biometric security through visual encryption for fog edge ......biometric security through visual...

66
Biometric Security Through Visual Encryption for Fog Edge Computing Biometric Security Through Visual Encryption for Fog Edge Computing Ghadir Mostafa 31-0810 Hana Hani 31-2206 Lama Ahmed 31-4892 Mina Eshak 31-15454 Karim Samy 31-15456 German University in Cairo February 24, 2018 1 / 27

Upload: others

Post on 20-Sep-2020

3 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Biometric Security Through Visual Encryption for Fog Edge ......Biometric Security Through Visual Encryption for Fog Edge Computing Watermarking Zero Watermarking Sometimes data can

Biometric Security Through Visual Encryption for Fog Edge Computing

Biometric Security Through Visual Encryption forFog Edge Computing

Ghadir Mostafa 31-0810Hana Hani 31-2206

Lama Ahmed 31-4892Mina Eshak 31-15454Karim Samy 31-15456

German University in Cairo

February 24, 2018

1 / 27

Page 2: Biometric Security Through Visual Encryption for Fog Edge ......Biometric Security Through Visual Encryption for Fog Edge Computing Watermarking Zero Watermarking Sometimes data can

Biometric Security Through Visual Encryption for Fog Edge Computing

Outline

1 Motivation

2 Fog Edge Computing

3 Cryptography

4 Watermarking

5 Encryption

6 Decryption

7 Conclusion

2 / 27

Page 3: Biometric Security Through Visual Encryption for Fog Edge ......Biometric Security Through Visual Encryption for Fog Edge Computing Watermarking Zero Watermarking Sometimes data can

Biometric Security Through Visual Encryption for Fog Edge Computing

Motivation

Motivation

3 / 27

Page 4: Biometric Security Through Visual Encryption for Fog Edge ......Biometric Security Through Visual Encryption for Fog Edge Computing Watermarking Zero Watermarking Sometimes data can

Biometric Security Through Visual Encryption for Fog Edge Computing

Motivation

Applications:

4 / 27

Page 5: Biometric Security Through Visual Encryption for Fog Edge ......Biometric Security Through Visual Encryption for Fog Edge Computing Watermarking Zero Watermarking Sometimes data can

Biometric Security Through Visual Encryption for Fog Edge Computing

Motivation

IoT challenges:

Tons of devices connected to cloud.

Massive processing needed.

5 / 27

Page 6: Biometric Security Through Visual Encryption for Fog Edge ......Biometric Security Through Visual Encryption for Fog Edge Computing Watermarking Zero Watermarking Sometimes data can

Biometric Security Through Visual Encryption for Fog Edge Computing

Fog Edge Computing

Fog Edge Computing

6 / 27

Page 7: Biometric Security Through Visual Encryption for Fog Edge ......Biometric Security Through Visual Encryption for Fog Edge Computing Watermarking Zero Watermarking Sometimes data can

Biometric Security Through Visual Encryption for Fog Edge Computing

Fog Edge Computing

Advantages:

Intermediate layer.

Edge server physically closer.

Work offloaded from cloud.

7 / 27

Page 8: Biometric Security Through Visual Encryption for Fog Edge ......Biometric Security Through Visual Encryption for Fog Edge Computing Watermarking Zero Watermarking Sometimes data can

Biometric Security Through Visual Encryption for Fog Edge Computing

Fog Edge Computing

Fog Edge Computing security coin

Side 1: Improved security.

Static data.Closer to where created.Less sharing, less vulnerability.

Side 2: Less secure.

Vulnerable edge devices.Data encryption/ VPN needed.

8 / 27

Page 9: Biometric Security Through Visual Encryption for Fog Edge ......Biometric Security Through Visual Encryption for Fog Edge Computing Watermarking Zero Watermarking Sometimes data can

Biometric Security Through Visual Encryption for Fog Edge Computing

Fog Edge Computing

Fog Edge Computing security coin

Side 1: Improved security.

Static data.Closer to where created.Less sharing, less vulnerability.

Side 2: Less secure.

Vulnerable edge devices.Data encryption/ VPN needed.

