Académique Documents
Professionnel Documents
Culture Documents
Maneesh Upmanyu
Advisors: C. V. Jawahar , Anoop M. Namboodiri, Kannan Srinathan,
Center for Visual Information Technology Center for Security, Theory & Algorithmic Research IIIT- Hyderabad
IIIT Hyderabad
IIIT Hyderabad
Research Directions
Private Content Based Image Retrieval (PCBIR) Blind Authentication: A Secure
Crypto-Biometric Verification Protocol
Feature vector (fquery)
Root Info Q1 A1 Q2 A2
..
Publication: Maneesh Upmanyu, Anoop M. Namboodiri, K. Srinathan and C.V. Jawahar; Efficient Privacy Preserving Video Surveillance: Proceedings of the 12th International Conference on Computer Vision (ICCV 2009) Publication: Maneesh Upmanyu, Anoop M. Namboodiri, K. Srinathan and C.V. Jawahar; Blind Authentication - A Secure Crypto-Biometric Verification Protocol: Appears in IEEETransactions on Information Forensics and Security (IEEE-TIFS), June 2010
IIIT Hyderabad
Publication: Shashank J, Kowshik P, Kannan Srinathan and C.V. Jawahar; Private Content Based Image Retrieval; In Proceedings of Computer Vision and Pattern Recognition (CVPR 2008)
Analysis outline:
Correctness Security Complexity
IIIT Hyderabad
Assumptions
Reliable and secure communication channel Players are passively corrupt, that is, honest but curious. Players are computationally bounded. Players do not collude.
IIIT Hyderabad
Thesis Objective
Traditional Approaches uses highly interactive protocols.
Limitation: massive datasets Example: Blind Vision
Paradigm Shift
Compute directly in encrypted domain.
Encrypt -> Communicate -> Compute -> Decrypt
Contribution of Thesis
A method that provides provable security, while allowing efficient computations for generic vision algorithms have remained elusive.
IIIT Hyderabad
We show that, one can exploit certain properties inherent to visual data to break this seemingly impenetrable barrier.
IIIT Hyderabad
IIIT Hyderabad
IIIT Hyderabad
IIIT Hyderabad
Previous Work
IIIT Hyderabad
A template protection scheme with provable security and acceptable recognition performance has thus far remained elusive. A.K. Jain, Eurasip 2008
Homomorphic Encryption
An encryption scheme using which some algebric operation , like addition or multiplication, can be directly done on the cipher text. Let x1 = 20 and x2 = 22, to compute x1+x2 = 42
IIIT Hyderabad
User Enrollment
IIIT Hyderabad
Similarly, in Neural Network the basic units are for example perceptron or sigmoid
Model above functions as arithmetic circuits consisting of add and multiplication gates over a finite domain. Consider two encryptions E+ and E*
IIIT Hyderabad
IIIT Hyderabad
Case study shows that matching using fixed length feature representation is comparable to variable length methods such as dynamic warping.
IIIT Hyderabad
Client Security
Hacker has users key or biometric Passive attacks at client end
Network Security
IIIT Hyderabad
Plain Video
Captured by Camera
Encrypted Video
As seen by one of the Computational Servers
Processed Video
As seen by the Computational Server
Result Video
Received by Observer
on Randomized images ?
Motivation
Can we do surveillance without
Ability to run video surveillance algorithms, completely in encrypted domain can address most
privacy concerns.
Paradigm Shift
Trusted Third Party
(TTP) In practice, do not have the luxury of a trusted entity
Selective Encryption
(Smart Camera)
No provable privacy, costly and tedious to upgrade
IIIT Hyderabad
We use the paradigm of secret sharing to achieve private and efficient surveillance.
Protocol in a nutshell
Propose a Cloud-Computing based solution using k>2 non-colluding servers
IIIT Hyderabad
The camera splits each captured frame F, into k ( > 2 ) shares using pixel level shatter function: To carry out a aof basic operation f on the input image, eachby The results operations on the shares are integrated server blindly carries out the equivalent basic operation f on the observer using a merge function ( CRT), to obtain final its share. result. Each share is then sent to an independent server for processing.
