secure mm processing over cloud - albanypatrey/ppts/secure_multimedia_processing_over_cloud.pdf ·...

60
Secure Multimedia Processing over Cloud Pradeep K. Atrey University of Winnipeg, Canada [email protected] www.acs.uwinnipeg.ca/pkatrey/ 1

Upload: others

Post on 23-May-2020

1 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Secure MM Processing over Cloud - Albanypatrey/ppts/Secure_Multimedia_Processing_over_Cloud.pdf · Secure Processing over Cloud Introduction and Motivation Smoking is not ... Perceptual

Secure Multimedia

Processing over Cloud

Pradeep K. Atrey

University of Winnipeg, Canada

[email protected]

www.acs.uwinnipeg.ca/pkatrey/

1

Page 2: Secure MM Processing over Cloud - Albanypatrey/ppts/Secure_Multimedia_Processing_over_Cloud.pdf · Secure Processing over Cloud Introduction and Motivation Smoking is not ... Perceptual

Winnipeg

2

Page 3: Secure MM Processing over Cloud - Albanypatrey/ppts/Secure_Multimedia_Processing_over_Cloud.pdf · Secure Processing over Cloud Introduction and Motivation Smoking is not ... Perceptual

Winnipeg Summer

3

Page 4: Secure MM Processing over Cloud - Albanypatrey/ppts/Secure_Multimedia_Processing_over_Cloud.pdf · Secure Processing over Cloud Introduction and Motivation Smoking is not ... Perceptual

Winnipeg Winter

4

Page 5: Secure MM Processing over Cloud - Albanypatrey/ppts/Secure_Multimedia_Processing_over_Cloud.pdf · Secure Processing over Cloud Introduction and Motivation Smoking is not ... Perceptual

Acknowledgement

• This research is partly supported by

5

Page 6: Secure MM Processing over Cloud - Albanypatrey/ppts/Secure_Multimedia_Processing_over_Cloud.pdf · Secure Processing over Cloud Introduction and Motivation Smoking is not ... Perceptual

Other Contributors

6

Manoranjan

Mohanty

Wei Tsang

OoiAnkita Lathey Nishant Joshi

Page 7: Secure MM Processing over Cloud - Albanypatrey/ppts/Secure_Multimedia_Processing_over_Cloud.pdf · Secure Processing over Cloud Introduction and Motivation Smoking is not ... Perceptual

Cloud-based Multimedia Computing

• Very popular these days

• Companies Offering 2D Imaging

Introduction and Motivation

2D Imaging

– AT&T, Dell, Intel etc.

• Companies Offering 3D Imaging

– Microsoft, KDDI, SinhaSystems etc.

Image source:

http://www.msimaging.com/Content/themes/MSI/im

ages/cloud-based-software-image-silo-cloud-file.jpg

7

Page 8: Secure MM Processing over Cloud - Albanypatrey/ppts/Secure_Multimedia_Processing_over_Cloud.pdf · Secure Processing over Cloud Introduction and Motivation Smoking is not ... Perceptual

Cloud-based Multimedia Storage and Processing

Introduction and Motivation

8

2D Image Visualization

Image Capture

Server

Image Display

Client

Network

Image Storage

and Processing

Datacenter

Network

Page 9: Secure MM Processing over Cloud - Albanypatrey/ppts/Secure_Multimedia_Processing_over_Cloud.pdf · Secure Processing over Cloud Introduction and Motivation Smoking is not ... Perceptual

Cloud-based Multimedia Storage and Processing

Introduction and Motivation

9

Capturing and

Preprocessing

Server

Image Display

Client

Data-to-image

Conversion

Datacenter

3D Image Visualization

Network Network

Page 10: Secure MM Processing over Cloud - Albanypatrey/ppts/Secure_Multimedia_Processing_over_Cloud.pdf · Secure Processing over Cloud Introduction and Motivation Smoking is not ... Perceptual

Cloud-based Multimedia Storage and Processing

Introduction and Motivation

10

Capturing and

Preprocessing

Server

Image Display

Client

Quality

enhancement

Datacenter

Surveillance Video Quality Enhancement

Network Network

Page 11: Secure MM Processing over Cloud - Albanypatrey/ppts/Secure_Multimedia_Processing_over_Cloud.pdf · Secure Processing over Cloud Introduction and Motivation Smoking is not ... Perceptual

Cloud-based Multimedia Storage and Processing

Introduction and Motivation

11

Capturing and

Preprocessing

Server

Image Display

Client

Zooming

Datacenter

Image Zooming and Cropping

Network Network

Page 12: Secure MM Processing over Cloud - Albanypatrey/ppts/Secure_Multimedia_Processing_over_Cloud.pdf · Secure Processing over Cloud Introduction and Motivation Smoking is not ... Perceptual

Security and Privacy Challenges in Cloud-based Storage and Processing

• How many of you

mind if your medical

image is available to

an adversary?

