{"title":"Signal Processing in the Encrypted Domain","authors":"A. Piva, S. Katzenbeisser","doi":"10.1155/2007/82790","DOIUrl":"https://doi.org/10.1155/2007/82790","url":null,"abstract":"Recent advances in digital signal processing enabled a number of new services in various application domains, ranging from enhanced multimedia content production and distribution, to advanced healthcare systems for continuous health monitoring. At the heart of these services lies the ability to securely manipulate “valuable” digital signals in order to satisfy security requirements such as intellectual property management, authenticity, privacy, and access control. Currently available technological solutions for “secure manipulation of signals” apply cryptographic primitives by building a secure layer on top of existing signal processing modules, able to protect them from leakage of critical information, assuming that the involved parties or devices trust each other. This implies that the cryptographic layer is used only to protect the data against access through unauthorized third parties or to provide authenticity. However, this is often not enough to ensure the security of the application, since the owner of the data may not trust the processing devices, or those actors that are required to manipulate them. It is clear that the availability of signal processing algorithms that work directly on encrypted signals would be of great help for application scenarios where signals must be produced, processed, or exchanged securely. Whereas the development of tools capable of processing encrypted signals may seem a formidable task, some recent, still scattered, studies, spanning from secure embedding and detection of digital watermarks and secure content distribution to compression of encrypted data and access to encrypted databases, have shown that performing signal processing operations in encrypted content is indeed possible. We are delighted to present the first issue of a journal, entirely devoted to signal processing in the encrypted domain. The issue contains both survey papers allowing the reader to become acquainted with this exciting field, and research papers discussing the latest developments. The first part of the special issue contains three survey papers: Fontaine and Galand give an overview of homomorphic encryption, which is one of the key tools for signal processing in the encrypted domain, in their paper “A survey of homomorphic encryption for nonspecialists.” An introduction to the field of securemultiparty computation is provided by the paper “Secure multiparty computation between distrusted networks terminals” by Cheung and Nguyen. Finally, research in the area of signal processing under encryption is surveyed in the paper “Protection and retrieval of encrypted multimedia content: when cryptography meets signal processing” by Erkin et al. The second part of the special issue contains four research papers. Orlandi et al. introduce the notion of oblivious computing with neural networks in the paper “Oblivious neural network computing via homomorphic encryption.” Troncoso-Pastoriza and Perez-Gonzalez present new protocols for zero-kn","PeriodicalId":313497,"journal":{"name":"EURASIP J. Inf. Secur.","volume":"2007 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131064700","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Z. Erkin, A. Piva, S. Katzenbeisser, R. Lagendijk, J. Shokrollahi, G. Neven, M. Barni
{"title":"Protection and Retrieval of Encrypted Multimedia Content: When Cryptography Meets Signal Processing","authors":"Z. Erkin, A. Piva, S. Katzenbeisser, R. Lagendijk, J. Shokrollahi, G. Neven, M. Barni","doi":"10.1155/2007/78943","DOIUrl":"https://doi.org/10.1155/2007/78943","url":null,"abstract":"The processing and encryption of multimedia content are generally considered sequential and independent operations. In certain multimedia content processing scenarios, it is, however, desirable to carry out processing directly on encrypted signals. The field of secure signal processing poses significant challenges for both signal processing and cryptography research; only few ready-togo fully integrated solutions are available. This study first concisely summarizes cryptographic primitives used in existing solutions to processing of encrypted signals, and discusses implications of the security requirements on these solutions. The study then continues to describe two domains in which secure signal processing has been taken up as a challenge, namely, analysis and retrieval of multimedia content, as well as multimedia content protection. In each domain, state-of-the-art algorithms are described. Finally, the study discusses the challenges and open issues in the field of secure signal processing.","PeriodicalId":313497,"journal":{"name":"EURASIP J. Inf. Secur.","volume":"118 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132032691","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}