سیویلیکا را در شبکه های اجتماعی دنبال نمایید.

Secure Reconstruction of Image from Compressive Sensing in Cloud

Publish Year: 1393
Type: Conference paper
Language: English
View: 1,244

This Paper With 8 Page And PDF Format Ready To Download

Export:

Link to this Paper:

Document National Code:

CITCONF02_048

Index date: 8 May 2016

Secure Reconstruction of Image from Compressive Sensing in Cloud abstract

Application of Large-scale images has been increased rapidly. Today the trend to use the cloud for storing data and take advantage of its computational capability for running complex algorithms have been grown. In outsourcing images two important issues must be considered: first, compression for efficient use of cloud’s storage that in our research compressive sensing (CS) used as secure method for reducing the capacity of image; second, be confident of privacy-assured by cloud service, because cloud as third party in communication between sender and user, should not be permitted to access the plain image that in many cases has privacy information. To assure this privacy, we propose a very easy and effective method that uses the sparseness of image and just by simple random permutation key, mapped the plain sparse vector into another sparse vector by applying permutation and substitution on components of plain sparse vector simultaneously. Afterward, this encrypted sparse vector is input of CS, and then the compressed encrypted image transmitted to cloud via unsecure channel. On-demand of user, cloud will reconstruct the compressed image and shares the encrypted image, real user by privacy key, could be able to decrypt it, even by very weak devices.

Secure Reconstruction of Image from Compressive Sensing in Cloud Keywords:

Secure Reconstruction of Image from Compressive Sensing in Cloud authors

Hadi Zand

Electrical Engineering Department, Iran University of Science and Technology, Narmak,

Hadi Shahriar Shahhoseini

Electrical Engineering Department, Iran University of Science and Technology, Narmak,

مراجع و منابع این Paper:

لیست زیر مراجع و منابع استفاده شده در این Paper را نمایش می دهد. این مراجع به صورت کاملا ماشینی و بر اساس هوش مصنوعی استخراج شده اند و لذا ممکن است دارای اشکالاتی باشند که به مرور زمان دقت استخراج این محتوا افزایش می یابد. مراجعی که مقالات مربوط به آنها در سیویلیکا نمایه شده و پیدا شده اند، به خود Paper لینک شده اند :
D. Donoho, : Compressed sensing, " IEEE Trans. Inf. Theory, ...
nd National Conference on Applied Research in Computer Science and ...
A. Divekar and O. Ersoy, Compact storage of correlated data ...
A. Orsdemir, H. O. Altun, G. Sharma, and M. F. ...
Y. Rachlin and D Baron, "The secrecy of compressed sensing ...
S. S. Chen, D. L. Donoho, and M. A. Saunders, ...
P. S. Huggins and S. W. Zucker, "Greedy Basis Pursuit, ...
Y. C. Pati, R. Rezaiifar, P. S. Krishnaprasad, Orthogonal matching ...
G. H. Mohimani, M. B. Member, and C. J. Fellow, ...
C. W. Member and B. Z. Member, _ _ vacy-Assured ...
E. Candes, _ _ _ restricted isometry property and its ...
1.C. Pavlopoulou, A. C. Kak, and C. E. Brodley, _ ...
نمایش کامل مراجع