Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
research-article

Secure Low-complexity Compressive Sensing with Preconditioning Prior Regularization Reconstruction

Published: 11 January 2024 Publication History
  • Get Citation Alerts
  • Abstract

    Compressive sensing (CS), a breakthrough technology in image processing, provides a privacy-preserving layer and image reconstruction while performing sensing and recovery processes, respectively. Unfortunately, it still faces high-complexity, low-security, and low-quality reconstruction challenges during image processing. Therefore, this article presents a secure low-complexity CS scheme with preconditioning prior regularization reconstruction. More specifically, the original image is compressed by a low-complexity LFSR-based sparse circulant matrix to obtain measurements. It is worth noting that measurements achieve preliminary distribution equalization through the Tanh sequence to acquire processed measurements. Furthermore, the privacy-preserving edge processing for processed measurements can achieve high security. Finally, preconditioning prior regularization CS reconstruction is designed to improve reconstruction performance. Simulation results and analyses demonstrate that the proposed scheme can achieve low-complexity sampling, high security, and superior reconstruction performance.

    References

    [1]
    Sherif Abdelwahab, Bechir Hamdaoui, Mohsen Guizani, and Ammar Rayes. 2014. Enabling smart cloud services through remote sensing: An internet of everything enabler. IEEE Internet of Things Journal 1, 3 (2014), 276–288.
    [2]
    Huang Bai, Gang Li, Sheng Li, Qiuwei Li, Qianru Jiang, and Liping Chang. 2015. Alternating optimization of sensing matrix and sparsifying dictionary for compressed sensing. IEEE Transactions on Signal Processing 63, 6 (2015), 1581–1594.
    [3]
    Afonso S. Bandeira, Edgar Dobriban, Dustin G. Mixon, and William F. Sawin. 2013. Certifying the restricted isometry property is hard. IEEE Transactions on Information Theory 59, 6 (2013), 3448–3450.
    [4]
    Tiziano Bianchi, Valerio Bioglio, and Enrico Magli. 2015. Analysis of one-time random projections for privacy preserving compressed sensing. IEEE Transactions on Information Forensics and Security 11, 2 (2015), 313–327.
    [5]
    Emmanuel J. Candes and Yaniv Plan. 2011. A probabilistic and RIPless theory of compressed sensing. IEEE Transactions on Information Theory 57, 11 (2011), 7235–7254.
    [6]
    Gao Chen, Defang Li, and Jiashu Zhang. 2014. Iterative gradient projection algorithm for two-dimensional compressive sensing sparse image reconstruction. Signal Processing 104 (2014), 15–26.
    [7]
    Guanrong Chen, Yaobin Mao, and Charles K. Chui. 2004. A symmetric image encryption scheme based on 3D chaotic cat maps. Chaos, Solitons & Fractals 21, 3 (2004), 749–761.
    [8]
    Wonwoo Cho and Nam Yul Yu. 2019. Secure and efficient compressed sensing-based encryption with sparse matrices. IEEE Transactions on Information Forensics and Security 15 (2019), 1999–2011.
    [9]
    M. Mozammel Hoque Chowdhury and Amina Khatun. 2012. Image compression using discrete wavelet transform. International Journal of Computer Science Issues (IJCSI) 9, 4 (2012), 327.
    [10]
    Mark A. Davenport, Marco F. Duarte, Yonina C. Eldar, and Gitta Kutyniok. 2012. Introduction to compressed sensing. Citeseer, (2012), 1–64.
    [11]
    Xin Ding, Wei Chen, and Ian J. Wassell. 2017. Joint sensing matrix and sparsifying dictionary optimization for tensor compressive sensing. IEEE Transactions on Signal Processing 65, 14 (2017), 3632–3646.
    [12]
    Yong Fang, JiaJi Wu, and BorMin Huang. 2012. 2D Sparse signal recovery via 2D orthogonal matching pursuit. Science China Information Sciences 55, 4 (2012), 889–897.
    [13]
    Jun Feng, Laurence T. Yang, and Ronghao Zhang. 2019. Practical privacy-preserving high-order Bi-Lanczos in integrated edge-fog-cloud architecture for cyber-physical-social systems. ACM Transactions on Internet Technology 19, 2 (2019), 1–18.
    [14]
