IIIT Hyderabad Security and Privacy of Visual Data Maneesh Upmanyu, C. Narsimha Raju Anoop M. Namboodiri, K. Srinathan, C.V. Jawahar Center for Visual.

Slides:



Advertisements
Similar presentations
Kerberos 1 Public domain image of Heracles and Cerberus. From an Attic bilingual amphora, 530–520 BC. From Italy (?).
Advertisements

ECE454/CS594 Computer and Network Security Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall 2011.
Efficient Information Retrieval for Ranked Queries in Cost-Effective Cloud Environments Presenter: Qin Liu a,b Joint work with Chiu C. Tan b, Jie Wu b,
ITIS 6200/ Secure multiparty computation – Alice has x, Bob has y, we want to calculate f(x, y) without disclosing the values – We can only do.
A New Scheme For Robust Blind Digital Video Watermarking Supervised by Prof. LYU, Rung Tsong Michael Presented by Chan Pik Wah, Pat Mar 5, 2002 Department.
Digital Signatures and Hash Functions. Digital Signatures.
Netprog: Cryptgraphy1 Cryptography Reference: Network Security PRIVATE Communication in a PUBLIC World. by Kaufman, Perlman & Speciner.
Lect. 18: Cryptographic Protocols. 2 1.Cryptographic Protocols 2.Special Signatures 3.Secret Sharing and Threshold Cryptography 4.Zero-knowledge Proofs.
COEN 350: Network Security Authentication. Between human and machine Between machine and machine.
What Crypto Can Do for You: Solutions in Search of Problems Anna Lysyanskaya Brown University.
Multimedia Indexing and Retrieval Kowshik Shashank Project Advisor: Dr. C.V. Jawahar.
Network Security – Part 2 Public Key Cryptography Spring 2007 V.T. Raja, Ph.D., Oregon State University.
Cryptography1 CPSC 3730 Cryptography Chapter 10 Key Management.
8-1 What is network security? Confidentiality: only sender, intended receiver should “understand” message contents m sender encrypts message m receiver.
CS 105 – Introduction to the World Wide Web  HTTP Request*  Domain Name Translation  Routing  HTTP Response*  Privacy and Cryptography  Adapted.
Biometrics II CUBS, University at Buffalo
Information Networking Security and Assurance Lab National Chung Cheng University Guidelines on Electronic Mail Security
CS 239: Advanced Security Spring 04 Security in Pervasive and Ubiquitous Environments Sam Irvine
PRIAM: PRivate Information Access Management on Outsourced Storage Service Providers Mark Shaneck Karthikeyan Mahadevan Jeff Yongdae Kim.
Network Security – Part 2 V.T. Raja, Ph.D., Oregon State University.
Cryptography and Network Security Chapter 10. Chapter 10 – Key Management; Other Public Key Cryptosystems No Singhalese, whether man or woman, would venture.
Blind Vision Shai Avidan, Moshe Butman Yuval Schwartz.
IIIT Hyderabad Atif Iqbal and Anoop Namboodiri Cascaded.
Practical Techniques for Searches on Encrypted Data Yongdae Kim Written by Song, Wagner, Perrig.
Pretty Good Privacy by Philip Zimmerman presented by: Chris Ward.
Cong Wang1, Qian Wang1, Kui Ren1 and Wenjing Lou2
Part Two Network Security Applications Chapter 4 Key Distribution and User Authentication.
An Efficient Identity-based Cryptosystem for
Overview of Privacy Preserving Techniques.  This is a high-level summary of the state-of-the-art privacy preserving techniques and research areas  Focus.
Network Security – Part 2 (Continued) Lecture Notes for May 8, 2006 V.T. Raja, Ph.D., Oregon State University.
10/1/2015 9:38:06 AM1AIIS. OUTLINE Introduction Goals In Cryptography Secrete Key Cryptography Public Key Cryptograpgy Digital Signatures 2 10/1/2015.
Private Content Based Image Retrieval Shashank J, Kowshik P, Kannan Srinathan and C.V. Jawahar Is it possible for an image database to respond accurately.
EIDE Design Considerations 1 EIDE Design Considerations Brian Wright Portland General Electric.
CSCD 218 : DATA COMMUNICATIONS AND NETWORKING 1
SSL with New Client Authentication Takuya Yahagi, S University of Aizu Performance Evaluation Lab.
Software Security Seminar - 1 Chapter 5. Advanced Protocols 조미성 Applied Cryptography.
Cryptography and Network Security (CS435) Part Eight (Key Management)
23-1 Last time □ P2P □ Security ♦ Intro ♦ Principles of cryptography.
1 Cryptography NOTES. 2 Secret Key Cryptography Single key used to encrypt and decrypt. Key must be known by both parties. Assuming we live in a hostile.
V0.0CPSC415 Biometrics and Cryptography1 Placement of Encryption Function Lecture 3.
Protecting Satellite Networks from Disassociation DoS Attacks Protecting Satellite Networks from Disassociation DoS Attacks (2010 IEEE International Conference.
Chapter 3 (B) – Key Management; Other Public Key Cryptosystems.
Advanced Database Course (ESED5204) Eng. Hanan Alyazji University of Palestine Software Engineering Department.
Security Protection on Trust Delegated Medical Data in Public Mobile Networks Dasun Weerasinghe, Muttukrishnan Rajarajan and Veselin Rakocevic Mobile Networks.
Major Disciplines in Computer Science Ken Nguyen Department of Information Technology Clayton State University.
Introduction to Quantum Key Distribution
Upper OSI Layers Natawut Nupairoj, Ph.D. Department of Computer Engineering Chulalongkorn University.
31.1 Chapter 31 Network Security Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
CS555Topic 251 Cryptography CS 555 Topic 25: Quantum Crpytography.
Data and Applications Security Developments and Directions Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #22 Secure Web Information.
ECE509 Cyber Security : Concept, Theory, and Practice Key Management Spring 2014.
COEN 350: Network Security Authentication. Between human and machine Between machine and machine.
Pairing Based Cryptography Standards Terence Spies VP Engineering Voltage Security
Ch 13 Trustworthiness Myungchul Kim
1 Authenticated Key Exchange Rocky K. C. Chang 20 March 2007.
Cryptography and Network Security Chapter 10 Fourth Edition by William Stallings Lecture slides by Lawrie Brown.
KERBEROS SYSTEM Kumar Madugula.
9.2 SECURE CHANNELS JEJI RAMCHAND VEDULLAPALLI. Content Introduction Authentication Message Integrity and Confidentiality Secure Group Communications.
Privacy Preserving Outlier Detection using Locality Sensitive Hashing
Security. Cryptography (1) Intruders and eavesdroppers in communication.
Database Laboratory Regular Seminar TaeHoon Kim Article.
IIIT Hyderabad Private Outlier Detection and Content based Encrypted Search Nisarg Raval MS by Research, CSE Advisors : Prof. C. V. Jawahar & Dr. Kannan.
SECURITY. Security Threats, Policies, and Mechanisms There are four types of security threats to consider 1. Interception 2 Interruption 3. Modification.
Professor Tzong-Chen Wu
Celtic-Plus Proposers Day 22 September 2016, Istanbul
Computer Communication & Networks
BLIND AUTHENTICATION: A SECURE CRYPTO-BIOMETRIC VERIFICATION PROTOCOL
State of the art – Part 1 Xin Jin
Kerberos Kerberos is an authentication protocol for trusted hosts on untrusted networks.
Lecture 10: Network Security.
Presentation transcript:

IIIT Hyderabad Security and Privacy of Visual Data Maneesh Upmanyu, C. Narsimha Raju Anoop M. Namboodiri, K. Srinathan, C.V. Jawahar Center for Visual Information Technology; Center for Security, Theory & Algorithmic Research; IIIT- Hyderabad

IIIT Hyderabad Broad Objective Development of secure computational algorithms in computer vision and related areas. To develop –“Provably secure” solutions –“computationally efficient” solutions –solutions to problems with immediate impact Blind Vision (Avidan and Butman, ECCV 2006) raised and addressed the privacy concerns in vision.

IIIT Hyderabad Issues to be addressed Efficiency: Encryption/Decryption is computationally expensive. Secure algorithms should be practical. Domain Knowledge: Domain specific algorithms will be more efficient than generic solutions such as SMC, AES. Security: Algorithms need to be provably-secure and meet futuristic requirements.

IIIT Hyderabad Research Directions Video Protection using various Encryption Algorithms Private Content Based Image Retrieval (PCBIR) Blind Authentication: A Secure Crypto-Biometric Verification Protocol Efficient Privacy Preserving Video Surveillance

IIIT Hyderabad Video Encryption Video protection using encryption is an extremely useful method for the stopping unwanted interception and viewing of any transmitted video or other information. Secure encryption algorithms designed to address this. We exploit the properties of the DCT coefficients and their influence on the visual content for designing this encryption scheme and their statistical behavior. Proposed algorithm is secure and make video encryption possible for real-time video applications. Publication: C. Narsimha Raju, Umadevi Ganugula, K. Srinathan and C.V. Jawahar; Fast and Secure Real-time Video Encryption in Proceedings of the 6th Indian Conference on Computer Vision, Graphics and Image Processing (ICVGIP-09)

IIIT Hyderabad Private Content Based Image Retrieval (PCBIR) Problem setting: Alice has query image (I), Bob maintains a image-database server. Alice wants to retrieve similar images without revealing (I) to Bob. Secure algorithms designed to address this. Exploits the clustered nature of image databases to reduce the amount of communication required in SMC Proposed algorithms are completely private and feasible for extremely large datasets Publication: Shashank J, Kowshik P, Kannan Srinathan and C.V. Jawahar; Private Content Based Image Retrieval; Computer Vision and Pattern Recognition(CVPR 2008)

IIIT Hyderabad Blind Authentication: A Secure Crypto- Biometric Verification Protocol First ever solution to completely address the concerns of user’s privacy, template protection, and trust issues in biometric authentication systems Problem setting: Alice wants to create an account in Bob- mail, that requires biometrics based authentication. However, she neither trusts Bob to handle her biometric data securely, nor trusts the network to send her plain biometric Captures advantages of biometrics as well as security of public key cryptography Publication: Maneesh Upmanyu, Anoop M. Namboodiri, K. Srinathan and C.V. Jawahar; Efficient Biometric Verification in Encrypted Domain: In Proceedings of the 3rd International Conference on Biometrics (ICB 2009)

IIIT Hyderabad Efficient Privacy Preserving Video Surveillance Problem Setting: Alice wants to have her office environment under surveillance by Bob. If Alice wants to track a person Jack, then Bob should have access to track Jack and no one else. Utilize some of the inherent properties of image data to enable efficient and provably secure surveillance algorithms Provably secure, real-time detection and tracking of people Publication: Maneesh Upmanyu, Anoop M. Namboodiri, K. Srinathan and C.V. Jawahar; Efficient Privacy Preserving Video Surveillance. In Proceedings of the 12th International Conference on Computer Vision (ICCV 2009)

IIIT Hyderabad Results of Video Encryption

IIIT Hyderabad Example 1: Presentation