8 / 27

Page 10: Biometric Security Through Visual Encryption for Fog Edge ......Biometric Security Through Visual Encryption for Fog Edge Computing Watermarking Zero Watermarking Sometimes data can

Biometric Security Through Visual Encryption for Fog Edge Computing

Cryptography

Cryptography

9 / 27

Page 11: Biometric Security Through Visual Encryption for Fog Edge ......Biometric Security Through Visual Encryption for Fog Edge Computing Watermarking Zero Watermarking Sometimes data can

Biometric Security Through Visual Encryption for Fog Edge Computing

Watermarking

Watermarking

History

In 1300 paper companies used dandy roll process to watermark their products.

roll.jpg

10 / 27

Page 12: Biometric Security Through Visual Encryption for Fog Edge ......Biometric Security Through Visual Encryption for Fog Edge Computing Watermarking Zero Watermarking Sometimes data can

Biometric Security Through Visual Encryption for Fog Edge Computing

Watermarking

Watermarking

It is the process of creating a invisible tag for certain data.

1 Copyrights2 Security3 Hiding useful information.

11 / 27

Page 13: Biometric Security Through Visual Encryption for Fog Edge ......Biometric Security Through Visual Encryption for Fog Edge Computing Watermarking Zero Watermarking Sometimes data can

Biometric Security Through Visual Encryption for Fog Edge Computing

Watermarking

Watermarking

It is the process of creating a invisible tag for certain data.

1 Copyrights

2 Security3 Hiding useful information.

11 / 27

Page 14: Biometric Security Through Visual Encryption for Fog Edge ......Biometric Security Through Visual Encryption for Fog Edge Computing Watermarking Zero Watermarking Sometimes data can

Biometric Security Through Visual Encryption for Fog Edge Computing

Watermarking

Watermarking

It is the process of creating a invisible tag for certain data.

1 Copyrights2 Security

3 Hiding useful information.

11 / 27

Page 15: Biometric Security Through Visual Encryption for Fog Edge ......Biometric Security Through Visual Encryption for Fog Edge Computing Watermarking Zero Watermarking Sometimes data can

Biometric Security Through Visual Encryption for Fog Edge Computing

Watermarking

Watermarking

It is the process of creating a invisible tag for certain data.

1 Copyrights2 Security3 Hiding useful information.

11 / 27

Page 16: Biometric Security Through Visual Encryption for Fog Edge ......Biometric Security Through Visual Encryption for Fog Edge Computing Watermarking Zero Watermarking Sometimes data can

Biometric Security Through Visual Encryption for Fog Edge Computing

Watermarking

Zero Watermarking

Sometimes data can tolerate obvious changes done to it.

Zero watermarking use watermarks that do not obviouslychange the image.

Watermarks can be used in two different ways

1 Embeded in the image.2 Separated from the image.

12 / 27

Page 17: Biometric Security Through Visual Encryption for Fog Edge ......Biometric Security Through Visual Encryption for Fog Edge Computing Watermarking Zero Watermarking Sometimes data can

Biometric Security Through Visual Encryption for Fog Edge Computing

Watermarking

Zero Watermarking

Sometimes data can tolerate obvious changes done to it.

Zero watermarking use watermarks that do not obviouslychange the image.

Watermarks can be used in two different ways

1 Embeded in the image.2 Separated from the image.

12 / 27

Page 18: Biometric Security Through Visual Encryption for Fog Edge ......Biometric Security Through Visual Encryption for Fog Edge Computing Watermarking Zero Watermarking Sometimes data can

Biometric Security Through Visual Encryption for Fog Edge Computing

Watermarking

Zero Watermarking

Sometimes data can tolerate obvious changes done to it.

Zero watermarking use watermarks that do not obviouslychange the image.

Watermarks can be used in two different ways

1 Embeded in the image.2 Separated from the image.

12 / 27

Page 19: Biometric Security Through Visual Encryption for Fog Edge ......Biometric Security Through Visual Encryption for Fog Edge Computing Watermarking Zero Watermarking Sometimes data can

Biometric Security Through Visual Encryption for Fog Edge Computing

Watermarking

Zero Watermarking

Sometimes data can tolerate obvious changes done to it.

Zero watermarking use watermarks that do not obviouslychange the image.

