Dik eşleştirme arayış yöntemi ile hibrit veri sıkıştırma ve optiksel kriptografi

Sıkıştırılmış Algılama (SA) son zamanlarda veri boyutunun ve sensör sistemlerinin azaltılması gibi çok fazla uygulamayı mümkün kılmasından dolayı çok önemli bir araştırma alanı olmuştur. Datayı önce eldeedip, onu sonra sıkıştırması yerine sıkıştırılmış algılamada veri, sıkıştırılmış formda işlem görmektedir. Buuygulama sensör sayısının azaltılmasına neden olmaktadır. Bu çalışmada eş zamanlı sıkıştırılmış algılamaile yeni bir kriptografi uygulaması ve bu sayede haberleşme alanındaki önemli iki problem olanefektif/etkin/verimli işaret işleme ve bu işareti güvenli olarak iletme konularına alternatif çözümaraştırması amaçlanmıştır. Bu çalışmada sıkıştırılmış algılama için Dik Eşleştirme Arayış (DEA)algoritması kullanılmıştır. Daha sonra, hem sıkıştırma hem de şifreleme başarmak için SA-DEA algoritması ile çift rastgele faz şifreleme (DRPE) yöntemi birleştirilmiştir. Yüksek güvenlik elde etmek içinsıkıştırılmış algılamada ve DRPE metodunda kullanılan anahtarlar alıcıya asimetrik kriptografi metodu ileiletilmiştir. DRPE simetrik optiksel şifreleme metodu olduğundan bu sebeple tüm kriptografik sistem, hibrit optiksel sistem (hem simetrik hem de asimetrik) olarak çalışmaktadır.

Hybrid data compression and optical cryptography with orthogonal matching pursuit

Compressive Sensing (CS), which makes it possible to reduce the amount of data and thereby to greatlysimplify the sensor system has become a very important research area. In this method, data is compressedbefore measurements whereas data is first measured and then compressed in the current technology. Thisapproach leads to reducing the number of sensors. In this study, simultaneous compressive sensing andhybrid optical cryptography is developed as a new approach to handle two important problems in the field of communications, namely, effective and efficient signal processing and secure transmission ofinformation. In this work, CS is achieved with the orthogonal matching pursuit (OMP) algorithm. Then,the CS-OMP algorithm is combined with the double random phase encyrption (DRPE) method to achieveboth compression and encyrption of data. In order to achieve high security, the keys used in CS and DRPEare transmitted to the receiver by an asymmetric cryptography method. Thus, the overall cryptographic system is a hybrid optical system (both symmetric and asymmetric) since DRPE is a symmetric opticalencyrption method.

