Normal view MARC view ISBD view

Compressed Sensing for Privacy-Preserving Data Processing [electronic resource] / by Matteo Testa, Diego Valsesia, Tiziano Bianchi, Enrico Magli.

By: Testa, Matteo [author.].
Contributor(s): Valsesia, Diego [author.] | Bianchi, Tiziano [author.] | Magli, Enrico [author.] | SpringerLink (Online service).
Material type: materialTypeLabelBookSeries: SpringerBriefs in Signal Processing: Publisher: Singapore : Springer Nature Singapore : Imprint: Springer, 2019Edition: 1st ed. 2019.Description: VIII, 91 p. 29 illus., 26 illus. in color. online resource.Content type: text Media type: computer Carrier type: online resourceISBN: 9789811322792.Subject(s): Signal processing | Data protection—Law and legislation | Mathematical optimization | Calculus of variations | Data structures (Computer science) | Information theory | Signal, Speech and Image Processing | Privacy | Calculus of Variations and Optimization | Data Structures and Information TheoryAdditional physical formats: Printed edition:: No title; Printed edition:: No titleDDC classification: 621.382 Online resources: Click here to access online
Contents:
Introduction -- Compressed Sensing and Security -- Compressed Sensing as a Cryptosystem -- Privacy-preserving Embeddings -- Conclusion.
In: Springer Nature eBookSummary: The objective of this book is to provide the reader with a comprehensive survey of the topic compressed sensing in information retrieval and signal detection with privacy preserving functionality without compromising the performance of the embedding in terms of accuracy or computational efficiency. The reader is guided in exploring the topic by first establishing a shared knowledge about compressed sensing and how it is used nowadays. Then, clear models and definitions for its use as a cryptosystem and a privacy-preserving embedding are laid down, before tackling state-of-the-art results for both applications. The reader will conclude the book having learned that the current results in terms of security of compressed techniques allow it to be a very promising solution to many practical problems of interest. The book caters to a broad audience among researchers, scientists, or engineers with very diverse backgrounds, having interests in security, cryptography and privacy in information retrieval systems. Accompanying software is made available on the authors’ website to reproduce the experiments and techniques presented in the book. The only background required to the reader is a good knowledge of linear algebra, probability and information theory.
    average rating: 0.0 (0 votes)
No physical items for this record

Introduction -- Compressed Sensing and Security -- Compressed Sensing as a Cryptosystem -- Privacy-preserving Embeddings -- Conclusion.

The objective of this book is to provide the reader with a comprehensive survey of the topic compressed sensing in information retrieval and signal detection with privacy preserving functionality without compromising the performance of the embedding in terms of accuracy or computational efficiency. The reader is guided in exploring the topic by first establishing a shared knowledge about compressed sensing and how it is used nowadays. Then, clear models and definitions for its use as a cryptosystem and a privacy-preserving embedding are laid down, before tackling state-of-the-art results for both applications. The reader will conclude the book having learned that the current results in terms of security of compressed techniques allow it to be a very promising solution to many practical problems of interest. The book caters to a broad audience among researchers, scientists, or engineers with very diverse backgrounds, having interests in security, cryptography and privacy in information retrieval systems. Accompanying software is made available on the authors’ website to reproduce the experiments and techniques presented in the book. The only background required to the reader is a good knowledge of linear algebra, probability and information theory.

There are no comments for this item.

Log in to your account to post a comment.