Home>Results

  • Complex
  • Title
  • Keyword
  • Abstract
  • Scholars
  • Journal
  • ISSN
  • Conference
成果搜索

[期刊论文]

Privacy-Preserving Krawtchouk Moment feature extraction over encrypted image data

Share
Edit Delete 报错

author:

Yang, T. (Yang, T..) [1] | Ma, J. (Ma, J..) [2] | Miao, Y. (Miao, Y..) [3] | Unfold

Indexed by:

Scopus

Abstract:

Resource-constrained users outsource the massive image data to the cloud to reduce storage and computation overhead locally, but security and privacy concerns seriously hinder the applications of outsourced image processing services. Besides, existing image processing solutions in the encrypted domain still bring high computation overhead, and even lead to characteristic loss. To this end, we propose a Privacy-Preserving Krawtchouk Moment (PPKM) feature extraction framework over encrypted image data by utilizing the Paillier cryptosystem. First, a mathematical framework for PPKM implementation and image reconstruction is presented in the encrypted domain. Then, the detailed expanding factor and upper bound analysis shows that plaintext Krawtchouk moment and plaintext image reconstruction can be realized over encrypted image with PPKM. Furthermore, the computation complexity of PPKM can be significantly reduced with the block-based parallel algorithm. Experimental results verify that the PPKM is feasible and acceptable in practice in terms of image reconstruction capability and image recognition accuracy. © 2020

Keyword:

Image recognition; Image reconstruction; Krawtchouk moment; Paillier cryptosystem; Privacy preserving

Community:

  • [ 1 ] [Yang, T.]School of Cyber Engineering, Xidian University, Xi'an, 710071, China
  • [ 2 ] [Yang, T.]State Key Laboratory of Cryptology, P.O.Box 5159, Beijing, 100878, China
  • [ 3 ] [Yang, T.]Shaanxi Key Laboratory of Network and System Security, Xidian University, Xi'an, 710071, China
  • [ 4 ] [Ma, J.]School of Cyber Engineering, Xidian University, Xi'an, 710071, China
  • [ 5 ] [Ma, J.]Shaanxi Key Laboratory of Network and System Security, Xidian University, Xi'an, 710071, China
  • [ 6 ] [Miao, Y.]School of Cyber Engineering, Xidian University, Xi'an, 710071, China
  • [ 7 ] [Miao, Y.]State Key Laboratory of Cryptology, P.O.Box 5159, Beijing, 100878, China
  • [ 8 ] [Liu, X.]College of Mathematics and Computer Science, Fuzhou University, Fuzhou, Fujian Province 350116, China
  • [ 9 ] [Liu, X.]Key Laboratory of Information Security of Network Systems, Fujian Province, Fuzhou, 350116, China
  • [ 10 ] [Wang, X.]School of Physics and Information Technology, Shaanxi Normal University, Xi'an, 710062, China
  • [ 11 ] [Xiao, B.]Chongqing Key Laboratory of Image cognition, Chongqing University of Posts and Telecommunications400065, China
  • [ 12 ] [Meng, Q.]Shaanxi Key Laboratory of Network and System Security, Xidian University, Xi'an, 710071, China
  • [ 13 ] [Meng, Q.]School of Telecommunication Engineering, Xidian University, Xi'an, 710071, China

Reprint 's Address:

  • [Ma, J.]School of Cyber Engineering, Xidian UniversityChina

Show more details

Source :

Information Sciences

ISSN: 0020-0255

Year: 2020

Volume: 536

Page: 244-262

6 . 7 9 5

JCR@2020

0 . 0 0 0

JCR@2023

ESI HC Threshold:149

JCR Journal Grade:1

CAS Journal Grade:1

Cited Count:

WoS CC Cited Count:

SCOPUS Cited Count: 10

30 Days PV: 2

Affiliated Colleges:

Online/Total:41/10131081
Address:FZU Library(No.2 Xuyuan Road, Fuzhou, Fujian, PRC Post Code:350116) Contact Us:0591-22865326
Copyright:FZU Library Technical Support:Beijing Aegean Software Co., Ltd. 闽ICP备05005463号-1