Introduction and Motivation

• What can an

adversary do with an

image?

Image source: http://greenberg-art.com/.Toons/

Toons,%20social/ qqxsgMedical%20privacy.gif

12

Page 13: Secure MM Processing over Cloud - Albanypatrey/ppts/Secure_Multimedia_Processing_over_Cloud.pdf · Secure Processing over Cloud Introduction and Motivation Smoking is not ... Perceptual

Rest of the talk

• Introduction and Motivation

• Addressing the Challenges

– Finding a Cryptosystem

– Using Real Numbers in a Cryptosystem

Three Frameworks• Three Frameworks

– Secure Cloud-based Image Scaling/Cropping

– Secure Cloud-based Pre-classification Volume Ray-casting

– Secure Cloud-based Surveillance Video Enhancement

• Conclusions

13

Page 14: Secure MM Processing over Cloud - Albanypatrey/ppts/Secure_Multimedia_Processing_over_Cloud.pdf · Secure Processing over Cloud Introduction and Motivation Smoking is not ... Perceptual

Security and Privacy Challenges: Secure Storage over Cloud

Addressing the Challenges

Smoking is not

good for health

14

Capturing and

Preprocessing

Server

Image Display

Client

Storage

Datacenter

Network Network

Encryption techniques – Watermarking – Secret sharing

Page 15: Secure MM Processing over Cloud - Albanypatrey/ppts/Secure_Multimedia_Processing_over_Cloud.pdf · Secure Processing over Cloud Introduction and Motivation Smoking is not ... Perceptual

Security and Privacy Challenges: Insecure Processing over Cloud

Addressing the Challenges

Smoking is not

good for health

15

Capturing and

Preprocessing

Server

Image Display

Client

Zooming

Datacenter

Image Zooming and Cropping on Original Data

Network Network

Page 16: Secure MM Processing over Cloud - Albanypatrey/ppts/Secure_Multimedia_Processing_over_Cloud.pdf · Secure Processing over Cloud Introduction and Motivation Smoking is not ... Perceptual

Security and Privacy Challenges: Secure Processing over Cloud

Introduction and Motivation

Smoking is not

good for health Still to be addressed

16

Capturing and

Preprocessing

Server

Image Display

Client

Zooming

Datacenter

Image Zooming and Cropping on Encrypted Data

Network Network

Page 17: Secure MM Processing over Cloud - Albanypatrey/ppts/Secure_Multimedia_Processing_over_Cloud.pdf · Secure Processing over Cloud Introduction and Motivation Smoking is not ... Perceptual

• Confidentiality

• Integrity

• Availability

Our Objective: Secure Cloud-based Multimedia Processing

Addressing the Challenges

17

• Availability

• PrivacySmoking is not

good for health

Page 18: Secure MM Processing over Cloud - Albanypatrey/ppts/Secure_Multimedia_Processing_over_Cloud.pdf · Secure Processing over Cloud Introduction and Motivation Smoking is not ... Perceptual

• Confidentiality

• Integrity

• Availability

Our Objective: Secure Cloud-based Multimedia Processing

Addressing the Challenges

18

• Availability

• Privacy

• Computational Efficiency

• Bandwidth Efficiency

• High Quality Image

Smoking is not

good for health

Page 19: Secure MM Processing over Cloud - Albanypatrey/ppts/Secure_Multimedia_Processing_over_Cloud.pdf · Secure Processing over Cloud Introduction and Motivation Smoking is not ... Perceptual

• Finding a Cryptosystem

− Fully homomorphic cryptosystem is not practical

E(A) + E(B) = E(A+B)

− Somewhat homomorphic cryptosystem cannot hide

Technical Challenges

Addressing the Challenges

19

− Somewhat homomorphic cryptosystem cannot hide

all information

Page 20: Secure MM Processing over Cloud - Albanypatrey/ppts/Secure_Multimedia_Processing_over_Cloud.pdf · Secure Processing over Cloud Introduction and Motivation Smoking is not ... Perceptual

