A Lightweight Secure Image Super Resolution using Network Coding

被引:2
作者
Quoc-Tuan Vien [1 ]
Nguyen, Tuan T. [2 ]
Nguyen, Huan X. [1 ]
机构
[1] Middlesex Univ, Fac Sci & Technol, London NW4 4BL, England
[2] Buckingham Univ, Sch Comp, Hunter St, Buckingham MK18 1EG, England
来源
VISAPP: PROCEEDINGS OF THE 16TH INTERNATIONAL JOINT CONFERENCE ON COMPUTER VISION, IMAGING AND COMPUTER GRAPHICS THEORY AND APPLICATIONS - VOL. 4: VISAPP | 2021年
关键词
Image Communication; Deep Learning; Super-resolution; Network Coding; INTERPOLATION;
D O I
10.5220/0010212406530660
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Images play an important part in our daily life. They convey our personal stories and maintain meaningful objects, events, emotions etc. People, therefore, mostly use images as visual information for their communication with each other. Data size and privacy are, however, two of important aspects whilst transmitting data through network like internet, i.e. the time prolongs when the amount of data are increased and the risk of exposing private data when being captured and accessed by irrelevant people. In this paper, we introduce a unified framework, namely Deep-NC, to address these problems seamlessly. Our method contains three important components: the first component, adopted from Random Linear Network Coding (RLNC), to protect the sharing of private image from the eavesdropper; the second component to remove noise causing to image data due to transmission over wireless media; and the third component, utilising Image Super-Resolution (ISR) with Deep Learning (DL), to recover high-resolution images from low-resolution ones due to image sizes reduced. This is a general framework in which each component can be enhanced by sophisticated methods. Simulation results show that an outperformance of up to 32 dB, in terms of Peak Signal-to-Noise Ratio (PSNR), can be obtained when the eavesdropper does not have any knowledge of parameters and the reference image used in the mixing schemes. Various impacts of the method are deeply evaluated to show its effectiveness in securing transmitted images. Furthermore, the original image is shown to be able to downscale to a much lower resolution for saving significantly the transmission bandwidth with negligible performance loss.
引用
收藏
页码:653 / 660
页数:8
相关论文
共 22 条
  • [1] Network information flow
    Ahlswede, R
    Cai, N
    Li, SYR
    Yeung, RW
    [J]. IEEE TRANSACTIONS ON INFORMATION THEORY, 2000, 46 (04) : 1204 - 1216
  • [2] Techniques for data hiding
    Bender, W
    Gruhl, D
    Morimoto, N
    Lu, A
    [J]. IBM SYSTEMS JOURNAL, 1996, 35 (3-4) : 313 - 336
  • [3] Chen P.Y., 2006, INT J APPL SCI ENG, V4, P275, DOI DOI 10.6703/IJASE/2006.4(3).275
  • [4] DUCHON CE, 1979, J APPL METEOROL, V18, P1016, DOI 10.1175/1520-0450(1979)018<1016:LFIOAT>2.0.CO
  • [5] 2
  • [6] Franz E., 1996, Information Hiding. First International Workshop Proceedings, P7
  • [7] Goodfellow I, 2016, ADAPT COMPUT MACH LE, P1
  • [8] Grubinger M, 2006, INT WORKSH ONT
  • [9] Minimal Information Exchange for Secure Image Hash-Based Geometric Transformations Estimation
    Guerrini, Fabrizio
    Dalai, Marco
    Leonardi, Riccardo
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2020, 15 (15) : 3482 - 3496
  • [10] Deep Back-Projection Networks For Super-Resolution
    Haris, Muhammad
    Shakhnarovich, Greg
    Ukita, Norimichi
    [J]. 2018 IEEE/CVF CONFERENCE ON COMPUTER VISION AND PATTERN RECOGNITION (CVPR), 2018, : 1664 - 1673