SlideShare a Scribd company logo
1 of 29
PRIVACY-ASSURED OUTSOURCING OF IMAGE
RECONSTRUCTION SERVICES IN THE CLOUD
PRESENTED BY : UNDER GUIDENCE OF :
THAHIRA A RAJI R PILLAI
S7 CSE ASSISTANT PROFESSOR
ROLL NO : 61 DEPARTMENT OF CSE
OVERVIEW
 INTRODUCTION
 RELATED WORK
 PROBLEM STATEMENT
 OIRS DESIGN
 EMPIRICAL EVALUATION
 FUTURE SCOPE
 CONCLUSION
 REFERENCES
2
1/13/2015
 Today, there is a fast growing trend to outsource the image management
system to the cloud for its abundant computing resources and benefits.
How to protect the sensitive data while enabling outsourced image
services ?.........
Outsourced Image Recovery Service (OIRS) architecture.
INTRODUCTION
3
1/13/2015
OIRS
• addresses the design challenges of security ,
complexity , and efficiency simultaneously.
OIRS
• not only supports the typical sparse data service
but can be extended to non sparse general data
1/13/2015
4
Security Effectiveness
Efficiency Extensibility
DESIGN GOALS
LITERATURE SURVEY
1/13/2015
5
Sl
no
Title Strength Open end
1 “Compressed sensing”-
D.Donoho
Compressed sensing Basic properties
only
2 “Compact storage of correlated data for
content based retrieval”-
A.Divekar and O.Erosy
Leverage the compressed sensing
to compress the storage of
correlated image datasets
Does not consider
security
3 “The secrecy of compressed sensing
measurements”-
Y.Rachlin and D.Baronm
Explore the inherent security
strength of linear measurement
provided by compressed sensing
Not suited for all the
conditions
A. SERVICE MODEL AND THREAT MODEL
PROBLEM STATEMENT
1/13/2015
6
1/13/2015
7
FIGURE2. Empirical results on the effectiveness of OIRS ,(a)-(a3) Original image ,(b)-(b3)
Reconstruction via encrypted data.(c)-(c3) Reconstruction via decrypted data
B. PRELIMINARIES
• Consider an n× 1 sparse data x. After sampling ,get an m×1 sample
vector,
y=Rx
R-m ×n selecting matrix
•The real world data x might not always be sparse.
•But it can be represented as a sparse vector f,(f Є ) under some properly
chosen Orthonormal basis V via x = Vf.
So,
y= Rx = RVf = Af where A = RV
1/13/2015
8
Compressed Sensing
•Plays an important role in the framework of compressed sensing
•Image reconstruction is equivalent to solve a LP problem as below,
min . r
subject to y = Af , -r <= f <= r
where, r- n×1 vector with positive real variables
•To make a standard form, replace f and r by
f = u-v
r = u+v
• Denote g=[u ,v] Є and F=|A,-A| Є 1/13/2015
9Linear Programming
𝟏 𝑻
min 1 𝑇 . g
Subject to y = F.g , g>=0
LP denoted as ,
Ω = ( F,y,I,1 𝑇 )
OIRS DESIGN
A.FRAME WORK AND SECURITY DEFINITION OF OIRS
The design challenge in OIRS is how the cloud efficiently solve optimization problem , Ω =(F,y,I, 1 𝑇) for
image reconstruction
The proposed OIRS meet the design challenges through random transformation based framework , which
includes four probabilistic polynomial time algorithms.
The framework of OIRS can be denoted as ,
= (KeyGen,ProbTran,ProbSolv,DataRec)
1/13/2015
10
KeyGen:
• Generates
the secret
key K
ProbTran:
• Generates a
randomly
transformed
Optimization
Problem Ωk
ProbSolv :
• Solves
transformed
problem Ωk &
Generates answer h
DataRec :
• Generates
answer g of
Ω
B. THE BLUEPRINT OF THE PROBLEM
TRANSFORMATION
 To make the algorithm ProbSolv to be a standard LP solver
,they use a series of random linear transformation steps over
objective function ,constraints , and feasible region of original
problem Ω
1/13/2015
11
1.Use a random generalized permutation matrix π with positive entries.
2.Randomly pick an 2n×2n invertible matrix Q,and a 2n×1
vector e to protect the solution g via affine mapping g=Qh-e
3. Multiply a random 2n ×m matrix M to equality constraints and
later mix the result together with the inequality constraint
4. Multiply a random m ×m invertible matrix P to the both sides
of equality constraints
1/13/2015
12
Transformation procedure
min 1 𝑇 . 𝑔
Subject to y = F. g,
π.g>=0
min 1 𝑇 .(Qh - e)
subject to F . Q . h = y + F . e,
π . Q . h >= π . e
min 1 𝑇
. (Qh- e)
subject to F . Q . h = y + Fe,
(π - MF)Qh >= πe - M( y +Fe)
min 1 𝑇 .(Qh-e)
subject to PFQ . h = P . (y + Fe)
(π- MF)Qh>= πe-M(Y+Fe)
min 1 𝑇 . g
Subject to y = F.g ,
g>=0
min 1 𝑇