• Finding a Cryptosystem

− Fully homomorphic cryptosystem is not practical

E(A) + E(B) = E(A+B)

− Somewhat homomorphic cryptosystem cannot hide all information

Technical Challenges

Addressing the Challenges

20

all information

• Using Real Numbers in a Cryptosystem

− Modular prime operation of a cryptosystem is not compatible with real number operations of a data/image processing algorithm

Page 21: Secure MM Processing over Cloud - Albanypatrey/ppts/Secure_Multimedia_Processing_over_Cloud.pdf · Secure Processing over Cloud Introduction and Motivation Smoking is not ... Perceptual

Rest of the talk• Introduction

• Addressing the Challenges

– Finding a Cryptosystem

– Using Real Numbers in a Cryptosystem

• Three Frameworks• Three Frameworks

– Secure Cloud-based Image Scaling/Cropping

– Secure Cloud-based Pre-classification Volume Ray-

casting

– Secure Cloud-based Surveillance Video Quality

Enhancement

• Conclusions

21

Page 22: Secure MM Processing over Cloud - Albanypatrey/ppts/Secure_Multimedia_Processing_over_Cloud.pdf · Secure Processing over Cloud Introduction and Motivation Smoking is not ... Perceptual

• Key Observations

− Shamir’s (k,n) Secret Sharing (SSS)

or (l,k,n) Multi-Secret Sharing (MSS)

can be used as principal

cryptosystem

Finding a CryptosystemAddressing the Challenges: Finding a Cryptosystem

22

cryptosystem

− Other cryptosystems can be used

to support operations that are not

supported by SSS and MSS

Page 23: Secure MM Processing over Cloud - Albanypatrey/ppts/Secure_Multimedia_Processing_over_Cloud.pdf · Secure Processing over Cloud Introduction and Motivation Smoking is not ... Perceptual

• Review of (k, n) SSS

Finding a CryptosystemAddressing the Challenges: Finding a Cryptosystem

2323

Secret Random

Number

Prime

Number

Page 24: Secure MM Processing over Cloud - Albanypatrey/ppts/Secure_Multimedia_Processing_over_Cloud.pdf · Secure Processing over Cloud Introduction and Motivation Smoking is not ... Perceptual

• Review of (k, n) SSS

Finding a CryptosystemAddressing the Challenges: Finding a Cryptosystem

2424

Page 25: Secure MM Processing over Cloud - Albanypatrey/ppts/Secure_Multimedia_Processing_over_Cloud.pdf · Secure Processing over Cloud Introduction and Motivation Smoking is not ... Perceptual

• Review of (l, k, n) MSS

Finding a CryptosystemAddressing the Challenges: Finding a Cryptosystem

2525

Page 26: Secure MM Processing over Cloud - Albanypatrey/ppts/Secure_Multimedia_Processing_over_Cloud.pdf · Secure Processing over Cloud Introduction and Motivation Smoking is not ... Perceptual

Rest of the talk• Introduction

• Addressing the Challenges

– Finding a Cryptosystem

– Using Real Numbers in a Cryptosystem

• Three Frameworks• Three Frameworks

– Secure Cloud-based Image Scaling/Cropping

– Secure Cloud-based Pre-classification Volume Ray-casting

– Secure Cloud-based Surveillance Video Quality Enhancement

• Conclusions26

Page 27: Secure MM Processing over Cloud - Albanypatrey/ppts/Secure_Multimedia_Processing_over_Cloud.pdf · Secure Processing over Cloud Introduction and Motivation Smoking is not ... Perceptual

• Excluding Modular Prime Operation from

the Cryptosystem

− Example: Shamir’s secret sharing

Using Real Numbers in a Cryptosystem

Addressing the Challenges: Using Real Numbers

27

F(xi) is:

With mod q: 1/q

Without mod q: INT(xi / F(xi))

Page 28: Secure MM Processing over Cloud - Albanypatrey/ppts/Secure_Multimedia_Processing_over_Cloud.pdf · Secure Processing over Cloud Introduction and Motivation Smoking is not ... Perceptual

