Efficient PRNU Matching in the Encrypted Domain †
Abstract
:1. Introduction
- High Computational Demands: Outsourcing is an appealing solution for digital media forencis because the involved operations are computationally intensive and they must also deal with very large databases.
- Privacy issues: Forensic data is especially privacy-sensitive and it must be protected when outsourced. Actually, not only while outsourced, but it should be protected even when it is inside our own infrastructure to prevent non-authorized parties from accessing to the content.
2. Main Approaches
2.1. Previous Methods
- The Wavelet-based denoising is computed in a trusted environment (ARM TrustZone).
- The correlation test is homomorphically evaluated by means of the BGN cryptosystem.
2.2. Our Fully Unattended Solution
3. A Discussion: Efficient Encrypted Matching
Funding
Conflicts of Interest
References
- Holst, G.C. CCD Arrays, Cameras, and Displays, 2nd ed.; SPIE Optical Engineering Press: Bellingham, WA, USA, 1998. [Google Scholar]
- Chen, M.; Fridrich, J.; Goljan, M.; Lukáš, J. Determining Image Origin and Integrity Using Sensor Noise. IEEE Trans. Inf. Forensics Secur. 2008, 3, 74–90. [Google Scholar] [CrossRef]
- Mohanty, M.; Zhang, M.; Asghar, M.R.; Russello, G. PANDORA: Preserving Privacy in PRNU-Based Source Camera Attribution. In Proceedings of the 2018 17th IEEE International Conference on Trust, Security and Privacy in Computing and Communications/12th IEEE International Conference on Big Data Science and Engineering (TrustCom/BigDataSE), New York, NY, USA, 1–3 August 2018; pp. 1202–1207. [Google Scholar]
- Mohanty, M.; Zhang, M.; Asghar, M.R.; Russello, G. e-PRNU: Encrypted Domain PRNU-Based Camera Attribution for Preserving Privacy. IEEE Trans. Dependable Secur. Comput. 2019, 1. [Google Scholar] [CrossRef]
- Pedrouzo-Ulloa, A.; Masciopinto, M.; Troncoso-Pastoriza, J.R.; Pérez-González, F. Camera Attribution Forensic Analyzer in the Encrypted Domain. In Proceedings of the 2018 IEEE International Workshop on Information Forensics and Security (WIFS), Hong Kong, China, 1–13 December 2018; pp. 1–7. [Google Scholar]
- Lyubashevsky, V.; Peikert, C.; Regev, O. On Ideal Lattices and Learning with Errors over Rings. J. ACM 2013, 60, 43:1–43:35. [Google Scholar] [CrossRef]
- Pedrouzo-Ulloa, A.; Troncoso-Pastoriza, J.R.; Pérez-González, F. Number Theoretic Transforms for Secure Signal Processing. IEEE Trans. Inf. Forensics Secur. 2017, 12, 1125–1140. [Google Scholar] [CrossRef]
- Pedrouzo-Ulloa, A.; Troncoso-Pastoriza, J.R.; Pérez-González, F. Image Denoising in the Encrypted Domain. In Proceedings of the WIFS 2016: 8th IEEE International Workshop on Information Forensics and Security (WIFS), Abu Dhabi, UAE, 4–7 December 2016; pp. 1–6. [Google Scholar]
- Griffin, M. Lowest Degree of Polynomial That Removes the First Digit of an Integer in Base. Available online: https://mathoverflow.net/q/269282 (accessed on 12 July 2019).
- Chen, H.; Han, K. Homomorphic Lower Digits Removal and Improved FHE Bootstrapping. In Proceedings of the 37th Annual International Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), Tel Aviv, Israel, 29 April–3 May 2018; pp. 315–337. [Google Scholar]
- Pedrouzo-Ulloa, A.; Troncoso-Pastoriza, J.R.; Pérez-González, F. Revisiting Multivariate Lattices for Encrypted Signal Processing. In Proceedings of the 2018 ACM Conference on Economics and Computation, Ithaca, NY, USA, 18–22 June 2018; pp. 161–172. [Google Scholar]
Parallelization | 8 | 16 |
---|---|---|
Encryption + Pre-coding (s) | 3.6 | |
Decryption + Post-coding () | 27 | |
Encrypted Detection () |
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations. |
© 2019 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Pedrouzo-Ulloa, A.; Masciopinto, M.; Troncoso-Pastoriza, J.R.; Pérez-González, F. Efficient PRNU Matching in the Encrypted Domain. Proceedings 2019, 21, 17. https://doi.org/10.3390/proceedings2019021017
Pedrouzo-Ulloa A, Masciopinto M, Troncoso-Pastoriza JR, Pérez-González F. Efficient PRNU Matching in the Encrypted Domain. Proceedings. 2019; 21(1):17. https://doi.org/10.3390/proceedings2019021017
Chicago/Turabian StylePedrouzo-Ulloa, Alberto, Miguel Masciopinto, Juan Ramón Troncoso-Pastoriza, and Fernando Pérez-González. 2019. "Efficient PRNU Matching in the Encrypted Domain" Proceedings 21, no. 1: 17. https://doi.org/10.3390/proceedings2019021017
APA StylePedrouzo-Ulloa, A., Masciopinto, M., Troncoso-Pastoriza, J. R., & Pérez-González, F. (2019). Efficient PRNU Matching in the Encrypted Domain. Proceedings, 21(1), 17. https://doi.org/10.3390/proceedings2019021017