P3: Toward Privacy-Preserving Photo Sharing Moo-Ryong Ra, Ramesh Govindan, and Antonio Ortega Networked Systems Laboratory & Signal and Image Processing.

Slides:



Advertisements
Similar presentations
1 Trust Evidence in Heterogeneous Environments: Towards a Research Agenda Ravi Sandhu Executive Director and Endowed Professor May 2010
Advertisements

1 Trust Evidence in Heterogeneous Environments: Towards a Research Agenda Ravi Sandhu Executive Director and Endowed Professor May 2010
PhishZoo: Detecting Phishing Websites By Looking at Them
Security in Mobile Ad Hoc Networks
F5 A Steganographic Algorithm
Robust Invisible Watermarking of Volume Data Y. Wu 1, X. Guan 2, M. S. Kankanhalli 1, Z. Huang 1 NUS Logo 12.
On the Privacy of Private Browsing Kiavash Satvat, Matt Forshaw, Feng Hao, Ehsan Toreini Newcastle University DPM’13.
Introduction to Watermarking Anna Ukovich Image Processing Laboratory (IPL)
Cryptography. 2 Objectives Explain common terms used in the field of cryptography Outline what mechanisms constitute a strong cryptosystem Demonstrate.
Large-Scale, Real-World Face Recognition in Movie Trailers Week 2-3 Alan Wright (Facial Recog. pictures taken from Enrique Gortez)
Error detection and concealment for Multimedia Communications Senior Design Fall 06 and Spring 07.
Dan Boneh with Monica Lam, David Mazieres, John Mitchell, and many students. Security for Mobile Devices NSF Site Visit, June 2010.
CMPT-884 Jan 18, 2010 Video Copy Detection using Hadoop Presented by: Cameron Harvey Naghmeh Khodabakhshi CMPT 820 December 2, 2010.
Vulnerability In Wi-Fi By Angus U CS 265 Section 2 Instructor: Mark Stamp.
Smart Traveller with Visual Translator for OCR and Face Recognition LYU0203 FYP.
PORTIA Robert Grimm New York University Security Challenges for Rich-Media Educational Environments.
Oral Defense by Sunny Tang 15 Aug 2003
NTIA Privacy Multistakeholder Meeting March 25, 2014 Amanda Koulousias, Attorney Division of Privacy and Identity Protection Federal Trade Commission FTC.
Cloud Usability Framework
Mobile Data Sharing over Cloud Group No. 8 - Akshay Kantak - Swapnil Chavan - Harish Singh.
CrowdSearch: Exploiting Crowds for Accurate Real-Time Image Search on Mobile Phones Original work by Yan, Kumar & Ganesan Presented by Tim Calloway.
Wang, Z., et al. Presented by: Kayla Henneman October 27, 2014 WHO IS HERE: LOCATION AWARE FACE RECOGNITION.
A.C. Chen ADL M Zubair Rafique Muhammad Khurram Khan Khaled Alghathbar Muddassar Farooq The 8th FTRA International Conference on Secure and.
Distributed Systems. Outline  Services: DNSSEC  Architecture Models: Grid  Network Protocols: IPv6  Design Issues: Security  The Future: World Community.
Overview of Privacy Preserving Techniques.  This is a high-level summary of the state-of-the-art privacy preserving techniques and research areas  Focus.
UNIVERSITY of NOTRE DAME COLLEGE of ENGINEERING Preserving Location Privacy on the Release of Large-scale Mobility Data Xueheng Hu, Aaron D. Striegel Department.
IIIT Hyderabad Security and Privacy of Visual Data Maneesh Upmanyu, C. Narsimha Raju Anoop M. Namboodiri, K. Srinathan, C.V. Jawahar Center for Visual.
Social Networking with Frientegrity: Privacy and Integrity with an Untrusted Provider Prateek Basavaraj April 9 th 2014.
Android-Stego: A Novel Service Provider Imperceptible MMS Steganography Technique Robust to Message Loss Authors: Avinash Srinivasan, Jie Wu, and Justin.
