Privacy-preserving Outsourcing of Parallel Magnetic Resonance Image Reconstruction

被引:0
|
作者
Shan, Zihao [1 ]
Ren, Kui [1 ]
Qin, Zhan [1 ]
机构
[1] SUNY Buffalo, Dept Comp Sci & Engn, Buffalo, NY 14228 USA
关键词
D O I
10.1109/PAC.2017.19
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
With the rapid technological advances in parallel imaging reconstruction, Magnetic Resonance Imaging (MRI) has been increasingly popularized for clinical diagnosis. Among the state-of-the-art approaches, the Simultaneous Auto-calibrating and k-space Estimation (SAKE) realizes a calibration-free reconstruction with high-quality results. However, its reconstruction procedures are still time-consuming under clinical settings in terms of the large data matrix. To accelerate the reconstruction speed in SAKE, a novel idea is outsourcing the complex computation to the cloud and leverage the abundant computing resources. But how to concurrently protect the patients' data privacy becomes the major challenge. To address this issue, we propose to apply a series of random matrices and transformations to hide the original data matrix, which enables the clinic to securely derive the approximate solution and check its correctness. The efficiency of the proposed protocol is then validated in the experiment compared to original SAKE.
引用
收藏
页码:204 / 205
页数:2
相关论文
共 50 条
  • [31] Efficient Privacy-Preserving Inference Outsourcing for Convolutional Neural Networks
    Yang, Xuanang
    Chen, Jing
    He, Kun
    Bai, Hao
    Wu, Cong
    Du, Ruiying
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2023, 18 : 4815 - 4829
  • [32] Privacy-preserving and verifiable protocols for scientific computation outsourcing to the cloud
    Chen, Fei
    Xiang, Tao
    Yang, Yuanyuan
    JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING, 2014, 74 (03) : 2141 - 2151
  • [33] CloudBI: Practical Privacy-Preserving Outsourcing of Biometric Identification in the Cloud
    Wang, Qian
    Hu, Shengshan
    Ren, Kui
    He, Meiqi
    Du, Minxin
    Wang, Zhibo
    COMPUTER SECURITY - ESORICS 2015, PT II, 2015, 9327 : 186 - 205
  • [34] A privacy-preserving parallel and homomorphic encryption scheme
    Min, Zhaoe
    Yang, Geng
    Shi, Jingqi
    OPEN PHYSICS, 2017, 15 (01): : 135 - 142
  • [35] Privacy-Preserving Outsourcing Scheme for SVM on Vertically Partitioned Data
    Qiu, Guowei
    Huo, Hua
    Gui, Xiaolin
    Dai, Huijun
    SECURITY AND COMMUNICATION NETWORKS, 2022, 2022
  • [36] Parallel Privacy-Preserving Shortest Path Algorithms
    Anagreh, Mohammad
    Laud, Peeter
    Vainikko, Eero
    CRYPTOGRAPHY, 2021, 5 (04)
  • [37] Privacy-preserving outsourced image feature extraction
    Li, Dongmei
    Doug, Xiaolei
    Cao, Zhenfu
    Wang, Haijiang
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2019, 47 : 59 - 64
  • [38] PLCOM: Privacy-preserving outsourcing computation of Legendre circularly orthogonal moment over encrypted image data
    Yang, Tengfei
    Ma, Jianfeng
    Miao, Yinbin
    Liu, Ximeng
    Wang, Xuan
    Meng, Qian
    INFORMATION SCIENCES, 2019, 505 : 198 - 214
  • [39] Image Disguising for Privacy-preserving Deep Learning
    Sharma, Sagar
    Chen, Keke
    PROCEEDINGS OF THE 2018 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'18), 2018, : 2291 - 2293
  • [40] Privacy-preserving DeepFake face image detection
    Chen, Beijing
    Liu, Xin
    Xia, Zhihua
    Zhao, Guoying
    DIGITAL SIGNAL PROCESSING, 2023, 143