Protection and Retrieval of Encrypted Multimedia Content: When Cryptography Meets Signal Processing

The processing and encryption of multimedia content are generally considered sequential and independent operations. In certain multimedia content processing scenarios, it is, however, desirable to carry out processing directly on encrypted signals. The field of secure signal processing poses significant challenges for both signal processing and cryptography research; only few ready-togo fully integrated solutions are available. This study first concisely summarizes cryptographic primitives used in existing solutions to processing of encrypted signals, and discusses implications of the security requirements on these solutions. The study then continues to describe two domains in which secure signal processing has been taken up as a challenge, namely, analysis and retrieval of multimedia content, as well as multimedia content protection. In each domain, state-of-the-art algorithms are described. Finally, the study discusses the challenges and open issues in the field of secure signal processing.

[1]  Nasir D. Memon,et al.  A buyer-seller watermarking protocol , 1998, 1998 IEEE Second Workshop on Multimedia Signal Processing (Cat. No.98EX175).

[2]  Ahmad-Reza Sadeghi,et al.  Non-interactive Watermark Detection for a Correlation-Based Watermarking Scheme , 2005, Communications and Multimedia Security.

[3]  Silvio Micali,et al.  Probabilistic Encryption , 1984, J. Comput. Syst. Sci..

[4]  Torben P. Pedersen A Threshold Cryptosystem without a Trusted Party (Extended Abstract) , 1991, EUROCRYPT.

[5]  Stefan Katzenbeisser,et al.  Security analysis of public key watermarking schemes , 2001, SPIE Optics + Photonics.

[6]  Wenliang Du,et al.  SVD-based collaborative filtering with privacy , 2005, SAC '05.

[7]  Andrew Chi-Chih Yao,et al.  Protocols for secure computations , 1982, FOCS 1982.

[8]  Jaideep Vaidya,et al.  Privacy Preserving Naive Bayes Classifier for Horizontally Partitioned Data , 2003 .

[9]  Ramakrishnan Srikant,et al.  Order preserving encryption for numeric data , 2004, SIGMOD '04.

[10]  M. Barni,et al.  Data hiding for fighting piracy , 2004, IEEE Signal Processing Magazine.

[11]  Vinod M. Prabhakaran,et al.  On compressing encrypted data , 2004, IEEE Transactions on Signal Processing.

[12]  Helger Lipmaa,et al.  On Diophantine Complexity and Statistical Zero-Knowledge Arguments , 2003, ASIACRYPT.

[13]  Anil K. Jain,et al.  Data clustering: a review , 1999, CSUR.

[14]  Oded Goldreich,et al.  Foundations of Cryptography: Volume 2, Basic Applications , 2004 .

[15]  Kannan Ramchandran,et al.  Distributed source coding using syndromes (DISCUS): design and construction , 2003, IEEE Trans. Inf. Theory.

[16]  Chin-Laung Lei,et al.  An efficient and anonymous buyer-seller watermarking protocol , 2004, IEEE Transactions on Image Processing.

[17]  Bart Goethals,et al.  On Private Scalar Product Computation for Privacy-Preserving Data Mining , 2004, ICISC.

[18]  Qi Wang,et al.  On the privacy preserving properties of random data perturbation techniques , 2003, Third IEEE International Conference on Data Mining.

[19]  Fabrice Boudot,et al.  Efficient Proofs that a Committed Number Lies in an Interval , 2000, EUROCRYPT.

[20]  Benny Pinkas,et al.  Cryptographic techniques for privacy-preserving data mining , 2002, SKDD.

[21]  Wenliang Du,et al.  Deriving private information from randomized data , 2005, SIGMOD '05.

[22]  C. P. Schnorr,et al.  Efficient Identification and Signatures for Smart Cards (Abstract) , 1989, EUROCRYPT.

[23]  Josep Domingo-Ferrer A New Privacy Homomorphism and Applications , 1996, Inf. Process. Lett..

[24]  Ivan Damgård,et al.  A Generalisation, a Simplification and Some Applications of Paillier's Probabilistic Public-Key System , 2001, Public Key Cryptography.

