biometric security through visual encryption for fog edge ......biometric security through visual...
TRANSCRIPT
Biometric Security Through Visual Encryption for Fog Edge Computing
Biometric Security Through Visual Encryption forFog Edge Computing
Ghadir Mostafa 31-0810Hana Hani 31-2206
Lama Ahmed 31-4892Mina Eshak 31-15454Karim Samy 31-15456
German University in Cairo
February 24, 2018
1 / 27
Biometric Security Through Visual Encryption for Fog Edge Computing
Outline
1 Motivation
2 Fog Edge Computing
3 Cryptography
4 Watermarking
5 Encryption
6 Decryption
7 Conclusion
2 / 27
Biometric Security Through Visual Encryption for Fog Edge Computing
Motivation
Motivation
3 / 27
Biometric Security Through Visual Encryption for Fog Edge Computing
Motivation
Applications:
4 / 27
Biometric Security Through Visual Encryption for Fog Edge Computing
Motivation
IoT challenges:
Tons of devices connected to cloud.
Massive processing needed.
5 / 27
Biometric Security Through Visual Encryption for Fog Edge Computing
Fog Edge Computing
Fog Edge Computing
6 / 27
Biometric Security Through Visual Encryption for Fog Edge Computing
Fog Edge Computing
Advantages:
Intermediate layer.
Edge server physically closer.
Work offloaded from cloud.
7 / 27
Biometric Security Through Visual Encryption for Fog Edge Computing
Fog Edge Computing
Fog Edge Computing security coin
Side 1: Improved security.
Static data.Closer to where created.Less sharing, less vulnerability.
Side 2: Less secure.
Vulnerable edge devices.Data encryption/ VPN needed.
8 / 27
Biometric Security Through Visual Encryption for Fog Edge Computing
Fog Edge Computing
Fog Edge Computing security coin
Side 1: Improved security.
Static data.Closer to where created.Less sharing, less vulnerability.
Side 2: Less secure.
Vulnerable edge devices.Data encryption/ VPN needed.
8 / 27
Biometric Security Through Visual Encryption for Fog Edge Computing
Cryptography
Cryptography
9 / 27
Biometric Security Through Visual Encryption for Fog Edge Computing
Watermarking
Watermarking
History
In 1300 paper companies used dandy roll process to watermark their products.
roll.jpg
10 / 27
Biometric Security Through Visual Encryption for Fog Edge Computing
Watermarking
Watermarking
It is the process of creating a invisible tag for certain data.
1 Copyrights2 Security3 Hiding useful information.
11 / 27
Biometric Security Through Visual Encryption for Fog Edge Computing
Watermarking
Watermarking
It is the process of creating a invisible tag for certain data.
1 Copyrights
2 Security3 Hiding useful information.
11 / 27
Biometric Security Through Visual Encryption for Fog Edge Computing
Watermarking
Watermarking
It is the process of creating a invisible tag for certain data.
1 Copyrights2 Security
3 Hiding useful information.
11 / 27
Biometric Security Through Visual Encryption for Fog Edge Computing
Watermarking
Watermarking
It is the process of creating a invisible tag for certain data.
1 Copyrights2 Security3 Hiding useful information.
11 / 27
Biometric Security Through Visual Encryption for Fog Edge Computing
Watermarking
Zero Watermarking
Sometimes data can tolerate obvious changes done to it.
Zero watermarking use watermarks that do not obviouslychange the image.
Watermarks can be used in two different ways
1 Embeded in the image.2 Separated from the image.
12 / 27
Biometric Security Through Visual Encryption for Fog Edge Computing
Watermarking
Zero Watermarking
Sometimes data can tolerate obvious changes done to it.
Zero watermarking use watermarks that do not obviouslychange the image.
Watermarks can be used in two different ways
1 Embeded in the image.2 Separated from the image.
12 / 27
Biometric Security Through Visual Encryption for Fog Edge Computing
Watermarking
Zero Watermarking
Sometimes data can tolerate obvious changes done to it.
Zero watermarking use watermarks that do not obviouslychange the image.
