3,804 research outputs found
Secure Lossless Compression with Side Information
Secure data compression in the presence of side information at both a
legitimate receiver and an eavesdropper is explored. A noise-free, limited rate
link between the source and the receiver, whose output can be perfectly
observed by the eavesdropper, is assumed. As opposed to the wiretap channel
model, in which secure communication can be established by exploiting the noise
in the channel, here the existence of side information at the receiver is used.
Both coded and uncoded side information are considered. In the coded side
information scenario, inner and outer bounds on the compression-equivocation
rate region are given. In the uncoded side information scenario, the
availability of the legitimate receiver's and the eavesdropper's side
information at the encoder is considered, and the compression-equivocation rate
region is characterized for these cases. It is shown that the side information
at the encoder can increase the equivocation rate at the eavesdropper. Hence,
the side information at the encoder is shown to be useful in terms of security;
this is in contrast with the pure lossless data compression case where side
information at the encoder would not help.Comment: To appear in the Proceedings of the 2008 IEEE Information Theory
Workshop, Porto, Portugal, May 5-9, 200
Compression of encrypted three-dimensional objects using digital holography
We present the results of applying data compression techniques
to encrypted three-dimensional objects. The objects are captured
using phase-shift digital holography and encrypted using a random
phase mask in the Fresnel domain. Lossy quantization is combined with
lossless coding techniques to quantify compression ratios. Lossless
compression alone applied to the encrypted holographic data achieves
compression ratios lower than 1.05. When combined with quantization
and an integer encoding scheme, this rises to between 12 and 65 (depending
on the hologram chosen and the method of measuring compression
ratio), with good decryption and reconstruction quality. Our techniques
are suitable for a range of secure three-dimensional object
storage and transmission applications
Secure Multiterminal Source Coding with Side Information at the Eavesdropper
The problem of secure multiterminal source coding with side information at
the eavesdropper is investigated. This scenario consists of a main encoder
(referred to as Alice) that wishes to compress a single source but
simultaneously satisfying the desired requirements on the distortion level at a
legitimate receiver (referred to as Bob) and the equivocation rate --average
uncertainty-- at an eavesdropper (referred to as Eve). It is further assumed
the presence of a (public) rate-limited link between Alice and Bob. In this
setting, Eve perfectly observes the information bits sent by Alice to Bob and
has also access to a correlated source which can be used as side information. A
second encoder (referred to as Charlie) helps Bob in estimating Alice's source
by sending a compressed version of its own correlated observation via a
(private) rate-limited link, which is only observed by Bob. For instance, the
problem at hands can be seen as the unification between the Berger-Tung and the
secure source coding setups. Inner and outer bounds on the so called
rates-distortion-equivocation region are derived. The inner region turns to be
tight for two cases: (i) uncoded side information at Bob and (ii) lossless
reconstruction of both sources at Bob --secure distributed lossless
compression. Application examples to secure lossy source coding of Gaussian and
binary sources in the presence of Gaussian and binary/ternary (resp.) side
informations are also considered. Optimal coding schemes are characterized for
some cases of interest where the statistical differences between the side
information at the decoders and the presence of a non-zero distortion at Bob
can be fully exploited to guarantee secrecy.Comment: 26 pages, 16 figures, 2 table
Balancing Compression and Encryption of Satellite Imagery
With the rapid developments in the remote sensing technologies and services, there is a necessity for combined compression and encryption of satellite imagery. The onboard satellite compression is used to minimize storage and communication bandwidth requirements of high data rate satellite applications. While encryption is employed to secure these resources and prevent illegal use of image sensitive information. In this paper, we propose an approach to address these challenges which raised in the highly dynamic satellite based networked environment. This approach combined compression algorithms (Huffman and SPIHT) and encryptions algorithms (RC4, blowfish and AES) into three complementary modes: (1) secure lossless compression, (2) secure lossy compression and (3) secure hybrid compression. The extensive experiments on the 126 satellite images dataset showed that our approach outperforms traditional and state of art approaches by saving approximately (53%) of computational resources. In addition, the interesting feature of this approach is these three options that mimic reality by imposing every time a different approach to deal with the problem of limited computing and communication resources
Secure Lossy Source Coding with Side Information at the Decoders
This paper investigates the problem of secure lossy source coding in the
presence of an eavesdropper with arbitrary correlated side informations at the
legitimate decoder (referred to as Bob) and the eavesdropper (referred to as
Eve). This scenario consists of an encoder that wishes to compress a source to
satisfy the desired requirements on: (i) the distortion level at Bob and (ii)
the equivocation rate at Eve. It is assumed that the decoders have access to
correlated sources as side information. For instance, this problem can be seen
as a generalization of the well-known Wyner-Ziv problem taking into account the
security requirements. A complete characterization of the
rate-distortion-equivocation region for the case of arbitrary correlated side
informations at the decoders is derived. Several special cases of interest and
an application example to secure lossy source coding of binary sources in the
presence of binary and ternary side informations are also considered. It is
shown that the statistical differences between the side information at the
decoders and the presence of non-zero distortion at the legitimate decoder can
be useful in terms of secrecy. Applications of these results arise in a variety
of distributed sensor network scenarios.Comment: 7 pages, 5 figures, 1 table, to be presented at Allerton 201
- …