Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Filters








163,904 Hits in 4.0 sec

Number Theoretic Transforms for Secure Signal Processing [article]

Alberto Pedrouzo-Ulloa, Juan Ramón Troncoso-Pastoriza, Fernando Pérez-González
2018 arXiv   pre-print
This work presents a novel and comprehensive set of approaches and primitives to efficiently process signals in an encrypted form, by using Number Theoretic Transforms (NTTs) in innovative ways.  ...  Approaches based on Secure Signal Processing (SSP) address this challenge by proposing novel mechanisms for signal processing in the encrypted domain and interactive secure protocols to achieve the goal  ...  of Number Theoretic Transforms (NTTs), which are the building blocks that we use to produce efficient secure signal processing primitives.  ... 
arXiv:1607.05229v2 fatcat:mrlorcxrrrg7lbfr7khn7mr2xq

PROTECTED DISCRETE FOURIER TRANSFORM IMPLEMENTATION ON REMOTE COMPUTER SYSTEMS

ALIREZA MIRATAEI, Hana Khalil, Olexander Markovskyi
2020 Information, Computing and Intelligent systems  
The proposed method can be applied for effective signal stream processing in clouds.  ...  It has been shown theoretically and experimentally that the proposed method allows one to 1-2 orders of magnitude to speed up the processing of signals while maintaining their confidentiality.  ...  -Theoretical and experimental study of the effectiveness of the method of secure implementation of discrete transformations in the cloud both in terms of the level of security and in terms of the achievable  ... 
doi:10.20535/2708-4930.1.2020.216050 fatcat:tl6ydww5ynfqbfv653sqnhxysa

Digital Watermarking – A Multidisciplinary Approach

L. Venkateswarlu, CVR College of Engineering, Department of CSE, Ibrahimpatan, R.R. District, A.P., India, Dr. N V Rao, CVR College of Engineering, Department of CSE, Ibrahimpatan, R.R. District, A.P., India
2013 CVR Journal of Science & Technology  
This paper briefly brings out the issue of watermarking in the perspective of different disciplines like Communications, Information Theory, Signal Processing, Human Visual system, Coding Theory, Cryptography  ...  For the last six decades, Digital Watermarking, as an art of hiding information in a cover or host image has drawn much attention of researchers from academic institutions and industry.  ...  Signal Processing and Mathematical Transformations in watermarking algorithms: There was initial work in the use of basic digital signal processing (DSP) strategies for data hiding.  ... 
doi:10.32377/cvrjst0504 fatcat:2hgsh6u3xngqbeksyy4qboegvm

Efficient and Secure Outsourcing of DFT, IDFT, and Circular Convolution

Xiangli Xiao, Junjian Huang, Yushu Zhang, Xing He
2019 IEEE Access  
Discrete Fourier transform (DFT), inverse DFT (IDFT), and circular convolution are important tools for analyzing and designing discrete signals and systems, and are widely used in various industries.  ...  Through a theoretical explanation and simulation experiment, we show the efficiency, security, and verifiability of the proposed protocol.  ...  The fast algorithm for DFT is an important research topic in the field of signal processing.  ... 
doi:10.1109/access.2019.2915196 fatcat:o5uttrmezzau3k4cu5vpzmgioy

The Integrated Artificial Immune Intrusion Detection Model Based on Decision-theoretic Rough Set

Rui-Hong Dong, Dong-Fang Wu, Qiu-Yu Zhang
2017 International Journal of Network Security  
Firstly, by the approach of decision-theoretic rough set attributes reduction algorithm (DTRSA), attributes reduction was finished.  ...  The authors would like to thank the anonymous reviewers for their helpful comments and suggestions.  ...  I in is inflammatory signal. Let ω ij be the transformation weight. I is the number of signal types.  ... 
dblp:journals/ijnsec/DongWZ17 fatcat:62gexpfjbrdphi55a57ie7ttxm

Secure Wireless Network Connectivity with Multi-Antenna Transmission

Xiangyun Zhou, Radha Krishna Ganti, Jeffrey G. Andrews
2011 IEEE Transactions on Wireless Communications  
We consider non-colluding and colluding eavesdroppers, and derive the network secure connectivity for both eavesdropper strategies.  ...  Recently, information-theoretic security as a physical-layer approach has been widely investigated as a means to provide secure communication.  ...  For colluding eavesdroppers, the combined received signal power at the eavesdroppers after centralized processing is given by = ∑ ∈Φ ℎ − . (3) B.  ... 
doi:10.1109/twc.2010.112310.101008 fatcat:53rdzqico5ch5bfpv7rxe7diay

Fractional number-theoretic transforms based on matrix functions

Juliano B. Lima, Ricardo M. Campello de Souza, Paulo Hugo E. S. Lima
2014 2014 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP)  
In this paper, we introduce fractional number-theoretic transforms (FrNTT) based on matrix functions.  ...  The approach, which is a kind of finite field extension of the method presented in [1], does not require the construction of any numbertheoretic transform eigenvector set.  ...  FRACTIONAL NUMBER-THEORETIC TRANSFORM In this section, we introduce a new definition for the fractional number-theoretic transform. The approach follows the idea originally presented in [1] .  ... 
doi:10.1109/icassp.2014.6854073 dblp:conf/icassp/LimaSL14 fatcat:vxlymueufzb3rfyqbi6sd4otl4

Secure OMP Computation Maintaining Sparse Representations and Its Application to EtC Systems