Why I LIKE the Facebook Database… Sharon Viente May 2010.
Wireless Networks Breakout Session Summary September 21, 2012.
Protecting Sensitive Labels in Social Network Data Anonymization.
Certificate-Based Operations. Module Objectives By the end of this module participants will be able to: Define how cryptography is used to secure information.
Network Security Lecture 10 Presented by: Dr. Munam Ali Shah.
1 The GOES-R Rainfall Rate / QPE Algorithm Status May 1, 2011 Presented By: Bob Kuligowski NOAA/NESDIS/STAR.
Secure Sensor Data/Information Management and Mining Bhavani Thuraisingham The University of Texas at Dallas October 2005.
MPEG-4 AVC robust video watermarking based on QIM and perceptual masking principles Marwen HASNAOUI Maher BELHAJ Mihai MITREA Françoise PRETEUX ARTEMIS.
1 University of Palestine Information Security Principles ITGD 2202 Ms. Eman Alajrami 2 nd Semester
Major Disciplines in Computer Science Ken Nguyen Department of Information Technology Clayton State University.
Privacy-preserving rule mining. Outline  A brief introduction to association rule mining  Privacy preserving rule mining Single party  Perturbation.
CrowdSearch: Exploiting Crowds for Accurate Real-Time Image Search on Mobile Phones Original work by Tingxin Yan, Vikas Kumar, Deepak Ganesan Presented.
Kylie Gorman WEEK 1-2 REVIEW. CONVERTING AN IMAGE FROM RGB TO HSV AND DISPLAY CHANNELS.
DIGITAL SIGNATURE(DS) IN VIDEO. Contents  What is Digital Signature(DS)?  General Signature Vs. Digital Signatures  How DS is Different from Encryption?
Learning Photographic Global Tonal Adjustment with a Database of Input / Output Image Pairs.
Provenance in Sensornet Republishing Unkyu Park and John Heidemann University of Southern California Information Science Institute June 18, 2008.
Secure Data Outsourcing
Data and Applications Security Developments and Directions Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #25 Dependable Data Management.
Wired Equivalent Privacy (WEP) Chris Overcash. Contents What is WEP? What is WEP? How is it implemented? How is it implemented? Why is it insecure? Why.
Modeling security 1. Models - encryption r Alice and Bob have the same key k r Alice and Bob exchange encrypted messages r Eve wants to get the plaintext.
Visual Information Processing. Human Perception V.S. Machine Perception  Human perception: pictorial information improvement for human interpretation.
chownIoT Secure Handling of Smart Home IoT Devices Ownership Change
Searchable Encryption in Cloud
Talal H. Noor, Quan Z. Sheng, Lina Yao,
Hummingbird: Privacy at the time of Twitter
University of Maryland College Park
Technologies: for Enhancing Broadcast Programmes with Bridgets
Honeypot in Mobile Network Security
NETWORK SECURITY Cryptography By: Abdulmalik Kohaji.
Compression for Synthetic Aperture Sonar Signals
UNIT 4 – THE COST OF FREE LESSON 4.
COMP61011 : Machine Learning Ensemble Models
Recovery from Occlusion in Deep Feature Space for Face Recognition
Dieudo Mulamba November 2017
LIFT: Learned Invarient Feature Transform
Cloud Security 李芮,蒋希坤,崔男 2018年4月.
UNIT 4 – THE COST OF FREE LESSON 6.
Privacy Protection for Social Network Services
Anti-Faces for Detection
LM 7. Cellular Network Security
ONAP Risk Assessment – Preparation Material - Overview of the Process - Terminology - Assumptions
Presentation transcript:

P3: Toward Privacy-Preserving Photo Sharing Moo-Ryong Ra, Ramesh Govindan, and Antonio Ortega Networked Systems Laboratory & Signal and Image Processing Institute University of Southern California

2 2 Cloud-based Photo Sharing Services (PSPs) PSPs However, there are serious privacy concerns

3 3 The Case of Privacy Infringement by PSPs PSPs Today we have no choice but to trust PSPs Alice must be interested in this handsome guy. Alice must be interested in this handsome guy. Image link is open to public. Image link is open to public. Alice Friends Link Leakage Mining

4 4 These Privacy Concerns Are Real NBC News, December 19, 2012 CNN.com, August 9, 2012 Wall Street Journal, June 8, 2011 New York Times, August 15, 2012

5 5 Cloud-side Processing for Mobile Devices Friends Alice Cloud-side processing is often useful for mobile devices in many ways

Question: Can we protect users’ privacy while still performing cloud-side image transformation?

7 7 Your Friends Full Encryption? You We will lose benefits provided by cloud-side processing

8 8 Goals, Threat Model, and Assumptions  Privacy and Attack Model Unauthorized access Algorithmic recognition PSPs  We trust Mobile devices’ HW and SW  We don’t trust Eavesdropper on the network “Honest-but-curious” PSPs Preserving users’ privacy with cloud-side processing

9 9 Bob High-level Description of Our Approach + PSPs Alice SECRET PART PUBLIC PART Most Significant Bits Least Significant Bits

10 Bob P3 Requirements PSPs Alice Privacy Storage Lightweight Processing Transparent Deployment Cloud-side Processing Standard Compliancy Our algorithm and system, collectively called P3, realizes this capability

11 P3 Algorithm: Why It Works  Exploiting the characteristics of DCT coefficients in JPEG. Lam and Goodman, “A Mathematical Analysis of the DCT Coefficient Distributions for Images”, ITIP 2000 Sparseness SignMagnitude More Energy P3 exploits all three facts to make a public part much less informative

12 AC coefficients P3 Algorithm: How the encryption works Secret Original Image DC Coefficients Quantized Coefficients Public Values <= T Values > T T -T

13 Threshold vs. Storage Trade-off INRIA dataset (1491 images) P3

14 Public Part (T=20) Privacy: What is exposed? Public Part (T=15)Public Part (T=10)Public Part (T=5)Public Part (T=1)OriginalSecret Part (T=1)Secret Part (T=5)Secret Part (T=10)Secret Part (T=15)Secret Part (T=20)

15 Cloud-side Processing (A) P3 Decryption Challenge P3 Encrypt Public Part (P) P3 Decrypt Cloud-side Processing f Secret Part (S) Bob Alice We need to perform careful analysis since P3 encryption hides sign information. (Y) Challenge: Given S and f(P), can we get f(Y)?

16 Addressing P3 Decryption Challenge P3 can handle ANY linear processing Original Image (Y) Secret (S) Public (P) Comp (C) Challenge: Given S and f(P), can we get f(Y)? Analysis Result: C can be derived from S Scaling Cropping Smoothing Blending Sharpening

17 Storage Service P3 System Architecture Sender Recipients PSPs P3 Trusted On-device Proxy PSPs’ Apps P3 can be implemented with existing PSPs without causing infrastructure changes P3 can be implemented with existing PSPs without causing infrastructure changes PSPs’ Apps Encrypted secret parts Public parts P3 encryption P3 decryption

18 Prototype on Android Phone CategoryAverageStdev P3 Encryption152.7 ms20.87 P3 Decryption ms24.83 With P3Without P3 P3 is practical and can be added to Facebook

19 Evaluating Privacy P3 preserves privacy against algorithmic attacks  Objective metric  PSNR  Computer vision algorithms  SIFT feature detection  Edge detection: Canny  Face detection: Haar  Face recognition: EigenFace

20  4 probing (testing) sets  2 distance metrics (Euclidean, MahCosine)  Different P3 thresholds from 1 to 100  Public parts as a training set Results: Face Recognition  EigenFace [Turk et al. 1991] with the Color FERET database  CSU’s face recognition evaluation system

21 P3 Successfully Breaks Face Recognition Face recognition doesn’t work Face recognition doesn’t work

22 Summary and Contributions Our algorithm and system, collectively called P3, provides privacy-preserving photo sharing Our algorithm and system, collectively called P3, provides privacy-preserving photo sharing  Propose a novel photo encryption/decryption algorithm.  Transparent system design that can work with existing PSPs.  A complete prototype and extensive privacy evaluation using computer vision-based recognition algorithms.