual information attribute in an information theory is used to prove that the data transmission method disclosed by the invention has perfect security, i.e., the method is safe to a ciphertext-only attack. The method is not only applicable to a point-to-point communication, but also applicable to multipoint-to-point communication and multipoint-to-multipoint communication. Especially when computing power of the data source end and the destination end is asymmetric (in such application fields as internet of things, wireless sensor network and the like), the method has greater advantages.

Description

technical field [0001] The invention relates to a method for realizing secure data transmission by using compressed sensing theory, in particular to a method for using random vector projection encryption, minimum l 0 The secure data transmission method decrypted by the norm optimization method can be applied to the secure data transmission between the source end and the destination end in the data communication process. Background technique [0002] Most of the current data acquisition systems are designed based on the traditional Shannon sampling theorem, that is, in order to avoid signal distortion, the sampling frequency must not be lower than twice the highest frequency of the signal. However, there is a large redundancy in the data collected in this way, especially in image, video and other application fields, a large amount of collected data greatly increases the cost of data transmission and storage. In recent years, compressive sensing theory has brought revolutiona...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/32
Inventor 李国瑞王颖
Owner 东北大学秦皇岛分校
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products