Practical Secure OMP Computation and Its Application to Image Modeling

In this paper, we propose the secure computation of sparse coding based on a random unitary transform. Cloud computing is spreading to many application fields including services that use sparse coding. This situation raises many new privacy concerns. The proposed scheme provides a practical Orthogonal Matching Pursuit (OMP) algorithm that allows computation on encrypted signals. We prove, theoretically, that the proposal has exactly the same sparse coefficient estimation performance as the unencrypted variant of the OMP algorithm. We apply it to image modeling based on an image patch model. Finally, we demonstrate its performance on synthetic data and natural images.

[1]  M. Elad,et al.  $rm K$-SVD: An Algorithm for Designing Overcomplete Dictionaries for Sparse Representation , 2006, IEEE Transactions on Signal Processing.

[2]  Balas K. Natarajan,et al.  Sparse Approximate Solutions to Linear Systems , 1995, SIAM J. Comput..

[3]  Michael Elad,et al.  Sparse and Redundant Representations - From Theory to Applications in Signal and Image Processing , 2010 .

[4]  Michael Elad,et al.  Sparse and Redundant Representation Modeling—What Next? , 2012, IEEE Signal Processing Letters.

[5]  A. Bruckstein,et al.  K-SVD : An Algorithm for Designing of Overcomplete Dictionaries for Sparse Representation , 2005 .

[6]  Hitoshi Kiya,et al.  Unitary transform-based template protection and its properties , 2015, 2015 23rd European Signal Processing Conference (EUSIPCO).

[7]  Y. C. Pati,et al.  Orthogonal matching pursuit: recursive function approximation with applications to wavelet decomposition , 1993, Proceedings of 27th Asilomar Conference on Signals, Systems and Computers.

[8]  Hitoshi Kiya,et al.  Unitary Transform-Based Template Protection and Its Application to l2-norm Minimization Problems , 2016, IEICE Trans. Inf. Syst..

[9]  Mauro Barni,et al.  Encrypted signal processing for privacy protection: Conveying the utility of homomorphic encryption and multiparty computation , 2013, IEEE Signal Processing Magazine.

[10]  Kjersti Engan,et al.  Method of optimal directions for frame design , 1999, 1999 IEEE International Conference on Acoustics, Speech, and Signal Processing. Proceedings. ICASSP99 (Cat. No.99CH36258).

[11]  Vijay Varadharajan,et al.  Apsipa Transactions on Signal and Information Processing Additional Services for Apsipa Transactions on Signal and Information Processing: Survey on Securing Data Storage in the Cloud , 2022 .

[12]  H. B. Barlow,et al.  Possible Principles Underlying the Transformations of Sensory Messages , 2012 .

[13]  Masaaki Fujiyoshi,et al.  A Copyright- and Privacy-Protected Image Trading System Using Fingerprinting in Discrete Wavelet Domain with JPEG 2000 , 2014, IEICE Trans. Fundam. Electron. Commun. Comput. Sci..

[14]  Stéphane Mallat,et al.  Matching pursuits with time-frequency dictionaries , 1993, IEEE Trans. Signal Process..