首页 > 最新文献

EURASIP J. Inf. Secur.最新文献

英文 中文
Signal Processing in the Encrypted Domain 加密域的信号处理
Pub Date : 1900-01-01 DOI: 10.1155/2007/82790
A. Piva, S. Katzenbeisser
Recent advances in digital signal processing enabled a number of new services in various application domains, ranging from enhanced multimedia content production and distribution, to advanced healthcare systems for continuous health monitoring. At the heart of these services lies the ability to securely manipulate “valuable” digital signals in order to satisfy security requirements such as intellectual property management, authenticity, privacy, and access control. Currently available technological solutions for “secure manipulation of signals” apply cryptographic primitives by building a secure layer on top of existing signal processing modules, able to protect them from leakage of critical information, assuming that the involved parties or devices trust each other. This implies that the cryptographic layer is used only to protect the data against access through unauthorized third parties or to provide authenticity. However, this is often not enough to ensure the security of the application, since the owner of the data may not trust the processing devices, or those actors that are required to manipulate them. It is clear that the availability of signal processing algorithms that work directly on encrypted signals would be of great help for application scenarios where signals must be produced, processed, or exchanged securely. Whereas the development of tools capable of processing encrypted signals may seem a formidable task, some recent, still scattered, studies, spanning from secure embedding and detection of digital watermarks and secure content distribution to compression of encrypted data and access to encrypted databases, have shown that performing signal processing operations in encrypted content is indeed possible. We are delighted to present the first issue of a journal, entirely devoted to signal processing in the encrypted domain. The issue contains both survey papers allowing the reader to become acquainted with this exciting field, and research papers discussing the latest developments. The first part of the special issue contains three survey papers: Fontaine and Galand give an overview of homomorphic encryption, which is one of the key tools for signal processing in the encrypted domain, in their paper “A survey of homomorphic encryption for nonspecialists.” An introduction to the field of securemultiparty computation is provided by the paper “Secure multiparty computation between distrusted networks terminals” by Cheung and Nguyen. Finally, research in the area of signal processing under encryption is surveyed in the paper “Protection and retrieval of encrypted multimedia content: when cryptography meets signal processing” by Erkin et al. The second part of the special issue contains four research papers. Orlandi et al. introduce the notion of oblivious computing with neural networks in the paper “Oblivious neural network computing via homomorphic encryption.” Troncoso-Pastoriza and Perez-Gonzalez present new protocols for zero-kn
数字信号处理的最新进展使各种应用领域中的许多新服务成为可能,从增强的多媒体内容生产和分发,到用于持续健康监测的高级医疗保健系统。这些服务的核心在于能够安全地操纵“有价值的”数字信号,以满足诸如知识产权管理、真实性、隐私和访问控制等安全需求。目前可用的“信号安全操作”技术解决方案通过在现有信号处理模块之上构建一个安全层来应用加密原语,能够保护它们免受关键信息的泄露,假设相关方或设备相互信任。这意味着加密层仅用于防止未经授权的第三方访问数据或提供真实性。然而,这通常不足以确保应用程序的安全性,因为数据的所有者可能不信任处理设备或需要操作它们的参与者。很明显,直接在加密信号上工作的信号处理算法的可用性对于必须安全地产生、处理或交换信号的应用场景将有很大帮助。尽管能够处理加密信号的工具的开发似乎是一项艰巨的任务,但最近一些仍然分散的研究,从数字水印的安全嵌入和检测、安全内容分发到加密数据的压缩和访问加密数据库,都表明在加密内容中执行信号处理操作确实是可能的。我们很高兴地介绍第一期杂志,完全致力于加密领域的信号处理。这期杂志既包括让读者熟悉这个令人兴奋的领域的调查论文,也包括讨论最新发展的研究论文。特刊的第一部分包含三篇综述论文:Fontaine和Galand在他们的论文“非专业人士的同态加密调查”中概述了同态加密,这是加密领域信号处理的关键工具之一。Cheung和Nguyen的论文“互不信任网络终端之间的安全多方计算”对安全多方计算领域进行了介绍。最后,Erkin等人的论文《加密多媒体内容的保护与检索:当密码学满足信号处理时》对加密条件下信号处理领域的研究进行了综述。特刊的第二部分包含四篇研究论文。Orlandi等人在“同态加密的遗忘神经网络计算”一文中引入了神经网络遗忘计算的概念。Troncoso-Pastoriza和Perez-Gonzalez在他们的论文《提高对灵敏度攻击鲁棒性的高效零知识水印检测》中提出了新的零知识水印检测协议。Prins等人在他们的论文“使用鲁棒qim水印技术的匿名指纹”中展示了如何将先进的量化索引调制水印方案与买卖双方的水印协议结合使用。最后,Gschwandtner等人在他们的论文“二维混沌图像加密方案的传输误差和压缩鲁棒性”中探讨了专用图像加密方案的特性。最后,我们要感谢所有的作者,以及所有的审稿人,感谢他们对本期的贡献。我们希望读者会喜欢这个特刊,并鼓励更多的同事投入时间到这个新颖而令人兴奋的研究领域。
{"title":"Signal Processing in the Encrypted Domain","authors":"A. Piva, S. Katzenbeisser","doi":"10.1155/2007/82790","DOIUrl":"https://doi.org/10.1155/2007/82790","url":null,"abstract":"Recent advances in digital signal processing enabled a number of new services in various application domains, ranging from enhanced multimedia content production and distribution, to advanced healthcare systems for continuous health monitoring. At the heart of these services lies the ability to securely manipulate “valuable” digital signals in order to satisfy security requirements such as intellectual property management, authenticity, privacy, and access control. Currently available technological solutions for “secure manipulation of signals” apply cryptographic primitives by building a secure layer on top of existing signal processing modules, able to protect them from leakage of critical information, assuming that the involved parties or devices trust each other. This implies that the cryptographic layer is used only to protect the data against access through unauthorized third parties or to provide authenticity. However, this is often not enough