    Aboozar Ghaffari, Massoud Babaie-Zadeh, and Christian Jutten. 2009. Sparse decomposition of two dimensional signals. In IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP ’09), 3157–3160.
    [15]
    Maneesha Gupta and Amit Kumar Garg. 2012. Analysis of image compression algorithm using DCT. International Journal of Engineering Research and Applications (IJERA) 2, 1 (2012), 515–521.
    [16]
    Zaixing He, Takahiro Ogawa, and Miki Haseyama. 2010. The simplest measurement matrix for compressed sensing of natural images. In IEEE International Conference on Image Processing (ICIP ’10), 4301–4304.
    [17]
    Guiqiang Hu, Di Xiao, Tao Xiang, Sen Bai, and Yushu Zhang. 2017. A compressive sensing based privacy preserving outsourcing of image storage and identity authentication service in cloud. Information Sciences 387 (2017), 132–145.
    [18]
    Zhongyun Hua, Yicong Zhou, and Hejiao Huang. 2019. Cosine-transform-based chaotic system for image encryption. Information Sciences 480 (2019), 403–419.
    [19]
    Hui Huang, Xing He, Yong Xiang, Wenying Wen, and Yushu Zhang. 2018. A compression-diffusion-permutation strategy for securing image. Signal Processing 150 (2018), 183–190.
    [20]
    Hui Huang, Di Xiao, and Jia Liang. 2022. Two-layer controllable recovery for privacy-preserving double-compressed images. IEEE Signal Processing Letters 29 (2022), 2452–2456.
    [21]
    Hui Huang, Di Xiao, Jia Liang, and Min Li. 2023. Prior-based privacy-assured compressed sensing scheme in cloud. The Visual Computer (2023), 1–15.
    [22]
    Qianru Jiang, Sheng Li, Zhihui Zhu, Huang Bai, Xiongxiong He, and Rodrigo C. de Lamare. 2019. Design of compressed sensing system with probability-based prior information. IEEE Transactions on Multimedia 22, 3 (2019), 594–609.
    [23]
    Gajraj Kuldeep and Qi Zhang. 2020. Compressive sensing based multi-class privacy-preserving cloud computing. In IEEE Global Communications Conference (GLOBECOM ’20), 1–6.
    [24]
    Gang Li, Zhihui Zhu, Dehui Yang, Liping Chang, and Huang Bai. 2013. On projection matrix optimization for compressive sensing systems. IEEE Transactions on Signal Processing 61, 11 (2013), 2887–2898.
    [25]
    Lixiang Li, Guoqian Wen, Zeming Wang, and Yixian Yang. 2019. Efficient and secure image communication system based on compressed sensing for IoT monitoring applications. IEEE Transactions on Multimedia 22, 1 (2019), 82–95.
    [26]
    Yinghua Li, Bin Song, Rong Cao, Yue Zhang, and Hao Qin. 2016. Image encryption based on compressive sensing and scrambled index for secure multimedia transmission. ACM Transactions on Multimedia Computing, Communications, and Applications 12, 62 (2016), 1–22.
    [27]
    Sungkwang Mun and James E. Fowler. 2009. Block compressed sensing of images using directional transforms. In IEEE International Conference on Image Processing (ICIP ’09), 3021–3024.
    [28]
    Yaron Rachlin and Dror Baron. 2008. The secrecy of compressed sensing measurements. In Allerton Conference on Communication, Control, and Computing (Allerton ’08), 813–817.
    [29]
    Andrianiaina Ravelomanantsoa, Hassan Rabah, and Amar Rouane. 2015. Compressed sensing: A simple deterministic measurement matrix and a fast recovery algorithm. IEEE Transactions on Instrumentation and Measurement 64, 12 (2015), 3405–3413.
    [30]
    Claude E. Shannon. 1949. Communication theory of secrecy systems. Bell System Technical Journal 28, 4 (1949), 656–715.
    [31]
    Matteo Testa, Diego Valsesia, Tiziano Bianchi, and Enrico Magli. 2019. Compressed Sensing for Privacy-Preserving Data Processing. Springer.
    [32]
    Mengdi Wang, Di Xiao, Jia Liang, and Guiqiang Hu. 2023. Distributed privacy-preserving nested compressed sensing for multiclass data collection with identity authentication. Signal Processing 204 (2023), 108823.
    [33]
    Mengdi Wang, Di Xiao, and Yong Xiang. 2020. Low-cost and confidentiality-preserving multi-image compressed acquisition and separate reconstruction for internet of multimedia things. IEEE Internet of Things Journal 8, 3 (2020), 1662–1673.
    [34]
