Skip to main content

2019 | OriginalPaper | Buchkapitel

4. Privacy-Preserving Embeddings

verfasst von : Matteo Testa, Diego Valsesia, Tiziano Bianchi, Enrico Magli

Erschienen in: Compressed Sensing for Privacy-Preserving Data Processing

Verlag: Springer Singapore

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

In this chapter, we illustrate main results on privacy-preserving embeddings. Here, security properties of embeddings are analyzed by considering two possible scenarios for their use. In the first case, a client submits a query containing sensitive information to a server, which should respond to the query without gaining access to the private information. This is discussed describing an authentication system in which a client submit an embedding of a physical characteristic of a device, and a verification server is able to match the embedding without revealing the actual physical characteristic. Interestingly, in this case the security properties of the embedding permit to combine it with existing biometric template mechanisms, enhancing the security of the system. In the second case, a large amount of sensitive data is stored in the cloud and a user should be able to make specific queries to the cloud without gaining access to the data. Here, we describe a universal embedding that preserves distances only locally. If data are stored in the cloud using this embedding, a user is able to retrieve data close to the query, but the complete geometry of the dataset remains hidden by the embedding and data cannot be recovered.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Bianchi, T., Bioglio, V., Magli, E.: Analysis of one-time random projections for privacy preserving compressed sensing. IEEE Trans. Inf. Forensics Secur. 11(2), 313–327 (2016)CrossRef Bianchi, T., Bioglio, V., Magli, E.: Analysis of one-time random projections for privacy preserving compressed sensing. IEEE Trans. Inf. Forensics Secur. 11(2), 313–327 (2016)CrossRef
2.
Zurück zum Zitat Bianchi, T., Magli, E.: Analysis of the security of compressed sensing with circulant matrices. In: 2014 IEEE International Workshop on Information Forensics and Security (WIFS), pp. 173–178 (2014) Bianchi, T., Magli, E.: Analysis of the security of compressed sensing with circulant matrices. In: 2014 IEEE International Workshop on Information Forensics and Security (WIFS), pp. 173–178 (2014)
3.
Zurück zum Zitat Bonneau, J., Herley, C., van Oorschot, P.C., Stajano, F.: Passwords and the evolution of imperfect authentication. Commun. ACM 58(7), 78–87 (2015)CrossRef Bonneau, J., Herley, C., van Oorschot, P.C., Stajano, F.: Passwords and the evolution of imperfect authentication. Commun. ACM 58(7), 78–87 (2015)CrossRef
4.
Zurück zum Zitat Boufounos, P., Rane, S.: Secure binary embeddings for privacy preserving nearest neighbors. In: 2011 IEEE International Workshop on Information Forensics and Security, pp. 1–6 (2011) Boufounos, P., Rane, S.: Secure binary embeddings for privacy preserving nearest neighbors. In: 2011 IEEE International Workshop on Information Forensics and Security, pp. 1–6 (2011)
5.
Zurück zum Zitat Boufounos, P.T.: Universal rate-efficient scalar quantization. IEEE Trans. Inf. Theory 58(3), 1861–1872 (2012)MathSciNetCrossRef Boufounos, P.T.: Universal rate-efficient scalar quantization. IEEE Trans. Inf. Theory 58(3), 1861–1872 (2012)MathSciNetCrossRef
6.
Zurück zum Zitat Boufounos, P.T., Rane, S., Mansour, H.: Representation and coding of signal geometry. Inf. Inference J. IMA 6(4), 349–388 (2017)MathSciNetMATH Boufounos, P.T., Rane, S., Mansour, H.: Representation and coding of signal geometry. Inf. Inference J. IMA 6(4), 349–388 (2017)MathSciNetMATH
7.
Zurück zum Zitat Burr, W.E., Dodson, D.F., Newton, E.M., Perlner, R.A., Polk, W.T., Gupta, S., Nabbus, E.A.: Electronic authentication guideline. NIST Special Publication 800-63-2 (2013) Burr, W.E., Dodson, D.F., Newton, E.M., Perlner, R.A., Polk, W.T., Gupta, S., Nabbus, E.A.: Electronic authentication guideline. NIST Special Publication 800-63-2 (2013)
8.
Zurück zum Zitat Caldelli, R., Amerini, I., Picchioni, F., Innocenti, M.: Fast image clustering of unknown source images. In: 2010 IEEE International Workshop on Information Forensics and Security, pp. 1–5 (2010) Caldelli, R., Amerini, I., Picchioni, F., Innocenti, M.: Fast image clustering of unknown source images. In: 2010 IEEE International Workshop on Information Forensics and Security, pp. 1–5 (2010)
