[1] WEI Zhi-qiang, YANG Guang, CONG Yan-ping. Security of underwater sensor networks[J]. Chinese Journal of Computer, 2012, 35(8): 1594-1606.
[2] CHEN Lai-jun, MEI Sheng-wei, CHEN Ying. Smart grid information security and its influence on power system survivability[J]. Control Theory & Applications, 2012, 29(2): 240-244.
[3] PAN Jing, QI Na, XUE Bing-bing, et al. Field programmable gate array-based chaotic encryption system design and hardware realization of cell phone short message[J]. Acta Physica Sinica, 2012, 61(18): 72-83.
[4] DIFFIE W, HELLMAN M F. New directions in cryptography[J]. IEEE Transaction on Information Theory, 1976, 22(6): 644-654.
[5] SHANNON C E. Communication theory of secrecy systems[J]. Bell System Technology Journal, 1949, 28(4): 656-715.
[7] YUAN S, ZHOU X, ALAM M S, et al. Information hiding based on double random-phase encoding technology and public-key cryptography[J]. Optics Express, 2009, 17(5): 3270-3284.
[8] LU X, ZHOU X, LU P, et al. Determination of optimal parameters for detecting the existence of secret information hidden by the double random-phase encoding technique[J]. Optics & Laser Technology, 2009, 41(6): 751-754.
[9] CAND′ES E J, ROMBERG J, TAO T, Robust uncertainty principles: exact signal reconstruction from highly incomplete frequency information[J]. IEEE Transactions on Information Theory, 2006, 52(2): 489-509.
[10] JIAO Li-cheng, YANG Shu-yuan, LIU Fang, et al. Development and prospect of compressive sensing[J]. Acta Electronica Sinica, 2011, 39(7): 1651-1662.
[11] XU Zhi-qiang. Compressed sensing[J]. Scientia Sinica Mathematica, 2012, 42(9): 865-877.
[12] SHI Guang-ming, LIU Dan-hua, GAO Da-hua, et al. Advances in theory and applicaiton of compressed sensing[J]. Acta Electronica Sinica, 2009, 37(5): 1071-1081.
[13] VENKATRAMAN D, MAKUR A. A compressive sensing approach to object-based surveillance video coding[J]. IEEE Acoustics, Speech and Signal Processing, 2009: 3513-3516.
[15] ORSDEMIR A, ALTUN H O, SHARMA G, et al. On the security and robustness of encryption via compressed sensing[C].IEEE Military Communications Conference, 2008: 1-7.
[16] LIANG Jing-sai. Image secret sharing based on compressed sensing[C]. Advances in Mathematics and Its Applications, 2011:149-162.
[18] HUANG R, SAKURAI K. A robust and compression-combined digital image encryption method based on compressive sensing[C]. Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP), 2011 Seventh International Conference on. IEEE, 2011: 105-108.
[20] ATHIRA V, GEORGE S N, DEEPTHI P P. A novel encryption method based on compressive sensing[C]. Automation, Computing, Communication, Control and Compressed Sensing (iMac4s), 2013 International Multi-Conference on. IEEE, 2013: 271-275.
[21] ZHANG A, ZHOU N, GONG L. Color image encryption algorithm combining compressive sensing with arnold transform[J]. Journal of Computers, 2013, 8(11): 2857-2863.
[22] RACHLIN Y, BARON D. The secrecy of compressed sensing measurements[C]. 46th Annual Allerton Conference on Communication, Control and Computing, 2008, 813-817.
[23] REFREGIER P, JAVIDI B. Optical image encryption based on input plane and Fourier plane random encoding[J]. Optics Letters, 1995, 20(7): 767-769.
[24] JAVIDI B, SERGENT A, AHOUZI E. Performance of double phase encoding encryption technique using binarized encrypted images[J]. Optical Engineering, 1998, 37(2): 565-569.
[25] CANDS E J, WAKIN M, An introduction to compressive sampling[J]. IEEE Signal Processing Magazine, 2008, 25(2): 21-30.
[26] DONOHO D L, Compressive sensing[J]. IEEE Transaction on Information Theory, 2006, 52 (4): 1289-1306.
[27] BARANIUK R G. Compressive sensing[J]. IEEE Signal Processing Magazine, 2007, 24(4): 118-120, 124.
[28] BAILEY D H, CRANDALL R E. On the random character of fundamental constant expansions[J]. Experimental Mathematics, 2001, 10(2): 175-190.
[29] PRASAD M, SUDHA K L. Chaos image encryption using pixel shuffling[J]. Computer Science & Information Technology, 2011, 4(1): 169-179.
[30] YE G. Image scrambling encryption algorithm of pixel bit based on chaos map[J]. Pattern Recognition Letters, 2010, 31(5): 347-354.