{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,6]],"date-time":"2026-03-06T19:01:01Z","timestamp":1772823661403,"version":"3.50.1"},"reference-count":32,"publisher":"Institute of Electronics, Information and Communications Engineers (IEICE)","issue":"9","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEICE Trans. Inf. &amp; Syst."],"published-print":{"date-parts":[[2020,9,1]]},"DOI":"10.1587\/transinf.2019edp7309","type":"journal-article","created":{"date-parts":[[2020,8,31]],"date-time":"2020-08-31T22:14:46Z","timestamp":1598912086000},"page":"1988-1997","source":"Crossref","is-referenced-by-count":16,"title":["Secure OMP Computation Maintaining Sparse Representations and Its Application to EtC Systems"],"prefix":"10.1587","volume":"E103.D","author":[{"given":"Takayuki","family":"NAKACHI","sequence":"first","affiliation":[{"name":"NTT Network Innovation Laboratories, NTT Corporation"}]},{"given":"Hitoshi","family":"KIYA","sequence":"additional","affiliation":[{"name":"Tokyo Metropolitan University"}]}],"member":"532","reference":[{"key":"1","unstructured":"[1] H.B. Barlow, \u201cPossible principles underlying the transformations of sensory messages,\u201d Sensory Communication, pp.217-234, 1961. 10.7551\/mitpress\/9780262518420.003.0013"},{"key":"2","doi-asserted-by":"publisher","unstructured":"[2] M. Elad, \u201cSparse and redundant representation modeling \u2014 what next?,\u201d IEEE Signal Process. Lett. , vol.19, no.12, pp.922-928, Dec. 2012. 10.1109\/LSP.2012.2224655","DOI":"10.1109\/LSP.2012.2224655"},{"key":"3","doi-asserted-by":"crossref","unstructured":"[3] M. Elad, Sparse and Redundant Representations: From Theory to Applications in Signal and Image Processing, Springer, 2010.","DOI":"10.1007\/978-1-4419-7011-4"},{"key":"4","doi-asserted-by":"crossref","unstructured":"[4] K. Skretting and K. Engan, \u201cImage compression using learned dictionaries by RLS-DLA and compared with K-SVD,\u201d IEEE ICASSP, pp.1517-1520, 2011. 10.1109\/ICASSP.2011.5946782","DOI":"10.1109\/ICASSP.2011.5946782"},{"key":"5","doi-asserted-by":"publisher","unstructured":"[5] O. Bryt and M. Elad, \u201cCompression of facial images using the K-SVD algorithm,\u201d J. Visual Communication and Image Representation, vol.19, no.4, pp.270-282, May 2008. 10.1016\/j.jvcir.2008.03.001","DOI":"10.1016\/j.jvcir.2008.03.001"},{"key":"6","doi-asserted-by":"publisher","unstructured":"[6] Y. Sun, X. Tao, Y. Li, and J. Lu, \u201cDictionary learning for image coding based on multisample sparse representation,\u201d IEEE Trans. Circuits Syst. Video Technol., vol.24, no.11, pp.2004-2010, Nov. 2014. 10.1109\/TCSVT.2014.2319652","DOI":"10.1109\/TCSVT.2014.2319652"},{"key":"7","doi-asserted-by":"publisher","unstructured":"[7] X. Zhang, W. Lin, Y. Zhang, S. Wang, S. Ma, L. Duan, and W. Gao, \u201cRate-distortion optimized sparse coding with ordered dictionary for image set compression,\u201d IEEE Trans. Circuits Syst. Video Technol., vol.28, no.12, pp.3387-3397, Dec. 2018. 10.1109\/TCSVT.2017.2748382","DOI":"10.1109\/TCSVT.2017.2748382"},{"key":"8","doi-asserted-by":"publisher","unstructured":"[8] M.D. Plumbley, T. Blumensath, L. Daudet, R. Gribonval, and M.E. Davies, \u201cSparse representations in audio and music: From coding to source separation,\u201d Proc. IEEE, vol.98, no.6, pp.995-1005, June 2010. 10.1109\/JPROC.2009.2030345","DOI":"10.1109\/JPROC.2009.2030345"},{"key":"9","doi-asserted-by":"publisher","unstructured":"[9] H. Morioka, A. Kanemura, J. Hirayama, M. Shikauchi, T. Ogawa, S. Ikeda, M. Kawanabe, and S. Ishii, \u201cLearning a common dictionary for subject-transfer decoding with resting calibration,\u201d NeuroImage, vol.111, pp.167-178, 2015. 10.1016\/j.neuroimage.2015.02.015","DOI":"10.1016\/j.neuroimage.2015.02.015"},{"key":"10","doi-asserted-by":"publisher","unstructured":"[10] F.J. Herrmann and G. Hennenfent, \u201cNon-parametric seismic data recovery with curvelet frames,\u201d Geophysical Journal International, vol.173, no.1, pp.233-248, April 2008. 