• Modifying Real number to an Integer

− R(S,d) = round(S,d) × 10d

Using Real Numbers in a Cryptosystem

Integer

Addressing the Challenges: Using Real Numbers

28

Integer

Representative

Page 29: Secure MM Processing over Cloud - Albanypatrey/ppts/Secure_Multimedia_Processing_over_Cloud.pdf · Secure Processing over Cloud Introduction and Motivation Smoking is not ... Perceptual

• Modifying Real number to an Integer

− R(S,d) = round(S,d) × 10d

Using Real Numbers in a Cryptosystem

Integer

Addressing the Challenges: Using Real Numbers

29

Integer

Representative

Page 30: Secure MM Processing over Cloud - Albanypatrey/ppts/Secure_Multimedia_Processing_over_Cloud.pdf · Secure Processing over Cloud Introduction and Motivation Smoking is not ... Perceptual

Rest of the talk• Introduction and Motivation

• Addressing the Challenges

– Finding a Cryptosystem

– Using Real Numbers in a Cryptosystem

• Three Frameworks•– Secure Cloud-based Image Scaling/Cropping

– Secure Cloud-based Pre-classification Volume Ray-casting

– Secure Cloud-based Surveillance Video Enhancement

• Conclusions

30

Page 31: Secure MM Processing over Cloud - Albanypatrey/ppts/Secure_Multimedia_Processing_over_Cloud.pdf · Secure Processing over Cloud Introduction and Motivation Smoking is not ... Perceptual

Secure Cloud-based Image Scaling/Cropping

• Why scaling/cropping in data centers?– Streaming a large image

• Downloading a large image (e.g. histopathology image that can be 40 GB in size 80000 × 80000 in dimension) is not feasible

– Previewing an image before viewing

First framework: Scaling /Cropping

– Previewing an image before viewing

• Why dynamic scaling/cropping on shadow (or hidden) images?– Pre-cropping required additional data to be sent

– Pre-scaling cannot ensure step-less zooming

M. Mohanty, W.-T. Ooi and P. K. Atrey. Scale me, crop me, know me not: Supporting scaling and cropping in secret image sharing. IEEE International Conference on Multimedia and Expo (ICME'2013), July 15-19, 2013, San Jose, CA, USA.

31

Page 32: Secure MM Processing over Cloud - Albanypatrey/ppts/Secure_Multimedia_Processing_over_Cloud.pdf · Secure Processing over Cloud Introduction and Motivation Smoking is not ... Perceptual

Secure Cloud-based Image Scaling/Cropping

• Architecture and Workflow

Scaling /Cropping Framework

32

Page 33: Secure MM Processing over Cloud - Albanypatrey/ppts/Secure_Multimedia_Processing_over_Cloud.pdf · Secure Processing over Cloud Introduction and Motivation Smoking is not ... Perceptual

• Proposed Secret Image Sharing Scheme

– Inter-pixel correlation is hidden by using a set

of random numbers as coefficient in the secret

sharing polynomial

Secure Cloud-based Image Scaling/Cropping

Scaling /Cropping Framework

33

sharing polynomial

− (3,k,n) MSS

Page 34: Secure MM Processing over Cloud - Albanypatrey/ppts/Secure_Multimedia_Processing_over_Cloud.pdf · Secure Processing over Cloud Introduction and Motivation Smoking is not ... Perceptual

Secure Cloud-based Image Scaling/Cropping

• Experiments

Scaling /Cropping Framework

34

Page 35: Secure MM Processing over Cloud - Albanypatrey/ppts/Secure_Multimedia_Processing_over_Cloud.pdf · Secure Processing over Cloud Introduction and Motivation Smoking is not ... Perceptual

Secure Cloud-based Image Scaling/Cropping

• Results: Scaling

Scaling /Cropping Framework

35

Required Zoomed Shadow

Image

Recovered Zoomed

Image

Page 36: Secure MM Processing over Cloud - Albanypatrey/ppts/Secure_Multimedia_Processing_over_Cloud.pdf · Secure Processing over Cloud Introduction and Motivation Smoking is not ... Perceptual

Secure Cloud-based Image Scaling/Cropping

• Results: Cropping

Scaling /Cropping Framework

36

Required Cropped Shadow

Image

Recovered Cropped

Image

Page 37: Secure MM Processing over Cloud - Albanypatrey/ppts/Secure_Multimedia_Processing_over_Cloud.pdf · Secure Processing over Cloud Introduction and Motivation Smoking is not ... Perceptual

