Simultaneous Audio Encryption and Compression Using Compressive Sensing Techniques

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Simultaneous image compression, fusion and encryption algorithm based on compressive sensing and chaos

In this paper, a novel approach based on compressive sensing and chaos is proposed for simultaneously compressing, fusing and encrypting multi-modal images. The sparsely represented source images are firstly measured with the key-controlled pseudo-random measurement matrix constructed using logistic map, which reduces the data to be processed and realizes the initial encryption. Then the obtain...

متن کامل

Wavelet Based Compressive Sensing Techniques for Image Compression

Compressive sensing (CS) exploits the sparsity of the commonly encountered signals and provides the data compression at the first step of the image acquisition. In this paper, performance of various wavelet based CS techniques has been analysed. It is based on the concept that small collections of non-adaptive linear projections of a sparse signal contain enough information for its effective re...

متن کامل

Simultaneous Compression and Encryption of Video Sequences Based on 3D Compressive Sensing and 3D Discrete Fractional Random Transform

In this paper, we propose a novel video sequences compression and encryption method combining 3D compressive sensing (3D-CS) with 3D discrete fractional random transform (3D-DFrRT). In this scheme, the original video sequences were transformed with discrete wavelet and measured by three Gaussion random matrices to achieve compression and encryption simultaneously, and then the resulting 3D imag...

متن کامل

Detection and Identification of Sparse Audio Tampering Using Distributed Source Coding and Compressive Sensing Techniques

In most practical applications, for the sake of information integrity not only it is useful to detect whether a multimedia content has been modified or not, but also to identify which kind of attack has been carried out. In the case of audio streams, for example, it may be useful to localize the tamper in the time and/or frequency domain. In this paper we devise a hash-based tampering detection...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Electronics

سال: 2020

ISSN: 2079-9292

DOI: 10.3390/electronics9050863