Research Article

Noninteractive Lightweight Privacy-Preserving Auditing on Images in Mobile Crowdsourcing Networks

Table 2

Notations in this paper.

NotationDescription

Binary convolutional neural network model trained by the MU
Private parameters of the MU
Public parameters of NLPAS
Feature vector of the MU
Feature vector of the CS
Length of the two binary vectors and
Security strength of NLPAS
Ciphertexts generated by the MU
The first set of random numbers that is hidden in
The second set of random numbers that is hidden in
Ciphertexts generated by the CS
Hamming distance of and
The first set of random numbers that is hidden in
The second set of random numbers that is hidden in
Threshold for determining whether the image on the CS meets the MU’s requirement
Prime number for counting different bits in and
Prime number used as a carrier
The first set of random numbers for hiding
The second set of random numbers for hiding
The third set of random numbers for hiding
The fourth set of random numbers for hiding
The first set of bases for hiding vectors
The second set of bases for hiding vectors
Transitional values for extracting the hamming distance
Values that contain the hamming distance