9.
Zurück zum Zitat Chen, M., Fridrich, J., Goljan, M., Lukas, J.: Determining image origin and integrity using sensor noise. IEEE Trans. Inf. Forensics Secur. 3(1), 74–90 (2008)CrossRef Chen, M., Fridrich, J., Goljan, M., Lukas, J.: Determining image origin and integrity using sensor noise. IEEE Trans. Inf. Forensics Secur. 3(1), 74–90 (2008)CrossRef
10.
Zurück zum Zitat Chierchia, G., Cozzolino, D., Poggi, G., Sansone, C., Verdoliva, L.: Guided filtering for PRNU-based localization of small-size image forgeries. In: 2014 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 6231–6235 (2014) Chierchia, G., Cozzolino, D., Poggi, G., Sansone, C., Verdoliva, L.: Guided filtering for PRNU-based localization of small-size image forgeries. In: 2014 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 6231–6235 (2014)
11.
Zurück zum Zitat Dodis, Y., Ostrovsky, R., Reyzin, L., Smith, A.: Fuzzy extractors: how to generate strong keys from biometrics and other noisy data. SIAM J. Comput. 38(1), 97–139 (2008)MathSciNetCrossRef Dodis, Y., Ostrovsky, R., Reyzin, L., Smith, A.: Fuzzy extractors: how to generate strong keys from biometrics and other noisy data. SIAM J. Comput. 38(1), 97–139 (2008)MathSciNetCrossRef
12.
Zurück zum Zitat Fridrich, J.: Digital image forensics. IEEE Signal Process. Mag. 26(2), 26–37 (2009)CrossRef Fridrich, J.: Digital image forensics. IEEE Signal Process. Mag. 26(2), 26–37 (2009)CrossRef
13.
Zurück zum Zitat Goljan, M., Fridrich, J., Filler, T.: Large scale test of sensor fingerprint camera identification. In: Proceedings SPIE, Media Forensics and Security, vol. 7254, pp. 72,540I–72,540I–12 (2009) Goljan, M., Fridrich, J., Filler, T.: Large scale test of sensor fingerprint camera identification. In: Proceedings SPIE, Media Forensics and Security, vol. 7254, pp. 72,540I–72,540I–12 (2009)
14.
Zurück zum Zitat Herder, C., Yu, M.D., Koushanfar, F., Devadas, S.: Physical unclonable functions and applications: a tutorial. Proc. IEEE 102(8), 1126–1141 (2014)CrossRef Herder, C., Yu, M.D., Koushanfar, F., Devadas, S.: Physical unclonable functions and applications: a tutorial. Proc. IEEE 102(8), 1126–1141 (2014)CrossRef
15.
Zurück zum Zitat Hinrichs, A., Vybíral, J.: Johnson-Lindenstrauss lemma for circulant matrices. Random Struct. Algorithms 39(3), 391–398 (2011)MathSciNetMATH Hinrichs, A., Vybíral, J.: Johnson-Lindenstrauss lemma for circulant matrices. Random Struct. Algorithms 39(3), 391–398 (2011)MathSciNetMATH
16.
Zurück zum Zitat Juels, A., Wattenberg, M.: A fuzzy commitment scheme. In: Proceedings of the 6th ACM Conference on Computer and Communications Security, CCS’99, pp. 28–36. ACM, New York (1999) Juels, A., Wattenberg, M.: A fuzzy commitment scheme. In: Proceedings of the 6th ACM Conference on Computer and Communications Security, CCS’99, pp. 28–36. ACM, New York (1999)
17.
Zurück zum Zitat Li, C.T.: Unsupervised classification of digital images using enhanced sensor pattern noise. In: Proceedings of 2010 IEEE International Symposium on Circuits and Systems, pp. 3429–3432 (2010) Li, C.T.: Unsupervised classification of digital images using enhanced sensor pattern noise. In: Proceedings of 2010 IEEE International Symposium on Circuits and Systems, pp. 3429–3432 (2010)
18.
Zurück zum Zitat Linnartz, J.P., Tuyls, P.: New shielding functions to enhance privacy and prevent misuse of biometric templates. In: International Conference on Audio-and Video-Based Biometric Person Authentication, pp. 393–402. Springer, Berlin (2003) Linnartz, J.P., Tuyls, P.: New shielding functions to enhance privacy and prevent misuse of biometric templates. In: International Conference on Audio-and Video-Based Biometric Person Authentication, pp. 393–402. Springer, Berlin (2003)
19.
Zurück zum Zitat Lukáš, J., Fridrich, J., Goljan, M.: Detecting digital image forgeries using sensor pattern noise. Electronic Imaging, vol. 6072, pp. 60,720Y–60–720Y–11. International Society for Optics and Photonics, Bellingham (2006) Lukáš, J., Fridrich, J., Goljan, M.: Detecting digital image forgeries using sensor pattern noise. Electronic Imaging, vol. 6072, pp. 60,720Y–60–720Y–11. International Society for Optics and Photonics, Bellingham (2006)
20.
Zurück zum Zitat Lukas, J., Fridrich, J., Goljan, M.: Digital camera identification from sensor pattern noise. IEEE Trans. Inf. Forensics Secur. 1(2), 205–214 (2006)CrossRef Lukas, J., Fridrich, J., Goljan, M.: Digital camera identification from sensor pattern noise. IEEE Trans. Inf. Forensics Secur. 1(2), 205–214 (2006)CrossRef