.(Qh-e)
subject to PFQ . h = P . (y + Fe)
(π- MF)Qh>= πe-
M(Y+Fe
 To make the randomly transformed problem sharing the same structure as Ω
1. make 1 𝑇
. Q is equal to 1 𝑇
2.make right hand side of the inequality constrains ,
r’ = πe- M(y + F e), always zero just as Ω
If ignore the constant term 1 𝑇
. e in objective function,then
the random LP,
where F’ = PFQ , y’ = P . (y + F . e) and π’=(π.Q-MFQ)
So the problem can be denoted as,
Ωk = (F’,y’,π’, 1 𝑇 ) 1/13/2015
13
min 1 𝑇 . h
subject to y’=F’ . h, π‘h>=0,
C . THE SCHEME DETAILS
 Two reasonable assumption about the informaton transformed
between the data owner and users,
1.a master secret key sk is used to generate random
sampling matrix R and secret key K for each image.
2.an orthonormal basis V , with which the image data x
can be represented as a sparse vector f,
1/13/2015
14
1/13/2015
15
1/13/2015
16
1/13/2015
17
1/13/2015
18
a, Data owner computes σ <- F(sk,s)
.He then uses σ as coins to sample
R and generates a secret key K =
(P,Q,e,π,M) from KeyGen( 1 𝑇
,σ).
b, He acquires the sample y .With F
= [RV. -RV] and y, he calls
ProbTran1(K,(y,F)) to encrypt y as
y’ and sends (y’,s) to cloud.
1/13/2015
191 . DATA SAMPLING PHASE
a, Data owner computes σ <-
F(sk,s) .He then uses σ as coins to
sample R and generates a secret
key K = (P,Q,e.π.M) from
KeyGen(1 𝑇
,σ).He calls
ProbTran2(K,F) to get (F’,π) and
sends to cloud
b,With Ωk ,the cloud calls
ProbSolv(Ωk) to output answer
h to user ,together with seed s.
c,The user computes σ <- F(sk,s)
,and uses σ to generate the key K
from KeyGen(1 𝑇).He then calls
DataRec(K,h) to get g =Qh-e and
recovers the image x=Vf, where f is
derived from g
2 . IMAGE RECOVERY PHASE
FUTURE SCOPE & ONGOING WORKS
1/13/2015
20
SPEEDUP WITH HARDWARE BUILT-IN DESIGN
• Hardware built-in design with great benefits in achieving the
secure OIRS with best possible service performance and user
experience.
A. EXPERIMENT SETTING
 The data owner/user and the cloud side process is implemented in MATLAB and use
the MOSEK optimization toolbox(http://www.mosek.com) as the LP solver
B. EFFICIENCY EVALUATION
To measure the efficiency of the proposed OIRS , Specifically to focus on the
computational cost of privacy assurance done by the data owner and data users ie, local side
and the cost done by the cloud side
EMPIRICAL EVALUATION
1/13/2015
21
TABLE1. Preleminary efficiency evaluation results of OIRS.Here
denotes the original image recovery time , the transformation time by data
owner ,and the decryption time by data user,respectively
1/13/2015
22
To evaluate how much computational savings OIRS can provide
to data owner/user , calculate a variable,
From the table we can see that ,OIRS can bring more than 3.4×
savings for the selected size image blocks
1/13/2015
23
assymmetric speedup=asymmetric speedup =
C. EFFECTIVENESS EVALUATION
1.CORRECTNESS EVALUATION
For correctness of the design ,all the images after
transformation and later recovered on the data user side ,
still preserves the same level of visual quality as the original
images.
1/13/2015
24
Reconstructed image quality increases along with the number
of measurements and the more the better
FIGURE3 . Comparison of recovered images using different number of
measurements m in OIRS.(a)m=128,(b) m= 192,(c) m=256.
1/13/2015
25
 OIRS,an outsoursed image recovery service from compressed sensing with
privacy assurance
With OIRS, Data owners can utilize the benefit of compressed
sensing
 Data users can leverage cloud’s abundant resources
CONCLUSION
1/13/2015
26
1/13/2015
27
ADVANTAGE
APPLICATIONS
• Simple and Efficient
• Robustness and effectiveness in
handling image reconstruction
• MRI in health care system
• Remote sensing in geographical
system
• Military image sensing in mission
critical context
M. Atallah and K. Frikken, ``Securely outsourcing linear algebra computations,''in
Proc. 5th ASIACCS, 2010, pp. 4859.
 E. Candès and M. Wakin, ``An introduction to compressive sampling,''IEEE Signal
Proc. Mag., vol. 25, no. 2, pp. 2130, Mar. 2008.
 A. Yao, ``Protocols for secure computations (extended abstract),'' in Proc. FOCS,
1982, pp. 160164.
REFERENCES
1/13/2015
28
1/13/2015
29

