Signal Processing in the Encrypted Domain

A. Piva, S. Katzenbeisser
{"title":"Signal Processing in the Encrypted Domain","authors":"A. Piva, S. Katzenbeisser","doi":"10.1155/2007/82790","DOIUrl":null,"url":null,"abstract":"Recent advances in digital signal processing enabled a number of new services in various application domains, ranging from enhanced multimedia content production and distribution, to advanced healthcare systems for continuous health monitoring. At the heart of these services lies the ability to securely manipulate “valuable” digital signals in order to satisfy security requirements such as intellectual property management, authenticity, privacy, and access control. Currently available technological solutions for “secure manipulation of signals” apply cryptographic primitives by building a secure layer on top of existing signal processing modules, able to protect them from leakage of critical information, assuming that the involved parties or devices trust each other. This implies that the cryptographic layer is used only to protect the data against access through unauthorized third parties or to provide authenticity. However, this is often not enough to ensure the security of the application, since the owner of the data may not trust the processing devices, or those actors that are required to manipulate them. It is clear that the availability of signal processing algorithms that work directly on encrypted signals would be of great help for application scenarios where signals must be produced, processed, or exchanged securely. Whereas the development of tools capable of processing encrypted signals may seem a formidable task, some recent, still scattered, studies, spanning from secure embedding and detection of digital watermarks and secure content distribution to compression of encrypted data and access to encrypted databases, have shown that performing signal processing operations in encrypted content is indeed possible. We are delighted to present the first issue of a journal, entirely devoted to signal processing in the encrypted domain. The issue contains both survey papers allowing the reader to become acquainted with this exciting field, and research papers discussing the latest developments. The first part of the special issue contains three survey papers: Fontaine and Galand give an overview of homomorphic encryption, which is one of the key tools for signal processing in the encrypted domain, in their paper “A survey of homomorphic encryption for nonspecialists.” An introduction to the field of securemultiparty computation is provided by the paper “Secure multiparty computation between distrusted networks terminals” by Cheung and Nguyen. Finally, research in the area of signal processing under encryption is surveyed in the paper “Protection and retrieval of encrypted multimedia content: when cryptography meets signal processing” by Erkin et al. The second part of the special issue contains four research papers. Orlandi et al. introduce the notion of oblivious computing with neural networks in the paper “Oblivious neural network computing via homomorphic encryption.” Troncoso-Pastoriza and Perez-Gonzalez present new protocols for zero-knowledge watermark detection in their paper “Efficient zero-knowledge watermark detection with improved robustness to sensitivity attacks.” Prins et al. show in their paper “Anonymous fingerprinting with robust QIMwatermarking techniques” how advanced quantizationindex-modulation watermarking schemes can be used in conjunction with buyer-seller watermarking protocols. Finally, Gschwandtner et al. explore properties of specialized image encryption schemes in their paper “Transmission error and compression robustness of 2D chaotic map image encryption schemes.” Finally, we would like to thank all the authors, as well as all reviewers, for their contribution to this issue. We hope that the readers will enjoy this special issue and that it encourages more colleagues to devote time to this novel and exciting field of research.","PeriodicalId":313497,"journal":{"name":"EURASIP J. Inf. Secur.","volume":"2007 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"20","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"EURASIP J. Inf. Secur.","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1155/2007/82790","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 20