21.
Zurück zum Zitat Mahdavifar, H., Vardy, A.: Achieving the secrecy capacity of wiretap channels using polar codes. IEEE Trans. Inf. Theory 57(10), 6428–6443 (2011)MathSciNetCrossRef Mahdavifar, H., Vardy, A.: Achieving the secrecy capacity of wiretap channels using polar codes. IEEE Trans. Inf. Theory 57(10), 6428–6443 (2011)MathSciNetCrossRef
22.
Zurück zum Zitat Rauhut, H.: Circulant and Toeplitz matrices in compressed sensing. In: SPARS’09 - Signal Processing with Adaptive Sparse Structured Representations (2009) Rauhut, H.: Circulant and Toeplitz matrices in compressed sensing. In: SPARS’09 - Signal Processing with Adaptive Sparse Structured Representations (2009)
23.
Zurück zum Zitat Valsesia, D., Boufounos, P.T.: Multispectral image compression using universal vector quantization. In: 2016 IEEE Information Theory Workshop (ITW), pp. 151–155 (2016) Valsesia, D., Boufounos, P.T.: Multispectral image compression using universal vector quantization. In: 2016 IEEE Information Theory Workshop (ITW), pp. 151–155 (2016)
24.
Zurück zum Zitat Valsesia, D., Boufounos, P.T.: Universal encoding of multispectral images. In: 2016 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 4453–4457 (2016) Valsesia, D., Boufounos, P.T.: Universal encoding of multispectral images. In: 2016 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 4453–4457 (2016)
25.
Zurück zum Zitat Valsesia, D., Coluccia, G., Bianchi, T., Magli, E.: Compressed fingerprint matching and camera identification via random projections. IEEE Trans. Inf. Forensics Secur. 10(7), 1472–1485 (2015)CrossRef Valsesia, D., Coluccia, G., Bianchi, T., Magli, E.: Compressed fingerprint matching and camera identification via random projections. IEEE Trans. Inf. Forensics Secur. 10(7), 1472–1485 (2015)CrossRef
26.
Zurück zum Zitat Valsesia, D., Coluccia, G., Bianchi, T., Magli, E.: Large-scale image retrieval based on compressed camera identification. IEEE Trans. Multimed. 17(9), 1439–1449 (2015)CrossRef Valsesia, D., Coluccia, G., Bianchi, T., Magli, E.: Large-scale image retrieval based on compressed camera identification. IEEE Trans. Multimed. 17(9), 1439–1449 (2015)CrossRef
27.
Zurück zum Zitat Valsesia, D., Coluccia, G., Bianchi, T., Magli, E.: User authentication via PRNU-based physical unclonable functions. IEEE Trans. Inf. Forensics Secur. 12(8), 1941–1956 (2017)CrossRef Valsesia, D., Coluccia, G., Bianchi, T., Magli, E.: User authentication via PRNU-based physical unclonable functions. IEEE Trans. Inf. Forensics Secur. 12(8), 1941–1956 (2017)CrossRef
28.
Zurück zum Zitat Valsesia, D., Magli, E.: Compressive signal processing with circulant sensing matrices. In: 2014 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1015–1019 (2014) Valsesia, D., Magli, E.: Compressive signal processing with circulant sensing matrices. In: 2014 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1015–1019 (2014)
29.
Zurück zum Zitat Valsesia, D., Magli, E.: Binary adaptive embeddings from order statistics of random projections. IEEE Signal Process. Lett. 24(1), 111–115 (2017)CrossRef Valsesia, D., Magli, E.: Binary adaptive embeddings from order statistics of random projections. IEEE Signal Process. Lett. 24(1), 111–115 (2017)CrossRef
30.
Zurück zum Zitat Vybral, J.: A variant of the Johnson-Lindenstrauss lemma for circulant matrices. J. Funct. Anal. 26(4), 1096–1105 (2011)MathSciNetCrossRef Vybral, J.: A variant of the Johnson-Lindenstrauss lemma for circulant matrices. J. Funct. Anal. 26(4), 1096–1105 (2011)MathSciNetCrossRef
31.
Zurück zum Zitat Yin, W., Morgan, S., Yang, J., Zhang, Y.: Practical compressive sensing with Toeplitz and circulant matrices. Visual Communications and Image Processing, vol. 7744, p. 77440K. International Society for Optics and Photonics, Bellingham (2010) Yin, W., Morgan, S., Yang, J., Zhang, Y.: Practical compressive sensing with Toeplitz and circulant matrices. Visual Communications and Image Processing, vol. 7744, p. 77440K. International Society for Optics and Photonics, Bellingham (2010)
Metadaten
Titel
Privacy-Preserving Embeddings
verfasst von
Matteo Testa
Diego Valsesia
Tiziano Bianchi
Enrico Magli
Copyright-Jahr
2019
Verlag
Springer Singapore
DOI
https://doi.org/10.1007/978-981-13-2279-2_4

Neuer Inhalt