Skip to main content
Log in

Distributed compressed sensing for multi-sourced fusion and secure signal processing in private cloud

  • Published:
Multidimensional Systems and Signal Processing Aims and scope Submit manuscript

Abstract

In this paper, a novel scheme is proposed for multi-sourced signal fusion and secure processing. Within a distributed compressed sensing (DCS) framework, traditional sampling, compression and encryption for signal acquisition are unified under the secure multiparty computation protocol. In the proposed scheme, generation of the pseudo-random sensing matrix offers a natural method for data encryption in DCS, allowing for joint recovery of multiparty data at legal users’ side. Experimental analysis and results indicate that the secure signal processing and recovery in DCS domain is feasible, and requires fewer measurements than the achievable approach of separate CS and Nyquist processing. The proposed scheme can be also extended to other cloud-based collaborative secure signal processing and data-mining applications.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9

Similar content being viewed by others

References

  • Akshay, J. (2011). Enhancing security in cloud computing. Information and Knowledge Management, 1(1), 40–43.

    Google Scholar 

  • Baron, D., Duarte, M. F., Sarvotham, S. et al. (2005). An information-theoretic approach to distributed compressed sensing. In Proceedings of the 43rd Allerton conference communication, control, and computing, Monticello, IL.

  • Behl, A. (2011) Emerging security challenges in cloud computing. In Proceedings of the world congress on information and communication technology, pp. 217–218.

  • Candès, E. J. (2008). The restricted isometry property and its implications for compressed sensing. Comptes Rendus - Mathématique, 346(9), 589–592.

    Article  MathSciNet  MATH  Google Scholar 

  • Candes, E., Romberg, J., & Tao, T. (2006). Robust uncertainty principles: Exact signal reconstruction from highly incomplete frequency information. IEEE Transactions on Information Theory, 52(2), 489–509.

    Article  MathSciNet  MATH  Google Scholar 

  • Chen, W., Rodrigues, M., & Wassell, I. (2011) Distributed compressive sensing reconstruction via common support discovery. In Proceedings of the IEEE international conference on communications.

  • Dan, W., & Wang, R. H. (2014). Robustness of orthogonal matching pursuit under restricted isometry property. Science China Mathematics, 57(3), 627–634.

    Article  MathSciNet  MATH  Google Scholar 

  • Donoho, D., & Tsai, Y. (2006). Extensions of compressed sensing. Signal Processing, 86(3), 533–548.

    Article  Google Scholar 

  • Duarte, M. F., Sarvotham, S., Baron, D. et al. (2008). Performance limits for jointly sparse signals via graphical models. In Workshop on sensor, signal and information processing (SENSIP), Sedona, AZ.

  • Fingerprint verification competition. http://biometrics.cse.msu.edu/fvc04db/index.html.

  • Han, J., He, S., Qian, X., Wang, D., Guo, L., & Liu, T. (2013). An object-oriented visual saliency detection framework based on sparse coding representations. IEEE Transactions on Circuits and Systems for Video Technology, 23(12), 2009–2021.

    Article  Google Scholar 

  • Han, J., Zhang, D., Cheng, G., Guo, L., & Ren, J. (2015). Object detection in optical remote sensing images based on weakly supervised learning and high-level feature learning. IEEE Transactions on Geoscience and Remote Sensing, 53(6), 3325–3337.

    Article  Google Scholar 

  • Han, J., Zhang, D., Hu, X., Guo, L., Ren, J., & Wu, F. (2015). Background prior based salient object detection via deep reconstruction residual. IEEE Transactions on Circuits and Systems for Video Technology, 25(8), 1309–1321.

    Article  Google Scholar 

  • Han, J., Zhou, P., Zhang, D., Cheng, G., Guo, L., Liu, Z., et al. (2014). Efficient, simultaneous detection of multi-class geospatial targets based on visual saliency modeling and discriminative learning of sparse coding. ISPRS Journal of Photogrammetry and Remote Sensing, 89, 37–48.

    Article  Google Scholar 

  • Hou, X., Yang, J., Jiang, G., & Qian, X. (2013). Complex SAR image compression based on directional lifting wavelet transform with high clustering capability. IEEE Transactions on Geoscience and Remote Sensing, 51(1), 527–538.

    Article  Google Scholar 

  • Hou, X., Zhang, L., Gong, C., Xiao, L., Sun, J., & Qian, X. (2014). SAR image Bayesian compressive sensing exploiting the interscale and intrascale dependencies in directional lifting wavelet transform domain. Neurocomputing, 133, 358–368.

    Article  Google Scholar 

  • Jiang, J., et al. (2011). Live: an integrated production and feedback system for intelligent and interactive tv broadcasting. IEEE Transactions on Broadcasting, 57(3), 646–661.