Takayuki NAKACHI, Hitoshi KIYA
2020 IEICE transactions on information and systems  
We prove theoretically that the proposed method estimates exactly the same sparse representations that the OMP algorithm for non-encrypted computation does.  ...  Furthermore, the proposed method can control the sparsity without decoding the encrypted signals. Next, we propose an EtC system based on the secure sparse coding.  ...  The sparse coding model has found numerous processing applications [2] for signals such as images/video [3] - [7] , audio [8] , biological signals [9] , and seismic data [10] .  ... 
doi:10.1587/transinf.2019edp7309 fatcat:ewwuivr56fee7pm374txhistce

Image encryption using block based transformation with fractional Fourier transform

Delong Cui, Lei Shu, Yuanfang Chen, Xiaoling Wu
2013 2013 8th International Conference on Communications and Networking in China (CHINACOM)  
The image encryption process includes two steps: the original image was divided into blocks, which were rearranged into a transformed image using a transformation algorithm, and then the transformed image  ...  The security of the proposed algorithm depends on the transformation algorithm, sensitivity to the randomness of phase mask and the orders of FRFT.  ...  functions but also in obtaining several valuable results in signal processing.  ... 
doi:10.1109/chinacom.2013.6694656 fatcat:u5kcct7tmfh3vmkzrostsarhp4

A Set Theoretic Framework for Watermarking and Its Application to Semifragile Tamper Detection

Oktay Altun, Gaurav Sharma, Mehmet Celik, Mark Bocko
2006 IEEE Transactions on Information Forensics and Security  
His research interests include multimedia security digital watermarking, image and video processing, and cryptography. and watermarking, color science and imaging, and signal processing for visual sensor  ...  Signal Process., vol. 53, no. 2, pp. [29] J. K. Su, J. J. Eggers, and B.  ... 
doi:10.1109/tifs.2006.885018 fatcat:37suyvy33nhoncaxw65ezljtou

Energy Efficient Computation Method for CPU-GPU System on Chip

C. Sai Punitha
2018 International Journal for Research in Applied Science and Engineering Technology  
between heterogeneous multicores The parallelization algorithm Double Modulus Number Theoretic Transform is computed and developed with software development platform CUDA especially design for its Nvidia  ...  One such algorithm called Double Modulus Number Theoretic Transform finds good for large amount of data computational methods especially with zero round off errors which provides high efficiency in communication  ...  This allows higher performance with less energy and the Number theoretic Transform can also be implemented in various fields in cryptography for secure signal processing and in high efficient multiplication  ... 
doi:10.22214/ijraset.2018.5199 fatcat:g3wqyatcdffa3n743oazsds7wi

Secure Overcomplete Dictionary Learning for Sparse Representation

Takayuki NAKACHI, Yukihiro BANDOH, Hitoshi KIYA
2020 IEICE transactions on information and systems  
In this paper, we propose secure dictionary learning based on a random unitary transform for sparse representation.  ...  Finally, we demonstrate its performance on synthetic data and a secure image modeling application for natural images. key words: sparse representation, dictionary learning, random unitary transform, secure  ...  Sparse modeling has yielded numerous processing applications for sources such as image/video, audio, biological signal, and seismic data [8] .  ... 
doi:10.1587/transinf.2019mup0009 fatcat:kcvgcov3vzev7hwhti2mlsaoqa

Speech scrambling based on multiwavelet and Arnold transformations

Zahraa Abdulmuhsin Hasan, Suha Mohammed Hadi, Waleed Ameen Mahmoud Al-Jawher
2023 Indonesian Journal of Electrical Engineering and Computer Science  
For communication applications where secure speech signal transmissions are a key requirement, speech scrambler is taken into consideration.  ...  To prevent someone from listening in on private conversations without their knowledge, it can transform clear speech into a signal that is unintelligible.  ...  INTRODUCTION In modern society encryption is essential for information security.  ... 
doi:10.11591/ijeecs.v30.i2.pp927-935 fatcat:roni7di5h5erphvanuj6x7yzmy

A Novel Image Encryption Approach for Cloud Computing Applications

Saleh ALTOWAIJRI, Mohamed, Yamen EL
2018 International Journal of Advanced Computer Science and Applications  
By Combining with Fractional Fourier Transform (FRFT) instead of Discrete Fourier Transform (DFT), a good framework for image encryption is opened to enhance data security degree.  ...  The both image encipherment and decipherment process are analyzed based on random phase matrix. The time complexity effort of this novel approach is examined and evaluated.  ...  ACKNOWLEDGMENT The authors gratefully acknowledge the approval and the financial support of this research from the Deanship of Scientific Research study by the grant number CIT-2016-1-6-F-5704, Northern  ... 
doi:10.14569/ijacsa.2018.091262 fatcat:xug2gcx6dzb5fawm2eysclmdtu

A Survey of the Security and Privacy Measures for Anonymous Biometric Authentication Systems

Ileana Buhan, Emile Kelkboom, Koen Simoens
2010 2010 Sixth International Conference on Intelligent Information Hiding and Multimedia Signal Processing  
the signal processing area.  ...  It is the scope of this paper to build and present the framework where results from both cryptography and signal processing can be integrated.  ...  Also we would like to thank the anonymous reviuwers for their suggestion to improve this paper.  ... 
doi:10.1109/iihmsp.2010.91 dblp:conf/iih-msp/BuhanKS10 fatcat:gv7o2w62p5fktfwo6blggxb2ra
« Previous Showing results 1 — 15 out of 163,904 results