biometric security through visual encryption for fog edge ......biometric security through visual...

Post on 20-Sep-2020

4 Views

Category:

Documents

0 Downloads

Preview:

Click to see full reader

TRANSCRIPT

Biometric Security Through Visual Encryption for Fog Edge Computing

Biometric Security Through Visual Encryption forFog Edge Computing

Ghadir Mostafa 31-0810Hana Hani 31-2206

Lama Ahmed 31-4892Mina Eshak 31-15454Karim Samy 31-15456

German University in Cairo

February 24, 2018

1 / 27

Biometric Security Through Visual Encryption for Fog Edge Computing

Outline

1 Motivation

2 Fog Edge Computing

3 Cryptography

4 Watermarking

5 Encryption

6 Decryption

7 Conclusion

2 / 27

Biometric Security Through Visual Encryption for Fog Edge Computing

Motivation

Motivation

3 / 27

Biometric Security Through Visual Encryption for Fog Edge Computing

Motivation

Applications:

4 / 27

Biometric Security Through Visual Encryption for Fog Edge Computing

Motivation

IoT challenges:

Tons of devices connected to cloud.

Massive processing needed.

5 / 27

Biometric Security Through Visual Encryption for Fog Edge Computing

Fog Edge Computing

Fog Edge Computing

6 / 27

Biometric Security Through Visual Encryption for Fog Edge Computing

Fog Edge Computing

Advantages:

Intermediate layer.

Edge server physically closer.

Work offloaded from cloud.

7 / 27

Biometric Security Through Visual Encryption for Fog Edge Computing

Fog Edge Computing

Fog Edge Computing security coin

Side 1: Improved security.

Static data.Closer to where created.Less sharing, less vulnerability.

Side 2: Less secure.

Vulnerable edge devices.Data encryption/ VPN needed.

8 / 27

Biometric Security Through Visual Encryption for Fog Edge Computing

Fog Edge Computing

Fog Edge Computing security coin

Side 1: Improved security.

Static data.Closer to where created.Less sharing, less vulnerability.

Side 2: Less secure.

Vulnerable edge devices.Data encryption/ VPN needed.

8 / 27

Biometric Security Through Visual Encryption for Fog Edge Computing

Cryptography

Cryptography

9 / 27

Biometric Security Through Visual Encryption for Fog Edge Computing

Watermarking

Watermarking

History

In 1300 paper companies used dandy roll process to watermark their products.

roll.jpg

10 / 27

Biometric Security Through Visual Encryption for Fog Edge Computing

Watermarking

Watermarking

It is the process of creating a invisible tag for certain data.

1 Copyrights2 Security3 Hiding useful information.

11 / 27

Biometric Security Through Visual Encryption for Fog Edge Computing

Watermarking

Watermarking

It is the process of creating a invisible tag for certain data.

1 Copyrights

2 Security3 Hiding useful information.

11 / 27

Biometric Security Through Visual Encryption for Fog Edge Computing

Watermarking

Watermarking

It is the process of creating a invisible tag for certain data.

1 Copyrights2 Security

3 Hiding useful information.

11 / 27

Biometric Security Through Visual Encryption for Fog Edge Computing

Watermarking

Watermarking

It is the process of creating a invisible tag for certain data.

1 Copyrights2 Security3 Hiding useful information.

11 / 27

Biometric Security Through Visual Encryption for Fog Edge Computing

Watermarking

Zero Watermarking

Sometimes data can tolerate obvious changes done to it.

Zero watermarking use watermarks that do not obviouslychange the image.

Watermarks can be used in two different ways

1 Embeded in the image.2 Separated from the image.

12 / 27

Biometric Security Through Visual Encryption for Fog Edge Computing

Watermarking

Zero Watermarking

Sometimes data can tolerate obvious changes done to it.

Zero watermarking use watermarks that do not obviouslychange the image.

Watermarks can be used in two different ways

1 Embeded in the image.2 Separated from the image.

12 / 27

Biometric Security Through Visual Encryption for Fog Edge Computing

Watermarking

Zero Watermarking

Sometimes data can tolerate obvious changes done to it.