More Related Content

What's hot

Intensity Transformation Functions of image with Matlab
Intensity Transformation Functions of image with Matlab Intensity Transformation Functions of image with Matlab
Intensity Transformation Functions of image with Matlab Shafi Sourov
 
1.arithmetic & logical operations
1.arithmetic & logical operations1.arithmetic & logical operations
1.arithmetic & logical operationsmukesh bhardwaj
 
"Fundamentals of Monocular SLAM," a Presentation from Cadence
"Fundamentals of Monocular SLAM," a Presentation from Cadence"Fundamentals of Monocular SLAM," a Presentation from Cadence
"Fundamentals of Monocular SLAM," a Presentation from CadenceEdge AI and Vision Alliance
 
Distributed Formal Concept Analysis Algorithms Based on an Iterative MapReduc...
Distributed Formal Concept Analysis Algorithms Based on an Iterative MapReduc...Distributed Formal Concept Analysis Algorithms Based on an Iterative MapReduc...
Distributed Formal Concept Analysis Algorithms Based on an Iterative MapReduc...Ruairi de Frein
 
A Comparative Study of Histogram Equalization Based Image Enhancement Techniq...
A Comparative Study of Histogram Equalization Based Image Enhancement Techniq...A Comparative Study of Histogram Equalization Based Image Enhancement Techniq...
A Comparative Study of Histogram Equalization Based Image Enhancement Techniq...Shahbaz Alam
 
Log Transformation in Image Processing with Example
Log Transformation in Image Processing with ExampleLog Transformation in Image Processing with Example
Log Transformation in Image Processing with ExampleMustak Ahmmed
 
Intensity Transformation
Intensity TransformationIntensity Transformation
Intensity TransformationAmnaakhaan
 
GENERIC APPROACH FOR VISIBLE WATERMARKING
GENERIC APPROACH FOR VISIBLE WATERMARKINGGENERIC APPROACH FOR VISIBLE WATERMARKING
GENERIC APPROACH FOR VISIBLE WATERMARKINGEditor IJCATR
 
Additive model and boosting tree
Additive model and boosting treeAdditive model and boosting tree
Additive model and boosting treeDong Guo
 
Numerical analysis m1 l3slides
Numerical analysis  m1 l3slidesNumerical analysis  m1 l3slides
Numerical analysis m1 l3slidesSHAMJITH KM
 
B Eng Final Year Project Presentation
B Eng Final Year Project PresentationB Eng Final Year Project Presentation
B Eng Final Year Project Presentationjesujoseph
 
Bump Hunting in the Dark - ICDE15 presentation
Bump Hunting in the Dark - ICDE15 presentationBump Hunting in the Dark - ICDE15 presentation
Bump Hunting in the Dark - ICDE15 presentationMichael Mathioudakis
 
Intensity Transformation and Spatial filtering
Intensity Transformation and Spatial filteringIntensity Transformation and Spatial filtering
Intensity Transformation and Spatial filteringShajun Nisha
 
第19回ステアラボ人工知能セミナー発表資料
第19回ステアラボ人工知能セミナー発表資料第19回ステアラボ人工知能セミナー発表資料
第19回ステアラボ人工知能セミナー発表資料Takayuki Osogami
 
NIPS2017 Few-shot Learning and Graph Convolution
NIPS2017 Few-shot Learning and Graph ConvolutionNIPS2017 Few-shot Learning and Graph Convolution
NIPS2017 Few-shot Learning and Graph ConvolutionKazuki Fujikawa
 
Master defence 2020 - Vadym Korshunov - Region-Selected Image Generation with...
Master defence 2020 - Vadym Korshunov - Region-Selected Image Generation with...Master defence 2020 - Vadym Korshunov - Region-Selected Image Generation with...
Master defence 2020 - Vadym Korshunov - Region-Selected Image Generation with...Lviv Data Science Summer School
 

What's hot (20)

Intensity Transformation Functions of image with Matlab
Intensity Transformation Functions of image with Matlab Intensity Transformation Functions of image with Matlab
Intensity Transformation Functions of image with Matlab
 
Linear Classifiers
Linear ClassifiersLinear Classifiers
Linear Classifiers
 
1.arithmetic & logical operations
1.arithmetic & logical operations1.arithmetic & logical operations
1.arithmetic & logical operations
 
"Fundamentals of Monocular SLAM," a Presentation from Cadence
"Fundamentals of Monocular SLAM," a Presentation from Cadence"Fundamentals of Monocular SLAM," a Presentation from Cadence
"Fundamentals of Monocular SLAM," a Presentation from Cadence
 
Distributed Formal Concept Analysis Algorithms Based on an Iterative MapReduc...
Distributed Formal Concept Analysis Algorithms Based on an Iterative MapReduc...Distributed Formal Concept Analysis Algorithms Based on an Iterative MapReduc...
Distributed Formal Concept Analysis Algorithms Based on an Iterative MapReduc...
 
A Comparative Study of Histogram Equalization Based Image Enhancement Techniq...
A Comparative Study of Histogram Equalization Based Image Enhancement Techniq...A Comparative Study of Histogram Equalization Based Image Enhancement Techniq...
A Comparative Study of Histogram Equalization Based Image Enhancement Techniq...
 