[25]  Mauro Barni,et al.  Watermarking Systems Engineering: Enabling Digital Assets Security and Other Applications , 2007 .

[26]  Taher El Gamal A public key cryptosystem and a signature scheme based on discrete logarithms , 1984, IEEE Trans. Inf. Theory.

[27]  Jack K. Wolf,et al.  Noiseless coding of correlated information sources , 1973, IEEE Trans. Inf. Theory.

[28]  Stefan Katzenbeisser,et al.  A secure multidimensional point inclusion protocol , 2007, MM&Sec.

[29]  Pascal Paillier,et al.  Public-Key Cryptosystems Based on Composite Degree Residuosity Classes , 1999, EUROCRYPT.

[30]  Pim Tuyls,et al.  Efficient Binary Conversion for Paillier Encrypted Values , 2006, EUROCRYPT.

[31]  Tatsuaki Okamoto,et al.  Statistical Zero Knowledge Protocols to Prove Modular Polynomial Relations , 1997, CRYPTO.

[32]  J. Ferrer A new privacy homomorphism and applications , 1996 .

[33]  Mohan S. Kankanhalli,et al.  Copyright protection for MPEG-2 compressed broadcast video , 2001, IEEE International Conference on Multimedia and Expo, 2001. ICME 2001..

[34]  Ingemar J. Cox,et al.  Digital Watermarking , 2003, Lecture Notes in Computer Science.

[35]  John F. Canny,et al.  Collaborative filtering with privacy , 2002, Proceedings 2002 IEEE Symposium on Security and Privacy.

[36]  Nathan Srebro,et al.  Fast maximum margin matrix factorization for collaborative prediction , 2005, ICML.

[37]  John Riedl,et al.  Application of Dimensionality Reduction in Recommender Systems , 2000 .

[38]  Scott Craver Zero Knowledge Watermark Detection , 1999, Information Hiding.

[39]  Torben P. Pedersen Non-Interactive and Information-Theoretic Secure Verifiable Secret Sharing , 1991, CRYPTO.

[40]  Bernd Girod,et al.  Public key watermarking by eigenvectors of linear transforms , 2000, 2000 10th European Signal Processing Conference.

[41]  Jung Hee Cheon,et al.  A Cryptanalysis of the Original Domingo-Ferrer's Algebraic Privacy Homomophism , 2003, IACR Cryptol. ePrint Arch..

[42]  Adi Shamir,et al.  A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.

[43]  Chris Clifton,et al.  Tools for privacy preserving distributed data mining , 2002, SKDD.

[44]  Mauro Barni,et al.  Zero-knowledge ST-DM watermarking , 2006, Electronic Imaging.

[45]  A. Yao,et al.  Fair exchange with a semi-trusted third party (extended abstract) , 1997, CCS '97.

[46]  Pierre Duhamel,et al.  An Asymmetric Public Detection Watermarking Technique , 1999, Information Hiding.

[47]  Oded Goldreich Foundations of Cryptography: Volume 1 , 2006 .

[48]  Charalampos Manifavas,et al.  Chameleon - A New Kind of Stream Cipher , 1997, FSE.

[49]  Pim Tuyls,et al.  Practical Two-Party Computation Based on the Conditional Gate , 2004, ASIACRYPT.

[50]  Yehuda Lindell,et al.  Privacy Preserving Data Mining , 2000, Journal of Cryptology.

[51]  Tatsuaki Okamoto,et al.  A New Public-Key Cryptosystem as Secure as Factoring , 1998, EUROCRYPT.

[52]  Ahmad-Reza Sadeghi,et al.  Fingercasting-Joint Fingerprinting and Decryption of Broadcast Messages , 2007, Trans. Data Hiding Multim. Secur..

[53]  Ahmad-Reza Sadeghi,et al.  Zero-Knowledge Watermark Detection and Proof of Ownership , 2001, Information Hiding.