    Dapeng Wu, Boran Yang, Honggang Wang, Chonggang Wang, and Ruyan Wang. 2016. Privacy-preserving multimedia big data aggregation in large-scale wireless sensor networks. ACM Transactions on Multimedia Computing, Communications, and Applications 12, 4s (2016), 1–19.
    [35]
    Wenjie Yan, Qiang Wang, and Yi Shen. 2014. Shrinkage-based alternating projection algorithm for efficient measurement matrix construction in compressive sensing. IEEE Transactions on Instrumentation and Measurement 63, 5 (2014), 1073–1084.
    [36]
    Xiaolin Ye, Xingyuan Wang, Suo Gao, Jun Mou, Zhisen Wang, and Feifei Yang. 2020. A new chaotic circuit with multiple memristors and its application in image encryption. Nonlinear Dynamics 99, 2 (2020), 1489–1506.
    [37]
    Di You, Jian Zhang, Jingfen Xie, Bin Chen, and Siwei Ma. 2021. COAST: COntrollable arbitrary-sampling NeTwork for compressive sensing. IEEE Transactions on Image Processing 30 (2021), 6066–6080.
    [38]
    Bo Zhang, Di Xiao, Xiuling Li, and Jia Liang. 2023. Privacy-preserving image compressed sensing by embedding a controllable noise-injected transformation for IoT devices. Signal Processing 210 (2023), 109055.
    [39]
    Bo Zhang, Di Xiao, Mengdi Wang, and Jia Liang. 2021. Privacy-preserving compressed sensing for image simultaneous compression-encryption applications. InData Compression Conference (DCC ’21), 283–292.
    [40]
    Bo Zhang, Di Xiao, and Yong Xiang. 2021. Robust coding of encrypted images via 2D compressed sensing. IEEE Transactions on Multimedia 23 (2021), 2656–2671.
    [41]
    Jian Zhang, Chen Zhao, and Wen Gao. 2020. Optimization-inspired compact deep compressive sensing. IEEE Journal of Selected Topics in Signal Processing 14, 4 (2020), 765–774.
    [42]
    Yushu Zhang, Qi He, Guo Chen, Xinpeng Zhang, and Yong Xiang. 2019. A low-overhead, confidentiality-assured, and authenticated data acquisition framework for IoT. IEEE Transactions on Industrial Informatics 16, 12 (2019), 7566–7578.
    [43]
    Yushu Zhang, Hui Huang, Yong Xiang, Leo Yu Zhang, and Xing He. 2017. Harnessing the hybrid cloud for secure big image data service. IEEE Internet of Things Journal 4, 5 (2017), 1380–1388.
    [44]
    Yushu Zhang, Ping Wang, Liming Fang, Xing He, Hao Han, and Bing Chen. 2020. Secure transmission of compressed sampling data using edge clouds. IEEE Transactions on Industrial Informatics 16, 10 (2020), 6641–6651.
    [45]
    Yushu Zhang, Ping Wang, Hui Huang, Youwen Zhu, Di Xiao, and Yong Xiang. 2020. Privacy-assured FogCS: Chaotic compressive sensing for secure industrial big image data processing in fog computing. IEEE Transactions on Industrial Informatics 17, 5 (2020), 3401–3411.

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Transactions on Multimedia Computing, Communications, and Applications
    ACM Transactions on Multimedia Computing, Communications, and Applications  Volume 20, Issue 4
    April 2024
    676 pages
    ISSN:1551-6857
    EISSN:1551-6865
    DOI:10.1145/3613617
    • Editor:
    • Abdulmotaleb El Saddik
    Issue’s Table of Contents

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 11 January 2024
    Online AM: 02 December 2023
    Accepted: 25 November 2023
    Revised: 20 November 2023
    Received: 25 November 2022
    Published in TOMM Volume 20, Issue 4

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. Compressive sensing
    2. sparse circulant matrix
    3. joint quantization and diffusion
    4. preconditioning prior regularization reconstruction

    Qualifiers

    • Research-article

    Funding Sources

    • National Key R&D Program of China
    • National Natural Science Foundation of China

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • 0
      Total Citations
    • 170
      Total Downloads
    • Downloads (Last 12 months)170
    • Downloads (Last 6 weeks)42

    Other Metrics

    Citations

    View Options

    Get Access

    Login options

    Full Access

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Full Text

    View this article in Full Text.

    Full Text

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media