Power normalized cepstral robust features of deep neural networks in a cloud computing data privacy protection scheme

被引:37
作者
Li, Mianjie [1 ]
Tian, Zhihong [2 ]
Du, Xiaojiang [3 ]
Yuan, Xiaochen [4 ]
Shan, Chun [1 ,5 ]
Guizani, Mohsen [6 ]
机构
[1] Guangdong Polytech Normal Univ, Sch Elect & Informat, Guangzhou 510665, Peoples R China
[2] Guangzhou Univ, Cyberspace Inst Adv Technol, Guangzhou 510006, Peoples R China
[3] Stevens Inst Technol, Dept Elect & Comp Engn, Hoboken, NJ 07030 USA
[4] Macao Polytech Univ, Fac Appl Sci, Macau, Peoples R China
[5] Southern Marine Sci & Engn Guangdong Lab Zhuhai, Zhuhai 519080, Peoples R China
[6] Qatar Univ, Dept Comp Sci & Engn, Doha, Qatar
基金
国家重点研发计划;
关键词
Deep Neural Networks (DNNs); Cloud Computing; Data Privacy Protection; Data Security; Power Normalized Cepstrum-based Robust; Feature Detector (PNC-RFD); AUDIO WATERMARKING; SYNCHRONIZATION; TRANSFORM;
D O I
10.1016/j.neucom.2022.11.001
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Deep Neural Networks (DNNs) have developed rapidly in data privacy protection applications such as medical treatment and finance. However, DNNs require high-speed and high-memory computers in terms of computation, otherwise training can be very lengthy. Furthermore, DNNs are often not available in resource-constrained mobile devices. Therefore, training and executing DNNs are increasingly using cloud computing. In the paper, the Power Normalized Cepstrum-based Robust Feature Detector (PNC-RFD), with deep learning in the cloud computing, is proposed for data privacy protection. The proposed PNC-RFD extracts a specified number of signal segments of high robustness used to embed and extract various data. For the sake of embedding and extracting the data, a method of information hiding employ-ing Dual-Tree Complex Wavelet Packet Transform (DT CWPT) is therefore presented. The presented scheme simultaneously embeds multiple data into coefficients of the DT CWPT of signal segments. By embedding the data into the orthogonal spaces, the proposed method ensures the independent extraction of the multiple data. In line with the performance analysis, the superiority of the presented scheme is elaborated through making the comparison with the current state-of-the-art methods. (c) 2022 Elsevier B.V. All rights reserved.
引用
收藏
页码:165 / 173
页数:9
相关论文
共 31 条
[1]   Security in Internet of Things: issues, challenges, taxonomy, and architecture [J].
Adat, Vipindev ;
Gupta, B. B. .
TELECOMMUNICATION SYSTEMS, 2018, 67 (03) :423-441
[2]   On the dual-tree complex wavelet packet and M-band transforms [J].
Bayram, Ilker ;
Selesnick, Ivan W. .
IEEE TRANSACTIONS ON SIGNAL PROCESSING, 2008, 56 (06) :2298-2310
[3]   An audio watermarking scheme using singular value decomposition and dither-modulation quantization [J].
Bhat K, Vivekananda ;
Sengupta, Indranil ;
Das, Abhijit .
MULTIMEDIA TOOLS AND APPLICATIONS, 2011, 52 (2-3) :369-383
[4]   Distributed denial of service (DDoS) attack mitigation in software defined network (SDN)-based cloud computing environment [J].
Bhushan, Kriti ;
Gupta, B. B. .
JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2019, 10 (05) :1985-1997
[5]   Quantization index modulation: A class of provably good methods for digital watermarking and information embedding [J].
Chen, B ;
Wornell, GW .
IEEE TRANSACTIONS ON INFORMATION THEORY, 2001, 47 (04) :1423-1443
[6]   Audio Watermarking Based on Fibonacci Numbers [J].
Fallahpour, Mehdi ;
Megias, David .
IEEE-ACM TRANSACTIONS ON AUDIO SPEECH AND LANGUAGE PROCESSING, 2015, 23 (08) :1273-1282
[7]   Robust time-spread echo watermarking using characteristics of host signals [J].
Hu, Peng ;
Peng, Dezhong ;
Yi, Zhang ;
Xiang, Yong .
ELECTRONICS LETTERS, 2016, 52 (01) :5-6
[8]   Audio watermarking algorithm against synchronization attacks using global characteristics and adaptive frame division [J].
Jiang, Weizhen ;
Huang, Xionghua ;
Quan, Yujuan .
SIGNAL PROCESSING, 2019, 162 :153-160
[9]   Audio Watermarking Via EMD [J].
Khaldi, Kais ;
Boudraa, Abdel-Ouahab .
IEEE TRANSACTIONS ON AUDIO SPEECH AND LANGUAGE PROCESSING, 2013, 21 (03) :675-680
[10]   Optimal and secure audio watermarking scheme based on self-adaptive particle swarm optimization and quaternion wavelet transform [J].
Lei, Baiying ;
Zhou, Feng ;
Tan, Ee-Leng ;
Ni, Dong ;
Lei, Haijun ;
Chen, Siping ;
Wang, Tianfu .
SIGNAL PROCESSING, 2015, 113 :80-94