___

  • 1. Candès E., Romberg J., Tao T., Robust uncertainty principles: Exact signal reconstruction from highly incomplete frequency information, IEEE Trans. on Information Theory, 52 (2), 489-509, 2006.
  • 2. Donoho D., Compressed sensing, IEEE Trans. on Information Theory, 52 (4), 1289 - 1306, 2006.
  • 3. Donoho D., Chen, S., Saunders, M., Atomic decomposition by basis pursuit, SIAM Journal on Scientific Computing, 20 (2), 33-61, 1998.
  • 4. Karakuş K., Programlanabilir donanım üzerinde sıkıştırıcı algılama ile görüntü yeniden oluşturma algoritmasının tasarımı, Yüksek Lisans Tezi, Ankara Üniversitesi, Fen Bilimleri Enstitüsü, 2011.
  • 5. Krishnamurthy M., Seagren E.S., Alder R., Bayles A.W., Burke J., Carter S., Faskha E., Basics of Cryptography and Enryption, How to Cheat at Securing Linux, Syngress Publishing, Inc., Elsevier, Inc., 30 Corporate Dr., Burlington, MA 01803, 2008.
  • 6. Septimus A., Steinberg, R., Compressive sampling hardware reconstruction, International Symposium on Circuits and Systems, 35 (3), 3316-3319, 2010.
  • 7. Baraniuk R., Compressive sensing, IEEE Signal Processing Magazine, 24 (4), 118-121, 2007.
  • 8. Borghi A., Darbon J., Peyronett S., Chan T., Osher S., Compressive sensing algorithm for parallel many-core architectures, Journal of Signal Processing Systems, 7 (1), 1-20, 2013.
  • 9. Donoho D., Stark, P. B., Uncertainty principles and signal recovery, SIAM, J. Appl. Math., 49 (3), 906- 931, 1989.
  • 10. Candès E., Wakin, M., An introduction to compressive sampling, IEEE Signal Processing Mag., 25 (2), 21-30, 2008.
  • 11. Satheesh B., Deepa B., Subhadra B, Devi S., Compressive Sensing for Array Signal Processing, India Conference (INDICON), India, 104-108, 7-9 Aralık, 2012.
  • 12. Tropp J., Gilbert A.C., Signal recovery from partial information via orthogonal matching pursuit, IEEE Trans. Inform. Theory, 53 (12), 4655-4666, 2007.
  • 13. Ersoy O. K., Nouira A., Image coding with the discrete cosine-III transform, IEEE Journal On Selected Areas In Communications, 10 (5), 21-45, 1992.
  • 14. Herranz J., Identity-based ring signatures from RSA, Theoretical Computer Science, 89 (2), 100-117, 2007.
  • 15. Ham L., Ren J., Efficient identity-based RSA multisignatures, Computer & Security, 27 (2), 12-15 March 2008.
  • 16. Menezes A. J., Oorschot P. C., Vanstone S. A., Handbook of applied cryptography, Boca Raton: CRC Press, ISBN: 0-8493-8523-7, 1997.
  • 17. Bellovin S.M., Cryptography and the internet, 18th Annual International Cryptology Conference Santa Barbara, California, USA, 107-111, 23-27 Ağustos, 1998.
  • 18. Schneier B., Applied cryptography - Protocols, Algorithms and Source Code in C, John Wiley & Sons, Inc., 2nd edition, 1996.
  • 19. Amir M. A., Esther R., Compressive sensing: From compressing while sampling to compressing and securing while sampling, 32nd Annual International Conference of the IEEE EMBS Buenos Aires, Argentina, 7-11, 31 Ağustos-4 Eylül, 2010.
  • 20. Minal C., Rajankar S., Study the effects of encryption on compressive sensed data, International Journal of Engineering and Advanced Technology, 2 (5), 2249- 8958, 2013.
  • 21. Rachlin Y., Baron D., The secrecy of compressed sensing measurements, In:Proceedings of the 46th annual allerton conference on communication, control, and computing, Monticello, Illinois, 813-17, 23-26 Eylül, 2008.
  • 22. Dwork C., McSherry F., Talwar K., The price of privacy and the limits of LP decoding, Proceedings of the 39th Annual ACM Symposium on Theory of Computing, San Diego, California, USA, 85-94, 11-13 Haziran, 2007.
  • 23. Örsdemir A., Altun H., Sharma G., On the security and robustness of encryption via compressed sensing, In: Proceedings of the IEEE military communications conference, San Diego, California, 16-19 Kasım, 2008.
  • 24. Ramezani M., Seyfe B., Bafghi H.G., Perfect secrecy via compressed sensing, Communication and Information Theory, Tahran-İran, 1-5, 8-9 Mayıs 2013.
  • 25. Zhang Y., Wong K., Xiao D., Zhang L.Y., Li M., Embedding cryptographic features in compressive sensing, Cryptography and Security, Information
  • 26. Zhang X., Ren Y., Feng G., Qian Z., Compressing encrypted image using compressive sensing, Intelligent information hiding and multimedia signal processing, 2011 Seventh International Conference on, Dalian- Çin, 222 - 225, 14-16 Ekim, 2011.
  • 27. Yan M., Zhang A., Zheng F., Zhou N., An image compression-encryption algorithm based on 2-D compressive sensing, Journal of Computational Information Systems, 9 (24), 57-64, 2013.
  • 28. Atar E., Ersoy O., Özyılmaz L., Sıkıştırıcı algılama dik eşleştirme arayış yöntemi ile kriptografi, Signal Processing and Communications Applications Conference (SIU), 2015 23th, Malatya Üniversitesi, Malatya, 216-219, 16-19 Mayıs 2015.
  • 29. Abdulghani A., Rodriguze-Villegas E., Compressive sensing: from compressing while sampling to compressing and securing while sampling, In: Proceedings of the 32nd annual international conference of the IEEE engineering in medicine and biology society, Buenos Aires-Argentina, 1127-30, 1-4 Eylül, 2010.
  • 30. Çavuşoğlu Ü., Uyaroğlu Y., Pehlivan İ., Design of a continuous-time autonomous chaotic circuit and application of signal masking'', Journal of the Faculty of Engineering and Architecture of Gazi University, 29 (1), 79-87, 2014.
  • 31. Uğur A., Soğukpınar İ., Sustainable authorization in enterprise workflow and authorized digital signature model, Journal of the Faculty of Engineering and Architecture of Gazi University, 29 (3), 559-568, 2014.
  • 32. Erdem O.A., Kocaoğlu R., A new approach for network security: dynamic intelligent firewall architecture, Journal of the Faculty of Engineering and Architecture of Gazi University, 29 (4), 707-715, 2014.
  • 33. Dener M., A secure monitoring system design for wireless sensor networks, Journal of the Faculty of Engineering and Architecture of Gazi University, 29 (4), 745-754, 2014.
  • 34. Peng X., Zhang P., Yu B., Wei H., Known-plaintext attack on optical encryption based on double random phase keys, Optics Letters, 31 (8) 15-23, 2006.