|
Showing 1 - 11 of
11 matches in All Departments
With the rapid development of big data, it is necessary to transfer
the massive data generated by end devices to the cloud under the
traditional cloud computing model. However, the delays caused by
massive data transmission no longer meet the requirements of
various real-time mobile services. Therefore, the emergence of edge
computing has been recently developed as a new computing paradigm
that can collect and process data at the edge of the network, which
brings significant convenience to solving problems such as delay,
bandwidth, and off-loading in the traditional cloud computing
paradigm. By extending the functions of the cloud to the edge of
the network, edge computing provides effective data access control,
computation, processing and storage for end devices. Furthermore,
edge computing optimizes the seamless connection from the cloud to
devices, which is considered the foundation for realizing the
interconnection of everything. However, due to the open features of
edge computing, such as content awareness, real-time computing and
parallel processing, the existing problems of privacy in the edge
computing environment have become more prominent. The access to
multiple categories and large numbers of devices in edge computing
also creates new privacy issues. In this book, we discuss on the
research background and current research process of privacy
protection in edge computing. In the first chapter, the
state-of-the-art research of edge computing are reviewed. The
second chapter discusses the data privacy issue and attack models
in edge computing. Three categories of privacy preserving schemes
will be further introduced in the following chapters. Chapter three
introduces the context-aware privacy preserving scheme. Chapter
four further introduces a location-aware differential privacy
preserving scheme. Chapter five presents a new blockchain based
decentralized privacy preserving in edge computing. Chapter six
summarize this monograph and propose future research directions. In
summary, this book introduces the following techniques in edge
computing: 1) describe an MDP-based privacy-preserving model to
solve context-aware data privacy in the hierarchical edge computing
paradigm; 2) describe a SDN based clustering methods to solve the
location-aware privacy problems in edge computing; 3) describe a
novel blockchain based decentralized privacy-preserving scheme in
edge computing. These techniques enable the rapid development of
privacy-preserving in edge computing.
This book comprehensively covers the important efforts in improving
the quality of images in visual cryptography (VC), with a focus on
cases with gray scale images. It not only covers schemes in
traditional VC and extended VC for binary secret images, but also
the latest development in the analysis-by-synthesis approach. This
book distinguishes itself from the existing literature in three
ways. First, it not only reviews traditional VC for binary secret
images, but also covers recent efforts in improving visual quality
for gray scale secret images. Second, not only traditional quality
measures are reviewed, but also measures that were not used for
measuring perceptual quality of decrypted secret images, such as
Radially Averaged Power Spectrum Density (RAPSD) and residual
variance, are employed for evaluating and guiding the design of VC
algorithms. Third, unlike most VC books following a mathematical
formal style, this book tries to make a balance between engineering
intuition and mathematical reasoning. All the targeted problems and
corresponding solutions are fully motivated by practical
applications and evaluated by experimental tests, while important
security issues are presented as mathematical proof. Furthermore,
important algorithms are summarized as pseudocodes, thus enabling
the readers to reproduce the results in the book. Therefore, this
book serves as a tutorial for readers with an engineering
background as well as for experts in related areas to understand
the basics and research frontiers in visual cryptography.
This collection provides access to up to date, very high quality
research and critical perspectives on China s CCIs on an industry
by industry basis. Industries dealt with by this collection
include: advertising, architecture, art and antiques, computer
games, crafts, design, designer fashion, film and video, music,
performing arts, publishing, software, TV and radio, digital media.