    Article  Google Scholar 

  • Liu, Y., Ma, Y., Zhang, H., et al. (2011). A method for trust management in cloud computing: Data coloring by cloud watermarking. International Journal Automation and Computing, 8(3), 280–285.

    Article  MathSciNet  Google Scholar 

  • Lu, W., Varna, A., & Wu, M. (2010). Security analysis for private preserving search for multimedia. In Proceedings of the IEEE 17th international conference on image processing.

  • Masoum, A., Merana, N., & Havinga, P. (2013). A distributed compressive sensing technique for data gathering in wireless sensor network. Procedia Computer Science, 21, 207–216.

    Article  Google Scholar 

  • Mishra, D., Koria, N., Kapoor, N., et al. (2009). A secure multi-party computation protocol for malicious computation prevention for preserving privacy during data mining. International Journal of Computer Science & Information Security, 3(1), 1–6.

  • Orsdemir, A., Altun, H. O., Sharma, G., & Bocko, M. F. (2008). On the security and robustness of encryption via compressed sensing. In IEEE military communications conference, pp. 1040–1046.

  • Rachlin, Y., & Baron, D. (2008). The secrecy of compressed sensing measurements. In: Proceedings of the 46th annual Allerton conference on communication, control and computing, IEEE, Illinois, USA, pp. 813–817.

  • Ren, J., & Jiang, J. (2009). Hierarchical modelling and adaptive clustering for real-time summarization of rush videos. IEEE Transactions on Multimedia, 11(5), 906–917.

    Article  Google Scholar 

  • Rong, C., Nguyen, S. T., & Jaatun, M. G. (2013). Beyond lightning: A survey on security challenges in cloud computing. Computers & Electrical Engineering, 39(1), 47–54.

    Article  Google Scholar 

  • Shiraki, Y., & Kabashima, Y. (2015). Typical reconstruction limits for distributed compressed sensing based on \(\ell _{2,1}\)-norm minimization and Bayesian optimal reconstruction. Journal of Statistical Mechanics: Theory and Experiment, 2015, P05029. doi:10.1088/1742-5468/2015/05/P05029.

  • Sun, M., Zhang, D., Wang, Z., Ren, J., & Jin, J. S. (2016). Monte Carlo convex hull models for classification of traditional Chinese paintings. Neurocomputing 171(1), 788–797.

  • Sundman, D., Chatterjee, S., & Skoglund, M. (2014). Methods for distributed compressed sensing. Journal of Sensor and Actuator Networks, 3, 1–25.

    Article  Google Scholar 

  • Wang, C., Zhang, B., Ren, K., et al. (2013). Privacy-assured outsourcing of image reconstruction service in cloud. IEEE Transactions on Emerging Topics in Computing, 1(1), 166–177.

  • Yang, X., Qian, X., & Mei, T. (2015). Learning salient visual word for scalable mobile image retrieval. Pattern Recognition, 48(10), 3093–3101.

    Article  Google Scholar 

  • Yang, X., Qian, X., & Xue, Y. (2015). Scalable mobile image retrieval by exploring contextual saliency. IEEE Transactions on Image Processing, 24(6), 1709–1721.

    Article  MathSciNet  Google Scholar 

  • Yin, H., Li, J., Chai, Y., et al. (2014). A survey on distributed compressed sensing: Theory and applications. Frontiers of Computer Science, 8(6), 893–904.

    Article  MathSciNet  Google Scholar 

  • Zhang, Y., Niu, X., & Zhao, D. (2005). A method of protecting relational databases copyright with cloud watermarking (pp. 68–72). Istanbul: World Academy of Science, Engineering and Technology.

  • Zhao, H., & Fang, Y. (2015). On the security and robustness with fingerprint watermarking signal via compressed sensing. International Journal of Security and Its Applications, 9(1), 221–236.

    Article  MathSciNet  Google Scholar 

  • Zhao, C., Li, X., Ren, J., & Marshall, S. (2013). Improved sparse representation using adaptive spatial support for effective target detection in hyperspectral imagery. International Journal of Remote Sensing, 34(24), 8669–8684.

    Article  Google Scholar 

Download references

Acknowledgments

The authors would greatly thank the anonymous reviewers and the editors for their constructive comments to further improve this paper. This work was supported by the National Natural Science Foundation of China (61272381, 61571141), Science and Technology Major Project of Education Department of Guangdong Province (2014KZDXM060), and the Natural Science Foundation of Guangdong (2015A030313672), and Science and Technology Project of Guangzhou City (2014J4100078).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Huimin Zhao.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Zhao, H., Wei, W., Cai, J. et al. Distributed compressed sensing for multi-sourced fusion and secure signal processing in private cloud. Multidim Syst Sign Process 27, 891–908 (2016). https://doi.org/10.1007/s11045-015-0371-2

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11045-015-0371-2

Keywords

Navigation