Abstract
This paper investigates the problem of performing signal processing via remote execution methods while maintaining the privacy of the data. Primary focus on this problem is a situation where there are two parties; a client with data or a signal that needs to be processed and a server with computational resources. Revealing the signal unencrypted causes a violation of privacy for the client. One solution to this problem is to process the data or signal while encrypted. Problems of this type have been attracting attention recently; particularly with the growing capabilities of cloud computing. We contribute to solving this type of problem by processing the signals in an encrypted form, using fully homomorphic encryption (FHE). Three additional contributions of this manuscript includes (1) extending FHE to real numbers, (2) bounding the error related to the FHE process against the unencrypted variation of the process, and (3) increasing the practicality of FHE as a tool by using graphical processing units (GPU). We demonstrate our contributions by applying these ideas to two classical problems: natural logarithm calculation and signal pr(brightness/contrast filter).
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Bai, Y., Zho, L., Cheng, B., Peng, Y.F.: Surf feature extraction in encrypted domain. In: 2014 IEEE International Conference on Multimedia and Expo (ICME), pp. 1–6. IEEE (2014)
Gentry, C.: Computing arbitrary functions of encrypted data. Communications of the ACM 53(3), 97–105 (2010)
Gentry, C., Sahai, A., Waters, B.: Homomorphic encryption from learning with errors: conceptually-simpler, asymptotically-faster, attribute-based. In: Canetti, R., Garay, J.A. (eds.) CRYPTO 2013, Part I. LNCS, vol. 8042, pp. 75–92. Springer, Heidelberg (2013)
Hsu, C.-Y., Lu, C.-S., Pei, S.-C.: Homomorphic encryption-based secure sift for privacy-preserving feature extraction. In: IS&T/SPIE Electronic Imaging, pp. 788005–788005. International Society for Optics and Photonics (2011)
Knežević, M., Batina, L., De Mulder, E., Fan, J., Gierlichs, B., Lee, Y.K., Maes, R., Verbauwhede, I.: Signal processing for cryptograhy and security applications. In: Handbook of Signal Processing Systems, pp. 223–241. Springer (2013)
Lathey, A., Atrey, P.K., Joshi, N.: Homomorphic low pass filtering on encrypted multimedia over cloud. newblock. In: 2013 IEEE Seventh International Conference on Semantic Computing (ICSC), pp. 310–313. IEEE (2013)
Mohanty, M., Ooi, W.T., Atrey, P.K.: Scale me, crop me, knowme not: Supporting scaling and cropping in secret image sharing. In: 2013 IEEE International Conference on Multimedia and Expo (ICME), pp. 1–6. IEEE (2013)
Puech, W., Erkin, Z., Barni, M., Rane, S., Lagendijk, R.L.: Emerging cryptographic challenges in image and video processing. In: 2012 19th IEEE International Conference on Image Processing (ICIP), pp. 2629–2632. IEEE (2012)
Regev, O.: On lattices, learning with errors, random linear codes, and cryptography. Journal of the ACM (JACM) 56(6), 34 (2009)
Shashanka, M.V., Smaragdis, P.: Secure sound classification: Gaussian mixture models. In: Proceedings of the 2006 IEEE International Conference on Acoustics, Speech and Signal Processing, ICASSP 2006, vol. 3, pp. III–III. IEEE (2006)
Troncoso-Pastoriza, J.R., Perez-Gonzalez, F.: Secure signal processing in the cloud: Enabling technologies for privacy-preserving multimedia cloud processing. IEEE Signal Processing Magazine 30(2), 29–41 (2013)
Wang, Y., Rane, S., Draper, S.C., Ishwar, P.: A theoretical analysis of authentication, privacy, and reusability across secure biometric systems. IEEE Transactions on Information Forensics and Security 7(6), 1825–1840 (2012)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2015 Springer International Publishing Switzerland
About this paper
Cite this paper
Shortell, T., Shokoufandeh, A. (2015). Secure Signal Processing Using Fully Homomorphic Encryption. In: Battiato, S., Blanc-Talon, J., Gallo, G., Philips, W., Popescu, D., Scheunders, P. (eds) Advanced Concepts for Intelligent Vision Systems. ACIVS 2015. Lecture Notes in Computer Science(), vol 9386. Springer, Cham. https://doi.org/10.1007/978-3-319-25903-1_9
Download citation
DOI: https://doi.org/10.1007/978-3-319-25903-1_9
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-25902-4
Online ISBN: 978-3-319-25903-1
eBook Packages: Computer ScienceComputer Science (R0)