to ensure the security of the application, since the owner of the data may not trust the processing devices, or those actors that are required to manipulate them. It is clear that the availability of signal processing algorithms that work directly on encrypted signals would be of great help for application scenarios where signals must be produced, processed, or exchanged securely. Whereas the development of tools capable of processing encrypted signals may seem a formidable task, some recent, still scattered, studies, spanning from secure embedding and detection of digital watermarks and secure content distribution to compression of encrypted data and access to encrypted databases, have shown that performing signal processing operations in encrypted content is indeed possible. We are delighted to present the first issue of a journal, entirely devoted to signal processing in the encrypted domain. The issue contains both survey papers allowing the reader to become acquainted with this exciting field, and research papers discussing the latest developments. The first part of the special issue contains three survey papers: Fontaine and Galand give an overview of homomorphic encryption, which is one of the key tools for signal processing in the encrypted domain, in their paper “A survey of homomorphic encryption for nonspecialists.” An introduction to the field of securemultiparty computation is provided by the paper “Secure multiparty computation between distrusted networks terminals” by Cheung and Nguyen. Finally, research in the area of signal processing under encryption is surveyed in the paper “Protection and retrieval of encrypted multimedia content: when cryptography meets signal processing” by Erkin et al. The second part of the special issue contains four research papers. Orlandi et al. introduce the notion of oblivious computing with neural networks in the paper “Oblivious neural network computing via homomorphic encryption.” Troncoso-Pastoriza and Perez-Gonzalez present new protocols for zero-kn","PeriodicalId":313497,"journal":{"name":"EURASIP J. Inf. Secur.","volume":"2007 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131064700","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 20
Protection and Retrieval of Encrypted Multimedia Content: When Cryptography Meets Signal Processing 加密多媒体内容的保护与检索:当密码学遇到信号处理时
Pub Date : 1900-01-01 DOI: 10.1155/2007/78943
Z. Erkin, A. Piva, S. Katzenbeisser, R. Lagendijk, J. Shokrollahi, G. Neven, M. Barni
The processing and encryption of multimedia content are generally considered sequential and independent operations. In certain multimedia content processing scenarios, it is, however, desirable to carry out processing directly on encrypted signals. The field of secure signal processing poses significant challenges for both signal processing and cryptography research; only few ready-togo fully integrated solutions are available. This study first concisely summarizes cryptographic primitives used in existing solutions to processing of encrypted signals, and discusses implications of the security requirements on these solutions. The study then continues to describe two domains in which secure signal processing has been taken up as a challenge, namely, analysis and retrieval of multimedia content, as well as multimedia content protection. In each domain, state-of-the-art algorithms are described. Finally, the study discusses the challenges and open issues in the field of secure signal processing.
多媒体内容的处理和加密通常被认为是顺序的和独立的操作。然而,在某些多媒体内容处理场景中,希望直接对加密信号进行处理。安全信号处理领域对信号处理和密码学研究都提出了重大挑战;只有少数现成的完全集成的解决方案可用。本研究首先简要总结了现有加密信号处理解决方案中使用的加密原语,并讨论了这些解决方案的安全需求的含义。然后,研究继续描述了安全信号处理已被视为挑战的两个领域,即多媒体内容的分析和检索,以及多媒体内容保护。在每个领域中,描述了最先进的算法。最后,讨论了安全信号处理领域面临的挑战和有待解决的问题。
{"title":"Protection and Retrieval of Encrypted Multimedia Content: When Cryptography Meets Signal Processing","authors":"Z. Erkin, A. Piva, S. Katzenbeisser, R. Lagendijk, J. Shokrollahi, G. Neven, M. Barni","doi":"10.1155/2007/78943","DOIUrl":"https://doi.org/10.1155/2007/78943","url":null,"abstract":"The processing and encryption of multimedia content are generally considered sequential and independent operations. In certain multimedia content processing scenarios, it is, however, desirable to carry out processing directly on encrypted signals. The field of secure signal processing poses significant challenges for both signal processing and cryptography research; only few ready-togo fully integrated solutions are available. This study first concisely summarizes cryptographic primitives used in existing solutions to processing of encrypted signals, and discusses implications of the security requirements on these solutions. The study then continues to describe two domains in which secure signal processing has been taken up as a challenge, namely, analysis and retrieval of multimedia content, as well as multimedia content protection. In each domain, state-of-the-art algorithms are described. Finally, the study discusses the challenges and open issues in the field of secure signal processing.","PeriodicalId":313497,"journal":{"name":"EURASIP J. Inf. Secur.","volume":"118 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132032691","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 184
期刊
EURASIP J. Inf. Secur.
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1