The collection combines recently translated work by acknowledged
experts on individual sectors of the creative industries from
within China with more critical work by internationally-based
experts on China s CCIs and their implications beyond China. The
collection draws on the expertise of research academics and of
industry based practitioners. China s Creative and Cultural
Industries Reports is a Lens on China providing fresh, new material
and perspectives on a key area of cultural and economic development
in one of the world s fastest growing economies. Publication in the
form of a collection, which could be sold in multiple of
traditional and digital formats, either as a volume or as
individual reports, makes it possible for readers to select the
format most relevant to their interests. "
With the rapid development of big data, it is necessary to transfer
the massive data generated by end devices to the cloud under the
traditional cloud computing model. However, the delays caused by
massive data transmission no longer meet the requirements of
various real-time mobile services. Therefore, the emergence of edge
computing has been recently developed as a new computing paradigm
that can collect and process data at the edge of the network, which
brings significant convenience to solving problems such as delay,
bandwidth, and off-loading in the traditional cloud computing
paradigm. By extending the functions of the cloud to the edge of
the network, edge computing provides effective data access control,
computation, processing and storage for end devices. Furthermore,
edge computing optimizes the seamless connection from the cloud to
devices, which is considered the foundation for realizing the
interconnection of everything. However, due to the open features of
edge computing, such as content awareness, real-time computing and
parallel processing, the existing problems of privacy in the edge
computing environment have become more prominent. The access to
multiple categories and large numbers of devices in edge computing
also creates new privacy issues. In this book, we discuss on the
research background and current research process of privacy
protection in edge computing. In the first chapter, the
state-of-the-art research of edge computing are reviewed. The
second chapter discusses the data privacy issue and attack models
in edge computing. Three categories of privacy preserving schemes
will be further introduced in the following chapters. Chapter three
introduces the context-aware privacy preserving scheme. Chapter
four further introduces a location-aware differential privacy
preserving scheme. Chapter five presents a new blockchain based
decentralized privacy preserving in edge computing. Chapter six
summarize this monograph and propose future research directions. In
summary, this book introduces the following techniques in edge
computing: 1) describe an MDP-based privacy-preserving model to
solve context-aware data privacy in the hierarchical edge computing
paradigm; 2) describe a SDN based clustering methods to solve the
location-aware privacy problems in edge computing; 3) describe a
novel blockchain based decentralized privacy-preserving scheme in
edge computing. These techniques enable the rapid development of
privacy-preserving in edge computing.
This book comprehensively covers the important efforts in improving
the quality of images in visual cryptography (VC), with a focus on
cases with gray scale images. It not only covers schemes in
traditional VC and extended VC for binary secret images, but also
the latest development in the analysis-by-synthesis approach. This
book distinguishes itself from the existing literature in three
ways. First, it not only reviews traditional VC for binary secret
images, but also covers recent efforts in improving visual quality
for gray scale secret images. Second, not only traditional quality
measures are reviewed, but also measures that were not used for
measuring perceptual quality of decrypted secret images, such as
Radially Averaged Power Spectrum Density (RAPSD) and residual
variance, are employed for evaluating and guiding the design of VC
algorithms. Third, unlike most VC books following a mathematical
formal style, this book tries to make a balance between engineering
intuition and mathematical reasoning. All the targeted problems and
corresponding solutions are fully motivated by practical
applications and evaluated by experimental tests, while important
security issues are presented as mathematical proof. Furthermore,
important algorithms are summarized as pseudocodes, thus enabling
the readers to reproduce the results in the book. Therefore, this
book serves as a tutorial for readers with an engineering
background as well as for experts in related areas to understand
the basics and research frontiers in visual cryptography.
This collection provides access to up to date, very high quality
research and critical perspectives on China's CCIs on an industry
by industry basis. Industries dealt with by this collection
include: advertising, architecture, art and antiques, computer
games, crafts, design, designer fashion, film and video, music,
performing arts, publishing, software, TV and radio, digital media.
The collection combines recently translated work by acknowledged
experts on individual sectors of the creative industries from
within China with more critical work by internationally-based
experts on China's CCIs and their implications beyond China. The
collection draws on the expertise of research academics and of
industry based practitioners. China's Creative and Cultural
Industries Reports is a Lens on China providing fresh, new material
and perspectives on a key area of cultural and economic development
in one of the world's fastest growing economies. Publication in the
form of a collection, which could be sold in multiple of
traditional and digital formats, either as a volume or as
individual reports, makes it possible for readers to select the
format most relevant to their interests.