Watermarks can be used in two different ways
1 Embeded in the image.2 Separated from the image.
12 / 27
Biometric Security Through Visual Encryption for Fog Edge Computing
Watermarking
Zero Watermarking
Sometimes data can tolerate obvious changes done to it.
Zero watermarking use watermarks that do not obviouslychange the image.
Watermarks can be used in two different ways
1 Embeded in the image.
2 Separated from the image.
12 / 27
Biometric Security Through Visual Encryption for Fog Edge Computing
Watermarking
Zero Watermarking
Sometimes data can tolerate obvious changes done to it.
Zero watermarking use watermarks that do not obviouslychange the image.
Watermarks can be used in two different ways
1 Embeded in the image.2 Separated from the image.
12 / 27
Biometric Security Through Visual Encryption for Fog Edge Computing
Watermarking
Zero watermarking Scheme
13 / 27
Biometric Security Through Visual Encryption for Fog Edge Computing
Watermarking
Zero watermarking Scheme
13 / 27
Biometric Security Through Visual Encryption for Fog Edge Computing
Watermarking
Zero watermarking Scheme
13 / 27
Biometric Security Through Visual Encryption for Fog Edge Computing
Watermarking
Zero watermarking Scheme
13 / 27
Biometric Security Through Visual Encryption for Fog Edge Computing
Watermarking
Zero watermarking Scheme
13 / 27
Biometric Security Through Visual Encryption for Fog Edge Computing
Watermarking
Zero watermarking Scheme
13 / 27
Biometric Security Through Visual Encryption for Fog Edge Computing
Watermarking
Zero watermarking Scheme
13 / 27
Biometric Security Through Visual Encryption for Fog Edge Computing
Encryption
Gray scale image structure
14 / 27
Biometric Security Through Visual Encryption for Fog Edge Computing
Encryption
Gray scale image structure
15 / 27
Biometric Security Through Visual Encryption for Fog Edge Computing
Encryption
Gray scale image structure
16 / 27
Biometric Security Through Visual Encryption for Fog Edge Computing
Encryption
Converting to gray-scale
Retrieving bit planes
A pixel will be positioned at positions ( j , j , : )Same dimensions as original image
17 / 27
Biometric Security Through Visual Encryption for Fog Edge Computing
Encryption
Generating the secret shares
(n) by (n-2) G matrix(n) by (n) identity H matrix(n) by (2n-2) GH concatenated matrixGH’: Complement of GH
18 / 27
Biometric Security Through Visual Encryption for Fog Edge Computing
Encryption
Encryption Matrices
19 / 27
Biometric Security Through Visual Encryption for Fog Edge Computing
Encryption
Secret key retrieval
y = b +
⌊(a− b) × x s −min(x s)
max(x s) −min(x s)
⌋(1)
a = 1
b = n + (n − 2)
x s is the sub-sequence containing n+(n-2) values
20 / 27
Biometric Security Through Visual Encryption for Fog Edge Computing
Encryption
Secret key retrieval
y = b +
⌊(a− b) × x s −min(x s)
max(x s) −min(x s)
⌋(1)
a = 1
b = n + (n − 2)
x s is the sub-sequence containing n+(n-2) values
20 / 27
Biometric Security Through Visual Encryption for Fog Edge Computing
Encryption
Secret key retrieval
y = b +
⌊(a− b) × x s −min(x s)
max(x s) −min(x s)
⌋(1)
a = 1
b = n + (n − 2)
x s is the sub-sequence containing n+(n-2) values
20 / 27
Biometric Security Through Visual Encryption for Fog Edge Computing
Encryption
Secret key retrieval
y = b +
⌊(a− b) × x s −min(x s)
max(x s) −min(x s)
⌋(1)
a = 1
b = n + (n − 2)
x s is the sub-sequence containing n+(n-2) values
20 / 27
Biometric Security Through Visual Encryption for Fog Edge Computing
Encryption
Encryption process
21 / 27
Biometric Security Through Visual Encryption for Fog Edge Computing
Encryption
Encryption process
21 / 27
Biometric Security Through Visual Encryption for Fog Edge Computing
Encryption
Encryption process
21 / 27