Log Transformation in Image Processing with Example
Log Transformation in Image Processing with ExampleLog Transformation in Image Processing with Example
Log Transformation in Image Processing with Example
 
Intensity Transformation
Intensity TransformationIntensity Transformation
Intensity Transformation
 
GENERIC APPROACH FOR VISIBLE WATERMARKING
GENERIC APPROACH FOR VISIBLE WATERMARKINGGENERIC APPROACH FOR VISIBLE WATERMARKING
GENERIC APPROACH FOR VISIBLE WATERMARKING
 
Additive model and boosting tree
Additive model and boosting treeAdditive model and boosting tree
Additive model and boosting tree
 
Matlab
MatlabMatlab
Matlab
 
Numerical analysis m1 l3slides
Numerical analysis  m1 l3slidesNumerical analysis  m1 l3slides
Numerical analysis m1 l3slides
 
B Eng Final Year Project Presentation
B Eng Final Year Project PresentationB Eng Final Year Project Presentation
B Eng Final Year Project Presentation
 
Bump Hunting in the Dark - ICDE15 presentation
Bump Hunting in the Dark - ICDE15 presentationBump Hunting in the Dark - ICDE15 presentation
Bump Hunting in the Dark - ICDE15 presentation
 
Intensity Transformation and Spatial filtering
Intensity Transformation and Spatial filteringIntensity Transformation and Spatial filtering
Intensity Transformation and Spatial filtering
 
Image Processing Using MATLAB
Image Processing Using MATLABImage Processing Using MATLAB
Image Processing Using MATLAB
 
第19回ステアラボ人工知能セミナー発表資料
第19回ステアラボ人工知能セミナー発表資料第19回ステアラボ人工知能セミナー発表資料
第19回ステアラボ人工知能セミナー発表資料
 
NIPS2017 Few-shot Learning and Graph Convolution
NIPS2017 Few-shot Learning and Graph ConvolutionNIPS2017 Few-shot Learning and Graph Convolution
NIPS2017 Few-shot Learning and Graph Convolution
 
Master defence 2020 - Vadym Korshunov - Region-Selected Image Generation with...
Master defence 2020 - Vadym Korshunov - Region-Selected Image Generation with...Master defence 2020 - Vadym Korshunov - Region-Selected Image Generation with...
Master defence 2020 - Vadym Korshunov - Region-Selected Image Generation with...
 
Gonzalez, rafael,c.digitalimageprocessingusing matlab
Gonzalez, rafael,c.digitalimageprocessingusing matlabGonzalez, rafael,c.digitalimageprocessingusing matlab
Gonzalez, rafael,c.digitalimageprocessingusing matlab
 

Viewers also liked

Discover the Mindset of the Millionaire Internet Entrepreneur
Discover the Mindset of the Millionaire Internet EntrepreneurDiscover the Mindset of the Millionaire Internet Entrepreneur
Discover the Mindset of the Millionaire Internet EntrepreneurMalcolm Riviere
 
Risk Triage and Prototyping In Information Security Engagements
Risk Triage and Prototyping In Information Security EngagementsRisk Triage and Prototyping In Information Security Engagements
Risk Triage and Prototyping In Information Security EngagementsRakesh Bharania
 
McCool Chapter 2
McCool Chapter 2McCool Chapter 2
McCool Chapter 2sblarge
 
The Birth A Of Modern Website - Mixed Digital's Web Re-Design Case Study
The Birth A Of Modern Website - Mixed Digital's Web Re-Design Case StudyThe Birth A Of Modern Website - Mixed Digital's Web Re-Design Case Study
The Birth A Of Modern Website - Mixed Digital's Web Re-Design Case StudyMark F Simmons
 
¿Tienes ADN Emprendedor?
¿Tienes ADN Emprendedor?¿Tienes ADN Emprendedor?
¿Tienes ADN Emprendedor?Lima Innova
 
1.- Consulting Services - Institucional Empresa
1.- Consulting Services - Institucional Empresa1.- Consulting Services - Institucional Empresa
1.- Consulting Services - Institucional EmpresaSergio Oroña
 
True capital usa & aum clean energy india executive summary
True capital usa & aum clean energy india executive summaryTrue capital usa & aum clean energy india executive summary
True capital usa & aum clean energy india executive summaryenergyvijay
 
ECO MOOC offering at decentralised MOOC level: services on pedagogical approa...
ECO MOOC offering at decentralised MOOC level: services on pedagogical approa...ECO MOOC offering at decentralised MOOC level: services on pedagogical approa...
ECO MOOC offering at decentralised MOOC level: services on pedagogical approa...EADTU
 
Normatividad Y Metas Del Milenio
Normatividad Y Metas Del MilenioNormatividad Y Metas Del Milenio
Normatividad Y Metas Del MilenioZulma Duran
 

Viewers also liked (20)

Discover the Mindset of the Millionaire Internet Entrepreneur
Discover the Mindset of the Millionaire Internet EntrepreneurDiscover the Mindset of the Millionaire Internet Entrepreneur
Discover the Mindset of the Millionaire Internet Entrepreneur
 
Bubblesglasses
BubblesglassesBubblesglasses
Bubblesglasses
 
Risk Triage and Prototyping In Information Security Engagements
Risk Triage and Prototyping In Information Security EngagementsRisk Triage and Prototyping In Information Security Engagements
Risk Triage and Prototyping In Information Security Engagements
 
McCool Chapter 2
McCool Chapter 2McCool Chapter 2
McCool Chapter 2
 
The Birth A Of Modern Website - Mixed Digital's Web Re-Design Case Study
The Birth A Of Modern Website - Mixed Digital's Web Re-Design Case StudyThe Birth A Of Modern Website - Mixed Digital's Web Re-Design Case Study
The Birth A Of Modern Website - Mixed Digital's Web Re-Design Case Study
 
Toma de contactos
Toma de contactosToma de contactos
Toma de contactos
 
Código de ética daqu de sonora
Código de ética daqu de sonoraCódigo de ética daqu de sonora
Código de ética daqu de sonora
 
¿Tienes ADN Emprendedor?
¿Tienes ADN Emprendedor?¿Tienes ADN Emprendedor?
¿Tienes ADN Emprendedor?
 