10.1111\/j.1365-246X.2007.03698.x","DOI":"10.1111\/j.1365-246X.2007.03698.x"},{"key":"11","doi-asserted-by":"publisher","unstructured":"[11] C.T. Huang, L. Huang, Z. Qin, H. Yuan, L. Zhou, V. Varadharajan, and C-C.J. Kuo, \u201cSurvey on securing data storage in the cloud,\u201d APSIPA Transactions on Signal and Information Processing, vol.3, e7, 2014. 10.1017\/atsip.2014.6","DOI":"10.1017\/ATSIP.2014.6"},{"key":"12","doi-asserted-by":"crossref","unstructured":"[12] W. Lu, S. Kawasaki, and J. Sakuma, \u201cUsing fully homomorphic encryption for statistical analysis of categorical, ordinal and numerical data,\u201d IACR Cryptology ePrint Archive, 2016:1163, 2016. 10.14722\/ndss.2017.23119","DOI":"10.14722\/ndss.2017.23119"},{"key":"13","doi-asserted-by":"crossref","unstructured":"[13] Z. Brakerski, \u201cFundamentals of fully homomorphic encryption-A survey,\u201d Electronic Colloquium on Computational Complexity, report no.125, 2018.","DOI":"10.1145\/3335741.3335762"},{"key":"14","doi-asserted-by":"crossref","unstructured":"[14] T. Araki, A. Barak, J. Furukawa, T. Lichter, Y. Lindell, A. Nof, K. Ohara, A. Watzman, and O. Weinstein, \u201cOptimized honest-majority MPC for malicious adversaries-breaking the 1 billion-gate per second barrier,\u201d 2017 IEEE Symposium on Security and Privacy (SP), pp.843-862, May 2017. 10.1109\/SP.2017.15","DOI":"10.1109\/SP.2017.15"},{"key":"15","unstructured":"[15] W. Yongjin and K.N. Plataniotis, \u201cFace based biometric authentication with changeable and privacy preservable templates,\u201d Biometrics Symposium, pp.1-6, 2007. 10.1109\/BCC.2007.4430530"},{"key":"16","doi-asserted-by":"publisher","unstructured":"[16] I. Nakamura, Y. Tonomura, and H. Kiya, \u201cUnitary transform-based template protection and its application to l2-norm minimization problems,\u201d IEICE Trans. Inf. &amp; Syst., vol.E99-D, no.1, pp.60-68, Jan. 2016. 10.1587\/transinf.2015MUP0007","DOI":"10.1587\/transinf.2015MUP0007"},{"key":"17","doi-asserted-by":"crossref","unstructured":"[17] Y. Saito, I. Nakamura, S. Shiota, and H. Kiya, \u201cAn efficient random unitary matrix for biometric template protection,\u201d 2016 Joint 8th Int. Conf. Soft Computing and Intelligent Systems (SCIS) and 17th International Symposium on Advanced Intelligent Systems (ISIS), pp.366-370, 2016. 10.1109\/SCIS-ISIS.2016.0082","DOI":"10.1109\/SCIS-ISIS.2016.0082"},{"key":"18","doi-asserted-by":"crossref","unstructured":"[18] T. Nakachi and H. Kiya, \u201cPractical secure OMP computation and its application to image modeling,\u201d ACM IHIP2018. 10.1145\/3292425.3292426","DOI":"10.1145\/3292425.3292426"},{"key":"19","doi-asserted-by":"crossref","unstructured":"[19] T. Nakachi, H. Ishihara, and H. Kiya, \u201cPrivacy-preserving network BMI decoding of covert spatial attention,\u201d IEEE Int. Conf. Signal Processing and Communication Systems (ICSPCS), pp.1-8, Cairns, Australia, 2018. 10.1109\/ICSPCS.2018.8631768","DOI":"10.1109\/ICSPCS.2018.8631768"},{"key":"20","unstructured":"[20] Y.C. Pati, R. Rezaiifar, and P.S. Krishnaprasad, \u201cOrthogonal matching pursuit: Recursive function approximation with applications to wavelet decomposition,\u201d 27th Asilomar Conference on Signals, Systems, and Computers, pp.40-44, 1993. 10.1109\/ACSSC.1993.342465"},{"key":"21","doi-asserted-by":"publisher","unstructured":"[21] W. Liu, W. Zeng, L. Dong, and Q. Yao, \u201cEfficient compression of encrypted grayscale images,\u201d IEEE Trans. Image Process., vol.19, no.4, pp.1097-1102, April 2010. 10.1109\/TIP.2009.2038773","DOI":"10.1109\/TIP.2009.2038773"},{"key":"22","doi-asserted-by":"publisher","unstructured":"[22] X. Zhang, \u201cLossy compression and iterative reconstruction for encrypted image,\u201d IEEE Trans. Inf. Forensics Security, vol.6, no.1, pp.53-58, March 2011. 