25 research outputs found
Privacy-Preserving Identification via Layered Sparse Code Design: Distributed Servers and Multiple Access Authorization
We propose a new computationally efficient privacy-preserving identification
framework based on layered sparse coding. The key idea of the proposed
framework is a sparsifying transform learning with ambiguization, which
consists of a trained linear map, a component-wise nonlinearity and a privacy
amplification. We introduce a practical identification framework, which
consists of two phases: public and private identification. The public untrusted
server provides the fast search service based on the sparse privacy protected
codebook stored at its side. The private trusted server or the local client
application performs the refined accurate similarity search using the results
of the public search and the layered sparse codebooks stored at its side. The
private search is performed in the decoded domain and also the accuracy of
private search is chosen based on the authorization level of the client. The
efficiency of the proposed method is in computational complexity of encoding,
decoding, "encryption" (ambiguization) and "decryption" (purification) as well
as storage complexity of the codebooks.Comment: EUSIPCO 201
Joint Source-Channel Coding for Broadcast Channel with Cooperating Receivers
It is known that, as opposed to point-to-point channel, separate source and
channel coding is not optimal in general for sending correlated sources over
multiuser channels. In some works joint source-channel coding has been
investigated for some certain multiuser channels; i.g., multiple access channel
(MAC) and broadcast channel (BC). In this paper, we obtain a sufficient
condition for transmitting arbitrarily correlated sources over a discrete
memoryless BC with cooperating receivers, where the receivers are allowed to
exchange messages via a pair of noisy cooperative links. It is seen that our
results is a general form of previous ones and includes them as its special
cases.Comment: to appear in Proceedings of IEEE Information Theory Workshop - Fall
(ITW'2015
Analysis of Coverage Region for MIMO Relay Network with Multiple Cooperative DF-Relays
We study and analyze coverage region in MIMO communication systems for a
multiple-relay network with decode-and-forward (DF) strategy at the relays.
Assuming that there is a line-of-sight (LOS) propagation environment for
source-relay channels and channel state information is available at receivers
(CSIR), we consider the objective of maximizing coverage region for a given
transmission rate and show numerically the significant effect of propagation
environment on capacity bounds, optimal relay location and coverage region.
Also, we study the situation in which two adjacent relays cooperate in
transmission signals to the destination and show analytically that the coverage
region is extended compared to noncooperative scenario.Comment: Accepted for publication in International Symposium on Wireless
Communication Systems (ISWCS) 201
Aggregation and embedding for group membership verification
accepted at ICASSP 2019International audienceThis paper proposes a group membership verification protocol preventing the curious but honest server from reconstructing the enrolled signatures and inferring the identity of querying clients. The protocol quantizes the signatures into discrete embeddings, making reconstruction difficult. It also aggregates multiple embeddings into representative values, impeding identification. Theoretical and experimental results show the trade-off between the security and error rates