Arkos consultoría técnica
Arkos consultoría técnicaArkos consultoría técnica
Arkos consultoría técnica
 
1.- Consulting Services - Institucional Empresa
1.- Consulting Services - Institucional Empresa1.- Consulting Services - Institucional Empresa
1.- Consulting Services - Institucional Empresa
 
True capital usa & aum clean energy india executive summary
True capital usa & aum clean energy india executive summaryTrue capital usa & aum clean energy india executive summary
True capital usa & aum clean energy india executive summary
 
HXC New Branding/Identity
HXC New Branding/IdentityHXC New Branding/Identity
HXC New Branding/Identity
 
Ad ds ws2008 r2
Ad ds ws2008 r2Ad ds ws2008 r2
Ad ds ws2008 r2
 
ECO MOOC offering at decentralised MOOC level: services on pedagogical approa...
ECO MOOC offering at decentralised MOOC level: services on pedagogical approa...ECO MOOC offering at decentralised MOOC level: services on pedagogical approa...
ECO MOOC offering at decentralised MOOC level: services on pedagogical approa...
 
BI-RADS (MAMMOGRAPHY)
BI-RADS (MAMMOGRAPHY)BI-RADS (MAMMOGRAPHY)
BI-RADS (MAMMOGRAPHY)
 
Paludismo power point
Paludismo power pointPaludismo power point
Paludismo power point
 
Datchball
DatchballDatchball
Datchball
 
Normatividad Y Metas Del Milenio
Normatividad Y Metas Del MilenioNormatividad Y Metas Del Milenio
Normatividad Y Metas Del Milenio
 
Bearing basics SKF
Bearing basics SKFBearing basics SKF
Bearing basics SKF
 
Galgas
GalgasGalgas
Galgas
 

Similar to rit seminars-privacy assured outsourcing of image reconstruction services in the cloud

F0255046056
F0255046056F0255046056
F0255046056theijes
 
AIML4 CNN lab256 1hr (111-1).pdf
AIML4 CNN lab256 1hr (111-1).pdfAIML4 CNN lab256 1hr (111-1).pdf
AIML4 CNN lab256 1hr (111-1).pdfssuserb4d806
 
An Approach for Image Deblurring: Based on Sparse Representation and Regulari...
An Approach for Image Deblurring: Based on Sparse Representation and Regulari...An Approach for Image Deblurring: Based on Sparse Representation and Regulari...
An Approach for Image Deblurring: Based on Sparse Representation and Regulari...IRJET Journal
 
Block Image Encryption using Wavelet
Block Image Encryption using WaveletBlock Image Encryption using Wavelet
Block Image Encryption using WaveletIRJET Journal
 
An accurate retrieval through R-MAC+ descriptors for landmark recognition
An accurate retrieval through R-MAC+ descriptors for landmark recognitionAn accurate retrieval through R-MAC+ descriptors for landmark recognition
An accurate retrieval through R-MAC+ descriptors for landmark recognitionFederico Magliani
 
SupportVectorRegression
SupportVectorRegressionSupportVectorRegression
SupportVectorRegressionDaniel K
 
Exploring Support Vector Regression - Signals and Systems Project
Exploring Support Vector Regression - Signals and Systems ProjectExploring Support Vector Regression - Signals and Systems Project
Exploring Support Vector Regression - Signals and Systems ProjectSurya Chandra
 
Machine Status Prediction for Dynamic and Heterogenous Cloud Environment
Machine Status Prediction for Dynamic and Heterogenous Cloud EnvironmentMachine Status Prediction for Dynamic and Heterogenous Cloud Environment
Machine Status Prediction for Dynamic and Heterogenous Cloud Environmentjins0618
 
IRJET- Image Compression Technique for Quantized Encrypted Images using SVD
IRJET-  	  Image Compression Technique for Quantized Encrypted Images using SVDIRJET-  	  Image Compression Technique for Quantized Encrypted Images using SVD
IRJET- Image Compression Technique for Quantized Encrypted Images using SVDIRJET Journal
 
IRJET- Novel based Stock Value Prediction Method
IRJET- Novel based Stock Value Prediction MethodIRJET- Novel based Stock Value Prediction Method
IRJET- Novel based Stock Value Prediction MethodIRJET Journal
 
Iterative Determinant Method for Solving Eigenvalue Problems
Iterative Determinant Method for Solving Eigenvalue ProblemsIterative Determinant Method for Solving Eigenvalue Problems
Iterative Determinant Method for Solving Eigenvalue Problemsijceronline
 
Project 2: Baseband Data Communication
Project 2: Baseband Data CommunicationProject 2: Baseband Data Communication
Project 2: Baseband Data CommunicationDanish Bangash
 
