𝔖 Scriptorium
✦   LIBER   ✦

πŸ“

Compressed Sensing for Privacy-Preserving Data Processing

✍ Scribed by Matteo Testa, Diego Valsesia, Tiziano Bianchi, Enrico Magli


Publisher
Springer Singapore
Year
2019
Tongue
English
Leaves
99
Series
SpringerBriefs in Electrical and Computer Engineering
Edition
1st ed.
Category
Library

⬇  Acquire This Volume

No coin nor oath required. For personal study only.

✦ Synopsis


The objective of this book is to provide the reader with a comprehensive survey of the topic compressed sensing in information retrieval and signal detection with privacy preserving functionality without compromising the performance of the embedding in terms of accuracy or computational efficiency. The reader is guided in exploring the topic by first establishing a shared knowledge about compressed sensing and how it is used nowadays. Then, clear models and definitions for its use as a cryptosystem and a privacy-preserving embedding are laid down, before tackling state-of-the-art results for both applications. The reader will conclude the book having learned that the current results in terms of security of compressed techniques allow it to be a very promising solution to many practical problems of interest. The book caters to a broad audience among researchers, scientists, or engineers with very diverse backgrounds, having interests in security, cryptography and privacy in information retrieval systems. Accompanying software is made available on the authors’ website to reproduce the experiments and techniques presented in the book. The only background required to the reader is a good knowledge of linear algebra, probability and information theory.

✦ Table of Contents


Front Matter ....Pages i-viii
Introduction (Matteo Testa, Diego Valsesia, Tiziano Bianchi, Enrico Magli)....Pages 1-6
Compressed Sensing and Security (Matteo Testa, Diego Valsesia, Tiziano Bianchi, Enrico Magli)....Pages 7-24
Compressed Sensing as a Cryptosystem (Matteo Testa, Diego Valsesia, Tiziano Bianchi, Enrico Magli)....Pages 25-71
Privacy-Preserving Embeddings (Matteo Testa, Diego Valsesia, Tiziano Bianchi, Enrico Magli)....Pages 73-90
Conclusions (Matteo Testa, Diego Valsesia, Tiziano Bianchi, Enrico Magli)....Pages 91-91

✦ Subjects


Engineering; Signal, Image and Speech Processing; Privacy; Calculus of Variations and Optimal Control; Optimization; Data Structures, Cryptology and Information Theory


πŸ“œ SIMILAR VOLUMES


Privacy-Preserving Machine Learning for
✍ Manas A. Pathak (auth.) πŸ“‚ Library πŸ“… 2013 πŸ› Springer-Verlag New York 🌐 English

<p>This thesis discusses the privacy issues in speech-based applications such as biometric authentication, surveillance, and external speech processing services. Author Manas A. Pathak presents solutions for privacy-preserving speech processing applications such as speaker verification, speaker iden

Big Data Privacy Preservation for Cyber-
✍ Miao Pan, Jingyi Wang, Sai Mounika Errapotu, Xinyue Zhang, Jiahao Ding, Zhu Han πŸ“‚ Library πŸ“… 2019 πŸ› Springer International Publishing 🌐 English

<p><p>This SpringerBrief mainly focuses on effective big data analytics for CPS, and addresses the privacy issues that arise on various CPS applications. The authors develop a series of privacy preserving data analytic and processing methodologies through data driven optimization based on applied cr

Privacy Preserving Data Mining
✍ Jaideep Vaidya, Yu Michael Zhu, Christopher W. Clifton (auth.) πŸ“‚ Library πŸ“… 2006 πŸ› Springer US 🌐 English

<p><P>Data mining has emerged as a significant technology for gaining knowledge from vast quantities of data. However, concerns are growing that use of this technology can violate individual privacy. These concerns have led to a backlash against the technology, for example, a "Data-Mining Moratorium

Privacy Preserving Data Mining
✍ Jaideep Vaidya, Chris Clifton, Michael Zhu πŸ“‚ Library πŸ“… 2005 πŸ› Springer 🌐 English

Privacy and security concerns restrict the sharing of data. There are both legal and commercial reasons to forbid the release of data. Privacy preserving data mining has come to be seen as a solution to this problem. Privacy preserving data mining implies the "mining" of knowledge from distributed d