Skip to main content

Compressed Sensing for Privacy-Preserving Data Processing

  • Book
  • © 2019

Overview

  • Comprehensively describes the state of the art in compressed sensing and security and related applications
  • Includes software that allows readers to follow the theory and reproduce the experiments
  • Covers applications for the use of compressed sensing as a cryptosystem and a privacy-preserving embedding

Part of the book series: SpringerBriefs in Electrical and Computer Engineering (BRIEFSELECTRIC)

Part of the book sub series: SpringerBriefs in Signal Processing (BRIEFSSIGNAL)

This is a preview of subscription content, log in via an institution to check access.

Access this book

eBook USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

Licence this eBook for your library

Institutional subscriptions

Table of contents (5 chapters)

Keywords

About this book

The objective of this book is to provide the reader with a comprehensive survey of the topic compressed sensing in information retrieval and signal detection with privacy preserving functionality without compromising the performance of the embedding in terms of accuracy or computational efficiency. The reader is guided in exploring the topic by first establishing a shared knowledge about compressed sensing and how it is used nowadays. Then, clear models and definitions for its use as a cryptosystem and a privacy-preserving embedding are laid down, before tackling state-of-the-art results for both applications. The reader will conclude the book having learned that the current results in terms of security of compressed techniques allow it to be a very promising solution to many practical problems of interest. The book caters to a broad audience among researchers, scientists, or engineers with very diverse backgrounds, having interests in security, cryptography and privacy in informationretrieval systems. Accompanying software is made available on the authors’ website to reproduce the experiments and techniques presented in the book. The only background required to the reader is a good knowledge of linear algebra, probability and information theory.

Authors and Affiliations

  • Department of Electronics and Telecommunications, Politecnico di Torino, Turin, Italy

    Matteo Testa, Diego Valsesia, Tiziano Bianchi, Enrico Magli

Bibliographic Information

Publish with us