Secure Overcomplete Dictionary Learning for Sparse Representation

In this paper, we propose secure dictionary learning based on a random unitary transform for sparse representation. Currently, edge cloud computing is spreading to many application fields including services that use sparse coding. This situation raises many new privacy concerns. Edge cloud computing poses several serious issues for end users, such as unauthorized use and leak of data, and privacy failures. The proposed scheme provides practical MOD and K-SVD dictionary learning algorithms that allow computation on encrypted signals. We prove, theoretically, that the proposal has exactly the same dictionary learning estimation performance as the non-encrypted variant of MOD and K-SVD algorithms. We apply it to secure image modeling based on an image patch model. Finally, we demonstrate its performance on synthetic data and a secure image modeling application for natural images. key words: sparse representation, dictionary learning, random unitary transform, secure computation

[1]  Stéphane Mallat,et al.  Matching pursuits with time-frequency dictionaries , 1993, IEEE Trans. Signal Process..

[2]  Michael Elad,et al.  Sparse and Redundant Representations - From Theory to Applications in Signal and Image Processing , 2010 .

[3]  Hitoshi Kiya,et al.  Practical Secure OMP Computation and Its Application to Image Modeling , 2018, IHIP 2018.

[4]  Hitoshi Kiya,et al.  An Efficient Random Unitary Matrix for Biometric Template Protection , 2016, 2016 Joint 8th International Conference on Soft Computing and Intelligent Systems (SCIS) and 17th International Symposium on Advanced Intelligent Systems (ISIS).

[5]  Mauro Barni,et al.  Encrypted signal processing for privacy protection: Conveying the utility of homomorphic encryption and multiparty computation , 2013, IEEE Signal Processing Magazine.

[6]  Kjersti Engan,et al.  Method of optimal directions for frame design , 1999, 1999 IEEE International Conference on Acoustics, Speech, and Signal Processing. Proceedings. ICASSP99 (Cat. No.99CH36258).

[7]  Vijay Varadharajan,et al.  Apsipa Transactions on Signal and Information Processing Additional Services for Apsipa Transactions on Signal and Information Processing: Survey on Securing Data Storage in the Cloud , 2022 .

[8]  Hitoshi Kiya,et al.  Secure Dictionary Learning for Sparse Representation , 2019, 2019 27th European Signal Processing Conference (EUSIPCO).

[9]  Michael Elad,et al.  Sparse and Redundant Representation Modeling—What Next? , 2012, IEEE Signal Processing Letters.

[10]  Y. C. Pati,et al.  Orthogonal matching pursuit: recursive function approximation with applications to wavelet decomposition , 1993, Proceedings of 27th Asilomar Conference on Signals, Systems and Computers.

[11]  M. Elad,et al.  $rm K$-SVD: An Algorithm for Designing Overcomplete Dictionaries for Sparse Representation , 2006, IEEE Transactions on Signal Processing.

[12]  Balas K. Natarajan,et al.  Sparse Approximate Solutions to Linear Systems , 1995, SIAM J. Comput..

[13]  Hitoshi Kiya,et al.  Privacy-Preserving Network BMI Decoding of Covert Spatial Attention , 2018, 2018 12th International Conference on Signal Processing and Communication Systems (ICSPCS).

[14]  David J. Field,et al.  Emergence of simple-cell receptive field properties by learning a sparse code for natural images , 1996, Nature.

[15]  Mauro Barni,et al.  Private Computing with Garbled Circuits [Applications Corner] , 2013, IEEE Signal Processing Magazine.

[16]  Kiya Hitoshi,et al.  Secure Computation of Sparse Dictionary Learning , 2019 .

[17]  A. Bruckstein,et al.  K-SVD : An Algorithm for Designing of Overcomplete Dictionaries for Sparse Representation , 2005 .

[18]  Hitoshi Kiya,et al.  On the Security of Block Scrambling-Based EtC Systems against Extended Jigsaw Puzzle Solver Attacks , 2018, IEICE Trans. Inf. Syst..

[19]  Kiya Hitoshi,et al.  Image Patch Modeling in Encrypted Domain using Sparse Coding , 2018 .

[20]  Zvika Brakerski,et al.  Fundamentals of Fully Homomorphic Encryption - A Survey , 2018, Electron. Colloquium Comput. Complex..

[21]  Mauro Barni,et al.  Privacy Protection in Biometric-Based Recognition Systems: A marriage between cryptography and signal processing , 2015, IEEE Signal Processing Magazine.