Fpga implementation of fusion technique for fingerprint application
Fpga implementation of fusion technique for fingerprint applicationFpga implementation of fusion technique for fingerprint application
Fpga implementation of fusion technique for fingerprint applicationIAEME Publication
 
Fpga implementation of fusion technique for fingerprint application
Fpga implementation of fusion technique for fingerprint applicationFpga implementation of fusion technique for fingerprint application
Fpga implementation of fusion technique for fingerprint applicationIAEME Publication
 
Transfer Learning for Improving Model Predictions in Highly Configurable Soft...
Transfer Learning for Improving Model Predictions in Highly Configurable Soft...Transfer Learning for Improving Model Predictions in Highly Configurable Soft...
Transfer Learning for Improving Model Predictions in Highly Configurable Soft...Pooyan Jamshidi
 
GPUFish_technical_report
GPUFish_technical_reportGPUFish_technical_report
GPUFish_technical_reportCharles Hubbard
 
Final presentation optical flow estimation with DL
Final presentation  optical flow estimation with DLFinal presentation  optical flow estimation with DL
Final presentation optical flow estimation with DLLeapMind Inc
 
Prpagation of Error Bounds Across reduction interfaces
Prpagation of Error Bounds Across reduction interfacesPrpagation of Error Bounds Across reduction interfaces
Prpagation of Error Bounds Across reduction interfacesMohammad
 

Similar to rit seminars-privacy assured outsourcing of image reconstruction services in the cloud (20)

Log polar coordinates
Log polar coordinatesLog polar coordinates
Log polar coordinates
 
F0255046056
F0255046056F0255046056
F0255046056
 
AIML4 CNN lab256 1hr (111-1).pdf
AIML4 CNN lab256 1hr (111-1).pdfAIML4 CNN lab256 1hr (111-1).pdf
AIML4 CNN lab256 1hr (111-1).pdf
 
An Approach for Image Deblurring: Based on Sparse Representation and Regulari...
An Approach for Image Deblurring: Based on Sparse Representation and Regulari...An Approach for Image Deblurring: Based on Sparse Representation and Regulari...
An Approach for Image Deblurring: Based on Sparse Representation and Regulari...
 
Block Image Encryption using Wavelet
Block Image Encryption using WaveletBlock Image Encryption using Wavelet
Block Image Encryption using Wavelet
 
An accurate retrieval through R-MAC+ descriptors for landmark recognition
An accurate retrieval through R-MAC+ descriptors for landmark recognitionAn accurate retrieval through R-MAC+ descriptors for landmark recognition
An accurate retrieval through R-MAC+ descriptors for landmark recognition
 
SupportVectorRegression
SupportVectorRegressionSupportVectorRegression
SupportVectorRegression
 
Exploring Support Vector Regression - Signals and Systems Project
Exploring Support Vector Regression - Signals and Systems ProjectExploring Support Vector Regression - Signals and Systems Project
Exploring Support Vector Regression - Signals and Systems Project
 
Machine Status Prediction for Dynamic and Heterogenous Cloud Environment
Machine Status Prediction for Dynamic and Heterogenous Cloud EnvironmentMachine Status Prediction for Dynamic and Heterogenous Cloud Environment
Machine Status Prediction for Dynamic and Heterogenous Cloud Environment
 
IRJET- Image Compression Technique for Quantized Encrypted Images using SVD
IRJET-  	  Image Compression Technique for Quantized Encrypted Images using SVDIRJET-  	  Image Compression Technique for Quantized Encrypted Images using SVD
IRJET- Image Compression Technique for Quantized Encrypted Images using SVD
 
IRJET- Novel based Stock Value Prediction Method
IRJET- Novel based Stock Value Prediction MethodIRJET- Novel based Stock Value Prediction Method
IRJET- Novel based Stock Value Prediction Method
 
Iterative Determinant Method for Solving Eigenvalue Problems
Iterative Determinant Method for Solving Eigenvalue ProblemsIterative Determinant Method for Solving Eigenvalue Problems
Iterative Determinant Method for Solving Eigenvalue Problems
 
Project 2: Baseband Data Communication
Project 2: Baseband Data CommunicationProject 2: Baseband Data Communication
Project 2: Baseband Data Communication
 
Fpga implementation of fusion technique for fingerprint application
Fpga implementation of fusion technique for fingerprint applicationFpga implementation of fusion technique for fingerprint application
Fpga implementation of fusion technique for fingerprint application
 
Fpga implementation of fusion technique for fingerprint application
Fpga implementation of fusion technique for fingerprint applicationFpga implementation of fusion technique for fingerprint application
Fpga implementation of fusion technique for fingerprint application
 
Transfer Learning for Improving Model Predictions in Highly Configurable Soft...
Transfer Learning for Improving Model Predictions in Highly Configurable Soft...Transfer Learning for Improving Model Predictions in Highly Configurable Soft...
Transfer Learning for Improving Model Predictions in Highly Configurable Soft...
 
