Processing encrypted signals: a new frontier for multimedia security

  • Authors:
  • Mauro Barni

  • Affiliations:
  • University of Siena, Italy

  • Venue:
  • MM&Sec '06 Proceedings of the 8th workshop on Multimedia and security
  • Year:
  • 2006

Quantified Score

Hi-index 0.00

Visualization

Abstract

Most of technological solutions proposed so far to cope with the issues of multimedia security rely on the use of cryptography. Early works in this direction simply tried to apply some cryptographic primitives, to build a secure layer on top of the signal processing modules, able to protect them from leakage of critical information. Examples of such an approach include the encryption of content before its transmission or storage (like encrypted digital TV channels), or wrapping multimedia objects into an encrypted system with an application (the reader) allowing to use the multimedia work only in a controlled manner so that the content cannot be accessed without the proper application.All these solutions are based on the concept that the owner of the owner of the content and the user trust each other and that the encryption layer is used only to protect the data against third parties not authorized to access the data. In many cases, though, the owner of the content may not trust the users, or those actors that are required to manipulate in some way the content. It is clear that the availability of signal processing algorithms that work directly on the encrypted signals would be an invaluable help to circumvent the above problems in for application scenarios where "valuable" signals must be produced, processed or exchanged in digital format. Whereas the development of tools capable of processing an encrypted signal may seem a formidable task, some recent, still scattered, studies, spanning from digital watermarking, through secure compression, and access to encrypted databases, have shown that the application of signal processing in the encrypted domain is indeed feasible.In addition to highlighting the benefits offered by the availability of signal processing tools capable of operating directly on encrypted data, it is the aim of this talk to revise the approaches proposed so far, pointing out the pros and cons of each of them, and to highlight directions for future research. A few case studies will be considered to better highlight the underlying concepts.