Efficient Encrypted Images Filtering and Transform Coding With Walsh-Hadamard Transform and Parallelization

Since homomorphic encryption operations have high computational complexity, image applications based on homomorphic encryption are often time consuming, which makes them impractical. In this paper, we study efficient encrypted image applications with the encrypted domain Walsh-Hadamard transform (WHT) and parallel algorithms. We first present methods to implement real and complex WHTs in the encrypted domain. We then propose a parallel algorithm to improve the computational efficiency of the encrypted domain WHT. To compare the WHT with the discrete cosine transform (DCT), integer DCT, and Haar transform in the encrypted domain, we conduct theoretical analysis and experimental verification, which reveal that the encrypted domain WHT has the advantages of lower computational complexity and a shorter running time. Our analysis shows that the encrypted WHT can accommodate plaintext data of larger values and has better energy compaction ability on dithered images. We propose two encrypted image applications using the encrypted domain WHT. To accelerate the practical execution, we present two parallelization strategies for the proposed applications. The experimental results show that the speedup of the homomorphic encrypted image application exceeds 12.

[1]  Soo-Chang Pei,et al.  Image Feature Extraction in Encrypted Domain With Privacy-Preserving SIFT , 2012, IEEE Transactions on Image Processing.

[2]  Yunhao Liu,et al.  POP: Privacy-Preserving Outsourced Photo Sharing and Searching for Mobile Devices , 2015, 2015 IEEE 35th International Conference on Distributed Computing Systems.

[3]  Yonghong Zeng,et al.  Integer DCTs and fast algorithms , 2001, IEEE Trans. Signal Process..

[4]  Hsieh S. Hou A fast recursive algorithm for computing the discrete cosine transform , 1987, IEEE Trans. Acoust. Speech Signal Process..

[5]  H. Andrews,et al.  Hadamard transform image coding , 1969 .

[6]  Zhenxing Qian,et al.  Reversible Data Hiding in Encrypted Images With Distributed Source Encoding , 2016, IEEE Transactions on Circuits and Systems for Video Technology.

[7]  Fernando Pérez-González,et al.  Fully Private Noninteractive Face Verification , 2013, IEEE Transactions on Information Forensics and Security.

[8]  C. K. Yuen Walsh Functions and Gray Code , 1971 .

[9]  Ajay Luthra,et al.  Overview of the H.264/AVC video coding standard , 2003, IEEE Trans. Circuits Syst. Video Technol..

[10]  Ahmad-Reza Sadeghi,et al.  Securing the e-health cloud , 2010, IHI.

[11]  Taher ElGamal,et al.  A public key cyryptosystem and signature scheme based on discrete logarithms , 1985 .

[12]  J. Tukey,et al.  An algorithm for the machine calculation of complex Fourier series , 1965 .

[13]  Lov K. Grover A fast quantum mechanical algorithm for database search , 1996, STOC '96.

[14]  Alan Edelman,et al.  Optimal Matrix Transposition and Bit Reversal on Hypercubes: All-to-All Personalized Communication , 1991, J. Parallel Distributed Comput..

[15]  Mauro Barni,et al.  Piecewise Function Approximation With Private Data , 2015, IEEE Transactions on Information Forensics and Security.

[16]  Alessandro Piva,et al.  An efficient buyer-seller watermarking protocol based on composite signal representation , 2009, MM&Sec '09.

[17]  Alan George,et al.  FFT algorithms and their adaptation to parallel processing , 1998 .

[18]  Bela Feher,et al.  Digital filters based on recursive Walsh-Hadamard transformation , 1990 .

[19]  Naofumi Takagi,et al.  A hardware algorithm for modular multiplication/division , 2005, IEEE Transactions on Computers.

[20]  Vinod M. Prabhakaran,et al.  On compressing encrypted data , 2004, IEEE Transactions on Signal Processing.

[21]  Rajendra Bharti,et al.  Lossless and Reversible Data Hiding in Encrypted Images With Public Key Cryptography , 2017, RICE.

[22]  Wai-kuen Cham,et al.  Fast Algorithm for Walsh Hadamard Transform on Sliding Windows , 2010, IEEE Transactions on Pattern Analysis and Machine Intelligence.

[23]  Alessandro Piva,et al.  Secure Watermarking for Multimedia Content Protection: A Review of its Benefits and Open Issues , 2013, IEEE Signal Processing Magazine.

[24]  Ivan Damgård,et al.  Efficient and Secure Comparison for On-Line Auctions , 2007, ACISP.