Watermarks can be used in two different ways

1 Embeded in the image.

2 Separated from the image.

12 / 27

Page 20: Biometric Security Through Visual Encryption for Fog Edge ......Biometric Security Through Visual Encryption for Fog Edge Computing Watermarking Zero Watermarking Sometimes data can

Biometric Security Through Visual Encryption for Fog Edge Computing

Watermarking

Zero Watermarking

Sometimes data can tolerate obvious changes done to it.

Zero watermarking use watermarks that do not obviouslychange the image.

Watermarks can be used in two different ways

1 Embeded in the image.2 Separated from the image.

12 / 27

Page 21: Biometric Security Through Visual Encryption for Fog Edge ......Biometric Security Through Visual Encryption for Fog Edge Computing Watermarking Zero Watermarking Sometimes data can

Biometric Security Through Visual Encryption for Fog Edge Computing

Watermarking

Zero watermarking Scheme

13 / 27

Page 22: Biometric Security Through Visual Encryption for Fog Edge ......Biometric Security Through Visual Encryption for Fog Edge Computing Watermarking Zero Watermarking Sometimes data can

Biometric Security Through Visual Encryption for Fog Edge Computing

Watermarking

Zero watermarking Scheme

13 / 27

Page 23: Biometric Security Through Visual Encryption for Fog Edge ......Biometric Security Through Visual Encryption for Fog Edge Computing Watermarking Zero Watermarking Sometimes data can

Biometric Security Through Visual Encryption for Fog Edge Computing

Watermarking

Zero watermarking Scheme

13 / 27

Page 24: Biometric Security Through Visual Encryption for Fog Edge ......Biometric Security Through Visual Encryption for Fog Edge Computing Watermarking Zero Watermarking Sometimes data can

Biometric Security Through Visual Encryption for Fog Edge Computing

Watermarking

Zero watermarking Scheme

13 / 27

Page 25: Biometric Security Through Visual Encryption for Fog Edge ......Biometric Security Through Visual Encryption for Fog Edge Computing Watermarking Zero Watermarking Sometimes data can

Biometric Security Through Visual Encryption for Fog Edge Computing

Watermarking

Zero watermarking Scheme

13 / 27

Page 26: Biometric Security Through Visual Encryption for Fog Edge ......Biometric Security Through Visual Encryption for Fog Edge Computing Watermarking Zero Watermarking Sometimes data can

Biometric Security Through Visual Encryption for Fog Edge Computing

Watermarking

Zero watermarking Scheme

13 / 27

Page 27: Biometric Security Through Visual Encryption for Fog Edge ......Biometric Security Through Visual Encryption for Fog Edge Computing Watermarking Zero Watermarking Sometimes data can

Biometric Security Through Visual Encryption for Fog Edge Computing

Watermarking

Zero watermarking Scheme

13 / 27

Page 28: Biometric Security Through Visual Encryption for Fog Edge ......Biometric Security Through Visual Encryption for Fog Edge Computing Watermarking Zero Watermarking Sometimes data can

Biometric Security Through Visual Encryption for Fog Edge Computing

Encryption

Gray scale image structure

14 / 27

Page 29: Biometric Security Through Visual Encryption for Fog Edge ......Biometric Security Through Visual Encryption for Fog Edge Computing Watermarking Zero Watermarking Sometimes data can

Biometric Security Through Visual Encryption for Fog Edge Computing

Encryption

Gray scale image structure

15 / 27

Page 30: Biometric Security Through Visual Encryption for Fog Edge ......Biometric Security Through Visual Encryption for Fog Edge Computing Watermarking Zero Watermarking Sometimes data can

Biometric Security Through Visual Encryption for Fog Edge Computing

Encryption

Gray scale image structure

16 / 27

Page 31: Biometric Security Through Visual Encryption for Fog Edge ......Biometric Security Through Visual Encryption for Fog Edge Computing Watermarking Zero Watermarking Sometimes data can

Biometric Security Through Visual Encryption for Fog Edge Computing

Encryption

Converting to gray-scale

Retrieving bit planes

A pixel will be positioned at positions ( j , j , : )Same dimensions as original image