Secret Sharing
A method of distributing a secret among a group of servers, such that:
Each server on its own has no meaningful information Secret is reconstructed only when all shares combine together
IIIT Hyderabad
Existing methods are highly inefficient Asmuth-Bloom overcomes this limitation by working in Residue Number System (RNS).
Data Properties
While general purpose secure computation appears inherently complex and oftentimes impractical.
We show certain properties of the data can be used to ensure efficiency while ensuring privacy.
Limited and Fixed Range Scale Invariant Approximate Nature Non-General Operands
IIIT Hyderabad
Reconstruction of data
Implementation Challenges
Representation of negative numbers: Use an Implicit sign representation. Use (0, M/2) as positive and rest as negative. Sign conversion is carried out using additive inversion of Z. Overflow and Underflow: Operations are valid and correct as long as range of data is (-M/2, M/2). Integer Division and Thresholding: RNS domain is finite and hence not all divisions are defined. Dividing integer A by B is defined as A/B = (ai.bi-1) mod mi
IIIT Hyderabad
Defining Equivalent operations: For every f(x), we need to define f`(x) such that merging f`(xi) would give f(x).
Experimental Results
IIIT Hyderabad
IIIT Hyderabad
No compromise in accuracy.
IIIT Hyderabad
Our approach shows that privacy and efficiency co-exists in the domain of visual data
K-Means Clustering
Data clustering is one of the most important techniques for discovery of patterns in a dataset. K-Means clustering is a simple and extensively used technique that automatically partitions a dataset into k clusters.
IIIT Hyderabad
The technique becomes more effective with larger amount of data such as when multiple businesses share their data to carry out the clustering together. However, the data may contain sensitive information.
IIIT Hyderabad
IIIT Hyderabad
Proposed Protocol
Protocol consists of two phases
Phase One: Secure Data Distribution Phase Two: Secure K-Means
IIIT Hyderabad
IIIT Hyderabad
User 1
User 2
Analysis
Overheads calculated over the nave TTP based protocol. Division and Comparison operations introduce communication overhead.
Limited to one round per operation
Algorithm Properties
We have proposed a highly secure framework using paradigm of secret sharing. Negligible overheads in simulating algebraic operations. Achieve efficiency by exploiting the data properties. Solution does not demand any trust and the clustering is carried out directly on the encrypted data.
IIIT Hyderabad
Conclusion
Broad Objective
Development of secure computational algorithms in computer vision and related areas.
To develop highly-secure solutions To develop computationally efficient solutions To develop solutions to problems with immediate impact
The traditional methods of ensuring privacy are communication and computation expensive. We show that domain specific knowledge can be incorporated to ensure efficiency while retaining privacy. Moreover, our methods do not trade off accuracy.
IIIT Hyderabad
Related Publications
Maneesh Upmanyu, Anoop M. Namboodiri, K. Srinathan and C.V. Jawahar; Blind Authentication - A Secure Crypto-Biometric Verification Protocol In IEEE-Transactions on Information Forensics and Security (IEEE-TIFS, June 2010) Efficient Biometric Verification in Encrypted Domain In Proceedings of 3rd International Conference on Biometrics (ICB 2009) Efficient Privacy Preserving Video Surveillance Proceedings of the 12th International Conference on Computer Vision (ICCV 2009) Efficient Privacy Preserving K-Means Clustering Proceedings of the Pacific Asia Workshop on Intelligence and Security Informatics (PAISI 2010)
IIIT Hyderabad
IIIT Hyderabad
ai = A modulo mi
Chinese Remainder Theorem (CRT) is the method of recovering the integer value from a given set of smaller integers.
Define Mi = M/mi
Compute ci = Mi x (Mi-1 mod mi) The above equation is always valid in our system, therefore unique solution exists
IIIT Hyderabad
Merge function
IIIT Hyderabad