Secure Overcomplete Dictionary Learning for Sparse Representation

被引:14
作者
Nakachi, Takayuki [1 ]
Bandoh, Yukihiro [1 ]
Kiya, Hitoshi [2 ]
机构
[1] NTT Corp, Yokosuka, Kanagawa 2390847, Japan
[2] Tokyo Metropolitan Univ, Hino, Tokyo 1910065, Japan
关键词
sparse representation; dictionary learning; random unitary transform; secure computation; SYSTEMS;
D O I
10.1587/transinf.2019MUP0009
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, we propose secure dictionary learning based on a random unitary transform for sparse representation. Currently, edge cloud computing is spreading to many application fields including services that use sparse coding. This situation raises many new privacy concerns. Edge cloud computing poses several serious issues for end users, such as unauthorized use and leak of data, and privacy failures. The proposed scheme provides practical MOD and K-SVD dictionary learning algorithms that allow computation on encrypted signals. We prove, theoretically, that the proposal has exactly the same dictionary learning estimation performance as the non-encrypted variant of MOD and K-SVD algorithms. We apply it to secure image modeling based on an image patch model. Finally, we demonstrate its performance on synthetic data and a secure image modeling application for natural images.
引用
收藏
页码:50 / 58
页数:9
相关论文
共 21 条
[1]   K-SVD: An algorithm for designing overcomplete dictionaries for sparse representation [J].
Aharon, Michal ;
Elad, Michael ;
Bruckstein, Alfred .
IEEE TRANSACTIONS ON SIGNAL PROCESSING, 2006, 54 (11) :4311-4322
[2]  
[Anonymous], 2018, IEEE ICSPCS2018
[3]  
[Anonymous], INT C FRONT IM PROC
[4]  
[Anonymous], IEICE TECHNICAL REPO
[5]  
[Anonymous], IEICE TECHNICAL REPO
[6]   Privacy Protection in Biometric-Based Recognition Systems [A marriage between cryptography and signal processing] [J].
Barni, Mauro ;
Droandi, Giulia ;
Lazzeretti, Riccardo .
IEEE SIGNAL PROCESSING MAGAZINE, 2015, 32 (05) :66-76
[7]  
Brakerski Z., 2018, Report No. 125
[8]   On the Security of Block Scrambling-Based EtC Systems against Extended Jigsaw Puzzle Solver Attacks [J].
Chuman, Tatsuya ;
Kurihara, Kenta ;
Kiya, Hitoshi .
IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2018, E101D (01) :37-44
[9]   Sparse and Redundant Representation Modeling-What Next? [J].
Elad, Michael .
IEEE SIGNAL PROCESSING LETTERS, 2012, 19 (12) :922-928
[10]  
Elad M, 2010, SPARSE AND REDUNDANT REPRESENTATIONS, P3, DOI 10.1007/978-1-4419-7011-4_1