17 / 27

Page 32: Biometric Security Through Visual Encryption for Fog Edge ......Biometric Security Through Visual Encryption for Fog Edge Computing Watermarking Zero Watermarking Sometimes data can

Biometric Security Through Visual Encryption for Fog Edge Computing

Encryption

Generating the secret shares

(n) by (n-2) G matrix(n) by (n) identity H matrix(n) by (2n-2) GH concatenated matrixGH’: Complement of GH

18 / 27

Page 33: Biometric Security Through Visual Encryption for Fog Edge ......Biometric Security Through Visual Encryption for Fog Edge Computing Watermarking Zero Watermarking Sometimes data can

Biometric Security Through Visual Encryption for Fog Edge Computing

Encryption

Encryption Matrices

19 / 27

Page 34: Biometric Security Through Visual Encryption for Fog Edge ......Biometric Security Through Visual Encryption for Fog Edge Computing Watermarking Zero Watermarking Sometimes data can

Biometric Security Through Visual Encryption for Fog Edge Computing

Encryption

Secret key retrieval

y = b +

⌊(a− b) × x s −min(x s)

max(x s) −min(x s)

⌋(1)

a = 1

b = n + (n − 2)

x s is the sub-sequence containing n+(n-2) values

20 / 27

Page 35: Biometric Security Through Visual Encryption for Fog Edge ......Biometric Security Through Visual Encryption for Fog Edge Computing Watermarking Zero Watermarking Sometimes data can

Biometric Security Through Visual Encryption for Fog Edge Computing

Encryption

Secret key retrieval

y = b +

⌊(a− b) × x s −min(x s)

max(x s) −min(x s)

⌋(1)

a = 1

b = n + (n − 2)

x s is the sub-sequence containing n+(n-2) values

20 / 27

Page 36: Biometric Security Through Visual Encryption for Fog Edge ......Biometric Security Through Visual Encryption for Fog Edge Computing Watermarking Zero Watermarking Sometimes data can

Biometric Security Through Visual Encryption for Fog Edge Computing

Encryption

Secret key retrieval

y = b +

⌊(a− b) × x s −min(x s)

max(x s) −min(x s)

⌋(1)

a = 1

b = n + (n − 2)

x s is the sub-sequence containing n+(n-2) values

20 / 27

Page 37: Biometric Security Through Visual Encryption for Fog Edge ......Biometric Security Through Visual Encryption for Fog Edge Computing Watermarking Zero Watermarking Sometimes data can

Biometric Security Through Visual Encryption for Fog Edge Computing

Encryption

Secret key retrieval

y = b +

⌊(a− b) × x s −min(x s)

max(x s) −min(x s)

⌋(1)

a = 1

b = n + (n − 2)

x s is the sub-sequence containing n+(n-2) values

20 / 27

Page 38: Biometric Security Through Visual Encryption for Fog Edge ......Biometric Security Through Visual Encryption for Fog Edge Computing Watermarking Zero Watermarking Sometimes data can

Biometric Security Through Visual Encryption for Fog Edge Computing

Encryption

Encryption process

21 / 27

Page 39: Biometric Security Through Visual Encryption for Fog Edge ......Biometric Security Through Visual Encryption for Fog Edge Computing Watermarking Zero Watermarking Sometimes data can

Biometric Security Through Visual Encryption for Fog Edge Computing

Encryption

Encryption process

21 / 27

Page 40: Biometric Security Through Visual Encryption for Fog Edge ......Biometric Security Through Visual Encryption for Fog Edge Computing Watermarking Zero Watermarking Sometimes data can

Biometric Security Through Visual Encryption for Fog Edge Computing

Encryption

Encryption process

21 / 27

Page 41: Biometric Security Through Visual Encryption for Fog Edge ......Biometric Security Through Visual Encryption for Fog Edge Computing Watermarking Zero Watermarking Sometimes data can

Biometric Security Through Visual Encryption for Fog Edge Computing

Encryption

Encryption process

21 / 27

Page 42: Biometric Security Through Visual Encryption for Fog Edge ......Biometric Security Through Visual Encryption for Fog Edge Computing Watermarking Zero Watermarking Sometimes data can

