Page 1
Biometric Security Through Visual Encryption for Fog Edge Computing
Biometric Security Through Visual Encryption forFog Edge Computing
Ghadir Mostafa 31-0810Hana Hani 31-2206
Lama Ahmed 31-4892Mina Eshak 31-15454Karim Samy 31-15456
German University in Cairo
February 24, 2018
1 / 27
Page 2
Biometric Security Through Visual Encryption for Fog Edge Computing
Outline
1 Motivation
2 Fog Edge Computing
3 Cryptography
4 Watermarking
5 Encryption
6 Decryption
7 Conclusion
2 / 27
Page 3
Biometric Security Through Visual Encryption for Fog Edge Computing
Motivation
Motivation
3 / 27
Page 4
Biometric Security Through Visual Encryption for Fog Edge Computing
Motivation
Applications:
4 / 27
Page 5
Biometric Security Through Visual Encryption for Fog Edge Computing
Motivation
IoT challenges:
Tons of devices connected to cloud.
Massive processing needed.
5 / 27
Page 6
Biometric Security Through Visual Encryption for Fog Edge Computing
Fog Edge Computing
Fog Edge Computing
6 / 27
Page 7
Biometric Security Through Visual Encryption for Fog Edge Computing
Fog Edge Computing
Advantages:
Intermediate layer.
Edge server physically closer.
Work offloaded from cloud.
7 / 27
Page 8
Biometric Security Through Visual Encryption for Fog Edge Computing
Fog Edge Computing
Fog Edge Computing security coin
Side 1: Improved security.
Static data.Closer to where created.Less sharing, less vulnerability.
Side 2: Less secure.
Vulnerable edge devices.Data encryption/ VPN needed.
8 / 27
Page 9
Biometric Security Through Visual Encryption for Fog Edge Computing
Fog Edge Computing
Fog Edge Computing security coin
Side 1: Improved security.
Static data.Closer to where created.Less sharing, less vulnerability.
Side 2: Less secure.
Vulnerable edge devices.Data encryption/ VPN needed.
8 / 27
Page 10
Biometric Security Through Visual Encryption for Fog Edge Computing
Cryptography
Cryptography
9 / 27
Page 11
Biometric Security Through Visual Encryption for Fog Edge Computing
Watermarking
Watermarking
History
In 1300 paper companies used dandy roll process to watermark their products.
roll.jpg
10 / 27
Page 12
Biometric Security Through Visual Encryption for Fog Edge Computing
Watermarking
Watermarking
It is the process of creating a invisible tag for certain data.
1 Copyrights2 Security3 Hiding useful information.
11 / 27
Page 13
Biometric Security Through Visual Encryption for Fog Edge Computing
Watermarking
Watermarking
It is the process of creating a invisible tag for certain data.
1 Copyrights
2 Security3 Hiding useful information.
11 / 27
Page 14
Biometric Security Through Visual Encryption for Fog Edge Computing
Watermarking
Watermarking
It is the process of creating a invisible tag for certain data.
1 Copyrights2 Security
3 Hiding useful information.
11 / 27
Page 15
Biometric Security Through Visual Encryption for Fog Edge Computing
Watermarking
Watermarking
It is the process of creating a invisible tag for certain data.
1 Copyrights2 Security3 Hiding useful information.
11 / 27
Page 16
Biometric Security Through Visual Encryption for Fog Edge Computing
Watermarking
Zero Watermarking
Sometimes data can tolerate obvious changes done to it.
Zero watermarking use watermarks that do not obviouslychange the image.
Watermarks can be used in two different ways
1 Embeded in the image.2 Separated from the image.
12 / 27
Page 17
Biometric Security Through Visual Encryption for Fog Edge Computing
Watermarking
Zero Watermarking
Sometimes data can tolerate obvious changes done to it.
Zero watermarking use watermarks that do not obviouslychange the image.
Watermarks can be used in two different ways
1 Embeded in the image.2 Separated from the image.
12 / 27
Page 18
Biometric Security Through Visual Encryption for Fog Edge Computing
Watermarking
Zero Watermarking
Sometimes data can tolerate obvious changes done to it.
Zero watermarking use watermarks that do not obviouslychange the image.
