State of the art – Part 1 Xin Jin

Slides:



Advertisements
Similar presentations
Paper by: Craig Gentry Presented By: Daniel Henneberger.
Advertisements

Kien A. Hua Division of Computer Science University of Central Florida.
Cryptography. 2 Objectives Explain common terms used in the field of cryptography Outline what mechanisms constitute a strong cryptosystem Demonstrate.
CSCE 715 Ankur Jain 11/16/2010. Introduction Design Goals Framework SDT Protocol Achievements of Goals Overhead of SDT Conclusion.
Introduction to Cryptography and Security Mechanisms: Unit 5 Theoretical v Practical Security Dr Keith Martin McCrea
Dimitrios Hatzinakos, Ph.D., P.Eng Professor, ECE Dept., UofT Bell Canada Chair in Multimedia Director, Identity, Privacy and Security Initiative (IPSI)
Multimedia Security Digital Video Watermarking Supervised by Prof. LYU, Rung Tsong Michael Presented by Chan Pik Wah, Pat Nov 20, 2002 Department of Computer.
Public Key Encryption that Allows PIR Queries Dan Boneh 、 Eyal Kushilevitz 、 Rafail Ostrovsky and William E. Skeith Crypto 2007.
On Error Preserving Encryption Algorithms for Wireless Video Transmission Ali Saman Tosun and Wu-Chi Feng The Ohio State University Department of Computer.
Vision-Based Biometric Authentication System by Padraic o hIarnain Final Year Project Presentation.
CS5204 – Fall Cryptographic Security Presenter: Hamid Al-Hamadi October 13, 2009.
IIIT Hyderabad Security and Privacy of Visual Data Maneesh Upmanyu, C. Narsimha Raju Anoop M. Namboodiri, K. Srinathan, C.V. Jawahar Center for Visual.
Tracking with Unreliable Node Sequences Ziguo Zhong, Ting Zhu, Dan Wang and Tian He Computer Science and Engineering, University of Minnesota Infocom 2009.
Digital Watermarking Sapinkumar Amin Guided By: Richard Sinn.
Object Based Processing for Privacy Protected Surveillance Karl Martin Kostas N. Plataniotis University of Toronto Dept. of Electrical and Computer Engineering.
By Yernar.  Background  Key generation  Encryption  Decryption  Preset Bits  Example.
Privacy Communication Privacy Confidentiality Access Policies Systems Crypto Enforced Computing on Encrypted Data Searching and Reporting Fully Homomorphic.
A Scalable Two-Phase Top-Down Specialization Approach for Data Anonymization Using MapReduce on Cloud.
1 Proprietary & Confidential Where vision meets precision Company Profile 2014.
Harnessing the Cloud for Securely Outsourcing Large- Scale Systems of Linear Equations.
Large-Scale Record Linkage Support for Cloud Computing Platforms Yuan Xue, Bradley Malin, Elizabeth Durham EECS Department, Biomedical Informatics Department,
A Partial Survey of the Perfect Digital Watermark Problem.
Packing Techniques for Homomorphic Encryption Schemes Scott Thompson CSCI-762 4/28/2016.
1 SFS: Secure File Sharing For Dynamic Groups In Cloud Shruthi Suresh M-tech CSE RCET.
Public Key Cryptography. Asymmetric encryption is a form of cryptosystem in which Encryption and decryption are performed using the different keys—one.
@Yuan Xue CS 285 Network Security Public-Key Cryptography Yuan Xue Fall 2012.
Nikita Maria Department of Applied Informatics University of Macedonia - Greece.
IMAGE AUTHENTICATION TECHNIQUES Based on Automatic video surveillance (AVS) systems Guided by: K ASTURI MISHRA PRESENTED BY: MUKESH KUMAR THAKUR REG NO:
Secret Key Cryptography
Introduction to Information Security Introduction & Overview
Searchable Encryption in Cloud
Professor Tzong-Chen Wu
Cryptographic Hash Function
BLIND AUTHENTICATION: A SECURE CRYPTO-BIOMETRIC VERIFICATION PROTOCOL
Practical and Secure Nearest Neighbor Search on Encrypted Large-Scale Data Source : IEEE INFOCOM IEEE International Conference on Computer Communications,
Utilizing AI & GPUs to Build Cloud-based Real-Time Video Event Detection Solutions Zvika Ashani CTO.
RSA and El Gamal Cryptosystems
Trends in my profession, Information Technology
FACE DETECTION USING ARTIFICIAL INTELLIGENCE
Introduction Of System Security
Algorithms for Big Data Delivery over the Internet of Things
Privacy Preserving Ranked Multi-Keyword
Internet of Things (IoT)
CAE: A Collusion Attack against Privacy-preserving Data Aggregation Schemes Wei Yang University of Science and Technology of China (USTC) Contact Me.
Cryptography and Security Fall 2009 Steve Lai
Image Segmentation Techniques
Recent Developments on Multimedia and Secure Networking Technologies
Encryption, Cryptography, and Steganography:
The RSA public-key cryptosystem cse712 e-commerce
Cloud Security 李芮,蒋希坤,崔男 2018年4月.
Source: J. Vis. Commun. Image R. 41 (2016) 58–64
Security Of Wireless Sensor Networks
A New Technology for Video Surveillance Cameron Serles
ADVANCED ENCRYPTION STANDARDADVANCED ENCRYPTION STANDARD
Region and Shape Extraction
Outline Using cryptography in networks IPSec SSL and TLS.
Chapter -7 CRYPTOGRAPHIC HASH FUNCTIONS
Privacy preserving cloud computing
Security of Wireless Sensor Networks
International Data Encryption Algorithm
Emerging Security Mechanisms for Medical Cyber Physical Systems
Research Institute for Future Media Computing
Recent Developments on Multimedia and Secure Networking Technologies
Introduction to Cryptography
Operating Systems Concepts
Information Protection and Recovery with Reversible Data Hiding
Basics Of Symmetric Encryption
Cryptanalysis Network Security.
Adopting secret sharing for reversible data hiding in encrypted images
Presentation transcript:

State of the art – Part 1 Xin Jin Multimedia Security State of the art – Part 1 Xin Jin

OutLine Emerging Cryptographic Challenges in Image And Video Processing –ICIP 2012 Real-time privacy-preserving moving object detection in the cloud. ACM MM 2013 An Efficient Image Homomorphic Encryption Scheme with Small Ciphertext Expansion ACM MM2013

Emerging Cryptographic Challenges in Image And Video Processing System Add-ons Deeply embedded Attacker Outside Inside

Applications paid-for video services biometric systems …… Secure Face Recognition Secure Fingerprints Recognition ……

Applications

Challenges The utility and limitations of cryptography are not very well known to the community, which hampers the widespread consideration of cryptographic solutions for security problems in image and video processing Cryptographic operations are often computationally expensive. Efficient usage of cryptographic protocols is therefore imperative. Certain cryptographic techniques cause iphertext expansion of two orders of magnitude, such as public-key encryption of image pixels. Efficient data packing strategies and operations are then needed.

云计算 同态加密 Kuan-Yu Chu, Yin-Hsi Kuo, and Winston H. Hsu. 2013. Real-time privacy-preserving moving object detection in the cloud. In Proceedings of the 21st ACM international conference on Multimedia (MM '13). ACM

云计算 同态加密 With the advance of cloud computing, growing applications have been migrating to the cloud for its robustness and scalability. However, sending raw data to the cloud-based service providers will generally risk our privacy; especially for cloud-based surveillance system, where privacy is one of the major concerns as continuously recording daily life. Thus, privacy-preserving intelligent analytics are in dire needs. In this preliminary research, we investigate real-time privacy-preserving moving object detection in the encrypted cloud-based surveillance videos. Moving object detection is one of the core techniques and can further enable other applications (e.g., object tracking, action recognition, etc.). One possible approach is using homomorphic encryption which provides corresponding operations between unencrypted and encrypted data. However, homomorphic encryption is impractical in real case because of formidable computations and bulky storage consumption. In this paper, we propose an efficient and secure encryption framework, which entails real-time analytics (e.g., moving object detection) in encrypted video streams. Experiments confirm that the proposed method can achieve similar accuracy as detection on original raw frames.

An Efficient Image Homomorphic Encryption Scheme with Small Ciphertext Expansion Secure signal processing (SSP), also referred to as signal processing in the encrypted domain (s.p.e.d.) privacy-preserving face recognition privacy-preserving fingercode authentication privacy-preserving electrocardiogram (ECG) classification

An Efficient Image Homomorphic Encryption Scheme with Small Ciphertext Expansion the homomorphic cryptosystems, are able to keep certain algebraic structures from the plaintext space to the ciphertext space. Partially homomorphic cryptosystems keep the relation of addition or multiplication between plaintexts and ciphertexts, such Fully homomorphic cryptosystems permit to compute additions and multiplications homomorphically, and therefore allows the computation of any polynomials in the encrypted domain. Probabilistic cryptosystems, one can obtain different ciphertexts after different encryption procedures, no matter the input plaintexts are identical or not.

two data encryption methods widely used in the field of s.p.e.d.. Element-Wise Encryption Scheme The Packing Method

New Direction- Xin Jin Homomorphic Encryption based Privacy-preserving Image Processing in Encrypted Domain (with Cloud Computing) Content based Image Retrieval in Encrypted Domain

KeyWords Homomorphic Encryption Privacy-preserving Multimedia (Image/Video) Processing Encrypted Domain Cloud Computing Big Data