Biometric Security Through Visual Encryption for Fog Edge Computing

Decryption

Decryption Process

22 / 27

Page 43: Biometric Security Through Visual Encryption for Fog Edge ......Biometric Security Through Visual Encryption for Fog Edge Computing Watermarking Zero Watermarking Sometimes data can

Biometric Security Through Visual Encryption for Fog Edge Computing

Decryption

Decryption Process

22 / 27

Page 44: Biometric Security Through Visual Encryption for Fog Edge ......Biometric Security Through Visual Encryption for Fog Edge Computing Watermarking Zero Watermarking Sometimes data can

Biometric Security Through Visual Encryption for Fog Edge Computing

Decryption

Decryption Process

22 / 27

Page 45: Biometric Security Through Visual Encryption for Fog Edge ......Biometric Security Through Visual Encryption for Fog Edge Computing Watermarking Zero Watermarking Sometimes data can

Biometric Security Through Visual Encryption for Fog Edge Computing

Decryption

Decryption Process

22 / 27

Page 46: Biometric Security Through Visual Encryption for Fog Edge ......Biometric Security Through Visual Encryption for Fog Edge Computing Watermarking Zero Watermarking Sometimes data can

Biometric Security Through Visual Encryption for Fog Edge Computing

Decryption

Decryption Process

22 / 27

Page 47: Biometric Security Through Visual Encryption for Fog Edge ......Biometric Security Through Visual Encryption for Fog Edge Computing Watermarking Zero Watermarking Sometimes data can

Biometric Security Through Visual Encryption for Fog Edge Computing

Decryption

Decryption Process

Needed elements

n secret sharesSecret key

Matrix for each bit

Arrange matrix

Decide 0 or 1

23 / 27

Page 48: Biometric Security Through Visual Encryption for Fog Edge ......Biometric Security Through Visual Encryption for Fog Edge Computing Watermarking Zero Watermarking Sometimes data can

Biometric Security Through Visual Encryption for Fog Edge Computing

Decryption

Decryption Process

Needed elements

n secret sharesSecret key

Matrix for each bit

Arrange matrix

Decide 0 or 1

23 / 27

Page 49: Biometric Security Through Visual Encryption for Fog Edge ......Biometric Security Through Visual Encryption for Fog Edge Computing Watermarking Zero Watermarking Sometimes data can

Biometric Security Through Visual Encryption for Fog Edge Computing

Decryption

Decryption Process

Needed elements

n secret sharesSecret key

Matrix for each bit

Arrange matrix

Decide 0 or 1

23 / 27

Page 50: Biometric Security Through Visual Encryption for Fog Edge ......Biometric Security Through Visual Encryption for Fog Edge Computing Watermarking Zero Watermarking Sometimes data can

Biometric Security Through Visual Encryption for Fog Edge Computing

Decryption

Decryption Process

Needed elements

n secret sharesSecret key

Matrix for each bit

Arrange matrix

Decide 0 or 1

23 / 27

Page 51: Biometric Security Through Visual Encryption for Fog Edge ......Biometric Security Through Visual Encryption for Fog Edge Computing Watermarking Zero Watermarking Sometimes data can

Biometric Security Through Visual Encryption for Fog Edge Computing

Decryption

Image Reconstruction

24 / 27

Page 52: Biometric Security Through Visual Encryption for Fog Edge ......Biometric Security Through Visual Encryption for Fog Edge Computing Watermarking Zero Watermarking Sometimes data can

Biometric Security Through Visual Encryption for Fog Edge Computing

Decryption

Image Reconstruction

24 / 27

Page 53: Biometric Security Through Visual Encryption for Fog Edge ......Biometric Security Through Visual Encryption for Fog Edge Computing Watermarking Zero Watermarking Sometimes data can

Biometric Security Through Visual Encryption for Fog Edge Computing

Decryption

Image Reconstruction

24 / 27

Page 54: Biometric Security Through Visual Encryption for Fog Edge ......Biometric Security Through Visual Encryption for Fog Edge Computing Watermarking Zero Watermarking Sometimes data can