Watermarks can be used in two different ways
1 Embeded in the image.2 Separated from the image.
12 / 27
Page 19
Biometric Security Through Visual Encryption for Fog Edge Computing
Watermarking
Zero Watermarking
Sometimes data can tolerate obvious changes done to it.
Zero watermarking use watermarks that do not obviouslychange the image.
Watermarks can be used in two different ways
1 Embeded in the image.
2 Separated from the image.
12 / 27
Page 20
Biometric Security Through Visual Encryption for Fog Edge Computing
Watermarking
Zero Watermarking
Sometimes data can tolerate obvious changes done to it.
Zero watermarking use watermarks that do not obviouslychange the image.
Watermarks can be used in two different ways
1 Embeded in the image.2 Separated from the image.
12 / 27
Page 21
Biometric Security Through Visual Encryption for Fog Edge Computing
Watermarking
Zero watermarking Scheme
13 / 27
Page 22
Biometric Security Through Visual Encryption for Fog Edge Computing
Watermarking
Zero watermarking Scheme
13 / 27
Page 23
Biometric Security Through Visual Encryption for Fog Edge Computing
Watermarking
Zero watermarking Scheme
13 / 27
Page 24
Biometric Security Through Visual Encryption for Fog Edge Computing
Watermarking
Zero watermarking Scheme
13 / 27
Page 25
Biometric Security Through Visual Encryption for Fog Edge Computing
Watermarking
Zero watermarking Scheme
13 / 27
Page 26
Biometric Security Through Visual Encryption for Fog Edge Computing
Watermarking
Zero watermarking Scheme
13 / 27
Page 27
Biometric Security Through Visual Encryption for Fog Edge Computing
Watermarking
Zero watermarking Scheme
13 / 27
Page 28
Biometric Security Through Visual Encryption for Fog Edge Computing
Encryption
Gray scale image structure
14 / 27
Page 29
Biometric Security Through Visual Encryption for Fog Edge Computing
Encryption
Gray scale image structure
15 / 27
Page 30
Biometric Security Through Visual Encryption for Fog Edge Computing
Encryption
Gray scale image structure
16 / 27
Page 31
Biometric Security Through Visual Encryption for Fog Edge Computing
Encryption
Converting to gray-scale
Retrieving bit planes
A pixel will be positioned at positions ( j , j , : )Same dimensions as original image
17 / 27
Page 32
Biometric Security Through Visual Encryption for Fog Edge Computing
Encryption
Generating the secret shares
(n) by (n-2) G matrix(n) by (n) identity H matrix(n) by (2n-2) GH concatenated matrixGH’: Complement of GH
18 / 27
Page 33
Biometric Security Through Visual Encryption for Fog Edge Computing
Encryption
Encryption Matrices
19 / 27
Page 34
Biometric Security Through Visual Encryption for Fog Edge Computing
Encryption
Secret key retrieval
y = b +
⌊(a− b) × x s −min(x s)
max(x s) −min(x s)
⌋(1)
a = 1
b = n + (n − 2)
x s is the sub-sequence containing n+(n-2) values
20 / 27
Page 35
Biometric Security Through Visual Encryption for Fog Edge Computing
Encryption
Secret key retrieval
y = b +
⌊(a− b) × x s −min(x s)
max(x s) −min(x s)
⌋(1)
a = 1
b = n + (n − 2)
x s is the sub-sequence containing n+(n-2) values
20 / 27
Page 36
Biometric Security Through Visual Encryption for Fog Edge Computing
Encryption
Secret key retrieval
y = b +
⌊(a− b) × x s −min(x s)
max(x s) −min(x s)
⌋(1)
a = 1
b = n + (n − 2)
x s is the sub-sequence containing n+(n-2) values
20 / 27
Page 37
Biometric Security Through Visual Encryption for Fog Edge Computing
Encryption
Secret key retrieval
y = b +
⌊(a− b) × x s −min(x s)
max(x s) −min(x s)
⌋(1)
a = 1
b = n + (n − 2)
x s is the sub-sequence containing n+(n-2) values
20 / 27
Page 38
Biometric Security Through Visual Encryption for Fog Edge Computing
Encryption
Encryption process
21 / 27
Page 39
Biometric Security Through Visual Encryption for Fog Edge Computing
Encryption
Encryption process
21 / 27
Page 40
Biometric Security Through Visual Encryption for Fog Edge Computing
Encryption
Encryption process
21 / 27
Page 41
