Abstract

The processing and encryption of multimedia content are generally considered sequential and independent operations. In certain multimedia content processing scenarios, it is, however, desirable to carry out processing directly on encrypted signals. The field of secure signal processing poses significant challenges for both signal processing and cryptography research; only few ready-togo fully integrated solutions are available. This study first concisely summarizes cryptographic primitives used in existing solutions to processing of encrypted signals, and discusses implications of the security requirements on these solutions. The study then continues to describe two domains in which secure signal processing has been taken up as a challenge, namely, analysis and retrieval of multimedia content, as well as multimedia content protection. In each domain, state-of-the-art algorithms are described. Finally, the study discusses the challenges and open issues in the field of secure signal processing.

Highlights

  • In the past few years,the processing of encrypted signals has emerged as a new and challenging research field

  • We mainly review the stateof-the-art, describing the necessary properties of the cryptographic primitives and highlighting the limits of current solutions that have an impact on processing in the encrypted domain

  • Concerning the use of cryptographic primitives for signal processing in the encrypted domain, we can observe that treating the digital content as a binary data is not realistic and eliminates the possibility of further processing

Read more

Summary

INTRODUCTION

In the past few years,the processing of encrypted signals has emerged as a new and challenging research field. It is desirable to carry out signal processing operations directly on encrypted signals. Such an approach is called secure signal processing, encrypted signal processing, or signal processing in the encrypted domain. The relevance of carrying out such signal manipulations, that is, the algorithm, directly on encrypted signals is entirely dependent on the security requirements of the application scenario under consideration. The security requirements of signal processing in encrypted domains depends strongly on the considered application. This section discusses the need for clearly identifying the security requirements of the signal processing operations in a given scenario.

Introduction
Homomorphic cryptosystems
Zero-knowledge proof protocols
Commitment schemes
Secure multiparty computation
Importance of security requirements
Compression of encrypted signals
ANALYSIS AND RETRIEVAL OF CONTENT
Clustering
Cluster centers
K-means clustering algorithm
Secure K-means clustering algorithm
Recommender systems
Recommendations by partial SVD on encrypted preferences
Randomized perturbation to protect preferences
Watermarking of content
Watermarking model
Watermarking algorithm
Client-side watermark embedding
Buyer seller protocols
Secure watermark detection
Embedding σ
CONCLUSION AND DISCUSSION
Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.