This book provides readers a complete and self-contained set of
knowledge about dependent source separation, including the latest
development in this field. The book gives an overview on blind
source separation where three promising blind separation techniques
that can tackle mutually correlated sources are presented. The book
further focuses on the non-negativity based methods, the
time-frequency analysis based methods, and the pre-coding based
methods, respectively.
This book aims to sort out the clear logic of the development of
machine learning-driven privacy preservation in IoTs, including the
advantages and disadvantages, as well as the future directions in
this under-explored domain. In big data era, an increasingly
massive volume of data is generated and transmitted in Internet of
Things (IoTs), which poses great threats to privacy protection.
Motivated by this, an emerging research topic, machine
learning-driven privacy preservation, is fast booming to address
various and diverse demands of IoTs. However, there is no existing
literature discussion on this topic in a systematically manner. The
issues of existing privacy protection methods (differential
privacy, clustering, anonymity, etc.) for IoTs, such as low data
utility, high communication overload, and unbalanced trade-off, are
identified to the necessity of machine learning-driven privacy
preservation. Besides, the leading and emerging attacks pose
further threats to privacy protection in this scenario. To mitigate
the negative impact, machine learning-driven privacy preservation
methods for IoTs are discussed in detail on both the advantages and
flaws, which is followed by potentially promising research
directions. Readers may trace timely contributions on machine
learning-driven privacy preservation in IoTs. The advances cover
different applications, such as cyber-physical systems, fog
computing, and location-based services. This book will be of
interest to forthcoming scientists, policymakers, researchers, and
postgraduates.
This book gives a comprehensive and systematic review of secure
compressive sensing (CS) for applications in various fields such as
image processing, pattern recognition, Internet of things (IoT),
and cloud computing. It will help readers grasp the knowledge of
secure CS and its applications, and stimulate more readers to work
on the research and development of secure CS. It discusses how CS
becomes a cryptosystem, followed by the corresponding designs and
analyses. The application of CS in multimedia data encryption is
presented, in which the general design framework is given together
with several particular frameworks including parallel CS,
involvement of image processing techniques, and double protection
mechanism. It also describes the applications of CS in cloud
computing security and IoT security, i.e., privacy-preserving
reconstruction in cloud computing and secure low-cost sampling in
IoT, respectively.
This book offers comprehensive coverage on the most important
aspects of audio watermarking, from classic techniques to the
latest advances, from commonly investigated topics to emerging
research subdomains, and from the research and development
achievements to date, to current limitations, challenges, and
future directions. It also addresses key topics such as reversible
audio watermarking, audio watermarking with encryption, and
imperceptibility control methods. The book sets itself apart from
the existing literature in three main ways. Firstly, it not only
reviews classical categories of audio watermarking techniques, but
also provides detailed descriptions, analysis and experimental
results of the latest work in each category. Secondly, it
highlights the emerging research topic of reversible audio
watermarking, including recent research trends, unique features,
and the potentials of this subdomain. Lastly, the joint
consideration of audio watermarking and encryption is also
reviewed. With the help of this concept, more secure audio
watermarking systems can be developed, which meet the requirements
for security and privacy in cloud-based networks and systems.
Accordingly, the book serves as a tutorial suitable for readers
with a general knowledge of audio signal processing as well as
experts in related areas, helping these readers understand the
basic principles and the latest advances, concepts and applications
of audio watermarking.
This book provides a comprehensive study of the state of the art in
location privacy for mobile applications. It presents an integrated
five-part framework for location privacy research, which includes
the analysis of location privacy definitions, attacks and
adversaries, location privacy protection methods, location privacy
metrics, and location-based mobile applications. In addition, it
analyses the relationships between the various elements of location
privacy, and elaborates on real-world attacks in a specific
application. Furthermore, the book features case studies of three
applications and shares valuable insights into future research
directions. Shedding new light on key research issues in location
privacy and promoting the advance and development of future
location-based mobile applications, it will be of interest to a
broad readership, from students to researchers and engineers in the
field.
|
|