Biometric Security Through Visual Encryption for Fog Edge Computing
Encryption
Encryption process
21 / 27
Page 42
Biometric Security Through Visual Encryption for Fog Edge Computing
Decryption
Decryption Process
22 / 27
Page 43
Biometric Security Through Visual Encryption for Fog Edge Computing
Decryption
Decryption Process
22 / 27
Page 44
Biometric Security Through Visual Encryption for Fog Edge Computing
Decryption
Decryption Process
22 / 27
Page 45
Biometric Security Through Visual Encryption for Fog Edge Computing
Decryption
Decryption Process
22 / 27
Page 46
Biometric Security Through Visual Encryption for Fog Edge Computing
Decryption
Decryption Process
22 / 27
Page 47
Biometric Security Through Visual Encryption for Fog Edge Computing
Decryption
Decryption Process
Needed elements
n secret sharesSecret key
Matrix for each bit
Arrange matrix
Decide 0 or 1
23 / 27
Page 48
Biometric Security Through Visual Encryption for Fog Edge Computing
Decryption
Decryption Process
Needed elements
n secret sharesSecret key
Matrix for each bit
Arrange matrix
Decide 0 or 1
23 / 27
Page 49
Biometric Security Through Visual Encryption for Fog Edge Computing
Decryption
Decryption Process
Needed elements
n secret sharesSecret key
Matrix for each bit
Arrange matrix
Decide 0 or 1
23 / 27
Page 50
Biometric Security Through Visual Encryption for Fog Edge Computing
Decryption
Decryption Process
Needed elements
n secret sharesSecret key
Matrix for each bit
Arrange matrix
Decide 0 or 1
23 / 27
Page 51
Biometric Security Through Visual Encryption for Fog Edge Computing
Decryption
Image Reconstruction
24 / 27
Page 52
Biometric Security Through Visual Encryption for Fog Edge Computing
Decryption
Image Reconstruction
24 / 27
Page 53
Biometric Security Through Visual Encryption for Fog Edge Computing
Decryption
Image Reconstruction
24 / 27
Page 54
Biometric Security Through Visual Encryption for Fog Edge Computing
Decryption
Image Reconstruction
24 / 27
Page 55
Biometric Security Through Visual Encryption for Fog Edge Computing
Decryption
Image Reconstruction
24 / 27
Page 56
Biometric Security Through Visual Encryption for Fog Edge Computing
Decryption
Image Reconstruction
24 / 27
Page 57
Biometric Security Through Visual Encryption for Fog Edge Computing
Decryption
Image Reconstruction
24 / 27
Page 58
Biometric Security Through Visual Encryption for Fog Edge Computing
Decryption
Image Reconstruction
24 / 27
Page 59
Biometric Security Through Visual Encryption for Fog Edge Computing
Decryption
Original, Watermarked, Decrypted Images
25 / 27
Page 60
Biometric Security Through Visual Encryption for Fog Edge Computing
Decryption
Original, Watermarked, Decrypted Images
25 / 27
Page 61
Biometric Security Through Visual Encryption for Fog Edge Computing
Decryption
Original, Watermarked, Decrypted Images
25 / 27
Page 62
Biometric Security Through Visual Encryption for Fog Edge Computing
Conclusion
Conclusion
Edge computing and security
Zero watermarking and copyright protection
Encryption and decryption processes
Visual quality of image unchanged
26 / 27
Page 63
Biometric Security Through Visual Encryption for Fog Edge Computing
Conclusion
Conclusion
Edge computing and security
Zero watermarking and copyright protection
Encryption and decryption processes
Visual quality of image unchanged
26 / 27
Page 64
Biometric Security Through Visual Encryption for Fog Edge Computing
Conclusion
Conclusion
Edge computing and security
Zero watermarking and copyright protection
Encryption and decryption processes
Visual quality of image unchanged
26 / 27
Page 65
Biometric Security Through Visual Encryption for Fog Edge Computing
Conclusion
Conclusion
Edge computing and security
Zero watermarking and copyright protection
Encryption and decryption processes
Visual quality of image unchanged
26 / 27
Page 66
Biometric Security Through Visual Encryption for Fog Edge Computing
Conclusion
Conclusion
Any Questions ?!
27 / 27