Efficient and Privacy-Preserving Outsourcing of 2D-DCT and 2D-IDCT

As a subset of discrete Fourier transform (DFT), discrete cosine transform (DCT), especially two-dimensional discrete cosine transform (2D-DCT), is an important mathematical tool for digital signal processing. However, the computational complexity of 2D-DCT is quite high, which makes it impossible t...

Full description

Bibliographic Details
Main Authors: Dezhi An, Shengcai Zhang, Jun Lu, Yan Li
Format: Article
Language:English
Published: Hindawi-Wiley 2020-01-01
Series:Wireless Communications and Mobile Computing
Online Access:http://dx.doi.org/10.1155/2020/8892838
id doaj-3f6cf64358594a0cb7afd043a663723d
record_format Article
spelling doaj-3f6cf64358594a0cb7afd043a663723d2020-11-25T03:18:59ZengHindawi-WileyWireless Communications and Mobile Computing1530-86691530-86772020-01-01202010.1155/2020/88928388892838Efficient and Privacy-Preserving Outsourcing of 2D-DCT and 2D-IDCTDezhi An0Shengcai Zhang1Jun Lu2Yan Li3School of Cyber Security, Gansu University of Political Science and Law, Lanzhou 730070, ChinaSchool of Cyber Security, Gansu University of Political Science and Law, Lanzhou 730070, ChinaSchool of Cyber Security, Gansu University of Political Science and Law, Lanzhou 730070, ChinaSchool of Cyber Security, Gansu University of Political Science and Law, Lanzhou 730070, ChinaAs a subset of discrete Fourier transform (DFT), discrete cosine transform (DCT), especially two-dimensional discrete cosine transform (2D-DCT), is an important mathematical tool for digital signal processing. However, the computational complexity of 2D-DCT is quite high, which makes it impossible to meet the requirements in some signal processing fields with large signal sizes. In addition, to optimize the 2D-DCT algorithm itself, seeking help from a cloud platform is considered to be an excellent alternative to dramatically speeding up 2D-DCT operations. Still, there are three key challenges in cloud computing outsourcing that need to be addressed, including protecting the privacy of input and output data, ensuring the correctness of the returned results, and ensuring adequate local cost savings. In this paper, we explore the design of a practical outsourcing protocol for 2D-DCT and 2D-IDCT, which well solves the above three challenges. Both theoretical analysis and simulation experiment results not only confirm the feasibility of the proposed protocol but also show its outstanding performance in efficiency.http://dx.doi.org/10.1155/2020/8892838
collection DOAJ
language English
format Article
sources DOAJ
author Dezhi An
Shengcai Zhang
Jun Lu
Yan Li
spellingShingle Dezhi An
Shengcai Zhang
Jun Lu
Yan Li
Efficient and Privacy-Preserving Outsourcing of 2D-DCT and 2D-IDCT
Wireless Communications and Mobile Computing
author_facet Dezhi An
Shengcai Zhang
Jun Lu
Yan Li
author_sort Dezhi An
title Efficient and Privacy-Preserving Outsourcing of 2D-DCT and 2D-IDCT
title_short Efficient and Privacy-Preserving Outsourcing of 2D-DCT and 2D-IDCT
title_full Efficient and Privacy-Preserving Outsourcing of 2D-DCT and 2D-IDCT
title_fullStr Efficient and Privacy-Preserving Outsourcing of 2D-DCT and 2D-IDCT
title_full_unstemmed Efficient and Privacy-Preserving Outsourcing of 2D-DCT and 2D-IDCT
title_sort efficient and privacy-preserving outsourcing of 2d-dct and 2d-idct
publisher Hindawi-Wiley
series Wireless Communications and Mobile Computing
issn 1530-8669
1530-8677
publishDate 2020-01-01
description As a subset of discrete Fourier transform (DFT), discrete cosine transform (DCT), especially two-dimensional discrete cosine transform (2D-DCT), is an important mathematical tool for digital signal processing. However, the computational complexity of 2D-DCT is quite high, which makes it impossible to meet the requirements in some signal processing fields with large signal sizes. In addition, to optimize the 2D-DCT algorithm itself, seeking help from a cloud platform is considered to be an excellent alternative to dramatically speeding up 2D-DCT operations. Still, there are three key challenges in cloud computing outsourcing that need to be addressed, including protecting the privacy of input and output data, ensuring the correctness of the returned results, and ensuring adequate local cost savings. In this paper, we explore the design of a practical outsourcing protocol for 2D-DCT and 2D-IDCT, which well solves the above three challenges. Both theoretical analysis and simulation experiment results not only confirm the feasibility of the proposed protocol but also show its outstanding performance in efficiency.
url http://dx.doi.org/10.1155/2020/8892838
work_keys_str_mv AT dezhian efficientandprivacypreservingoutsourcingof2ddctand2didct
AT shengcaizhang efficientandprivacypreservingoutsourcingof2ddctand2didct
AT junlu efficientandprivacypreservingoutsourcingof2ddctand2didct
AT yanli efficientandprivacypreservingoutsourcingof2ddctand2didct
_version_ 1715249588311425024