• Security Analysis

− Confidentiality

�Perceptual security

�Multi-secret sharing is not perfectly secure

Secure Cloud-based Image Scaling/Cropping

Scaling /Cropping Framework

37

�Multi-secret sharing is not perfectly secure

Page 38: Secure MM Processing over Cloud - Albanypatrey/ppts/Secure_Multimedia_Processing_over_Cloud.pdf · Secure Processing over Cloud Introduction and Motivation Smoking is not ... Perceptual

• Security Analysis

Secure Cloud-based Image Scaling/Cropping

Scaling /Cropping Framework

38

Corrupted shadow image(s) implies different reconstructed images

Page 39: Secure MM Processing over Cloud - Albanypatrey/ppts/Secure_Multimedia_Processing_over_Cloud.pdf · Secure Processing over Cloud Introduction and Motivation Smoking is not ... Perceptual

• Performance Analysis

Secure Cloud-based Image Scaling/Cropping

Scaling /Cropping Framework

39

Page 40: Secure MM Processing over Cloud - Albanypatrey/ppts/Secure_Multimedia_Processing_over_Cloud.pdf · Secure Processing over Cloud Introduction and Motivation Smoking is not ... Perceptual

Rest of the talk• Introduction

• Addressing the Challenges

– Finding a Cryptosystem

– Using Real Numbers in a Cryptosystem

• Three Frameworks•– Secure Cloud-based Image Scaling/Cropping

– Secure Cloud-based Pre-classification Volume Ray-casting

– Secure Cloud-based Surveillance Video Enhancement

• Conclusions

40

Page 41: Secure MM Processing over Cloud - Albanypatrey/ppts/Secure_Multimedia_Processing_over_Cloud.pdf · Secure Processing over Cloud Introduction and Motivation Smoking is not ... Perceptual

• Architecture and Workflow

Secure Cloud-based Pre-classification Volume Ray-casting

Volume Ray-casting Framework

41

M. Mohanty, P. K. Atrey and W.-T. Ooi. Secure cloud-based medical data visualization. The ACM

International Conference on Multimedia (ACMMM'12), October 29-November 2, 2012, Nara, Japan.

Page 42: Secure MM Processing over Cloud - Albanypatrey/ppts/Secure_Multimedia_Processing_over_Cloud.pdf · Secure Processing over Cloud Introduction and Motivation Smoking is not ... Perceptual

• Review: Pre-classification Volume Ray-casting

Secure Cloud-based Pre-classification Volume Ray-casting

Gradient and Normal Estimation

Volume Ray-casting Framework

42

Classification and Shading

Ray Projection

Interpolation

Composition

Page 43: Secure MM Processing over Cloud - Albanypatrey/ppts/Secure_Multimedia_Processing_over_Cloud.pdf · Secure Processing over Cloud Introduction and Motivation Smoking is not ... Perceptual

• Review: Pre-classification Volume Ray-casting

Secure Cloud-based Pre-classification Volume Ray-casting

Gradient and Normal Estimation Pre ray-

projection: Can

be preprocessed

Volume Ray-casting Framework

43

Classification and Shading

Ray Projection

Interpolation

Composition

be preprocessed

Page 44: Secure MM Processing over Cloud - Albanypatrey/ppts/Secure_Multimedia_Processing_over_Cloud.pdf · Secure Processing over Cloud Introduction and Motivation Smoking is not ... Perceptual

• Review: Pre-classification Volume Ray-casting

Secure Cloud-based Pre-classification Volume Ray-casting

Gradient and Normal Estimation Pre ray-

projection: Can

be preprocessed

Volume Ray-casting Framework

44

Classification and Shading

Ray Projection

Interpolation

Composition

be preprocessed

Post ray-

projection: To be

performed by

datacenters

Page 45: Secure MM Processing over Cloud - Albanypatrey/ppts/Secure_Multimedia_Processing_over_Cloud.pdf · Secure Processing over Cloud Introduction and Motivation Smoking is not ... Perceptual

• Securing Post Ray-projection

− Hiding computation on colors

Secure Cloud-based Pre-classification Volume Ray-casting

Volume Ray-casting Framework

45

Original Hidden Color

Not hiding computation on opacities

Page 46: Secure MM Processing over Cloud - Albanypatrey/ppts/Secure_Multimedia_Processing_over_Cloud.pdf · Secure Processing over Cloud Introduction and Motivation Smoking is not ... Perceptual

