Efficient and Privacy-Preserving Outsourcing of 2D-DCT and 2D-IDCT
As a subset of discrete Fourier transform (DFT), discrete cosine transform (DCT), especially two-dimensional discrete cosine transform (2D-DCT), is an important mathematical tool for digital signal processing. However, the computational complexity of 2D-DCT is quite high, which makes it impossible t...
Main Authors: | , , , |
---|---|
Format: | Article |
Language: | English |
Published: |
Hindawi-Wiley
2020-01-01
|
Series: | Wireless Communications and Mobile Computing |
Online Access: | http://dx.doi.org/10.1155/2020/8892838 |
id |
doaj-3f6cf64358594a0cb7afd043a663723d |
---|---|
record_format |
Article |
spelling |
doaj-3f6cf64358594a0cb7afd043a663723d2020-11-25T03:18:59ZengHindawi-WileyWireless Communications and Mobile Computing1530-86691530-86772020-01-01202010.1155/2020/88928388892838Efficient and Privacy-Preserving Outsourcing of 2D-DCT and 2D-IDCTDezhi An0Shengcai Zhang1Jun Lu2Yan Li3School of Cyber Security, Gansu University of Political Science and Law, Lanzhou 730070, ChinaSchool of Cyber Security, Gansu University of Political Science and Law, Lanzhou 730070, ChinaSchool of Cyber Security, Gansu University of Political Science and Law, Lanzhou 730070, ChinaSchool of Cyber Security, Gansu University of Political Science and Law, Lanzhou 730070, ChinaAs a subset of discrete Fourier transform (DFT), discrete cosine transform (DCT), especially two-dimensional discrete cosine transform (2D-DCT), is an important mathematical tool for digital signal processing. However, the computational complexity of 2D-DCT is quite high, which makes it impossible to meet the requirements in some signal processing fields with large signal sizes. In addition, to optimize the 2D-DCT algorithm itself, seeking help from a cloud platform is considered to be an excellent alternative to dramatically speeding up 2D-DCT operations. Still, there are three key challenges in cloud computing outsourcing that need to be addressed, including protecting the privacy of input and output data, ensuring the correctness of the returned results, and ensuring adequate local cost savings. In this paper, we explore the design of a practical outsourcing protocol for 2D-DCT and 2D-IDCT, which well solves the above three challenges. Both theoretical analysis and simulation experiment results not only confirm the feasibility of the proposed protocol but also show its outstanding performance in efficiency.http://dx.doi.org/10.1155/2020/8892838 |
collection |
DOAJ |
language |
English |
format |
Article |
sources |
DOAJ |
author |
Dezhi An Shengcai Zhang Jun Lu Yan Li |
spellingShingle |
Dezhi An Shengcai Zhang Jun Lu Yan Li Efficient and Privacy-Preserving Outsourcing of 2D-DCT and 2D-IDCT Wireless Communications and Mobile Computing |
author_facet |
Dezhi An Shengcai Zhang Jun Lu Yan Li |
author_sort |
Dezhi An |
title |
Efficient and Privacy-Preserving Outsourcing of 2D-DCT and 2D-IDCT |
title_short |
Efficient and Privacy-Preserving Outsourcing of 2D-DCT and 2D-IDCT |
title_full |
Efficient and Privacy-Preserving Outsourcing of 2D-DCT and 2D-IDCT |
title_fullStr |
Efficient and Privacy-Preserving Outsourcing of 2D-DCT and 2D-IDCT |
title_full_unstemmed |
Efficient and Privacy-Preserving Outsourcing of 2D-DCT and 2D-IDCT |
title_sort |
efficient and privacy-preserving outsourcing of 2d-dct and 2d-idct |
publisher |
Hindawi-Wiley |
series |
Wireless Communications and Mobile Computing |
issn |
1530-8669 1530-8677 |
publishDate |
2020-01-01 |
description |
As a subset of discrete Fourier transform (DFT), discrete cosine transform (DCT), especially two-dimensional discrete cosine transform (2D-DCT), is an important mathematical tool for digital signal processing. However, the computational complexity of 2D-DCT is quite high, which makes it impossible to meet the requirements in some signal processing fields with large signal sizes. In addition, to optimize the 2D-DCT algorithm itself, seeking help from a cloud platform is considered to be an excellent alternative to dramatically speeding up 2D-DCT operations. Still, there are three key challenges in cloud computing outsourcing that need to be addressed, including protecting the privacy of input and output data, ensuring the correctness of the returned results, and ensuring adequate local cost savings. In this paper, we explore the design of a practical outsourcing protocol for 2D-DCT and 2D-IDCT, which well solves the above three challenges. Both theoretical analysis and simulation experiment results not only confirm the feasibility of the proposed protocol but also show its outstanding performance in efficiency. |
url |
http://dx.doi.org/10.1155/2020/8892838 |
work_keys_str_mv |
AT dezhian efficientandprivacypreservingoutsourcingof2ddctand2didct AT shengcaizhang efficientandprivacypreservingoutsourcingof2ddctand2didct AT junlu efficientandprivacypreservingoutsourcingof2ddctand2didct AT yanli efficientandprivacypreservingoutsourcingof2ddctand2didct |
_version_ |
1715249588311425024 |