4.6 Article

Privacy-Enhanced and Verifiable Compressed Sensing Reconstruction for Medical Image Processing on the Cloud

相关参考文献

注意:仅列出部分参考文献,下载原文获取全部文献信息。
Article Computer Science, Information Systems

Privacy-Preserving cloud-Aided broad learning system

Haiyang Liu et al.

Summary: The paper introduces a secure, efficient, and verifiable outsourcing algorithm for BLS, allowing resource-constrained devices to outsource BLS algorithm to cloud server for model training while ensuring the confidentiality of client's sensitive information. It also enables client to verify the correctness of returned results with a high probability.

COMPUTERS & SECURITY (2022)

Article Computer Science, Information Systems

Novel Secure Outsourcing of Modular Inversion for Arbitrary and Variable Modulus

Chengliang Tian et al.

Summary: This paper proposes a novel technique using unimodular matrix transformation to achieve secure outsourcing of modular inversion. The technique supports arbitrary and variable modulus, is based on a single untrusted program model, requires only one round interaction, and enables verification of result correctness. Theoretical analysis and experimental results demonstrate the computational savings achieved by the proposed algorithm on local clients.

IEEE TRANSACTIONS ON SERVICES COMPUTING (2022)

Article Engineering, Multidisciplinary

Machine Learning on Cloud With Blockchain: A Secure, Verifiable and Fair Approach to Outsource the Linear Regression

Hanlin Zhang et al.

Summary: This paper discusses the data analysis for CPSS with Linear Regression and introduces a secure, verifiable, and fair approach to outsource LR to an untrustworthy cloud-server, implemented on the Ethereum blockchain.

IEEE TRANSACTIONS ON NETWORK SCIENCE AND ENGINEERING (2022)

Article Computer Science, Information Systems

An efficient approach for encrypting double color images into a visually meaningful cipher image using 2D compressive sensing

Xiuli Chai et al.

Summary: A novel double color image encryption algorithm combining 2D compressive sensing with an embedding technique is proposed in this paper, achieving compression and encryption simultaneously and obtaining visually meaningful cipher images. Confusion of the compressed cipher images is done by index sequences generated from a 6D hyperchaotic system, while the relationship of the algorithm with plain images is enhanced by embedding feature parameters into the carrier image.

INFORMATION SCIENCES (2021)

Article Computer Science, Information Systems

Towards a Compressive-Sensing-Based Lightweight Encryption Scheme for the Internet of Things

Wanli Xue et al.

Summary: The Internet of Things (IoT) has penetrated deeply into daily life, providing tremendous opportunities but also potential risks. Kryptein is a lightweight encryption scheme proposed for securing the interaction between IoT devices and the Cloud, supporting compressed encryption, statistical computation, and accurate data decryption to provide strong protection.

IEEE TRANSACTIONS ON MOBILE COMPUTING (2021)

Article Computer Science, Hardware & Architecture

Lattice-based weak-key analysis on single-server outsourcing protocols of modular exponentiations and basic countermeasures

Yunhai Zheng et al.

Summary: This study investigates the secure outsourcing of modular exponentiations in cryptography, identifying privacy issues and proposing attacks and revisions for certain protocols. The research shows that multiple modular exponentiation protocols become more efficient as the number of exponentiations increases.

JOURNAL OF COMPUTER AND SYSTEM SCIENCES (2021)

Proceedings Paper Acoustics

LOW COMPLEXITY SECURE P-TENSOR PRODUCT COMPRESSED SENSING RECONSTRUCTION OUTSOURCING AND IDENTITY AUTHENTICATION IN CLOUD

Mengdi Wang et al.

Summary: The paper proposes a privacy protection method for PTP-CS reconstruction tasks based on cloud computing, using a public measurement matrix and introducing a low-complexity, secure outsourcing model, achieving signal privacy protection and user verification services.