Secure Cloud-based Pre-classification Volume Ray-casting

• Experiment

– Server, Datacenters, and Client are simulated in a

PC

– Customized VTK 5.8.0

Volume Ray-casting Framework

46

� Pre-classification volume ray-casting

� Integrated (3,5) Secret Sharing

Page 47: Secure MM Processing over Cloud - Albanypatrey/ppts/Secure_Multimedia_Processing_over_Cloud.pdf · Secure Processing over Cloud Introduction and Motivation Smoking is not ... Perceptual

Secure Cloud-based Pre-classification Volume Ray-casting

• Data SetDimension Size

Head 256 X 256 X 124 7.8 MB

Volume Ray-casting Framework

ICACCI'13 Keynote, Mysore, India - August

23, 201347

Foot 256 X 256 X 256 16 MB

Iron port 68 X 68 X 68 307.3 KB

Bucky 32 x 32 X 32 32.2 KB

Page 48: Secure MM Processing over Cloud - Albanypatrey/ppts/Secure_Multimedia_Processing_over_Cloud.pdf · Secure Processing over Cloud Introduction and Motivation Smoking is not ... Perceptual

Secure Cloud-based Pre-classification Volume Ray-casting

• Results: Single View Point

Share 1

Volume Ray-casting Framework

48

Share 1

Share 2

Share 5

RecoveredOriginal

Page 49: Secure MM Processing over Cloud - Albanypatrey/ppts/Secure_Multimedia_Processing_over_Cloud.pdf · Secure Processing over Cloud Introduction and Motivation Smoking is not ... Perceptual

Secure Cloud-based Pre-classification Volume Ray-casting

• Results: Single View Point

Share Original

Volume Ray-casting Framework

49

Original Share

Original Share

Page 50: Secure MM Processing over Cloud - Albanypatrey/ppts/Secure_Multimedia_Processing_over_Cloud.pdf · Secure Processing over Cloud Introduction and Motivation Smoking is not ... Perceptual

Secure Cloud-based Pre-classification Volume Ray-casting

• Results: Multiple View Point

Share Original

Volume Ray-casting Framework

50

Original Share

Original Share

Page 51: Secure MM Processing over Cloud - Albanypatrey/ppts/Secure_Multimedia_Processing_over_Cloud.pdf · Secure Processing over Cloud Introduction and Motivation Smoking is not ... Perceptual

Secure Cloud-based Pre-classification Volume Ray-casting

Head MRI volume data

Volume Ray-casting Framework

51

Foot volume data

Page 52: Secure MM Processing over Cloud - Albanypatrey/ppts/Secure_Multimedia_Processing_over_Cloud.pdf · Secure Processing over Cloud Introduction and Motivation Smoking is not ... Perceptual

Rest of the talk• Introduction

• Addressing the Challenges

– Finding a Cryptosystem

– Using Real Numbers in a Cryptosystem

• Three Frameworks•– Secure Cloud-based Image Scaling/Cropping

– Secure Cloud-based Pre-classification Volume Ray-casting

– Secure Cloud-based Surveillance Video Quality Enhancement

• Conclusions

52

Page 53: Secure MM Processing over Cloud - Albanypatrey/ppts/Secure_Multimedia_Processing_over_Cloud.pdf · Secure Processing over Cloud Introduction and Motivation Smoking is not ... Perceptual

Encrypted-domain Video Quality Enhancement over Cloud

• Architecture and WorkflowMULTIMEDIA

CAPRTURING

DEVICECDC1:

LPF

DISPLAY DEVICESHARE 1

PROCESSED SHARE 1

Video Quality Enhancement Framework

53

SERVER, SPreprocesses

Original Image,

Creates and

Distributes Shares

CDC2:

LPF

CDCN:

LPF

AUTHORIZED

USERObtains any T

Shares and

Reconstructs

Enhanced (LPF)

Image

SHARE 2

SHARE N

PROCESSED SHARE 2

PROCESSED SHARE N

A. Lathey, P. K. Atrey and N. Joshi. Homomorphic low pass filtering on encrypted multimedia over cloud.

IEEE International Conference on Semantic Computing (ICSC'2013), September 2013, Irvine, CA, USA.