GPUFish_technical_report
GPUFish_technical_reportGPUFish_technical_report
GPUFish_technical_report
 
Final presentation optical flow estimation with DL
Final presentation  optical flow estimation with DLFinal presentation  optical flow estimation with DL
Final presentation optical flow estimation with DL
 
Prpagation of Error Bounds Across reduction interfaces
Prpagation of Error Bounds Across reduction interfacesPrpagation of Error Bounds Across reduction interfaces
Prpagation of Error Bounds Across reduction interfaces
 
AbdoSummerANS_mod3
AbdoSummerANS_mod3AbdoSummerANS_mod3
AbdoSummerANS_mod3
 

Recently uploaded

Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...fonyou31
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactPECB
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfJayanti Pande
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionSafetyChain Software
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...Sapna Thakur
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Celine George
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphThiyagu K
 
social pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajansocial pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajanpragatimahajan3
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 

Recently uploaded (20)

Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory Inspection
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
social pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajansocial pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajan
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
Advance Mobile Application Development class 07
Advance Mobile Application Development class 07Advance Mobile Application Development class 07
Advance Mobile Application Development class 07
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 

rit seminars-privacy assured outsourcing of image reconstruction services in the cloud

  • 1. PRIVACY-ASSURED OUTSOURCING OF IMAGE RECONSTRUCTION SERVICES IN THE CLOUD PRESENTED BY : UNDER GUIDENCE OF : THAHIRA A RAJI R PILLAI S7 CSE ASSISTANT PROFESSOR ROLL NO : 61 DEPARTMENT OF CSE
  • 2. OVERVIEW  INTRODUCTION  RELATED WORK  PROBLEM STATEMENT  OIRS DESIGN  EMPIRICAL EVALUATION  FUTURE SCOPE  CONCLUSION  REFERENCES 2 1/13/2015
  • 3.  Today, there is a fast growing trend to outsource the image management system to the cloud for its abundant computing resources and benefits. How to protect the sensitive data while enabling outsourced image services ?......... Outsourced Image Recovery Service (OIRS) architecture. INTRODUCTION 3 1/13/2015
  • 4. OIRS • addresses the design challenges of security , complexity , and efficiency simultaneously. OIRS • not only supports the typical sparse data service but can be extended to non sparse general data 1/13/2015 4 Security Effectiveness Efficiency Extensibility DESIGN GOALS
  • 5. LITERATURE SURVEY 1/13/2015 5 Sl no Title Strength Open end 1 “Compressed sensing”- D.Donoho Compressed sensing Basic properties only 2 “Compact storage of correlated data for content based retrieval”- A.Divekar and O.Erosy Leverage the compressed sensing to compress the storage of correlated image datasets Does not consider security 3 “The secrecy of compressed sensing measurements”- Y.Rachlin and D.Baronm Explore the inherent security strength of linear measurement provided by compressed sensing Not suited for all the conditions
  • 6. A. SERVICE MODEL AND THREAT MODEL PROBLEM STATEMENT 1/13/2015 6
  • 7. 1/13/2015 7 FIGURE2. Empirical results on the effectiveness of OIRS ,(a)-(a3) Original image ,(b)-(b3) Reconstruction via encrypted data.(c)-(c3) Reconstruction via decrypted data
  • 8. B. PRELIMINARIES • Consider an n× 1 sparse data x. After sampling ,get an m×1 sample vector, y=Rx R-m ×n selecting matrix •The real world data x might not always be sparse. •But it can be represented as a sparse vector f,(f Є ) under some properly chosen Orthonormal basis V via x = Vf. So, y= Rx = RVf = Af where A = RV 1/13/2015 8 Compressed Sensing
  • 9. •Plays an important role in the framework of compressed sensing •Image reconstruction is equivalent to solve a LP problem as below, min . r subject to y = Af , -r <= f <= r where, r- n×1 vector with positive real variables •To make a standard form, replace f and r by f = u-v r = u+v • Denote g=[u ,v] Є and F=|A,-A| Є 1/13/2015 9Linear Programming 𝟏 𝑻 min 1 𝑇 . g Subject to y = F.g , g>=0 LP denoted as , Ω = ( F,y,I,1 𝑇 )
  • 10. OIRS DESIGN A.FRAME WORK AND SECURITY DEFINITION OF OIRS The design challenge in OIRS is how the cloud efficiently solve optimization problem , Ω =(F,y,I, 1 𝑇) for image reconstruction The proposed OIRS meet the design challenges through random transformation based framework , which includes four probabilistic polynomial time algorithms. The framework of OIRS can be denoted as , = (KeyGen,ProbTran,ProbSolv,DataRec) 1/13/2015 10 KeyGen: • Generates the secret key K ProbTran: • Generates a randomly transformed Optimization Problem Ωk ProbSolv : • Solves transformed problem Ωk & Generates answer h DataRec : • Generates answer g of Ω
