entropy-logo

Journal Browser

Journal Browser

Information Privacy

A special issue of Entropy (ISSN 1099-4300). This special issue belongs to the section "Information Theory, Probability and Statistics".

Deadline for manuscript submissions: closed (30 June 2021) | Viewed by 2266

Special Issue Editor


E-Mail Website
Guest Editor
School of Computer Science and Electronic Engineering, University of Essex, Colchester CO4 3SQ, UK
Interests: communications; information theory; privacy

Special Issue Information

Dear Colleagues,

Regardless of how secure an information transmission (or data sharing) scheme is, privacy is still a major concern in legal transactions of data, which is becoming more prominent with the advances in machine learning and data mining algorithms. This calls for strict regulations on data distribution, such as the general data protection regulation (GDPR) adopted by the European Union. However, many recent examples of de-anonymization attacks on publicly available anonymized data show that regulation alone will not be sufficient to limit access to private data. Therefore, a key open problem is how to satisfy sufficient privacy requirements while still enabling the benefits of data sharing, referred to as the utility–privacy trade-off. This calls for an interdisciplinary approach (from information theory, computer science, etc.) to develop privacy-preserving data disclosure techniques. In particular, investigating the connections between information-theoretic and data scientific privacy-preserving techniques is highly desirable.

Dr. Borzoo Rassouli
Guest Editor

Manuscript Submission Information

Manuscripts should be submitted online at www.mdpi.com by registering and logging in to this website. Once you are registered, click here to go to the submission form. Manuscripts can be submitted until the deadline. All submissions that pass pre-check are peer-reviewed. Accepted papers will be published continuously in the journal (as soon as accepted) and will be listed together on the special issue website. Research articles, review articles as well as short communications are invited. For planned papers, a title and short abstract (about 100 words) can be sent to the Editorial Office for announcement on this website.

Submitted manuscripts should not have been published previously, nor be under consideration for publication elsewhere (except conference proceedings papers). All manuscripts are thoroughly refereed through a single-blind peer-review process. A guide for authors and other relevant information for submission of manuscripts is available on the Instructions for Authors page. Entropy is an international peer-reviewed open access monthly journal published by MDPI.

Please visit the Instructions for Authors page before submitting a manuscript. The Article Processing Charge (APC) for publication in this open access journal is 2600 CHF (Swiss Francs). Submitted papers should be well formatted and use good English. Authors may use MDPI's English editing service prior to publication or during author revisions.

Keywords

  • Information-theoretic privacy
  • Data privacy
  • Utility–privacy trade-off
  • Inference attacks
  • Privacy-preserving schemes
  • Anonymization
  • Differential privacy
  • Private information

Published Papers (1 paper)

Order results
Result details
Select all
Export citation of selected articles as:

Research

26 pages, 683 KiB  
Article
Biometric Identification Systems with Noisy Enrollment for Gaussian Sources and Channels
by Vamoua Yachongka, Hideki Yagi and Yasutada Oohama
Entropy 2021, 23(8), 1049; https://doi.org/10.3390/e23081049 - 15 Aug 2021
Cited by 5 | Viewed by 1839
Abstract
In the present paper, we investigate the fundamental trade-off of identification, secret-key, storage, and privacy-leakage rates in biometric identification systems for remote or hidden Gaussian sources. We use a technique of converting the system to one where the data flow is in one-way [...] Read more.
In the present paper, we investigate the fundamental trade-off of identification, secret-key, storage, and privacy-leakage rates in biometric identification systems for remote or hidden Gaussian sources. We use a technique of converting the system to one where the data flow is in one-way direction to derive the capacity region of these rates. Also, we provide numerical calculations of three different examples for the system. The numerical results imply that it seems hard to achieve both high secret-key and small privacy-leakage rates simultaneously. Full article
(This article belongs to the Special Issue Information Privacy)
Show Figures

Figure 1

Back to TopTop