Page 54: Secure MM Processing over Cloud - Albanypatrey/ppts/Secure_Multimedia_Processing_over_Cloud.pdf · Secure Processing over Cloud Introduction and Motivation Smoking is not ... Perceptual

THE PROBLEM: Non-terminating averaged value

SOLUTION BASED ON PREVIOUS METHODMultiply each pixel intensity value by a factor of 10d,

where d depends upon the precision of the desired

decimal digits up to which we want to process the real

numbers. The prime number should always be chosen as

greater than (255+51×10d) ×10d

APPLIED TO THE PROBLEM: PROPOSED SOLUTION:pre-process the image data in such a way that averaging

is performed on completely divisible values only.

54

Page 55: Secure MM Processing over Cloud - Albanypatrey/ppts/Secure_Multimedia_Processing_over_Cloud.pdf · Secure Processing over Cloud Introduction and Motivation Smoking is not ... Perceptual

Encrypted-domain Video Quality Enhancement over Cloud

Scheme I: Multiplying each original intensity value by the mask

size, (m×n). In other words, convert each pixel I(u,v) to a

multiple of (m×n) by,

Video Quality Enhancement Framework

55

Scheme II: Changing each original intensity value to the

nearest multiple of (m×n) by adding or subtracting a maximum

of values to or from its current value, where the range of lies

between 1 and Г m-n/2˥. In other words, convert each pixel

I(u, v) to a multiple of (m×n) by,

Page 56: Secure MM Processing over Cloud - Albanypatrey/ppts/Secure_Multimedia_Processing_over_Cloud.pdf · Secure Processing over Cloud Introduction and Motivation Smoking is not ... Perceptual

Encrypted-domain Video Quality Enhancement over Cloud

• Results – Scheme 1

Video Quality Enhancement Framework

56

http://www.youtube.com/watch?v=hJg67v3IbmU&feature=youtu.be

Page 57: Secure MM Processing over Cloud - Albanypatrey/ppts/Secure_Multimedia_Processing_over_Cloud.pdf · Secure Processing over Cloud Introduction and Motivation Smoking is not ... Perceptual

Encrypted-domain Video Quality Enhancement over Cloud

• Results – Scheme 2

Video Quality Enhancement Framework

57

http://www.youtube.com/watch?v=TqRHJ6KrZY0&feature=youtu.be

Page 58: Secure MM Processing over Cloud - Albanypatrey/ppts/Secure_Multimedia_Processing_over_Cloud.pdf · Secure Processing over Cloud Introduction and Motivation Smoking is not ... Perceptual

• Addressed incompatibility of a cryptosystem with real

number

• Proposed three frameworks using Shamir’s secret sharing

as principal cryptosystem

Conclusions

58

• More secure cloud-based systems can be built using

somewhat homomorphic cryptosystems

Page 59: Secure MM Processing over Cloud - Albanypatrey/ppts/Secure_Multimedia_Processing_over_Cloud.pdf · Secure Processing over Cloud Introduction and Motivation Smoking is not ... Perceptual

Publications

• A. Lathey, P. K. Atrey and N. Joshi. Homomorphic low pass filtering on encrypted multimedia over cloud. IEEE International Conference on Semantic Computing (ICSC'2013), September 2013, Irvine, CA, USA.

• M. Mohanty, W.-T. Ooi and P. K. Atrey. Scale me, crop me, know me not: Supporting scaling and cropping in secret image sharing. IEEE

• M. Mohanty, W.-T. Ooi and P. K. Atrey. Scale me, crop me, know me not: Supporting scaling and cropping in secret image sharing. IEEE International Conference on Multimedia and Expo (ICME'2013), July 15-19, 2013, San Jose, CA, USA.

• M. Mohanty, P. K. Atrey and W.-T. Ooi. Secure cloud-based medical data visualization. The ACM International Conference on Multimedia (ACMMM'12), October 29-November 2, 2012, Nara, Japan.

59

Page 60: Secure MM Processing over Cloud - Albanypatrey/ppts/Secure_Multimedia_Processing_over_Cloud.pdf · Secure Processing over Cloud Introduction and Motivation Smoking is not ... Perceptual

What Next?

• This is not the end of the world.

• Need to examine the suitability of the proposed frameworks in other cloud-based proposed frameworks in other cloud-based applications such as:

– Scaling/cropping on compressed images/videos

– Compression in encrypted domain

– Processing other media e.g. text documents and audio

60