Biometric Security Through Visual Encryption for Fog Edge Computing
Encryption
Encryption process
21 / 27
Biometric Security Through Visual Encryption for Fog Edge Computing
Decryption
Decryption Process
22 / 27
Biometric Security Through Visual Encryption for Fog Edge Computing
Decryption
Decryption Process
22 / 27
Biometric Security Through Visual Encryption for Fog Edge Computing
Decryption
Decryption Process
22 / 27
Biometric Security Through Visual Encryption for Fog Edge Computing
Decryption
Decryption Process
22 / 27
Biometric Security Through Visual Encryption for Fog Edge Computing
Decryption
Decryption Process
22 / 27
Biometric Security Through Visual Encryption for Fog Edge Computing
Decryption
Decryption Process
Needed elements
n secret sharesSecret key
Matrix for each bit
Arrange matrix
Decide 0 or 1
23 / 27
Biometric Security Through Visual Encryption for Fog Edge Computing
Decryption
Decryption Process
Needed elements
n secret sharesSecret key
Matrix for each bit
Arrange matrix
Decide 0 or 1
23 / 27
Biometric Security Through Visual Encryption for Fog Edge Computing
Decryption
Decryption Process
Needed elements
n secret sharesSecret key
Matrix for each bit
Arrange matrix
Decide 0 or 1
23 / 27
Biometric Security Through Visual Encryption for Fog Edge Computing
Decryption
Decryption Process
Needed elements
n secret sharesSecret key
Matrix for each bit
Arrange matrix
Decide 0 or 1
23 / 27
Biometric Security Through Visual Encryption for Fog Edge Computing
Decryption
Image Reconstruction
24 / 27
Biometric Security Through Visual Encryption for Fog Edge Computing
Decryption
Image Reconstruction
24 / 27
Biometric Security Through Visual Encryption for Fog Edge Computing
Decryption
Image Reconstruction
24 / 27
Biometric Security Through Visual Encryption for Fog Edge Computing
Decryption
Image Reconstruction
24 / 27
Biometric Security Through Visual Encryption for Fog Edge Computing
Decryption
Image Reconstruction
24 / 27
Biometric Security Through Visual Encryption for Fog Edge Computing
Decryption
Image Reconstruction
24 / 27
Biometric Security Through Visual Encryption for Fog Edge Computing
Decryption
Image Reconstruction
24 / 27
Biometric Security Through Visual Encryption for Fog Edge Computing
Decryption
Image Reconstruction
24 / 27
Biometric Security Through Visual Encryption for Fog Edge Computing
Decryption
Original, Watermarked, Decrypted Images
25 / 27
Biometric Security Through Visual Encryption for Fog Edge Computing
Decryption
Original, Watermarked, Decrypted Images
25 / 27
Biometric Security Through Visual Encryption for Fog Edge Computing
Decryption
Original, Watermarked, Decrypted Images
25 / 27
Biometric Security Through Visual Encryption for Fog Edge Computing
Conclusion
Conclusion
Edge computing and security
Zero watermarking and copyright protection
Encryption and decryption processes
Visual quality of image unchanged
26 / 27
Biometric Security Through Visual Encryption for Fog Edge Computing
Conclusion
Conclusion
Edge computing and security
Zero watermarking and copyright protection
Encryption and decryption processes
Visual quality of image unchanged
26 / 27
Biometric Security Through Visual Encryption for Fog Edge Computing
Conclusion
Conclusion
Edge computing and security
Zero watermarking and copyright protection
Encryption and decryption processes
Visual quality of image unchanged
26 / 27
Biometric Security Through Visual Encryption for Fog Edge Computing
Conclusion
Conclusion
Edge computing and security
Zero watermarking and copyright protection
Encryption and decryption processes
Visual quality of image unchanged
26 / 27
Biometric Security Through Visual Encryption for Fog Edge Computing
Conclusion
Conclusion
Any Questions ?!
27 / 27