10.1109\/TIFS.2010.2099114","DOI":"10.1109\/TIFS.2010.2099114"},{"key":"23","doi-asserted-by":"crossref","unstructured":"[23] R. Hu, X. Li, and B. Yang, \u201cA new lossy compression scheme for encrypted gray-scale images,\u201d IEEE Int. Conf. Acoustics, Speech Signal Process. (ICASSP), pp.7387-7390, 2014. 10.1109\/ICASSP.2014.6855035","DOI":"10.1109\/ICASSP.2014.6855035"},{"key":"24","doi-asserted-by":"publisher","unstructured":"[24] K. Kurihara, M. Kikuchi, S. Imaizumi, S. Shiota, and H. Kiya, \u201cAn encryption-then-compression system for JPEG\/Motion JPEG standard,\u201d IEICE Trans. Fundamentals, vol.E98-A, no.11, pp.2238-2245, Nov. 2015. 10.1587\/transfun.E98.A.2238","DOI":"10.1587\/transfun.E98.A.2238"},{"key":"25","doi-asserted-by":"publisher","unstructured":"[25] T. Chuman, K. Iida, W. Sirichotedumrong, and H. Kiya, \u201cImage manipulation specifications on social networking services for encryption-then-compression systems,\u201d IEICE Trans. Inf. &amp; Syst., vol.E102.D, no.1, pp.11-18. Jan. 2019. 10.1587\/transinf.2018MUP0001","DOI":"10.1587\/transinf.2018MUP0001"},{"key":"26","doi-asserted-by":"publisher","unstructured":"[26] T. Chuman, W. Sirichotedumrong, and H. Kiya, \u201cEncryption-then-compression systems using grayscale-based image encryption for JPEG images,\u201d IEEE Trans. Inf. Forensics Security, vol.14, no.6, pp.1515-1525, June 2019. 10.1109\/TIFS.2018.2881677","DOI":"10.1109\/TIFS.2018.2881677"},{"key":"27","doi-asserted-by":"publisher","unstructured":"[27] B.K. Natarajan, \u201cSparse approximate solutions to linear systems,\u201d SIAM J. Computing, vol.24, no.2, pp.227-234, 1995. 10.1137\/S0097539792240406","DOI":"10.1137\/S0097539792240406"},{"key":"28","doi-asserted-by":"crossref","unstructured":"[28] S.G. Mallat and Z. Zhang, \u201cMatching pursuits with time-frequency dictionaries,\u201d IEEE Trans. Signal Processing, vol.41, no.12, pp.3397-3415, Dec. 1993. 10.1109\/78.258082","DOI":"10.1109\/78.258082"},{"key":"29","doi-asserted-by":"publisher","unstructured":"[29] T.S. Lee, \u201cImage representation using 2D Gabor wavelets,\u201d IEEE Trans. Pattern Anal. Mach. Intell., vol.18, no.10, pp.959-971, Oct. 1996. 10.1109\/34.541406","DOI":"10.1109\/34.541406"},{"key":"30","unstructured":"[30] E. Cand\u00e8s and D. Donoho, \u201cCurvelets: A surprisingly effective nonadaptive representation for objects with edges,\u201d ed. L.L. Schumaker et al., Curves and Surfaces, Vanderbilt University Press, 1999."},{"key":"31","doi-asserted-by":"crossref","unstructured":"[31] K. Engan, S.O. Aase, and J. Hakon Husoy, \u201cMethod of optimal directions for frame design,\u201d IEEE Int. Conf. Acoustics, Speech Signal Process. (ICASSP), pp.2443-2446, 1999. 10.1109\/ICASSP.1999.760624","DOI":"10.1109\/ICASSP.1999.760624"},{"key":"32","doi-asserted-by":"crossref","unstructured":"[32] M. Aharon, M. Elad, and A. Bruckstein, \u201cK-SVD: An algorithm for designing overcomplete dictionaries for sparse representation,\u201d IEEE Trans. Signal Processing, vol.54, no.11, pp.4311-4322, Nov. 2006. 10.1109\/TSP.2006.881199","DOI":"10.1109\/TSP.2006.881199"}],"container-title":["IEICE Transactions on Information and Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.jstage.jst.go.jp\/article\/transinf\/E103.D\/9\/E103.D_2019EDP7309\/_pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,9,5]],"date-time":"2020-09-05T03:26:52Z","timestamp":1599276412000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.jstage.jst.go.jp\/article\/transinf\/E103.D\/9\/E103.D_2019EDP7309\/_article"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,9,1]]},"references-count":32,"journal-issue":{"issue":"9","published-print":{"date-parts":[[2020]]}},"URL":"https:\/\/doi.org\/10.1587\/transinf.2019edp7309","relation":{},"ISSN":["0916-8532","1745-1361"],"issn-type":[{"value":"0916-8532","type":"print"},{"value":"1745-1361","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,9,1]]}}}