Abstract

Recent advances in digital signal processing enabled a number of new services in various application domains, ranging from enhanced multimedia content production and distribution, to advanced healthcare systems for continuous health monitoring. At the heart of these services lies the ability to securely manipulate “valuable” digital signals in order to satisfy security requirements such as intellectual property management, authenticity, privacy, and access control. Currently available technological solutions for “secure manipulation of signals” apply cryptographic primitives by building a secure layer on top of existing signal processing modules, able to protect them from leakage of critical information, assuming that the involved parties or devices trust each other. This implies that the cryptographic layer is used only to protect the data against access through unauthorized third parties or to provide authenticity. However, this is often not enough to ensure the security of the application, since the owner of the data may not trust the processing devices, or those actors that are required to manipulate them. It is clear that the availability of signal processing algorithms that work directly on encrypted signals would be of great help for application scenarios where signals must be produced, processed, or exchanged securely. Whereas the development of tools capable of processing encrypted signals may seem a formidable task, some recent, still scattered, studies, spanning from secure embedding and detection of digital watermarks and secure content distribution to compression of encrypted data and access to encrypted databases, have shown that performing signal processing operations in encrypted content is indeed possible. We are delighted to present the first issue of a journal, entirely devoted to signal processing in the encrypted domain. The issue contains both survey papers allowing the reader to become acquainted with this exciting field, and research papers discussing the latest developments. The first part of the special issue contains three survey papers: Fontaine and Galand give an overview of homomorphic encryption, which is one of the key tools for signal processing in the encrypted domain, in their paper “A survey of homomorphic encryption for nonspecialists.” An introduction to the field of securemultiparty computation is provided by the paper “Secure multiparty computation between distrusted networks terminals” by Cheung and Nguyen. Finally, research in the area of signal processing under encryption is surveyed in the paper “Protection and retrieval of encrypted multimedia content: when cryptography meets signal processing” by Erkin et al. The second part of the special issue contains four research papers. Orlandi et al. introduce the notion of oblivious computing with neural networks in the paper “Oblivious neural network computing via homomorphic encryption.” Troncoso-Pastoriza and Perez-Gonzalez present new protocols for zero-knowledge watermark detection in their paper “Efficient zero-knowledge watermark detection with improved robustness to sensitivity attacks.” Prins et al. show in their paper “Anonymous fingerprinting with robust QIMwatermarking techniques” how advanced quantizationindex-modulation watermarking schemes can be used in conjunction with buyer-seller watermarking protocols. Finally, Gschwandtner et al. explore properties of specialized image encryption schemes in their paper “Transmission error and compression robustness of 2D chaotic map image encryption schemes.” Finally, we would like to thank all the authors, as well as all reviewers, for their contribution to this issue. We hope that the readers will enjoy this special issue and that it encourages more colleagues to devote time to this novel and exciting field of research.
加密域的信号处理
数字信号处理的最新进展使各种应用领域中的许多新服务成为可能,从增强的多媒体内容生产和分发,到用于持续健康监测的高级医疗保健系统。这些服务的核心在于能够安全地操纵“有价值的”数字信号,以满足诸如知识产权管理、真实性、隐私和访问控制等安全需求。目前可用的“信号安全操作”技术解决方案通过在现有信号处理模块之上构建一个安全层来应用加密原语,能够保护它们免受关键信息的泄露,假设相关方或设备相互信任。这意味着加密层仅用于防止未经授权的第三方访问数据或提供真实性。然而,这通常不足以确保应用程序的安全性,因为数据的所有者可能不信任处理设备或需要操作它们的参与者。很明显,直接在加密信号上工作的信号处理算法的可用性对于必须安全地产生、处理或交换信号的应用场景将有很大帮助。尽管能够处理加密信号的工具的开发似乎是一项艰巨的任务,但最近一些仍然分散的研究,从数字水印的安全嵌入和检测、安全内容分发到加密数据的压缩和访问加密数据库,都表明在加密内容中执行信号处理操作确实是可能的。我们很高兴地介绍第一期杂志,完全致力于加密领域的信号处理。这期杂志既包括让读者熟悉这个令人兴奋的领域的调查论文,也包括讨论最新发展的研究论文。特刊的第一部分包含三篇综述论文:Fontaine和Galand在他们的论文“非专业人士的同态加密调查”中概述了同态加密,这是加密领域信号处理的关键工具之一。Cheung和Nguyen的论文“互不信任网络终端之间的安全多方计算”对安全多方计算领域进行了介绍。最后,Erkin等人的论文《加密多媒体内容的保护与检索:当密码学满足信号处理时》对加密条件下信号处理领域的研究进行了综述。特刊的第二部分包含四篇研究论文。Orlandi等人在“同态加密的遗忘神经网络计算”一文中引入了神经网络遗忘计算的概念。Troncoso-Pastoriza和Perez-Gonzalez在他们的论文《提高对灵敏度攻击鲁棒性的高效零知识水印检测》中提出了新的零知识水印检测协议。Prins等人在他们的论文“使用鲁棒qim水印技术的匿名指纹”中展示了如何将先进的量化索引调制水印方案与买卖双方的水印协议结合使用。最后,Gschwandtner等人在他们的论文“二维混沌图像加密方案的传输误差和压缩鲁棒性”中探讨了专用图像加密方案的特性。最后,我们要感谢所有的作者,以及所有的审稿人,感谢他们对本期的贡献。我们希望读者会喜欢这个特刊,并鼓励更多的同事投入时间到这个新颖而令人兴奋的研究领域。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信