2021 IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS, SPEECH AND SIGNAL PROCESSING (ICASSP 2021) (2021)

Proceedings Paper Computer Science, Artificial Intelligence

Compressive Sensing based Multi-class Privacy-preserving Cloud Computing

Gajraj Kuldeep et al.

2020 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM) (2020)

Article Engineering, Electrical & Electronic

Visual privacy-preserving level evaluation for multilayer compressed sensing model using contrast and salient structural features

Jixin Liu et al.

SIGNAL PROCESSING-IMAGE COMMUNICATION (2020)

Article Computer Science, Information Systems

Efficiently and securely outsourcing compressed sensing reconstruction to a cloud

Yushu Zhang et al.

INFORMATION SCIENCES (2019)

Article Engineering, Electrical & Electronic

Edge Computing Security: State of the Art and Challenges

Yinhao Xiao et al.

PROCEEDINGS OF THE IEEE (2019)

Article Computer Science, Information Systems

A Compressive Sensing based privacy preserving outsourcing of image storage and identity authentication service in cloud

Guiqiang Hu et al.

INFORMATION SCIENCES (2017)

Article Computer Science, Information Systems

Enabling Secure and Fast Indexing for Privacy-Assured Healthcare Monitoring via Compressive Sensing

Xingliang Yuan et al.

IEEE TRANSACTIONS ON MULTIMEDIA (2016)

Review Computer Science, Information Systems

A Review of Compressive Sensing in Information Security Field

Yushu Zhang et al.

IEEE ACCESS (2016)

Proceedings Paper Computer Science, Information Systems

Support-Set-Assured Parallel Outsourcing of Sparse Reconstruction Service for Compressive Sensing in Multi-Clouds

Yushu Zhang et al.

2015 INTERNATIONAL SYMPOSIUM ON SECURITY AND PRIVACY IN SOCIAL NETWORKS AND BIG DATA (SOCIALSEC 2015) (2015)

Article Computer Science, Information Systems

Efficient computation outsourcing for inverting a class of homomorphic functions

Fangguo Zhang et al.

INFORMATION SCIENCES (2014)

Article Computer Science, Information Systems

Dividing secrets to secure data outsourcing

Fatih Emekci et al.

INFORMATION SCIENCES (2014)

Article Computer Science, Theory & Methods

Privacy-preserving and verifiable protocols for scientific computation outsourcing to the cloud

Fei Chen et al.

JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING (2014)

Article Computer Science, Information Systems

Privacy-Assured Outsourcing of Image Reconstruction Service in Cloud

Cong Wang et al.

IEEE TRANSACTIONS ON EMERGING TOPICS IN COMPUTING (2013)

Article Computer Science, Software Engineering

Security Challenges for the Public Cloud

Kui Ren et al.

IEEE INTERNET COMPUTING (2012)

Article Computer Science, Information Systems

Subspace Pursuit for Compressive Sensing Signal Reconstruction

Wei Dai et al.

IEEE TRANSACTIONS ON INFORMATION THEORY (2009)

Article Mathematics

The restricted isometry property and its implications for compressed sensing

Emmanuel J. Candes

COMPTES RENDUS MATHEMATIQUE (2008)

Article Engineering, Electrical & Electronic

An introduction to compressive sampling

Emmanuel J. Candes et al.

IEEE SIGNAL PROCESSING MAGAZINE (2008)

Article Engineering, Electrical & Electronic

Compressive sensing

Richard G. Baraniuk

IEEE SIGNAL PROCESSING MAGAZINE (2007)

Article Computer Science, Information Systems

Near-optimal signal recovery from random projections: Universal encoding strategies?

Emmanuel J. Candes et al.

IEEE TRANSACTIONS ON INFORMATION THEORY (2006)

Article Computer Science, Information Systems

Compressed sensing

DL Donoho

IEEE TRANSACTIONS ON INFORMATION THEORY (2006)

Article Computer Science, Information Systems

Robust uncertainty principles:: Exact signal reconstruction from highly incomplete frequency information

EJ Candès et al.

IEEE TRANSACTIONS ON INFORMATION THEORY (2006)