Skip to main content

Secure Signal Processing Using Fully Homomorphic Encryption

  • Conference paper
  • First Online:
Advanced Concepts for Intelligent Vision Systems (ACIVS 2015)

Part of the book series: Lecture Notes in Computer Science ((LNIP,volume 9386))

Abstract

This paper investigates the problem of performing signal processing via remote execution methods while maintaining the privacy of the data. Primary focus on this problem is a situation where there are two parties; a client with data or a signal that needs to be processed and a server with computational resources. Revealing the signal unencrypted causes a violation of privacy for the client. One solution to this problem is to process the data or signal while encrypted. Problems of this type have been attracting attention recently; particularly with the growing capabilities of cloud computing. We contribute to solving this type of problem by processing the signals in an encrypted form, using fully homomorphic encryption (FHE). Three additional contributions of this manuscript includes (1) extending FHE to real numbers, (2) bounding the error related to the FHE process against the unencrypted variation of the process, and (3) increasing the practicality of FHE as a tool by using graphical processing units (GPU). We demonstrate our contributions by applying these ideas to two classical problems: natural logarithm calculation and signal pr(brightness/contrast filter).

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Bai, Y., Zho, L., Cheng, B., Peng, Y.F.: Surf feature extraction in encrypted domain. In: 2014 IEEE International Conference on Multimedia and Expo (ICME), pp. 1–6. IEEE (2014)

    Google Scholar 

  2. Gentry, C.: Computing arbitrary functions of encrypted data. Communications of the ACM 53(3), 97–105 (2010)

    Article  Google Scholar 

  3. Gentry, C., Sahai, A., Waters, B.: Homomorphic encryption from learning with errors: conceptually-simpler, asymptotically-faster, attribute-based. In: Canetti, R., Garay, J.A. (eds.) CRYPTO 2013, Part I. LNCS, vol. 8042, pp. 75–92. Springer, Heidelberg (2013)

    Chapter  Google Scholar 

  4. Hsu, C.-Y., Lu, C.-S., Pei, S.-C.: Homomorphic encryption-based secure sift for privacy-preserving feature extraction. In: IS&T/SPIE Electronic Imaging, pp. 788005–788005. International Society for Optics and Photonics (2011)

    Google Scholar 

  5. Knežević, M., Batina, L., De Mulder, E., Fan, J., Gierlichs, B., Lee, Y.K., Maes, R., Verbauwhede, I.: Signal processing for cryptograhy and security applications. In: Handbook of Signal Processing Systems, pp. 223–241. Springer (2013)

    Google Scholar 

  6. Lathey, A., Atrey, P.K., Joshi, N.: Homomorphic low pass filtering on encrypted multimedia over cloud. newblock. In: 2013 IEEE Seventh International Conference on Semantic Computing (ICSC), pp. 310–313. IEEE (2013)

    Google Scholar 

  7. Mohanty, M., Ooi, W.T., Atrey, P.K.: Scale me, crop me, knowme not: Supporting scaling and cropping in secret image sharing. In: 2013 IEEE International Conference on Multimedia and Expo (ICME), pp. 1–6. IEEE (2013)

    Google Scholar 

  8. Puech, W., Erkin, Z., Barni, M., Rane, S., Lagendijk, R.L.: Emerging cryptographic challenges in image and video processing. In: 2012 19th IEEE International Conference on Image Processing (ICIP), pp. 2629–2632. IEEE (2012)

    Google Scholar 

  9. Regev, O.: On lattices, learning with errors, random linear codes, and cryptography. Journal of the ACM (JACM) 56(6), 34 (2009)

    Article  MathSciNet  Google Scholar 

  10. Shashanka, M.V., Smaragdis, P.: Secure sound classification: Gaussian mixture models. In: Proceedings of the 2006 IEEE International Conference on Acoustics, Speech and Signal Processing, ICASSP 2006, vol. 3, pp. III–III. IEEE (2006)

    Google Scholar 

  11. Troncoso-Pastoriza, J.R., Perez-Gonzalez, F.: Secure signal processing in the cloud: Enabling technologies for privacy-preserving multimedia cloud processing. IEEE Signal Processing Magazine 30(2), 29–41 (2013)

    Article  Google Scholar 

  12. Wang, Y., Rane, S., Draper, S.C., Ishwar, P.: A theoretical analysis of authentication, privacy, and reusability across secure biometric systems. IEEE Transactions on Information Forensics and Security 7(6), 1825–1840 (2012)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Thomas Shortell .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer International Publishing Switzerland

About this paper

Cite this paper

Shortell, T., Shokoufandeh, A. (2015). Secure Signal Processing Using Fully Homomorphic Encryption. In: Battiato, S., Blanc-Talon, J., Gallo, G., Philips, W., Popescu, D., Scheunders, P. (eds) Advanced Concepts for Intelligent Vision Systems. ACIVS 2015. Lecture Notes in Computer Science(), vol 9386. Springer, Cham. https://doi.org/10.1007/978-3-319-25903-1_9

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-25903-1_9

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-25902-4

  • Online ISBN: 978-3-319-25903-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics