A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2020; you can also visit the original URL.
The file type is application/pdf
.
Filters
Number Theoretic Transforms for Secure Signal Processing
[article]
2018
arXiv
pre-print
This work presents a novel and comprehensive set of approaches and primitives to efficiently process signals in an encrypted form, by using Number Theoretic Transforms (NTTs) in innovative ways. ...
Approaches based on Secure Signal Processing (SSP) address this challenge by proposing novel mechanisms for signal processing in the encrypted domain and interactive secure protocols to achieve the goal ...
of Number Theoretic Transforms (NTTs), which are the building blocks that we use to produce efficient secure signal processing primitives. ...
arXiv:1607.05229v2
fatcat:mrlorcxrrrg7lbfr7khn7mr2xq
PROTECTED DISCRETE FOURIER TRANSFORM IMPLEMENTATION ON REMOTE COMPUTER SYSTEMS
2020
Information, Computing and Intelligent systems
The proposed method can be applied for effective signal stream processing in clouds. ...
It has been shown theoretically and experimentally that the proposed method allows one to 1-2 orders of magnitude to speed up the processing of signals while maintaining their confidentiality. ...
-Theoretical and experimental study of the effectiveness of the method of secure implementation of discrete transformations in the cloud both in terms of the level of security and in terms of the achievable ...
doi:10.20535/2708-4930.1.2020.216050
fatcat:tl6ydww5ynfqbfv653sqnhxysa
Digital Watermarking – A Multidisciplinary Approach
2013
CVR Journal of Science & Technology
This paper briefly brings out the issue of watermarking in the perspective of different disciplines like Communications, Information Theory, Signal Processing, Human Visual system, Coding Theory, Cryptography ...
For the last six decades, Digital Watermarking, as an art of hiding information in a cover or host image has drawn much attention of researchers from academic institutions and industry. ...
Signal Processing and Mathematical Transformations in watermarking algorithms: There was initial work in the use of basic digital signal processing (DSP) strategies for data hiding. ...
doi:10.32377/cvrjst0504
fatcat:2hgsh6u3xngqbeksyy4qboegvm
Efficient and Secure Outsourcing of DFT, IDFT, and Circular Convolution
2019
IEEE Access
Discrete Fourier transform (DFT), inverse DFT (IDFT), and circular convolution are important tools for analyzing and designing discrete signals and systems, and are widely used in various industries. ...
Through a theoretical explanation and simulation experiment, we show the efficiency, security, and verifiability of the proposed protocol. ...
The fast algorithm for DFT is an important research topic in the field of signal processing. ...
doi:10.1109/access.2019.2915196
fatcat:o5uttrmezzau3k4cu5vpzmgioy
The Integrated Artificial Immune Intrusion Detection Model Based on Decision-theoretic Rough Set
2017
International Journal of Network Security
Firstly, by the approach of decision-theoretic rough set attributes reduction algorithm (DTRSA), attributes reduction was finished. ...
The authors would like to thank the anonymous reviewers for their helpful comments and suggestions. ...
I in is inflammatory signal. Let ω ij be the transformation weight. I is the number of signal types. ...
dblp:journals/ijnsec/DongWZ17
fatcat:62gexpfjbrdphi55a57ie7ttxm
Secure Wireless Network Connectivity with Multi-Antenna Transmission
2011
IEEE Transactions on Wireless Communications
We consider non-colluding and colluding eavesdroppers, and derive the network secure connectivity for both eavesdropper strategies. ...
Recently, information-theoretic security as a physical-layer approach has been widely investigated as a means to provide secure communication. ...
For colluding eavesdroppers, the combined received signal power at the eavesdroppers after centralized processing is given by = ∑ ∈Φ ℎ − . (3)
B. ...
doi:10.1109/twc.2010.112310.101008
fatcat:53rdzqico5ch5bfpv7rxe7diay
Fractional number-theoretic transforms based on matrix functions
2014
2014 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP)
In this paper, we introduce fractional number-theoretic transforms (FrNTT) based on matrix functions. ...
The approach, which is a kind of finite field extension of the method presented in [1], does not require the construction of any numbertheoretic transform eigenvector set. ...
FRACTIONAL NUMBER-THEORETIC TRANSFORM In this section, we introduce a new definition for the fractional number-theoretic transform. The approach follows the idea originally presented in [1] . ...
doi:10.1109/icassp.2014.6854073
dblp:conf/icassp/LimaSL14
fatcat:vxlymueufzb3rfyqbi6sd4otl4
Secure OMP Computation Maintaining Sparse Representations and Its Application to EtC Systems
2020
IEICE transactions on information and systems
We prove theoretically that the proposed method estimates exactly the same sparse representations that the OMP algorithm for non-encrypted computation does. ...