Zero watermarking use watermarks that do not obviouslychange the image.

Watermarks can be used in two different ways

1 Embeded in the image.2 Separated from the image.

12 / 27

Biometric Security Through Visual Encryption for Fog Edge Computing

Watermarking

Zero Watermarking

Sometimes data can tolerate obvious changes done to it.

Zero watermarking use watermarks that do not obviouslychange the image.

Watermarks can be used in two different ways

1 Embeded in the image.

2 Separated from the image.

12 / 27

Biometric Security Through Visual Encryption for Fog Edge Computing

Watermarking

Zero Watermarking

Sometimes data can tolerate obvious changes done to it.

Zero watermarking use watermarks that do not obviouslychange the image.

Watermarks can be used in two different ways

1 Embeded in the image.2 Separated from the image.

12 / 27

Biometric Security Through Visual Encryption for Fog Edge Computing

Watermarking

Zero watermarking Scheme

13 / 27

Biometric Security Through Visual Encryption for Fog Edge Computing

Watermarking

Zero watermarking Scheme

13 / 27

Biometric Security Through Visual Encryption for Fog Edge Computing

Watermarking

Zero watermarking Scheme

13 / 27

Biometric Security Through Visual Encryption for Fog Edge Computing

Watermarking

Zero watermarking Scheme

13 / 27

Biometric Security Through Visual Encryption for Fog Edge Computing

Watermarking

Zero watermarking Scheme

13 / 27

Biometric Security Through Visual Encryption for Fog Edge Computing

Watermarking

Zero watermarking Scheme

13 / 27

Biometric Security Through Visual Encryption for Fog Edge Computing

Watermarking

Zero watermarking Scheme

13 / 27

Biometric Security Through Visual Encryption for Fog Edge Computing

Encryption

Gray scale image structure

14 / 27

Biometric Security Through Visual Encryption for Fog Edge Computing

Encryption

Gray scale image structure

15 / 27

Biometric Security Through Visual Encryption for Fog Edge Computing

Encryption

Gray scale image structure

16 / 27

Biometric Security Through Visual Encryption for Fog Edge Computing

Encryption

Converting to gray-scale

Retrieving bit planes

A pixel will be positioned at positions ( j , j , : )Same dimensions as original image

17 / 27

Biometric Security Through Visual Encryption for Fog Edge Computing

Encryption

Generating the secret shares

(n) by (n-2) G matrix(n) by (n) identity H matrix(n) by (2n-2) GH concatenated matrixGH’: Complement of GH

18 / 27

Biometric Security Through Visual Encryption for Fog Edge Computing

Encryption

Encryption Matrices

19 / 27

Biometric Security Through Visual Encryption for Fog Edge Computing

Encryption

Secret key retrieval

y = b +

⌊(a− b) × x s −min(x s)

max(x s) −min(x s)

⌋(1)

a = 1

b = n + (n − 2)

x s is the sub-sequence containing n+(n-2) values

20 / 27

Biometric Security Through Visual Encryption for Fog Edge Computing

Encryption

Secret key retrieval

y = b +

⌊(a− b) × x s −min(x s)

max(x s) −min(x s)

⌋(1)

a = 1

b = n + (n − 2)

x s is the sub-sequence containing n+(n-2) values

20 / 27

Biometric Security Through Visual Encryption for Fog Edge Computing

Encryption

Secret key retrieval

y = b +

⌊(a− b) × x s −min(x s)

max(x s) −min(x s)

⌋(1)

a = 1

b = n + (n − 2)

x s is the sub-sequence containing n+(n-2) values

20 / 27

Biometric Security Through Visual Encryption for Fog Edge Computing

Encryption

Secret key retrieval

y = b +

⌊(a− b) × x s −min(x s)

max(x s) −min(x s)

