栖息地 发表于 2025-3-23 12:13:12

Compressive Sensing,ue of the sparsity, a signal, which is randomly projected at the encoder side, can be reconstructed by searching the optimal solution of an under determined linear system at the decoder side. In information security field, the CS can be utilized for multimedia data security, cloud computing security, internet of things (IoT) security, etc.

珍奇 发表于 2025-3-23 16:13:05

Cloud Computing Security,orated since the cloud is often not fully trusted. In this chapter, we design two CS reconstruction outsourcing mechanisms in multi-clouds, which are sparse reconstruction service and sparse robustness decoding service, respectively. It is shown that these two mechanisms are secure, efficient, and feasible.

verdict 发表于 2025-3-23 20:00:11

http://reply.papertrans.cn/87/8633/863270/863270_13.png

cogent 发表于 2025-3-24 01:32:50

http://reply.papertrans.cn/87/8633/863270/863270_14.png

ASSAY 发表于 2025-3-24 04:04:28

Compressive Sensing,ssion can be performed simultaneously to reduce the sampling rate at the expense of a high computation complexity at the reconstruction stage. By virtue of the sparsity, a signal, which is randomly projected at the encoder side, can be reconstructed by searching the optimal solution of an under dete

要素 发表于 2025-3-24 08:04:13

Multimedia Data Security,e of CS is that it can reduce the redundancy. Thus, CS is a new popular encryption technique used for multimedia data encryption. This chapter aims to design secure and efficient multimedia data encryption algorithms based on CS. Firstly, combining chaos theory and optical transform, which are two c

separate 发表于 2025-3-24 13:12:56

http://reply.papertrans.cn/87/8633/863270/863270_17.png

Eulogy 发表于 2025-3-24 14:51:51

Internet of Things Security,mainly on the security aspects. A low-cost and confidentiality-preserving data acquisition framework in IoT based on chaotic convolution and random subsampling is firstly proposed. Chaotic encryption ensures the security of sampling process. The sampled images are assembled into a big master image,

有斑点 发表于 2025-3-24 20:19:41

http://reply.papertrans.cn/87/8633/863270/863270_19.png

chastise 发表于 2025-3-25 01:17:00

Book 2019veral particular frameworks including parallel CS, involvement of image processing techniques, and double protection mechanism. It also describes the applications of CS in cloud computing security and IoT security, i.e., privacy-preserving reconstruction in cloud computing and secure low-cost sampling in IoT, respectively.
页: 1 [2] 3 4
查看完整版本: Titlebook: Secure Compressive Sensing in Multimedia Data, Cloud Computing and IoT; Yushu Zhang,Yong Xiang,Leo Yu Zhang Book 2019 The Author(s), under