  • 11. B. THE BLUEPRINT OF THE PROBLEM TRANSFORMATION  To make the algorithm ProbSolv to be a standard LP solver ,they use a series of random linear transformation steps over objective function ,constraints , and feasible region of original problem Ω 1/13/2015 11
  • 12. 1.Use a random generalized permutation matrix π with positive entries. 2.Randomly pick an 2n×2n invertible matrix Q,and a 2n×1 vector e to protect the solution g via affine mapping g=Qh-e 3. Multiply a random 2n ×m matrix M to equality constraints and later mix the result together with the inequality constraint 4. Multiply a random m ×m invertible matrix P to the both sides of equality constraints 1/13/2015 12 Transformation procedure min 1 𝑇 . 𝑔 Subject to y = F. g, π.g>=0 min 1 𝑇 .(Qh - e) subject to F . Q . h = y + F . e, π . Q . h >= π . e min 1 𝑇 . (Qh- e) subject to F . Q . h = y + Fe, (π - MF)Qh >= πe - M( y +Fe) min 1 𝑇 .(Qh-e) subject to PFQ . h = P . (y + Fe) (π- MF)Qh>= πe-M(Y+Fe) min 1 𝑇 . g Subject to y = F.g , g>=0 min 1 𝑇 .(Qh-e) subject to PFQ . h = P . (y + Fe) (π- MF)Qh>= πe- M(Y+Fe
  • 13.  To make the randomly transformed problem sharing the same structure as Ω 1. make 1 𝑇 . Q is equal to 1 𝑇 2.make right hand side of the inequality constrains , r’ = πe- M(y + F e), always zero just as Ω If ignore the constant term 1 𝑇 . e in objective function,then the random LP, where F’ = PFQ , y’ = P . (y + F . e) and π’=(π.Q-MFQ) So the problem can be denoted as, Ωk = (F’,y’,π’, 1 𝑇 ) 1/13/2015 13 min 1 𝑇 . h subject to y’=F’ . h, π‘h>=0,
  • 14. C . THE SCHEME DETAILS  Two reasonable assumption about the informaton transformed between the data owner and users, 1.a master secret key sk is used to generate random sampling matrix R and secret key K for each image. 2.an orthonormal basis V , with which the image data x can be represented as a sparse vector f, 1/13/2015 14
  • 19. a, Data owner computes σ <- F(sk,s) .He then uses σ as coins to sample R and generates a secret key K = (P,Q,e,π,M) from KeyGen( 1 𝑇 ,σ). b, He acquires the sample y .With F = [RV. -RV] and y, he calls ProbTran1(K,(y,F)) to encrypt y as y’ and sends (y’,s) to cloud. 1/13/2015 191 . DATA SAMPLING PHASE a, Data owner computes σ <- F(sk,s) .He then uses σ as coins to sample R and generates a secret key K = (P,Q,e.π.M) from KeyGen(1 𝑇 ,σ).He calls ProbTran2(K,F) to get (F’,π) and sends to cloud b,With Ωk ,the cloud calls ProbSolv(Ωk) to output answer h to user ,together with seed s. c,The user computes σ <- F(sk,s) ,and uses σ to generate the key K from KeyGen(1 𝑇).He then calls DataRec(K,h) to get g =Qh-e and recovers the image x=Vf, where f is derived from g 2 . IMAGE RECOVERY PHASE
  • 20. FUTURE SCOPE & ONGOING WORKS 1/13/2015 20 SPEEDUP WITH HARDWARE BUILT-IN DESIGN • Hardware built-in design with great benefits in achieving the secure OIRS with best possible service performance and user experience.
  • 21. A. EXPERIMENT SETTING  The data owner/user and the cloud side process is implemented in MATLAB and use the MOSEK optimization toolbox(http://www.mosek.com) as the LP solver B. EFFICIENCY EVALUATION To measure the efficiency of the proposed OIRS , Specifically to focus on the computational cost of privacy assurance done by the data owner and data users ie, local side and the cost done by the cloud side EMPIRICAL EVALUATION 1/13/2015 21
  • 22. TABLE1. Preleminary efficiency evaluation results of OIRS.Here denotes the original image recovery time , the transformation time by data owner ,and the decryption time by data user,respectively 1/13/2015 22
  • 23. To evaluate how much computational savings OIRS can provide to data owner/user , calculate a variable, From the table we can see that ,OIRS can bring more than 3.4× savings for the selected size image blocks 1/13/2015 23 assymmetric speedup=asymmetric speedup =
  • 24. C. EFFECTIVENESS EVALUATION 1.CORRECTNESS EVALUATION For correctness of the design ,all the images after transformation and later recovered on the data user side , still preserves the same level of visual quality as the original images. 1/13/2015 24
  • 25. Reconstructed image quality increases along with the number of measurements and the more the better FIGURE3 . Comparison of recovered images using different number of measurements m in OIRS.(a)m=128,(b) m= 192,(c) m=256. 1/13/2015 25
  • 26.  OIRS,an outsoursed image recovery service from compressed sensing with privacy assurance With OIRS, Data owners can utilize the benefit of compressed sensing  Data users can leverage cloud’s abundant resources CONCLUSION 1/13/2015 26
  • 27. 1/13/2015 27 ADVANTAGE APPLICATIONS • Simple and Efficient • Robustness and effectiveness in handling image reconstruction • MRI in health care system • Remote sensing in geographical system • Military image sensing in mission critical context
  • 28. M. Atallah and K. Frikken, ``Securely outsourcing linear algebra computations,''in Proc. 5th ASIACCS, 2010, pp. 4859.  E. Candès and M. Wakin, ``An introduction to compressive sampling,''IEEE Signal Proc. Mag., vol. 25, no. 2, pp. 2130, Mar. 2008.  A. Yao, ``Protocols for secure computations (extended abstract),'' in Proc. FOCS, 1982, pp. 160164. REFERENCES 1/13/2015 28