⌋(1)

a = 1

b = n + (n − 2)

x s is the sub-sequence containing n+(n-2) values

20 / 27

Biometric Security Through Visual Encryption for Fog Edge Computing

Encryption

Encryption process

21 / 27

Biometric Security Through Visual Encryption for Fog Edge Computing

Encryption

Encryption process

21 / 27

Biometric Security Through Visual Encryption for Fog Edge Computing

Encryption

Encryption process

21 / 27

Biometric Security Through Visual Encryption for Fog Edge Computing

Encryption

Encryption process

21 / 27

Biometric Security Through Visual Encryption for Fog Edge Computing

Decryption

Decryption Process

22 / 27

Biometric Security Through Visual Encryption for Fog Edge Computing

Decryption

Decryption Process

22 / 27

Biometric Security Through Visual Encryption for Fog Edge Computing

Decryption

Decryption Process

22 / 27

Biometric Security Through Visual Encryption for Fog Edge Computing

Decryption

Decryption Process

22 / 27

Biometric Security Through Visual Encryption for Fog Edge Computing

Decryption

Decryption Process

22 / 27

Biometric Security Through Visual Encryption for Fog Edge Computing

Decryption

Decryption Process

Needed elements

n secret sharesSecret key

Matrix for each bit

Arrange matrix

Decide 0 or 1

23 / 27

Biometric Security Through Visual Encryption for Fog Edge Computing

Decryption

Decryption Process

Needed elements

n secret sharesSecret key

Matrix for each bit

Arrange matrix

Decide 0 or 1

23 / 27

Biometric Security Through Visual Encryption for Fog Edge Computing

Decryption

Decryption Process

Needed elements

n secret sharesSecret key

Matrix for each bit

Arrange matrix

Decide 0 or 1

23 / 27

Biometric Security Through Visual Encryption for Fog Edge Computing

Decryption

Decryption Process

Needed elements

n secret sharesSecret key

Matrix for each bit

Arrange matrix

Decide 0 or 1

23 / 27

Biometric Security Through Visual Encryption for Fog Edge Computing

Decryption

Image Reconstruction

24 / 27

Biometric Security Through Visual Encryption for Fog Edge Computing

Decryption

Image Reconstruction

24 / 27

Biometric Security Through Visual Encryption for Fog Edge Computing

Decryption

Image Reconstruction

24 / 27

Biometric Security Through Visual Encryption for Fog Edge Computing

Decryption

Image Reconstruction

24 / 27

Biometric Security Through Visual Encryption for Fog Edge Computing

Decryption

Image Reconstruction

24 / 27

Biometric Security Through Visual Encryption for Fog Edge Computing

Decryption

Image Reconstruction

24 / 27

Biometric Security Through Visual Encryption for Fog Edge Computing

Decryption

Image Reconstruction

24 / 27

Biometric Security Through Visual Encryption for Fog Edge Computing

Decryption

Image Reconstruction

24 / 27

Biometric Security Through Visual Encryption for Fog Edge Computing

Decryption

Original, Watermarked, Decrypted Images

25 / 27

Biometric Security Through Visual Encryption for Fog Edge Computing

Decryption

Original, Watermarked, Decrypted Images

25 / 27

Biometric Security Through Visual Encryption for Fog Edge Computing

Decryption

Original, Watermarked, Decrypted Images

25 / 27

Biometric Security Through Visual Encryption for Fog Edge Computing

Conclusion

Conclusion

Edge computing and security

Zero watermarking and copyright protection

Encryption and decryption processes

Visual quality of image unchanged

26 / 27

Biometric Security Through Visual Encryption for Fog Edge Computing

Conclusion

Conclusion

Edge computing and security

Zero watermarking and copyright protection

Encryption and decryption processes

Visual quality of image unchanged

26 / 27

Biometric Security Through Visual Encryption for Fog Edge Computing

Conclusion

Conclusion

Edge computing and security

Zero watermarking and copyright protection

Encryption and decryption processes

Visual quality of image unchanged

26 / 27

Biometric Security Through Visual Encryption for Fog Edge Computing

Conclusion

Conclusion

Edge computing and security

Zero watermarking and copyright protection

Encryption and decryption processes

Visual quality of image unchanged

26 / 27

Biometric Security Through Visual Encryption for Fog Edge Computing

Conclusion

Conclusion

Any Questions ?!

27 / 27

top related