EURASIP J. Inf. Secur.最新文献

筛选
英文 中文
Signal Processing in the Encrypted Domain 加密域的信号处理
EURASIP J. Inf. Secur. Pub Date : 1900-01-01 DOI: 10.1155/2007/82790
A. Piva, S. Katzenbeisser
{"title":"Signal Processing in the Encrypted Domain","authors":"A. Piva, S. Katzenbeisser","doi":"10.1155/2007/82790","DOIUrl":"https://doi.org/10.1155/2007/82790","url":null,"abstract":"Recent advances in digital signal processing enabled a number of new services in various application domains, ranging from enhanced multimedia content production and distribution, to advanced healthcare systems for continuous health monitoring. At the heart of these services lies the ability to securely manipulate “valuable” digital signals in order to satisfy security requirements such as intellectual property management, authenticity, privacy, and access control. Currently available technological solutions for “secure manipulation of signals” apply cryptographic primitives by building a secure layer on top of existing signal processing modules, able to protect them from leakage of critical information, assuming that the involved parties or devices trust each other. This implies that the cryptographic layer is used only to protect the data against access through unauthorized third parties or to provide authenticity. However, this is often not enough to ensure the security of the application, since the owner of the data may not trust the processing devices, or those actors that are required to manipulate them. It is clear that the availability of signal processing algorithms that work directly on encrypted signals would be of great help for application scenarios where signals must be produced, processed, or exchanged securely. Whereas the development of tools capable of processing encrypted signals may seem a formidable task, some recent, still scattered, studies, spanning from secure embedding and detection of digital watermarks and secure content distribution to compression of encrypted data and access to encrypted databases, have shown that performing signal processing operations in encrypted content is indeed possible. We are delighted to present the first issue of a journal, entirely devoted to signal processing in the encrypted domain. The issue contains both survey papers allowing the reader to become acquainted with this exciting field, and research papers discussing the latest developments. The first part of the special issue contains three survey papers: Fontaine and Galand give an overview of homomorphic encryption, which is one of the key tools for signal processing in the encrypted domain, in their paper “A survey of homomorphic encryption for nonspecialists.” An introduction to the field of securemultiparty computation is provided by the paper “Secure multiparty computation between distrusted networks terminals” by Cheung and Nguyen. Finally, research in the area of signal processing under encryption is surveyed in the paper “Protection and retrieval of encrypted multimedia content: when cryptography meets signal processing” by Erkin et al. The second part of the special issue contains four research papers. Orlandi et al. introduce the notion of oblivious computing with neural networks in the paper “Oblivious neural network computing via homomorphic encryption.” Troncoso-Pastoriza and Perez-Gonzalez present new protocols for zero-kn","PeriodicalId":313497,"journal":{"name":"EURASIP J. Inf. Secur.","volume":"2007 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131064700","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 20
Protection and Retrieval of Encrypted Multimedia Content: When Cryptography Meets Signal Processing 加密多媒体内容的保护与检索:当密码学遇到信号处理时
EURASIP J. Inf. Secur. Pub Date : 1900-01-01 DOI: 10.1155/2007/78943
Z. Erkin, A. Piva, S. Katzenbeisser, R. Lagendijk, J. Shokrollahi, G. Neven, M. Barni
{"title":"Protection and Retrieval of Encrypted Multimedia Content: When Cryptography Meets Signal Processing","authors":"Z. Erkin, A. Piva, S. Katzenbeisser, R. Lagendijk, J. Shokrollahi, G. Neven, M. Barni","doi":"10.1155/2007/78943","DOIUrl":"https://doi.org/10.1155/2007/78943","url":null,"abstract":"The processing and encryption of multimedia content are generally considered sequential and independent operations. In certain multimedia content processing scenarios, it is, however, desirable to carry out processing directly on encrypted signals. The field of secure signal processing poses significant challenges for both signal processing and cryptography research; only few ready-togo fully integrated solutions are available. This study first concisely summarizes cryptographic primitives used in existing solutions to processing of encrypted signals, and discusses implications of the security requirements on these solutions. The study then continues to describe two domains in which secure signal processing has been taken up as a challenge, namely, analysis and retrieval of multimedia content, as well as multimedia content protection. In each domain, state-of-the-art algorithms are described. Finally, the study discusses the challenges and open issues in the field of secure signal processing.","PeriodicalId":313497,"journal":{"name":"EURASIP J. Inf. Secur.","volume":"118 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132032691","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 184
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信