Biometric Security Through Visual Encryption for Fog Edge Computing

Decryption

Image Reconstruction

24 / 27

Page 55: Biometric Security Through Visual Encryption for Fog Edge ......Biometric Security Through Visual Encryption for Fog Edge Computing Watermarking Zero Watermarking Sometimes data can

Biometric Security Through Visual Encryption for Fog Edge Computing

Decryption

Image Reconstruction

24 / 27

Page 56: Biometric Security Through Visual Encryption for Fog Edge ......Biometric Security Through Visual Encryption for Fog Edge Computing Watermarking Zero Watermarking Sometimes data can

Biometric Security Through Visual Encryption for Fog Edge Computing

Decryption

Image Reconstruction

24 / 27

Page 57: Biometric Security Through Visual Encryption for Fog Edge ......Biometric Security Through Visual Encryption for Fog Edge Computing Watermarking Zero Watermarking Sometimes data can

Biometric Security Through Visual Encryption for Fog Edge Computing

Decryption

Image Reconstruction

24 / 27

Page 58: Biometric Security Through Visual Encryption for Fog Edge ......Biometric Security Through Visual Encryption for Fog Edge Computing Watermarking Zero Watermarking Sometimes data can

Biometric Security Through Visual Encryption for Fog Edge Computing

Decryption

Image Reconstruction

24 / 27

Page 59: Biometric Security Through Visual Encryption for Fog Edge ......Biometric Security Through Visual Encryption for Fog Edge Computing Watermarking Zero Watermarking Sometimes data can

Biometric Security Through Visual Encryption for Fog Edge Computing

Decryption

Original, Watermarked, Decrypted Images

25 / 27

Page 60: Biometric Security Through Visual Encryption for Fog Edge ......Biometric Security Through Visual Encryption for Fog Edge Computing Watermarking Zero Watermarking Sometimes data can

Biometric Security Through Visual Encryption for Fog Edge Computing

Decryption

Original, Watermarked, Decrypted Images

25 / 27

Page 61: Biometric Security Through Visual Encryption for Fog Edge ......Biometric Security Through Visual Encryption for Fog Edge Computing Watermarking Zero Watermarking Sometimes data can

Biometric Security Through Visual Encryption for Fog Edge Computing

Decryption

Original, Watermarked, Decrypted Images

25 / 27

Page 62: Biometric Security Through Visual Encryption for Fog Edge ......Biometric Security Through Visual Encryption for Fog Edge Computing Watermarking Zero Watermarking Sometimes data can

Biometric Security Through Visual Encryption for Fog Edge Computing

Conclusion

Conclusion

Edge computing and security

Zero watermarking and copyright protection

Encryption and decryption processes

Visual quality of image unchanged

26 / 27

Page 63: Biometric Security Through Visual Encryption for Fog Edge ......Biometric Security Through Visual Encryption for Fog Edge Computing Watermarking Zero Watermarking Sometimes data can

Biometric Security Through Visual Encryption for Fog Edge Computing

Conclusion

Conclusion

Edge computing and security

Zero watermarking and copyright protection

Encryption and decryption processes

Visual quality of image unchanged

26 / 27

Page 64: Biometric Security Through Visual Encryption for Fog Edge ......Biometric Security Through Visual Encryption for Fog Edge Computing Watermarking Zero Watermarking Sometimes data can

Biometric Security Through Visual Encryption for Fog Edge Computing

Conclusion

Conclusion

Edge computing and security

Zero watermarking and copyright protection

Encryption and decryption processes

Visual quality of image unchanged

26 / 27

Page 65: Biometric Security Through Visual Encryption for Fog Edge ......Biometric Security Through Visual Encryption for Fog Edge Computing Watermarking Zero Watermarking Sometimes data can

Biometric Security Through Visual Encryption for Fog Edge Computing

Conclusion

Conclusion

Edge computing and security

Zero watermarking and copyright protection

Encryption and decryption processes

Visual quality of image unchanged

26 / 27

Page 66: Biometric Security Through Visual Encryption for Fog Edge ......Biometric Security Through Visual Encryption for Fog Edge Computing Watermarking Zero Watermarking Sometimes data can

Biometric Security Through Visual Encryption for Fog Edge Computing

Conclusion

Conclusion

Any Questions ?!

27 / 27