[54]  Sen-Ching S. Cheung,et al.  Secure Multiparty Computation between Distrusted Networks Terminals , 2007, EURASIP J. Inf. Secur..

[55]  Mohammed Yakoob Siyal,et al.  A Secure Watermarking Scheme for Buyer-Seller Identification and Copyright Protection , 2006, EURASIP J. Adv. Signal Process..

[56]  Chris Clifton,et al.  Privacy Preserving Naïve Bayes Classifier for Vertically Partitioned Data , 2004, SDM.

[57]  Rafail Ostrovsky,et al.  Public Key Encryption with Keyword Search , 2004, EUROCRYPT.

[58]  Jacques Stern,et al.  A new public key cryptosystem based on higher residues , 1998, CCS '98.

[59]  Fernando Pérez-González,et al.  Efficient non-interactive zero-knowledge watermark detector robust to sensitivity attacks , 2007, Electronic Imaging.

[60]  Fillia Makedon,et al.  A privacy-preserving collaborative filtering scheme with two-way communication , 2006, EC '06.

[61]  Stefan Katzenbeisser,et al.  Secure Embedding of Spread Spectrum Watermarks using Look-up-Tables , 2007, 2007 IEEE International Conference on Acoustics, Speech and Signal Processing - ICASSP '07.

[62]  Elisa Bertino,et al.  State-of-the-art in privacy preserving data mining , 2004, SGMD.

[63]  Minoru Kuribayashi,et al.  Fingerprinting protocol for images based on additive homomorphic property , 2005, IEEE Transactions on Image Processing.

[64]  John F. Canny,et al.  Collaborative filtering with privacy via factor analysis , 2002, SIGIR '02.

[65]  Rebecca N. Wright,et al.  Privacy-preserving distributed k-means clustering over arbitrarily partitioned data , 2005, KDD '05.

[66]  Roland Parviainen,et al.  Large Scale distributed watermarking of multicast media through encryption , 2001, Communications and Multimedia Security.

[67]  Ingemar J. Cox,et al.  Secure spread spectrum watermarking for multimedia , 1997, IEEE Trans. Image Process..

[68]  David A. Wagner,et al.  Cryptanalysis of an Algebraic Privacy Homomorphism , 2003, ISC.

[69]  Ivan Damgård,et al.  A Statistically-Hiding Integer Commitment Scheme Based on Groups with Hidden Order , 2002, ASIACRYPT.

[70]  Josh Benaloh Verifiable secret-ballot elections , 1987 .

[71]  Josep Domingo-Ferrer,et al.  A Provably Secure Additive and Multiplicative Privacy Homomorphism , 2002, ISC.

[72]  Deepa Kundur,et al.  Video fingerprinting and encryption principles for digital rights management , 2004, Proceedings of the IEEE.

[73]  Yehuda Lindell,et al.  Privacy Preserving Data Mining , 2002, Journal of Cryptology.

[74]  Kenneth Y. Goldberg,et al.  Eigentaste: A Constant Time Collaborative Filtering Algorithm , 2001, Information Retrieval.

[75]  Jun Zhang,et al.  Secure buyer-seller watermarking protocol , 2006 .

[76]  Ton Kalker,et al.  A Cryptographic Method for Secure Watermark Detection , 2006, Information Hiding.

[77]  Mauro Barni,et al.  Watermarking Systems Engineering (Signal Processing and Communications, 21) , 2004 .

[78]  Jan Camenisch,et al.  Proving in Zero-Knowledge that a Number Is the Product of Two Safe Primes , 1998, EUROCRYPT.

[79]  Bernd Girod,et al.  Asymmetric Watermarking Schemes , 2000 .

[80]  Caroline Fontaine,et al.  A Survey of Homomorphic Encryption for Nonspecialists , 2007, EURASIP J. Inf. Secur..

[81]  Wenliang Du,et al.  Privacy-preserving collaborative filtering using randomized perturbation techniques , 2003, Third IEEE International Conference on Data Mining.

[82]  Stefan Katzenbeisser,et al.  Secure Watermark Embedding Through Partial Encryption , 2006, IWDW.