找回密码
 To register

QQ登录

只需一步,快速开始

扫一扫,访问微社区

Titlebook: Secure Compressive Sensing in Multimedia Data, Cloud Computing and IoT; Yushu Zhang,Yong Xiang,Leo Yu Zhang Book 2019 The Author(s), under

[复制链接]
楼主: 夹子
发表于 2025-3-23 12:13:12 | 显示全部楼层
Compressive Sensing,ue of the sparsity, a signal, which is randomly projected at the encoder side, can be reconstructed by searching the optimal solution of an under determined linear system at the decoder side. In information security field, the CS can be utilized for multimedia data security, cloud computing security, internet of things (IoT) security, etc.
发表于 2025-3-23 16:13:05 | 显示全部楼层
Cloud Computing Security,orated since the cloud is often not fully trusted. In this chapter, we design two CS reconstruction outsourcing mechanisms in multi-clouds, which are sparse reconstruction service and sparse robustness decoding service, respectively. It is shown that these two mechanisms are secure, efficient, and feasible.
发表于 2025-3-23 20:00:11 | 显示全部楼层
发表于 2025-3-24 01:32:50 | 显示全部楼层
发表于 2025-3-24 04:04:28 | 显示全部楼层
Compressive Sensing,ssion can be performed simultaneously to reduce the sampling rate at the expense of a high computation complexity at the reconstruction stage. By virtue of the sparsity, a signal, which is randomly projected at the encoder side, can be reconstructed by searching the optimal solution of an under dete
发表于 2025-3-24 08:04:13 | 显示全部楼层
Multimedia Data Security,e of CS is that it can reduce the redundancy. Thus, CS is a new popular encryption technique used for multimedia data encryption. This chapter aims to design secure and efficient multimedia data encryption algorithms based on CS. Firstly, combining chaos theory and optical transform, which are two c
发表于 2025-3-24 13:12:56 | 显示全部楼层
发表于 2025-3-24 14:51:51 | 显示全部楼层
Internet of Things Security,mainly on the security aspects. A low-cost and confidentiality-preserving data acquisition framework in IoT based on chaotic convolution and random subsampling is firstly proposed. Chaotic encryption ensures the security of sampling process. The sampled images are assembled into a big master image,
发表于 2025-3-24 20:19:41 | 显示全部楼层
发表于 2025-3-25 01:17:00 | 显示全部楼层
Book 2019veral particular frameworks including parallel CS, involvement of image processing techniques, and double protection mechanism. It also describes the applications of CS in cloud computing security and IoT security, i.e., privacy-preserving reconstruction in cloud computing and secure low-cost sampling in IoT, respectively.
 关于派博传思  派博传思旗下网站  友情链接
派博传思介绍 公司地理位置 论文服务流程 影响因子官网 SITEMAP 大讲堂 北京大学 Oxford Uni. Harvard Uni.
发展历史沿革 期刊点评 投稿经验总结 SCIENCEGARD IMPACTFACTOR 派博系数 清华大学 Yale Uni. Stanford Uni.
|Archiver|手机版|小黑屋| 派博传思国际 ( 京公网安备110108008328) GMT+8, 2025-5-19 16:26
Copyright © 2001-2015 派博传思   京公网安备110108008328 版权所有 All rights reserved
快速回复 返回顶部 返回列表