[25]  Yukio Kosugi,et al.  Hadamard-based image decomposition and compression , 2000, IEEE Transactions on Information Technology in Biomedicine.

[26]  Samee Ullah Khan,et al.  > REPLACE THIS LINE WITH YOUR PAPER IDENTIFICATION NUMBER (DOUBLE-CLICK HERE TO EDIT) < 1 , 2008 .

[27]  Mauro Barni,et al.  On the Implementation of the Discrete Fourier Transform in the Encrypted Domain , 2009, IEEE Transactions on Information Forensics and Security.

[28]  Mauro Barni,et al.  Encrypted signal processing for privacy protection: Conveying the utility of homomorphic encryption and multiparty computation , 2013, IEEE Signal Processing Magazine.

[29]  Pascal Paillier,et al.  Public-Key Cryptosystems Based on Composite Degree Residuosity Classes , 1999, EUROCRYPT.

[30]  Debargha Mukherjee,et al.  The latest open-source video codec VP9 - An overview and preliminary results , 2013, 2013 Picture Coding Symposium (PCS).

[31]  Vipin Kumar,et al.  The Scalability of FFT on Parallel Computers , 1993, IEEE Trans. Parallel Distributed Syst..

[32]  Bart Preneel,et al.  A Privacy-Preserving Buyer–Seller Watermarking Protocol Based on Priced Oblivious Transfer , 2011, IEEE Transactions on Information Forensics and Security.

[33]  Nasir Ahmed,et al.  On Notation and Definition of Terms Related to a Class of Complete Orthogonal Functions , 1973 .

[34]  Peijia Zheng,et al.  Walsh-Hadamard Transform in the Homomorphic Encrypted Domain and Its Application in Image Watermarking , 2012, Information Hiding.

[35]  Mauro Barni,et al.  Encrypted Domain DCT Based on Homomorphic Cryptosystems , 2009, EURASIP J. Inf. Secur..

[36]  Peijia Zheng,et al.  Discrete Wavelet Transform and Data Expansion Reduction in Homomorphic Encrypted Domain , 2013, IEEE Transactions on Image Processing.

[37]  Yacov Hel-Or,et al.  Real-time pattern matching using projection kernels , 2003, IEEE Transactions on Pattern Analysis and Machine Intelligence.

[38]  Thijs Veugen,et al.  Encrypted integer division , 2010, 2010 IEEE International Workshop on Information Forensics and Security.

[39]  H. Kitajima Energy Packing Efficiency of the Hadamard Transform , 1976, IEEE Trans. Commun..

[40]  Weiming Zhang,et al.  Secure Nonlocal Denoising in Outsourced Images , 2016, ACM Trans. Multim. Comput. Commun. Appl..

[41]  Stefan Katzenbeisser,et al.  Protection and Retrieval of Encrypted Multimedia Content: When Cryptography Meets Signal Processing , 2007, EURASIP J. Inf. Secur..

[42]  Susanto Rahardja,et al.  Conjugate Symmetric Sequency-Ordered Complex Hadamard Transform , 2009, IEEE Transactions on Signal Processing.

[43]  Jameela Al-Jaroodi,et al.  e-Health Cloud: Opportunities and Challenges , 2012, Future Internet.

[44]  Andreas Peter,et al.  SOFIR: Securely outsourced Forensic image recognition , 2014, 2014 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).

[45]  Peter W. Shor,et al.  Polynomial-Time Algorithms for Prime Factorization and Discrete Logarithms on a Quantum Computer , 1995, SIAM Rev..

[46]  Susanto Rahardja,et al.  Sequency-Ordered Complex Hadamard Transform: Properties, Computational Complexity and Applications , 2008, IEEE Transactions on Signal Processing.

[47]  Zekeriya Erkin,et al.  Generating Private Recommendations Efficiently Using Homomorphic Encryption and Data Packing , 2012, IEEE Transactions on Information Forensics and Security.

[48]  S. Rahardja,et al.  Family of unified complex Hadamard transforms , 1999 .

[49]  B. N. Chatterji,et al.  Designing Quantization Table for Hadamard Transform based on Human Visual System for Image Compression , 2007 .

[50]  C.-C. Jay Kuo,et al.  MAI-Free MC-CDMA Systems Based on Hadamard–Walsh Codes , 2006, IEEE Transactions on Signal Processing.

[51]  Ivan Damgård,et al.  A Generalisation, a Simplification and Some Applications of Paillier's Probabilistic Public-Key System , 2001, Public Key Cryptography.

[52]  Craig Gentry,et al.  Fully homomorphic encryption using ideal lattices , 2009, STOC '09.