Privacy-Preserving Image Deblurring with Federated Learning through an Adaptive Framework for Cloud-Assisted Devices
Keywords:
Deblurring, Wiener filter, Encrypted image storage, Federated learning, Edge device, Data privacy.Abstract
This research introduces a cutting-edge approach to image deblurring while prioritizing data privacy. Leveraging federated learning and incorporating advanced techniques such as the wiener filter, encrypted image storage, and cloud-based infrastructure, the proposed framework enables collaborative model training across distributed edge devices while preserving the confidentiality of sensitive data. The framework utilizes a cloud server and database for efficient data management and storage, ensuring seamless integration and scalability. By employing federated learning, individual devices participate in model training without compromising data privacy, while encrypted image storage safeguards against unauthorized access. The wiener filter enhances the deblurring process, optimizing image quality and accuracy. Through federated learning, the framework achieves collaborative model training across diverse edge devices, effectively distributing computational tasks while minimizing data exposure. The integration of encrypted image storage ensures robust protection of sensitive data, mitigating privacy concerns associated with centralized data storage. The utilization of the wiener filter enhances image deblurring performance, resulting in improved image quality and sharper outputs. The framework offers a holistic solution for privacy-preserving image deblurring, combining state-of-the-art techniques with federated learning to achieve superior results while maintaining data privacy and security.Top of Form
Downloads
References
Yang, S., Xie, L., Ran, X., Lei, J., & Qian, X. (2024). Pragmatic degradation learning for scene text image super-resolution with data-training strategy. Knowledge-Based Systems, 285, 111349.
Himeur, Y., Sayed, A., Alsalemi, A., Bensaali, F., & Amira, A. (2023). Edge AI for Internet of Energy: Challenges and perspectives. Internet of Things, 101035.
Rauniyar, A., Hagos, D. H., Jha, D., Håkegård, J. E., Bagci, U., Rawat, D. B., & Vlassov, V. (2023). Federated learning for medical applications: A taxonomy, current trends, challenges, and future research directions. IEEE Internet of Things Journal.
Sun, D., Hu, J., Wu, H., Wu, J., Yang, J., Sheng, Q. Z., & Dustdar, S. (2023). A Comprehensive Survey on Collaborative Data-access Enablers in the IIoT. ACM Computing Surveys, 56(2), 1-37.
Qi, P., Chiaro, D., Guzzo, A., Ianni, M., Fortino, G., & Piccialli, F. (2023). Model aggregation techniques in federated learning: A comprehensive survey. Future Generation Computer Systems.
Meguerdichian, S., Slijepcevic, S., Karayan, V., & Potkonjak, M. (2001, October). Localized algorithms in wireless ad-hoc networks: Location discovery and sensor exposure. In Proceedings of the 2nd ACM international symposium on Mobile ad hoc networking & computing (pp. 106-116).
Rana, P. K., & Jhanwar, D. (2019). Image deblurring methodology using wiener filter & genetic algorithm. International Journal of Advanced Engineering Research and Science, 6(9), 1-18.
Zhang, J., Chen, B., Zhao, Y., Cheng, X., & Hu, F. (2018). Data security and privacy-preserving in edge computing paradigm: Survey and open issues. IEEE access, 6, 18209-18237.
Shen, M., Deng, Y., Zhu, L., Du, X., & Guizani, N. (2019). Privacy-preserving image retrieval for medical IoT systems: A blockchain-based approach. IEEE Network, 33(5), 27-33.
Owusu-Agyemeng, K., Qin, Z., Xiong, H., Liu, Y., Zhuang, T., & Qin, Z. (2021). MSDP: multi-scheme privacy-preserving deep learning via differential privacy. Personal and Ubiquitous Computing, 1-13.
Jia, B., Zhang, X., Liu, J., Zhang, Y., Huang, K., & Liang, Y. (2021). Blockchain-enabled federated learning data protection aggregation scheme with differential privacy and homomorphic encryption in IIoT. IEEE Transactions on Industrial Informatics, 18(6), 4049-4058.
Abreha, H. G., Hayajneh, M., & Serhani, M. A. (2022). Federated learning in edge computing: a systematic survey. Sensors, 22(2), 450.
Tian, Y., Wang, S., Xiong, J., Bi, R., Zhou, Z., & Bhuiyan, M. Z. A. (2023). Robust and privacy-preserving decentralized deep federated learning training: Focusing on digital healthcare applications. IEEE/ACM Transactions on Computational Biology and Bioinformatics.
Wei, K., Li, J., Ding, M., Ma, C., Su, H., Zhang, B., & Poor, H. V. (2021). User-level privacy-preserving federated learning: Analysis and performance optimization. IEEE Transactions on Mobile Computing, 21(9), 3388-3401.
Kamal, M., Amin, S., Ferooz, F., Awan, M. J., Mohammed, M. A., Al-Boridi, O., & Abdulkareem, K. H. (2022). Privacy-aware genetic algorithm based data security framework for distributed cloud storage. Microprocessors and Microsystems, 94, 104673.
Taherkordi, A., Zahid, F., Verginadis, Y., & Horn, G. (2018). Future cloud systems design: challenges and research directions. IEEE Access, 6, 74120-74150.
Hiwale, M., Walambe, R., Potdar, V., & Kotecha, K. (2023). A systematic review of privacy-preserving methods deployed with blockchain and federated learning for the telemedicine. Healthcare Analytics, 100192.
Al-Fatlawy, M. H., Sheela, M. S., Yadav, S. K., Srinivasan, V., Gopalakrishnan, S., & Reddy, N. U. (2023, August). Research on Graphic Design Image Processing Technology Based on Newton's method in Photoshop. In 2023 Second International Conference On Smart Technologies For Smart Nation (SmartTechCon) (pp. 710-715). IEEE.
Khetavath, S., Sendhilkumar, N. C., Mukunthan, P., Jana, S., Gopalakrishnan, S., Malliga, L., ... & Farhaoui, Y. (2023). An Intelligent Heuristic Manta-Ray Foraging Optimization and Adaptive Extreme Learning Machine for Hand Gesture Image Recognition. Big Data Mining and Analytics, 6(3), 321-335.
Downloads
Published
How to Cite
Issue
Section
License
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
All papers should be submitted electronically. All submitted manuscripts must be original work that is not under submission at another journal or under consideration for publication in another form, such as a monograph or chapter of a book. Authors of submitted papers are obligated not to submit their paper for publication elsewhere until an editorial decision is rendered on their submission. Further, authors of accepted papers are prohibited from publishing the results in other publications that appear before the paper is published in the Journal unless they receive approval for doing so from the Editor-In-Chief.
IJISAE open access articles are licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. This license lets the audience to give appropriate credit, provide a link to the license, and indicate if changes were made and if they remix, transform, or build upon the material, they must distribute contributions under the same license as the original.