Furthermore, the proposed method can control the sparsity without decoding the encrypted signals. Next, we propose an EtC system based on the secure sparse coding. ...
The sparse coding model has found numerous processing applications [2] for signals such as images/video [3] - [7] , audio [8] , biological signals [9] , and seismic data [10] . ...
doi:10.1587/transinf.2019edp7309
fatcat:ewwuivr56fee7pm374txhistce
Image encryption using block based transformation with fractional Fourier transform
2013
2013 8th International Conference on Communications and Networking in China (CHINACOM)
The image encryption process includes two steps: the original image was divided into blocks, which were rearranged into a transformed image using a transformation algorithm, and then the transformed image ...
The security of the proposed algorithm depends on the transformation algorithm, sensitivity to the randomness of phase mask and the orders of FRFT. ...
functions but also in obtaining several valuable results in signal processing. ...
doi:10.1109/chinacom.2013.6694656
fatcat:u5kcct7tmfh3vmkzrostsarhp4
A Set Theoretic Framework for Watermarking and Its Application to Semifragile Tamper Detection
2006
IEEE Transactions on Information Forensics and Security
His research interests include multimedia security digital watermarking, image and video processing, and cryptography.
and watermarking, color science and imaging, and signal processing for visual
sensor ...
Signal Process., vol. 53, no. 2, pp. [29] J. K. Su, J. J. Eggers, and B. ...
doi:10.1109/tifs.2006.885018
fatcat:37suyvy33nhoncaxw65ezljtou
Energy Efficient Computation Method for CPU-GPU System on Chip
2018
International Journal for Research in Applied Science and Engineering Technology
between heterogeneous multicores The parallelization algorithm Double Modulus Number Theoretic Transform is computed and developed with software development platform CUDA especially design for its Nvidia ...
One such algorithm called Double Modulus Number Theoretic Transform finds good for large amount of data computational methods especially with zero round off errors which provides high efficiency in communication ...
This allows higher performance with less energy and the Number theoretic Transform can also be implemented in various fields in cryptography for secure signal processing and in high efficient multiplication ...
doi:10.22214/ijraset.2018.5199
fatcat:g3wqyatcdffa3n743oazsds7wi
Secure Overcomplete Dictionary Learning for Sparse Representation
2020
IEICE transactions on information and systems
In this paper, we propose secure dictionary learning based on a random unitary transform for sparse representation. ...
Finally, we demonstrate its performance on synthetic data and a secure image modeling application for natural images. key words: sparse representation, dictionary learning, random unitary transform, secure ...
Sparse modeling has yielded numerous processing applications for sources such as image/video, audio, biological signal, and seismic data [8] . ...
doi:10.1587/transinf.2019mup0009
fatcat:kcvgcov3vzev7hwhti2mlsaoqa
Speech scrambling based on multiwavelet and Arnold transformations
2023
Indonesian Journal of Electrical Engineering and Computer Science
For communication applications where secure speech signal transmissions are a key requirement, speech scrambler is taken into consideration. ...
To prevent someone from listening in on private conversations without their knowledge, it can transform clear speech into a signal that is unintelligible. ...
INTRODUCTION In modern society encryption is essential for information security. ...
doi:10.11591/ijeecs.v30.i2.pp927-935
fatcat:roni7di5h5erphvanuj6x7yzmy
A Novel Image Encryption Approach for Cloud Computing Applications
2018
International Journal of Advanced Computer Science and Applications
By Combining with Fractional Fourier Transform (FRFT) instead of Discrete Fourier Transform (DFT), a good framework for image encryption is opened to enhance data security degree. ...
The both image encipherment and decipherment process are analyzed based on random phase matrix. The time complexity effort of this novel approach is examined and evaluated. ...
ACKNOWLEDGMENT The authors gratefully acknowledge the approval and the financial support of this research from the Deanship of Scientific Research study by the grant number CIT-2016-1-6-F-5704, Northern ...
doi:10.14569/ijacsa.2018.091262
fatcat:xug2gcx6dzb5fawm2eysclmdtu
A Survey of the Security and Privacy Measures for Anonymous Biometric Authentication Systems
2010
2010 Sixth International Conference on Intelligent Information Hiding and Multimedia Signal Processing
the signal processing area. ...
It is the scope of this paper to build and present the framework where results from both cryptography and signal processing can be integrated. ...
Also we would like to thank the anonymous reviuwers for their suggestion to improve this paper. ...
doi:10.1109/iihmsp.2010.91
dblp:conf/iih-msp/BuhanKS10
fatcat:gv7o2w62p5fktfwo6blggxb2ra
« Previous
Showing results 1 — 15 out of 163,904 results